Book Title
Business Driven Information Systems 5th Edition


July 20, 2017
Cybervandalism includes threats, negative remarks, or defamatory comments
transmitted via the Internet or posted on the website.
The arithmetic-logic unit includes instructions and literally tells the other hardware
devices what to do, based on the software instructions.
Future managers and workers need to understand the benefits MIS and ebusiness can
offer a company if it wants to take advantage of sustaining technologies.
The Child Online Protection Act was passed to protect minors from accessing
inappropriate material on the Internet.
Adwords are keywords that advertisers choose to pay for and appear as sponsored links
on the Google results pages.
Nearshore outsourcing occurs when contracting an outsourcing arrangement with a
company in a nearby country. Often this country will share a border with the native
The chief technology officer is responsible for ensuring the security of business systems
and developing strategies and safeguards against attacks from hackers and viruses.
A WAN is a physical and data layer technology for LAN networking.
The Internet of Things refers to devices that connect directly to other devices.
Opportunity management CRM occurs when a website has stored enough data about a
person's likes and dislikes to fashion offers more likely to appeal to that person.
Metrics are temporary activities a company undertakes to create a unique product,
service, or result.
Complex instruction set computer (CISC) chips is a type of CPU that can recognize as
many as 100 or more instructions, enough to carry out most computations directly.
HTML 3 is the current version of HTML that delivers everything from animation to
graphics and music to movies; it can also be used to build complicated web applications
and works across platforms, including a PC, tablet, smartphone, or smart TV.
Robotics focus on creating artificial intelligence devices that can move and react to
sensory input.
Firm infrastructure and human resource management are part of the support value
The Trojan-horse virus hides inside other software, usually as an attachment or a
downloadable file.
Databases offer many security features including passwords to provide authentication,
access levels to determine who can access the data, and access controls to determine
what type of access they have to the information.
Mobile device management (MDM) remotely controls smart phones and tablets,
ensuring data security.
Through pretexting, hackers use their social skills to trick people into revealing access
credentials or other valuable information.
Ebusiness is the buying and selling of goods and services over the Internet.
RFM stands for Regency, Frequency, and Monetary.
Bring your own device is a policy that allows employees to use their personal mobile
devices and computers to access enterprise data and applications.
Buyer power is included as one of Porter's three generic strategies.
RFID accelerometer is a device that measures the acceleration (the rate of change of
velocity) of an item and is used to track truck speeds or taxi cab speeds.
Neural networks use technology allowing humans to interact with a computer through
bodily sensations and movementsfor example, a cell phone vibrating in your pocket.
Disruptive and new technologies typically cut into the low-end of the marketplace and
eventually evolve to displace high-end competitors and their reigning technologies.
Vulnerability is a system weakness that can be exploited by a threat.
A metropolitan area network (MAN) spans a large geographic area such as a state,
province, or country.
Click-to-talk functions allow customers to click on a button and talk with a
representative via the Internet.
A hard drive is a secondary storage medium that uses several rigid disks coated with a
magnetically sensitive material and housed together with the recording heads in a
hermetically sealed mechanism.
Virtualization creates multiple virtual machines on a single computing device. A good
analogy is a computer printer. In the past you had to purchase a fax machine, copy
machine, answering machine, and computer printer separately. This was expensive,
required enough energy to run four machines, and created additional amounts of ewaste.
Onshore outsourcing occurs when contracting an outsourcing arrangement with a
company in a nearby country. Often this country will share a border with the native
Cable is the medium to connect all of the computers.
Ben works at a top accounting firm in Salt Lake City and his responsibilities include
developing reports for each salesperson, product, and part as well as departmental-wide
sales reports by salesperson, product, and part. Ben's duties provide value-added to his
company and would be categorized as occurring at the different information ________.
A. levels
B. formats
D. formulas
Which term describes the WWW during its first few years of operation between 1991
and 2003?
A. Web 1.0
B. eshop
C. open source
D. All of these are correct.
What is knowledge?
A. Raw facts that describe the characteristics of an event or object.
B. Data converted into a meaningful and useful context.
C. Information collected from multiple sources that analyzes patterns, trends, and
relationships for strategic decision making.
D. Skills, experience, and expertise, coupled with information and intelligence that
creates a person's intellectual resources.
What is a protocol?
A. software that prevents direct communication between a sending and receiving
computer and is used to monitor packets for security reasons
B.a standard that specifies the format of data as well as the rules to be followed during
C. a simple network protocol that allows the transfer of files between two computers on
the Internet
D. a standard Internet protocol that provides the technical foundation for the public
Internet as well as for large numbers of private networks.
What is the difference between phishing and pharming?
A. Phishing is not illegal, and pharming is illegal.
B. Phishing is the right of the company, where pharming is the right of the individual.
C. Phishing is a technique to gain personal information for the purpose of identity theft,
and pharming reroutes requests for legitimate websites to false websites.
D. All of these are correct.
Which of the following definitions represents website name stealing?
A. a problem that occurs when someone registers purposely misspelled variations of
well-known domain names
B. the theft of a website's name that occurs when someone, posing as a site's
administrator, changes the ownership of the domain name assigned to the website to
another website owner
C. government attempts to control Internet traffic, thus preventing some material from
being viewed by a country's citizens
D. an anti-spamming approach where the receiving computer launches a return attack
against the spammer, sending email messages back to the computer that originated the
suspected spam
What software controls the application software and manages how the hardware devices
work together?
A. system software
B. operating system software
C. embedded operating system
D. multitasking
What is measured by such benchmarks as satisfaction surveys, percentage of existing
customers retained, and increases in revenue dollars per customer?
A. usability
B. customer satisfaction
C. financial
D. conversion rates
Ben Schultz decides to purchase an iPad on eBay. After the transaction completes and
the money is withdrawn from Ben's PayPal account, the iPad never shows up and the
email address of the seller bounces. What issue has Ben encountered?
A. the physical separation of buyer and seller
B. adhering to taxation rules
C. identifying limited market segments
D. All of these are correct.
Within the sites that support disaster recovery, a ________ is a separate facility that
does not have any computer equipment but is a place where employees can move after a
A. hot site
B.cold site
C. warm site
D. disaster site
Which of the following is considered an unstructured decision?
A. reordering inventory
B. deciding to enter a new market
C. creating the employee weekly staffing schedule
D. creating the employee weekly production schedule
Anne Marie Cole runs the sales division for a local auto insurance firm. One of her key
duties is to ensure the company has 10 percent market share by the end of the year.
When evaluating the current sales numbers, she determines that her sales division has
total sales of $3 million and the entire industry has total sales of $50 million. What
additional sales must Anne Marie's division meet to ensure they have 10 percent of the
market by the end of the year?
A. $1 million
B. $2 million
C. $5 million
D. $10 million
RFID tag is an electronic identification device that is made up of a chip and antenna.
Which of the following is not a commonly used type of guided media?
A. twisted-pair wiring
B. coaxial cable
C. fiber-optic cable
D. transmission control protocol/internet protocol
Which of the following operational CRM technologies does the marketing department
typically use?
A. contact center, web-based self-service, call scripting
B. contact center, cross-selling and up-selling, web-based self-service
C. list generator, opportunity management, cross-selling and up-selling
D.list generator, campaign management, cross-selling and up-selling
What is server virtualization?
A. combines multiple network storage devices so they appear to be a single storage
B. combines networks by splitting the available bandwidth into independent channels
that can be assigned in real time to a specific device
C.combines the physical resources, such as servers, processors, and operating systems,
from the applications
D. offers backup services that use cloud resources to protect applications and data from
disruption caused by disaster
What is the Internet protocol web browsers use to request and display web pages using
universal resource locators?
B. hypertext transport protocol (HTTP)
D. hypertext markup language (HTML)
Which of the following is not considered a core driver of the information age?
A. information
B. usiness Intelligence
C.competitive Intelligence
D. data
What is software?
A. consists of the physical devices associated with a computer system
B.the set of instructions the hardware executes to carry out specific tasks
C. a computer designed to request information from a server
D. a computer dedicated to providing information in response to requests
What performs all arithmetic operations (for example, addition and subtraction) and all
logic operations?
B. control unit
D. primary storage
What is a common approach using the professional expertise within an organization to
develop and maintain the organization's information technology systems?
B. Outsourcing
C. Business process outsourcing
D. Offshore outsourcing
Which of the following sustainable infrastructure components is a collection of
computers, often geographically dispersed, that are coordinated to solve a common
A. cloud computing
B.grid computing
C. virtualized computing
D. database computing
What is VoIP?
A. VoIP uses IP technology to transmit telephone calls
B. VoIP offers the low cost ability to receive personal and business calls via computer
C. VoIP offers the ability to have more than one phone number
D.All of these are correct.
What is used to control the flow of a process?
A. BPMN event
B. BPMN activity
C. BPMN flow
D. BPMN gateway
What are the two basic functions that social networking sites provide?
A. the ability to create and publish your own software
B. the ability to create and maintain a profile that is your online identity and create
connections between other people within the network
C. the ability to capture and create URLs and RSSs
D. the ability to create URLs and edit RSS software
What is an optimizing system that can find and evaluate solutions with many more
possibilities, faster and more thoroughly than a human?
A. genetic algorithm
B. expert system
C. intelligent agent
D. virtual reality
What is the primary reason a company has a failover system?
A. to use different systems continuously at the same time
B. to allow employees to work virtually
C.to take down the primary system for maintenance, while the secondary system
activates to ensure continuous operations
D. All of these are correct.
Which of the following statements is accurate?
A. A correct business rule for one organization may not be correct for another
B. Each business rule will have entities and sometimes even attributes.
C. A typical business may have hundreds of business rules.
D. All of these are correct.
Which ebusiness tool plays a crucial role in getting site visitors to view more than just
the home page by providing clear navigation choices?
C. open system
D. open source
What can a model accomplish?
A. calculate risks
B. understand uncertainty
C. manipulate time
D. All of these are correct.
What is machine to machine?
A. a world where interconnected, Internet-enabled devices or "things" can collect and
share data without human intervention
B. extracts information from data and uses it to predict future trends and identify
behavioral patterns
C.refers to devices that connect directly to other devices
D. opportunities to change the way people purchase books
What is application software?
A. controls how the various technology tools work together along with the application
B. controls the application software and manages how the hardware devices work
C. provides additional functionality to the operating system
D. used for specific information processing needs, including payroll, customer
relationship management, project management, training, and many others
Which of the following tracks the number of customers an organization touches for the
first time and persuades to purchase its products or services?
A. customer satisfaction
B. usability
C. conversion rates
D. financial
What is the number one reason that IT projects fall behind schedule or fail?
A. change in business goals during the project
B. lack of support from business management
C.unclear or missing business requirements
D. change in technology during the project