Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CMCS 47421

July 20, 2017
In the basic supply chain, make refers to manufacturing products and creating
production schedules.
Cybermediation refers to the creation of new kinds of intermediaries that simply could
not have existed before the advent of ebusiness, including comparison-shopping sites
such as Kelkoo and bank account aggregation services such as Citibank.
Source documents are simplified representation or abstraction of reality.
Cloud fabric is the software that makes the benefits of cloud computing possible, such
as multi-tenancy.
Preventing liabilities is a business-related consequence of failed software.
Materials management is the purchasing of goods and services to meet the needs of the
supply chain.
Workshop training is held in a classroom environment and led by an instructor.
Collaborative engineering allows an organization to reduce the cost and time required
during the design process of a product.
Serviceability means the system quickly transforms to support environmental changes.
A backward integration takes information entered into a given system and sends it
automatically to all upstream systems and processes.
Recovery is the ability to get a system up and running in the event of a system crash or
failure that includes restoring the information backup.
Insiders are illegitimate users who purposely or accidentally misuse their access to the
environment to do business.
Production and materials management ERP components track employee information
including payroll, benefits, compensation, and performance assessment and ensure
compliance with all laws.
Workplace MIS monitoring tracks people's activities by such measures as number of
keystrokes, error rate, and number of transactions processed.
A network is a communications system created by linking two or more devices and
establishing a standard methodology in which they can communicate.
Protocols include bus, star, ring, hybrid, and wireless.
Metrics are measurements that evaluate results to determine whether a project is
meeting its goals.
Business-to-consumer applies to any business that sells its products or services directly
to consumers online.
Virtual workplace is the viewing of the physical world with computer-generated layers
of information added to it.
A common type of minicomputer is a server and is used for managing internal company
applications, networks, and websites.
Open source is any proprietary software licensed under exclusive legal right of the
copyright holder.
Transactional information is used when performing operational tasks and repetitive
decisions such as analyzing daily sales reports and production schedules to determine
how much inventory to carry.
A data dictionary compiles all of the metadata about the data elements in the data
model.
In-sourcing is an arrangement by which one organization provides a service or services
for another organization that chooses not to perform them in-house.
The goal of multifactor authentication is to make it difficult for an unauthorized person
to gain access to a system because, if one security level is broken, the attacker will still
have to break through additional levels.
Open source and sharing are both advantages and disadvantages of Business 2.0.
Call scripting systems gather product details and issue resolution information that can
be automatically generated into a script for the representative to read to the customer.
Conversion occurs when a person or event is the catalyst for implementing major
changes for a system to meet business changes.
A personal area network (PAN) provides communication for devices owned by a single
user that work over a short distance.
Data integration is the integration of a company's existing management information
systems.
Zappos is not a technology company; its primary business focus is to sell books.
A kill switch is a trigger that enables a project manager to close the project before
completion.
Spear phishing is a phone scam that attempts to defraud people by asking them to call a
bogus telephone number to "confirm" their account information.
The rational unified process (RUP) methodology, owned by IBM, provides a
framework for breaking down the development of software into four gates.
Scalability describes how well a system can scale up, or adapt to the increased demands
of growth. If a company grows faster than anticipated, it might experience a variety of
problems, from running out of storage space to taking more time to complete
transactions. Anticipating expected, and unexpected, growth is key to building scalable
systems that can support that development.
Adaptive computer devices are input devices designed for special applications for use
by people with different types of special needs.
True
False
Status reports are periodic reviews of actual performance versus expected performance.
What assigns records to one of a predefined set of classes?
A.classification
B. estimation
C. affinity grouping
D. clustering
What divides a market into categories that share similar attributes such as age, location,
gender, habits, and so on?
A. contact center
B.customer segmentation
C. call scripting system
D. uplift modeling
Which of the following is not included as part of a benchmark?
A. Benchmarks help assess how an MIS project performs over time.
B. When measured against MIS projects, benchmarks can provide feedback so
managers can control the system.
C. Benchmarks help to establish baseline values the system seeks to attain.
D. All of these are correct.
Social media can be a very valuable tool for a company if used properly. Which of the
following represents social media uses for a company?
A. building a strong brand identity
B. protecting the company reputation through counter-damage control
C. engaging directly with customers and prospective customers
D. All of these are correct.
What is a set of policies, procedures, standards, processes, practices, tools, techniques,
and tasks that people apply to technical and management challenges?
A. SDLC
B.methodology
C. waterfall
D. agile
MIS can add value to both primary and support activities within a business. Which of
the following is not an example of a company adding value by the use of MIS in a
support activity?
A. Netflix creating a business strategy for the video rental market that delivers videos
via the mail
B. the human resources department creates a tracking system to efficiently reward
employees based on their performance
C. Scottrade Corp. creating an online system for employees to track paychecks,
benefits, wellness rewards program, and other employee benefit items
D. the University of Forks creates a program to automatically order office supplies such
as pens and pads of paper for its employees
How many days is a typical sprint in the Scrum methodology?
A. 2 days
B. 10 days
C.30 days
D. 90 days
Many social media websites use ________ or specific keywords or phrases
incorporated into website content for means of classification or taxonomy.
A. conferencing
B. tags
C. long tails
D. categories
What is content from more than one source to create a new product or service?
A. selfie
B. blog
C. wiki
D. mashup
What evaluates industry attractiveness?
A. SWOT Analysis
B. The Five Forces Model
C. Value Chain Analysis
D. Three Generic Strategies
Which of the following describes the difference between a backup plan and a recovery
plan?
A. Recovery is an exact copy of a system's information, where backup is the ability to
get a system up and running in the event of a system crash or failure.
B. Backup is mandatory, where recovery is optional.
C.Backup is an exact copy of a system's information, where recovery is the ability to
get a system up and running in the event of a system crash or failure.
D. Recovery is mandatory, where backup is optional.
Review the following list of key terms and determine which one typically occurs during
strategic business process improvement.
A. automation
B. streamlining
C. reengineering
D. improvement
Gina works for Aquarium Retail Services selling high-end saltwater fish and tank
supplies. Aquarium Retail Services is the current market leader in Gina's city. Gina has
recently been approached by Deep Blue Incorporated with an opportunity to run its
corporate nationwide marketing and sales division. Gina decides to jump at the
opportunity! Deep Blue is attempting to gain a competitive ________ by stealing its
competitor's key employees.
A. power
B. entry barrier
C.advantage
D. loyalty
Who is responsible for overseeing all uses of MIS and ensuring that MIS strategically
aligns with business goals and objectives?
A. Chief Knowledge Officer (CKO)
B. Chief Privacy Officer (CPO)
C. Chief Technology Officer (CTO)
D. Chief Information Officer (CIO)
What is an insider?
A. a form of social engineering in which one individual lies to obtain confidential data
about another individual
B. a hacker looks through your trash to find personal information
C. legitimate users who purposely or accidentally misuse their access to the
environment and cause some kind of business-affecting incident
D. malicious agents designed by spammers and other Internet attackers to farm email
addresses off websites or deposit spyware on machines
What is a computer dedicated to a single function, such as a calculator or computer
game?
A. tablet
B. PDA
C. appliance
D. minicomputer
Which of the following is not considered a challenge facing most managers today?
A. Managerial decisions must be made quickly.
B. Strategic decisions need to be made by applying analysis techniques.
C. Artificial intelligence is required by all managers to be successful.
D. Managerial decisions require large amounts of information to analyze.
Which of the following is considered a good?
A. cars
B. groceries
C. clothing
D. All of these are correct.
Which of the following is not an example of unplanned downtime?
A. power outages
B. tornados
C. a system upgrade
D. network failure
What refers to how well a system can adapt to increased demands?
A.scalability
B. capacity planning
C. reliability
D. availability
What are software suites that automate systems analysis, design, and development?
A. data flow diagram
B.computer-aided software engineering (CASE) tools
C. systems development life cycle
D. process modeling
Which of the following is incorrect in terms of data warehousing and business
intelligence?
A. does not include information from other operational applications
B.operational systems are integrated
C. operational information is mainly current
D. operational information frequently has quality issues
What is a SWOT analysis?
A. evaluates an organization's strengths, weaknesses, opportunities, and threats to
identify significant influences that work for or against business strategies
B. analyzes the competitive forces within the environment in which a company operates
to assess the potential for profitability in an industry
C. views a firm as a series of business processes, each of which adds value to the
product or service
D. generic business strategies that are neither organization nor industry specific and can
be applied to any business, product, or service
Which of the following focuses on how individual users logically access information to
meet their own particular business needs?
A. physical view
B.logical view
C. data mart view
D. data view
What detects the presence or absence of a mark in a predetermined place (popular for
multiple-choice exams)?
A. magnetic ink character reader
B. optical-character recognition
C. optical-mark recognition
D. point-of-sale
A foreign key provides details about data.
Which of the following demonstrates a company that has implemented a low cost,
broad market strategy?
A. Neiman Marcus
B. Payless Shoes
C. The Sharper Image
D. Walmart
What is continuously changing and provides business solutions to ever-changing
business operations?
A. static process
B. dynamic process
C. sales process
D. customer service process
What is a client?
A. consists of the physical devices associated with a computer system
B. the set of instructions the hardware executes to carry out specific tasks
C.a computer designed to request information from a server
D. a computer dedicated to providing information in response to requests
What measures the practicality of a technical solution and the availability of technical
resources and expertise?
A. economic feasibility
B. operational feasibility
C. schedule feasibility
D.technical feasibility
What is cybervandalism?
A. the electronic defacing of an existing website
B. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by
repeatedly clicking on a link to increase charges or costs for the advertiser
C. a computer crime where a competitor or disgruntled employee increases a company's
search advertising costs by repeatedly clicking on the advertiser's link
D. an act or object that poses a danger to assets
How would you categorize mobile entertainment, mobile sales, mobile ticketing, and
mobile banking?
A. mobile business
B. mbusiness
C. mcommerce
D. All of these are correct.
What reroutes requests for legitimate websites to false websites?
A. zombie
B. zombie farm
C. pharming attack
D. pharming
Which of the following questions can materials management help a company answer?
A. What are our current inventory levels?
B. What items are running low in the warehouse?
C. What items are at risk of spoiling in the warehouse?
D.All of these are correct.
Business process modeling, or mapping is the activity of creating a detailed flowchart
or process map of a work process that shows its inputs, tasks, and activities in a(n)
________ sequence.
A. unstructured
B. semistructured
C. structured
D. unilateral

Subscribe Now

Sign up to view full document

View Document