Book Title
Business Driven Information Systems 5th Edition

CS 26291

July 19, 2017
Fault tolerance is an exact copy of a system's information.
Epolicies are policies and procedures that address information management along with
the ethical use of computers and the Internet in the business environment.
Dynamic website information is stored in a dynamic catalog, or an area of a website
that stores information about products in a database.
Unsustainable, or green, MIS describes the production, management, use, and disposal
of technology in a way that minimizes damage to the environment.
A foreign key is a field (or group of fields) that uniquely identifies a given entity in a
Integrity constraints are rules that help ensure the quality of information.
An SOA service is simply a business task, such as checking a potential customer's credit
rating when opening a new account.
Scalability refers to the ability of an application to operate on different devices or
software platforms, such as different operating systems.
The ability to get a system up and running in the event of a system crash or failure that
includes restoring the company information is called a failover.
Portability refers to the ability of an application to operate on different devices or
software platforms, such as different operating systems.
Social media maps group contacts (personal and professional) identifying who knows
each other and who works together. In a company it can provide a vision of how
employees work together.
Unstructured data is typically stored in a traditional system such as a relational database
or spreadsheet and accounts for about 20 percent of the data that surrounds us.
In-sourcing (in-house development) uses the professional expertise within an
organization to develop and maintain its information technology systems. In-sourcing
has been instrumental in creating a viable supply of IT professionals and in creating a
better quality workforce combining both technical and business skills.
Application service provider licenses specialty software paid for on a license basis or
per-use basis or usage-based licensing.
3D printing is an unmanned aircraft that can fly autonomously, or without a human.
Emergency preparedness ensures a company is ready to respond to an emergency in an
organized, timely, and effective manner.
A one-to-many relationship occurs between two entities in which an instance of one
entity can be related to only one instance of a related entity.
The project managers are individuals and organizations actively involved in the project
or whose interests might be affected as a result of project execution or project
The evolution of CRM is reporting, analyzing, and predicting.
Unstructured data has a defined length, type, and format and includes numbers, dates,
or strings such as Customer Address.
Integration testing verifies that the units or pieces of code function correctly when
integrated together.
Cooking a patty and putting the ingredients together are included in the process of
making a hamburger.
A selfie is a self-photograph placed on a social media website.
The transport layer formats the data into packets, adds a header containing the packet
sequence and the address of the receiving device, and specifies the services required
from the network.
The Project Management Office (PMO) is an internal department that oversees all
organizational projects.
Inbound logistics and operations are part of the primary value activities.
Memory cards contain high-capacity storage that holds data such as captured images,
music, or text files.
Uplift modeling gathers product details and issue-resolution information that can be
automatically generated into a script for the representative to read to the customer.
A voice over LTE is the computer or network device that serves as an interface between
devices and the network. Each computer initially connects to the access point and then
to other computers on the network.
Carbon emissions include the carbon dioxide and carbon monoxide in the atmosphere,
produced by business processes and systems.
Date of birth would be a stored attribute.
What is customer relationship management (CRM)?
A. the management of information between and among activities in a supply chain to
maximize total supply chain effectiveness and corporate profitability
B. the integration of all departments and functions throughout an organization into a
single IT system (or integrated set of IT systems) so employees can make decisions by
viewing enterprisewide information about all business operations
C. a means of managing all aspects of a customer's relationship with an organization to
increase customer loyalty and retention and an organization's profitability
D. information that connects the plans, methods, and tools aimed at integrating separate
enterprise system
Which phase of the SDLC gathers business requirements?
A. plan
C. test
D. design
Data is useful for understanding individual sales, but to gain deeper insight into a
business data needs to be turned into information. Which of the following offers an
example of turning data into information?
A. Who are my best customers?
B. What is my best-selling product?
C. What is my worst-selling product?
D. All of these are correct.
Which of the following occurs during data cleansing?
A. clean data marts
B.clean redundant customer data
C. clean accurate data
D. clean correct data
What are the rules that enforce basic and fundamental information-based constraints?
A. responsible integrity constraints
B. quality constraints
C. web integrity constraints
D. relational integrity constraints
What is a GPS technology adventure game that posts the longitude and latitude location
for an item on the Internet for users to find?
A. geocoding
C. geocoin
D. All of these are correct.
Which of the following is an incorrect enterprise view of information technology?
A. Processes are analytical for executives and transactional for analysts.
B. Granularity is coarse for executives and fine for analysts.
C. Processing is OLTP for executives and OLAP for analysts.
D. None of these are correct.
When analyzing the book store industry, some of today's businesses compete with
different business strategies and cost strategies. Which of the following is using a broad
market competitive scope along with a low cost strategy?
A. Amazon.com
B. any local independent books store that specializes in antique books
C. Barnes and Noble
D. your college bookstore
Which of the below offers a low-speed and low-cost backup method?
B. thumb drive
C. external hard drive
D.All of these are correct.
Which of the following questions can logistics help a company answer?
A. What is the quickest way to deliver products to our customers?
B. What is the optimal way to place items in the warehouse for picking and packing?
C. What is the optimal path to an item in the warehouse?
D.All of these are correct.
Twitter is an example of a ________.
A. social bookmarking website
B. social tagging website
C. microblogging website
D. blogging website
What is a challenge for cloud computing that could cause employee performance to
A. limited Internet features
B.required Internet connectivity
C. decreased dynamic scaling
D. decreased job stability
When studying the figure of the four quadrants of ethical and legal behavior, the goal is
for organizations to make decisions in which of the following quadrants?
A. quadrant IV
B. quadrants II and III
C.quadrant I
D. quadrant III
A DDoS stands for one of the common forms of viruses, that attack multiple computers
to flood a website until it slows or crashes. What does DDoS stand for?
A. data distribution of systems attack
B. data denial-of-software attack
C. distributed data online systems attack
D. distributed denial-of-service attack
What is created that highlights how to use the system and how to troubleshoot issues or
A.detailed user documentation
B. requirements definition document
C. scope document
D. All of these are correct.
Different organizations and countries have their own terms for fair information
practices. Which of the following is correct?
A. The United Kingdom terms it "Data Protection."
B. The European Union terms it "Data Protection."
C. The United Kingdom terms it "Personal Data Privacy."
D. The United States terms it "Personal Data Privacy."
Backup and recovery plan, disaster recovery plan, business continuity planning are all
elements of a(n) ________ MIS infrastructure.
A. agile
B. sustainable
D. virtualized
Which of the following is considered a managerial decision or semistructured decision?
A. determining how many employees are out sick
B. determining the impact of last month's marketing campaign
C. investigating why payroll is having problems running
D. tracking how much inventory is in the warehouse
What is a component of Web 3.0 that describes things in a way that computers can
A. social tagging
B. sustaining web
C. social web
D. semantic web
The business decisions made by the marketing department include promotional data,
sales data, and advertising data.
In which of the five basic supply chain activities do you manufacture products and
create production schedules?
A. plan
B. source
C. deliver
Many social media sites today allow you to customize your web address, for example
www.facebook.com/Womenwithdrive. What is an alternate name for a web address
such as www.apple.com ?
A. digital bookmark
B. Internet bookmark
C. universal resource locator
D. web browser
Employees need to compare different types of information for what they commonly
reveal to make strategic decisions. Which of the choices below represents the three
common types of information found throughout an organization?
A. levels, forms, granularities
B. levels, forms, data
C.levels, formats, granularities
D. data, formats, granularities
Data collection, solution generation, and solution implementation are all concepts
associated with which of the following processes?
A. the six-step problem-solving process
B. the six-step decision-making process
C. the four-step problem-solving process
D. the four-step decision-making process
Geocoding ________.
A. identifies the geographic location of features and boundaries on Earth, such as
natural or constructed features, oceans, and more
B. links business assets to a centralized system where they can be tracked and
monitored over time
C.is a coding process, in spatial databases, that assigns a digital map feature to an
attribute that serves as a unique ID (tract number, node number) or classification (soil
type, zoning category)
D. stores, views, and analyzes geographic data, creating multidimensional charts or
If you were thinking about a washing machine as a system, which of the following
represents the feedback?
A. the dirty clothes, water, and detergent
B. the clean clothes
C. the wash and rinse cycle
D. the light indicating that the washer is off balance and has stopped
What is a business requirement?
A. the nonspecific business requests the system must meet to be successful
B.the specific business requests the system must meet to be successful
C. the nonspecific methodology the system must meet to be successful
D. the specific methodology the system must meet to be successful
What occurs when a system produces incorrect, inconsistent, or duplicate data?
A. information inconsistency
B.information integrity issues
C. data governance
D. master data management
What are enterprise systems?
A. the integration of a company's existing management information systems
B. the integration of data from multiple sources, which provides a unified view of all
C. an integration method that sends information entered into a given system
automatically to all downstream systems and processes
D.enterprisewide support and data access for a firm's operations and business processes
What is the primary goal of using As-Is and To-Be process models?
A. to determine employee specific errors
B. to determine measurement metrics
C. to determine the best way to solve a proble
D. to determine what the problem is and then how to solve the problem
What occurs when the sending computer divides a message into a number of efficiently
sized units called packets, each of which contains the address of the destination
A. client
B. packet-switching
C. peer-to-peer network
D. network operating system
Compare Porter's three generic strategies.
Explain the three different types of outsourcing along with their benefits and
Identify the core and extended areas of enterprise resource planning.
Explain project management and the role the triple constraints play when managing a
Explain how Business 2.0 is helping communities network and collaborate.
Demonstrate how a company can add value by using Porter's value chain analysis.
Identify the benefits of a connected world.
Identify the six epolicies organizations should implement to protect themselves.
Identify the different computer categories and explain their potential business uses.
Identify the business advantages of a relational database.
Identify the four challenges associated with ebusiness.
List the common input, output, storage, and communication devices.
Explain MIS infrastructure and its three primary types.
Describe the relationships and differences between hackers and viruses.
Describe Web 1.0 along with ebusiness and its associated advantages.
Explain the value of business processes for a company, and differentiate between
customer-facing and business-facing process.
Compare the two types of network architectures.

Subscribe Now

Sign up to view full document

View Document