Book Title
Business Driven Information Systems 5th Edition

CS 60466

July 20, 2017
User-contributed content is a set of tools that supports the work of teams or groups by
facilitating the sharing and flow of information.
Outbound logistics acquires raw materials and resources and distributes them to
manufacturing as required.
A green personal computer (green PC) is built using environment friendly materials and
designed to save energy.
Sustainable, or green, MIS describes the production, management, use, and disposal of
technology in a way that minimizes damage to the environment.
Transaction brokers process online sales transactions.
A disruptive technology produces an improved product customers are eager to buy, such
as a faster car or larger hard drive.
Analytics is the science of fact-based decision making.
A paradigm shift occurs when a new radical form of business enters the market that
reshapes the way companies and organizations behave.
Customer order cycle time is the agreed upon time between the purchase of a product
and the delivery of the product.
Core ERP components are the traditional components included in most ERP systems
and primarily focus on internal operations.
A cold site is a separate facility with computer equipment that requires installation and
Software engineers use computer-aided software engineering (CASE) software tools,
which provide automated support for the development of the system.
Single-factor authentication is the traditional security process, which requires a user
name and passworD.
The bullwhip effect occurs when distorted product-demand information ripples from
one partner to the next throughout the supply chain.
Disaster Recovery as a Service (DRaaS) offers backup services that use cloud resources
to protect applications and data from disruption caused by disaster.
Cybervandalism is a problem that occurs when someone registers purposely misspelled
variations of well-known domain names.
Web accessibility is the degree to which a system is easy to learn and efficient and
satisfying to use.
Application software also supports a variety of useful features, one of which is
Elogistics manages the transportation and storage of goods.
Scripting languages group data and corresponding processes into objects.
Disk optimization software helps save information if a computer crashes.
Iterative development consists of a series of tiny projects. It has become the foundation
of multiple agile methodologies.
Secondary storage consists of equipment designed to store large volumes of data for
long-term storage.
A forward integration takes information entered into a given system and sends it
automatically to all upstream systems and processes.
Safe mode occurs if the system is failing and will load only the most essential parts of
the operating system and will not run many of the background operating utilities.
Energy consumption includes the carbon dioxide and carbon monoxide in the
atmosphere, produced by business processes and systems.
Business requirements include the process of transferring information from a legacy
system to a new system.
For an organization to succeed, every department or functional area must work
independently to be most effective.
In a SWOT analysis, strengths and weaknesses originate inside an organization, or
internally. Opportunities and threats originate outside an organization, or externally, and
cannot always be anticipated or controlled.
Logistics can help a company answer the following questionwhat quantity of raw
materials should we purchase to minimize spoilage?
Information systems audit reports assess a company's information system to determine
necessary changes and to help ensure the information systems' availability,
confidentiality, and integrity.
Google Glass is a work environment that is not located in any one physical space.
A primary value activity is a standardized set of activities that accomplish a specific
task, such as processing a customer's order.
Packet-switching occurs when the sending computer divides a message into a number
of efficiently sized units of data, each of which contains the address of the destination
Digital rights management is a technological solution that allows publishers to control
their digital media to discourage, limit, or prevent illegal copying and distribution.
What software controls how the various technology tools work together along with the
application software?
A. system software
B. operating system software
C. embedded operating system
D. multitasking
What is unstructured data?
A. has a defined length, type, and format and includes numbers, dates, or strings such as
Customer Address
B. created by a machine without human intervention
C. data that humans, in interaction with computers, generate
D. not defined, does not follow a specified format, and is typically freeform text such as
emails, Twitter tweets, and text messages
Which of the following represents a reason for low-quality information?
A. Online customers intentionally enter inaccurate information to protect the privacy.
B. Different systems have different information entry standards and formats.
C. Third-party and external information contains inaccuracies and errors.
D. All of these are correct.
Which of the following is considered data?
A. quantity sold
B. best customer by month
C. best-selling item by month
D. worst selling item by month
What is an internal department that oversees all organizational projects?
A. project deliverables
B. project scope
C.project management office
D. project milestones
The business decisions made by the accounting department include manufacturing data,
distribution data, and production data.
What processes and manages algorithms across many machines in a computing
A.distributed computing
B. advanced analytics
C. analysis paralysis
D. data artist
What are goods?
A. material items or products that customers will buy to satisfy a want or need
B. tasks performed by people that customers will buy to satisfy a want or need
C. the process where a business takes raw materials and processes them or converts
them into a finished product for its goods or services
D. the rate at which goods and services are produced based upon total output given total
What gathers product details and issue resolution information that can be automatically
generated into a script for the representative to read to the customer?
A. contact center
B. web-based self-service
C. call scripting system
D. uplift modeling
What is the difference between a business model and an ebusiness model?
A. A business model details how a company creates, delivers, and generates revenue; an
ebusiness model does all of the same except on the Internet.
B. A business model and an ebusiness model are identical.
C. A business model and an ebusiness model are complete opposites.
D. An ebusiness model details how a company creates, delivers, and generates revenue;
a business model does all the same except on the Internet.
Which of the following are examples of analytical information?
A. airline ticket, sales receipts, and packing slips
B. hotel reservation, sales receipts, and packing slips
C.future growth analysis, sales projections, and product statistics
D. packing slips, grocery receipt, and competitor information
Internet marketers must develop ________ to build strong relationships with customers
to ensure loyalty.
A. consumer trust
B. consumer testimonials
C. consumer segmentation
D. market segmentation
Which of the following is not a current CRM trend?
A. partner relationship management
B. supplier relationship management
C. employee relationship management
D.distributor relationship management
The business decisions made by the sales department include potential customer data,
sales report data, commission data, and customer support data.
What means that people with disabilities including visual, auditory, physical, speech,
cognitive, and neurological disabilities can use the web?
A. capacity
B.web accessibility
C. web accessibility initiative
D. vulnerability
What are the first two lines of defense a company should take when addressing security
A. technology first, customers second
B. technology first, people second
C. innovation first, technology second
D.people first, technology second
Which of the below is not an ISP?
A. Comcast
B. Facebook
D. Earthlink
What is transmission material manufactured so that signals will be confined to a narrow
path and will behave predictably?
A. wire media
B. network transmission media
C. fiber-optic cable
D. transmission control protocol/internet protocol
Which policy contains general principles regarding information privacy?
A. information privacy policy
B. acceptable use policy
C. internet use policy
D. anti-Spam policy
What prevention technique scrambles information into an alternative form that requires
a key or password to decode?
A. encryption
B. content filtering
C. firewalls
D. antivirus software
Where would you find the manufacturer and distributor in a typical supply chain?
A. upstream
B. downstream
C. in the middle
D. not on the supply chain
What is a self-photograph placed on a social media website?
A. selfie
B. blog
C. wiki
D. mashup
Which of the following is an example of a sustaining technology?
A. Porsche's faster car
B. Intel's low-end microprocessor
C. Sony's transistor-based consumer electronics (transistor radio)
D. All of these are correct.
A DBMS provides details about data.
What is a pure-play business?
A. a business that operates only on the Internet without a physical store
B. a business that sells products only in a physical store
C. a business that sells services only in a physical store
D. All of these are correct.
Which of the following is one of the largest wikis on the web and one of the ten most
popular web destinations?
A. Google
B. eBay
C. Wikipedia
D. Yahoo
What is the process of continuously measuring system results, comparing those results
to optimal system performance, and identifying steps and procedures to improve system
A. benchmarking
B. bottlenecking
C. consolidation
D. cycle time
Which of the following is not a primary form of agile methodology?
What is key for business process support that spans functional areas and legacy
A. software customization
B.data integration
C. elogistics
D. eprocurement
Which of the following policies details the extent to which email messages may be read
by others?
A. email privacy policy
B. email confidential policy
C. anti-spam policy
D. spam policy
What allows separate systems to communicate directly with each other, eliminating the
need for manual entry into multiple systems?
B. intelligence
C. data interchange
D. demand plan

Subscribe Now

Sign up to view full document

View Document