Book Title
Business Driven Information Systems 5th Edition

CS 89395

July 20, 2017
Production and materials management ERP components handle production planning
and execution tasks such as demand forecasting, production scheduling, job cost
accounting, and quality control.
A Business Process Model and Notation (BPMN) flow displays the path in which the
process flows.
Volume includes the uncertainty of data, including biases, noise, and abnormalities.
Companies can establish direct private network links among themselves or create
private, secure Internet access, in effect a private tunnel within the Internet, called a
virtual private network (VPN).
Pay-per-conversion generates revenue each time a website visitor is converted to a
File Transfer Protocol (FTP) allows files containing text, programs, graphics, numerical
data, and so on to be downloaded off or uploaded onto a network.
Efficiency MIS metrics include throughput, speed, and availability.
Relational integrity constraints enforce business rules vital to an organization's success
and often require more insight and knowledge than relational integrity constraints.
In a SWOT analysis, potential external threats are harmful when they identify all threats
or risks detrimental to your organization, including new market entrants, substitute
products, employee turnover, differentiating products, shrinking markets, adverse
changes in regulations, economic shifts, and so on.
At the strategic decision-making level, employees develop, control, and maintain core
business activities.
The central processing unit (CPU) (or microprocessor) is the actual hardware that
interprets and executes the program (software) instructions and coordinates how all the
other hardware devices work together.
Tim Burners-Lee, cofounder of Intel, observed in 1965 that continued advances in
technological innovation made it possible to reduce the size of a computer chip while
doubling its capacity every two years.
Software is the set of instructions the hardware executes to carry out specific tasks.
Failback occurs when the primary machine recovers and resumes operations, taking
over from the secondary server.
Streamlining information encompasses all of the information contained within a single
business process or unit of work, and its primary purpose is to support the performing
of daily operational or structured decisions.
Server virtualization combines networks by splitting the available bandwidth into
independent channels that can be assigned in real time to a specific device.
Course management software occurs when the software vendor releases updates to
software to fix problems or enhance features.
The goal of ERP is to integrate all of the organizational systems into one fully
functioning, high-performance system that is capable of meeting all business needs and
user requirements. Of course, this goal is incredibly difficult to achieve because
businesses and technologies experience rapid change, and ERP must support mobility,
cloud, SaaS, and tiered architectures.
Teergrubing is an anti-spamming approach where the receiving computer launches a
return attack against the spammer, sending email messages back to the computer that
originated the suspected spam.
Collaborative demand planning helps organizations reduce their investment in
inventory while improving customer satisfaction through product availability.
A Business Process Model and Notation (BPMN) flow is anything that happens during
the course of a business process. An event is represented by a circle in a business
process model.
Improving the efficiency and effectiveness of its business processes will improve a
firm's value chain.
A user can opt in to receive emails by choosing to deny permission to incoming emails.
Bugs are defects in the code of an information system.
Benchmarks are baseline values the system seeks to attain.
Usability is the degree to which a system is easy to learn and efficient and satisfying to
Supply chain event management (SCEM) enables an organization to react more quickly
to resolve supply chain issues.
Collaborative engineering helps organizations reduce their investment in inventory
while improving customer satisfaction through product availability.
Employee relationship management focuses on keeping suppliers satisfied by
evaluating and categorizing suppliers for different projects.
Script kiddies or script bunnies find hacking code on the Internet and click-and-point
their way into systems to cause damage or spread viruses.
A methodology is a set of policies, procedures, standards, processes, practices, tools,
techniques, and tasks that people apply to technical and management challenges.
Mobile banking and mobile sales are both a part of the emerging mbusiness.
Desktop publishing transforms a computer into a desktop publishing workstation.
Leading packages include Adobe FrameMaker, Adobe PageMaker, and QuarkXpress.
Single-tenancy in the cloud means that a single instance of a system serves multiple
customers. In the cloud, each customer is called a tenant and multiple tenants can
access the same system.
A Business Process Model and Notation (BPMN) event is a task in a business process.
What is the process of managing changes to the business requirements throughout the
A. requirements documentation
B.requirements management
C. requirements definition document
D. All of these are correct.
Which of the following is a customer-facing process?
A. communicating with customers
B. strategic goal setting
C. providing performance feedback and rewards
D. purchasing raw materials
What is built using environmentally friendly materials and designed to save energy?
A. clean computing
B.green personal computer
C. upcycle
D. corporate social responsibility
What is the number of bits (0s and 1s) that can be processed by the CPU at any one
A. clock speed
B. word length
C. bus width
D. chip line width
Personal digital assistant (PDA) is a small handheld computer that performs simple
tasks such as taking notes, scheduling appointments, and maintaining an address book
and a calendar. The PDA screen is touch-sensitive, allowing a user to write directly on
the screen, capturing what is written.
What are agents, software, or businesses that provide a trading infrastructure to bring
buyers and sellers together?
A. intermediaries
B. disintermediation
C. reintermediation
D. cybermediation
What are project assumptions?
A. specific factors that can limit options
B.factors that are considered to be true, real, or certain without proof or demonstration
C. quantifiable criteria that must be met for the project to be considered a success
D. a document issued by the project initiator or sponsor that formally authorizes the
existence of a project and provides the project manager with the authority to apply
organizational resources to project activities
Decision making at the executive or strategic level requires business intelligence and
knowledge to support the uncertainty and complexity of the business. What is a
specialized DSS that supports senior-level executives and unstructured decisions
requiring judgment, evaluation, and insight?
B. Executive Information System (EIS)
C. Transaction Support System (TSS)
D. Decision Support System (DSS)
What is traceroute?
A. a single unit of binary data routed through a network
B. lists the destination (for example, in IP packets the destination is the IP address)
along with the length of the message data
C. represents the end of the packet or transmission end
D.a utility application that monitors the network path of packet data sent to a remote
When the software vendor releases an update to software to fix problems or enhance
features, what is it called?
A. a software update
B. a software upgrade
C. crash-proof software
D. course management software
Which of the following key terms represents the principles and standards that guide our
behavior toward other people?
A. ethics
B. intellectual property
C. standards of living
D. security
What is a system weakness that can be exploited by a threat?
A. capacity
B. web accessibility
C. web accessibility initiative
What occurs when a task or activity is unnecessarily repeated?
A. bottlenecks
B. redundancy
C. automation
D. streamlining
What is buyer power?
A. the ability of buyers to affect the price they must pay for an item
B. the suppliers' ability to influence the prices they charge for supplies (including
materials, labor, and services)
C. high when it is easy for new competitors to enter a market and low when there are
significant entry barriers to joining a market
D. high when there are many alternatives to a product or service and low when there are
few alternatives from which to choose
What is supplier power?
A. the ability of buyers to affect the price they must pay for an item
B. the suppliers' ability to influence the prices they charge for supplies (including
materials, labor, and services)
C. high when it is easy for new competitors to enter a market and low when there are
significant entry barriers to joining a market
D. high when there are many alternatives to a product or service and low when there are
few alternatives from which to choose
Users would agree to all of the following in a typical acceptable use policy except
A. not using the service as part of violating any law
B.not posting commercial messages to groups where the employee has received user
C. not performing any nonrepudiation
D. not attempting to break the security of any computer network
What promotes serialization or the ability to track individual items by using the unique
serial number associated with each RFID tag?
A. computer-aided design/computer-aided manufacturing
B. maker movement
C. makerspace
D.RFID electronic product code
Which of the following represents the three areas where technology can aid in the
defense against information security attacks?
A. authentication and authorization, prevention and resistance, prevention and response
B. authentication and authorization, prevention and response, detection and response
C. analyzing and authenticating, prevention and repositioning, detection and response
D. authentication and authorization, prevention and resistance, detection and response
Which of the following types of viruses spread themselves, not just from file to file, but
also from computer to computer?
A. polymorphic virus
B. worm
C. Trojan-horse virus
D. backdoor programs
What are project deliverables?
A. a temporary endeavor undertaken to create a unique product or service
B. the application of knowledge, skills, tools, and techniques to project activities in
order to meet or exceed stakeholder needs and expectations from a project
C.any measurable, tangible, verifiable outcome, result, or item that is produced to
complete a project or part of a project
D. represent key dates when a certain group of activities must be performed
Websites can generate revenue by using which of the following?
A. pay-per-click
B. pay-per-call
C. pay-per-conversion
D. All of these are correct.
Callie owns and operates one of the most successful local coffee shops in Denver called
The Edgewater Caf. Each time a customer purchases their 100th cup of coffee at The
Edgewater Caf, they receive a free pound of coffee of their choice. What is Callie
attempting to create with her unique "Free Pound of Coffee" marketing program?
A. reducing buyer power with a loyalty program
B. increasing buyer power with a loyalty program
C. decreasing supplier power with a differentiated product
D. creating a substitute product
What occurs when a person chooses to deny permission to incoming emails?
A. opt out
B. website name stealing
C. Internet censorship
D. teergrubing
A computer is an electronic device operating under the control of instructions stored in
its own memory that can accept, manipulate, and store data.
Which phase establishes a high-level plan of the intended project and determines
project goals?
A. testing phase
B. analysis phase
C. maintenance phase
D.planning phase
What defines the how, what, when, and who regarding the flow of project information
to stakeholders and is key for managing expectations?
A.communication plan
B. executive sponsor
C. project assumptions
D. project deliverable
What is feasibility?
A. difficult to quantify or measure
B. easy to quantify and typically measured to determine the success or failure of a
C.the measure of the tangible and intangible benefits of an information system
D. periodic reviews of actual performance versus expected performance
What software controls the application software and manages how the hardware devices
work together?
A. system software
B. operating system software
C. embedded operating system
D. multitasking
What is the manipulation of information to create business intelligence in support of
strategic decision making?
John is the CEO of Tech World, a retail store that sells computers, monitors, cameras,
televisions and many other electronic products. John and his executive team are
meeting to brainstorm new ideas on how to grow the business. One idea is to mimic a
competitor's product that is attempting to sell a new product in a different industry.
After performing a Porter's Five Forces analysis, John determines that all of the forces
are high in this new industry. What should John do?
A. explode into the market with an overflow of the product
B. contemplate other products to introduce at the same time in this new market
C. compare the competitor's prices and offer his product lower in this new market
D. not introduce the product because all five forces are strong and this would be a
highly risky business strategy