Book Title
Business Driven Information Systems 5th Edition


July 20, 2017
Rational unified process (RUP) methodology, owned by IBM, provides a framework for
breaking down the development of software into four "gates"
A server is a computer dedicated to providing information in response to requests.
Dynamic host configuration protocol is a utility application that monitors the network
path of packet data sent to a remote computer.
Information management examines the organizational resource of information and
regulates its definitions, uses, value, and distribution ensuring it has the types of
data/information required to function and grow effectively.
A voiceprint is a data file that identifies individuals or organizations online and is
comparable to a digital signature.
List generators fall under the category of the sales department's CRM tools.
A search engine is website software that finds other pages based on keyword matching
similar to Google.
A business model is a plan that details how a company creates, delivers, and generates
revenues on the Internet.
A primary key is a field that uniquely identifies a given record in a table.
Asset tracking occurs when a company places active or semi-passive RFID tags on
expensive products or assets to gather data on the items location with little or no manual
Internet Corporation for Assigned Names and Numbers (ICANN) is an international
community that develops open standards to ensure the long-term growth of the Web.
Information technology's primary role in supply chain management is creating the
integrations or tight process and information linkages between functions within a
firmsuch as marketing, sales, finance, manufacturing, and distributionand between
A Business Process Model and Notation (BPMN) gateway is used to control the flow of
a process.
User-contributed content (or user-generated content) is created and updated by many
users for many users.
Web analytics analyzes unstructured data associated with websites to identify consumer
behavior and website navigation.
Cloud bursting is when a company uses its own computing infrastructure for normal
usage and accesses the cloud when it needs to scale for high/peak load requirements
ensuring a sudden spike in usage does not result in poor performance or system crashes.
A content editor is the person responsible for updating and maintaining website content.
Random access memory is the portion of a computer's primary storage that does not
lose its contents when one switches off the power.
Hardware consists of the physical devices associated with a computer system, where
software is the set of instructions the hardware executes to carry out specific tasks.
Electronic data interchange occurs when distorted product-demand information ripples
from one partner to the next throughout the supply chain.
Machine to machine (M2M) extracts information from data and uses it to predict future
trends and identify behavioral patterns.
Volatility refers to a device's ability to function with or without power. RAM is volatile,
meaning it must have constant power to function; its contents are lost when the
computer's electric supply fails.
Inventory cycle time is the frequency of inventory replacement.
Through social engineering, hackers use their social skills to trick people into revealing
access credentials or other valuable information.
Asking how many employees are out sick is a type of operational question.
The network access technologies include DSL, cable modem, and broadband.
Software is a computer designed to request information from a server.
Materials are transformed into semifinished and finished productsthe organization's
own production processes.
A router is an intelligent connecting device that examines each packet of data it receives
and then decides which way to send it onward toward its destination.
Clustering assigns records to one of a predefined set of classes.
Multi-tenancy occurs when each customer or tenant must purchase and maintain an
individual system.
A Business Process Model and Notation (BPMN) activity is used to control the flow of
a process.
Waiting tables, teaching, and cutting hair are all examples of services that people pay
for to fulfill a need.
Website personalization occurs when a website has stored enough data about a person's
likes and dislikes to fashion offers more likely to appeal to that person.
A mashup is a website or web application that uses content from more than one source
to create a completely new product or service.
Veracity includes the uncertainty of data, including biases, noise, and abnormalities.
MIS is a business function, like accounting or sales, which moves information about
people, products, and processes across the company to facilitate decision making and
problem solving. What does MIS stands for?
A. Management Information Strategy
B. Management Intelligence System
C.Management Information System
D. Management Information Strategist
What is the logical relationship that exists between the project tasks, or between a
project task and a milestone?
A. resource
B. task
D. activity
What combines networks by splitting the available bandwidth into independent
channels that can be assigned in real time to a specific device?
A. server virtualization
B.network virtualization
C. disaster recovery as a service
D. storage virtualization
Which activities belong in the human resources department?
A. records, measures, and reports monetary transactions
B. tracks strategic financial issues, including money, banking, credit, investments, and
C. supports sales by planning, pricing, and promoting goods or services is marketing
D. maintains policies, plans, and procedures for the effective management of employees
What is the difference between a B2C and a C2B?
A. B2C focuses on companies as customers and C2B focuses on consumers as
B. B2C focuses on collaboration and C2B focuses on consumers.
C. B2C focuses on business to consumers and C2B focuses on consumers to business.
D. B2C focuses on consumers as customers and C2B focuses on companies as
What occurs when a redundant storage server offers an exact replica of the real-time
data, and if the primary server crashes, the users are automatically directed to a
secondary server?
B. disaster recovery cost curve
C. reliability
D. maintainability
What allows users to work from remote locations such as home or hotel using
high-speed Internet to access business applications and data?
B. repeater
C. packet header
D. virtual attenuation
In which of the five basic supply chain activities do you support customers and product
A. plan
B. source
C. deliver
What includes two or more private, public, or community clouds, but each cloud
remains separate and is only linked by technology that enables data and application
A. community cloud
B. private cloud
C. utility computing
D.hybrid cloud
What is a geocoin?
A. a device that measures the acceleration (the rate of change of velocity) of an item
and is used to track truck speeds or taxi cab speeds
B. an east/west measurement of position
C. a north/south measurement of position
D.a round coin-sized object, uniquely numbered, and hidden in geocache
What is a process by which a user misleads a system into granting unauthorized rights,
usually for the purpose of compromising or destroying the system?
A. elevation of privilege
B. packet tampering
C. spoofing
D. spyware
What is system software?
A. controls how the various technology tools work together along with the application
B. controls the application software and manages how the hardware devices work
C. provides additional functionality to the operating system
D. used for specific information processing needs, including payroll, customer
relationship management, project management, training, and many others
What is an online journal that allows users to post their own comments, graphics, and
A. selfie
B. blog
C. wiki
D. mashup
Which quadrant in the cost of downtime includes equipment rental, overtime costs, and
travel expenses?
A. fiscal responsibility
B. damaged reputation
C. other expenses
D. regeneration quadrant
The business decisions made by the finance department include promotion data, sales
data, and advertising data.
What represents key dates when a certain group of activities must be performed?
A.project milestones
B. project objectives
C. project assumptions
D. project deliverable
Which of the following represents the core drivers of the information age?
A. data, information, business intelligence, knowledge
B. fact, data, intelligence, experience
C. fact, intelligence, business skills, knowledge
D. data, intelligence, business information, knowledge
What is crowdsourcing?
A. An online marketing concept in which the advertiser attempts to gain attention by
providing content in the context of the user's experience in terms of its content, format,
style, or placement.
B. Content created and updated by many users for many users.
C. Buyers post feedback on sellers.
D. Refers to the wisdom of the crowd.
What occurs when a business sells directly to the customer online and cuts out the
middle man?
A. intermediaries
B. disintermediation
C. reintermediation
D. cybermediation
What is a computer portable enough to fit on a lap or in a bag and has its own power
source or battery?
A. tablet
C. laptop computer
D. desktop computer
Employees need to understand that email privacy exists to an extent and that corporate
email is solely owned by ________.
A. the individual user
B.the company
C. the human resources department
D. the individual user's department
What type of process includes order processing, customer service processing, sales
processing, customer billing processing, and order shipping processing?
A. customer-facing processes
B. business-facing processes
C. industry-specific customer facing processes
D. All of these are correct.
What is the primary difference between contact management and opportunity
A. Contact management deals with new customers; opportunity management deals with
existing customers.
B. Contact management deals with existing customers; opportunity management deals
with existing customers.
C. Contact management deals with new customers; opportunity management deals with
new customers.
D.Contact management deals with existing customers; opportunity management deals
with new customers.
What is the process of computerizing manual tasks, making them more efficient and
effective and dramatically lowering operational costs?
A. workflow
B. swim lane
C. automation
D. streamlining
What is a technique to gain personal information for the purpose of identity theft,
usually by means of fraudulent emails that look as though they came from legitimate
A. pharming
B. phishing
C. phishing expedition
D. spear phishing
What are several different types of software that sit between and provide connectivity
for two or more software applications?
A. enterprise systems
B. enterprise application integration
C. middleware
D. enterprise application integration middleware
What is text analytics?
A. analyzes text flowing across the Internet, including unstructured text from blogs and
B. the process of analyzing recorded calls to gather information; brings structure to
customer interactions and exposes information buried in customer contact center
interactions with an enterprise
C.analyzes unstructured data to find trends and patterns in words and sentences
D. analyzes unstructured data associated with websites to identify consumer behavior
and website navigation
Teaching, waiting tables, and cutting hair belong in which category?
A. goods
B. services
C. production
D. productivity
What includes activities that govern the flow of tangible, physical materials through the
supply chain such as shipping, transport, distribution, and warehousing?
A. procurement
B. logistics
C. materials management
D. bullwhip effect
At a local marketing firm, Steve is the lead web developer and is responsible for
working with customers on their web designs, development, and graphics. Which of the
following would be a critical skill Steve must have to be able to perform his job?
A. understanding that he must create a unique domain name for each client
B. being able to work with HTML
C. understanding of the World Wide Web and how hyperlinks work
D. All of these are correct.
What is a haptic interface?
A. the viewing of the physical world with computer-generated layers of information
added to it
B. a wearable computer with an optical head-mounted display (OHMD)
C. uses technology allowing humans to interact with a computer through bodily
sensations and movements
D. a work environment that is not located in any one physical space