Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

CS 70367

July 20, 2017
A user can opt in to receive emails by choosing to allow permissions to incoming
emails.
A network operating system (NOS) is the operating system that runs a network, steering
information between computers and managing security and users.
System software controls how the various technology tools work together along with
the application software. System software includes both operating system software and
utility software.
Competitive intelligence is information collected from multiple sources such as
suppliers, customers, competitors, partners, and industries that analyzes patterns, trends,
and relationships for strategic decision making.
Control objects for information and related technology (COBIT) are software suites that
automate systems analysis, design, and development.
An intranet is a restricted network that relies on Internet technologies to provide an
Internet-like environment within the company for information sharing,
communications, collaboration, web publishing, and the support of business processes.
Magnetic medium is a secondary storage medium that uses magnetic techniques to store
and retrieve data on disks or tapes coated with magnetically sensitive materials.
True
False
Accessibility refers to the time frames when the system is operational.
A universal resource locator (URL) is the address of a file or resource on the web such
as www.apple.com.
Secure sockets layer (SSL) is a combination of HTTP and SSL to provide encryption
and secure identification of an Internet server.
Fuzzy logic is the process within a genetic algorithm of randomly trying combinations
and evaluating the success (or failure) of the outcome.
Organizational information has three characteristics including timeliness, quality, and
governance.
Regression is a statistical process for estimating the relationships among variables. It
includes many techniques for modeling and analyzing several variables when the focus
is on the relationship between a dependent variable and one or more independent
variables.
Business critical integrity constraints enforce business rules vital to an organization's
success and often require more insight and knowledge than relational integrity
constraints.
A primary key is a foreign key of one table that appears as an attribute in another table
and acts to provide a logical relationship between the two tables.
Knowledge can be a real competitive advantage for an organization. The most common
form of collective intelligence found inside the organization is knowledge management
(KM), which involves capturing, classifying, evaluating, retrieving, and sharing
information assets in a way that provides context for effective decisions and actions.
Application software is used in computer appliances and special-purpose applications,
such as an automobile, ATM, or media player and is used for a single purpose.
True
False
Prediction is a statistical process that finds the way to make a design, system, or
decision as effective as possible; for example, finding the values of controllable
variables that determine maximal productivity or minimal waste.
A cold site is a separate facility that does not have any computer equipment but is a
place where employees can move after a disaster.
Unavailability occurs when a system is continuously operational at all times.
The chief privacy officer is responsible for ensuring the ethical and legal use of
information within a company.
The critical path is the sequence of activities that determine the earliest date by which
the project can be completed.
Search engine optimization (SEO) combines art along with science to determine how to
make URLs more attractive to search engines resulting in higher search engine ranking.
RFID innovations and technologies are being used in many industries including retail,
hospitals, pharmaceuticals, and ranching.
A megabyte (MB or M or Meg) is roughly 1 million bytes.
A computer portable enough to fit on a lap or in a bag and has its own power source or
battery.
Geocache is a GPS technology adventure game that posts the longitude and latitude
location for an item on the Internet for users to find. GPS users find the geocache and
typically sign a guest book or take an item and leave an item for the next adventure
players to find. Caches are often placed in locations that are interesting or challenging
for people to discover.
Safe mode occurs if the system is failing and will load only the most essential parts of
the operating system and will not run many of the background operating utilities.
True
False
Production and materials management is a core ERP component.
Managers use transactional information when making structured decisions at the
operational level.
An input device is equipment used to capture information and commands.
Plan, source, give, get, and return are the five basic supply chain management
components.
Plunge implementation is a set of policies, procedures, standards, processes, practices,
tools, techniques, and tasks that people apply to technical and management challenges.
What is a secondary storage medium that uses magnetic techniques to store and retrieve
data on disks or tapes coated with magnetically sensitive materials?
A. input device
B. output device
C. magnetic tape
D. magnetic medium
What is the Internet protocol web browsers use to request and display web pages using
universal resource locators?
A. hypertext markup language
B. web browser
C. hypertext transport protocol
D. universal resource locator
Which of the choices below offers a common example of a WAN?
A. college campus
B. home office
C. city library
D.the Internet
Which of the following represents the structure of a typical organization?
A. flat line
B. pyramid
C. circle
D. cube
Which of the following questions can materials management help a company answer?
A. How do we dispose of spoiled items?
B. What laws need to be followed for storing hazardous materials?
C. Which items must be refrigerated when being stored and transported?
D.All of these are correct.
What software can remove software that is no longer needed?
A. preventive security software
B. spyware software
C. crash-proof software
D. uninstaller software
What is a telecommunications system?
A. a system that enables the transmission of data over public or private networks
B. a communications, data exchange, and resource-sharing system created by linking
two or more computers and establishing standards, or protocols, so that they can work
together
C. any network without a central file server and in which all computers in the network
have access to the public files located on all other workstations
D. a computer that is designed to request information from a server
What is a single unit of binary data routed through a network?
A.packet
B. traceroute packet
C. packet header
D. packet footer
What is software?
A. any computer-based tool that people use to work with information and support the
information and information-processing needs of an organization
B. the set of instructions that the hardware executes to carry out specific tasks
C. consists of the physical devices associated with a computer system
D. an electronic device operating under the control of instructions stored in its own
memory that can accept, manipulate, and store data
What focuses on keeping suppliers satisfied by evaluating and categorizing suppliers
for different projects?
A.supplier relationship management
B. partner relationship management
C. employee relationship management
D. All of these are correct.
Which of the following is considered a service?
A. cars
B. groceries
C.cutting hair
D. All of these are correct.
Which of the following is a reason for the growth of the World Wide Web?
A. the microcomputer revolution
B. advancements in networking hardware
C. web pages being easy to create and flexible
D. All of these are correct.
The department within a company that performs the function of selling goods or
services is called _______________.
A. marketing
B. sales
C. finance
D. operations management
Which of the following is the main drawback of biometrics?
A. It is considered illegal.
B. It is viewed as an invasion of privacy.
C. It can be costly and intrusive.
D. It requires constant monitoring and upgrading.
Jackie is the head teller at ABC Bank and her responsibilities include overseeing and
managing the tellers, resolving customer issues, and developing and implementing
systems for an optimal and efficient team. She notices a steady increase in customer
complaints and tracks back to find that the complaints started right around the time
ABC Bank provided Internet access to all employees. Jackie watched the tellers closely
and found that they were spending significant amounts of time playing Internet games
and posting on Facebook. Which policy should the company implement to help
eliminate this problem?
A. an information privacy policy
B. an email privacy policy
C. an Internet use policy
D. a workplace monitoring policy
___________ is a world where interconnected, Internet-enabled devices or "things" can
collect and share data without human intervention.
A. Internet of Things
B. Predictive Analytics
C. Machine to Machine
D. Flat World
Bill Schultz works at a high-power investment firm in Los Angeles. Bill is responsible
for promoting the firm's vision and creating the company-wide goals and strategies. He
also monitors the overall strategic performance of the company and its direction for
future business strategies. At what level of the organizational pyramid would you
categorize Bill?
A. strategic
B. owner
C. operational
D. managerial
What can encryption technology perform?
A. switch the order of characters
B. replace characters with other characters
C. insert or remove characters
D. All of these are correct.
What describes technologies that allow users to 'see" or visualize data to transform
information into a business perspective?
A. informing
B. infographics
C.data visualization
D. business intelligence dashboards
What generates revenue each time a user clicks on a link to a retailer's website?
A. pay-per-click
B. pay-per-call
C. pay-per-conversion
D. All of these are correct.
What is the ultimate outcome of a data warehouse?
A. data goals
B. data relationships
C. data marketing
D. data marts
The goal of value chain analysis is to identify processes in which the firm can add value
for the customer and create a competitive advantage for itself, with a ________ or
________.
A. focused strategy; product differentiation
B. focused strategy; cost advantage
C. cost advantage; primary value activities
D. cost advantage; product differentiation
What lists the destination (for example in IP packets the destination is the IP address)
along with the length of the message data?
A. traceroute
B. standard packet
C.packet header
D. packet footer
Which activities do accounting and finance components perform?
A. track employee information including payroll, benefits, compensation, performance
assessment, and assumes compliance with the legal requirements of multiple
jurisdictions and tax authorities
B. handle the various aspects of production planning and execution such as demand
forecasting, production scheduling, job cost accounting, and quality control
C. manage accounting data and financial processes within the enterprise with functions
such as general ledger, accounts payable, accounts receivable, budgeting, and asset
management
D. None of these are correct.
Using one's social skills to trick people into revealing access credentials or other
valuable information is called ________.
A. social engineering
B. social media
C. social viruses
D. social processes
The Internet is a hierarchical structure linking different levels of service providers
whose millions of devices supply all the interconnections. The three levels outlined in
the book from the top down include ________.
A. new system provider (NSP), current system provider (CSP), and order entry system
provider (OSP)
B.national service provider (NSP), regional service provider (RSP), and internet service
provider (ISP)
C. net server point (NSP), radio server point (RSP), and internet server point (ISP)
D. None of these are correct.
According to Porter, companies that wish to dominate broad markets should operate
using a ________ strategy.
A. cost leadership with a low cost
B. differentiation with a low cost
C. cost leadership with a high cost
D. All of these are correct.
Which company is expecting to gain the majority of its returns on existing investments?
A. Dell Computer
B. Johnson &Johnson
C. Procter &Gamble
D. Phillips Petroleum
What is a special class of adware that collects data about the user and transmits it over
the Internet without the user's knowledge or permission?
A. spyware
B. hacker
C. drive-by hacking
D. adware
What is spyware?
A. a form of malicious software that infects your computer and asks for money
B. a new ransomware program that encrypts your personal files and demands payment
for the files' decryption keys
C. software that allows Internet advertisers to display advertisements without the
consent of the computer user
D. a special class of adware that collects data about the user and transmits it over the
Internet without the user's knowledge or permission
Which of the following focuses on user-generated content?
A. YouTube
B. Wikipedia
C. Netflix
D. All of these are correct.
Which of the following is not a reason for the explosive growth of the WWW?
A. basic web pages are easy to create and extremely flexible
B. the microcomputer revolution made it possible for an average person to own a
computer
C. digital Darwinism
D. the speed, convenience, and low cost of email

Subscribe Now

Sign up to view full document

View Document