Book Title
Business Driven Information Systems 5th Edition

CAPP 50941

July 20, 2017
Information redundancy is the duplication of data, or the storage of the same data in
multiple places.
A hashtag is a self-photograph placed on a social media website.
Application integration is the integration of a company's existing management
information systems.
A field is composed of rows and columns that represent an entity.
Longitude represents a north/south measurement of position.
Exception reports organize and categorize data for managerial perusal.
RFID supports logistics.
Business process reengineering is the analysis and redesign of workflow within and
between enterprises.
Forecasts are predictions based on time-series information.
Upcycle refers to discarded electronics and is growing with the growth of innovation;
for example, a personal computer has a life expectancy of only three to five years and a
cell phone is less than two years.
A peer-to-peer network is a model for applications in which the bulk of the back-end
processing, such as performing a physical search of a database, takes place on a server,
while the front-end processing, which involves communicating with the users, is
handled by the clients.
Social networking is the practice of expanding your business and/or social contacts by
constructing a personal network.
Desktop publishing increases the cooperation and joint productivity of small groups of
Device customization is the blending of personal and business use of technology
devices and applications.
Preventive security software, through programs such as Window Washer, erases file
histories, browser cookies, cache contents, and other crumbs that applications and
Windows leave on a hard drive.
War chalking is deliberately searching for Wi-Fi signals while driving by in a vehicle.
Accurate information asks if the aggregate or summary information is in agreement
with detailed information.
Flash memory is a special type of rewritable read-only memory (ROM) that is compact
and portable.
Redundancy occurs when a task or activity is never repeated.
Volatility refers to a device's ability to function with or without power. RAM is volatile,
meaning it must have constant power to function; its contents are lost when the
computer's electric supply fails.
The chief knowledge officer is responsible for collecting, maintaining, and distributing
company knowledge.
Prototyping is a modern design approach by which the designers and system users use
an iterative approach to building the system.
The oldest and the best known is the agile methodology, a sequence of phases in which
the output of each phase becomes the input for the next.
A hub (switch or router) is the hardware to perform traffic control.
The network interface layer places data packets on the network for transmission.
Operating system software controls the application software and manages how the
hardware devices work together. When using Excel to create and print a graph, the
operating system software controls the process, ensures that a printer is attached and
has paper, and sends the graph to the printer along with instructions on how to print it.
Some computers are configured with two operating systems so they can dual
bootprovide the user with the option of choosing the operating system when the
computer is turned on.
Plan, source, make, deliver, and return are the five basic supply chain management
World Wide Web Consortium (W3C) is an international community that develops open
standards to ensure the long-term growth of the Web (www.w3.org).
Structured data is typically stored in a traditional system such as a relational database or
spreadsheet and accounts for about 20 percent of the data that surrounds us.
The chief security officer is responsible for ensuring the security of business systems
and developing strategies and safeguards against attacks from hackers and viruses.
Using only data and information to make decisions and solve problems is the key to
finding success in business. These are also the only core drivers of the information age
and the building blocks of business systems.
A worm spreads itself not only from file to file but also from computer to computer.
What are computer-aided software engineering (CASE) tools?
A. an illustration of the movement of information between external entities and the
processes and data stores within the system
B.software suites that automate systems analysis, design, and development
C. a formal, approved document that manages and controls the entire project
D. a graphical representation of the processes that capture, manipulate, store, and
distribute information between a system and its environment
Which of the following is included in the four quadrants of ethical and legal behavior?
A. legal behavior and ethical behavior.
B. illegal behavior and ethical behavior.
C. legal behavior and unethical behavior.
D.All of these are correct.
Which of the following would you include as decisions and responsibilities typically
found at the managerial level of a company?
A. monthly Plans
B. monthly Budgets
C. weekly Schedule
D. All of these are correct.
What contains all of the details of an incident?
A. technology failure
B.incident record
C. incident management
D. technology recovery strategy
Which data types are typically found in the operations management department?
A. manufacturing data, distribution data, and production data
B. sales data, customer data, commission data, and customer support data
C. employee data, promotion data, vacation data
D. investment data, monetary data, reporting data
What is a form of social engineering in which one individual lies to obtain confidential
data about another individual?
A. dumpster texting
B. dumpster diving
C. trash retrieval
D. pretexting
What is network virtualization?
A. combines multiple network storage devices so they appear to be a single storage
B.combines networks by splitting the available bandwidth into independent channels
that can be assigned in real time to a specific device
C. combines the physical resources, such as servers, processors, and operating systems,
from the applications
D. cffers backup services that use cloud resources to protect applications and data from
disruption caused by disaster
Which of the following occurs during data cleansing?
A. clean missing records
B. clean redundant records
C. clean inaccurate data
D. All of these are correct.
What kind of attribute can be calculated using the value of another attribute?
A. single-valued attribute
B. multivalued attribute
C.derived attribute
D. stored attribute
The department within a company that supports the sales by planning, pricing, and
promoting goods or services is called ___________.
A. sales
B. operations management
C. accounting
D. marketing
What is erroneous or flawed data?
A.dirty data
B. information cleansing
C. information Scrubbing
What are information integrity issues?
A. occurs when the same data element has different values
B.occurs when a system produces incorrect, inconsistent, or duplicate data
C. refers to the overall management of the availability, usability, integrity, and security
of company data
D. the practice of gathering data and ensuring that it is uniform, accurate, consistent,
and complete, including such entities as customers, suppliers, products, sales,
employees, and other critical entities that are commonly integrated across
organizational systems
What occurs between two entities in which an instance of one entity can be related to
many instances of a related entity?
A. one-to-one relationship
B.one-to-many relationship
C. many-to-many relationship
D. composite entity
What is inventory cycle time?
A. an unfilled customer order for a product that is out of stock
B.the time it takes to manufacture a product and deliver it to the retailer
C. the agreed upon time between the purchase of a product and the delivery of the
D. the frequency of inventory replacement
What is click-fraud?
A. the electronic defacing of an existing website
B.the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by
repeatedly clicking on a link to increase charges or costs for the advertiser
C. a computer crime where a competitor or disgruntled employee increases a company's
search advertising costs by repeatedly clicking on the advertiser's link
D. an act or object that poses a danger to assets
What is supply chain management (SCM)?
A.the management of information flows between and among activities in a supply chain
to maximize total supply chain effectiveness and corporate profitability
B. information entered into a given system and sent automatically to all downstream
systems and processes
C. a means of managing all aspects of a customer's relationship with an organization to
increase customer loyalty and retention and an organization's profitability
D. information that connects the plans, methods, and tools aimed at integrating separate
enterprise system
When evaluating the value chain, which of the following is included in the support
value activities?
A. inbound activities
B. marketing and sales
C.firm infrastructure
D. finance and sales
What is equipment used to see, hear, or otherwise accept the results of information
processing requests?
A. input device
B. output device
C. magnetic tape
D. magnetic medium
What is a phishing expedition?
A. reroutes requests for legitimate websites to false websites
B. a technique to gain personal information for the purpose of identity theft, usually by
means of fraudulent emails that look as though they came from legitimate businesses
C. a masquerading attack that combines spam with spoofing
D. a phishing expedition in which the emails are carefully designed to target a particular
person or organization
A chipless RFID tag ________.
A. occurs when a company places active or semi-passive RFID tags on expensive
products or assets to gather data on the items' location with little or no manual
B.uses plastic or conductive polymers instead of silicon-based microchips, allowing
them to be washed or exposed to water without damaging the chip
C. measures the acceleration (the rate of change of velocity) of an item and is used to
track truck speeds or taxi cab speeds
D. provides extremely accurate position, time, and speed, using a satellite-based
navigation system
What is the name of a company's internal computer department?
A. Management Information Systems (MIS)
B. Information Systems (IS)
C. Information Technology (IT)
D. All of these are correct.
What is represented by a circle in a business process model?
A. BPMN event
B. BPMN activity
C. BPMN flow
D. BPMN gateway
A common mistake that many managers tend to make is focusing on only one type of
metrics because they are easier to measure. Which type of metrics do they focus on?
A. effectiveness MIS metrics
B. efficiency MIS metrics
C. endurance MIS metrics
D. product sales metrics
What is a cultural trend that places value on an individual's ability to be a creator of
things as well as a consumer of things?
A. computer-aided design/computer-aided manufacturing
B.maker movement
C. makerspace
D. RFID electronic product code
What refers to choosing to allow permissions to incoming emails?
A. opt out
B. opt in
D. nonrepudiation
What identifies the geographic location of features and boundaries on Earth, such as
natural or constructed features, oceans, and more?
A. automatic vehicle location
B. geographic information system
C. cartography
D.spatial data
What is a potential problem or impact of technology dependence?
A. outages hold potentially great havoc for people, business, and educational
institutions that rely heavily on technology
B. many have a need to be continuously connected for every activity that potentially
eliminates crucial in-person social skills and could stunt psychological growth
C. people or businesses cannot function if the connection is down
D. All of these are correct.
What is threat of substitute products or services?
A. the ability of buyers to affect the price they must pay for an item
B. the suppliers' ability to influence the prices they charge for supplies (including
materials, labor, and services)
C. high when it is easy for new competitors to enter a market and low when there are
significant entry barriers to joining a market
D. high when there are many alternatives to a product or service and low when there are
few alternatives from which to choose
What has a defined length, type, and format and includes numbers, dates, or strings
such as Customer Address?
A.structured data
B. machine-generated data
C. human-generated data
D. unstructured data
What is a cellular telephone with a keypad that runs programs, music, photos, email,
and includes many features of a PDA.
A. tablet
C. ebook
D. smartphone

Subscribe Now

Sign up to view full document

View Document