Book Title
Business Driven Information Systems 5th Edition

CMCS 79001

July 19, 2017
A content creator is the person responsible for creating the original website content.
Analytical CRM supports traditional transactional processing for day-to-day
front-office operations or systems that deal directly with the customers.
Confidentiality is the right to be left alone when you want to be, to have control over
your own personal possessions, and not to be observed without your consent.
Internal reports present data that is distributed inside the organization and is intended
for employees within an organization. Internal reports typically support day-to-day
operations monitoring that supports managerial decision making.
The responsibility matrix defines all project roles and indicates what responsibilities are
associated with each role.
A wide area network (WAN) connects a group of computers in close proximity, such as
in an office building, school, or home.
Bluetooth is a wireless PAN technology that transmits signals over short distances
among cell phones, computers, and other devices.
Serviceability is how quickly a third-party or vendor can change a system to ensure it
meets user needs and the terms of any contracts including agreed levels of reliability,
maintainability, or availability.
A sustainable MIS infrastructure identifies ways that a company can grow in terms of
computing resources while simultaneously becoming less dependent on hardware and
energy consumption.
A site license enables any qualified users within the organization to install the software,
regardless if the computer is on a network. Some employees might install the software
on a home computer for working remotely.
Project assumptions represent key dates when a certain group of activities must be
Availability refers to the varying levels that define what a user can access, view, or
perform when operating a system.
The technique to gain personal information for the purpose of identity theft, often
through fraudulent emails that look as though they came from legitimate businesses, is
called phishing.
A communication plan defines the how, what, when, and who regarding the flow of
project information to stakeholders and is key for managing expectations.
User acceptance testing (UAT) determines if the system satisfies the user and business
A process of providing a user with permission including access levels and abilities such
as file access, hours of access, and amount of allocated storage space is called
Information security is a high priority for protection of the company's information and it
is critical to implement an information security procedure to combat misuse of this
A data mart contains a subset of data warehouse information.
Microblogging is the practice of sending brief posts (140 to 200 characters) to a
personal blog, either publicly or to a private group of subscribers who can read the
posts as IMs or as text messages.
Scalability measures how quickly a system performs a process or transaction.
If you want to support business operations, you will focus on building a strong
information MIS infrastructure, which identifies where and how important information,
such as customer records, is maintained and secured.
Sensitivity analysis, what-if analysis, optimization analysis, and market basket analysis
are the common DSS analysis techniques.
Interactivity measures advertising effectiveness by counting visitor interactions with the
target ad, including time spent viewing the ad, number of pages viewed, and number of
repeat visits to the advertisement.
Project assumptions are specific factors that can limit options including budget,
delivery dates, available skilled resources, and organizational policies.
Internet Protocol TV (IPTV), which distributes digital video content using IP across the
Internet and private IP networks.
GPS utilizes location-based services (LBS), applications that use location information
to provide a service, whereas a GIS does not use LBS applications.
Primary storage is the computer's main memory, which consists of the random access
memory (RAM), cache memory, and read-only memory (ROM) that is directly
accessible to the CPU.
To-Be process models show the results of applying change improvement opportunities
to the current (As-Is) process model.
Domain name hosting (web hosting) is a service that allows the owner of a domain
name to maintain a simple website and provide email capacity.
Fair information practices is a general term for a set of standards governing the
collection and use of personal data and addressing issues of privacy and accuracy.
What occurs when steps are added to the value chain as new players find ways to add
value to the business process?
A. intermediaries
B. disintermediation
C. reintermediation
D. cybermediation
What was the original term for a company operating on the Internet?
A. dot-com
B. search engine
C. search engine ranking
D. search engine optimization
Which of the following demonstrates potential issues with Business 2.0 and information
A. open source allows anyone to be able to edit, damage, or destroy content
B. copyright protection
C. decreases in employee productivity
D. decreases in process productivity
Which of the following is a type of web browser?
A. Microsoft Word and Excel
B. Internet Explorer and Mozilla Firefox
C. Facebook and MySpace
D. All of these are correct.
What occurs when a website can know enough about a person's likes and dislikes that it
can fashion offers that are more likely to appeal to that person?
A. operational CRM
B. analytical CRM
C. website personalization
D. list generators CRM
Miranda White likes taking old computer parts and remaking them into products like
earrings and clocks. Which of the following represents what Miranda is doing?
B. recycle
C. ewaste
D. sustainable MIS
Which of the following terms refers to a contractual stipulation to ensure that ebusiness
participants do not deny their online actions?
A. compliance
B. noncommittal
D. erepudiation
Which represents the four main steps in the business process reengineering?
A. set project problem, study competition, create new products, and implement solution
B. set project scope, study competition, create new products, and implement solution
C. set project scope, study competition, create new processes, and implement solution
D. study competition, set project scope, create new processes, and implement solutions
Which of the following describes privacy?
A. the assurance that messages and data are available only to those who are authorized
to view them
B. policies and procedures that address the ethical use of computers and Internet usage
in the business environment
C.the right to be left alone when you want to be, to have control over your own personal
possessions, and to not be observed without your consent
D. the principles and standards that guide our behavior toward other people
What can unified communications merge?
A. IMing
B. videoconferencing
C. voice mail
D.All of these are correct.
What is multifactor authentication?
A. the traditional security process, which requires a user name and password
B. requires the user to provide two means of authentication, what the user knows
(password) and what the user has (security token)
C. requires more than two means of authentication such as what the user knows
(password), what the user has (security token), and what the user is (biometric
D. the identification of a user based on a physical characteristic such as a fingerprint,
iris, face, voice, or handwriting
When evaluating the six-step decision-making process, what occurs during the solution
implementation step?
A. The process will begin again if the decisions made were incorrect.
B. definition of the problem as clearly and precisely as possible
C. details of every solution possible including ideas that seem far fetched
D. The solution that best solves the problem is selected.
What includes the processes that control the distribution, maintenance, and replacement
of materials and personnel to support the supply chain?
A. procurement
C. materials management
D. bullwhip effect
What is a problem that occurs when someone registers purposely misspelled variations
of well-known domain names?
A. typosquatting
B. website name stealing
C. internet censorship
D. teergrubing
Which of the following does a project manager perform?
A. defines and develops the project plan
B. tracks the plan to ensure all key project milestones are completed on time
C. expert in project planning and management
D.All of these are correct.
Ebusiness was characterized by few companies or users posting content for the masses.
What characterizes Business 2.0?
A. a select few posting content for high level executives only
B. the masses posting content for a select few
C. the masses posting content for the masses
D. a select few posting specific content for the masses
What is a standardized set of activities that accomplishes a specific task?
A. business strategy
B. business outcome
C.business process
D. knowledge process
CSFs and KPIs are two core metrics used to evaluate results and measure the progress
of a project for a business. Which of the following represents the acronyms for CSF and
A. continual success factors and key performance indicators
B. critical success factors and key project ideas
C. customer success findings and key project ideas
D. critical success factors and key performance indicators
What is software that will search several retailer websites and provide a comparison of
each retailer's offerings, including prices and availability?
A. augmented reality
B. mutation
C. fuzzy logic
D. shopping bot
What is enterprise application integration (EAI) middleware?
A. the use of the Internet to provide customers with the ability to gain personalized
information by querying corporate databases and their information sources
B. the integration of data from multiple sources, which provides a unified view of all
C. the translation of information between disparate systems
D.packages commonly used applications together, reducing the time needed to integrate
applications from multiple vendors
What combines multiple network storage devices so they appear to be a single storage
A. server virtualization
B. network virtualization
C. disaster recovery as a service
D.storage virtualization
What is mobile application management (MAM)?
A. the blending of personal and business use of technology devices and applications
B. remotely controls smart phones and tablets, ensuring data security
C. allows mobile voice calls to be made over broadband networks, creatingunder the
right network conditionsclearer audio and fewer dropped calls
D.administers and delivers applications to corporate and personal smart phones and
When evaluating the six-step decision-making process, what occurs during the problem
identification step?
A. The process will begin again if the decisions made were incorrect.
B. definition of the problem as clearly and precisely as possible
C. details of every solution possible including ideas that seem far fetched
D. The solution that best solves the problem is selected.
What is an open system?
A. any proprietary software licensed under exclusive legal right of the copyright holder
B. any software whose source code is made available free for any third party to review
and modify
C. contains instructions written by a programmer specifying the actions to be performed
by computer software
D. consists of nonproprietary hardware and software based on publically known
standards that allow third parties to create add-on products to plug into or interoperate
Which of the following is an example of a clickstream data metric?
A. dates and times of visits
B. number of customers with shopping carts
C. the number of page views
D. All of these are correct.
What refers to the ability of a company to identify, search, gather, seize, or export
digital information in responding to a litigation, audit, investigation, or information
A. ediscovery
B. Child Online Protection Act
C. digital rights management
D. pirated software
Which term is used to describe the ease with which people perform transactions and/or
find information?
A. usability
B. customer satisfaction
C. financial
D. conversion rates
Which of the following choices is not one of the six epolicies that a company should
implement for information protection as discussed in the text?
A. information privacy policy
B. workplace monitoring policy
C. acceptable use policy
D.downtime monitoring policy
Business intelligence is information collected from multiple sources. Which of the
following provides an example of a source that would be included in business
A. suppliers
B. customers
C. competitors
D. All of these are correct.
Each year businesses lose time and money because of system crashes and failures.
Which of the following offers the best way to protect a system from crashes and
A. backup and recovery plans
B. fault tolerance
C. failover
D.All of these are correct.