Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CICS 28285

July 20, 2017
Ecommerce is the buying and selling of goods and services over the Internet.
Ecommerce refers only to online transactions.
Investment companies use genetic effectiveness metrics to help in trading decisions.
A data mart is the process of analyzing data to extract information not offered by the
raw data alone.
Real-time systems provide real-time information in response to requests.
The application layer handles end-to-end packet transportation.
A common type of minicomputer is a server and is used for managing internal company
applications, networks, and websites.
True
False
Multi-tenancy in the cloud means that a single instance of a system serves multiple
customers. In the cloud, each customer is called a tenant and multiple tenants can
access the same system.
A supercomputer is the fastest, most powerful, and most expensive type of computer.
Organizations such as NASA that are heavily involved in research and number
crunching employ supercomputers because of the speed with which they can process
information. Other large, customer-oriented businesses such as General Motors and
AT&T employ supercomputers just to handle customer information and transaction
processing.
Software upgrade occurs when the software vendor releases a new version of the
software making significant changes to the program.
True
False
A model is a simplified representation or abstraction of reality.
The physical view of information focuses on how individual users logically access
information to meet their own particular business needs.
An input device is equipment used to see, hear, or otherwise accept the results of
information processing requests.
True
False
Operating system software controls the application software and manages how the
hardware devices work together. When using Excel to create and print a graph, the
operating system software controls the process, ensures that a printer is attached and
has paper, and sends the graph to the printer along with instructions on how to print it.
Some computers are configured with two operating systems so they can dual
bootprovide the user with the option of choosing the operating system when the
computer is turned on.
True
False
Preventative maintenance makes system changes to reduce the chance of future system
failure.
Control objects for information and related technology (COBIT) is a set of best
practices that helps an organization to maximize the benefits of an information system,
while at the same time establishing appropriate controls to ensure minimum errors.
Private cloud serves only one customer or organization and can be located on the
customer's premises or off the customer's premises.
The four primary traits of the value of information include levels, formats, granularities,
and type.
Projects are typically dynamic in nature, and change should be expected and anticipated
for successful project completion.
Content providers are companies that generate revenue by providing digital content
such as news, music, photos, or videos, and examples include Netflix and iTunes.
Consistent information asks if the aggregate or summary information is in agreement
with detailed information.
Pilot implementation installs the new system in phases (for example by department)
until it is verified that it works correctly.
SOA promotes a scalable and flexible enterprise architecture that can implement new or
reuse existing MIS components, creating connections among disparate applications and
systems.
A workstation computer is similar to a desktop but has more powerful mathematical and
graphics processing capabilities and can perform more complicated tasks in less time.
Social tagging describes the collaborative activity of marking shared online content
with keywords or tags as a way to organize it for future navigation, filtering, or search.
Distributed computing processes and manages algorithms across many machines in a
computing environment.
Business intelligence is information collected from multiple sources such as suppliers,
customers, competitors, partners, and industries that analyzes patterns, trends, and
relationships for strategic decision making.
Mass customization is the ability of an organization to tailor its products or services to
the customers' specifications. For example, customers can order M&M's in special
colors or with customized sayings such as "Marry Me"
Spyware can remove software that is no longer needed.
Hardware is a computer dedicated to providing information in response to requests.
URLs use domain names to identify particular websites.
Storage virtualization combines multiple network storage devices so they appear to be a
single storage device.
Mobile application management (MAM) remotely controls smart phones and tablets,
ensuring data security.
Network convergence is the integration of communication channels into a single
service.
Project milestones are any measurable, tangible, verifiable outcome, result, or item that
is produced to complete a project or part of a project.
Back-office operations deal directly with the customer.
What includes the carbon dioxide and carbon monoxide in the atmosphere, produced by
business processes and systems?
A. ewaste
B. energy consumption
C.carbon emissions
D. sustainable MIS
What do both GPS and GIS use?
A. the geographic location of features and boundaries on Earth, such as natural or
constructed features, oceans, and more
B. business assets linked to a centralized system where they can be tracked and
monitored over time
C. a coding process that assigns a digital map feature to an attribute that serves as a
unique ID (tract number, node number) or classification (soil type, zoning category)
D.location-based services (LBS) applications that use location information to provide a
service
What is a community center that provides technology, manufacturing equipment, and
educational opportunities to the public that would otherwise be inaccessible or
unaffordable?
A. computer-aided design/computer-aided manufacturing
B. maker movement
C. makerspace
D. RFID electronic product code
What is a disciplined approach for constructing information systems through the use of
common methods, techniques, or tools?
A. software
B. software testing
C. software engineering
D.All of these are correct.
What is it called when a hacker looks through your trash to find personal information?
A. striker bunny
B. dumpster diving
C. trash retrieval
D. approved consent
Which of the following clauses is typically contained in an acceptable use policy?
A. a nonrepudiation clause
B. a repudiation clause
C. a confidentiality clause
D. an employee use clause
Which of the following represents the classic example of unintentional information
reuse?
A. phone number
B.social Security number
C. address
D. driver's license number
An API is a set of routines, protocols, and tools for ________.
A. building software applications
B. providing a visual interface for a web mashup
C. describing how products in a network work
D. writing and editing HTML
What is enterprise application integration (EAI)?
A.an integration method that connects the plans, methods, and tools aimed at
integrating separate enterprise system
B. the integration of data from multiple sources, which provides a unified view of all
data
C. an integration method that sends information entered into a given system
automatically to all downstream systems and processes
D. enterprisewide support and data access for a firm's operations and business processes
What is customer order cycle time?
A. an unfilled customer order for a product that is out of stock
B. the time it takes to manufacture a product and deliver it to the retailer
C. the agreed upon time between the purchase of a product and the delivery of the
product
D. the frequency of inventory replacement
What is drive-by hacking?
A. a special class of adware that collects data about the user and transmits it over the
Internet without the user's knowledge or permission
B. experts in technology who use their knowledge to break into computers and
computer networks, either for profit or just motivated by the challenge
C. a computer attack where an attacker accesses a wireless computer network,
intercepts data, uses network services, and/or sends attack instructions without entering
the office or organization that owns the network
D. software that, while purporting to serve some useful function and often fulfilling that
function, also allows Internet advertisers to display advertisements without the consent
of the computer user
What is a hacker who breaks into other people's computer systems and may just look
around or steal and destroy information?
A. script kiddies
B. black-hat hacker
C. white-hat hacker
D. cracker
What is a service that allows the owner of a domain name to maintain a simple website
and provide email capacity?
A. domain name
B. domain name hosting
C. applet
D. paradigm shift
Which of the following is considered a type of biometrics?
A. voice
B. face
C. iris
D. All of these are considered biometrics.
Which of the following is not a common form of data mining analysis?
A.division organization
B. classification
C. estimation
D. clustering
Which of the following is a type of effectiveness MIS metric?
A. transaction speed
B. system availability
C. usability
D. throughput
Which network uses radio signals to transmit and receive data over distances of a few
hundred feet?
A. WMAN
B. WWAN
C. PAN
D.WLAN
What is a broad term encompassing the protection of information from accidental or
intentional misuse by persons inside or outside an organization?
A. information security
B. physical security
C. drive-by hacking
D. adware
Which of the following is not a valid way that a CRM system can collect information?
A. accounting system
B. order fulfillment system
C. inventory system
D.customer's personal computer
What is a simplified representation or abstraction of reality?
A. model
B. metric
C. redundancy
D. sensitivity analysis
What is adware?
A. a special class of adware that collects data about the user and transmits it over the
Internet without the user's knowledge or permission
B. experts in technology who use their knowledge to break into computers and
computer networks, either for profit or just motivated by the challenge
C. a computer attack where an attacker accesses a wireless computer network,
intercepts data, uses network services, and/or sends attack instructions without entering
the office or organization that owns the network
D. software that, while purporting to serve some useful function and often fulfilling that
function, also allows Internet advertisers to display advertisements without the consent
of the computer user
What is scalability?
A. a system that is not operating and cannot be used
B. refers to the ability of an application to operate on different devices or software
platforms, such as different operating systems
C. the degree to which a system is easy to learn and efficient and satisfying to use
D.describes how well a system can scale up, or adapt to the increased demands of
growth
Trust between companies, customers, partners, and suppliers are the support structure of
which of the following?
A. ebusiness
B. eharmony
C. esoftware
D. epolicies
Which of the following is not one of the five basic components of supply chain
management?
A. plan
B. source
C. analyze
D. deliver
What is the practice of sending brief posts of 140–200 characters in length to a
personal blog either publicly or to a private group of subscribers?
A. ebusiness model
B. tagging
C. blogging
D. microblog
Which of the following does not represent a category of AI?
A. genetic algorithms
B. neural networks
C. expert systems
D. consolidation
What requires the user to provide two means of authentication, what the user knows
(password) and what the user has (security token)?
A. single-factor authentication
B. two-factor authentication
C. multifactor authentication
D. biometrics
What enables users to navigate the World Wide Web? The two leading browsers are
Netscape Navigator and Microsoft Internet Explorer.
A. a browser
B. a network user license
C. groupware
D. PIM software
In terms of big data what includes different forms of structured and unstructured data?
A.variety
B. veracity
C. volume
D. velocity
What measures how quickly a system performs a process or transaction?
A. portability
B. capacity planning
C.performance
D. sustainability
A disaster recovery plan contains a ________ that outlines the costs to support the plan.
A. disaster organizational cost analysis
B. disaster recovery improvements
C. disaster financial costs
D.disaster recovery cost curve

Subscribe Now

Sign up to view full document

View Document