Book Title
Business Driven Information Systems 5th Edition

CAPP 67067

July 19, 2017
A webinar is a form of web conferencing, which blends videoconferencing with
document sharing and allows the user to deliver a presentation over the Web to a group
of geographically dispersed participants.
A prototype is a smaller-scale representation or working model of the users'
requirements or a proposed design for an information system.
A click-and-motor business operates on the Internet only without a physical store.
Interactive voice response routes inbound calls to available agents.
Website name stealing is the theft of a website's name that occurs when someone,
posing as a site's administrator, changes the ownership of the domain name assigned to
the website to another website owner.
Many businesses are using instant messaging as a way to answer and resolve questions
or problems quickly.
Interoperability is a business task.
A Business Process Model and Notation (BPMN) event is anything that happens during
the course of a business process. An event is represented by a circle in a business
process model.
In reintermediation, steps are removed from the value chain as new players find ways to
add value to the business process.
Offshore outsourcing occurs when engaging another company within the same country
for services.
Effectiveness MIS metrics measure the impact MIS has on business processes and
activities, including customer satisfaction and customer conversion rates.
Measuring the amount of website traffic is the best way to determine an organization's
A workstation computer is similar to a desktop but has more powerful mathematical and
graphics processing capabilities and can perform more complicated tasks in less time.
In terms of disruptive technology, what is best for an organization's current business
could ruin it in the long term.
Project objectives are quantifiable criteria that must be met for the project to be
considered a success.
Predictive analytics extracts information from data and uses it to predict future trends
and identify behavioral patterns.
A protocol is a standard that specifies the format of data as well as the rules to be
followed during transmission.
Opportunity management CRM systems target sales opportunities by finding new
customers or companies for future sales.
Reliability means the system functions correctly and provides accurate information.
A haptic interface is primarily implemented and applied in virtual reality environments
and is used in virtual workplaces to enable employees to shake hands, demonstrate
products, and collaborate on projects.
The network providers include ISP, NSP, and RSP.
Accurate information asks if there is an incorrect value in the information.
A field is a collection of related data elements.
A repeater distributes digital video content using IP across the Internet and private IP
Script kiddies have criminal intent when hacking.
Native advertising is an online marketing concept in which the advertiser attempts to
gain attention by providing content in the context of the user's experience in terms of its
content, format, style, or placement.
Failover backs up an exact copy of a system's information.
A wide area network (WAN) spans a large geographic area, such as a state, province, or
country. WANs often connect multiple smaller networks, such as local area networks or
metropolitan area networks. The world's most popular WAN is the Internet. A
metropolitan area network (MAN) is a large computer network usually spanning a city.
CRM analysis technologies help organizations segment their customers into categories
such as best and worst customers.
A backward integration takes information entered into a given system and sends it
automatically to all downstream systems and processes.
A handheld computer portable enough to fit in a purse or pocket and has its own power
source or battery.
In the basic supply chain, deliver refers to planning for transportation of goods to
A network user license enables anyone on the network to install and use the software.
White-hat hackers break into other people's computer systems and may just look around
or may steal and destroy information.
Association detection is a technique used to divide information sets into mutually
exclusive groups such that the members of each group are as close together as possible
to one another and the different groups are as far apart as possible.
Web accessibility means that people with disabilities including visual, auditory,
physical, speech, cognitive, and neurological disabilities can use the Web.
Regression is a statement about what will happen or might happen in the future, for
example, predicting future sales or employee turnover.
What is the arithmetic-logic unit?
A. the actual hardware that interprets and executes the program (software) instructions
and coordinates how all the other hardware devices work together
B. interprets software instructions and literally tells the other hardware devices what to
do, based on the software instructions
C. a type of CPU that can recognize as many as 100 or more instructions, enough to
carry out most computations directly
D. performs all arithmetic operations (for example, addition and subtraction) and all
logic operations (such as sorting and comparing numbers)
Updating business strategies is a continuous undertaking as internal and external
environments ________.
A. become less competitive
B. remain stagnant
C.rapidly change
D. become more consistent
Which of the following is considered an operational or structured decision?
A. determining how many employees are out sick
B. determining the impact of last month's marketing campaign
C. allocating resources to a department for a new system
D. monitoring performance of a project team
What is another term for data that does not exist in a fixed location?
A. structured data
B.unstructured data
C. text mining
D. web mining
What software uses programs such as Window Washer to erase file histories, browser
cookies, cache contents, and other crumbs that applications and Windows leave on a
hard drive?
A. preventive security software
B. safe mode software
C. crash-proof software
D. disk image software
Which formats include a packet header, packet body containing the original message,
and packet footer?
A. attenuation
B.standard packet
C. packet header
D. packet footer
What occurs if the system is failing and will load only the most essential parts of the
operating system and will not run many of the background operating utilities?
A. system restore software
B. safe mode software
C. crash-proof software
D. disk image software
Which activities belong in the finance department?
A. records, measures, and reports monetary transactions
B. tracks strategic financial issues, including money, banking, credit, investments, and
C. supports sales by planning, pricing, and promoting goods or services is marketing
D. relies on information from operations to understand inventory, place orders, and
forecast consumer demand
What is a small handheld computer that performs simple tasks such as taking notes,
scheduling appointments, and maintaining an address book and a calendar?
A. tablet
C. ebook
D. smartphone
What is selling additional products or services to an existing customer?
B. up-selling
C. campaign management system
D. customer service and support
What is the science that studies encryption, which is the hiding of messages so that only
the sender and receiver can read them?
A. digital certificate
B. encryption
C. decrypt
D. cryptography
What is a feature of a product or service that customers have come to expect and
entering competitors must offer the same if they want to survive?
A. significant barrier
B. entry barrier
C. product differentiation
D. entry chain
A __________ advantage features a product or service on which customers place a
greater value than they do on similar offerings from competitors.
A. competitive
B. competitor
C. power
D. first mover
What are forecasts?
A. a statement about what will happen or might happen in the future; for example,
predicting future sales or employee turnover
B. a statistical process that finds the way to make a design, system, or decision as
effective as possible; for example, finding the values of controllable variables that
determine maximal productivity or minimal waste
C.predictions based on time-series information
D. a statistical process for estimating the relationships among variables
What occurs when a company uses its own computing infrastructure for normal usage
and accesses the cloud when it needs to scale for high/peak load requirements ensuring
a sudden spike in usage does not result in poor performance or system crashes?
A. community cloud
B. private cloud
C.cloud bursting
D. hybrid cloud
A data miner is a business analytics specialist who uses visual tools to help people
understand complex data.
What is network topology?
A. the occurrence when the sending computer divides a message into a number of
efficiently sized units called packets, each of which contains the address of the
destination computer
B. an intelligent connecting device that examines each packet of data it receives and
then decides which way to send it onward toward its destination
C. a reference to the geometric arrangement of the actual physical organization of the
computers and other network devices in a network
D. a model for applications in which the bulk of the back-end processing, such as
performing a physical search of a database, takes place on a server, while the front-end
processing, which involves communicating with the users, is handled by the clients
What is a collection of large, complex data sets, including structured and unstructured
data, which cannot be analyzed using traditional database methods and tools?
A.big data
B. distributed computing
C. advanced analytics
D. data scientist
Which phase brings all the project pieces together into a special testing environment to
eliminate errors and bugs and verify that the system meets all the business requirements
defined in the analysis phase?
A.testing phase
B. analysis phase
C. development phase
D. planning phase
Which data types are typically found in the human resources department?
A. promotion data, sales data, advertising data
B. employee data, promotion data, vacation data
C. investment data, monetary data, reporting data
D. transactional data, purchasing data, payroll data, tax data
Which of the following changes its form as it propagates?
A. backdoor programs
B. strikers
C.polymorphic viruses and worms
D. splogs
Which of the following serves as key evidence in many legal cases today and also
provides a faster, easier way to search and organize paper documents?
A. confidentiality
B. digital information
C. privacy policies
D. information ethics
Which of the following identifies Business 2.0 communication and collaboration tools?
A. microblogs, Tweets, RSS
B. API, RSS, tacit knowledge
C. blogs, wikis, mashup
D. tags, Web logs, RSS
What offers a pay-per-use revenue model similar to a metered service such as gas or
A. grid computing
B. smart phones
C.utility computing
D. computing services
Which of the following statements is inaccurate in reference to domain names?
A. Domain names are rented.
B.Domain names are owned.
C. Domain names are renewable.
D. GoDaddy is a popular domain name registrar.
Many websites use ________ to constantly feed news to consumers instead of having
the consumer search for the news.
A. mashup
B. source code
When evaluating the six-step decision-making process, what occurs during the solution
test step?
A. The process will begin again if the decisions made were incorrect.
B. definition of the problem as clearly and precisely as possible
C. details of every solution possible including ideas that seem far fetched
D. None of these are correct.
Which of the following is considered a service?
A. teaching
B. waiting tables
C. cutting hair
D. All of these are correct.
What is the process of monitoring and responding to what is being said about a
company, individual, product, or brand?
A. social media monitoring
B. social media manager
C. social media policy
D. anti-spam policy
What occurs when two entities can be related to each other in many instances?
A. one-to-one relationship
B. one-to-many relationship
C.many-to-many relationship
D. composite entity
What is the efficient coexistence of telephone, video, and data communication within a
single network, offering convenience and flexibility not possible with separate
A. network protocol
B. networking category
C.network convergence
D. network communication