Type
Quiz
Book Title
Business Driven Information Systems 5th Edition
ISBN 13
978-0073402987

MPCS 60888

July 20, 2017
Which tags do NOT depend on a silicon microchip and use plastic or conductive
polymers instead of silicon-based microchips allowing them to be washed or exposed to
water without damaging the chip?
A. active RFID
B. semi-passive RFID
C. RFID accelerometer
D.chipless RFID
Which of the following would not be considered part of the unique characteristic of
high-quality information?
A. Are there any duplicate orders?
B. Are there any duplicate customers?
C.Is aggregate information in agreement with detailed information?
D. Is each transaction and event represented only once in the information?
A workstation is a cellular telephone with a keypad that runs programs, music, photos,
email, and includes many features of a PDA.
What is selling chain management?
A. enables an organization to react more quickly to resolve supply chain issues
B.applies technology to the activities in the order life cycle from inquiry to sale
C. allows an organization to reduce the cost and time required during the design process
of a product
D. helps organizations reduce their investment in inventory while improving customer
satisfaction through product availability
What is portability?
A. a system that is not operating and cannot be used
B.refers to the ability of an application to operate on different devices or software
platforms, such as different operating systems
C. measures how quickly a system performs a process or transaction
D. the degree to which a system is easy to learn and efficient and satisfying to use
Which of the following reflects Moore's law?
A.the computer chip performance per dollar doubles every 18 months
B. a company's ability to acquire small amounts of MIS equipment for cheaper cost
C. a company's ability to acquire small amounts of capital for spending on innovative
ideas every two years
D. the computer chip performance per dollar doubles every 6 months
Accessibility, availability, maintainability, portability, reliability, scalability, usability
are all elements of a(n) ________ MIS infrastructure.
A.agile
B. sustainable
C. information
D. virtualized
Which of the following is not a type of wireless network?
A. PAN
B. WLAN
C. WWAN
D.MAN
Which of the following is not one of the three phases in the evolution of CRM?
A. reporting
B. analyzing
C. processing
D. predicting
Which of the following is not one of the four gates in the RUP methodology?
A. inception
B.collaboration
C. construction
D. transition
Your boss has asked you to analyze the airline industry using Porter's three generic
strategies. Which of the following companies are using a differentiation strategy?
A. Southwest, Horizon, Frontier, JetBlue
B. British Airways, Singapore Airlines, Virgin Atlantic
C. Sky Taxi " a rent by the hour personal plane service
D. All of these are correct.
What is a form of a stationary mouse on which the movement of a finger causes the
pointer on the screen to move?
A. microphone
B. touch pad
C. pointing stick
D. touch screen
What ensures a company is ready to respond to an emergency in an organized, timely,
and effective manner?
A. emergency
B.emergency preparedness
C. business Impact analysis
D. technology failure
What occurs when resources reach full capacity and cannot handle any additional
demands limiting throughput and impeding operations?
A. bottlenecks
B. redundancy
C. automation
D. streamlining
What is a makerspace?
A. systems used to create the digital designs and then manufacture the products
B. a cultural trend that places value on an individual's ability to be a creator of things as
well as a consumer of things
C. a community center that provides technology, manufacturing equipment, and
educational opportunities to the public that would otherwise be inaccessible or
unaffordable
D. serialization or the ability to track individual items by using the unique serial number
associated with each RFID tag
What is a cold site?
A. a separate and fully equipped facility where the company can move immediately
after a disaster and resume business
B.a separate facility that does not have any computer equipment but is a place where
employees can move after a disaster
C. a separate facility with computer equipment that requires installation and
configuration
D. a detailed process for recovering information or a system in the event of a
catastrophic disaster
Which of the following represents the TCP/IP four-layer reference model?
A. application, Internet, transport, network interface
B. application, Internet, network interface, transport
C. application, transport, Internet, network interface
D. application, network interface, Internet, transport
Which of the following would not be considered part of the timely characteristic of
high-quality information?
A.Is the zip code missing in the address?
B. Is the information current with respect to business needs?
C. Is the customer address current?
D. Is the information updated weekly or hourly?
What makes system changes to reduce the chance of future system failure?
A. corrective maintenance
B.preventative maintenance
C. pilot implementation
D. phased implementation
What is the difference between customer-facing processes and business-facing
processes?
A. Business-facing processes are front-office processes, customer-facing processes are
back-office processes.
B. Customer-facing processes are front-office processes, business-facing processes are
back-office processes.
C. Customer-facing processes are back-office processes, and industry-specific
customer-facing processes are back-office processes.
D. Customer-facing processes are back-office processes, and industry-specific
customer-facing processes are front-office processes.
What would managers use to make structured decisions at the operational level?
A. transactional information
B. analytical information
C. EIS system
D. intelligent system
What is pharming?
A. reroutes requests for legitimate websites to false websites
B. a technique to gain personal information for the purpose of identity theft, usually by
means of fraudulent emails that look as though they came from legitimate businesses
C. a masquerading attack that combines spam with spoofing
D. a phone scam that attempts to defraud people by asking them to call a bogus
telephone number to "confirm" their account information
What is distributed computing?
A. a collection of large, complex data sets, including structured and unstructured data,
which cannot be analyzed using traditional database methods and tools
B.processes and manages algorithms across many machines in a computing
environment
C. focuses on forecasting future trends and producing insights using sophisticated
quantitative methods, including statistics, descriptive and predictive data mining,
simulation, and optimization
D. extracts knowledge from data by performing statistical analysis, data mining, and
advanced analytics on big data to identify trends, market changes, and other relevant
information
What encompasses all organizational information and has a primary purpose of
supporting the performance of managerial analysis or semistructured decisions?
A. OLTP
B. OLAP
C. analytical information
D. transactional information
What is a programming method that provides for interactive modules to a website?
A.scripting language
B. object-oriented language
C. fourth-generation language
D. All of these are correct.
Grid computing, cloud computing, and virtualization are all elements of a(n) ________
MIS infrastructure.
A. agile
B.sustainable
C. information
D. virtualized
What is the primary way that social networks work?
A. connecting people by matching profile information
B. charging users each time they use the service
C. providing a security system for communication online
D. helping grow website traffic by viral advertisements
Sophie Black works as a computer programmer for a software company. Her boss,
Mike Jones, is responsible for developing a new software game for the Wii. After
completion of the project, Mike gives all of the team members a free copy of the game
without consent from the company. Sophie is a little hesitant and unsure about
accepting the game because legally it would be considered ________.
A. counterfeit software
B.pirated software
C. ethical software
D. governance software
What are quantifiable criteria that must be met for the project to be considered a
success?
A. project milestones
B.project objectives
C. project assumptions
D. project deliverable
What rotates data to display alternative presentations of the data?
A. drill-down
B. sensitivity analysis
C. what-if analysis
D. pivot
When considering the graph depicting the interrelationships between efficiency and
effectiveness, where does an organization ideally want to operate?
A. upper right-hand corner
B. lower right-hand corner
C. upper left-hand corner
D. lower left-hand corner
What is the rate at which goods and services are produced based upon total output given
total inputs?
A. goods
B. services
C. production
D. productivity
Ben works at a top accounting firm in Salt Lake City and his responsibilities include
writing letters, memos, and emails along with generating reports for financial analysis
and marketing materials for products. Ben's duties provide value-added to his company
and would be categorized as occurring at the different information ________.
A. lists
B.formats
C. granularities
D. levels

Subscribe Now

Sign up to view full document

View Document