Book Title
Business Driven Information Systems 5th Edition

MPCS 66807

July 20, 2017
Data warehouses struggle with combining too much standardized information.
Failover, a specific type of fault tolerance, occurs when a redundant storage server
offers an exact replica of the real-time data, and if the primary server crashes, the users
are automatically directed to the secondary server or backup server. This is a high-speed
and high-cost method of backup and recovery.
Mobile device management is a method of sending audio and video files over the
Internet in such a way that the user can view the file while it is being transferred.
BYOD policies offer four basic options, including 1) unlimited access for personal
devices, 2) access only to nonsensitive systems and data, 3) access, but with IT control
over personal devices, apps, and stored data, and 4) access, but preventing local storage
of data on personal devices.
Multitasking allows more than one piece of software to be used at a time. Multitasking
is used when creating a graph in Excel and simultaneously printing a word processing
Development testing verifies that separate systems can work together passing data back
and forth correctly.
Optimization is a statistical process for estimating the relationships among variables.
Gordon Moore, cofounder of Intel, observed in 1965 that continued advances in
technological innovation made it possible to reduce the size of a computer chip while
doubling its capacity every two years.
Operational business processes are dynamic, nonroutine, long-term business processes
such as financial planning, expansion strategies, and stakeholder interactions.
Two of the common forms of viruses discussed in the book include the Trojan-horse
virus and the acceptance-of-service attack.
Counterfeit software is the unauthorized use, duplication, distribution, or sale of
copyrighted software.
Desktop publishing increases the cooperation and joint productivity of small groups of
Contact management falls under the category of the customer service department's
CRM tools.
Process modeling involves graphically representing the processes that capture,
manipulate, store, and distribute information between a system and its environment.
The finance department performs the function of selling goods or services.
An optimization analysis finds the optimum value for a target variable by repeatedly
changing other variables, subject to specified constraints. What can a manager
determine by changing revenue and cost variables in an optimization analysis?
A. calculate the highest potential profits
B. calculate employee benefit payments
C. use this as an extension for a digital dashboard
D. create production schedules
Data-driven websites offer several advantages as it is far easier to manage content and
store large amounts of data.
What includes support value activities and primary value activities and is used to
determine how to create the greatest possible value for customers?
A. supplier power
B. operations management
C. Porter's Five Forces Model
D. value chain analysis
What in the cloud means that each customer or tenant must purchase and maintain an
individual system?
A. multi-tenancy
C. cloud fabric
D. cloud fabric controller
What is augmented reality?
A. the viewing of the physical world with computer-generated layers of information
added to it
B. a wearable computer with an optical head-mounted display (OHMD)
C. uses technology allowing humans to interact with a computer through bodily
sensations and movements
D. a work environment that is not located in any one physical space
Which type of ebusiness marketing technique induces websites or users to pass on a
marketing message to other websites or users, creating exponential growth in the
message's visibility and effect?
A. cookies
B. click-through
C. viral marketing
D. pop-up ad
What represents a north/south measurement of position?
A. estimated time of arrival
B. estimated time en route
D. longitude
What software helps save information if a computer crashes?
A. disk optimization software
B. safe mode
C. crash-proof software
D. disk image software
What is longitude?
A. a device that uses plastic or conductive polymers instead of silicon-based
microchips, allowing them to be washed or exposed to water without damaging the chip
B. a satellite-based navigation system providing extremely accurate position, time, and
speed information
C. a north/south measurement of position
D.an east/west measurement of position
What is two-factor authentication?
A. the traditional security process, which requires a user name and password
B. requires the user to provide two means of authentication, what the user knows
(password) and what the user has (security token)
C. requires more than two means of authentication such as what the user knows
(password), what the user has (security token), and what the user is (biometric
D. the identification of a user based on a physical characteristic such as a fingerprint,
iris, face, voice, or handwriting
What is one of the most common ways a company can decrease supplier power?
A. charge lower prices
B. charge higher prices
C.use MIS to find and create alternative products
D. Companies cannot impact supplier power.
All of the following apply to sustaining technology except ________.
A. provides a cheaper product for current customers
B. provides a product that does not meet existing customer's future needs
C. provides a better product for current customers
D. provides a faster product for current customers
Which of the following is a business-related consequence of successful software?
A.increased revenues
B. damage to brand reputation
C. increased liabilities
D. increased expenses
Which of the following include the three primary network access technologies?
A.DSL, Cable Modem, Broadband
Which of the following statements is inaccurate?
A. Web 2.0 is a simple static website without any interaction with its users.
B. Web 2.0 brings people closer together with information using machines.
C. Web 3.0 brings machines closer together using information.
D. Web 3.0 is a rich "intelligent" understanding and relationships among concept and
Bob Silver loves playing a game called World of Warcraft where he has the capability
to create his own character and even his own life-like environment. Into which AI
system would you categorize World of Warcraft?
A. multi-agent system
B. expert system
C. virtual reality
D. fuzzy logic system
Which of the below is similar to focused strategy versus broad strategy?
A. large market versus leadership
B. large market versus uniqueness
C.niche market versus large market
D. niche market versus generic
What is adware?
A. a form of malicious software that infects your computer and asks for money
B. a new ransomware program that encrypts your personal files and demands payment
for the file's decryption keys
C. software that allows Internet advertisers to display advertisements without the
consent of the computer user
D. a special class of adware that collects data about the user and transmits it over the
Internet without the user's knowledge or permission
What determines if the system satisfies the user and business requirements?
A. alpha testing
B. development testing
C. integration testing
D.user acceptance testing
What are the quantifiable metrics a company uses to evaluate progress toward critical
success factors?
D. None of these are correct.
What is dynamic information?
A. the person responsible for creating the original website content
B. the person responsible for updating and maintaining website content
C. includes fixed data incapable of change in the event of a user action
D. includes data that change based on user action
What is a plan that details how a company creates, delivers, and generates revenues on
the Internet?
A. ebusiness
B. ebusiness model
C. ecommerce
D. ecommerce model
What technology makes possible high-speed Internet access over ordinary residential
electrical lines and offers an alternative to DSL or high-speed cable modems?
A. proxy
B.broadband over power line
C. attenuation
D. repeater
What passed to protect minors from accessing inappropriate material on the Internet?
A. ediscovery
B. Child Online Protection Act
C. digital rights management
D. pirated software
In which of the five basic supply chain activities do you build relationships with
suppliers to procure raw materials?
A. plan
C. deliver
D. return
What is the category of computer security that addresses the protection of data from
unauthorized disclosure and confirmation of data source authenticity?
A. information management
B. information compliance
C.information secrecy
D. information ethics
What is data mining?
A. the common term for the representation of multidimensional information
B. a particular attribute of information
C. uses a variety of techniques to find patterns and relationships in large volumes of
information and infer rules from them that predict future behavior and guide decision
D. process of analyzing data to extract information not offered by the raw data alone
Which of the following decisions does a firm need to make as soon as it has identified
the activities from the value chain that are bringing the highest added value to their
A. target high value-adding activities to further enhance their value
B. target low value-adding activities to increase their value
C. perform some combination of the two
D. All of these are correct.
Within the sites that support disaster recovery, a ________ is a separate facility with
computer equipment that requires installation and configuration.
A. hot site
B. cold site
C.warm site
D. disaster site
Application integration is the integration of data from multiple sources, which provides
a unified view of all data.