Book Title
Business Driven Information Systems 5th Edition

CS 63312

July 20, 2017
What is a data flow diagram (DFD)?
A.an illustration of the movement of information between external entities and the
processes and data stores within the system
B. software suites that automate systems analysis, design, and development
C. a formal, approved document that manages and controls the entire project
D. a graphical representation of the processes that capture, manipulate, store, and
distribute information between a system and its environment
Which programming language is for artificial intelligence and neural network?
A.fifth generation machine language
B. second generation machine language
C. third generation machine language
D. fourth generation machine language
An extranet is not available for use by a ________.
A. customer
B. supplier
C. employee
What is stored in a dynamic catalog, or an area of a website that stores information
about products in a database?
A.dynamic website
B. data-driven website
C. static information
D. dynamic information
What occurs when paper maps are laid edge to edge and items that run across maps but
do not match are reconfigured to match?
A. automatic vehicle location
B. geographic information system
C. cartography
D.edge matching
What is a place where customer service representatives answer customer inquiries and
solve problems, usually by email, chat, or phone?
A.contact center
B. web-based self-service
C. call scripting system
D. uplift modeling
A data warehouse is a ________ collection of information, gathered from many
different ________ databases, that supports business analysis activities and
decision-making tasks.
A.logical; operational
B. physical; operational
C. logical; transactional
D. physical; transactional
Which of the following represents a business-facing process?
A. loan processing
B. order processing
C. strategic planning
D. customer billing
What is a status report?
A. difficult to quantify or measure
B. easy to quantify and typically measured to determine the success or failure of a
C. the measure of the tangible and intangible benefits of an information system
D.periodic reviews of actual performance versus expected performance
Where would you categorize opportunities in a SWOT analysis?
A. internal, helpful
B. internal, harmful
C.external, helpful
D. external, harmful
What is an access point (AP)?
A.the computer or network device that serves as an interface between devices and the
B. refers to any type of operation accomplished without the use of a hard-wired
C. a wireless PAN technology that transmits signals over short distances among cell
phones, computers, and other devices
D. provides communication for devices owned by a single user that work over a short
At which level do managers develop the overall business strategies and monitor the
performance of the organization and the competitive business environment?
A. operational
B. strategic
C. managerial
D. communications
What does BPR assume about the current process in the extreme?
A. current process is irrelevant
B. current process is broken
C. current process must be overhauled from scratch
D. All of these are correct.
What is a logical data structure that details the relationship among data elements using
graphics or pictures?
A.data model
B. data element
C. data mining tool
D. data mart tool
What is a form of predictive analytics for marketing campaigns that attempts to identify
target markets or people who could be convinced to buy products?
A. contact center
B. web-based self-service
C. call scripting system
D.uplift modeling
Which of the following is not considered an advantage of a content management
A. Content management systems store website content.
B. Content management systems increase order entry speed.
C. Content management systems manage website creation.
D. Content management systems allow editing and publication of information.
What is the digital divide?
A.a worldwide gap giving advantage to those with access to technology
B. a data interruption in the Internet connection
C. a deficiency in school-aged children with computer knowledge
D. a divide between the economies of third world countries
What is collaborative demand planning?
A. enables an organization to react more quickly to resolve supply chain issues
B. applies technology to the activities in the order life cycle from inquiry to sale
C. allows an organization to reduce the cost and time required during the design process
of a product
D.helps organizations reduce their investment in inventory while improving customer
satisfaction through product availability
What is a statistical process that finds the way to make a design, system, or decision as
effective as possible; for example, finding the values of controllable variables that
determine maximal productivity or minimal waste?
A. prediction
C. forecasting
D. regression
What is a field that uniquely identifies a given record in a table?
A. foreign key
B.primary key
C. data mining key
D. DBMS key
What is Bluetooth?
A. means the technology can travel with the user; for instance, users can download
software, email messages, and web pages onto a laptop or other mobile device
B. refers to any type of operation accomplished without the use of a hard-wired
C.a wireless PAN technology that transmits signals over short distances among cell
phones, computers, and other devices
D. provides communication for devices owned by a single user that work over a short
What is the major challenge of networking or performing business in a connected
A. personal issues
B. society demands
C.security issues
D. telecommuting demands
What is an information MIS infrastructure?
A. identifies where and how important information, such as customer records, is
maintained and secured
B. includes the hardware, software, and telecommunications equipment that, when
combined, provides the underlying foundation to support the organization's goals
C. identifies ways that a company can grow in terms of computing resources while
simultaneously becoming less dependent on hardware and energy consumption
D. includes the plans for how a firm will build, deploy, use, and share its data,
processes, and MIS assets
What is a service?
A. a business-driven enterprise architecture that supports integrating a business as
linked, repeatable activities, tasks, or services
B.a business task
C. the capability of services to be joined together on demand to create composite
services, or disassembled just as easily into their functional component
D. the capability of two or more computer systems to share data and resources, even
though they are made by different manufacturers
What is enterprise resource planning?
A. The analysis and redesign of workflow within and between enterprises.
B. A standardized set of activities that accomplish as specific task, such as processing a
customer's order.
C. The integration of all departments and functions throughout an organization into a
single IT system so that employees can make decisions by viewing enterprisewide
information on all business operations.
D. Management involvement in all aspects of a customer's relationship with an
organization to increase customer loyalty and retention and an organization's
What is a group of computers on which a hacker has planted zombie programs?
A. zombie
B. zombie farm
C. pharming attack
D. time bomb
What is the application of knowledge, skills, tools, and techniques to project activities
to meet project requirements?
A.project management
B. project management software
C. scope
D. None of these are correct.
What occurs when the user goes into an emotional state of over-analysis (or
over-thinking) a situation so that a decision or action is never taken, in effect paralyzing
the outcome?
A. analytical paradox
B. analytical analysis
C.analysis paralysis
D. analysis paradox
What occurs between two entities in which an instance of one entity can be related to
only one instance of a related entity?
A.one-to-one relationship
B. one-to-many relationship
C. many-to-many relationship
D. composite entity
What is an anti-spamming approach whereby the receiving computer launches a return
attack against the spammer, sending email messages back to the computer that
originated the suspected spam?
A. typosquatting
B. website name stealing
C. Internet censorship
D. nonrepudiation
A business strategy achieves a specific set of goals, including__________.
A. developing new products or services, and attracting new competition
B. increasing costs, and attracting new competition
C.attracting new customers, and developing new products or services
D. All of these are correct.
Which of the following is the least common reason why companies outsource?
A. tap outside sources of expertise for a low cost
B. concentrate resources on core business
C. reduce headcount and related expenses
D.better manage the costs of internal processes
What is a hacker?
A. a special class of adware that collects data about the user and transmits it over the
Internet without the user's knowledge or permission
B.experts in technology who use their knowledge to break into computers and computer
networks, either for profit or just motivated by the challenge
C. a computer attack where an attacker accesses a wireless computer network,
intercepts data, uses network services, and/or sends attack instructions without entering
the office or organization that owns the network
D. software that, while purporting to serve some useful function and often fulfilling that
function, also allows Internet advertisers to display advertisements without the consent
of the computer user