Book Title
Business Driven Information Systems 5th Edition

COMP 83507

July 19, 2017
Personal information management (PIM) software handles contact information,
appointments, task lists, and email.
Call scripting occurs when customer service representatives answer customer inquiries
and solve problems by email and IMing.
Open systems tap into the core knowledge of all employees, partners, and customers.
An ezine is a magazine published only in electronic form on a computer network.
Flipboard is a social-network aggregation, magazine-format application software for
multiple devices that collects content from social media and other websites, presents it
in magazine format, and allows users to flip through the content.
A network is a communications system created by linking two or more devices and
establishing a standard methodology by which they can communicate.
Hybrid cloud includes two or more private, public, or community clouds, but each
cloud remains separate and is only linked by technology that enables data and
application portability.
Data mining occurs on structured data that are already in a database or a spreadsheet.
Supplier relationship management (SRM) focuses on keeping suppliers satisfied by
evaluating and categorizing suppliers for different projects.
A tablet is a pen-based computer that provides the screen capabilities of a PDA with the
functional capabilities of a laptop or desktop computer.
The maker movement is a cultural trend that places value on an individual's ability to be
a creator of things as well as a consumer of things.
Hypertext transport protocol (HTTP) is the Internet protocol web browsers use to
request and display web pages using universal resource locators.
Passive RFID tags do not have a power source.
A business impact analysis occurs when the ability of a company to operate is impaired
because of a hardware, software, or data outage.
A network user license enables anyone on the network to install and use the software.
Open source refers to any software whose source code is made available free (not on a
fee or licensing basis as in ebusiness) for any third party to review and modify.
If a manager identifies numerous information integrity issues, he or she should consider
the reports generated from that data as invalid and not use them when making decisions.
A wiki is a Hawaiian word for quick and is a type of a collaborative web page that
allows users to add, remove, and change content.
Voice over IP (VoIP) uses IP technology to transmit telephone calls.
Gigahertz is the number of millions of CPU cycles per second.
Partner relationship management provides web-based self-service tools that streamline
and automate the human resource department.
A wireless WAN (WWAN) is a local area network that uses radio signals to transmit
and receive data over distances of a few hundred feet.
Cyberbullying is a person within the organization who is trusted to monitor, contribute,
filter, and guide the social media presence of a company, individual, product, or brand.
Data-mining tools use a variety of techniques to find patterns and relationships in large
volumes of information that predict future behavior and guide decision making.
In a SWOT analysis, potential external opportunities are helpful when they identify all
significant trends along with how the organization can benefit from each, including new
markets, additional customer groups, legal changes, innovative technologies, population
changes, competitor issues, and so on.
A hard drive is a secondary storage medium that uses several rigid disks coated with a
magnetically sensitive material and housed together with the recording heads in a
hermetically sealed mechanism.
Information granularity refers to the extent of detail within the information (fine and
detailed or coarse and abstract).
A user can opt out of receiving emails by choosing to allow permissions to incoming
A tablet is a pen-based computer that provides the screen capabilities of a PDA with the
functional capabilities of a laptop or desktop computer.
Unique information asks if the information is current with respect to the business needs.
A smart grid delivers electricity using two-way digital technology and is meant to solve
the problem of outdated electrical grids.
Spyware is software that, while purporting to serve some useful function and often
fulfills that function, also allows Internet advertisers to display advertisements without
the consent of the computer user.
What area of information security focuses on preventing identity theft, phishing, and
pharming scams?
A. prevention and resistance
B. detection and authorizing
C. detection and response
D. authentication and authorization
A desktop computer sits on, next to, or under a user's desk and is too large to carry
around. The computer box is where the CPU, RAM, and storage devices are held with a
monitor on top, or a vertical system box (called a tower) usually placed on the floor
within a work area.
What is a Wi-Fi protected access (WPA)?
A. a metropolitan area network that uses radio signals to transmit and receive data
B. a communications technology aimed at providing high-speed wireless data over
metropolitan area networks
C. a means by which portable devices can connect wirelessly to a local area network,
using access points that send and receive data via radio waves
D.a wireless security protocol to protect Wi-Fi networks
Many industries have taken an active role in online business, including the government.
Which of the following is the term that describes the use of strategies and technologies
to transform government by improving the delivery of services and enhancing the
quality of interaction between the citizen-consumer within all the branches of
A. ecommerce
B. information richness
C. egovernment
D. tacit knowledge
What are managerial business processes?
A. dynamic, nonroutine, long-term business processes such as financial planning,
expansion strategies, and stakeholder interactions
B. semidynamic, semiroutine, monthly business processes such as resource allocation,
sales strategy, or manufacturing process improvements
C. static, routine, daily business processes such as stocking inventory, checking out
customers, or daily opening and closing processes
D. None of these are correct.
What allows more than one piece of software to be used at a time?
A. system software
B. operating system software
C. embedded operating system
D. multitasking
What is a large computer network usually spanning a city or a specific infrastructure
like a college?
A.metropolitan area network (MAN)
B. local area network (LAN)
C. wide area network (WAN)
D. secure area network (SAN)
What are the three primary models that a B2C can use to operate?
A. click-and-brick, click-and-mortar, pure-play
B. brick-and-mortar, click-and-mortar, virtual
C. brick-and-mortar, click-and-consumer, virtual-and-consumer
D. brick-and-click, brick-and-mortar, brick-and-virtual
What is an Internet monitoring technique that captures keystrokes on their journey from
the keyboard to the motherboard?
A. spyware
B. web log
C. adware
D.hardware key logger
Which of the following represents the different information granularities?
A.detail, summary, aggregate
B. document, presentation, spreadsheet, database
C. individual, department, enterprise
D. executives, managers, operational employees
Which of the following occurs when the same data element has different values?
A. data modeling issue
B. data mining issue
C. data governance issue
D. information inconsistency issue
Which activities belong in the marketing department?
A. records, measures, and reports monetary transactions
B. tracks strategic financial issues, including money, banking, credit, investments, and
C.supports sales by planning, pricing, and promoting goods or services is marketing
D. relies on information from operations to understand inventory, place orders, and
forecast consumer demand
What is a form of a stationary mouse on which the movement of a finger causes the
pointer on the screen to move?
A. microphone
B. touch pad
C. pointing stick
D. touch screen
What takes information entered into a given system and sends it automatically to all
upstream systems and processes?
A.backward integration
B. application integration
C. data integration
D. forward integration
What is a high-speed Internet connection that is always connected and has a bandwidth
greater than 2 Mbps?
A. analog
B. dial up
D. protocol
Which of the following refers to the ability of a company to identify, search, gather,
seize, or export digital information in responding to a litigation, audit, investigation, or
an information inquiry?
A. eauthorization
B. emanagement
C. ediscovery
D. epolicies
What is information collected from multiple sources such as suppliers, customers,
competitors, partners, and industries that analyzes patterns, trends, and relationships for
strategic decision making?
A. supplier's intelligence
B. social intelligence
C. employee intelligence
D. business intelligence
Which of the following is not an advantage to a data-driven website?
A. limit the amount of information displayed to customers
B. minimizing human error
C.increasing update costs
D. more efficient
Which of the following is not a technology company but used technology to revamp the
business process of selling books?
A. Netflix
B. Dell
C. Zappos
D. Amazon
What is represented by arrows in a business process model?
A. BPMN event
B. BPMN activity
C. BPMN flow
D. BPMN gateway
What displays the path in which the process flows?
A. BPMN event
B. BPMN activity
C. BPMN flow
D. BPMN gateway
What consists of the physical devices associated with a computer system?
B. software
C. client
D. server
Which of the following is offered by a digital dashboard?
A. consolidation
B. drill-down
C. slice-and-dice
D. All of these are correct.
Which of the following is not considered a core driver of the information age?
A. information
B. business Intelligence
C. knowledge
D. variables
Who is responsible for collecting, maintaining, and distributing company knowledge?
A. Chief Knowledge Officer (CKO)
B. Chief Privacy Officer (CPO)
C. Chief Technology Officer (CTO)
D. Chief Information Officer (CIO)
eBay is an example of an online company that has been faced with numerous security
issues. For example, imagine you purchase a digital camera on eBay. Three months
later you might receive an email asking you to log in to the system to update your credit
card or PayPal information. Of course, this email is not actually from eBay and as soon
as you log in your information will be stolen. What type of information security breach
would you consider this to be?
A. an Insider
B. dumpster diving
C. social engineering
D. phishing
When evaluating the six-step decision-making process, what occurs during the solution
selection step?
A. The process will begin again if the decisions made were incorrect.
B. definition of the problem as clearly and precisely as possible
C. details of every solution possible including ideas that seem far fetched
D. The solution that best solves the problem is selected.
What is Mozilla Firefox?
A. a competitor to Microsoft Word
B. a competitor to Microsoft Excel
C. a competitor to Adobe Photoshop
D. a competitor to Internet Explorer
Duplicate data, inaccurate data, misleading data, and incorrect data are all problems
associated with dirty data.
A workstation is a cellular telephone with a keypad that runs programs, music, photos,
email, and includes many features of a PDA.
Explain why competitive advantages are temporary.
Define a data warehouse, and provide a few reasons it can make a manager more
Describe a database, a database management system, and the relational database model.
Identify the advantages of using business intelligence to support managerial decision
Describe the three Business 2.0 tools for collaborating.

Subscribe Now

Sign up to view full document

View Document