Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CAPP 14122

July 20, 2017
What are unmanned aircraft that can fly autonomously, or without a human?
A. 3D Printing
B. robotics
C. drones
D. RFID
As the president of a local trade company, Kristin is faced with leadership, ethical, and
operational decisions on a daily basis. Kristen's responsibilities include examining the
organizational resource of information and regulating its definitions, uses, value, and
distribution ensuring it has the types of information required to function and grow
effectively. What is Kristin overseeing for the company?
A. information codes
B.information management
C. information deployment
D. information security
Who are those who seek to cause harm to people or to destroy critical systems or
information and use the Internet as a weapon of mass destruction?
A. white-hat hacker
B. black-hat hacker
C. cyberterrorists
D. script bunnies
What spans a large geographic area such as a state, province, or country, similar to the
Internet?
A. metropolitan area network (MAN)
B. local area network (LAN)
C.wide area network (WAN)
D. secure area network (SAN)
When applying Porter's three generic strategies, Tiffany and Co. has a competitive
scope and cost strategy that is __________.
A. broad market " high cost strategy
B. narrow market " low cost strategy
C.narrow market " high cost strategy
D. broad market " low cost strategy
What extracts knowledge from data by performing statistical analysis, data mining, and
advanced analytics on big data to identify trends, market changes, and other relevant
information?
A. big data
B. distributed computing
C. advanced analytics
D. data scientist
Which of the following is a disadvantage of database-stored information?
A. increased flexibility
B. increased performance
C.increased information redundancy
D. increased information integrity
What is a business that operates in a physical store without an Internet presence?
A. brick-and-mortar business
B. click-and-mortar business
C. virtual business
D. pure-play business
Which of the following is an example of a disruptive technology?
A. Oracle's database software
B. Sony's transistor-based consumer electronics (transistor radio)
C. Intel's low-end microprocessor
D. All of these are correct.
What is the logical view of information?
A. deals with the physical storage of information on a storage device such as a hard disk
B. deals with the logical storage of information on a storage device such as a hard disk
C.focuses on how users logically access information to meet their particular business
needs
D. focuses on how users physically access information to meet their particular business
needs
What is inventory turnover?
A. an unfilled customer order for a product that is out of stock
B. the time it takes to manufacture a product and deliver it to the retailer
C. the agreed upon time between the purchase of a product and the delivery of the
product
D.the frequency of inventory replacement
Which domain is reserved for the U.S. military?
A. .mil
B. .gov
C. .org
D. .age
What is consolidation?
A. involves the aggregation of information and features simple roll-ups to complex
groupings of interrelated information
B. the ability to look at information from different perspectives
C. enables users to get details, and details of details, of information
D. finds the inputs necessary to achieve a goal, such as a desired level of output
How would the health care industry use business intelligence?
A. analyze popular vacation locations with current flight listings
B. understand customer credit card usage and nonpayment rates
C.compare the demographics of patients with critical illnesses
D. predict claim amounts and medical coverage costs
Which of the following is one of the four basic options included in a bring your own
device policy?
A. unlimited access for personal devices.
B. access only to nonsensitive systems and datA.
C. access, but preventing local storage of data on personal devices.
D.All of these are correct.
When viewing systems thinking, source documents are the original transaction records.
What would the source documents for a medical doctor's payroll system include?
A. employee time sheets
B. employee benefit reports
C. employee wage rates
D. All of these are correct.
What promotes massive, global, industry-wide applications offered to the general
public?
A. community cloud
B. private cloud
C. utility computing
D.public cloud
What contains the users' actual signatures indicating they approve all of the business
requirements?
A. requirements documentation
B. requirements management
C. requirements definition document
D.sign-off
What is performance?
A. a system that is not operating and cannot be used
B. refers to the ability of an application to operate on different devices or software
platforms, such as different operating systems
C.measures how quickly a system performs a process or transaction
D. the degree to which a system is easy to learn and efficient and satisfying to use
What is a space station that orbits the Earth receiving and transmitting signals from
Earth-based stations over a wide area?
A. GPS
B.satellite
C. GIS
D. LBS
Francis works in the human resources division of a large oil and gas company in Texas.
Francis's tasks include maintaining payroll and vacation records, employment histories,
and benefit information along with ensuring the security of all sensitive employee
information. Which MIS infrastructure is most important to Francis?
A.information MIS infrastructure
B. agile MIS infrastructure
C. sustainable MIS infrastructure
D. virtualized MIS infrastructure
What is the term that is similar to taxonomy except that crowdsourcing determines the
tag or keyword-based classification system?
A. podcasting
B. network effects
C. folksonomy
D. social bookmarking
What is voice over LTE (VoLTE)?
A.allows mobile voice calls to be made over broadband networks, creatingunder the
right network conditionsclearer audio and fewer dropped calls
B. the practice of tagging pavement with codes displaying where Wi-Fi access is
available
C. deliberately searching for Wi-Fi signals while driving by in a vehicle
D. remotely controls smart phones and tablets, ensuring data security
What is business intelligence?
A. raw facts that describe the characteristics of an event or object
B. data converted into a meaningful and useful context
C.information collected from multiple sources that analyzes patterns, trends, and
relationships for strategic decision making
D. skills, experience, and expertise, coupled with information and intelligence, which
creates a person's intellectual resources
Which gate is construction?
A. gate one
B. gate two
C. gate three
D. gate four
What performs all arithmetic operations (for example, addition and subtraction) and all
logic operations?
A. CPU
B. control unit
C. ALU
D. primary storage
What guides users through marketing campaigns performing such tasks as campaign
definition, planning, scheduling, segmentation, and success analysis?
A.campaign management system
B. cross-selling
C. up-selling
D. list generator
What is a computer network that relies on the computing power and bandwidth of the
participants in the network rather than a centralized server?
A.peer-to-peer (P2P)
B. voice over IP (VoIP)
C. Internet protocol TV (IPTV)
D. All of these are correct.
Which of the following refers to the extent of detail within the information?
A. knowledge information
B.information granularity
C. chance information
D. information analytics
One of the most famous examples of wiki vandalism occurred when a false biography
entry read that ________.
A. Michael Jackson and Madonna were siblings
B. JFK and Robert Kennedy were the same person
C. John Seigenthaler Sr., assistant to Attorney General Robert F. Kennedy in the early
1960s, was involved in the assassinations of both Kennedy and his brother, JFK
D. Madonna and Britney Spears are sisters
Which category of AI is used extensively in the finance industry to analyze situations
where the logic or rules are unknown?
A. expert system
B. virtual reality
C. neural network
D. genetic algorithm
What is a computer that is designed to request information from a server?
A. client
B. packet-switching
C. peer-to-peer network
D. network operating system
What breaks a project into tiny phases, and developers cannot continue on to the next
phase until the first phase is complete?
A. RAD methodology
B. agile methodology
C. waterfall methodology
D.extreme programming
How can a company reduce the threat of substitute products or services?
A. market the product to less than ten customers
B. ignore competitive forces
C.offer additional value through wider product distribution
D. offer less value, making the product far more generic and similar to the competition

Subscribe Now

Sign up to view full document

View Document