Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CAS CS 63154

July 20, 2017
Flash memory is a special type of rewritable read-only memory (ROM) that is compact
and portable.
True
False
In the basic supply chain, source refers to planning for transportation of goods to
customers.
Identity theft is the forging of someone's identity for the purpose of fraud.
Drive-by hacking is a computer attack where an attacker accesses a wireless computer
network, intercepts data, uses network services, and/or sends attack instructions without
entering the office or organization that owns the network
Mobile and wireless networks are identical and the terms can be used synonymously.
The development phase brings all the project pieces together into a special testing
environment to eliminate errors and bugs and verify that the system meets all the
business requirements defined in the analysis phase.
Mutation is a mathematical method of handling imprecise or subjective information.
Large increases in technology use, by both consumers and businesses, have greatly
amplified energy consumption.
The implementation phase involves taking all of the detailed design documents from
the design phase and transforming them into the actual system.
The control unit performs all arithmetic operations (for example, addition and
subtraction) and all logic operations.
Coaxial cable refers to a type of cable composed of four (or more) copper wires twisted
around each other within a plastic sheath.
The bullwhip effect is a standard format for the electronic exchange of information
between supply chain participants.
Gate two is elaboration, and this phase expands on the agreed-upon details of the
system, including the ability to provide an architecture to support and build it.
Text analytics analyzes unstructured data to find trends and patterns in words and
sentences. Text mining a firm's customer support email might identify which customer
service representative is best able to handle the question, allowing the system to
forward it to the right person.
Data models are logical data structures that detail the relationships among data elements
by using graphics or pictures.
A relational database management system allows users to create, read, update, and
delete data in a relational database.
Internet governance is government attempts to control Internet traffic, thus preventing
some material from being viewed by a country's citizens.
A single user license restricts the use of the software to one user at a time.
True
False
Memory cards contain high-capacity storage that holds data such as captured images,
music, or text files.
The waterfall approach is a business-driven enterprise architecture that supports
integrating a business as linked, repeatable activities, tasks, or services.
Utility computing offers a pay-per-use revenue model similar to a metered service such
as gas or electricity.
Information constraints is a measure of the quality of information.
Campaign management systems guide users through marketing campaigns by
performing such tasks as campaign definition, planning, scheduling, segmentation, and
success analysis.
Tacit knowledge consists of anything that can be documented, archived, and codified,
often with the help of MIS. Examples of tacit knowledge are assets such as patents,
trademarks, business plans, marketing research, and customer lists.
Data models can include a customer's name, address, email, discount rate, preferred
shipping method, product name, quantity ordered, and so on.
The Internet uses such strong security technologies that ensuring consumer protection is
not a challenge for ebusinesses.
Waterfall development consists of a series of tiny projects. It has become the foundation
of multiple agile methodologies.
Integrations allow separate systems to communicate directly with each other,
eliminating the need for manual entry into multiple systems.
An input device is equipment used to see, hear, or otherwise accept the results of
information processing requests.
When evaluating the 5 steps in the order-to-delivery business process, step one includes
creating a campaign and checking inventory, which are both part of the human
resources function.
A supercomputer is the fastest, most powerful, and most expensive type of computer.
Organizations such as NASA that are heavily involved in research and number
crunching employ supercomputers because of the speed with which they can process
information. Other large, customer-oriented businesses such as General Motors and
AT&T employ supercomputers just to handle customer information and transaction
processing.
True
False
Loose coupling is the capability of services to be joined together on demand to create
composite services, or disassembled just as easily into their functional component.
A data flow diagram involves graphically representing the processes that capture,
manipulate, store, and distribute information between a system and its environment.
An extranet is a restricted network that relies on Internet technologies to provide an
Internet-like environment within the company for information sharing,
communications, collaboration, web publishing, and the support of business processes.
Which methodology provides a framework for breaking down the development of
software into four gates?
A. SCRUM
B. XP
C. RAD
D.RUP
What form of processes include loan processing for a bank, claims processing for an
insurance company, reservation processing for a hotel, and baggage handling for an
airline?
A. customer-facing processes
B. business-facing processes
C. industry-specific customer-facing processes
D. All of these are correct.
Your boss has asked you to analyze the soft drink industry using Porter's five forces
model. Which of the following represents a threat of a new entrant in the soft drink
industry?
A. Pepsi requires stores that carry Pepsi products to commit to minimum orders of
1,000 cases.
B. Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf
space in every Walmart store.
C.Zevia Natural Diet Soda begins selling directly over the Internet.
D. vitamin water, fruit juice, coffee
What is a set of best practices that helps an organization to maximize the benefits of an
information system, while at the same time establishing appropriate controls to ensure
minimum errors?
A.COBIT
B. CASE
C. IEEE
D. All of these are correct.
Which of the following systems allow users to create, read, update, and delete data in a
relational database?
A. business intelligence system
B. informational database system
C.relational database management system
D. data mining system
WiMAX is a coding process that takes a digital map feature and assigns it an attribute
that serves as a unique ID (tract number, node number) or classification (soil type,
zoning category). GIS professionals are certified in geocoding practices to ensure
industry standards are met when classifying spatial data.
In which of the five basic supply chain activities do you prepare to manage all resources
required to meet demand?
A.plan
B. source
C. deliver
D. return
What is knowledge management?
A. refers to the wisdom of the crowd
B. sources capital for a project by raising many small amounts from a large number of
individuals, typically via the Internet
C. collaborating and tapping into the core knowledge of all employees, partners, and
customers
D. involves capturing, classifying, evaluating, retrieving, and sharing information assets
in a way that provides context for effective decisions and actions
Market share measures a firm's external performance relative to that of its competitors.
Which of the following represents how a firm measures market share?
A. multiplying the firm's sales by the industries total sales
B. dividing the firm's sales by the total market sales for the entire industry
C. subtracting your competitors' sales from your total sales
D. subtracting the industries' total sales from the firm's total sales
What is a competitive advantage?
A. a product that an organization's customers place a lesser value on than similar
offerings from a competitor
B. a feature of a product or service on which customers place a lesser value than they
do on similar offerings from a supplier
C. a service that an organization's customers place a lesser value on than similar
offerings from a supplier
D. a feature of a product or service on which customers place a greater value than they
do on similar offerings from competitors
What are the two main objectives associated with data mining?
A. uncovering tactics and plans
B.uncovering trends and patterns
C. uncovering intelligence and unstructured data issues
D. uncovering competitors and market advantages
What is a CPU?
A. the actual hardware that interprets and executes the program (software) instructions
and coordinates how all the other hardware devices work together
B. the computer's main memory, which consists of the random access memory (RAM),
cache memory, and the read-only memory (ROM) that is directly accessible to the
central processing unit (CPU)
C. equipment designed to store large volumes of data for long-term storage
D. equipment used to capture information and commands
The primary concern with mobile ERP is security of sensitive data, including trade
secrets, financial data, and customer data.
What is the software called that allows Internet advertisers to display advertisements
without the consent of the computer user?
A. splogs
B. adware
C. spygloss
D. CPU buzzer
What is an ezine?
A. a self-photograph placed on a social media website
B. the practice of sending brief posts to a personal blog
C. a web format used to publish frequently updated works
D. a magazine published only in electronic form on a computer network
The primary purpose of a data warehouse is to ________.
A.combine strategic information
B. organize departments
C. interface between the computer and employees
D. All of these are correct.
Netflix creates a unique recommendation listing for each customer that revisits its
website. How would you classify Netflix's ebusiness strategy?
A. information richness
B. mass customization
C. personalization
D. interactivity
Which of the following provides an accurate definition of systems thinking?
A. a way of monitoring the entire system by viewing multiple inputs being processed or
transformed to produce outputs while continuously gathering feedback on each part
B. a way of monitoring individual components including an input, the process, and an
output, while continuously gathering feedback on the entire system
C. a way of monitoring the entire system by viewing multiple inputs being processed or
transformed to produce outputs while continuously gathering feedback on the entire
system
D. a way of monitoring singular parts of a system by viewing a single input that is
processed or transformed to produce an entire system that is continuously monitored to
gather feedback on each individual part
What is the process responsible for managing how incidents are identified and
corrected?
A. technology failure
B. incident record
C.incident management
D. technology recovery strategy
Which of the following is an example of an external databases in the data warehouse
model?
A. marketing information
B. sales information
C.competitor information
D. All of these are correct.
What maps group contacts identifying who knows each other and who works together?
A. social network effects
B. mashup networking analysis
C. web network effects
D. social networking analysis
Which of the following is considered a service?
A. selling groceries
B. managing a team
C. cutting hair
D. All of these are correct.
What could a manager use to measure the success of an MIS project?
A. effectiveness MIS metrics, efficiency MIS metrics
B. effectiveness MIS metrics, expert MIS metrics
C. expert MIS metrics, executive MIS metrics
D. All of these are correct.
Which of the following is considered a core driver of the information age?
A. information
B. business intelligence
C. knowledge
D. All of these are correct.
Online transaction processing (OLTP) is the capturing of transaction and event
information using technology to _____________.
A. update existing information to reflect the new information
B. store the information
C. process the information according to defined business rules
D. All of these are correct.
What is similar to a desktop but has more powerful mathematical and graphics
processing capabilities and can perform more complicated tasks in less time?
A. tablet
B. PDA
C. workstation
D. minicomputer
What do usability effectiveness MIS metrics measure?
A. the ease with which people perform transactions and find information
B. the number of customers an organization "touches" for the first time and persuades
to purchase its products or services
C. the amount of time a system takes to perform a transaction
D. the number of hours a system is available for users
What is call scripting?
A. a place where customer service representatives answer customer inquiries and solve
problems, usually by email, chat, or phone
B. customers use the web to find answers to their questions or solutions to their
problems
C. a system that gathers product details and issue resolution information, which can be
automatically generated into a script for the representative to read to the customer
D. a form of predictive analytics for marketing campaigns that attempts to identify
target markets or people who could be convinced to buy products
Which of the following is a business-related consequence of failing software?
A. decrease productivity
B. damage to brand reputation
C. increased liabilities
D.All of these are correct.
What is the computer's primary working memory, in which program instructions and
data are stored so that they can be accessed directly by the CPU via the processor's
high-speed external data bus?
A. RAM
B. ROM
C. volatility
D. flash memory
A system is a collection of parts that link to achieve a common purpose. Systems
thinking is a way of monitoring _____________.
A. the entire system
B. a division within the sales role
C. the executive team
D. the company's competitors
What limits the number of instructions the CPU can execute to increase processing
speed?
A. megahertz
B. gigahertz
C. CISC
D. RISC
What is the difference between hardware and software?
A.Hardware is the physical devices associated with a computer system, where software
is the instructions the hardware executes to carry out tasks.
B. They are both specific forms of clients.
C. Hardware executes the instructions to carry out tasks, where software is the physical
devices associated with a computer system.
D. They are both specific forms of servers.
What is a common association detection analysis technique where you analyze certain
items to detect customers' buying behavior and predict future behavior?
A. clustering factors
B. mashup technology
C.market basket analysis
D. drill-down basket analysis