Book Title
Business Driven Information Systems 5th Edition


July 19, 2017
IP address is a simple network protocol that allows the transfer of files between two
computers on the Internet.
Analytical CRM provides customer segmentation, which divides a market into
categories that share similar attributes such as age, location, gender, habits, and so on.
By segmenting customers into groups, it becomes easier to create targeted marketing
and sales campaigns, ensuring that you are not wasting resources marketing products to
the wrong customers.
An agile methodology aims for customer satisfaction through early and continuous
delivery of useful software components developed by an iterative process using the bare
minimum requirements.
The main challenges facing networks include security and social, ethical, and political
A few examples of ebusiness advantages can include opening new markets, reducing
costs, and expanding global reach.
ROM is nonvolatile, meaning it does not require constant power to function. ROM
contains essential system programs that neither the user nor the computer can erase.
Since the computer's internal memory is blank during start-up, the computer cannot
perform any functions unless given start-up instructions.
Timely information asks if the information is current with respect to the business needs.
Value chain analysis views a firm as a series of business processes that each adds value
to the product or service.
Affinity determines values for an unknown continuous variable behavior or estimated
future value.
Cache memory is a small unit of ultra-fast memory that is used to store recently
accessed or frequently accessed data so that the CPU does not have to retrieve this data
from slower memory circuits such as RAM.
Web 2.0 is the next generation of Internet that uses a more mature, distinctive
communications platform characterized by new qualities such as collaboration, sharing,
and free.
Virtual reality is a computer-simulated environment that can be a simulation of the real
world or an imaginary world.
IP address is a unique number that identifies where computers are located on the
The three Business 2.0 communication and collaboration tools a business can use to
harness the power of people include blogs, wikis, and mashups.
A good way to understand the client'server relationship is when someone uses a web
browser (this would be the client) to access a website (this would be a server that would
respond with the web page being requested by the client).
Complete information asks if there is an incorrect value in the information.
A wide area network (WAN) spans a large geographic area such as a state, province, or
country. Perhaps the best example is the Internet.
Affinity grouping determine which things go together.
Data visualization tools can help uncover correlations and trends in data that would
otherwise go unrecognized.
Detailed user documentation is created that highlights how to use the system and how
to troubleshoot issues or problems.
Gigahertz is the number of millions of CPU cycles per second.
A site license enables any qualified users within the organization to install the software,
regardless if the computer is on a network. Some employees might install the software
on a home computer for working remotely.
Digital dashboards offer consolidation, drill-down, and slice-and-dice capabilities.
Every company, regardless of size, relies on some form of MIS infrastructure, whether
it is a few personal computers networked together or many interconnected around the
SOA ensures that MIS systems can adapt quickly, easily, and economically to support
rapidly changing business needs.
Integrations provide enterprisewide support and data access for a firm's operations and
business processes.
Complete information asks if there is a value missing from the information.
ROM is nonvolatile, meaning it does not require constant power to function. ROM
contains essential system programs that neither the user nor the computer can erase.
Since the computer's internal memory is blank during start-up, the computer cannot
perform any functions unless given start-up instructions.
A business rule defines how a company performs certain aspects of its business and
typically results in either a yes/no or true/false answer.
The proportion of the market that a firm captures is called market share.
A primary key is the smallest or basic unit of information.
Advanced analytics processes and manages algorithms across many machines in a
computing environment.
Outbound logistics distributes goods and services to customers.
Information system control reports ensure the reliability of information, consisting of
policies and their physical implementation, access restrictions, or recordkeeping of
actions and transactions.
A worm spreads itself, not only from file to file, but also from computer to computer.
The primary difference between a virus and a worm is that a virus must attach to
something, such as an executable file, to spreaD. Worms do not need to attach to
anything to spread and can tunnel themselves into computers.
Personal information management (PIM) software handles contact information,
appointments, task lists, and email.
A requirements definition document prioritizes all of the business requirements by order
of importance to the company.
Intelligent systems are various commercial applications of artificial intelligence.
What is information redundancy?
A. duplication of data
B. storing the same data in multiple places
C. storing duplicate data in multiple places
D. All of these are correct.
Some industries' competition is much more intense than others. Retail grocery stores
such as Kroger, Safeway, and Albertson's in the United States experience fierce
competition and offer similar marketing campaigns to compete. What is this an example
of in terms of Porter's Five Forces?
A. rivalry among new entrants
B. rivalry among existing competitors
C. threat of substitute products or services
D. buyer power
What is web analytics?
A.unstructured data associated with websites to identify consumer behavior and website
B. analyzes structured data associated with a website
C. filters information, both structured and unstructured, to help identify strong web
D. None of these are correct.
Which of the following business applications is a satellite-based navigation system
providing extremely accurate position, time, and speed information?
A. radio-frequency identification
B.global positioning systems
C. geographic information systems
D. location-based services
What type of measurement uses market share as a KPI?
A. fuzzy logic measurement
B. external measurement
C. neural network measurement
D. internal measurement
Which of the following contains general principles to guide computer user behavior?
A. information technology code
B. technology policy
C.ethical computer use policy
D. information systems
Where would you categorize strengths in a SWOT analysis?
A. internal, helpful
B. internal, harmful
C. external, helpful
D. external, harmful
What contains high-capacity storage that holds data such as captured images, music, or
text files?
B. a memory stick
C. a memory card
D. flash memory
What is a person or event that is the catalyst for implementing major changes for a
system to meet business changes?
A. change controller
B. change over
C. change management
D.change agent
Which of the following is not a technology company but used technology to revamp the
business process of renting videos?
A. Netflix
B. Dell
C. Zappos
D. Amazon
What is the ability of an organization to tailor its products or services to the customers'
A. personalization
B. long tail
C. mass customization
D. information reach
What is an input device designed for special applications for use by people with
different types of special needs?
A. input device
B. output device
C. adaptive computer devices
D. magnetic medium devices
What is the basic business system that serves the operational level and assists in making
structured decisions?
What are systems are used to create the digital designs and then manufacture the
A.computer-aided design/computer-aided manufacturing.
B. maker movement
C. makerspace
D. RFID electronic product code
What describes how products in a network increase in value to users as the number of
users increase?
A. network effect
C. mashup editor
D. mcommerce
What are advanced analytics?
A. processes and manages algorithms across many machines in a computing
B.focuses on forecasting future trends and producing insights using sophisticated
quantitative methods, including statistics, descriptive and predictive data mining,
simulation, and optimization
C. occurs when the user goes into an emotional state of over-analysis (or over-thinking)
a situation so that a decision or action is never taken, in effect paralyzing the outcome
D. a business analytics specialist who uses visual tools to help people understand
complex data
What is the primary goal of the As-Is process model?
A. to outline the process elements for the To-Be process
B. to create process choices for the As-Is process
C. to simplify, eliminate, and improve the To-Be process
D. to analyze the To-Be process elements
Which of the following is a challenge facing an ebusiness?
A. improving information content
B. increasing convenience
C. decreasing costs
D. managing consumer trust
What focuses on forecasting future trends and producing insights using sophisticated
quantitative methods, including statistics, descriptive and predictive data mining,
simulation, and optimization?
A. big data
B. distributed computing
C.advanced analytics
D. data scientist
What is any measurable, tangible, verifiable outcome, result, or item that is produced to
complete a project or part of a project?
A. project milestones
B. project objectives
C. project assumptions
D.project deliverable
What uses a systematic approach in an attempt to improve business effectiveness and
efficiency continuously?
A. static process
B. dynamic process
C. sales process
D. customer service process
Which characteristics support a sustainable MIS infrastructure?
A. accessibility, availability, maintainability, portability, reliability, scalability, usability
B. backup and recovery plan, disaster recovery plan, business continuity planning
C.grid computing, cloud computing, and virtualization
D. storage, network, and server virtualization
What is dumpster diving?
A. a form of social engineering in which one individual lies to obtain confidential data
about another individual
B. a hacker that looks through your trash to find personal information
C. legitimate users who purposely or accidentally misuse their access to the
environment and cause some kind of business-affecting incident
D. malicious agents designed by spammers and other Internet attackers to farm email
addresses off websites or deposit spyware on machines
What is a nonprofit organization that has assumed the responsibility for Internet
Protocol (IP) address space allocation, protocol parameter assignment, domain name
system management, and root server system management functions previously
performed under U.S. government contract?
C. World Wide Web Consortium
D. Internet Corporation for Assigned Names and Numbers (ICANN)
Who are the primary users of ERP systems?
A. sales, marketing, customer service
B.accounting, finance, logistics, and production
C. customers, resellers, partners, suppliers, and distributors
D. All of these are correct.
To create an SSL connection, a web server requires a ________, which is an electronic
document that confirms the identity of a website or server and verifies that a public key
belongs to a trustworthy individual or company.
A. DSL degree
B. SSL degree
C.SSL certificate
D. DSL certificate
What is user-contributed content?
A. an online marketing concept in which the advertiser attempts to gain attention by
providing content in the context of the user's experience in terms of its content, format,
style, or placement
B. buyers post feedback on sellers
C. content created and updated by many users for many users
D. refers to the wisdom of the crowd
Which of the following policies states that users agree to follow it in order to be given
access to corporate email, information systems, and the Internet?
A. acceptable use policy
B. social media policy
C. information privacy policy
D. email privacy policy
What is the standard that specifies the format of data as well as the rules to be followed
during transmission?
A. bandwidth
B. bit rate
D. transmission record
Review the following key terms. Which one defines an operational decision that
involves situations where established processes offer potential solutions?
A. optimization analysis decision
B. artificial intelligence decision
C. structured decision
D. unstructured decision