Book Title
Business Driven Information Systems 5th Edition

MPCS 96617

July 19, 2017
Simplelocker is a new ransomware program that encrypts your personal files and
demands payment for the files' decryption keys.
Business processes should never drive MIS choices and should be based on business
strategies and goals.
Strategic planning is a customer-facing business process.
Makerspaces is a community center that provides technology, manufacturing
equipment, and educational opportunities to the public that would otherwise be
inaccessible or unaffordable.
A foreign key is a primary key of one table that appears as an attribute in another table
and acts to provide a logical relationship between the two tables.
Polaroid had a unique competitive advantage for many years until it forgot to observe
competitive intelligence. The firm went bankrupt when people began taking digital
pictures. Polaroid provides a great example of Porter's supplier power.
Attenuation is a single unit of binary data routed through a network.
The application layer serves as the window for users and application processes to access
network services.
Ecommerce includes ebusiness along with all activities related to internal and external
business operations such as servicing customer accounts, collaborating with partners,
and exchanging real-time information. During Web 1.0, entrepreneurs began creating
the first forms of ecommerce.
VPNs are often used to connect to a corporate server. VPN stands for a Valued Partner
An access point provides communication for devices owned by a single user that work
over a short distance.
Information richness measures the number of people a firm can communicate with all
over the world.
Information secrecy is the category of computer security that addresses the protection
of data from unauthorized disclosure and confirmation of data source authenticity.
HTML 5 is the current version of HTML that delivers everything from animation to
graphics and music to movies; it can also be used to build complicated web applications
and works across platforms, including a PC, tablet, smartphone, or smart TV.
Information security policies detail how an organization will implement the information
security plan.
CRM predicting technologies help organizations predict customer behavior, such as
which customers are at risk of leaving.
A PERT chart is a simple bar chart that lists project tasks vertically against the project's
time frame, listed horizontally.
A global positioning system (GPS) consists of hardware, software, and data that provide
location information for display on a multidimensional map.
Privacy is the legal protection afforded an expression of an idea, such as a song, book,
or video game.
Failover occurs when the primary machine recovers and resumes operations, taking
over from the secondary server.
Big data is a collection of large, complex data sets, including structured and
unstructured data, which cannot be analyzed using traditional database methods and
Cloud computing stores, manages, and processes data and applications over the Internet
rather than on a personal computer or server.
Onshore outsourcing occurs when engaging another company within the same country
for services.
A certificate authority is a data file that identifies individuals or organizations online
and is comparable to a digital signature.
Social media refers to websites that rely on user participation and user-contributed
content, such as Facebook, YouTube, and Digg.
A personal computer is a computer that is operated by a single user who can customize
the functions to match personal preferences.
An appliance is a computer dedicated to a single function, such as a calculator or
computer game.
Encrypt data protects confidential information from unauthorized eyes.
Balanced scorecard is a management system, as well as a measurement system, that a
firm uses to translate business strategies into executable tasks.
Multitasking allows more than one piece of software to be used at a time. Multitasking
is used when creating a graph in Excel and simultaneously printing a word processing
Grid computing is a collection of computers, often geographically dispersed, that are
coordinated to solve a common problem.
Business Process Model and Notation (BPMN) is a graphical notation that depicts the
steps in a business process.
Cloud computing offers a pay-per-use revenue model similar to a metered service such
as gas or electricity.
The network effect describes how products in a network increase in value to users as
the number of users increases.
Application software is used in computer appliances and special-purpose applications,
such as an automobile, ATM, or media player and is used for a single purpose.
Which license restricts the use of the software to one user at a time?
A. single user license
B. network user license
C. site license
D. application service provide license
Which of the following represents a business process you would find in the operations
management department?
A. ordering inventory
B. processing sales
C. promoting discounts
D. paying of accounts payable
What kind of attribute would be date of birth?
A. null-valued attribute
B. multivalued attribute
C. derived attribute
D. stored attribute
What is the best way to measure a company's ebusiness success?
A. effective MIS metrics
B. interactivity
C. clickstream data
D. All of these are correct.
What are policies and procedures that address information management along with the
ethical use of computers and the Internet in the business environment?
A. information systems policy
C. technology applied policy
D. emastery
Which of the following definitions represents Internet censorship?
A. a problem that occurs when someone registers purposely misspelled variations of
well-known domain names
B. the theft of a website's name that occurs when someone, posing as a site's
administrator, changes the ownership of the domain name assigned to the website to
another website owner
C. government attempts to control Internet traffic, thus preventing some material from
being viewed by a country's citizens
D. an anti-spamming approach where the receiving computer launches a return attack
against the spammer, sending email messages back to the computer that originated the
suspected spam
With grid computing, a problem is broken into pieces and distributed to many
machines, allowing ________ processing than could occur with a single system.
A. more accurate
B. slower
D. cleaner
The local florist in town is Cheryl Steffan who has been in business for over 20 years.
Recently, Cheryl has noticed several complaints about delivery errors. Cheryl decides to
investigate the errors in her business delivery process and finds that most of the
inaccuracies occur during order taking. Cheryl decides to implement an electronic
ordering system to help improve order efficiency and effectiveness. What method did
Cheryl follow to solve her delivery issues?
A. modeled the As-Is process, fixed the errors, and then created the To-Be process
B. modeled the To-Be process, fixed the errors, and then created the As-Is process
C. moved directly to implementing the To-Be process without analyzing the As-Is
D. moved directly to implementing the As-Is process without analyzing the To-Be
Which of the following should be included in a company email privacy policy?
A. defines legitimate email users and explains what happens to accounts after a person
leaves the organization
B. discourages sending junk email or spam to anyone who doesn"t want to receive it
C. informs users that the organization has no control over email once it has been
transmitted outside the organization
D. All of these are correct.
What is a server?
A. consists of the physical devices associated with a computer system
B. the set of instructions the hardware executes to carry out specific tasks
C. a computer designed to request information from a server
D.a computer dedicated to providing information in response to requests
Which domain is the most common and reserved for commercial organizations and
A. .net
C. .biz
D. .org
What is a computer designed to meet the computing needs of several people
simultaneously in a small- to medium-sized business environment?
A. supercomputer
B. mainframe computer
C. workstation computer
D. minicomputer
What is information reach?
A. a global public network of computer networks that pass information from one to
another using common computer protocols
B. refers to the depth and breadth of information transferred between customers and
C. measures the number of people a firm can communicate with all over the world
D. occurs when those with access to technology have great advantages over those
without access to technology
As a manager for your company some of your responsibilities include measuring
metrics and overseeing company strategies. You observe some critical success factors
and see large increases in productivity. What would you suspect would be the primary
reason for the large increases in productivity?
A. decreases in effectiveness
B. increases in effectiveness
C. increases in executive roles
D. decreases in efficiency
What is a backward integration?
A. the integration of a company's existing management information systems
B. the integration of data from multiple sources, which provides a unified view of all
C. an integration method that sends information entered into a given system
automatically to all downstream systems and processes
D.an integration method that sends information entered into a given system
automatically to all upstream systems and processes
As the business and its strategies change, so do the _________ processes.
A. static
B. dynamic
C. sales
D. customer service
What is a computer dedicated to a single function, such as a calculator or computer
A. tablet
C. appliance
D. minicomputer
What is a project manager?
A.an individual who is an expert in project planning and management, defines and
develops the project plan, and tracks the plan to ensure that the project is completed on
time and on budget
B. a description of the business need (the problem the project will solve) and the
justification, requirements, and current boundaries for the project
C. a formal, approved document that manages and controls the entire project
D. a graphical representation of the processes that capture, manipulate, store, and
distribute information between a system and its environment
What is the forging of the return address on an email so that the email message appears
to come from someone other than the actual sender?
A. malicious code
B. hoaxes
C. spoofing
D. sniffer
Wired equivalent privacy (WEP) is an encryption algorithm designed to protect wireless
transmission data.
John and Jenny have been saving for two years to take their six children on a vacation
to Disneyworld. They are surprised to find out that airline tickets are far more
expensive than they had anticipated. They decide to try to find cheaper tickets on
Priceline.com where they are allowed to set their own price they are willing to pay for
the airline tickets. What form of ebusiness model are John and Jenny using?
B. B2B
C. C2B
D. C2C
What is competitive click-fraud?
A. the electronic defacing of an existing website
B. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by
repeatedly clicking on a link to increase charges or costs for the advertiser
C.a computer crime where a competitor or disgruntled employee increases a company's
search advertising costs by repeatedly clicking on the advertiser's link
D. an act or object that poses a danger to assets
In relation to privacy, which of the following is the assurance that messages and
information remain available only to those authorized to view them?
A. contentment
B. ethical standard
D. firewall security
What type of encryption technology uses multiple keys, one for public and one for
A. private key encryption
B. policy key encryption
C. public key encryption
D. protective key code
Todd Haitz is the marketing manager for the National Basketball Association. Todd
analyzes and tracks his marketing campaigns to determine the best success rate per
project for increasing ticket sales. Todd uses an internal KPI to track his marketing
campaign success. Which of the following would be an internal KPI Todd would use to
track his marketing campaigns?
A. marketing campaign ROI
B. marketing campaign percentage of fans purchasing Sports Illustrated magazine
C. marketing campaign advertiser revenue sales
D. marketing campaign market share
When analyzing the interrelationships between efficiency and effectiveness, where
would a company ideally want to operate?
A. with high efficiency
B. the upper right-hand corner of the interrelationship graph
C. with high effectiveness
D. All of these are correct.
What is a data file that identifies individuals or organizations online and is comparable
to a digital signature?
A. digital certificate
B. encryption
C. decrypt
D. cryptography
What is the time remaining before reaching a destination using the present speed and is
typically used for navigation applications?
A. estimated time of arrival
B.estimated time en route
C. latitude
D. longitude
What measures the number of people a firm can communicate with all over the world?
A. information
B. mass communication
C. information reach
D. cybertronics
What is a forward integration?
A. the integration of a company's existing management information systems
B. the integration of data from multiple sources, which provides a unified view of all
C. an integration method that sends information entered into a given system
automatically to all downstream systems and processes
D. an integration method that sends information entered into a given system
automatically to all upstream systems and processes
Which of the following are the four common types of effectiveness MIS metrics?
A. unstructured decisions, customer satisfaction, conversion rates, financial
B. usability, customer service, conversion rates, fiscal year revenue
C. usability, customer satisfaction, conversion rates, financial
D. usability, customer satisfaction, conversion rates, affordability
Explain the four primary traits that determine the value of information.
Explain the business benefits associated with successful software development.
Describe the relationship between information security policies and an information
security plan.
Explain integrations and the role they play in connecting a corporation.
Identify the different computer categories and explain their potential business uses.
Describe the information age and the differences between data, information, business
intelligence, and knowledge.
Provide an example of each of the three primary information security areas: (1)
authentication and authorization, (2) prevention and resistance, and (3) detection and
Describe artificial intelligence, and identify its five main types.
Describe Porter's Five Forces Model and explain each of the five forces.
Explain the three challenges associated with Business 2.0.
Identify the three primary areas a project manager must focus on managing to ensure
Explain the business benefits of a data-driven website.
Explain operational and analytical customer relationship management.
Define the relationship between operating system software and utility software.
Explain systems thinking and how management information systems enable business
Classify the different operational support systems, managerial support systems, and
strategic support systems, and explain how managers can use these systems to make
decisions and gain competitive advantages.
Differentiate among business process improvements, streamlining, and reengineering.
Explain Web 2.0, and identify its four characteristics.

Subscribe Now

Sign up to view full document

View Document