Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CAPP 65752

July 20, 2017
Human-generated data is created by a machine without human intervention.
Machine-generated structured data includes sensor data, point-of-sale data, and web log
(blog) data.
What is a small file deposited on a hard drive by a website containing information about
customers and their web activities?
A. key logger
B. hardware key logger
C. cookie
D. adware
Which of the following means the right to be left alone when you want to be, to have
control over your personal possessions, and not to be observed without your consent?
A. safety
B. ethical standard
C. privacy
D. confidentiality
How would the retail industry use business intelligence?
A. track crime patterns, locations, and criminal behavior
B. analyze customer demographics
C.predict sales, inventory levels, and distribution
D. predict hardware failures
What is a person or group that has an interest or concern in an organization?
A. stakeholder
B. business strategy
C. supplier
D. partner
What is economic feasibility?
A.measures the cost-effectiveness of a project
B. measures how well a solution meets the identified system requirements to solve the
problems and take advantage of opportunities
C. measures the project time frame to ensure that it can be completed on time
D. measures the practicality of a technical solution and the availability of technical
resources and expertise
What removes any software that employs a user's Internet connection in the background
without the user's knowledge or explicit permission?
A. preventive security software
B. spyware software
C. crash-proof software
D. disk image software
As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly
training her new hires. There are over 40 different locations where Exempla employees
work across the Chicago metro area. Tina decides to implement some valuable
ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for
completing training sessions with all the new hires. Tina primarily uses PowerPoints
and videos during her training modules. What is the most effective ebusiness tool for
Tina to implement in order to accomplish all of her training goals?
A. IMing
B. webinar
C. blog
D. email
Which of the following is not a characteristic of a well-defined project plan?
A.prepared by the project manager
B. easy to read
C. appropriate to the project's size
D. communicated to all key participants
Which of the following statements describes Web 3.0's feature that ensures the
"integration of legacy devices"?
A. the ability to use current devices such as iPhone and laptops as credit cards or tickets
B. the design of websites and other software so they can be easily integrated and work
together
C. the ability for software to be distributed and accessed from anywhere
D. the design of software to be easily integrated and work together
Which of the following terms represents how quickly a third-party or vendor can
change a system to ensure it meets user needs and the terms of any contracts including
agreed levels of reliability, maintainability, or availability?
A. capacity
B. web accessibility
C.serviceability
D. vulnerability
Which of the following represents the primary elements in an information MIS
infrastructure?
A.backup, recovery, disaster recovery, and business continuity planning
B. backup, accessibility, and usability
C. backup, cloud computing, and virtualization
D. grid computing, cloud computing, and virtualization
What kind of attribute would be given for a person who does not have an email
address?
A.null-valued attribute
B. multivalued attribute
C. single-valued attribute
D. stored attribute
Which social media site uses LBS?
A.Foursquare
B. iTunes
C. Google
D. YouTube
What stores, views, and analyzes geographic data creating multidimensional charts or
maps; for example, it is used to monitor global warming by measuring the speed of
glaciers melting in Canada, Greenland, and Antarctica?
A. automatic vehicle location
B.geographic information system
C. cartography
D. edge matching
Online transaction processing (OLTP) and online analytical processing (OLAP) are
similar MIS strategies used to help with business decision making. What is the primary
difference between OLTP and OLAP?
A. OLTP is used at the operational level; OLAP is used at the managerial level
B. OLTP is used to capture transactional and event data; OLAP is used to manipulate
information
C. OLTP is used to support structured decisions; OLAP is used to support
semistructured decisions
D. All of these are correct.
Data integration is the integration of data from multiple sources, which provides a
unified view of all data.
What is a phone scam that attempts to defraud people by asking them to call a bogus
telephone number to "confirm" their account information?
A. pharming
B. phishing
C. phishing expedition
D. vishing
Shelby Black runs a very successful hair salon in downtown Los Angeles. One of
Shelby's tasks is to input positive and negative customer reviews into her computer
system. What type of information is Shelby gathering?
A. feedback
B. processing
C. output management
D. sales processing
What is estimated time en route (ETE)?
A.the time remaining before reaching a destination using the present speed and is
typically used for navigation applications
B. the time of day of an expected arrival at a certain destination and is typically used for
navigation applications
C. a device that measures the acceleration (the rate of change of velocity) of an item
and is used to track truck speeds or taxi cab speeds
D. a GPS technology adventure game that posts the longitude and latitude location for
an item on the Internet for users to find
What is a service-oriented architecture?
A.A business-driven enterprise architecture that supports integrating a business as
linked, repeatable activities, tasks, or services.
B. A business task.
C. The capability of services to be joined together on demand to create composite
services, or disassembled just as easily into their functional component.
D. The capability of two or more computer systems to share data and resources, even
though they are made by different manufacturers.
Why is estimating future growth a challenge for most companies?
A. Growth can occur if the company acquires new markets.
B. Growth can occur if the company acquires new customers.
C. Growth can occur if the company acquires new products.
D.All of these are correct.
What generates revenue each time a user clicks on a link that takes the user directly to
an online agent waiting for a call?
A. pay-per-click
B. pay-per-call
C. pay-per-conversion
D. All of these are correct.
What are the three business functions an MIS infrastructure supports?
A.supports operations, change, and the environment or sustainability
B. supports operations, customers, and ewaste
C. supports operations, clients, and servers
D. supports information, change, and business continuity planning
What system is used in computer appliances and special-purpose applications, such as
an automobile, ATM, or media player and are used for a single purpose?
A. system software
B. operating system software
C. embedded operating system
D. multitasking
What is process modeling?
A. an illustration of the movement of information between external entities and the
processes and data stores within the system
B. software suites that automate systems analysis, design, and development
C. a formal, approved document that manages and controls the entire project
D.a graphical representation of the processes that capture, manipulate, store, and
distribute information between a system and its environment
What occurs when the ability of a company to operate is impaired because of a
hardware, software, or data outage?
A. emergency
B. emergency preparedness
C. business Impact analysis
D.technology failure
The best and most effective way to manage authentication is through ________.
A. smart technology card
B. tokens
C. biometrics
D. passwords
Which of the following is considered an input in the systems thinking example of a
TPS?
A. CRUD
B. calculate
C. report
D. source document
Which of the choices below is a common Internet monitoring technology?
A. key logger
B. hardware key logger
C. cookie
D.All of these are correct.
Which of the below examples indicates when the time is right to initiate a business
process change?
A. The market being served makes a distinctive shift.
B. The company is below industry benchmarks on its core processes.
C. The company strategically passes or leapfrogs the competition on key decisions to
regain competitive advantage.
D. All of these are correct.
What is data that is not defined, does not follow a specified format, and is typically
freeform text such as emails, Twitter tweets, and text messages?
A. structured data
B. machine-generated data
C. human-generated data
D. unstructured data
Who is the person responsible for updating and maintaining website content?
A. content creator
B.content editor
C. static information
D. dynamic information

Subscribe Now

Sign up to view full document

View Document