Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

COP 92510

July 20, 2017
Who is responsible for ensuring the security of business systems and developing
strategies and safeguards against attacks by hackers and viruses?
A. Chief Knowledge Officer (CKO)
B. Chief Security Office (CSO)
C. Chief Technology Officer (CTO)
D. Chief Information Officer (CIO)
What is a sudden, unexpected event requiring immediate action due to potential threat
to health and safety, the environment, or property?
A.emergency
B. emergency preparedness
C. business Impact analysis
D. technology failure
Which of the following is a problem associated with dirty data?
A.duplicate data
B. correct data
C. accurate data
D. All of these are correct.
What is a small handheld computer that performs simple tasks such as taking notes,
scheduling appointments, and maintaining an address book and a calendar?
A. tablet
B. PDA
C. ebook
D. smartphone
What allows files containing text, programs, graphics, numerical data, and so on to be
downloaded off or uploaded onto a network?
A. file transfer protocol (FTP)
B. simple mail transfer protocol (SMTP)
C. hypertext transfer protocol (HTTP)
D. simple network management protocol (SNMP)
Which of the following is an example of a way to maintain information security that a
company should include in their information security policies?
A. requiring computer users to log off before leaving for lunch
B. never sharing user or password information with anyone
C. changing passwords every 30-60 days
D. All of these are correct.
Which of the following are intangible benefits?
A.improved decision making
B. decreased expenses
C. decreased response time
D. increased quantity or sales
Which policy can protect a company's brand identity and outlines the corporate
principles governing employee online communication?
A. an Internet workplace policy
B.a social media policy
C. a technology information policy
D. a YouTube policy
What is a primary key?
A.a field (or group of fields) that uniquely identifies a given entity in a table
B. a primary key of one table that appears as an attribute in another table and acts to
provide a logical relationship among the two tables
C. characteristics or properties of an entity
D. a field (or group of fields) that uniquely identifies a given attribute in a table
Which license restricts the use of the software to one user at a time?
A. single user license
B. network user license
C. site license
D. application service provide license
The ________ MIS infrastructure identifies where and how important information, such
as customer records, is maintained and secured.
A. sustainable
B.information
C. virtualized
D. agile
What is an application integration?
A.the integration of a company's existing management information systems
B. the integration of data from multiple sources, which provides a unified view of all
data
C. the information entered into a given system automatically to all downstream systems
and processes
D. the information entered into a given system automatically to all upstream systems
and processes
Which of the following governs the ethical and moral issues arising from the
development and use of information technologies, and the creation, collection,
duplication, distribution, and processing of information?
A. ethical information
B. information technology
C. information policies
D.information ethics
Susan is an executive at Equity Title where she is responsible for collecting,
maintaining and distributing knowledge for the company. What is Susan's role at Equity
Title?
A. Chief Knowledge Officer (CKO)
B. Chief Technology Officer (CTO)
C. Chief Information Officer (CIO)
D. Chief Security Officer (CSO)
Cars, groceries, and clothing belong in which category?
A. goods
B. services
C. production
D. productivity
What is the term for a computer-simulated environment that can be a simulation of the
real world or an imaginary world?
A. virtual reality
B. augmented reality
C. virtual workforce
D. All of these are correct.
The business decisions made by the marketing department include transactional data,
purchasing data, payroll data, and tax data.
What is distributed computing?
A.processes and manages algorithms across many machines in a computing
environment
B. focuses on forecasting future trends and producing insights using sophisticated
quantitative methods, including statistics, descriptive and predictive data mining,
simulation, and optimization
C. occurs when the user goes into an emotional state of over-analysis (or over-thinking)
a situation so that a decision or action is never taken, in effect paralyzing the outcome
D. a business analytics specialist who uses visual tools to help people understand
complex data
Cell phones have morphed into ________ that offer more advanced computing ability
and connectivity than basic cell phones.
A. micro computers
B.smart phones
C. streaming phones
D. super computers
What is disaster recovery as a service?
A. combines multiple network storage devices so they appear to be a single storage
device
B. combines networks by splitting the available bandwidth into independent channels
that can be assigned in real time to a specific device
C. combines the physical resources, such as servers, processors, and operating systems,
from the applications
D.offers backup services that use cloud resources to protect applications and data from
disruption caused by disaster
Assume you are in the business of producing and selling hamburgers. If you could
produce more hamburgers with the same input, what would happen to your productivity
and profits assuming the price of your hamburgers remains the same?
A. increase in productivity, decrease in profits
B. increase in productivity, increase in profits
C. decrease in productivity, decrease in profits
D. decrease in productivity, increase in profits
What is a coding process that takes a digital map feature and assigns it an attribute that
serves as a unique ID (tract number, node number) or classification (soil type, zoning
category)?
A.geocoding
B. geocache
C. geocoin
D. All of these are correct.
Which of the below is a WAN?
A. home office
B. business office
C. college dorm room
D.the Internet
What is a benefit of network convergence?
A. the uncoupling of voice, data, and video service
B. multiple services offered from several different vendors
C.multiple devices supported by one provider
D. All of these are correct.
What brings together people from industry, disability organizations, government, and
research labs from around the world to develop guidelines and resources to help make
the web accessible to people with disabilities including auditory, cognitive,
neurological, physical, speech, and visual disabilities?
A. capacity
B. web accessibility
C.web accessibility initiative
D. vulnerability
What is materials management?
A. purchase goods and services to meet the needs of the supply chain
B. includes the processes that control the distribution, maintenance, and replacement of
materials and personnel to support the supply chain
C. includes activities that govern the flow of tangible, physical materials through the
supply chain such as shipping, transport, distribution, and warehousing
D. occurs when distorted product-demand information ripples from one partner to the
next throughout the supply chain
Which internal reports present information with little or no filtering or restrictions of
the data?
A. internal reports
B.detailed internal reports
C. summary internal reports
D. exception reports
What is procurement?
A.purchase goods and services to meet the needs of the supply chain
B. includes the processes that control the distribution, maintenance, and replacement of
materials and personnel to support the supply chain
C. includes activities that govern the flow of tangible, physical materials through the
supply chain such as shipping, transport, distribution, and warehousing
D. occurs when distorted product-demand information ripples from one partner to the
next throughout the supply chain
CFSs and KPIs are the two core metrics used within a business to track progress or
success. What is the relationship between CSFs and KPIs?
A. CFSs are business strategy elements where KPIs measure the progress of the CFSs.
B. CFSs build the business environment where KPIs explain how to build the CFSs.
C. KPIs are used first where CFSs are applied after.
D. KPIs promote employees on their performance level where CFSs demote employees
based on their performance level.
Which of the following represents the definition of a variable?
A. a data characteristic that is collected through competitive intelligence and cannot
change over time
B. a data characteristic that stands for a value that changes or varies over time
C. a data characteristic that stands for a value that does not change or vary over time
D. a data characteristic that is collected only through competitive intelligence and can
change over time
Which of the following would not be considered part of the accurate characteristic of
high-quality information?
A. Is the name spelled correctly?
B. Is the email address invalid?
C. Do the name and the phone values have the exact same information?
D. Is aggregate information in agreement with detailed information?
When reviewing Porter's value chain analysis, which of the following provides
customer support after the sale of goods and services?
A. inbound logistics
B. outbound logistics
C. operations
D. service
Which of the following represents procurement as part of the support value activities in
a value chain analysis?
A. purchases inputs such as raw materials, resources, equipment and supplies
B. applies MIS to processes to add value
C. distributes goods and services to customers
D. promotes, prices, and sells products to customers
Which question below represents a CRM reporting technology example?
A. Why did sales not meet forecasts?
B. What customers are at risk of leaving?
C. What is the total revenue by customer?
D. All of these are correct.
What is the outsourcing option that includes the most remote location and indirect
customer control?
A. onshore outsourcing
B. nearshore outsourcing
C.offshore outsourcing
D. None of these are correct.

Subscribe Now

Sign up to view full document

View Document