Final test – Flashcards
Unlock all answers in this set
Unlock answersquestion
A charge card, such as American Express, carries no preset spending limit, and each month the user can pay all or part of the amount owed.
answer
false
question
The length of the sales process for typical B2B sale is much faster than for the typical C2C sale.
answer
false
question
A key sector of wholesale e-commerce is spending on MRO goods and services
answer
true
question
Mobile coupon aggregators provide several promotions from a single retailer to lots of mobile phone users
answer
False
question
Although conversion to an e-commerce or m-commerce system enables organizations to reduce the cost of business, it seldom results in increased accuracy of order processing and order fulfillment
answer
False
question
The handheld devices used for m-commerce have few, if any, limitations that complicate their use
answer
False
question
Digital certificates verify both purchaser and supplier identities in an e-commerce transaction
answer
True
question
Amazon had the most 2008 Web sales by dollar volume of all U.S. companies.
answer
True
question
Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to cybershoppers
answer
true
question
The three basic components of a successful e-commerce model include content, commerce, and commodity
answer
False
question
It is estimated that the number of mobile devices accessing the Internet will exceed 1 billion by 2013.
answer
True
question
An electronic exchange enables a firm's suppliers and competitors to interact.
answer
true
question
Application developers as well as mobile Web sites and mobile operators are considered mobile ad publishers.
answer
true
question
Blind networks and premium blind networks are two forms of mobile advertising networks.
answer
false
question
The brokerage business adapted to the Internet faster than any other arm of finance
answer
true
question
It is estimated that e-commerce contributes about ______ percent to the total U.S. gross domestic product. (Circle the correct answer.) a. 0.2% b. 1.2% c. 2.1% d. 3.2%
answer
c. 2.1%
question
The elimination of intermediate organizations between the producer and the consumer is called ______. (Circle the correct answer.) a. disintermediation b. social networking c. market segmentation d. none of the above
answer
a. disintermediation
question
______ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process. (Circle the correct answer.) a. B2B b. B2C c. C2C d. G2C
answer
c. C2C
question
U.S. m-commerce sales for 2010 are expected to be in the neighborhood of ______. (Circle the correct answer.) a. $1.2 billion b. $2.4 billion c. $3.6 billion d. $4.8 billion
answer
b. $2.4 billion
question
A(n) ______ is a single Web site that offers many products and services at one Internet location. (Circle the correct answer.) a. Web portal b. cybermall c. e-boutique d. none of the above
answer
b. cybermall
question
Mobile coupons ______. (Circle the correct answer.) a. have a much higher redemption rate than paper coupons b. can be sent to mobile shoppers by numerous mobile coupon aggregators c. can be redeemed by scanning the barcode displayed on a Web-enabled cell phone d. all of the above
answer
d. all of the above
question
Conversion to an e-commerce or m-commerce system enables an organization to ______. (Circle the correct answer.) a. more easily implement ERP systems b. increase the accuracy of order processing and order fulfillment c. increase the prices of its goods and services d. all of the above
answer
b. increase the accuracy of order processing and order fulfillment
question
Poor Web site performance frequently leads to ______. (Circle the correct answer.) a. inadequate customer service b. lost orders c. abandonment of e-commerce Web sites d. all of the above
answer
c. abandonment of e-commerce Web sites
question
Authentication technologies are used by many organizations to ______. (Circle the correct answer.) a. verify the accuracy of their product descriptions and prices b. verify the ship to address of their online customers c. confirm the URL of their suppliers' Web sites d. confirm the identity of the user requesting access to information or assets
answer
d. confirm the identity of the user requesting access to information or assets
question
Amazon ______. (Circle the correct answer.) a. was immediately profitable since the year it was founded b. never has become fully profitable c. was not profitable until more than seven years after its start-up d. none of the above
answer
c. was not profitable until more than seven years after its start-up
question
The number of U.S. mobile Web sites over the next few years is expected to ______. (Circle the correct answer.) a. stay about the same b. grow slightly c. shrink slightly d. grow rapidly
answer
d. grow rapidly
question
______ refers to the use of any of several technologies to enforce policies for controlling access to digital media. (Circle the correct answer.) a. Copyright protection b. Patent Protection c. Digital rights management d. Intellectual property protection
answer
c. Digital rights management
question
Based on the Supreme Court ruling in Quill Corp vs. North Dakota, Internet-based merchants need to apply sales tax only when ______. (Circle the correct answer.) a. the sale price exceeds $100.00 b. items are purchased through a C2C Web site c. buyers purchase certain enumerated items d. buyers live in a state where the merchant has physical facilities
answer
d. buyers live in a state where the merchant has physical facilities
question
A(n) ______ is a business that serves as an intermediary between your Web site and online merchants who have the actual products and retail expertise. (Circle the correct answer.) a. cybermall b. storefront broker c. electronic exchange d. none of the above
answer
b. storefront broker
question
The Wireless Application Protocol ______. (Circle the correct answer.) a. provides secure, encrypted, wireless communications b. serves as a Web browser on handheld, wireless devices c. is an alternative to PCI d. none of the above
answer
b. serves as a Web browser on handheld, wireless devices
question
________________________ is the conducting of business activities electronically over computer networks.
answer
E-Commerce
question
____________________________________________ (acronym OK!) is a subset of e-commerce where all the participants are organizations.
answer
B2B
question
ICANN created a __________________ domain to help attract mobile users to the Web
answer
mobi
question
Mobile ad impressions are generally bought at a cost per thousand, cost per click, or cost per ____________________.
answer
action
question
The amount of storage capacity and computing power required of the e-commerce Web server depends on two things: the software that must run on the server and the _______________________ of transactions that must be processed
answer
Volume
question
________________________ certificates are used to ensure that e-commerce transactions are made between the intended parties.
answer
Digital
question
Both purchaser and supplier identities are guaranteed by a third party organization called a(n)
answer
CA
question
With the Secure Sockets Layer (SSL) communication protocol, the data is always ________________________ ensuring that your transactions are not subject to interception.
answer
encrypted
question
All credit card customers are protected from paying more than ____________________ ____________________ for fraudulent transactions
answer
$50
question
When paying by cell phone, the payments can be linked to your bank account or added to your ____________________ ____________________.
answer
Credit Card
question
The five stages of B2B and B2C e-commerce include: 1) search and identify, 2) select and negotiate, 3) purchase, 4) ________________________ _____________________ ________________________ ________________________, and 5) after-sales service.
answer
Product and Service Delivery
question
________________________ ______________________ occurs when someone uses your personal identifying information to commit fraud or other crimes
answer
Identity Theft
question
MRO purchases can often approach ________________________ percent of a manufacturing company's total revenue.
answer
40
question
The main measures of mobile advertising are the number of users reached, the click through rate, and the number of ________________________ users take.
answer
actions
question
Through m-commerce, companies can reach individual consumers to establish ____________________________________ marketing relationships and communicate whenever it is convenient
answer
One to One
question
Transaction processing systems support the capture and processing of detailed data necessary to update the fundamental business operations of the organization.
answer
True
question
With an OLTP system, each transaction is accumulated over a period of time and prepared for processing in a large batch of similar transactions.
answer
True
question
For an organization implementing an ERP system, there is a major amount of effort required to load existing data from various sources into the new ERP database
answer
True
question
Data mapping is the examination of each data item required for a new ERP system and determining the number of bytes required for data storage.
answer
False
question
Financial accounting consists of capturing and recording all the transactions that affect a company's financial state and then using these documented transactions to prepare financial statements to external decision makers.
answer
True
question
Customer relationship management software helps plan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers
answer
False
question
Fortunately, disparities in IS infrastructure is not one of the international issues associated with the use of enterprise systems.
answer
False
question
TPS often perform activities related to customer contacts and thus play a critical role in providing value to the customer.
answer
True
question
An important step in processing transaction data is to check data for validity and completeness, a task called data correction.
answer
False
question
Two key benefits gained from successful implementation of an ERP system include gaining improved access to data for operational decision making and improved work processes.
answer
True
question
The individual application modules of an ERP system are designed to support best practices, the most efficient ways to complete a business process.
answer
True
question
SMEs are too small to achieve substantial business benefits from the implementation of an ERP system.
answer
False
question
The "bill of materials" (BOM) is a sort of roadmap that shows each step in the manufacturing process.
answer
False
question
Sales ordering is the set of activities associated with all purchasing needed to support the sales functions including promotions, advertising, and marketing
answer
False
question
Customer support, sales management, and contact management are key features of a supply chain management system
answer
False
question
With ______, business transactions are accumulated over a period of time for processing in a single unit. (Circle the correct answer.) a. online transaction processing b. real-time transaction processing c. batch processing d. enterprise resource processing
answer
c. batch processing
question
The process used by leading companies to complete a business process in the most efficient and effective manner are called ______. (Circle the correct answer.) a. best practices b. streamlined processes c. current best approach d. none of the above
answer
a. best practices
question
In an order processing system, a(n) ______ is printed at the warehouse from which the order is to filled so that workers can correctly fill the order. (Circle the correct answer.) a. pick list b. customer order c. invoice d. receiving report
answer
a. pick list
question
A key feature on an enterprise resource planning system is that ______. (Circle the correct answer.) a. all transactions are processed in online transaction processing mode b. it employs a database of key operational and planning information that can be shared by all c. it is fully integrated with all of the organization's e-commerce systems d. all of the above
answer
b. it employs a database of key operational and planning information that can be shared by all
question
The number and types of data items that must be loaded into a new ERP system depend on the ______ of the ERP implementation. (Circle the correct answer. a. scope b. schedule c. cost d. none of the above
answer
a. scope
question
Many SMEs elect to implement ______ ERP systems. (Circle the correct answer.) a. proprietary b. in-house developed c. custom coded d. open source
answer
d. open source
question
Purchasing uses the information from the ______ to place purchase orders for raw materials. (Circle the correct answer.) a. sales and operations plan b. detailed scheduling plan c. materials requirement plan d. none of the above
answer
c. materials requirement plan
question
One of the functional units likely to benefit from use of a customer relationship management system is ______. (Circle the correct answer.) a. Market research b. Product development c. Quality control d. All of the above
answer
a. Market research
question
Organizations expect their ______ to ensure that data is processed accurately and completely, avoid processing fraudulent transactions, and reduce clerical and other labor requirements. (Circle the correct answer.) a. batch processing systems b. transaction processing systems c. online processing systems d. purchasing processing systems
answer
b. transaction processing systems
question
Integrated information transaction processing system solutions for SMEs ______. (Circle the correct answer.) a. are difficult to install and operate b. have a high cost of total ownership c. typically cost a few hundred to a few thousand dollars d. none of the above
answer
c. typically cost a few hundred to a few thousand dollars
question
During the implementation of an ERP system, it is a good idea to _____. (Circle the correct answer.) a. keep the scope of the implementation fluid so changes can be easily incorporated b. minimize the time and dollars spent on training end users c. not require the full-time involvement of a business executive d. define metrics to assess the progress of the project
answer
d. define metrics to assess the progress of the project
question
______ includes the planning, execution, and control of all activities involved in raw material sourcing and procurement, conversions of raw materials to finished products, and the warehousing and delivery of finished product to customers. (Circle the correct answer.) a. Enterprise resource planning b. Supply chain management c. Customer relationship management d. Materials requirement planning
answer
b. Supply chain management
question
Retailers as well as manufacturers use ______ to match production to consumer demand and to allocate products to stores. (Circle the correct answer.) a. production planning b. demand forecasting c. inventory control d. sales forecasting
answer
b. demand forecasting
question
Many business application software vendors are pushing the use of the ______ for SME to help them acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs. (Circle the correct answer.) a. open source code b. ERP systems c. hosted software model d. CRM
answer
c. hosted software model
question
______ are among the challenges that must be met by an enterprise system of a multinational company. (Circle the correct answer.) a. Different languages and cultures b. Disparities in IS infrastructure c. Varying laws and customs rules d. All of the above
answer
d. All of the above
question
The systematic process for developing a production plan for a manufacturing organization starts with ____________________ ____________________________ to develop an estimate of future customer demand.
answer
Sales Forecasting
question
The recording of a sale and the creation of an accounts receivable entry indicating that a customer owes money for goods received is an example of _______________________ accounting.
answer
Financial
question
The objective of a CRM system is to capture data about every ____________________ a company has with a customer through every channel and store it
answer
Contact
question
Transaction processing systems typically involve the processing of _________________ input and output than MIS systems
answer
more
question
Many organizations have limited ________________________ among its TPS systems which requires that data into to one TPS must be printed out and manually reentered into other systems. (Fill-in-the-blank.)
answer
Integration
question
Data ________________________ ensures the validity and completeness of input data. (Fill-in-the-blank.)
answer
editing
question
Trade ____________________ rules are international laws that set practices for two or more nations' commercial transactions. (Fill-in-the-blank.)
answer
custom
question
Some countries have passed laws limiting the __________________________ flow of data linked to individuals.
answer
transborder
question
There are many software vendors who offer ________________________ versions of their ERP or CRM software at a low monthly rental rate.
answer
hosted
question
Moving from a culture of simply selling products to one of placing the _______________ first is essential to a successful CRM deployment.
answer
Customer
question
Transaction processing systems use a large amount of input and output data to update the official ____________________ of the company about orders, sales, customers, and so on.
answer
records
question
At any time, the data in an online system reflects the ______________________ status
answer
current
question
The transaction processing cycle includes data collection, data editing, data correction, data storage, and ________________________ ________________________.
answer
document production
question
A(n) ______________________ ______________________ is a set of coordinated and related activities that takes one or more types of input and creates an output of value to the customer of that process.
answer
business process
question
When loading data into a new ERP system, ________________ __________________ is required because legacy systems are likely to contain data that is inaccurate, incomplete, or inconsistent. (Fill-in-the-blank.)
answer
Data Cleanup
question
The ultimate goal of management information and decision support systems is to help managers at the highest level in the organization make automated decisions with little or no effort. (Circle the correct answer.)
answer
False
question
Heuristics, also known as "rules of thumb," are commonly accepted guidelines or procedures that usually find a good solution. (Circle the correct answer.)
answer
True
question
An MIS provides managers and decision makers with information to help achieve organizational goals. (Circle the correct answer.)
answer
True
question
A key indicator report summarizes the previous day's critical activities and is typically available at the beginning of each workday. (Circle the correct answer.)
answer
True
question
Demand reports are produced on a regular schedule, the same time each day, week, or month. (Circle the correct answer
answer
False
question
An MIS can be divided along functional lines to produce reports tailored to individual functions.
answer
True
question
Cost centers are units within the company that do not directly generate income. (Circle the correct answer.)
answer
True
question
The use of computerized systems is emphasized at all levels of manufacturing-from the shop floor to the executive suite. (Circle the correct answer.)
answer
True
question
CAD is used in the development and design of complex structures and products. (Circle the correct answer.)
answer
True
question
The economic order quantity is calculated to minimize the number of times an inventory item must be reordered. (Circle the correct answer.)
answer
false
question
A marketing MIS supports managerial activities in product development, distribution, pricing, promotions, and sales. (Circle the correct answer.)
answer
True
question
Traditionally, executives simply added a profit margin to total costs to set prices and guarantee a decent profit. (Circle the correct answer.)
answer
True
question
Computerized sales analysis is important to identify products, sales personnel, and customers that contribute to profits and those that do not.
answer
True
question
A decision support system includes people, procedures, software, databases, and devices to help assemble, store, manipulate, and display geographic information
answer
False
question
The Delphi approach is a group decision making approach that encourages diversity among group members and fosters creativity and original thinking in decision making. (Circle the correct answer.)
answer
True
question
A typical DSS includes many components including the ______ which allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases. (Circle the correct answer.) a. model base b. dialogue manager c. database d. external database access
answer
b. dialogue manager
question
The ______ is not a component of the typical DSS? (Circle the correct answer.) a. inference engine b. user interface c. model base d. database
answer
a. inference engine
question
______ is a common characteristic of an executive support system. (Circle the correct answer.) a. Tailored for use by individual executives b. Provide drill-down capabilities c. Can be used in situations with a high degree of uncertainty d. All of the above
answer
d. All of the above
question
The first stage in the problem solving process during which one identifies and defines potential problems or opportunities is the ______ stage. (Circle the correct answer.) a. design b. choice c. intelligence d. monitoring
answer
c. intelligence
question
During the ______ stage of the problem solving process, you develop alternative solutions to the problem and evaluate their feasibility. (Circle the correct answer.) a. intelligence b. implementation c. choice d. design
answer
d. design
question
The most significant internal data sources for an MIS are the organization's ______. (Circle the correct answer.) a. various DSS and GSS systems and users b. Internet Web sites c. various TPS and ERP systems and related databases d. data from customers, suppliers, competitors, and stockholders
answer
c. various TPS and ERP systems and related databases
question
The ______ report summarizes the previous day's critical activities and is typically available at the start of each workday. (Circle the correct answer.) a. demand b. drill-down c. exception d. key-indicator
answer
d. key-indicator
question
The ability to ______ is a characteristic of a financial MIS. (Circle the correct answer.) a. integrate financial and operational information from multiple sources, including the Internet b. provide easy access to financial data through use of a corporate intranet to access corporate Web pages c. enable analysis of financial data along multiple dimensions d. all of the above
answer
d. all of the above
question
The ______ MIS subsystems and outputs are used to monitor and control the flow of materials, products, and services through the organization. (Circle the correct answer.) a. financial b. manufacturing c. human resources d. marketing
answer
b. manufacturing
question
A(n) ______ is an approach that allows manufacturing facilities to rapidly and efficiently change from making one product to another. (Circle the correct answer.) a. just in time b. Computer Integrated Manufacturing c. flexible manufacturing system d. all of the above
answer
c. flexible manufacturing system
question
Subsystems for the marketing MIS include ______. (Circle the correct answer.) a. product development b. inventory control c. use and management of funds d. all of the above
answer
a. product development
question
The focus of a DSS is on decision-making ______ when faced with unstructured or semistructured business problems. (Circle the correct answer.) a. accuracy b. efficiency c. effectiveness d. timeliness
answer
c. effectiveness
question
One characteristic of a structured problem is that ______. (Circle the correct answer.) a. it is straightforward, requiring known facts and relationships b. the relationships among the pieces of data are not always clear c. the data might be difficult to manipulate or obtain d. the decision maker might not know the information requirements of the decision in advance
answer
a. it is straightforward, requiring known facts and relationships
question
A(n) ______ normally is used with structured problems and usually emphasizes information only. (Circle the correct answer.) a. DSS b. GSS c. MIS d. GIS
answer
c. MIS
question
The ____ system provides for the gathering of anonymous input, allows for the exchange of information and expertise among people without direct face-to-face interaction, and support many difference decision-making approaches. (Circle the correct answer.) a. DSS b. GSS c. GIS d. MIS
answer
b. GSS
question
A(n) ______________________ ______________________ _____________________ is a computer system capable of assembling, storing, manipulating, and displaying data identified according to its location. (Fill-in-the-blank.)
answer
Geographic information system
question
______________________________ decisions deal with unusual or exceptional situations. (Fill-in-the-blank.)
answer
Nonprogrammed
question
The final stage of the problem-solving process during which decision makers evaluate the implementation is called the ________________________ stage.
answer
monitoring
question
In general, computerized decision support systems can either optimize or ________________________. (Fill-in-the-blank.)
answer
satisfice
question
A limit on the number of available work hours in a manufacturing facility is an example of a problem ________________________.
answer
constraint
question
The output of most MIS systems is a collection of ________________________ that are distributed to managers.
answer
reports
question
____________________________ reports are produced periodically, such as daily, weekly, or monthly. (Fill-in-the-blank.)
answer
Scheduled
question
____________________________ reports are reports that are automatically produced when a situation is unusual or requires management action
answer
Exception
question
A(n) ________________________ ________________________ is any organizational unit that focuses on generating a profit for the firm. (Fill-in-the-blank.)
answer
Profit center
question
A manufacturing or architectural firm uses __________________________________ ________________________ software to develop a digital blueprint of its products prior to building them. (Fill-in-the-blank.)
answer
CAD
question
Corporate marketing departments use ________________ _______________________ sites such as Second Life to advertise their products and perform market research.
answer
Social Networking
question
______________________________ ratings show how ads convert to sales. (Fill-in-the-blank.)
answer
Engagement
question
A(n) _____________________________ MIS performs a number of important activities, providing aggregate information on accounts payable, accounts receivable, payroll, and many other applications. (Fill-in-the-blank.)
answer
accounting
question
A(n) ____________________________ DSS handles situations or decisions that occur more than once, usually several times per year or more. (Fill-in-the-blank.)
answer
institutional
question
In the ________________________________ decision making approach, members of a group offer suggestions "off the top of their heads."
answer
Brainstorming
question
Many organizations actively attempt to convert tacit knowledge to explicit knowledge. (Circle the correct answer.)
answer
True
question
Secretaries, administrative assistants, bookkeepers, and similar data-entry people are often called data workers. (Circle the correct answer.)
answer
True
question
Data mining and business intelligence are seldom used to capture the knowledge stored in a knowledge management system. (Circle the correct answer.)
answer
False
question
Although computers excel at numerical calculations, they are even better at dealing with symbols and three-dimensional objects. (Circle the correct answer.)
answer
False
question
A perceptive system allows a machine to approximate the way a person sees, hears, and feels objects. (Circle the correct answer.)
answer
True
question
Research is ongoing to directly connect the human brain and have human thought control computer activities. (Circle the correct answer.)
answer
True
question
Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence. (Circle the correct answer.
answer
True
question
Research is ongoing to develop a robotic suit to help paraplegics and stroke victims move so they can perform basic functions. (Circle the correct answer.)
answer
True
question
Neugents are neural intelligence agents that "learn" patterns and behaviors and predict what will happen next. (Circle the correct answer.)
answer
True
question
Reinforcement learning is a learning system involving sequential decisions with learning taking place in between each decision. (Circle the correct answer.)
answer
True
question
A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic. (Circle the correct answer.)
answer
False
question
An expert system, using the knowledge acquisition facility, can indicate all the facts and rules that were used in reaching the conclusion. (Circle the correct answer.)
answer
False
question
The user interface makes an expert system easier to both develop and use. (Circle the correct answer.)
answer
True
question
Analog and older digital formats need not be converted into a newer digital format before they can be edited and processed by today's multimedia software. (Circle the correct answer.)
answer
false
question
One limitation of virtual reality systems is that they enable just one user at a time to move and react in a computer simulated environment.
answer
False
question
______ knowledge is hard to measure and document and typically is not objective or formalized. (Circle the correct answer.) a. Tacit b. Explicit c. Implicit d. Shared
answer
a. Tacit
question
After knowledge is created, it is typically stored in a ______. (Circle the correct answer.) a. data warehouse b. knowledge repository c. traditional data database d. All of the above
answer
b. knowledge repository
question
For many businesses, robots are used to do the three Ds, dull, dirty, and ______. (Circle the correct answer.) a. dingy b. dynamic c. dangerous d. devastating
answer
c. dangerous
question
______ can process many pieces of data at the same time and learn to recognize patterns. (Circle the correct answer.) a. Voice recognition systems b. Neural networks c. Learning systems d. Natural language processing systems
answer
b. Neural networks
question
The ______ is NOT a key component of an expert system. (Circle the correct answer.) a. explanation facility b. user interface c. knowledge base acquisition facility d. data warehouse
answer
d. data warehouse
question
The ______ stores all relevant information, data, rules, cases, and relationships that the expert system uses. (Circle the correct answer.) a. data warehouse b. inference engine c. inference engine d. knowledge base
answer
d. knowledge base
question
In an expert system, the ______ is the component that delivers the expert advice. (Circle the correct answer.) a. explanation facility b. knowledge acquisition facility c. user interface d. inference engine
answer
d. inference engine
question
The expert system knowledge acquisition facility serves as an interface between ______. (Circle the correct answer.) a. the end users and inference engine b. the system developers and explanation facility c. the decision makers and the knowledge base d. experts and knowledge base
answer
d. experts and knowledge base
question
The ______ is the person or group with the expertise or knowledge the expert is trying to capture. (Circle the correct answer.) a. knowledge engineer b. knowledge user c. domain expert d. system developer
answer
c. domain expert
question
______ were early programming languages developed for and used in artificial intelligence applications. (Circle the correct answer.) a. FORTRAN and Pascal b. LISP and PROLOG c. Pascal and PROLOG d. COBOL and FORTRAN
answer
b. LISP and PROLOG
question
Graphic images can be stored in a variety of formats including ______. (Circle the correct answer.) a. MP3 and MPEG b. JPEG and GIF c. ISDB and DVB d. None of the above
answer
b. JPEG and GIF
question
______ is a file conversion program that can be used to compress multimedia files to make them easier to download from the Internet or send as an e-mail attachment. (Circle the correct answer.) a. Apple Quick Time b. CorelDraw c. Grass Valley d. WinZip
answer
d. WinZip
question
______ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help you locate your position. (Circle the correct answer.) a. Immersive virtual reality b. Augmented reality c. Telepresence d. Location reality
answer
b. Augmented reality
question
Special purpose systems that help overcome disabilities or improve health are called ______. (Circle the correct answer.) a. health systems b. assistive technology c. forensics software d. none of the above
answer
b. assistive technology
question
______ involves the use of information systems to develop competitive strategies for people, organizations, or even countries. (Circle the correct answer.) a. Informatics b. Game theory c. Assistive technology d. All of the above
answer
b. Game theory
question
___________________ knowledge is objective and can be measured and documented. (Fill-in-the-blank.)
answer
Explicit
question
Some organizations and professions use _____________________________ of _______________________ to create, store, and share knowledge.
answer
Communities of Practice
question
Using a knowledge management system begins with locating the organization's knowledge often using a _______________________ ___________________ that points the knowledge worker to the needed knowledge.
answer
Knowledge Map
question
John McCarthy proposed the use of the term ___________________________ _____________________________ to describe computers with the ability to mimic or duplicate the functions of the human brain
answer
artificial intelligence
question
The ability to learn from experiences and apply knowledge acquired from those experiences, handle complex situations, solve problems when important information is missing, be creative and imaginative is considered to be _______________________ _______________________. (Fill-in-the-blank.)
answer
intelligent behavior
question
For some decisions, people use _______________________ which are rules of thumb arising from experience. (Fill-in-the-blank.)
answer
heuristics
question
A(n) ___________________ system consists of hardware and software that stores knowledge and makes inferences, similar to those of a human expert.
answer
expert
question
_______________________ programming is a process where the computer makes a decision, analyzes the results, and then makes a better decision based on the analysis
answer
dynamic
question
___________________ are conditional statements that link conditions to actions or outcomes; in many instances, they are stored as IF-THEN statements.
answer
Rules
question
An expert system ___________________ is a collection of software packages and tools used to design, develop, implement, and maintain expert systems.
answer
shell
question
___________________________ is text, graphics, video, animation, audio, and other media that can be used to help an organization efficiently and effectively achieve its goals. (Fill-in-the-blank.)
answer
Multimedia
question
When audio files are being played while being downloaded from the Internet, it is called _______________________ audio.
answer
streaming
question
With _______________________ virtual reality, the user becomes fully immersed in an artificial, 3D world that is completely generated by the computer. (Fill-in-the-blank.)
answer
immersive
question
_______________________________ systems immerse a user in a real world that is captured by video cameras at a distant locations and allow for remote manipulation of real objects by robot arms and manipulators
answer
Telepresence
question
CGI or ___________________________________ ____________________ technology is used to bring realism to the movie screen. (Fill-in-the-blank.)
answer
Virtual Reality
question
The systems development team accepts a given set of information system objectives and delivers a system that meets those objectives
answer
false
question
An individual systems developer is a person that performs all of the system development roles, including systems analyst, programmer, and technical specialist
answer
true
question
Information systems planning transforms organizational goals outlined in the strategic plan into specific system development activities.
answer
true
question
In general, smaller projects have a higher probability of success than larger projects.
answer
true
question
Proper planning can guarantee that projects will not fall behind schedule, go over budget, or not meet expectations.
answer
false
question
The capability maturity model is a measure of the maturity of the software development process in an organization.
answer
true
question
Computer-aided software engineering (CASE) tools are used to plan and schedule a software project.
answer
false
question
Technical feasibility is an assessment of the technical, economic, legal, operational, and schedule feasibility of a project.
answer
fasle
question
The primary outcome of systems investigation is a systems investigation report, also called a feasibility report.
answer
true
question
Data about the problems or needs for the new system can come from both sources internal and external to the organization.
answer
true
question
The overall purpose of requirements analysis is to determine user, stakeholder, and organizational needs.
answer
true
question
Once the new system development process has begun, management cannot call a stop to the effort.
answer
false
question
Because information systems support other business activities, IS staff and people in other departments need to understand each other's responsibilities and tasks.
answer
true
question
The sooner an error is detected in the systems development life cycle, the more expensive it is to correct.
answer
false
question
Continuous improvement projects do not require a lot of changes or retraining of people; thus, they have a higher degree of success than reengineering projects.
answer
true
question
A professional who specializes in analyzing and designing business systems is called a(n) ______. (Circle the correct answer.) a. programmer b. stakeholder c. end user d. systems analyst
answer
d. systems analyst
question
During the ______ phase of the system development process, potential problems and opportunities are identified and considered in light of the goals of the business. (Circle the correct answer.) a. systems design b. systems analysis c. systems investigation d. systems implementation
answer
c. systems investigation
question
During the ______ phase of the systems development life cycle, people attempt to answer the questions "What must the information system do to solve the problem?" (Circle the correct answer.) a. systems investigation b. systems implementation c. systems design d. systems analysis
answer
d. systems analysis
question
The training of end users is an important task in the ______ phase of a systems development project. (Circle the correct answer.) a. systems design b. systems maintenance and review c. systems implementation d. None of the above
answer
c. systems implementation
question
The ______ system development approach requires cooperation and frequent face-to-face meetings with all project participants as they modify, refine, and test how the system meets users' needs and what its capabilities are. (Circle the correct answer.) a. prototyping b. agile development c. extreme programming d. None of the above
answer
b. agile development
question
______ is likely to affect the quality of the systems development effort. (Circle the correct answer.) a. the degree of change associated with the project b. whether the project is a continuous change effort or a reengineering effort c. the ability to manage change associated with the project d. All of the above
answer
d. All of the above
question
The second level in the capability maturity model is ______. (Circle the correct answer.) a. repeatable b. optimized c. defined d. managed
answer
a. repeatable
question
Activities on the critical path of a project have ______ slack time. (Circle the correct answer.) a. infinite b. maximum c. minimum d. zero
answer
d. zero
question
______ is an assessment of whether the hardware, software, and other system components can be acquired or developed to solve the problem. (Circle the correct answer.) a. Systems investigation b. Feasibility analysis c. Technical feasibility d. None of the above
answer
c. Technical feasibility
question
______ determines whether the project can be completed in a reasonable amount of time. (Circle the correct answer.) a. Economic feasibility b. Legal feasibility c. Operational feasibility d. Schedule feasibility
answer
d. Schedule feasibility
question
Entity-relationship diagrams are used to perform ______. (Circle the correct answer.) a. data modeling b. process modeling c. problem analysis d. activity analysis
answer
a. data modeling
question
Data flow diagrams ______. (Circle the correct answer.) a. are used to model data entities and their relationships b. are quite complicated and seldom used or understood by nontechnical people c. describe the activities that accomplish a business task d. All of the above
answer
c. describe the activities that accomplish a business task
question
The system analysis concludes with a formal system analysis report that includes ______. (Circle the correct answer.) a. identification of the strengths and weaknesses of the existing system b. functional requirements for the new system c. organizational requirements for the new system d. All of the above
answer
d. All of the above
question
______ requires unbiased and careful questioning of whether system elements are related in the most effective ways. (Circle the correct answer.) a. Critical analysis b. Creative analysis c. Causal analysis d. Data flow analysis
answer
a. Critical analysis
question
______ is an effective way to reduce risk and protect an organization's critical data resources. (Circle the correct answer.) a. Secure any off-site IS facilities b. Control access to critical data c. Encrypt data and files d. All of the above
answer
a. Secure any off-site IS facilities
question
Like an architect developing blueprints for a new building, a(n) ___________________ ___________________ develops detailed plans for the new or modified system.
answer
system analyst
question
Like a contractor constructing a new building or renovating an existing one, the _______________________ takes the plans developed by others and builds or modifies the necessary software.
answer
programmer
question
___________________ on _______________________________ is a key metric for technology initiatives, and the business case needs to include both initial development costs and subsequent maintenance costs
answer
Return Investment
question
The highest level of the capability maturity level is _______________________.
answer
optimized
question
The project _______________________ is the date the entire project is to be complete and operational.
answer
deadline
question
___________________ ___________________ is the amount of time a project activity can be delayed without delaying the entire project.
answer
slack time
question
The ___________________ ___________________ consists of all activities that, if delayed, would delay the entire project
answer
critical path
question
A formalized approach called _____________________ _____________________ and ___________________ ___________________ creates three time estimates for each project activity.
answer
program evaluation review technique PERT
question
A(n) ___________________ ___________________ is a grid that lists activities and deadlines.
answer
Gantt chart
question
Object-oriented programming languages are designed to allow the programmer to create ___________________ of objects in the computer system that correspond to the objects in the actual business process.
answer
classes
question
________________________ ________________________ determines whether the project makes financial sense and whether predicted benefits offset the cost and time needed to obtain them.
answer
economic feasibility
question
___________________ ___________________ involves an analysis of existing and future laws to determine the likelihood of legal action against the systems development project and possible consequences.
answer
legal feasibility
question
The use case diagram is part of the ____________________ ____________________ language that is used in object-oriented development.
answer
unified modeling
question
Interviews, direct observation, and questionnaires are tools and techniques used in data _______________________.
answer
collection
question
_______________________ analysis involves investigating new approaches to existing problems.
answer
creative
question
Developing new systems in an environmentally sensitive way is becoming less and less an important consideration.
answer
false
question
Vendor proposals are typically evaluated in a two-phase process that includes a preliminary evaluation and a final evaluation
answer
true
question
The system specifications are documented in a design report, which is the primary result of systems investigation.
answer
false
question
Programming and software acquisition, user preparation, and site and data preparation are all part of the system design process.
answer
false
question
A parallel start-up involves running the new system for one group of users while the rest of the users still run the old system.
answer
false
question
Two advantages of cloud computing are improved security and increased availability of critical applications.
answer
true
question
Security is not an important consideration of logical design but comes later in the systems development process
answer
False
question
During physical design, the characteristics of the hardware, software, database, telecommunications, personnel, and procedure and control specifications must be detailed.
answer
true
question
When a database fails, failover automatically switches applications and other programs that use the database to a redundant or replicated database so these is no interruption of service.
answer
true
question
Leasing of computer hardware has the advantage over purchasing in that there is no initial investment of funds and no risk of equipment obsolescence.
answer
true
question
Most application software for organizations is developed using internal resources instead of being purchased.
answer
False
question
The Windows Server operating system provides virtualization tools that allow multiple operating systems to run on a single server.
answer
true
question
Data preparation may involve the conversion of old data files into a format that can be used by the new system.
answer
true
question
During the testing phase, if the system testing is completed successfully, no further testing is needed.
answer
false
question
During unit testing, each program is tested with abnormal data to determine how it will handle problems
answer
true
question
The purpose of system design is to answer the question ______. (Circle the correct answer.) a. "How will the information system solve a problem?" b. "What must the information system do to solve the problem? c. "When can the new system be operational?" d. None of the above.
answer
a. "How will the information system solve a problem?"
question
The first of the systems implementation tasks is ______. (Circle the correct answer.) a. user acceptance b. site preparation c. testing d. hardware acquisition
answer
d. hardware acquisition
question
The process of physically placing the computer equipment on the site and making it operational is called ______. (Circle the correct answer.) a. site preparation b. user acceptance c. installation d. start-up
answer
c. installation
question
______ is an evaluation approach that compares systems operating under the same conditions. (Circle the correct answer.) a. Cost/benefit analysis b. Benchmark test c. Point evaluation system d. Group consensus
answer
b. Benchmark test
question
A good contract for new computer equipment should include ______. (Circle the correct answer.) a. a dispute resolution process if something goes wrong b. ownership and property rights of the new or modified system c. contingency provisions in case something does not work as expected d. All of the above.
answer
d. All of the above.
question
From the purchaser's perspective, a vendor's standard contract for purchase of new computer hardware or software _______. (Circle the correct answer.) a. is preferred over developing a custom contract b. should not include any vendor penalty clauses c. should include details from the RFP specifying what is expected from the vendor d. All of the above.
answer
c. should include details from the RFP specifying what is expected from the vendor
question
Virtualization ______. (Circle the correct answer.) a. introduces important implementation considerations including security and backup procedures b. lead to increases in power consumption c. increases hardware space requirements d. All of the above.
answer
a. introduces important implementation considerations including security and backup procedures
question
Called "on demand" computing, this approach requires an organization to ______. (Circle the correct answer.) a. pay the service provider periodically as requested by the provider b. pay only for the computer power it uses c. request the service provider for services well in advance of needing them d. None of the above.
answer
b. pay only for the computer power it uses
question
Site preparation can include ______. (Circle the correct answer.) a. the hiring and training of IS personnel b. readying users for the new system c. installing special wiring and air conditioning d. physically placing the computer system on the site and making it operational
answer
c. installing special wiring and air conditioning
question
The testing of all related systems together is called ______. (Circle the correct answer.) a. system testing b. acceptance testing c. volume testing d. integration testing
answer
d. integration testing
question
______ testing involves testing an incomplete or early version of the system. (Circle the correct answer.) a. Beta b. Unit c. Volume d. Alpha
answer
d. Alpha
question
The ______ approach is a form of system start-up that involves running the new system for one group of users, rather than all users. (Circle the correct answer.) a. phase-in b. pilot start-up c. parallel start-up d. direct conversion
answer
b. pilot start-up
question
A legacy system ______. (Circle the correct answer.) a. is an old system that may have been patched or modified repeatedly over time b. is usually easy to modify to add new features c. requires minimal cost to maintain d. closely matches the current needs of the organization
answer
a. is an old system that may have been patched or modified repeatedly over time
question
A slipstream upgrade to a system ______. (Circle the correct answer.) a. requires notifying end users well in advance b. represents a fairly significant change in how the system operates c. can create entirely new bugs d. All of the above
answer
c. can create entirely new bugs
question
A combination of tools needed for programming with a programming language in one integrated package is called ______. (Circle the correct answer.) a. computer-assisted software engineering (CASE) b. cross-platform development package c. an integrated development environment (IDE) d. an object oriented (OO) approach
answer
c. an integrated development environment (IDE)
question
The design of a new system is broken into two phases, ____________________ design and physical design. (Fill-in-the-blank.)
answer
Logical
question
When following the object-oriented design approach, you might want to design the sequence of events for performing some process. The event sequence is also called a(n) ________________________. (Fill-in-the-blank.)
answer
scenario
question
The ____________________ ______________ ____________________ is a document used to communicate an organization's needs for hardware, software, or database systems to one or more vendors. (Fill-in-the-blank.)
answer
Request for Proposal
question
When start-up is finished, the system is fully ____________________________.
answer
operational
question
One system start-up approach, known as ________________________ ____________________________ involves stopping the old system and starting the new system on a given data.
answer
Direct conversion
question
The process of anticipating and planning for disasters is called disaster ________________________.
answer
planning
question
A duplicate, operational hardware system that is ready for use is an example of a ________________ ________________.
answer
hot site
question
Whenever an application is run, an _________________ ________________ is created that contains all changes to all files. (Fill-in-the-blank.)
answer
image log
question
System ________________________ are rules and procedures to maintain data security. (Fill-in-the-blank.)
answer
controls
question
A(n) ______________________________ ______________________ is an evaluation approach that involves expressing all the costs and benefits of a new system in monetary terms. (Fill-in-the-blank.)
answer
cost/benefit Analysis
question
Near the end of the design stage, some organizations prohibit further changes in the design of the system in an approach called __________________________ design specifications. (Fill-in-the-blank.)
answer
Freezing
question
A(n) ____________________ _______________________ ______________________ combines the tools needed for programming with a programming language into one integrated package. (Fill-in-the-blank.)
answer
Integrated Development Environment
question
Acceptance testing involves conducting any additional testing required by the ____________________. (Fill-in-the-blank.)
answer
User
question
The ________________ ________________________ document is a formal agreement the user signs stating that a phase of the installation or the complete system is approved. (Fill-in-the-blank.)
answer
User Acceptance
question
The _________________ software development technique allows programmers to develop programs that can run on computer systems that have different hardware and operating systems. (Fill-in-the-blank.)
answer
cross-platform
question
The CAN-SPAM Act allows the sending of most e-mail spam as long as it adheres to two basic forms of compliance related to how receivers can unsubscribe and the content of the e-mail. (Circle the correct answer.)
answer
false
question
Over one-fourth of office workers spend in excess of 90 minutes per week at work viewing adult pornographic Web sites. (Circle the correct answer.)
answer
true
question
According to the 2009 FBI Internet Crime Report, from 2008 to 2009, there was a decrease in the number of complaints of Internet crime filed with law enforcement officers and a decrease in the total dollar loss from these cases. (Circle the correct answer.)
answer
false
question
The vast majority of computer-related crimes are reported to authorities. (Circle the correct answer.)
answer
false
question
Cyberterrorists are believed to have invaded the U.S. power grid and planted software that could interrupt the system during a time of crises or war. (Circle the correct answer.)
answer
true
question
While a virus can completely halt the operation of a computer system, it is incapable of destroying programs or data. (Circle the correct answer.)
answer
false
question
Deleting the contents of the Recycle Bin makes it impossible for individuals to view the deleted data. (Circle the correct answer.)
answer
false
question
Copyright laws protect processes, machines, and compositions of matter. (Circle the correct answer.)
answer
false
question
It is estimated that the global software piracy exceeded 40% and amounted to more than $50 billion in lost sales. (Circle the correct answer.)
answer
true
question
Fingerprint authentication devices to provide security in the PC environment are sometimes employed rather than passwords. (Circle the correct answer.)
answer
true
question
Unfortunately, many Intrusion Detection Systems frequently provide false alarms that result in wasted effort. (Circle the correct answer.)
answer
true
question
The Identity Theft and Assumption Deterrence Act of 1998 assigns responsibility to the Department of Homeland Security for helping identity theft victims to restore their credit and ease the impact of the imposter.
answer
false
question
To protect your PC and prevent it from spreading malware to your co-workers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.
answer
true
question
Federal law prohibits private employers from monitoring e-mail sent or received by their employees
answer
false
question
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.
answer
false
question
Most companies have implemented stringent policies on the acquisition of computer systems and equipment requiring ______. (Circle the correct answer.) a. a formal justification statement before computer equipment is purchased b. definition of standard computing platforms c. use of preferred vendors for all acquisitions d. All of the above.
answer
d. All of the above.
question
The Leads Online Web-based service system is used by law enforcement to ______. (Circle the correct answer.) a. monitor sex offenders b. provide a quick overview of crime risk at a given address c. recover stolen property d. None of the above.
answer
c. recover stolen property
question
Originally a(n) ______ was a person who enjoyed computer technology and spent time learning and using computer systems. (Circle the correct answer.) a. cracker b. insider c. hacker d. script bunny
answer
c. hacker
question
______ have extra knowledge that make them especially dangerous -- they know logon ids, passwords, and company procedures that help them evade detection. (Circle the correct answer.) a. Crackers b. Hackers c. Insiders d. Script bunnies
answer
c. Insiders
question
A ______ is a set of programs that enables its user to gain administrator level access to a computer or network. (Circle the correct answer.) a. virus b. Trojan horse c. rootkit d. worm
answer
c. rootkit
question
If a court determines that a patent infringement is intentional, it can award up to ______ to the patent holder. (Circle the correct answer.) a. $10 million b. $250,000 per infringement c. three times the amount of damages claimed by the patent holder d. $150,000
answer
c. three times the amount of damages claimed by the patent holder
question
The practice of disguising illegally gained funds so that they seem legal is called ______. (Circle the correct answer.) a. identity theft b. vishing c. spoofing d. money laundering
answer
d. money laundering
question
A useful guideline to protect corporate computers from criminal hackers is to ______. (Circle the correct answer.) a. Install antivirus software on all computers b. Avoid creating frequent backups of critical data c. Remove any firewall that may have been installed between your corporate network and the Internet d. Enable several guest accounts
answer
a. Install antivirus software on all computers
question
The European Union has a data protection directive that requires firms transporting data ______ to have certain privacy procedures in place. (Circle the correct answer.) a. across a network b. between servers c. across national boundaries d. to anyone outside the company
answer
c. across national boundaries
question
. ______ is a screening technology that shields users from sites that do not provide the level of privacy protection they desire. (Circle the correct answer.) a. filtering software b. Platform for Privacy Preferences c. IRCA d. Child Online Protection Act
answer
b. Platform for Privacy Preferences
question
______ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. (Circle the correct answer.) a. Blogging b. Libel c. Slander d. Unfriending
answer
b. Libel
question
The Privacy Act of 1974 ______. (Circle the correct answer.) a. applies only to certain federal agencies b. deals with the protection of communications while in transit from sender to receiver c. requires all financial institutions to protect and secure customers' nonpublic data from unauthorized use or access d. All of the above.
answer
a. applies only to certain federal agencies
question
The ______ prohibits the government from intercepting electronic messages unless it obtains a court order based on probable cause. (Circle the correct answer.) a. Electronic Communications Privacy Act b. Gramm-Leach-Bliley Act c. Freedom of Information Act d. None of the above.
answer
a. Electronic Communications Privacy Act
question
The ______ required all financial service institutions to communicate their data privacy rules and honor customer preferences on sharing of data. (Circle the correct answer.) a. USA Patriot Act b. Freedom of Information Act c. Gramm-Leach-Bliley Act d. None of the above.
answer
c. Gramm-Leach-Bliley Act
question
______ is an aggravation of the pathway for the nerves that travel through the wrist. (Circle the correct answer.) a. Chronic idiopathic mylofibrosis b. Seated immobility thromboembolism c. Carpal tunnel syndrome d. None of the above
answer
c. Carpal tunnel syndrome
question
Spam messages often carry attached files with embedded _______________________ that can cause networks and computers to crash or allow hackers to gain unauthorized access to systems and files.
answer
Viruses
question
Most organizations implement internal ________________________ to measure actual results against established goals, such as percentage of end-user reports produced on time. (Fill-in-the-blank.)
answer
audits
question
When computer criminals talk a critical password out of a person, the practice is called ________________________ ______________________________. (Fill-in-the-blank.)
answer
social engineering
question
A(n) _________________________________ is someone who intimidates or coerces a government or organization to advance his political or social objectives by launching a computer-based attacks. (Fill-in-the-blank.)
answer
cyberterrorist
question
______________________ ____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else. (Fill-in-the-blank.)
answer
identity theft
question
A(n) ________________________ is a modified version of a virus. (Fill-in-the-blank.)
answer
variant
question
Software is considered intellectual property and may be protected by copyright or ________________________ law. (Fill-in-the-blank.)
answer
patent
question
________________________ is the operation of a fake Web site by someone trying to gain access to customer's private information. (Fill-in-the-blank.)
answer
phising
question
Specialized hardware and software, such as __________________________ devices, can be used to encode data and information to help prevent unauthorized use. (Fill-in-the-blank.)
answer
encryption
question
A(n) ____________________ is a person paid by a company about how much they've earned and how easy the get-rich-quick plan was to operate. (Fill-in-the-blank.)
answer
shill
question
A libeled party can file what is known as a __________________ __________________ lawsuit to force the ISP to provide whatever information they have about an anonymous poster. (Fill-in-the-blank.)
answer
John Doe
question
Organizations implement ____________________ software to prevent employees from visiting Web sites not related to work. (Fill-in-the-blank.)
answer
Filtering
question
The hazardous activities associated with unfavorable working conditions are collectively referred to as work ________________________. (Fill-in-the-blank.)
answer
stressors
question
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called _____________________. (Fill-in-the-blank.)
answer
ergonomics
question
______________________ issues deal with what is generally considered right or wrong. (Fill-in-the-blank.)
answer
Ethical