Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CICS 80603

July 19, 2017
A primary key is a field (or group of fields) that uniquely identifies a given record in a
table.
The majority of eBay's customers are using a business-to-business (B2B) ebusiness
model.
Availability refers to the time frames when the system is operational.
Fifth-generation programming languages are artificial intelligence and neural networks.
At the operational level, employees develop, control, and maintain core business
activities required to run the day-to-day operations.
A static process uses a systematic approach in an attempt to improve business
effectiveness and efficiency continuously. Managers constantly attempt to optimize
static process.
High availability occurs when a system is continuously operational at all times.
Post-implementation reports are formal reports or audits of a project after it is
up-and-running.
A warm site is a separate facility with computer equipment that requires installation and
configuration.
Materials management includes activities that govern the flow of tangible, physical
materials through the supply chain such as shipping, transport, distribution, and
warehousing.
Content used in mashups is typically sourced from an RSS, which is a set of routines,
protocols, and tools for building software applications.
Top managers use social intelligence to define the future of the business, analyzing
markets, industries, and economies to determine the strategic direction the company
must follow to remain unprofitable.
Magnetic medium is a secondary storage medium that uses magnetic techniques to store
and retrieve data on disks or tapes coated with magnetically sensitive materials.
Association detection occurs when the user goes into an emotional state of
over-analysis (or over-thinking) a situation so that a decision or action is never taken, in
effect paralyzing the outcome.
The arithmetic-logic unit includes instructions and literally tells the other hardware
devices what to do, based on the software instructions.
True
False
As the business and its strategies change, so do the dynamic processes. Examples of
dynamic processes include managing layoffs of employees, changing order levels based
on currency rates, and canceling business travel due to extreme weather.
Pretexting is a form of social engineering in which one individual lies to obtain
confidential data about another individual.
Megahertz is the number of billions of CPU cycles per second.
Determining if all total columns equal the true total of the individual item is an example
of a consistent characteristic of high-quality information.
Velocity includes the analysis of streaming data as it travels around the Internet.
Conversion modifies software to meet specific user or business requirements.
An enterprise architect is a person grounded in technology, fluent in business, and able
to provide the important bridge between MIS and the business.
A foreign key uniquely identifies a given record in a table.
Information security is a broad term encompassing the protection of information from
accidental or intentional misuse by persons inside or outside an organization.
An overview of systems thinking includes input, process, output, and finances.
Real-time information refers to the extent of detail within the information (fine and
detailed or coarse and abstract).
The WWW, such as Internet Explorer or Mozilla's Firefox, allows users to access
organization systems.
Intermediaries occur when a customer sells directly to another customer online cutting
out the intermediary.
ETL stands for extraction, transformation, and loading.
Energy consumption is the amount of energy consumed by business processes and
systems.
Extensible Markup Language (XML) is a markup language for documents, containing
structured information.
A hashtag represents the interconnection of relationships in a social network.
Web-based self-service systems allow customers to use the web to find answers to their
questions or solutions to their problems.
A server is a computer designed to request information from a server. A server is a
computer dedicated to providing information in response to requests.
Accounting and finance ERP components manage accounting data and financial
processes within the enterprise with functions such as general ledger, accounts payable,
accounts receivable, budgeting, and asset management.
Which of the following offers an example of an intelligent agent that uses a multi-agent
system?
A. a cargo transport system
B. book distribution center
C. a flu epidemic
D. All of these are correct.
What is a technique for generating ideas by encouraging participants to offer as many
ideas as possible in a short period without any analysis until all the ideas have been
exhausted?
A.Brainstorming.
B. Change agent.
C. Test conditions.
D. Bugs.
What are the two main methods for encrypting network traffic on the web?
A. SSL and HTTP
B.SSL and SHTTP
C. DSL and HTTP
D. HTML and SHTTP
What is interoperability?
A. a business-driven enterprise architecture that supports integrating a business as
linked, repeatable activities, tasks, or services
B. a business task
C. the capability of services to be joined together on demand to create composite
services, or disassembled just as easily into their functional component
D.the capability of two or more computer systems to share data and resources, even
though they are made by different manufacturers
Amazon creates a unique recommendation listing for each customer that revisits its
website. How would you classify Amazon's ebusiness strategy?
A. information richness
B. mass customization
C. personalization
D. interactivity
Tom Jordan is a manager for a McDonald's restaurant. Many of his key responsibilities
include analyzing data and making key decisions for the success of his store. Tom's
store has been experiencing decreased sales for breakfast services over the past 3
months. Tom is unsure why breakfast revenues are down while lunch and dinner
revenues remain unchanged. Tom believes that he can drive revenue up by
implementing a few different breakfast promotions, such as free coffee or hash browns
with the purchase of a meal. Tom performs an extensive analysis of how continuous
changes in breakfast promotions could impact his daily revenue. What type of DSS
analysis is Tom performing?
A. optimization analysis
B. sensitivity analysis
C. transaction analysis
D. goal-seeking analysis
Which activities do production and materials management components perform?
A. track employee information including payroll, benefits, compensation, performance
assessment, and assumes compliance with the legal requirements of multiple
jurisdictions and tax authorities
B.handle the various aspects of production planning and execution such as demand
forecasting, production scheduling, job cost accounting, and quality control
C. manage accounting data and financial processes within the enterprise with functions
such as general ledger, accounts payable, accounts receivable, budgeting, and asset
management
D. None of these are correct.
Working at a ski resort in the mountains has its own unique security issues. Kenny is
the chief information officer for Sundance Ski Resort, and he is faced with both
physical and information security threats every month. Since the resort implemented a
new software system, they have been having larger number of threats and breaches of
company information. He suspects that this may be the cause of an internal employee.
He needs to clarify and establish what type of plan to help reduce further problems?
A. an information security plan
B. an ethical information policy
C. an antivirus plan
D. None of these are correct.
Which type of ebusiness model best describes Apple?
A. pure-play
B. brick-and-mortar
C. click-and-mortar
D. virtual
What is a technological solution that allows publishers to control their digital media to
discourage, limit, or prevent illegal copying and distribution?
A. ediscovery
B. Child Online Protection Act
C.digital rights management
D. pirated software
Which of the following is a valid type of integrity constraint?
A. relational-critical integrity constraint
B. business integrity constraint
C. relational integrity constraint
D. business-critical integrity constraint
Which of the following represents the types of data commonly found in the human
resources department?
A. financial data
B. technology data
C. production data
D. employee data
What is corporate social responsibility?
A. a subset of sustainable MIS, refers to the environmentally responsible use,
manufacture, and disposal of technology products and computer equipment
B.a company's acknowledged responsibility to society
C. reuses or refurbishes ewaste and creates a new product
D. stores, manages, and processes data and applications over the Internet rather than on
a personal computer or server
What removes any software that employs a user's Internet connection in the background
without the user's knowledge or explicit permission?
A. preventive security software
B. spyware software
C. crash-proof software
D. disk image software
What is similar to a desktop but has more powerful mathematical and graphics
processing capabilities and can perform more complicated tasks in less time?
A. tablet
B. PDA
C. workstation
D. minicomputer
Which of the following is a tool a manager can use to analyze competitive intelligence
and identify competitive advantages?
A. the three generic strategies
B. the threat of substitute buyer power
C. differentiated costs
D. supplier loyalty
What is roughly 1 million bytes?
A. megabyte
B. terabyte
C. kilobyte
D. gigabyte
Which of the following offers an example where Porter's five forces are mostly strong
and competition is high?
A. a dog walking business
B. a ski resort
C. a professional hockey team
D. All of these are correct.
What is the process that provides a user with permission including access levels and
abilities such as file access, hours of access, and amount of allocated storage space?
A. pharming
B. authentication
C. authorization
D. programming
Which of the following statements is TRUE regarding customer information?
A. Customer information can exist in several operational systems.
B. Customer information in each operational system could change.
C. Customer information in each operational system can be different.
D. All of these are correct.
What is a content creator?
A.the person responsible for creating the original website content
B. the person responsible for updating and maintaining website content
C. includes fixed data incapable of change in the event of a user action
D. includes data that change based on user action
What is a workflow control system?
A. monitors processes to ensure tasks, activities, and responsibilities are executed as
specified
B. includes the tasks, activities, and responsibilities required to execute each step in a
business process
C. attempts to understand and measure the current process and make performance
improvements accordingly
D. All of these are correct.
What is digital rights management?
A. the unauthorized use, duplication, distribution, or sale of copyrighted software
B. refers to the ability of a company to identify, search, gather, seize, or export digital
information in responding to a litigation, audit, investigation, or information inquiry
C. passed to protect minors from accessing inappropriate material on the Internet
D.a technological solution that allows publishers to control their digital media to
discourage, limit, or prevent illegal copying and distribution
What is web-based self-service?
A. a place where customer service representatives answer customer inquiries and solve
problems, usually by email, chat, or phone
B.customers use the web to find answers to their questions or solutions to their
problems
C. a system that gathers product details and issue-resolution information, which can be
automatically generated into a script for the representative to read to the customer
D. a form of predictive analytics for marketing campaigns that attempts to identify
target markets or people who could be convinced to buy products
Managers constantly attempt to optimize _________.
A. static processes
B. dynamic processes
C. sales processes
D. customer service processes
Sears department stores used to plant employees in competitors' stores to perform
research and analysis. Recently the company implemented a system that can search
competitor websites and provide comparisons of price, promotions, and availability and
the system is saving time, money, and resources. What type of system did Sears
implement?
A. shopping algorithm
B. shopping network
C. shopping logic
D. shopping bot
Which of the following terms refers to the smallest element of data and has a value of
either 0 or 1?
A.bit
B. bandwidth
C. modem
D. Internet protocol
What is an online journal that allows users to post their own opinions, comments,
graphics, and video?
A. web masters
B. folksonomy
C. disintermediation
D. a blog or web log
What is usability?
A.The system is easy to learn and efficient and satisfying to use.
B. The system functions correctly and provides accurate information.
C. The system allows varying levels of access.
D. The system quickly transforms to support environmental changes.
What are biometrics?
A. the traditional security process, which requires a user name and password
B. requires the user to provide two means of authentication, what the user knows
(password) and what the user has (security token)
C. requires more than two means of authentication such as what the user knows
(password), what the user has (security token), and what the user is (biometric
verification)
D. the identification of a user based on a physical characteristic such as a fingerprint,
iris, face, voice, or handwriting
Which of the following is an important challenge facing managers today?
A. making business decisions
B. cultivating strategies
C. competing to win in today's market
D. All of these are correct.
What are the seven characteristics of an agile MIS infrastructure?
A.accessibility, availability, maintainability, portability, reliability, scalability, and
usability
B. accessibility, affordability, mobility, portability, reliability, scalability, and usability
C. accessibility, availability, mobility, penetrability, responsibility, sensibility, and
usability
D. accessibility, affordability, functionality, changeability, constancy, sources, and
understanding
What does a business continuity plan typically include?
A. how frequently the system backup is performed
B.which systems and business processes are critical and the maximum amount of time
the company can continue to operate without functioning systems
C. how quickly the system recovery needs to be performed
D. where a hot site is located
How would the airline industry use business intelligence?
A.analyze popular vacation locations with current flight listings
B. understand customer credit card usage and nonpayment rates
C. compare the demographics of patients with critical illnesses
D. predict claim amounts and medical coverage costs
Jeremy is an executive for Green Web Designs, where his primary role is to ensure the
security of business systems and develop strategies to protect the company from online
viruses and hackers. What is Jeremy's role within the company?
A. Chief Executive Officer (CEO)
B. Chief Security Officer (CSO)
C. Chief Procurement Officer (CPO)
D. Chief Technology Officer (CTO)

Subscribe Now

Sign up to view full document

View Document