Book Title
Business Driven Information Systems 5th Edition

CMCS 46643

July 19, 2017
To decrypt information is to decode it and is the opposite of encrypt.
SaaS ERP uses the cloud platform to enable organizations not only to unite around
business processes but to gather cloud data across supplier networks and supply chains
to drive greater efficiency in manufacturing projects.
The robotics movement is a cultural trend that places value on an individual's ability to
be a creator of things as well as a consumer of things.
Collaborative demand planning allows an organization to reduce the cost and time
required during the design process of a product.
Partner relationship management (PRM) discovers optimal sales channels by selecting
the right partners and identifying mutual customers.
Pay-per-call generates revenue each time a user clicks on a link to a retailer's website.
Master data management (MDM) is the practice of gathering data and ensuring that it is
uniform, accurate, consistent, and complete, including such entities as customers,
suppliers, products, sales, employees, and other critical entities that are commonly
integrated across organizational systems. MDM is commonly included in data
Operational business processes are semidynamic, semiroutine, monthly business
processes such as resource allocation, sales strategy, or manufacturing process
Goods are material items or products that customers will buy to satisfy a want or need.
Media includes coaxial, twisted-pair, and fiber-optic.
A dependency is a trigger that enables a project manager to close the project before
Web analytics analyzes unstructured data to find trends and patterns in words and
The Internet is a massive network that connects computers all over the world and
allows them to communicate with one another.
Business intelligence is both a core and extended ERP component.
Logistics includes the increasingly complex management of processes, information, and
communication to take a product from cradle to grave. Cradle to grave provides
logistics support.
A desktop computer is an electronic book that can be read on a computer or special
reading device. Some are small enough to carry around, while others are the size of a
telephone booth.
Black-hat hackers work at the request of the system owners to find system
vulnerabilities and plug the holes.
A tablet computer has a flat screen that uses a mouse or fingertip for input instead of a
keyboard. Similar to PDAs, tablet PCs use a writing pen or stylus to write notes on the
screen and touch the screen to perform functions such as clicking on a link while
visiting a website.
A help desk is a group of people who respond to users' questions.
Utility systems are customized by using the control panel, which is a Windows feature
that provides options that set default values for the Windows operating system.
Utility software provides additional functionality to the operating system.
A social media manager refers to the process of monitoring and responding to what is
being said about a company, individual, product, or brand.
Primary storage is the computer's main memory, which consists of the random access
memory (RAM), cache memory, and read-only memory (ROM) that is directly
accessible to the CPU.
Personal information management software contains course information such as a
syllabus and assignments and offers drop boxes for quizzes and homework along with a
grade book.
A patent is the legal protection afforded an expression of an idea, such as a song, book,
or video game.
Public cloud promotes massive, global, industry-wide applications offered to the
general public. In a public cloud, customers are never required to provision, manage,
upgrade, or replace hardware or software.
World Wide Web Consortium (W3C) is a nonprofit organization that has assumed the
responsibility for Internet Protocol (IP) address space allocation, protocol parameter
assignment, domain name system management, and root server system management
functions previously performed under U.S. government contract.
First-generation machine language is difficult for people to understand.
Phishing reroutes requests for legitimate websites to false websites.
Pilot implementation assigns a small group of people to use the new system until it is
verified that it works correctly; then the remaining users migrate to the new system.
File transfer protocol (FTP) allows files containing text, programs, graphics, numerical
data, and so on to be downloaded off or uploaded onto a network.
Fourth-generation languages (4GL) are programming languages that look similar to
human languages. For example, a typical 4GL command might state, "FIND ALL
A SWOT analysis evaluates an organization's strengths, worries, opportunities, and
technologies to identify significant influences that work for or against business
Information integrity issues occur when the same data element has different values.
Fuzzy logic is a mathematical method of handling imprecise or subjective information.
Call scripting falls under the category of the sales department's CRM tools.
Robotics supports materials management.
What is native advertising?
A. an online marketing concept in which the advertiser attempts to gain attention by
providing content in the context of the user's experience in terms of its content, format,
style, or placement
B. buyers post feedback on sellers
C. created and updated by many users for many users
D. refers to the wisdom of the crowd
What is reliability?
A. performs functions such as resetting passwords, deleting accounts, and shutting
down entire systems
B. refers to the varying levels that define what a user can access, view, or perform when
operating a system
C. refers to how quickly a system can transform to support environmental changes
D.ensures that a system is functioning correctly and providing accurate information
What refers to the level of detail in the model or the decision-making process?
A. granularity
B. visualization
C. digital dashboard
D. All of these are correct.
What are predictions based on time-series information?
A. prediction
B. optimization
D. regression
A pivot rotates data to display alternative presentations of the data.
What is a disaster recovery plan?
A. a separate and fully equipped facility where the company can move immediately
after a disaster and resume business
B. a separate facility that does not have any computer equipment but is a place where
employees can move after a disaster
C. a separate facility with computer equipment that requires installation and
D.a detailed process for recovering information or a system in the event of a
catastrophic disaster
Who are certified in geocoding practices to ensure industry standards are met when
classifying spatial data?
A.GIS professionals
B. enterprise architects
C. database engineers
D. All of these are correct.
Which of the following analyzes a company's business processes and is useful for
determining how to create the greatest possible value for customers?
A. product analysis
B. primary supplier power
C.value chain analysis
D. buyer chain analysis
Your boss has asked you to analyze the soft drink industry using Porter's five forces
model. Which of the following represents buyer power in the soft drink industry?
A. Pepsi requires stores that carry Pepsi products to commit to minimum orders of
1,000 cases.
B. Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf
space in every Walmart store.
C. Zevia Natural Diet Soda begins selling directly over the Internet.
D. Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale
of their products during games.
What is an organization performing when it asks questions such as "why was customer
revenue so high"?
A. CRM reporting technologies
B.CRM analyzing technologies
C. CRM processing technologies
D. CRM predicting technologies
A wireless MAN (WMAN) is a metropolitan area network that uses ________ to
transmit and receive data?
A. WI-FI ideas
B. STP technology
C. cable connections
D.radio signals
Which of the below represents business processes you would find in the human
resources department?
A. Hiring employees
B. Enrolling employees in benefit plans
C. Tracking vacation and sick time
D. All of these are correct.
Which of the following protection techniques scans and searches hard drives to prevent,
detect, and remove known viruses, adware, and spyware?
A. firewall
B. digital certificate
C. virus software
D. antivirus software
What is a CPU?
A. the actual hardware that interprets and executes the program (software) instructions
and coordinates how all the other hardware devices work together
B. the computer's main memory, which consists of the random access memory (RAM),
cache memory, and the read-only memory (ROM) that is directly accessible to the
central processing unit (CPU)
C. equipment designed to store large volumes of data for long-term storage
D. equipment used to capture information and commands
What is a system that uses computerized advisory programs to imitate the reasoning
processes of experts in solving difficult problems?
A. expert system
B. virtual reality
C. neural network
D. genetic algorithm
In terms of big data what is volume?
A. includes different forms of structured and unstructured data
B. includes the uncertainty of data, including biases, noise, and abnormalities
C.includes the scale of data
D. includes the analysis of streaming data as it travels around the Internet
What type of website is an interactive website kept constantly updated and relevant to
the needs of its customers using a database?
A.data-driven website
B. interactive website
C. database performing website
D. data processing website
What software handles contact information, appointments, task lists, and email?
A. preventive security software
B. personal information management software
C. crash-proof software
D. course management software
Which of the following illustrates the primary concepts of the relational database
A. ethics, applications, keys, and relationships
B.entities, attributes, keys, and relationships
C. endeavor, aspire, control, and regulate
D. early, after, before, and future
What is political feasibility?
A.measures how well the solution will be accepted in a given opportunity
B. measures how well a solution meets the identified system requirements to solve the
problems and take advantage of opportunities
C. measures the project time frame to ensure that it can be completed on time
D. measures the practicality of a technical solution and the availability of technical
resources and expertise
What is interoperability?
A. an intelligent connecting device that examines each packet of data it receives and
then decides which way to send it onward toward its destination
B. a reference to the geometric arrangement of the actual physical organization of the
computers and other network devices in a network
C. a standard that specifies the format of data as well as the rules to be followed during
D. the capability of two or more computer systems to share data and resources, even
though they are made by different manufacturers
Which of the following is a common customer service CRM metric?
A. number of new prospective customers
B. number of marketing campaigns
C. average time to resolution
D. revenue generated by marketing campaigns
What is a special-purpose knowledge-based information system that accomplishes
specific tasks on behalf of its users?
A. intelligent system
B. artificial intelligence
C. neural network
D. intelligent agent
Which of the following represents the types of data commonly found in the marketing
A. promotional data
B. payroll data
C. tax data
D. employee data
Which of the following is not a typical way that a company would duplicate a
competitive advantage?
A. acquiring the new technology
B. copying the business operations
C. hiring away key employees
D. carrying large product inventories
What provides nonvolatile memory for a range of portable devices including
computers, digital cameras, MP3 players, and PDAs?
B. a memory stick
C. a memory card
D. flash memory
What helps an organization identify its customers across applications?
A.CRM reporting technologies
B. CRM analyzing technologies
C. CRM processing technologies
D. CRM predicting technologies
What is TCP/IP's own messaging system for email?
A. file transfer protocol (FTP)
B. simple mail transfer protocol (SMTP)
C. hypertext transfer protocol (HTTP)
D. simple network management protocol (SNMP)
Which phase takes all the detailed design documents from the design phase and
transforms them into the actual system?
A. testing phase
B. analysis phase
C.development phase
D. planning phase
What is a computer portable enough to fit on a lap or in a bag and has its own power
source or battery?
A. tablet
C. laptop computer
D. desktop computer
Metadata provides details about data. For example, metadata for an image could include
its size, resolution, and date created.
What is the overall management of the availability, usability, integrity, and security of
company data?
A. data intelligence
B.data governance
C. data forbearance
D. data forecasting
Who is responsible for ensuring the ethical and legal use of information within a
A. Chief Knowledge Officer (CKO)
B. Chief Privacy Officer (CPO)
C. Chief Technology Officer (CTO)
D. Chief Information Officer (CIO)
What improves managerial level business processes?
A. performance measures
B. bottlenecks
C. redundancy
D. streamlining

Subscribe Now

Sign up to view full document

View Document