Book Title
Business Driven Information Systems 5th Edition

COP 51104

July 19, 2017
The Internet marketplace is free of most forms of traditional sales tax.
An access point (AP) is the computer or network device that serves as an interface
between devices and the network. Each computer initially connects to the access point
and then to other computers on the network.
Relational integrity constraints are rules that enforce basic and fundamental
information-based constraints.
Tokens are small electronic devices that change user passwords automatically.
The digital divide is a wireless PAN technology that transmits signals over short
distances among cell phones, computers, and other devices.
Mobile means the technology can travel with the user; for instance, users can download
software, email messages, and web pages onto a laptop or other mobile device for
portable reading or reference. Information collected while on the road can be
synchronized with a PC or company server.
A stakeholder is a person or group that has an interest or concern in an organization.
Stakeholders drive business strategies, and depending on the stakeholder's perspective,
the business strategy can change.
Flexibility represents the maximum throughput a system can deliver, for example the
capacity of a hard drive represents the size or volume.
The Innovator's Dilemma, a book by Clayton Christensen, discusses how established
companies can take advantage of disruptive technologies without hindering existing
relationships with customers, partners, and stakeholders.
Desktop publishing transforms a computer into a desktop publishing workstation.
Leading packages include Adobe FrameMaker, Adobe PageMaker, and QuarkXpress.
Social bookmarking allows users to share, organize, search, and manage bookmarks.
Technology recovery strategies focus specifically on prioritizing the order for restoring
hardware, software, and data across the organization that best meets business recovery
Copyright is an exclusive right to make, use, and sell an invention and is granted by a
government to the inventor.
Network virtualization combines networks by splitting the available bandwidth into
independent channels that can be assigned in real time to a specific device.
Web 3.0 refers to static text-based information websites.
Examples of dynamic processes include running payroll, calculating taxes, and creating
financial statements.
MMSDB creates, reads, updates, and deletes data in a database while controlling access
and security.
The chief knowledge officer is responsible for overseeing all uses of MIS and ensuring
that MIS strategically aligns with business goals and objectives.
Transmission control protocol/Internet protocol (TCP/IP) provides the technical
foundation for the public Internet as well as for large numbers of private networks.
Graphics or Microsoft PowerPoint includes facilities for making a wide variety of
charts and graphs and for adding titles, legends, and explanatory text anywhere in the
chart or graph.
A disk image organizes information on a hard disk in the most efficient way.
Fair information practices is a general term for a set of standards governing the
collection and use of personal data and addressing issues of privacy and accuracy.
Summary internal reports highlight situations occurring outside of the normal operating
range for a condition or standard.
Computer-aided design/computer-aided manufacturing (CAD/CAM) systems are used
to create the digital designs and then manufacture the products.
Classification assigns records to one of a predefined set of classes.
There are many challenges to changing doctors, including transferring medical records
and losing the doctor patient relationship along with the doctor's knowledge of the
patient's history. Changing doctors provides a great example of switching costs.
A certificate authority is a trusted third party, such as VeriSign, that validates user
identities by means of digital certificates.
Worldwide Interoperability for Microwave Access (WiMAX), a communications
technology aimed at providing high-speed wireless data over metropolitan area
The primary difference between operational CRM and analytical CRM is the direct
interaction between the organization and its suppliers.
GIS map automation links business assets to a centralized system where they can be
tracked and monitored over time.
Elogistics manages the transportation and storage of goods.
Voice over IP is a computer network that relies on the computing power and bandwidth
of the participants in the network rather than a centralized server.
A shopping bot is one of the simplest examples of an intelligent agent.
A knowledge management system (KMS) supports the capturing, organization, and
dissemination of knowledge (i.e., know-how) throughout an organization. KMS can
distribute an organization's knowledge base by interconnecting people and digitally
gathering their expertise.
Which of the following represents adwords?
A. email, instant messaging, podcasting, content management systems, and video and
web conferencing
B. content providers, infomediaries, online marketplaces, portals, service providers,
transaction brokers
C. keywords that advertisers choose to pay for and appear as sponsored links on the
Google results pages.
D. advertising fees, license fees, subscription fees, transaction fees, value-added
services fees
What is the primary difference between an entity and an attribute?
A. an attribute is a table, an entity is a column from the attribute table
B. an entity is specific, whereas an attribute is not data at all but brainstorming ideas
that take place before the entity is created
C. an attribute refers to applications, and an entity refers to executives
D. an entity is a table that stores information about people, places, or events, whereas an
attribute is a column or specific field of the data elements associated with an entity
What is software written with malicious intent to cause annoyance or damage?
A. elevation of privilege
B. spoofing
C. sniffer
D. virus
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
A. ediscovery
B. Child Online Protection Act
C. digital rights management
D.pirated software
What is it called when distorted product-demand information ripples from one partner
to the next throughout the supply chain?
A.bullwhip effect
B. demand planning systems
C. supply chain planning systems
D. supply chain execution systems
Which of the following include the three primary network protocols?
A. DSL, Cable Modem, Broadband
What represents an east/west measurement of position?
A. estimated time of arrival
B. estimated time en route
C. latitude
What is the computer's main memory, which consists of the random access memory
(RAM), cache memory, and read-only memory (ROM) that is directly accessible to the
B. control unit
C. secondary storage
D. primary storage
Most business processes are cross-functional or cross-departmental processes that span
the entire organization. Which of the following does not represent a cross-functional
business process?
A. order-to-delivery process
B. loan processing
C. taking a product from concept to market
D. processing payroll
What is the current version of HTML that delivers everything from animation to
graphics and music to movies?
B. URL 3
What is a small unit of ultra-fast memory that is used to store recently accessed or
frequently accessed data so that the CPU does not have to retrieve this data from slower
memory circuits such as RAM?
B. cache memory
C. volatility
D. flash memory
Which of the following include the three primary network categories?
Which of the following represents the bus topology?
A. All devices are connected to a central cable or backbone.
B. All devices are connected to a central device, called a hub.
C. All devices are connected to one another in the shape of a closed loop, so that each
device is connected directly to two other devices, one on either side of it.
D. Groups of star-configured workstations are connected to a linear bus backbone cable.
Which social media site works by allowing content to find the users, instead of the
users having to search for the content?
A. MySpace
B. Facebook
C. Google
D. StumbleUpon
What is the ability to get a system up and running in the event of a system crash or
failure that includes restoring the information backup?
A. failure tolerance
C. reliability
D. capacity planning
Which of the following agile MIS infrastructure characteristics refers to the ability of an
application to operate on different devices or software platforms, such as different
operating systems?
A. reliability
C. maintainability
D. usability
Which of the following is a type of data connection able to transmit a digital signal at
1.544 Mpbs and is more expensive and reliable than cable or DSL?
A.T1 line
B. dial-up line
C. modem line
D. All of these are correct.
Which of the choices below represents the definition of information compliance?
A. the act of conforming, acquiescing, or yielding information
B. the ability to comply with software
C. the understanding of technology
D. the verbalization of information governance in a company's policies and procedures
What is a communications system created by linking two or more devices and
establishing a standard methodology in which they can communicate?
B. software
C. client
D. server
Which license enables anyone on the network to install and use the software?
A. single user license
B. network user license
C. site license
D. application service provide license
What includes threats, negative remarks, or defamatory comments transmitted via the
Internet or posted on the website?
A. cyberbullying
B. information vandalism
C. cookie
Which implementation uses both the legacy system and new system until all users
verify that the new system functions correctly?
A.parallel implementation
B. plunge implementation
C. pilot implementation
D. phased implementation
Which of the following is not a characteristic associated with Mozilla Firefox?
A. Mozilla Firefox holds over 20% of the web browser market.
B. Mozilla Firefox offers a free email service called Thunderbird.
C. Mozilla Firefox is a prime example of open source software.
D. Mozilla Firefox is a prime example of a reputation system.
A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit
and receive data and can be divided into which two categories?
A. cellular communications and multiple user communication systems
B. mobile and wireless technologies
C.cellular and satellite communication systems
D. client and server systems
What is a group of people who respond to users' questions?
A. online training
B. workshop training
C.help desk
D. corrective maintenance
What is ediscovery?
A. the unauthorized use, duplication, distribution, or sale of copyrighted software
B. refers to the ability of a company to identify, search, gather, seize, or export digital
information in responding to a litigation, audit, investigation, or information inquiry
C. passed to protect minors from accessing inappropriate material on the Internet
D. a technological solution that allows publishers to control their digital media to
discourage, limit, or prevent illegal copying and distribution
Which of the following statements is correct?
A. just putting up a website can create tremendous ebusiness value
B. just putting up a website can create tremendous business buzz
C. just putting up a website can limit product availability
D. just putting up a website does not create an ebusiness
Which of the choices below offers an example of a LAN?
A. the Internet
B. Microsoft's main campus in Washington
C. the city of Denver's court and police departments
D.college campus
Which of the following implies that information is current with respect to the business
A. uniqueness
B. accuracy
C. consistency
D. timeliness
What is war chalking?
A. allows mobile voice calls to be made over broadband networks, creatingunder the
right network conditionsclearer audio and fewer dropped calls
B.the practice of tagging pavement with codes displaying where Wi-Fi access is
C. deliberately searching for Wi-Fi signals while driving by in a vehicle
D. remotely controls smart phones and tablets, ensuring data security
Which of the following is considered the process in the systems thinking example of a
B. optimization
C. forecasts
D. simulation
What is middleware?
A. the use of the Internet to provide customers with the ability to gain personalized
information by querying corporate databases and their information sources
B. the integration of data from multiple sources, which provides a unified view of all
C. the translation of information between disparate systems
D. packages commonly used applications together, reducing the time needed to
integrate applications from multiple vendors
Which of the following is not an example of explicit knowledge?
A. marketing research
B. patent
C. trademark
D. employee opinion
E. marketing research