Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CAPP 40531

July 20, 2017
What is the difference between a wiki and a blog?
A. a wiki is free and a blog has a subscription fee
B. a wiki user can alter the original content of an article, where a blog user can only add
information as a comment
C. a wiki is original content, where a blog is used sources
D. All of these are correct.
LANs, WANs, and MANs all provide users with an accessible and reliable network
infrastructure. Which of the below are the most important network differentiating
dimensions?
A. reliability and timing
B. confidentiality and performance
C. security and cost
D.cost and performance
What exists to represent the relationship between two other entities?
A. one-to-one relationship
B. one-to-many relationship
C. many-to-many relationship
D. composite entity
What provides additional functionality to the operating system?
A. system software
B. operating system software
C. utility software
D. multitasking
What are the four challenges facing ebusinesses outlined in the text?
A. identifying limited market segments, managing consumer trust, ensuring consumer
protection, and improving information content
B. decreased costs, increased convenience, identifying limited market segments, and
adhering to taxation rules
C. identifying limited market segments, managing consumer trust, ensuring consumer
protection, and adhering to taxation rules
D. differs depending on the industry where the business operates
What is the business strategy that lets a company shorten the order process and add
value with reduced costs or a more responsive and efficient service, and occurs when a
business sells directly to the customer online?
A. disintermediation
B. intermediaries
C. cybermediation
D. None of these are correct.
What makes system changes to repair design flaws, coding errors, or implementation
issues?
A.corrective maintenance
B. preventative maintenance
C. pilot implementation
D. phased implementation
What type of integrity constraint does not allow someone to create an order for a
nonexistent customer?
A.relational integrity constraint
B. business-critical integrity constraint
C. information-critical integrity constraint
D. mission-critical integrity constraint
Which of the following is not considered a category within the primary value activities
in a value chain analysis?
A. inbound logistics
B. firm infrastructure
C. operations
D. service
Which internal reports organize and categorize data for managerial perusal?
A. internal reports
B. detailed internal reports
C.summary internal reports
D. exception reports
An organization must identify what it wants to do and how it is going to do it. What
does the "what" part of this question focus on?
A. justification of the project
B. definition of the project
C. expected results of the project
D.All of these are correct.
What is a website or web application that uses content from more than one source to
create a completely new product or service?
A. social tagging
B. mashup blog
C. social media
D. mashup
Which of the following is considered the output in the systems thinking example of a
DSS?
A. TPS
B. optimization
C. goal seeking
D. forecasts
What is the number of billions of CPU cycles per second?
A. megahertz
B. gigahertz
C. CISC
D. RISC
Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas.
Part of Lisa's job requires her to gather industry information, collaborate with partners,
compare competitors, and tap into the knowledge of prospective employees, partners,
and customers. Which of the below would Lisa use to perform her job?
A. interactivity metrics
B. source code
C. network effect
D. collective intelligence
Which term refers to the varying levels that define what a user can access, view, or
perform when operating a system?
A. availability
B.accessibility
C. usability
D. responsibility
When the software vendor releases a new version of the software that makes significant
changes to the program, what is it called?
A. a software update
B. a software upgrade
C. crash-proof software
D. course management software
Which department tracks strategic financial issues, including money, banking, credit,
investments, and assets?
A. sales
B. operations management
C. accounting
D. finance
What is a complex instruction set computer chip?
A. The actual hardware that interprets and executes the program (software) instructions
and coordinates how all the other hardware devices work together.
B. Interprets software instructions and literally tells the other hardware devices what to
do, based on the software instructions.
C. A type of CPU that can recognize as many as 100 or more instructions, enough to
carry out most computations directly.
D. Performs all arithmetic operations (for example, addition and subtraction) and all
logic operations (such as sorting and comparing numbers).
What is the number of bits (0s and 1s) that can be processed by the CPU at any one
time?
A. clock speed
B. word length
C. bus width
D. chip line width
What is the Internet Corporation for Assigned Names and Numbers?
A. delivers everything from animation to graphics and music to movies
B. an international community that develops open standards to ensure the long-term
growth of the Web
C. a nonprofit organization that has assumed the responsibility for Internet Protocol (IP)
address space allocation, protocol parameter assignment, and domain name system
management
D. the Internet protocol web browsers use to request and display web pages using
universal resource locators
Which of the following is an issue related to the waterfall methodology?
A. flaws in accurately defining and articulating the business problem
B. managing costs, resources, and time constraints
C. assumes users can specify all business requirements in advance
D.All of these are correct.
How would the technology industry use business intelligence?
A. track crime patterns, locations, and criminal behavior
B. analyze customer demographics
C. predict sales, inventory levels, and distribution
D. predict hardware failures
Which machine language is difficult for people to understand?
A.first generation machine language
B. fifth generation machine language
C. third generation machine language
D. fourth generation machine language
What is a hashtag?
A. represents the interconnection of relationships in a social network
B. maps group contacts identifying who knows each other and who works together
C. describes the collaborative activity of marking shared online content with keywords
or tags as a way to organize it for future navigation, filtering, or search
D. a keyword or phrase used to identify a topic and is preceded by a hash or pound sign
(#)
Human-generated data is data that humans, in interaction with computers, generate.
Human-generated structured data includes input data, click-stream data, or gaming data.
Which group of stakeholders' primary interests include reliable contracts, ethical
materials handling, and responsible production?
A. partners/suppliers
B. shareholders/investors
C. community
D. government
What allows the management of networked nodes to be managed from a single point?
A. file transfer protocol (FTP)
B. simple mail transfer protocol (SMTP)
C. hypertext transfer protocol (HTTP)
D. simple network management protocol (SNMP)
Which of the following is not one of the five basic components of supply chain
management?
A. plan
B. source
C. sale
D. deliver
What is the computer's primary working memory, in which program instructions and
data are stored so that they can be accessed directly by the CPU via the processor's
high-speed external data bus?
A. RAM
B. ROM
C. volatility
D. flash memory
What is the primary tool that retrieves information and helps users graphically design
the answer to a question?
A. data mining tools
B. structured example language
C.query-by-example tool
D. relational query tool
Which of the following would you include as decisions and responsibilities typically
found at the operational level of a company?
A. develop core business activities required to run the day-to-day operations
B. control core business activities required to run the day-to-day operations
C. maintain core business activities required to run the day-to-day operations
D. All of these are correct.
Grid computing takes advantage of the available 75% of unused processing power of a
computer and links thousands of individual computers around the world creating a
________ that can process intensive tasks.
A. personal computer
B. employee client
C. company server
D.virtual supercomputer
If you were thinking about an oven as a system, which of the following represents the
input?
A. the uncooked food
B. the cooked food
C. a light indicating that the oven has reached the preheated temperature
D. the oven running at 350 degrees for 20 minutes
Which of the following is an outsourcing challenge caused by contract length?
A. difficulties in getting out of a contract
B. problems in foreseeing future issues
C. problems in recreating an internal IT department
D.All of these are correct.

Subscribe Now

Sign up to view full document

View Document