Book Title
Business Driven Information Systems 5th Edition

COP 73526

July 20, 2017
What is any proprietary software licensed under exclusive legal right of the copyright
A. closed source
B. open source
C. code source
D. network source
What is a program that secretly takes over another computer for the purpose of
launching attacks on other computers?
A. zombie
B. zombie farm
C. pharming attack
D. time bomb
What offers backup services that use cloud resources to protect applications and data
from disruption caused by disaster?
A. server virtualization
B. network virtualization
C.disaster recovery as a service
D. storage virtualization
Which tags have their own transmitter and a power source (typically a battery)?
A.active RFID
B. semi-passive RFID
C. RFID accelerometer
D. chipless RFID
Identifying competitive advantages can be difficult and explains why they are typically
A. temporary
B. satisfactory
C. terminated
D. unsuccessful
Which of the following examines the organizational resource of information and
regulates its definitions, uses, value, and distribution ensuring it has the types of data or
information required to function and grow effectively?
A. information code
B. information technology
C.information management
D. information governance
What is one of the biggest pitfalls associated with real-time information?
A. It is only available to high-level executives due to the expense.
B. It is only available in aggregate levels of granularity.
C.It continually changes.
D. It rarely changes.
Cheap electricity is great for keeping business energy costs down, but this mean that we
have to rely more on ________ for power.
A. cars
C. gasoline
D. All of these are correct.
What is hardware?
A. any computer-based tool that people use to work with information and support the
information and information-processing needs of an organization
B. the set of instructions that the hardware executes to carry out specific tasks
C. consists of the physical devices associated with a computer system
D. an electronic device operating under the control of instructions stored in its own
memory that can accept, manipulate, and store data
What measures the cost-effectiveness of a project?
A.economic feasibility
B. operational feasibility
C. schedule feasibility
D. technical feasibility
What is the difference between ecommerce and ebusiness?
A. Ecommerce includes Internet network effects; ebusiness includes ecommerce and all
activities related to internal and external business operations.
B. Ecommerce is buying and selling of goods or services online; ebusiness includes
ecommerce and all activities related to internal and external business operations.
C. Ecommerce includes ecommerce and all activities related to internal and external
business operations; ebusiness includes all of the of knowledge management systems.
D. Ebusiness is buying and selling of goods or services online; ecommerce includes
ecommerce and all activities related to internal and external business operations.
Which gate in the RUP methodology expands on the agreed-upon details of the system,
including the ability to provide an architecture to support and build it?
A. inception
C. construction
D. transition
What is a magazine published only in electronic form on a computer network?
A. selfie
B. selfzine
C. wiki
D. ezine
What is forging of someone's identity for the purpose of fraud?
A. identity crisis
B. identity theft
C. ediscovery
D. All of these are correct.
What are the three pressures driving sustainable MIS infrastructures?
A. decreases in electronic waste, energy waste, and carbon emissions
B. increases in ewaste, energy waste, and dynamic scaling
C.increases in electronic waste, energy waste, and carbon emissions
D. decreases in ewaste, energy waste, and carbon footprints
What is the actual hardware that interprets and executes the program (software)
instructions and coordinates how all the other hardware devices work together?
B. control unit
D. primary storage
What is the time of day of an expected arrival at a certain destination and is typically
used for navigation applications?
A.estimated time of arrival
B. estimated time en route
C. latitude
D. longitude
Which of the following uses both GIS and GPS?
A. navigation
B. wireless advertising
C. vehicle location
D.All of these are correct.
What would a company like eBay or Amazon be constantly benchmarking?
A. MIS efficiency
B. MIS effectiveness
C. MIS efficiency and MIS effectiveness
D. usability metrics only
A computer is an electronic device operating under the control of instructions stored in
its own memory that can accept, manipulate, and store data.
What enables computers to run multiple operating systems and multiple software
applications at the same time and creates multiple "virtual" machines all on a single
computing device?
B. innovation
C. availability
D. viral computing
What are websites that rely on user participation and user-contributed content, such as
Facebook, LinkedIn, and YouTube?
A. synchronous communication
B. social media
C. social networking
D. asynchronous communication
Feedback is information that returns to its original transmitter and modifies the
transmitter's actions. What would the original transmitter include?
A. input, transform, output
B. input, transform, outnumber
C. output, input, performer
D. input, process, transform
What type of Internet monitoring technique records information about a customer
during a web surfing session such as what websites were visited and how long the visit
was, what ads were viewed, and what was purchased?
A. key logger
B. stealthware
D. web log
Which of the following allows high-speed digital data transmission over standard
telephone lines?
A.digital subscriber line (DSL)
B. data subscription service (DSS)
C. dominance service line (DSL)
D. data converter input (DCI)
Which of the following is a computer attack where an attacker accesses a wireless
computer network, intercepts data, uses network services, and/or sends attack
instructions without entering the office or organization that owns the network?
A. backdoor programs
B.drive-by hacking
C. polymorphic viruses and worms
D. hacker
What is the biggest benefit of VoIP?
A.lowers costs
B. clear connection
C. higher expenses
D. All of these are correct.
Which of the following represents the connecting and communicating tools supporting
and driving ebusiness?
A. email, instant messaging, podcasting, content management systems, and video and
web conferencing
B. content providers, infomediaries, online marketplaces, portals, service providers,
transaction brokers
C. B2B, B2C, C2C, C2B
D. advertising fees, license fees, subscription fees, transaction fees, value-added
services fees
What is the difference between asynchronous and synchronous communication?
A. Asynchronous is real-time communication; synchronous is one-way technology.
B. Asynchronous is communication that does not occur at the same time; synchronous
communication occurs at the same time.
C. Asynchronous communication includes instant messaging; synchronous
communication includes email.
D. Asynchronous communication is fast and instant; synchronous communication is
collected at a single point in time.
A voiceprint is a set of measurable characteristics of a human voice that uniquely
identifies an individual. These characteristics, which are based on the physical
configuration of a speaker's mouth and throat, can be expressed as a mathematical
formulA. Unfortunately, biometric authentication such as voiceprints can be costly and
Which of the metrics below represents an unfilled customer order for a product that is
out of stock?
A.back order
B. inventory cycle time
C. customer order cycle time
D. inventory turnover
Efficiency MIS metrics focus on the extent to which a firm is using its resources in an
optimal way, while effectiveness MIS metrics focus on _________.
A. understanding how successful a firm is at achieving its goals and objectives
B. analyzing if a firm is doing the right things
C. setting the right goals and ensuring they are accomplished
D. All of these are correct.
What is the category of computer security that addresses the protection of data from
unauthorized disclosure and confirmation of data source authenticity?
A. information secrecy
B. phishing
C. phishing expedition
D. spear phishing
Your textbook discussed a record store example where one user could perform a query
to determine which recordings had a track length of four minutes or more, and another
user could perform an analysis to determine the distribution of recordings as they relate
to the different categories. This is an advantage of which database example?
A. increased scalability and performance
B. increased information security
C. reduced information redundancy
D. increased flexibility
Which of the following include the three primary network categories?
A. DSL, Cable Modem, Broadband