Book Title
Business Driven Information Systems 5th Edition

MPCS 73564

July 20, 2017
What are the two main categories in a value chain analysis?
A. primary value activities and secondary value activities
B. primary value activities and support value activities
C. primary value activities and strengthening value activities
D. None of these are correct.
A transaction processing system (TPS) is the basic business system that assists
operational level analysts when making structured decisions. Which of the following is
not an example of a TPS?
A. Target's internal company payroll system
B. Comfort Dental patient diagnosis system
C. First Bank's overall accounting system
D. Stewart Sport's order entry system
What is cartography?
A. an east/west measurement of position
B.the science and art of making an illustrated map or chart
C. stores, views, and analyzes geographic data, creating multidimensional charts or
D. a round coin-sized object, is uniquely numbered and hidden in geocache
What spans a large geographic area, such as a state, province, or country?
A. local area network
B. wide area network
C. metropolitan area network
D. peer-to-peer network
Personal digital assistant (PDA) is a small handheld computer that performs simple
tasks such as taking notes, scheduling appointments, and maintaining an address book
and a calendar. The PDA screen is touch-sensitive, allowing a user to write directly on
the screen, capturing what is written.
What is a type of mediation that refers to the creation of new kinds of intermediaries
that simply could not have existed before the advent of ebusiness?
A. cybermediation
B. interactivity
C. reintermediation
D. disintermediation
One of the primary goals of a database is to eliminate information redundancy by
recording each piece of data in only one place in the database. What does the
elimination of information redundancy do for a database?
A. reduces disk space requirements
B. makes updating information easier
C. improves information quality
D. All of these are correct.
Bonnie Flat is a real estate agent who specializes in the luxury home market in the
Seattle, WA area. Bonnie is highly technical and uses many types of online marketing
techniques to increase business. One of most successful online marketing techniques is
to place a box along the top of real estate websites and luxury custom furniture
websites. What type of marketing technique is Bonnie using?
A. a cookie
B. a banner ad
C. a pop-up ad
D. a click-through ad
Which four elements are included in systems thinking?
A. output, process, feedback, and accounting
B. process, output, operations, and accounting
C.input, process, output, and feedback
D. input, output, sales, and feedback
Which of the following include the three primary network providers?
A. DSL, Cable Modem, Broadband
Define data mining, and explain the three common forms for mining structured and
unstructured data.
Which of the following authentication methods is 100 percent accurate?
A. smart card
B. fingerprint authentication
C. user ID
D. None of these are correct.
What is loose coupling?
A. a business-driven enterprise architecture that supports integrating a business as
linked, repeatable activities, tasks, or services
B. a business task
C.the capability of services to be joined together on demand to create composite
services, or disassembled just as easily into their functional component
D. the capability of two or more computer systems to share data and resources, even
though they are made by different manufacturers
What is the science and art of making an illustrated map or chart?
A. automatic vehicle location
B. geographic information system
D. edge matching
What is the term for the most successful solutions or problem-solving methods that
have been developed by a specific organization or industry?
B. metrics
C. best practices
What is software whose source code is available free for any third party to review and
A. free source
B. open source
C. code source
D. network source
What is information that people use to support their decision-making efforts?
A. information cleansing and scrubbing
B. data-mining tools
C. data mining
D. business intelligence
What is a service that enables instant or real-time communication between people?
B. IMing
C. tacit knowledge
D. elicit knowledge
What is rivalry among existing competitors?
A. the ability of buyers to affect the price they must pay for an item
B. the suppliers' ability to influence the prices they charge for supplies (including
materials, labor, and services)
C. high when it is easy for new competitors to enter a market and low when there are
significant entry barriers to joining a market
D. high when competition is fierce in a market and low when competitors are more
Which of the following is the key term that defines the confirmation or validation of an
event or object?
A. buyer power
B. data
D. entry barrier
What is open source?
A. any proprietary software licensed under exclusive legal right of the copyright holder
B. any software whose source code is made available free for any third party to review
and modify
C. contains instructions written by a programmer specifying the actions to be performed
by computer software
D. consists of nonproprietary hardware and software based on publically known
standards that allow third parties to create add-on products to plug into or interoperate
What are computer viruses that wait for a specific date before executing their
A. zombie
B. zombie farm
C. pharming attack
D. time bomb
What caused Polaroid to go bankrupt?
A. It failed to have innovative technology and a captive customer base.
B. One-hour film processing and digital cameras stole its market share.
C. People who want instant access to their pictures also want a third party involved.
D. Internet websites such as Flickr and Facebook stole its market share.
What is the size of the internal electrical pathway along which signals are sent from one
part of the computer to another?
A. clock speed
B. word length
C. bus width
D. chip line width
Which of the choices below represents the bullwhip effect?
A. organizations know about employee events triggered downstream in the supply chain
B. customers receive distorted product demand information regarding sales information
C. distorted product-demand information ripples from one partner to the next
throughout the supply chain
D. the ability to view all areas up and down the supply chain
What is spear phishing?
A. reroutes requests for legitimate websites to false websites
B. a technique to gain personal information for the purpose of identity theft, usually by
means of fraudulent emails that look as though they came from legitimate businesses
C. a masquerading attack that combines spam with spoofing
D. a phishing expedition in which the emails are carefully designed to target a particular
person or organization
Which activities belong in the accounting department?
A. records, measures, and reports monetary transactions
B. tracks strategic financial issues, including money, banking, credit, investments, and
C. supports sales by planning, pricing, and promoting goods or services is marketing
D. relies on information from operations to understand inventory, place orders, and
forecast consumer demand
What is unified communications (UC)?
A. allows dynamic IP address allocation so users do not have to have a preconfigured IP
address to use the network
B. converts IP addresses into domains, or identifying labels that use a variety of
recognizable naming conventions
C. the efficient coexistence of telephone, video, and data communication within a single
network, offering convenience and flexibility not possible with separate infrastructures
D.the integration of communication channels into a single service
What is 3D printing?
A.a process that buildslayer by layer in an additive processa three-dimensional solid
object from a digital model
B. the use of electronic tags and labels to identify objects wirelessly over short
C. unmanned aircraft that can fly autonomously, or without a human
D. the focus on creating artificial intelligence devices that can move and react to
sensory input
Which of the following represents a brick-and-mortar business?
A. The Gap
B. Amazon
C. Google
D. T.J.Maxx
Which activities do human resource components perform?
A.track employee information including payroll, benefits, compensation, performance
assessment, and assumes compliance with the legal requirements of multiple
jurisdictions and tax authorities
B. handle the various aspects of production planning and execution such as demand
forecasting, production scheduling, job cost accounting, and quality control
C. manage accounting data and financial processes within the enterprise with functions
such as general ledger, accounts payable, accounts receivable, budgeting, and asset
D. None of these are correct.