Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CICS 78407

July 20, 2017
Gate one includes inception, and this phase ensures that all stakeholders have a shared
understanding of the proposed system and what it will do.
Instant messaging (IMing) is a service that enables instant or real-time communication
between people.
Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue
models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Lettuce, tomatoes, patty, bun, and ketchup are included in the output of making a
hamburger.
Instant messaging converts an audio broadcast to a digital music player.
Entities are the data elements associated with an attribute.
Cybervandalism is the electronic defacing of an existing website.
Peer-to-peer uses IP technology to transmit telephone calls.
Strategic decisions are highly structured decisions.
LBS differ from RFID in that an LBS cannot track and monitor objects such as
inventory.
Metadata are logical data structures that detail the relationships among data elements by
using graphics or pictures.
Mobile device management (MDM) administers and delivers applications to corporate
and personal smart phones and tablets.
Competitive click-fraud is a computer crime where a competitor or disgruntled
employee increases a company's search advertising costs by repeatedly clicking on the
advertiser's link.
Products are distributed to customers and their downstream customers at all levels.
The primary goal of an As-Is process model is to simplify, eliminate, and improve the
To-Be processes.
Performance measures how quickly a system performs a process or transaction.
Logistics controls processes inside a company (warehouse logistics) and outside a
company (transport logistics) and focuses on the physical execution part of the supply
chain.
Logistics includes the processes that control the distribution, maintenance, and
replacement of materials and personnel to support the supply chain.
Simple Network Management Protocol (SNMP) allows networked nodes to be
managed from a single point.
A data center is a facility used to house management information systems and
associated components, such as telecommunications and storage systems.
An intranet is an extension of an intranet that is available only to authorized outsiders,
such as customers, partners, and suppliers.
A warm site is a separate and fully equipped facility where the company can move
immediately after a disaster and resume business.
Inbound logistics acquires raw materials and resources and distributes them to
manufacturing as required.
System restore enables a user to return to the previous operating system.
True
False
Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit
organization that has assumed the responsibility for Internet Protocol (IP) address space
allocation, protocol parameter assignment, domain name system management, and root
server system management functions previously performed under U.S. government
contract.
Fiber optic (or optical fiber) refers to the technology associated with the transmission of
information as light impulses along a glass wire or fiber.
Network convergence includes TCP/IP and FTP.
Server virtualization combines the physical resources, such as servers, processors, and
operating systems, from the applications.
Utility software provides additional functionality to the operating system. Utility
software includes antivirus software, screen savers, and anti-spam software.
True
False
A leadership plan that achieves a specific set of goals or objectives is a business
strategy.
Machine to machine (M2M) refers to devices that connect directly to other devices.
Virtual reality is the viewing of the physical world with computer-generated layers of
information added to it.
Packets directly impact network performance and reliability by subdividing an
electronic message into smaller more manageable packets.
Discovery prototyping builds a small-scale representation or working model of the
system to ensure that it meets the user and business requirements.
The customers' customer is upstream in the supply chain.
If you want to support organization change, you will focus on building a strong
information MIS infrastructure, which identifies where and how important information,
such as customer records, is maintained and secured.
A WAN is a card that plugs into the back (or side) of your computers and lets them send
and receive messages from other computers.
Requirements management is the process of managing changes to the business
requirements throughout the project.
A MAN is a set of communication rules to make sure that everyone speaks the same
language.
VoIP allows users to ________.
A. call anyone with a local telephone number
B. call anyone with an international telephone number
C. call anyone with a cellular telephone number
D.All of these are correct.
What is data governance?
A. occurs when the same data element has different values
B. occurs when a system produces incorrect, inconsistent, or duplicate data
C.refers to the overall management of the availability, usability, integrity, and security
of company data
D. the practice of gathering data and ensuring that it is uniform, accurate, consistent,
and complete, including such entities as customers, suppliers, products, sales,
employees, and other critical entities that are commonly integrated across
organizational systems
Which of the following is a set of tools that supports the work of teams or groups by
facilitating the sharing and flow of information?
A. collaboration system
B. collective system
C. competitive system
D. real simple syndication system
What are measurements that evaluate results to determine whether a project is meeting
its goals?
A. models
B. metrics
C. benchmarks
D. genetic algorithms
What is WiMAX?
A.Worldwide Interoperability for Microwave Access
B. World Interconnected through Mobile Awareness
C. World Interorganizations for Mobile Access
D. Wide International for Misinformation Access
Which of the following would you find in a typical Internet use policy?
A. user ramifications if the policy is violated
B. user responsibility for properly handling offensive material
C. user responsibility for protecting the company's good name
D. All of these are correct.
Which methodology is owned by IBM?
A. SCRUM
B. XP
C. RAD
D.RUP
The accounting and finance department performs processes such as creating financial
statements, paying accounts payables, and collecting accounts receivables. What form
of processes do these represent?
A. customer-facing processes
B. business-facing processes
C. industry-specific customer facing processes
D. All of these are correct.
Which question below represents a CRM predicting technology question?
A. Why did sales not meet forecasts?
B.What customers are at risk of leaving?
C. What is the total revenue by customer?
D. All of these are correct.
Which of the following best describes Web 3.0?
A. user-generated online business
B. based on the "intelligent" web where applications use natural language processing
C. collaboration and social media
D. All of these are correct.
What is the software that makes the benefits of cloud computing possible, such as
multi-tenancy?
A. multi-tenancy
B. single-tenancy
C.cloud fabric
D. cloud fabric controller
Which of the following represents the primary forms of ebusiness?
A. email, instant messaging, podcasting, content management systems, and video and
web conferencing
B. content providers, infomediaries, online marketplaces, portals, service providers,
transaction brokers
C. B2B, B2C, C2C, C2B
D. advertising fees, license fees, subscription fees, transaction fees, value-added
services fees
Which of the following is not a network topology?
A. bus
B. ring
C. ethernet
D. star
What is enterprise application integration (EAI)?
A. the management of information flows between and among activities in a supply
chain to maximize total supply chain effectiveness and corporate profitability
B. the integration of all departments and functions throughout an organization into a
single IT system (or integrated set of IT systems) so employees can make decisions by
viewing enterprisewide information about all business operations
C. a means of managing all aspects of a customer's relationship with an organization to
increase customer loyalty and retention and an organization's profitability
D.information that connects the plans, methods, and tools aimed at integrating separate
enterprise system
For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate
franchises. To increase business Perry spends a great deal of money marketing and
advertising his businesses online. Perry decides he would like to move beyond just
marketing and create an actual ebusiness that acts like a search engine but only focuses
on the real estate industry. The main revenue source for this Perry's ebusiness will be a
charge of $50 a month for each property that is listed on the website. What is the
primary revenue model for Perry's new business?
A. license fees
B. advertising fees
C. subscription fees
D. All of these are correct.
What programming languages look similar to human languages?
A. scripting language
B. object-oriented language
C.fourth generation language
D. All of these are correct.
Which of the following processes focuses on the entire customer order process and
operates across functional departments?
A. order to delivery process
B. customer billing process
C. customer loan process
D. All of these are correct.
What has the ability to recover information or systems in the event of catastrophic
disasters?
A. recovery
B.disaster recovery
C. backup
D. failback
Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?
A. genetic algorithms
B. artificial intelligence
C. fuzzy logic
D. intelligent agents
Which of the choices below represents the definition of information property?
A. an ethical issue that focuses on who owns information about individuals and how
information can be sold and exchanged
B. a method or system of government for information management or control
C. the category of computer security that addresses the protection of data from
unauthorized disclosure and confirmation of data source authenticity
D. examines the organizational resource of information and regulates its definitions,
uses, values, and distribution, ensuring that it has the types of data/information required
to function and grow effectively
What is a foreign key?
A. a field that uniquely identifies a given record in a table
B.a primary key of one table that appears as an attribute in another table and acts to
provide a logical relationship between the two tables
C. a table that uniquely identifies a given record in a field
D. a foreign key of one table that appears as an entity in another table and acts to
provide a logical relationship between the two records
At which level of an organization are employees continuously evaluating company
operations to hone the firm's abilities to identify, adapt to, and leverage change?
A. operational level
B. managerial level
C. strategic level
D. All of these are correct.
Your boss has asked you to analyze the airline industry using Porter's three generic
strategies. Which of the following companies are using a focused strategy?
A. Southwest, Horizon, Frontier, JetBlue
B. British Airways, Singapore Airlines, Virgin Atlantic
C.Sky Taxi " a rent by the hour personal plane service
D. All of these are correct.
What is a method of sending audio and video files over the Internet in such a way that
the user can view the file while it is being transferred?
A.streaming
B. streamlining
C. networking
D. wireless
Which of the following statements is correct when considering a SWOT analysis?
A. Strengths and weaknesses originate inside an organization.
B. Opportunities and threats originate inside an organization.
C. Strengths and threats originate inside an organization.
D. Opportunities and weaknesses originate outside an organization.
Which of the following is the most commonly used form of AI in the business arena?
A. intelligent system
B. artificial intelligence
C. expert system
D. neural network
What are factors considered to be true, real, or certain without proof or demonstration?
A. project plan
B. project constraints
C.project assumptions
D. project deliverable
What service delivers hardware networking capabilities, including the use of servers,
networking, and storage over the cloud using a pay-per-use revenue model?
A.infrastructure as a Service (IaaS)
B. disaster recovery as a service (DRaaS)
C. software as a Service (SaaS)
D. platform as a Service (PaaS)
What distributes goods and services to customers?
A. inbound logistics
B.outbound logistics
C. logistics
D. cradle to grave
What is the ebusiness model that applies to customers offering goods and services to
each other over the Internet?
A. C2C
B. C2B
C. B2B
D. B2C
What is a mail bomb?
A. sending a massive amount of email to a specific person or system resulting in filling
up the recipient's disk space
B. a contractual stipulation to ensure that ebusiness participants do not deny their online
actions
C. sending a few emails to a specific person or system resulting in filling up the
recipient's disk space
D. a contractual stipulation to ensure that ebusiness participants deny their online
actions
A GIS map ________.
A.links business assets to a centralized system where they can be tracked and monitored
over time
B. identifies the geographic location of features and boundaries on Earth, such as
natural or constructed features, oceans, and more
C. stores, views, and analyzes geographic data, creating multidimensional charts or
maps
D. becomes a round coin-sized object that is uniquely numbered and hidden in
geocache

Subscribe Now

Sign up to view full document

View Document