Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CAS CS 59723

July 19, 2017
A selfie is a magazine published only in electronic form on a computer network.
Electronic data interchange (EDI) is a standard format for the electronic exchange of
information between supply chain participants.
Administrator access initiative brings together people from industry, disability
organizations, government, and research labs from around the world to develop
guidelines and resources to help make the web accessible to people with disabilities
including auditory, cognitive, neurological, physical, speech, and visual disabilities.
A SWOT analysis evaluates an organization's strengths, weaknesses, opportunities, and
threats to identify significant influences that work for or against business strategies.
Automatic vehicle location (AVL) uses GPS tracking to track vehicles.
Brainstorming is a technique for generating ideas by encouraging participants to offer
as many ideas as possible in a short period without any analysis until all the ideas have
been exhausted.
Supply chain visibility ensures supply chain cohesion by automating the different
activities of the supply chain.
Spear phishing is a phishing expedition in which the emails are carefully designed to
target a particular person or organization.
A business management system is a graphic description of a process, showing the
sequence of process tasks, which is developed for a specific purpose and from a
selected viewpoint.
Disk optimization software helps save information if a computer crashes.
True
False
A social network is an application that connects people by matching profile
information. Providing individuals with the ability to network is by far one of the
greatest advantages of Business 2.0.
Determining if information is updated weekly, daily, or hourly is an example of a timely
characteristic of high-quality information.
Rapid application development (RAD) methodology (also called rapid prototyping)
emphasizes extensive user involvement in the rapid and evolutionary construction of
working prototypes of a system, to accelerate the systems development process.
The threat of substitute products or services refers to the power of competitors to enter a
new market.
Information secrecy is an ethical issue that focuses on who owns information about
individuals and how information can be sold and exchanged.
War consumerization is the practice of tagging pavement with codes displaying where
Wi-Fi access is available.
Gate four is transition, and the primary questions answered in this phase address
ownership of the system and training of key personnel.
A metropolitan area network (MAN) is a large computer network usually spanning a
city. Most colleges, universities, and large companies that span a campus use an
infrastructure supported by a MAN.
Downtime refers to a period of time when a system is unavailable and unplanned
downtime can strike at any time for various reasons.
Employee monitoring policies explicitly state how, when, and where the company
monitors its employees.
The traditional waterfall methodology is a sequential, activity-based process in which
each phase in the SDLC is performed sequentially from planning through
implementation and maintenance.
Voice over LTE (VoLTE) allows mobile voice calls to be made over broadband
networks, creatingunder the right network conditionsclearer audio and fewer dropped
calls.
Prediction is a statement about what will happen or might happen in the future; for
example, predicting future sales or employee turnover.
Corrective maintenance makes system changes to repair design flaws, coding errors, or
implementation issues.
Source documents are the original transaction records.
Test conditions detail the steps the system must perform along with the expected result
of each step; in the implementation phase, the organization places the system into
production so users can begin to perform actual business operations with it.
Core ERP components are the extra components that meet organizational needs not
covered by the core components and primarily focus on external operations.
Dell computer ranks highest on the list for expecting returns from new investments.
A domain name system (DNS) converts IP addresses into domains, or identifying labels
that use a variety of recognizable naming conventions.
Extreme programming (XP) methodology, like other agile methods, breaks a project
into four phases, and developers cannot continue to the next phase until the previous
phase is complete.
Eintegration is the use of the Internet to provide customers with the ability to gain
personalized information by querying corporate databases and their information
sources.
Information property is the category of computer security that addresses the protection
of data from unauthorized disclosure and confirmation of data source authenticity.
Active RFID tags do not depend on a silicon microchip and use plastic or conductive
polymers instead of silicon-based microchips allowing them to be washed or exposed to
water without damaging the chip.
Which of the below is not an example of a social bookmarking website?
A. Facebook
B. StumbleUpon
C. Delicious
D. All of these are correct.
What represents the end of the packet or transmission end?
A. traceroute
B. standard packet
C. packet header
D.packet footer
What is represented by a rounded-corner rectangle in a business process model?
A. BPMN event
B. BPMN activity
C. BPMN flow
D. BPMN gateway
Which of the following is not included in the decision-making process?
A. Data Collection
B. Solution Benchmarking
C. Solution Generation
D. Solution Test
What interprets software instructions and literally tells the other hardware devices what
to do, based on the software instructions?
A. CPU
B. control unit
C. ALU
D. primary storage
What is Google Glass?
A. the viewing of the physical world with computer-generated layers of information
added to it
B. a wearable computer with an optical head-mounted display (OHMD)
C. uses technology allowing humans to interact with a computer through bodily
sensations and movements
D. a work environment that is not located in any one physical space
Which of the choices below allows a user to access the Internet?
A. dial-up connection
B. cable
C. T1 line
D.All of these are correct.
What is a wireless MAN?
A.a metropolitan area network that uses radio signals to transmit and receive data
B. a communications technology aimed at providing high-speed wireless data over
metropolitan area networks
C. a means by which portable devices can connect wirelessly to a local area network,
using access points that send and receive data via radio waves
D. includes the inner workings of a Wi-Fi service or utility, including the signal
transmitters, towers, or poles and additional equipment required to send out a Wi-Fi
signal
What is spyware?
A. a special class of adware that collects data about the user and transmits it over the
Internet without the user's knowledge or permission
B. experts in technology who use their knowledge to break into computers and
computer networks, either for profit or just motivated by the challenge
C. a computer attack where an attacker accesses a wireless computer network,
intercepts data, uses network services, and/or sends attack instructions without entering
the office or organization that owns the network
D. software that, while purporting to serve some useful function and often fulfilling that
function, also allows Internet advertisers to display advertisements without the consent
of the computer user
What is an older secondary storage medium that uses a strip of thin plastic coated with
a magnetically sensitive recording medium?
A. input device
B. output device
C. magnetic tape
D. magnetic medium
What is a wearable computer with an optical head-mounted display (OHMD)?
A. augmented reality
B. Google Glass
C. haptic interface
D. virtual reality
What is information inconsistency?
A.occurs when the same data element has different values
B. occurs when a system produces incorrect, inconsistent, or duplicate data
C. refers to the overall management of the availability, usability, integrity, and security
of company data
D. the practice of gathering data and ensuring that it is uniform, accurate, consistent,
and complete, including such entities as customers, suppliers, products, sales,
employees, and other critical entities that are commonly integrated across
organizational systems
What is human-generated data?
A. has a defined length, type, and format and includes numbers, dates, or strings such as
Customer Address
B. created by a machine without human intervention
C.data that humans, in interaction with computers, generate
D. not defined, does not follow a specified format, and is typically freeform text such as
emails, Twitter tweets, and text messages
What sources capital for a project by raising many small amounts from a large number
of individuals, typically via the Internet?
A. explicit knowledge
B. crowdfunding
C. tacit knowledge
D. crowdsourcing
What encompasses all the information contained within a single business process or
unit of work and has a primary purpose of supporting the performance of daily
operational or structured decisions?
A. OLTP
B. OLAP
C. analytical information
D. transactional information
What is web analytics?
A. analyzes text flowing across the Internet, including unstructured text from blogs and
messages
B. the process of analyzing recorded calls to gather information; brings structure to
customer interactions and exposes information buried in customer contact center
interactions with an enterprise
C. analyzes unstructured data to find trends and patterns in words and sentences
D. analyzes unstructured data associated with websites to identify consumer behavior
and website navigation
Transaction processing systems are primarily used to automate business processes.
Automation increases efficiency and effectiveness while reducing head count, which in
turn reduces the overall operational _____________.
A. costs
B. systems
C. revenues
D. intelligence
What is data-driven website?
A. the person responsible for creating the original website content
B. includes data that change based on user action
C. information stored in a dynamic catalog, or an area of a website that stores
information about products in a database
D. an interactive website kept constantly updated and relevant to the needs of its
customers using a database
What is a business-driven enterprise architecture that supports integrating a business as
linked, repeatable activities, tasks, or services?
A.service-oriented architecture
B. service
C. loose coupling
D. interoperability
What is the integration of data from multiple sources, which provides a unified view of
all data?
A. backward integration
B. application integration
C. data integration
D. forward integration
What includes the tasks, activities, and responsibilities required to execute each step in
a business process?
A. workflow
B. swim lane
C. automation
D. streamlining
Which of the following describes agile?
A. fast and efficient
B. small and nimble
C. lower cost
D.All of these are correct.
What is a small unit of ultra-fast memory that is used to store recently accessed or
frequently accessed data so that the CPU does not have to retrieve this data from slower
memory circuits such as RAM?
A. RAM
B. cache memory
C. volatility
D. flash memory
Which of the following represents the different information formats?
A. detail, summary, aggregate
B.document, presentation, spreadsheet, database
C. individual, department, enterprise
D. executives, managers, operational employees
What is the traditional security process that requires a user name and password?
A. single-factor authentication
B. two-factor authentication
C. multifactor authentication
D. biometrics
Which application's primary business benefits include market demand, resource and
capacity constraints, and real-time scheduling?
A. CRM
B.SCM
C. ERP
D. All of these are correct.
What modifies existing software according to the business's or user's requirements?
A.software customization
B. data integration
C. elogistics
D. eprocurement
Where would you find the suppliers' suppler in a typical supply chain?
A.upstream
B. downstream
C. in the middle
D. not on the supply chain
Which of the following represents the biggest problem of information security
breaches?
A. people misusing organizational information
B. technology failures
C. customers misusing organizational systems
D. company departments missing sales goals
What are semidynamic, semiroutine, monthly business processes such as resource
allocation, sales strategy, or manufacturing process improvements?
A. Operational business processes.
B. Managerial business processes.
C. Strategic business processes.
D. Success business processes.
Where would you categorize weaknesses in a SWOT analysis?
A. internal, helpful
B. internal, harmful
C. external, helpful
D. external, harmful
Where would you categorize a cloud computing benefit that allows a customer to store
fewer applications on a client computer, which frees up the memory allowing for
increases in performance?
A. Internet features.
B. increased costs
C.increased performance
D. increased software updates
What is the conversion of IP addresses that identifies labels that use a variety of
recognizable naming conventions?
A. domain grades
B. URL spaces
C. domain national sequences (DNS)
D.domain name system (DNS)
Which data types are typically found in the accounting department?
A. promotion data, sales data, advertising data
B. employee data, promotion data, vacation data
C. investment data, monetary data, reporting data
D. transactional data, purchasing data, payroll data, tax data
Machine-generated data is data that humans, in interaction with computers, generate.
Human-generated structured data includes input data, click-stream data, or gaming data.

Subscribe Now

Sign up to view full document

View Document