Book Title
Business Driven Information Systems 5th Edition

CS 78197

July 20, 2017
A first-mover advantage is the process of gathering information about the competitive
environment, including competitors' plans, activities, and products, to improve a
company's ability to succeed.
A repeater represents the loss of a network signal strength measured in decibels and
occurs because the transmissions gradually dissipate in strength over longer distances or
radio interference or physical obstructions like walls also impact communication
Effective and efficient supply chain management systems can enable an organization to
decrease the power of its buyers.
Simple mail transfer protocol (SMTP) is TCP/IP's own messaging system for email.
Enterprise application integration (EAI) middleware takes a new approach to
middleware by packaging commonly used applications together, reducing the time
needed to integrate applications from multiple vendors.
Information quality refers to the extent of detail within the information (fine and
detailed or coarse and abstract).
The project scope statement links the project to the organization's overall business
goals. It describes the business need (the problem the project will solve) and the
justification, requirements, and current boundaries for the project.
The information age is the present time, during which infinite quantities of facts are
widely available to anyone who can use a computer.
Operational decisions are considered structured decisions.
A handheld computer portable enough to fit in a purse or pocket and has its own power
source or battery.
A foreign key is a primary key of one table that appears as an attribute in another table
and acts to provide a logical relationship between the two tables.
Estimated time en route (ETE) is the time remaining before reaching a destination using
the present speed and is typically used for navigation applications.
In the basic supply chain, source refers to building relationships with suppliers to
procure raw materials.
Multifactor authentication is the traditional security process, which requires a user
name and passworD.
A variable is a business intelligence characteristic that stands for a value that cannot
change over time.
Unstructured data is not defined, does not follow a specified format, and is typically
freeform text such as emails, Twitter tweets, and text messages. Unstructured data
accounts for about 80 percent of the data that surrounds us.
A data-driven website can help limit the amount of information displayed to customers
based on unique search requirements.
Inventory turnover is the frequency of inventory replacement.
Infographics (information graphics) displays information graphically so it can be easily
War chalking is the practice of tagging pavement with codes displaying where Wi-Fi
access is available. The codes for war chalking tell other users the kind of access
available, the speed of the network, and if the network is secured.
Selling chain management enables an organization to react more quickly to resolve
supply chain issues.
The testing phase takes all the detailed design documents from the design phase and
transforms them into the actual system.
One of the most important and challenging questions confronting managers today is
how to lay the foundation for tomorrow's success while competing to win in today's
business environment.
Static information includes fixed data incapable of change in the event of a user action.
Rivalry among existing competitors refers to the ability of buyers to affect the price
they must pay for an item.
Native advertising sources capital for a project by raising many small amounts from a
large number of individuals, typically via the Internet.
The Internet provides access to Internet information through documents including text,
graphics, audio, and video files that use a special formatting language called HTML.
A system is called unavailable when it is not operating and cannot be used.
3D printing supports procurement.
The three primary information security areas are 1) authentication and authorization, 2)
policies and rewards, and 3) detection and response.
Middleware translates information between disparate systems.
What occurs when a new radical form of business enters the market that reshapes the
way companies and organizations behave?
A. ecommerce model
B. eshop sale
C. paradigm shift
D. Web 1.0
Angela works for an identity protection company that maintains large amounts of
sensitive customer information such as usernames, passwords, personal information,
and social security numbers. Angela and a coworker decide to use the sensitive
information to open credit cards in a few of her customers' names. This is a classic
example of which of the following security breaches?
A. a social engineer
B. an insider
C. a spammer
D. a dumpster diver
Which of the choices below represents the definition of information management?
A. the act of conforming, acquiescing, or yielding information
B. a method or system of government for information management or control
C. the category of computer security that addresses the protection of data from
unauthorized disclosure and confirmation of data source authenticity
D.examines the organizational resource of information and regulates its definitions,
uses, values, and distribution, ensuring that it has the types of data/information required
to function and grow effectively
Which of the following are included as potential external weaknesses in a SWOT
analysis that are harmful to an organization?
A. core competencies, market leaders, cost advantages, excellent management
B. lack of strategic direction, obsolete technologies, lack of managerial talent, outdated,
product line
C. expanded product line, increase in demand, new markets, new regulations
D. new entrants, substitute products, shrinking markets, costly regulatory requirements
What is mobile device management (MDM)?
A. allows mobile voice calls to be made over broadband networks, creatingunder the
right network conditionsclearer audio and fewer dropped calls
B.remotely controls smart phones and tablets, ensuring data security
C. the blending of personal and business use of technology devices and applications
D. administers and delivers applications to corporate and personal smart phones and
What is software for data recovery that relieves the burden of reinstalling applications if
a hard drive crashes or becomes irretrievably corrupted?
A. disk optimization software
B. safe mode software
C. crash-proof software
D. disk image software
What is information?
A. raw facts that describe the characteristics of an event or object
B. data converted into a meaningful and useful context
C. information collected from multiple sources that analyzes patterns, trends, and
relationships for strategic decision making
D. skills, experience, and expertise, coupled with information and intelligence that
creates a person's intellectual resources
What is the process within a genetic algorithm of randomly trying combinations and
evaluating the success (or failure) of the outcome.
A. augmented reality
B. mutation
C. fuzzy logic
D. shopping bot
Sarah Schin was recently hired by Bank West as the Global Director of Human
Resources. Her job duties include determining employment policies as well as
overseeing all hiring, firing, and training of employees. What type of processes does
Sarah's new job demonstrate?
A. business-facing processes
B. industry-specific customer facing processes
C. customer-facing processes
D. industry-specific business-facing processes
The business decisions made by the accounting department include employee data,
promotion data, and vacation data.
What is roughly 1 million bytes?
A. megabyte
B. terabyte
C. kilobyte
D. gigabyte
An RFID tag is ________.
A.an electronic identification device that is made up of a chip and antenna
B. a transmitter/receiver that reads the contents of RFID tags in the area
C. a device that does not have a power source
D. a device that has its own transmitter and a power source (typically a battery)
What is a network?
A. consists of the physical devices associated with a computer system
B. the set of instructions the hardware executes to carry out specific tasks
C. a computer designed to request information from a server
D.a communications system created by linking two or more devices and establishing a
standard methodology in which they can communicate
Which of the following offers an example where Porter's five forces are mostly weak
and competition is low?
A. an international hotel chain purchasing milk
B. a coffee shop
C. a single consumer purchasing milk
D. a dog walking business
What determines which things go together?
A. classification
B. estimation
C.affinity grouping
D. clustering
Which of the below represents an example of why an employer would use social
A. to find potential job candidates via LinkedIn
B. to review potential job candidates by viewing their Facebook page
C. to attract new job candidates via YouTube
D. All of these are correct.
What takes information entered into a given system and sends it automatically to all
downstream systems and processes?
A.forward integration
B. forward data interchange
C. backward integration
D. backward data interchange
What is the integration of communication channels into a single service?
A. instant communication
B.unified communication
C. peer-to-peer communication
D. voice over communication
What allows customers to use the web to find answers to their questions or solutions to
their problems?
A. contact center
B.web-based self-service
C. call scripting
D. website personalization
What are the crucial steps companies perform to achieve their goals and objectives and
implement their strategies?
A. critical success factors
B. crucial success factors
C. key performance indicators
D. key performance factors
What is it called when a manager has so much data and information that he or she
cannot make a decision?
A.data rich, information poor
B. data rich, content poor
C. data rich, communication poor
D. data rich, intelligence
What is a technique for documenting the entities and relationships in a database
A.entity-relationship diagram
B. data model
C. database
D. relational database model
What occurs when the same data element has different values?
A.information inconsistency
B. information integrity issues
C. data governance
D. master data management
The business decisions made by the operations management department include
manufacturing data, distribution data, and production data.
Kevin is an incoming freshman at your college. Kevin is frustrated by the cost of books,
tuition, and expenses and he also needs to purchase a rather expensive laptop. In an
effort to save money, Kevin organizes a Facebook group with other college students
who need to purchase laptops. Soon, Kevin's Facebook group has close to 100,000
students. Kevin decides to collectively approach different computer companies to see if
his group qualifies for a special discount. What business strategy is Kevin using to
purchase laptops?
A. collecting business intelligence
B. decreasing entry barriers
C. purchasing a substitute product
D. increasing buyer power
Which of the following is a characteristic of a successful project?
A. delivered on time
B. delivered within budget
C. meets the business's requirements
D.All of these are correct.
Which of the below is an example of P2P?
A. GoDaddy
C. Federal Communication Commission (FCC)
D. Facebook
Both individuals and organizations have embraced ebusiness to do which of the
A. enhance productivity
B. maximize convenience
C. improve communication
D. All of these are correct.
What is a destructive agent?
A. a form of social engineering in which one individual lies to obtain confidential data
about another individual
B. a hacker looks through your trash to find personal information
C. legitimate users who purposely or accidentally misuse their access to the
environment and cause some kind of business-affecting incident
D. malicious agents designed by spammers and other Internet attackers to farm email
addresses off websites or deposit spyware on machines
What enables a user to return to the previous operating system?
A. system restore software
B. safe mode software
C. crash-proof software
D. disk image software
Which of the following is an example of an intelligent system?
A. the firefighter robot that can extinguish flames at chemical plants
B. Shell Oil's Smart Pump robot that pumps gas for the customer
C. a robot that cleans and sweeps at a local airport
D. All of these are correct.
All of the following are challenges of outsourcing, except
A. contract length.
B. competitive edge.
C. confidentiality.
D.reduced frustration and expense related to hiring and retaining employees in an
exceptionally tight job market.
Which of the following is an example of dynamic processes?
A. running payroll
B. calculating taxes
C. creating financial statements
D. employee layoffs

Subscribe Now

Sign up to view full document

View Document