Book Title
Business Driven Information Systems 5th Edition

CDA 98846

July 20, 2017
Bread, cheese, and butter are included in the process of making a grilled cheese
Robotics supports procurement.
Random access memory is the portion of a computer's primary storage that does not
lose its contents when one switches off the power.
A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache.
Geocoins can also be shaped to match a theme like the state of Colorado or a birthday
party hat. Geocoins are often decorative or commemorative, making them collectible
and highly valuable for technology adventures.
Logistics includes activities that govern the flow of tangible, physical materials through
the supply chain such as shipping, transport, distribution, and warehousing.
Choosing not to fire a sales representative who is underperforming, knowing that
person is experiencing family problems, is a form of knowledge.
A forward integration takes information entered into a given system and sends it
automatically to all downstream systems and processes.
Companies today are successful when they combine the power of the information age
with traditional business methods.
Gate three is construction, and this phase includes building and developing the product.
A fact is the confirmation or validation of an event or object. In the past, people
primarily learned facts from books.
A geographic information system (GIS) stores, views, and analyzes geographic data,
creating multidimensional charts or maps.
Ebusiness is something that a business can just go out and buy.
File and data recovery software retrieves accidental deletion of photos or documents.
Network virtualization combines multiple network storage devices so they appear to be
a single storage device.
Efficiency MIS metrics measure the impact MIS has on business processes and
activities, including customer satisfaction and customer conversion rates.
The WWW provides access to Internet information through documents including text,
graphics, audio, and video files that use a special formatting language called HTML.
Competitive advantages provide the same product or service either at a lower price or
with additional value that can fetch premium prices.
SCM, CRM, and ERP are all extended ERP components.
Intellectual property is intangible creative work that is embodied in physical form and
includes copyrights, trademarks, and patents.
Cyberbullying is an act or object that poses a danger to assets.
Interactive voice response directs customers to use touch-tone phones or keywords to
navigate or provide information.
Data elements can include a customer's name, address, email, discount rate, preferred
shipping method, product name, quantity ordered, and so on.
War driving is deliberately searching for Wi-Fi signals while driving by in a vehicle.
Call scripting systems gather product details and issue-resolution information that can
be automatically generated into a script for the representative to read to the customer.
Decreasing customer loyalty, increasing costs, and decreasing sales are all examples of
business strategies.
A tablet computer has a flat screen that uses a mouse or fingertip for input instead of a
keyboard. Similar to PDAs, tablet PCs use a writing pen or stylus to write notes on the
screen and touch the screen to perform functions such as clicking on a link while
visiting a website.
Single-tenancy occurs when each customer or tenant must purchase and maintain an
individual system.
In the basic supply chain, return refers to supporting customers and product returns.
A web service is a markup language for documents, containing structured information.
Usability is how quickly a third-party or vendor can change a system to ensure it meets
user needs and the terms of any contracts including agreed levels of reliability,
maintainability, or availability.
A data-driven website is an interactive website kept constantly updated and relevant to
the needs of its customers using a database.
Project deliverables represent key dates when a certain group of activities must be
Maintainability determines future environmental infrastructure requirements to ensure
high-quality system performance.
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain
building access where they pose as employees to gain access to the company network.
A service is the capability of services to be joined together on demand to create
composite services, or disassembled just as easily into their functional component.
The value chain will group a company's activities into two categories: primary value
activities and support value activities.
The most common form of collective intelligence found outside the organization is
crowdsourcing, or the wisdom of the crowd.
Operational decisions, or semistructured decisions, arise in situations where established
processes offer potential solutions.
Preventive security software, through programs such as Window Washer, erases file
histories, browser cookies, cache contents, and other crumbs that applications and
Windows leave on a hard drive.
Which of the following represents businesses buying from and selling to each other
over the Internet?
A. B2B
B. B2C
C. C2B
D. C2C
What discovers optimal sales channels by selecting the right partners and identifying
mutual customers?
A. supplier relationship management
B.partner relationship management
C. employee relationship management
D. All of these are correct.
What is single-factor authentication?
A. the traditional security process, which requires a user name and password
B. requires the user to provide two means of authentication, what the user knows
(password) and what the user has (security token)
C. requires more than two means of authentication such as what the user knows
(password), what the user has (security token), and what the user is (biometric
D. the identification of a user based on a physical characteristic such as a fingerprint,
iris, face, voice or handwriting
The bandwidths associated with Wi-Fi are separated according to several wireless
networking standards, known as ________, for carrying out wireless local area network
A. bits
C. 80118091
D. 91210
Which process attempts to understand and measure the current process and make
A. business process mapping
B. business process reengineering
C. business process improvement
D. business process model
What is the standard Internet protocol, which provides the technical foundation for the
public Internet?
A. data streaming and DSL protocols
B.transmission control protocol/Internet protocol (TCP/IP)
C. data streaming rules and regulations
D. Internet protocol/Transmission control protocol (IP/TCP)
What refers to denying permissions to incoming emails?
A. opt out
B. opt in
D. nonrepudiation
What is a method for confirming users' identities?
A. phishing
B. authentication
C. authorization
D. programming
What do cargo transport systems, book distribution centers, the video game market, a
flu epidemic, and an ant colony have in common?
A. They are all expert systems.
B. They are all genetic algorithm systems.
C. They are all neural network systems.
D. They are all complex adaptive systems.
What is a policy that allows employees to use their personal mobile devices and
computers to access enterprise data and applications?
A. cyberbullying
B. fair information practices
C. click-fraud
D.bring your own device
What is the viewing of the physical world with computer-generated layers of
information added to it?
A. virtual reality
B. augmented reality
C. virtual workforce
D. All of these are correct.
What is a social graph?
A. represents the interconnection of relationships in a social network
B. maps group contacts identifying who knows each other and who works together
C. describes the collaborative activity of marking shared online content with keywords
or tags as a way to organize it for future navigation, filtering, or search
D. a keyword or phrase used to identify a topic and is preceded by a hash or pound sign
What displays information graphically so it can be easily understood?
A. informing
C. data visualization
D. business intelligence dashboards
Which category below represents the three common forms of business operations:
brick-and-mortar, click-and-mortar, and pure play?
A. C2B
B. C2C
C. B2C
D. All of these are correct.
What analyzes unstructured data associated with websites to identify consumer
behavior and website navigation?
A. social media analytics
B. speech analytics
C. text analytics
D. web analytics
What is a computer designed to meet the computing needs of hundreds of people in a
large business environment?
A. supercomputer
B. mainframe computer
C. workstation computer
D. minicomputer
What is a program, when installed on a computer, records every keystroke and mouse
A. key logger software
B. spyware
C. cookie
D. adware
If you were thinking about an oven as a system, which of the following represents the
A. the uncooked food
B. the cooked food
C. a light indicating that the oven has reached the preheated temperature
D. the oven running at 350 degrees for 20 minutes
Which of the following represents the two fundamental building blocks that protect
organizational information?
A. security and sales
B. human resources and security
C.ethics and security
D. ethics and technology
Which of the following represents the department that maintains policies, plans, and
procedures for the effective management of employees?
A. human resources
B. sales
C. employee resources
D. employee relations
What encompasses all of the information contained within a single business process or
unit of work and its primary purpose is to support the performing of daily operational
A.transactional information
B. analytical information
C. timeliness
D. quality
Which of the following is a benefit an organization can receive from outsourcing?
A. financial savings
B. increase technical abilities
C. market agility
D.All of these are correct.
What is the business process model that ensures the process is fully and clearly
understood before the details of a process solution are decided upon?
A. As-Is process model
B. business process reengineering model
C. customer facing process
D. To-Be process model
Which of the following occurs when organizations use software that filters content,
such as email, to prevent the accidental or malicious transmission of unauthorized
A. antivirus software
B. content filtering
C. encryption
D. firewalls
What contains high-capacity storage that holds data such as captured images, music, or
text files?
B. a memory stick
C. a memory card
D. flash memory
Assume you are in the business of producing and selling t-shirts. If you could produce
more t-shirts with the same input, what would happen to your productivity and profits
assuming the price of your t-shirts remains the same?
A. increase in productivity, decrease in profits
B. increase in productivity, increase in profits
C. decrease in productivity, decrease in profits
D. decrease in productivity, increase in profits
What is estimated time of arrival (ETA)?
A. a device that measures the acceleration (the rate of change of velocity) of an item
and is used to track truck speeds or taxi cab speeds
B. a GPS technology adventure game that posts the longitude and latitude location for
an item on the Internet for users to find
C. a north/south measurement of position
D.the time of day of an expected arrival at a certain destination and is typically used for
navigation applications
What detects the presence or absence of a mark in a predetermined place (popular for
multiple-choice exams)?
A. magnetic ink character reader
B. optical-character recognition
C. optical-mark recognition
D. point-of-sale
What is HTML 5?
A. delivers everything from animation to graphics and music to movies
B. an international community that develops open standards to ensure the long-term
growth of the Web
C. a nonprofit organization that has assumed the responsibility for Internet Protocol (IP)
address space allocation, protocol parameter assignment, and domain name system
D. the Internet protocol web browsers use to request and display web pages using
universal resource locators
As the product manager for the eatery division at Whole Foods, Jerry is responsible for
analyzing sales data to help him manage his team. Today Jerry is analyzing his data
using aggregation techniques allowing him to see simple roll-ups to complex groupings
of interrelated information. Which of the following common digital dashboard
capabilities is Jerry using to analyze his department's success?
A. slice-and-dice
B. pivot
C. drill-down
D. consolidation
What is storage virtualization?
A.combines multiple network storage devices so they appear to be a single storage
B. combines networks by splitting the available bandwidth into independent channels
that can be assigned in real time to a specific device
C. combines the physical resources, such as servers, processors, and operating systems,
from the applications
D. offers backup services that use cloud resources to protect applications and data from
disruption caused by disaster
Your boss has asked you to analyze the soft drink industry using Porter's five forces
model. Which of the following represents a substitute product in the soft drink industry?
A. Pepsi requires stores that carry Pepsi products to commit to minimum orders of
1,000 cases.
B. Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf
space in every Walmart store.
C. Zevia Natural Diet Soda begins selling directly over the Internet.
D. vitamin water, fruit juice, coffee