Book Title
Business Driven Information Systems 5th Edition

CAPP 63298

July 20, 2017
What is schedule feasibility?
A. measures the cost-effectiveness of a project
B. measures how well a solution meets the identified system requirements to solve the
problems and take advantage of opportunities
C.measures the project time frame to ensure that it can be completed on time
D. measures the practicality of a technical solution and the availability of technical
resources and expertise
What are intangible benefits?
A.difficult to quantify or measure
B. easy to quantify and typically measured to determine the success or failure of a
C. the measure of the tangible and intangible benefits of an information system
D. periodic reviews of actual performance versus expected performance
What measures bandwidth in terms of numbers transferred or received per unit of time?
A. connection time
B. broadband
C. protocol
D.bit rate
Which licenses specialty software paid for on a license basis or per-use basis or
usage-based licensing?
A. single user license
B. network user license
C. site license
D. application service provide license
What is crowdfunding?
A. refers to the wisdom of the crowd
B. sources capital for a project by raising many small amounts from a large number of
individuals, typically via the Internet
C. collaborating and tapping into the core knowledge of all employees, partners, and
D. involves capturing, classifying, evaluating, retrieving, and sharing information assets
in a way that provides context for effective decisions and actions.
Which software supports general business processes and does not require any specific
software customization to meet the organization's needs?
B. software customization
C.off-the-shelf application
D. application software
Which of the following is not one of the five basic components of supply chain
A. plan
B. source
C. cost
D. deliver
What is represented by a diamond shape in a business process model?
A. BPMN event
B. BPMN activity
C. BPMN flow
D. BPMN gateway
What refers to the various types of media used to carry the signal between computers?
A. twisted-pair wiring
B. network transmission media
C. fiber-optic cable
D. transmission control protocol/internet protocol
A data artist is a business analytics specialist who uses visual tools to help people
understand complex data.
The challenge that companies today sometimes have is that they are departmentalized
and act independently of each other. Which of the following provides solutions that can
help a company work interdepartmentally to make decisions and solve problems?
A. marketing
B. human resource data
C.management information systems
D. resource information systems
What allows user to access the WWW?
A. Web conferencing
B. Web browser
C. Web 2.0
D. Web business
What is the DSS analysis that checks the impact of a change in a variable or assumption
on the model?
A. optimization analysis
B. goal-seeking analysis
C. sensitivity analysis
D. what-if analysis
What are the crucial steps companies perform to achieve their goals and objectives and
implement their strategies?
D. None of these are correct.
What is the computer's main memory, which consists of the random access memory
(RAM), cache memory, and read-only memory (ROM) that is directly accessible to the
B. control unit
C. secondary storage
D. primary storage
When evaluating the business value of disintermediation the more ________ that is/are
cut from the distribution chain, the lower the product price.
A. technology
B. customers
C. data stream
D. intermediaries
What refers to the overall management of the availability, usability, integrity, and
security of company data?
A. information inconsistency
B. information integrity issues
C.data governance
D. master data management
What is an international community that develops open standards to ensure the
long-term growth of the Web?
C. World Wide Web Consortium (W3C)
D. Internet Corporation for Assigned Names and Numbers (ICANN)
Which of the following represent the four main DSS analysis techniques outlined in the
A. what-if analysis, sensitivity analysis, goal-seeking analysis, optimization analysis
B. workflow analysis, sensitivity analysis, growth analysis, organizational analysis
C. what-if analysis, structured analysis, goal-seeking analysis, optimization analysis
D. what-if analysis, sensitivity analysis, growth analysis, organizational analysis
What is the business-to-business (B2B) online purchase and sale of supplies and
A. software customization
B. data integration
C. elogistics
Which of the choices below does not represent an organization that requires
up-to-the-second information?
A. 911 response center
B. stock traders
C. banks
D. construction companies
What is the design phase in the SDLC?
A. involves establishing a high-level plan of the intended project and determining
project goals
B. involves analyzing end-user business requirements and refining project goals into
defined functions and operations of the intended system
C.involves describing the desired features and operations of the system
D. involves placing the system into production so users can begin to perform actual
business operations with the system
Cooking a patty and putting the ingredients together are included in which category of
making a hamburger?
A. input
B. process
C. output
D. All of these are correct.
Which data types are typically found in the marketing department?
A. promotion data, sales data, advertising data
B. employee data, promotion data, vacation data
C. investment data, monetary data, reporting data
D. transactional data, purchasing data, payroll data, tax data
What consists of equipment designed to store large volumes of data for long-term
A. primary storage
B. secondary storage
C. a memory stick
D. flash memory
What acquires raw materials and resources and distributes them to manufacturing as
A.inbound logistics
B. outbound logistics
C. logistics
D. cradle to grave
What is the number of billions of CPU cycles per second?
A. megahertz
B. gigahertz
Which of the following definitions represents physical security?
A. a problem that occurs when someone registers purposely misspelled variations of
well-known domain names
B. tangible protection such as alarms, guards, fireproof doors, fences, and vaults
C. government attempts to control Internet traffic, thus preventing some material from
being viewed by a country's citizens
D. choosing to deny permission to incoming emails
Which of the following is a component that ERP vendors offer to differentiate
themselves in the marketplace?
A. accounting
C. sales
D. human resources
Universities were among some of the first users of the Internet. What was the Internet
first called?
Variety includes different forms of structured and unstructured data.
What is a contact center or call center?
A.a place where customer service representatives answer customer inquiries and solve
problems, usually by email, chat, or phone
B. customers use the web to find answers to their questions or solutions to their
C. a system that gathers product details and issue-resolution information, which can be
automatically generated into a script for the representative to read to the customer
D. a form of predictive analytics for marketing campaigns that attempts to identify
target markets or people who could be convinced to buy products
What is a locally stored URL, or the address of a file or Internet page saved as a
A. website bookmark
B. social tag
C. folksonomy
D. taxonomy
Which of the follow represents a form of disruptive technology?
A. Enter the marketplace at the low end
B. A new way of doing things that initially doesn"t meet the needs of existing customers
C. Tend to open new markets and destroy old ones
D. All of these are correct.