Book Title
Business Driven Information Systems 5th Edition

COSC 94253

July 20, 2017
Imagine you are creating a new product to sell in an up-and-coming market. Which of
the following statements indicates that it would be easy for you as the new entrant to
compete in this market?
A. The threat of new entrants force is high in the up-and-coming market.
B. The threat of new entrants force is low in the up-and-coming market.
C. The threat of new entrants force is impossible to define in the up-and-coming
D. All of these are correct, depending on the time of year.
When considering the 5 steps of the order-to-delivery business process, which step
includes places orders, notifies production, and checks credit?
A. Step 2 " Sales
B. Step 1 " Marketing
C. Step 3 " Operations management
D. Step 5 " Customer service
What is speech analytics?
A. analyzes text flowing across the Internet, including unstructured text from blogs and
B.the process of analyzing recorded calls to gather information; brings structure to
customer interactions and exposes information buried in customer contact center
interactions with an enterprise
C. analyzes unstructured data to find trends and patterns in words and sentences
D. analyzes unstructured data associated with websites to identify consumer behavior
and website navigation
What is data?
A. raw facts that describe the characteristics of an event or object
B. data converted into a meaningful and useful context
C. information collected from multiple sources that analyzes patterns, trends, and
relationships for strategic decision making
D. skills, experience, and expertise, coupled with information and intelligence, that
creates a person's intellectual resources
Which implementation installs the new system in phases (for example by department)
until it is verified to work correctly?
A. parallel implementation
B. plunge implementation
C. pilot implementation
D.phased implementation
What is a widely held but difficult to achieve standard of availability for a system?
A."five 9s" availability
B. "1%" minimum availability
C. the "five's accessibility" code
D. "five 10s" availability
Determining what is ethical can sometimes be difficult because certain actions can be
justified or condemned depending on how you view the relationship between ________
and ________.
A. legal and confidential
B.legal and ethical
C. legal and technical
D. confidential and open
What is a device that is around the same size as a credit card, containing embedded
technologies that can store information and small amounts of software to perform some
limited processing?
A. token
B. password
C. smart card
D. biometrics
What allows more than one piece of software to be used at a time?
A. system software
B. operating system software
C. embedded operating system
D. multitasking
What is vishing?
A. reroutes requests for legitimate websites to false websites
B. a technique to gain personal information for the purpose of identity theft, usually by
means of fraudulent emails that look as though they came from legitimate businesses
C. a masquerading attack that combines spam with spoofing
D. a phone scam that attempts to defraud people by asking them to call a bogus
telephone number to "confirm" their account information
What are the two different categories for information type?
A. analytical and productive
B. analytical and analysis
C.transactional and analytical
D. transactional and analysis
Which of the following represents a company in a supply chain?
A. customer and competitor
B. supplier and competitor
C. knowledge worker and supplier
D. supplier and customer
What is application software?
A. controls how the various technology tools work together along with the application
B. controls the application software and manages how the hardware devices work
C. provides additional functionality to the operating system
D. used for specific information processing needs, including payroll, customer
relationship management, project management, training, and many others
The business decisions made by the finance department include investment data,
monetary data, and reporting data.
What includes a variety of threats such as viruses, worms, and Trojan horses?
A. malicious code
B. hoaxes
C. spoofing
D. sniffer
What indicates the earning power of a project?
B. metrics
C. best practices
What generates revenue each time a website visitor is converted to a customer?
A. pay-per-click
B. pay-per-call
C. pay-per-conversion
D. All of these are correct.
The ________ MIS infrastructure includes the hardware, software, and
telecommunications equipment that, when combined, provides the underlying
A. information
B. virtualized
D. sustainable
What is a threat?
A. the electronic defacing of an existing website
B. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by
repeatedly clicking on a link to increase charges or costs for the advertiser
C. a computer crime where a competitor or disgruntled employee increases a company's
search advertising costs by repeatedly clicking on the advertiser's link
D.an act or object that poses a danger to assets
Van Lines Inc. is a large corporation operating in all 50 states. Jim Poulos is the
regional manager overseeing the western division, which includes Utah, Colorado,
Idaho, Montana, Wyoming, and Nevada. Jim receives data from his managers in each
state which he loads into his digital dashboard for analysis of his entire western
division. What digital dashboard capability is Jim primarily using?
A. drill-down
B. slice-and-dice
C. intelligent system
D. consolidation
What is classification?
A. determines values for an unknown continuous variable behavior or estimated future
B. determines which things go together
C. segments a heterogeneous population of more homogeneous subgroups
D. assigns records to one of a predefined set of classes
What compiles customer information from a variety of sources and segments the
information for different marketing campaigns?
A. campaign management system
B. cross-selling
C. up-selling
D.list generator
What types of business decisions would an EIS use AI for?
A. semistructured decisions
B. multistructured decisions
C. structured decisions
D. unstructured decisions
What is a computer dedicated to providing information in response to requests?
A. hardware
B. software
C. client
Gender can be referred to in many ways (Male, Female, M/F, 1/0) in a data warehouse.
Ensuring gender is referenced the same way is an example of ________.
A. information scaling
B. streamlining data points
C.standardizing information
D. standardizing protocols
What are measurements that evaluate results to determine whether a project is meeting
its goals?
B. metrics
C. best practices
What can a manager use a model to do?
A. calculate risk
B. change variables
C. understand uncertainty
D. All of these are correct.
What is the type of knowledge that consists of anything that can be documented,
archived, and codified, often with the help of a MIS department?
A. tacit knowledge
B. explicit knowledge
C. pure knowledge
D. virtual knowledge
What is RFID?
A. a process that builds-layer by layer in an additive process-a three dimensional solid
object from a digital model
B.the use of electronic tags and labels to identify objects wirelessly over short distances
C. unmanned aircraft that can fly autonomously, or without a human
D. the focus on creating artificial intelligence devices that can move and react to
sensory input
Many believe that U.S. tax policy should provide a level playing field for traditional
retail businesses, mail order companies, and online merchants. What form of ebusiness
challenge is this statement referring to?
A. adhering to taxation rules
B. ensuring consumer protection
C. identifying limited market segments
D. managing consumer relationships
What manages the transportation and storage of goods?
A. software customization
B. data integration
C. elogistics
D. eprocurement
As the product manager for the eatery division at Whole Foods, Jerry is responsible for
analyzing sales data to help him manage his team. Today Jerry is analyzing his data by
looking at details, and details of details, of information. Which of the following
common digital dashboard capabilities is Jerry using to analyze his department's
A. slice-and-dice
B. pivot
C. drill-down
D. consolidation

Subscribe Now

Sign up to view full document

View Document