Sei sulla pagina 1di 109

Exam

Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) Which type of information system provides methods for analyzing data warehouses to better
understand various aspects of a business?
A) Office Automation System
B) Transaction Processing System
C) Data mining and visualization system
D) Electronic Commerce System

1)

2) Which type of information system supports the coordination of suppliers, product or service
production, and distribution?
A) Supply Chain Management System
B) Functional Area Information System
C) Customer Relation Management System
D) Enterprise Resource Planning System

2)

3) IS personnel today exhibit the ability to integrate all of the following skill areas EXCEPT:
A) financial.
B) systems.
C) business.
D) technical.

3)

4) Which IS manager is responsible for managing IS services such as help desks, hot lines, training,
consulting, and so on?
A) Systems manager
B) Maintenance manager
C) Account executive
D) Information center manager

4)

5) Information systems are combinations of ________ that people build and use to collect, create, and
distribute useful data, typically in organizational settings.
A) telecommunications networks
B) hardware
C) software
D) all of the above

5)

6) Which IS manager is responsible for forecasting technology trends and for evaluating and
experimenting with new technologies?
A) Maintenance manager
B) Manager of emerging technologies
C) IS planning manager
D) Telecommunications manager

6)

7) Which IS manager is responsible for coordinating and managing the entire voice and data network?
A) Operations manager
B) Database administrator
C) Network manager
D) Telecommunications manager

7)

8) Nicholas Carr argued that as IT becomes more pervasive, it will become more:
A) unique.
B) ubiquitous.
C) unusual.
D) unnecessary.

8)

9) Hot skills in the technology and infrastructure domain include all EXCEPT:
A) systems design.
B) systems auditing.
C) systems analysis.
D) systems testing.

9)

10) Which of the following is FALSE regarding professionals who work with information?
A) Continuous learning is essential because of changing information needs.
B) They generally make more money than their agricultural or industrial counterparts.
C) The number of information workers is declining.
D) They have better career opportunities.

10)

11) All of the following categories used to describe information systems cannot be easily categorized
EXCEPT:
A) enterprise resource planning systems.
B) customer relationship management systems.
C) supply chain management systems.
D) executive information systems.

11)

12) Which type of information system is used to produce detailed information to help manage a firm or
a part of the firm?
A) Executive Information System
B) Transaction Processing System
C) Enterprise Resource Planning System
D) Management Information System

12)

13) Which type of information system enables customers to buy goods and services from a firm's Web
site?
A) Office Automation System
B) Transaction Processing System
C) Customer Relation Management System
D) Electronic Commerce System

13)

14) The technical competency area for IS professionals includes:


A) knowledge of Web design.
B) knowledge of business processes.
C) knowledge and skills in networking, hardware, and software.
D) All of the above

14)

15) Which type of information system is used to emulate or enhance human capabilities?
A) Decision Support System
B) Expert System
C) Executive Information System
D) Intelligent System

15)

16) Which IS manager is responsible for managing ethical and legal use of information systems within
the firm?
A) CIO
B) Auditing or computer security manager
C) IS planning manager
D) Quality assurance manager

16)

17) It was joked that CIO stood for "Career is Over" because of the high turnover rate of CIOs. The
primary reasons for CIO dismissals was:
A) CIOs tended to be technically- oriented but were ineffective managers.
B) many CIOs could not keep up with constantly changing technologies and employee
expectations.
C) tightening budgets for technology and unrealistic expectations for CIOs by management.
D) many CIOs left to take similar positions at dot- coms.

17)

18) In 1983, Apple launched the ________, which proved to be a commercial disaster.
A) Liz
B) Jane
C) Lisa
D) Mary Jane

18)

19) Which type of information system is used to support the functional areas within a firm?
A) Enterprise Resource Planning System
B) Functional Area Information System
C) Transaction Processing System
D) Customer Relation Management System

19)

20) Which type of information system comprises a collection of technology- based tools to enable the
generation, storage, sharing, and management of knowledge assets?
A) Expert System
B) Data mining and visualization system
C) Collaboration System
D) Knowledge Management System

20)

21) In looking at the difference between technologies and information technologies, it should be noted
that information technologies use ________ technologies as building blocks and then combines
them with computing and networking technologies.
A) computer
B) machine
C) system
D) innovative

21)

22) What does one call the highest- ranking IS manager who is responsible for strategic planning and IS
use throughout the firm?
A) Project manager
B) CIO
C) IS director
D) Webmaster

22)

23) Which IS manager is responsible for developing and monitoring standards and procedures to
ensure that systems within the firm are accurate and of good quality?
A) Quality assurance manager
B) Project manager
C) Auditing or computer security manager
D) CIO

23)

24) In the "new economy" some people have access to information technology and others do not. This
contrast over available technology is called:
A) parity.
B) the Internet gap.
C) the wall of separation.
D) the digital divide.

24)

25) Which type of information system is used to support executive- level decision making?
A) Transaction Processing System
B) Expert System
C) Enterprise Resource Planning System
D) Executive Information System

25)

26) Companies such as IBM, Electronic Data Systems (EDS), and Accenture (formerly Andersen
Consulting) play an important support role in IS. These companies are known as:
A) networking specialists.
B) computer manufacturers.
C) consulting firms.
D) change agents.

26)

27) Which type of information system provides analysis tools and access to databases in order to
support quantitative decision making?
A) Expert System
B) Decision Support System
C) Intelligent System
D) Executive Information System

27)

28) The book mentions all of the following as changes accompanying the move into the digital world
EXCEPT:
A) economic changes.
B) cultural changes.
C) technological changes.
D) ecological changes.

28)

29) Today, information systems:


A) are clearly delineated amongst these major systems categories.
B) can not be categorized at all.
C) often span several categories.
D) clearly belong to two of the categories.

29)

30) When considering typical IS careers and salary ranges, job categories usually include the following
EXCEPT:
A) maintenance.
B) development.
C) sales.
D) management.

30)

31) A ________ is a professional who is relatively well educated and creates, modifies, and/or
synthesizes knowledge as a fundamental part of his/her job.
A) knowledge worker
B) technician
C) Webmaster
D) salesman

31)

32) Which of the flowing is NOT a product marketed by Apple?


A) iPod
B) iTunes
C) Newton

32)

D) iDrive

33) Systems that support electronic commerce are considered:


A) very popular and important.
B) cumbersome to use and difficult to navigate.
C) too complex.
D) a declining fad.

33)

34) Office automation systems provide:


A) personal productivity tools.
C) spreadsheet tools.

34)

B) word processing tools.


D) All of the above.

35) The information systems projects of both the U.S. Navy and Fedex were ________ in nature.
A) strategic
B) operational
C) tactical
D) large- scale

35)

36) Which executive- level person is responsible for overseeing and managing the organization's
information systems?
A) Chief Knowledge Officer
B) Chief Technology Officer
C) Chief Operations Officer
D) Chief Information Officer

36)

37) Which IS manager is responsible for supervising the day- to - day operations of the data and/or
computer center?
A) Systems manager
B) Operations manager
C) IS planning manager
D) Account executive

37)

38) Which IS manager is responsible for coordinating and managing all systems maintenance projects?
A) Maintenance manager
B) Systems programming manager
C) Webmaster
D) Operations manager

38)

39) Unprocessed, unformatted words and numbers are known as:


A) information.
B) inputs.
C) raw material.

39)

40) CIO stands for:


A) Corporate Information Online.
C) Corporate Identification Office.

D) data.

B) Chief Information Officer.


D) Chief Intelligence Officer.

41) Which type of information system supports the interaction between a firm and its customers?
A) Customer Relation Management System
B) Office Automation System
C) Electronic Commerce System
D) Transaction Processing System

40)

41)

42) Which IS manager is responsible for managing the firm's World Wide Web site?
A) Webmaster
B) Network manager
C) Database administrator
D) Telecommunications manager

42)

43) A long unformatted number might be a phone number, a social security number, or a bank account
number. When dashes, commas, or some other formatting features are added, the number becomes
useful and meaningful. Thus, data has been transformed into ________.
A) digits
B) knowledge
C) outputs
D) information

43)

44) Which IS manager is responsible for coordinating applications programming efforts?


A) Programming manager
B) Operations manager
C) Project manager
D) Systems programming manager

44)

45) The field of information systems includes persons who perform all of the following EXCEPT
A) designing and building computer systems.
B) purchasing.
C) programming.
D) systems analysis.

45)

46) One thing that has forced IS people to improve both their operations and their relationship with
users is:
A) users had started developing their own applications.
B) changes in technology.
C) the shift from mainframe computers to client/server computing.
D) All of the above

46)

47) Which type of information system is used to support day- to - day business event data at the
operational level of the organization?
A) Management Information System
B) Executive Information System
C) Enterprise Resource Planning System
D) Transaction Processing System

47)

48) Rightsizing is another term for ________


A) downsizing.
B) replacing human employees with machines and technology.
C) staffing IS personnel within boundary spanners.
D) outsourcing.

48)

49) Over the last few decades, the relationship between technical workers and their internal corporate
clients has ________.
A) become more strained
B) ceased to exist
C) continued to be a problem
D) gradually improved

49)

50) While some IS professionals have only technical skills, others stand out for having a quality that
enables them to understand (1) systems development and integration, (2) complex problem
solving, and (3) management of technical personnel. This quality is called:
A) management.
B) systems development.
C) systems competency.
D) technical smarts.

50)

51) Which type of information system is used to create, store, and analyze spatial data?
A) Knowledge Management System
B) Data mining and visualization system
C) Expert System
D) Geographic Information System

51)

52) Which of the following is considered to be one of the more traditional categories that are used to
describe information systems?
A) decision support systems.
B) management information systems.
C) transaction processing systems.
D) All of the above.

52)

53) Systems competency is another area in which the IS professional can:


A) solve complex problems and systems projects.
B) show that they know how to build and integrate systems.
C) manage those with only technical knowledge and skills.
D) All of the above.

53)

54) Information systems are combinations of hardware, software, and telecommunications networks
that people build and use to collect, create, and distribute useful data, typically in ________
settings.
A) operational
B) organizational
C) global
D) strategic

54)

55) Which IS manager is responsible for managing one piece of the enterprise- wide network?
A) Network manager
B) Telecommunications manager
C) Operations manager
D) IS planning manager

55)

56) Which IS manager is responsible for managing a particular existing system?


A) Systems manager
B) Information center manager
C) Manager of emerging technologies
D) Maintenance manager

56)

57) What do you call any mechanical and/or electrical means to supplement, extend, or replace human,
manual operations or devices?
A) Information management
B) Internet
C) Networking
D) Technology

57)

58) Which IS manager is responsible for coordinating and managing all new systems projects?
A) Operations manager
B) Development manager
C) Project manager
D) Systems manager

58)

59) ________ enables you to apply concepts from one domain to a new situation or problem.
A) Knowledge
B) Wisdom
C) Data
D) Information

59)

60) In the last 10- 15 years which of the following challenges have faced CIOs?
A) High dismissal rates (CIOs being fired)
B) Unreasonable expectations
C) Tight budgets
D) All of the above

60)

61) The integration of economies throughout the world, enabled by technological progress, is called:
A) globalization.
B) equalization.
C) integration.
D) outsourcing.

61)

62) Which IS manager is responsible for managing the day- to - day operations of all aspects of IS within
one particular division, plant, functional business area, or product unit?
A) Account executive
B) IS director
C) Maintenance manager
D) Systems Programming manager

62)

63) Which IS manager is responsible for managing a particular new systems project?
A) Systems manager
B) Operations manager
C) Development manager
D) Project manager

63)

64) The business competency area for IS professionals:


A) sets them apart from others who have only technical skills.
B) is more strategic than technical.
C) is the easiest to outsource.
D) None of the above.

64)

65) From simplest to most complex, which is the proper order?


A) Data, information, wisdom, knowledge
B) Knowledge, data, wisdom, information
C) Information, data, wisdom, knowledge
D) Data, information, knowledge, wisdom

65)

66) Our "new economy" has been described as a knowledge society. The key factor in building a
knowledge society is:
A) money.
B) education.
C) the Internet.
D) politics.

66)

67) Machine technology that is controlled by or uses information is called:


A) a network.
B) information technology.
C) hardware.
D) process automation.

67)

68) Which IS manager is responsible for coordinating support for maintenance of all systems software
(for example, operating systems, utilities, programming languages, and so on)?
A) Operations manager
B) Project manager
C) Network manager
D) Systems programming manager

68)

69) Which IS manager is responsible for managing database and database management software use?
A) Network manager
B) Database administrator
C) Development manager
D) Systems manager

69)

70) Which of the following is NOT true about knowledge?


A) Knowledge is needed to understand relationships between different pieces of information.
B) Knowledge is a body of governing procedures.
C) Knowledge is used to organize or manipulate data.
D) Knowledge is accumulated wisdom.

70)

71) Which type of information system supports and integrate all facets of the business, including
planning, manufacturing, sales, marketing, and so on?
A) Transaction Processing System
B) Customer Relation Management System
C) Functional Area Information System
D) Enterprise Resource Planning System

71)

72) Which IS manager is responsible for developing an enterprise- wide hardware, software, and
networking architecture and for planning for systems growth and change?
A) Telecommunications manager
B) IS planning manager
C) Manager of emerging technologies
D) Network manager

72)

73) Outsourcing is:


A) when jobs are done by employees outside of normal working hours.
B) when jobs are performed by lower paid workers in other countries.
C) when jobs are performed by workers using the Internet.
D) when work is done by employees working from home as opposed to the office.

73)

74) With the Macintosh 128K, Apple introduced the first ________ to the mass market.
A) flash drive
B) computer mouse
C) touch screen
D) ergonomic keyboard

74)

75) The Apple I included the following innovation: ________.


A) keyboard
B) color graphics
C) floppy disk drive
D) all of the above

75)

76) ________ is/are combinations of hardware, software, and telecommunications networks that people
build and use to collect, create, and distribute useful data, typically in organizational settings.
A) Routers
B) Business
C) Technology
D) Information Systems

76)

77) What is the long- term career outlook for information systems workers?
A) IS workers will be in high demand.
B) Huge layoffs are anticipated.
C) A dot- com hiring boom is expected.
D) The demand for tech workers will be stagnant.

77)

Answer Key
Testname: UNTITLED1
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

C
A
A
D
D
B
D
B
D
C
D
D
D
C
D
B
C
C
B
D
B
B
A
D
D
C
B
D
C
C
A
D
A
D
A
D
B
A
D
B
A
A
D
A
B
D
D
A
D
C
9

Answer Key
Testname: UNTITLED1
51)
52)
53)
54)
55)
56)
57)
58)
59)
60)
61)
62)
63)
64)
65)
66)
67)
68)
69)
70)
71)
72)
73)
74)
75)
76)
77)

D
D
D
B
A
A
D
B
B
D
A
A
D
A
D
B
B
D
B
D
D
B
B
B
D
D
A

10

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) Wal- Mart has recently introduced ________ tags into their supply chain.
A) RFID
B) price
C) CSID

D) anti- theft

1)

2) A ________ business strategy is best suited for operation in markets differing widely.
A) global
B) transnational
C) multidomestic
D) All strategies are equally well suited.

2)

3) Which of the following is a weakness of the transnational business strategy?


A) Personnel overhead.
B) Difficult to manage.
C) Differing product offerings limit economies of scale.
D) Inability to react to local market conditions.

3)

4) The ________ industry benefited tremendously from the huge overinvestment in


telecommunications infrastructure during the dot- com bubble.
A) outsourcing
B) on- shoring
C) offshoring
D) in- sourcing

4)

5) Dimensions on which cultures differ include:


A) life focus.
C) uncertainty avoidance.

5)

B) concept of time.
D) all of the above.

6) Companies setting up entire factories in China is an example of ________.


A) in- sourcing
B) offshoring
C) on- shoring
7) The first mainstream web browser was called:
A) Netscape
C) Firefox

D) outsourcing

6)

7)

B) Internet Explorer
D) Opera

8) ________ reflects degree to which a society is characterized by masculine qualities, such as


assertiveness, or by feminine characteristics, such as nurturance.
A) Assertiveness
B) Life focus
C) Masculinity/femininity
D) Nurturance

8)

9) A ________ information systems strategy is characterized by local databases.


A) hybrid
B) multinational
C) transnational

9)

D) global

10) A ________ information systems strategy is characterized by multiple networks between the home
office and the subsidiaries.
A) hybrid
B) transnational
C) global
D) multinational

10)

11) A transnational information systems strategy is characterized by ________ systems


A) distributed
B) homogeneous
C) decentralized
D) centralized

11)

12) De facto standards contributing to Globalization 3.0 include all of the following EXCEPT:
A) Adobe Acrobat
B) eBay
C) PayPal
D) Microsoft Word

12)

13) ________ is a cultural characteristic related to the risk- taking nature of a culture.
A) Risk aversion
B) Uncertainty avoidance
C) Risk seeking
D) Fear of future consequences

13)

14) Which of the Asian outsourcing destination countries has the highest relative geopolitical risk?
A) Malaysia
B) China
C) Thailand
D) Philippines

14)

15) The U.S. government attempts to isolate the Cuban government economically using ________.
A) export regulations
B) quotas
C) embargoes
D) tariffs

15)

16) Which of the following is a weakness of the multidomestic business strategy?


A) Difficult to manage.
B) Inability to react to local market conditions.
C) Differing product offerings limit economies of scale.
D) Personnel overhead.

16)

17) A multinational information systems strategy is characterized by ________ systems


A) centralized
B) distributed
C) decentralized
D) homogeneous

17)

18) Which of the following American outsourcing destination countries has the highest English
proficiency?
A) Mexico
B) Argentina
C) Brazil
D) Costa Rica

18)

19) ________ is a cultural characteristic emphasizing the importance of the individual over the
collective/group in society.
A) Life focus
B) Selfishness
C) Egocentrism
D) Individualism

19)

20) ________ reflects the extent to which a culture focuses on the quantity versus the quality of life.
A) Life center
B) Quantity of life orientation
C) Life focus
D) Quality of life orientation

20)

21) Web sites allowing users to add, remove, or edit content are called:
A) online diaries.
B) wikis.
C) blogs.

21)

D) browsers.

22) Which of the following characteristics was not explicitly mentioned by Friedman in his book "The
World is Flat?"
A) The primary drivers of each phase of globalization.
B) The primary entities globalizing in each phase of globalization.
C) The regions globalizing.
D) The increasing speed of globalization.

22)

23) Which of the following is NOT considered a geoeconomic challenge of operating in a digital world?
A) Internet access
B) Demographic
C) Expertise
D) Time zone differences

23)

24) ________ refers to the delegation of a company's core operations to a subcontractor that specializes
in that operation.
A) on- shoring
B) outsourcing
C) offshoring
D) in- sourcing

24)

25) ________ are regulations permitting foreign businesses to export only a certain number of products
to a specific country.
A) Quotas
B) Tariffs
C) Export regulations
D) Embargoes

25)

26) Using converted PDAs, casino guests will be able to gamble in all of the following situations
EXCEPT:
A) while being in their hotel room.
B) while waiting in the ticket line for a nightly show.
C) while waiting for the next course at dinner.
D) while being at a meeting in the hotel's convention center.

26)

27) Foreign companies such as Toyota are producing goods in the U.S. to minimize the effect of:
A) embargoes
B) tariffs
C) quotas
D) export regulations

27)

28) Assembly plants located on the Mexican side of the U.S.- Mexican border are called:
A) Mexinanitas
B) Maquiladoras
C) Fabricados
D) Manufactorias

28)

29) Which of the flowing countries is NOT considered "enemy of the Internet" by the "Reporters
without Borders"?
A) Vietnam
B) North Korea
C) Thailand
D) Belarus

29)

30) Which of the following countries ranks highest in individualism?


A) Mexico
B) Peru
C) Australia

30)

D) Austria

31) The EU data protection directive is an example of which type of challenge?


A) Political system
B) Data sharing
C) Individual freedom
D) Regulatory

31)

32) Differences in network infrastructures throughout the world are an example of which type of
challenge?
A) Political system
B) Infrastructure related reliability
C) Regulatory
D) Internet access and individual freedom

32)

33) Which of the following is most likely to be considered a domestic company?


A) Car manufacturer
B) Consumer goods company
C) Barber shop
D) Insurance company

33)

34) During Globalization 3.0, ________ were the primary entities globalizing.
A) families
B) countries
C) companies
D) individuals and small groups

34)

35) Which of the following outsourcing destinations has the lowest average annual salary for
experienced programmers?
A) Malaysia
B) Philippines
C) China
D) India

35)

36) Which of the following is not a service that is being outsourced?


A) Preparation of tax returns.
B) Reading of X- rays.
C) Telephone support.
D) All of the activities above can be outsourced.

36)

37) A(n) ________ is a type of export regulation concerning the flow of goods and services, typically
limiting (or prohibiting) trade with one particular country.
A) quota
B) export regulation
C) tariff
D) embargo

37)

38) Products such as missile or encryption technology underlie ________.


A) quotas
B) embargoes
C) tariffs
D) export regulations

38)

39) ________ are government- imposed fees to regulate the flow of goods and services in and out of a
country
A) Quotas
B) Tariffs
C) Export regulations
D) Embargoes

39)

40) ________ are directed at limiting the export of certain goods to other countries.
A) Export regulations
B) Quotas
C) Embargoes
D) Tariffs

40)

41) A global information systems strategy is characterized by ________ systems


A) homogeneous
B) centralized
C) decentralized

41)

D) distributed

42) Which of the following is a reason for companies to outsource business activities?
A) To outsource noncore activities
B) To increase process efficiencies
C) To reduce time to market
D) All of the above.

42)

43) Which of the following events interrupted Globalization 2.0?


A) World War I
B) The Great Depression
C) World War II
D) All of the above.

43)

44) ________ is a cultural characteristic that reflects the extent to which a culture has a longer- or
shorter- term orientation.
A) Concept of time
B) Time focus
C) Life focus
D) Punctuality

44)

45) Which of the following is a weakness of the global business strategy?


A) Differing product offerings limit economies of scale.
B) Difficult to manage.
C) Personnel overhead.
D) Inability to react to local market conditions.

45)

46) ________ is a cultural characteristic emphasizing the importance of the collective/group over the
individual in society.
A) Group think
B) Collectivism
C) Power distance
D) Uncertainty avoidance

46)

47) The fall of the Berlin wall:


A) marked the end of the Cold War.
B) gave companies access to a talented labor pool.
C) opened up new markets for products.
D) all of the above.

47)

48) ________ is a cultural characteristic related to how different societies view authority and
hierarchical structures.
A) Obesity
B) Power distance
C) Authoritarianism
D) Obedience

48)

49) A ________ information systems strategy is characterized by data sharing between the home office
and the subsidiaries.
A) transnational
B) hybrid
C) multinational
D) global

49)

50) The EU data protection directive limits:


A) personal rights to access data.
C) transborder data flows.

50)

B) electronic commerce.
D) Internet freedom.

51) During Globalization 1.0, ________ were the primary entities globalizing.
A) families
B) companies
C) countries
D) individuals and small groups

51)

Answer Key
Testname: UNTITLED1
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

A
C
B
A
D
B
A
C
B
C
A
B
B
D
C
C
A
D
D
C
B
D
A
D
A
A
C
B
C
C
B
B
C
D
D
D
D
D
B
A
C
D
D
A
D
B
D
B
A
C
6

Answer Key
Testname: UNTITLED1
51) C

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) Companies like Wal- Mart, which offer products or services at competitive prices, are using a(n):
A) differentiation strategy.
B) low- cost leadership strategy.
C) best- cost provider strategy.
D) organizational strategy.

1)

2) Low cost leadership strategy, differentiation strategy, and best- cost provider strategy are examples
of strategic planning for:
A) TQM.
B) competitive advantage.
C) organizational learning.
D) informating.

2)

3) Which of the following is NOT a source of competitive advantage?


A) Achieving lower costs than rivals
B) Superior customer service
C) Having a well- known brand name
D) Achieving higher costs than rivals

3)

4) New technologies that are anticipated to have an impact on businesses are called:
A) emerging technologies.
B) firmware.
C) vaporware.
D) innovative growth.

4)

5) Making the ________ is the process of building and presenting the set of arguments that show that
an information system is adding value to the organization.
A) organizational chart
B) law case
C) organizational case
D) business case

5)

6) Companies like Target and Dell Computers, which offer the best prices for goods and/or services,
are using a(n):
A) best- cost provider strategy.
B) low- cost leadership strategy.
C) organizational strategy.
D) differentiation strategy.

6)

7) The E- Business Innovation Cycle questions the conventional wisdom that:


A) databases can keep pace with rapid technological changes.
B) emerging technologies are useful.
C) marketing dictates which type of technology should be used.
D) economic opportunities exist.

7)

8) The largest recurring costs are usually:


A) software costs.
C) personnel costs.

8)

B) marketing costs.
D) computer equipment costs.

9) Productivity from information systems is difficult to demonstrate because:


A) a time lag may occur between system implementation and the time when benefits are
realized.
B) effectiveness improvements are difficult to measure.
C) IS may benefit a particular firm, but not the industry as a whole.
D) All of the above.

9)

10) A company is said to have ________ when it has gained an edge over its rivals.
A) a monopoly
B) a computer advantage
C) profitability
D) a competitive advantage

10)

11) "Making the business case" for an information system means:


A) choosing the best organizational strategy.
B) choosing the best information system.
C) conducting business process reengineering (BPR).
D) identifying the value provided by an information system to the organization or its
constituents.

11)

12) What type of argument is this: "This analysis shows that implementing the inventory control
system will reduce errors by 50% and pay for itself within 18 months"?
A) An argument based on faith
B) An argument based on fact
C) An argument based on fear
D) None of the above.

12)

13) ________ are new technologies, products, or services that eventually surpass the existing dominant
technology or product in a market.
A) Processing Innovation.
B) Innovator's Dilemm
C) Disruptive Innovation
D) Innovation Production.

13)

14) From a productivity standpoint, system efficiency is an important concept. A problem associated
with system efficiency is:
A) the difficulty in measuring benefits associated with the system.
B) it is often confused with customer relationship management.
C) that management doesn't understand or doesn't care about system efficiency.
D) that system efficiency is hampered by computer speed.

14)

15) The example of VHS video cassette recorders (VCRs) winning out the marketplace over
technologically superior Betamax illustrates that:
A) the best products always win the battle for consumer products.
B) technology is more important than marketing.
C) emerging technology always entails risk.
D) VCRs follow the E - Business Innovation Cycle.

15)

16) When making a successful business case, "Arguments based on beliefs about organizational
strategy, competitive advantage, industry forces, customer perceptions, market share, and so on"
are known as:
A) arguments based on fear.
B) arguments based on faith.
C) arguments based on fact.
D) None of the above.

16)

17) Technology is said to ________ when it provides information about its operation and the
underlying work process that it supports.
A) dominate
B) informate
C) conglomerate
D) innovate

17)

18) When employees in a business unit (e.g., Accounting or Human Resources) assist in the creation of
an information system it is called:
A) a vendor- bender.
B) end- user development.
C) business unit production.
D) efficiency planning.

18)

19) In order to be successful, an organization needs to:


A) differentiate themselves from the competition
B) focus investments on information systems and technologies
C) have a clear vision.
D) All of the above

19)

20) In a corporate setting, "________" involves forming a vision of where the organization needs to
head, setting objectives and performance targets, and crafting a strategy to achieve the desired
results.
A) competitive advantage
B) strategic planning
C) best- cost provider
D) total quality management

20)

21) Costs that are one - time costs that are not expected to continue after the system is implemented are
called:
A) tangible costs.
B) nonrecurring costs.
C) intangible costs.
D) recurring costs.

21)

22) When considering the best technology to fit with a competitive strategy, would computer- aided
design be a good fit with a low- cost leader strategy?
A) No.
B) Yes.
C) Sometimes, it depends on the type of organization.
D) Low- cost leader is not a typical organizational strategy.

22)

23) For an organization to deploy emerging information systems successfully they must have:
A) a tolerance of uncertainty.
B) a tolerance for risk.
C) a tolerance of problems.
D) All of the above.

23)

24) Which of the following is NOT improving the value chain?


A) Improving procurement processes
B) Increasing operating costs
C) Selling more products
D) Minimizing marketing expenditures

24)

25) What type of argument is this: "If we don't implement this ERP system we'll get killed by our
competitors because they're using these systems"?
A) An argument based on fear
B) An argument based on fact
C) An argument based on faith
D) None of the above.

25)

26) When managers make their business case for an information system, they usually base their
arguments on all of the following EXCEPT:
A) facts.
B) faith.
C) fear.
D) freedom.

26)

27) The term ________ is generally used to mean the use of the Internet and related technologies that
support interactive purchasing. The term ________ is used more broadly to mean the use of nearly
any information technologies to support business.
A) e- business, e- commerce
B) e- technology, e- business
C) e- commerce, e - business
D) e- commerce, e - technology

27)

28) This group (vice presidents or higher) typically represents various stakeholders or interest groups
within the organization.
A) The steering committee
B) Company executives
C) IS managers
D) Stockholders

28)

29) Porter's five forces include:


A) competitors, customers, suppliers, new entrants, substitutes
B) customers, suppliers, distributors, middlemen, stockholders
C) competitors, new entrants, customers, suppliers, distributors
D) stockholders, suppliers, distributors, customers, competitors

29)

30) The prediction that the number of transistors that could be squeezed onto a silicon chip (which
correlates to microchip processing speed) doubles every 18 months is called:
A) a coincidence.
B) competitive advantage.
C) technological innovation.
D) Moore's Law.

30)

31) The most effective approach is the:


A) a combination of the technical and automating approaches.
B) automating approach.
C) learning approach.
D) a combination of the automating and learning approaches.

31)

32) Benefits such as reduction in order entry errors, increase in the customer reach of a new Web- based
system, etc. are examples of:
A) intangible benefits.
B) tangible benefits.
C) nonrecurring costs.
D) recurring costs.

32)

33) If you use measures of perceived value changes to the organization in the context of making a
business case, you can communicate these differences in terms of percentages, increases, or
decreases (whatever best conveys the benefits). These changes are demonstrated by using:
A) proxy variables
B) outside consultants
C) work profile matrices
D) steering committees

33)

34) An example of IS mismanagement is:


A) relying on technology to fix a problem that is really fundamental to the business process.
B) building a bad system.
C) implementing a system poorly.
D) All of the above.

34)

35) In the last few decades, it has often been observed that while IS expenditures (salaries, number of IS
staff, etc.) have risen, productivity has not increased at the same rate. This observation is referred to
as:
A) the cost of doing business.
B) the "productivity paradox."
C) underperformance.
D) inflation.

35)

36) All of the following are competitive forces from Porter's Competitive Forces model EXCEPT:
A) potential new entrants into the market.
B) substitute products.
C) online sellers.
D) bargaining power of suppliers.

36)

37) The four consecutive stages of Choosing, Matching, Executing, and Assessing make up the:
A) E- Business Innovation Cycle.
B) Executive Information System.
C) Functional Area Assessment System.
D) System Development Life Cycle.

37)

38) A(n) ________ allows organizations to track and learn trends, allowing for future planning of
resource distribution.
A) automating approach
B) strategy approach
C) learning approach
D) efficient approach

38)

39) Technology is said to ________ when we take a manual process (done by hand) and use computers
to perform the task.
A) strategize
B) automate
C) informate
D) compete

39)

40) ________ costs are ongoing costs that occur throughout the life cycle of systems development,
implementation, and maintenance.
A) Infrastructure costs
B) Recurring costs
C) High risk costs
D) Intangible costs

40)

41) A highly regulated industry can use IS to ________ and ensure compliance with regulations.
A) reduce volatility
B) mature its business
C) become the dominant force
D) control processes

41)

42) When making a successful business case, "Arguments based on the notion that if the system is not
implemented, the firm will lose out to the competition or, worse, go out of business" are known as:
A) arguments based on fact.
B) arguments based on faith.
C) arguments based on fear.
D) None of the above.

42)

43) One of the best ways to make a business case for a new system is to:
A) convert benefits to monetary terms.
B) gain influence or control of the executive committee.
C) take the CEO out to lunch and talk to him/her privately.
D) take your case to corporate stockholders.

43)

44) A good strategy for making a business case is to:


A) assess the value of the IT infrastructure.
B) measure what is important to management.
C) devise proxy variables.
D) All of the above.

44)

45) When making a successful business case, "Arguments based on data, quantitative analysis, and/or
indisputable factors" are known as:
A) arguments based on fear.
B) arguments based on fact.
C) arguments based on faith.
D) None of the above.

45)

46) Sir John Maddox was quoted in 1999 as saying, "The most important discoveries of the next 50
years are likely to be ones of which we cannot now ________."
A) compute
B) invent
C) afford
D) even conceive

46)

47) To be successful in e- business it is important to match new technologies with:


A) new computers.
B) new employees.
C) economic opportunities.
D) new businesses.

47)

48) In an organizational context, what is a value chain?


A) Gaining a strategic advantage.
B) The process of adding value throughout an organization.
C) Administration of a business.
D) Using technology to enhance operations.

48)

49) The five phases of value chain analysis include all of the following EXCEPT:
A) sales and marketing.
B) outbound logistics.
C) service.
D) computer technology.

49)

50) The reason IS expenditures have risen but productivity has not risen at the same pace is hard to
explain. One or more of the contributing factors have to do with:
A) management expectations of productivity gains are unrealistic.
B) spending is out of control in most companies.
C) government regulation, complex tax codes, more complex products, and employee behavior
such as playing software games, Web- surfing, and e- mailing friends.
D) new technology is harder to use and more complicated.

50)

51) Probably the most important factor that can affect IS investment is the nature of ________ in the
industry.
A) technology
B) competition or rivalry
C) marketing
D) customer service

51)

52) Competitive advantage gained by using information systems is usually:


A) long lasting because the E- Business Innovation Cycle is cyclical.
B) short- lived because competitors can copy emerging information systems.
C) permanent, because innovation tends to be ongoing.
D) a slow process because technology changes slowly.

52)

53) ________ costs are those that are easily identified and that are easy to recognize and track.
A) Recurring costs
B) Tangible costs
C) Nonrecurring costs
D) Intangible costs

53)

54) ________ costs are those that are hard to quantify, that is, they are difficult to evaluate and track.
A) Tangible costs
B) Nonrecurring costs
C) Recurring costs
D) Intangible costs

54)

55) A system that uses the Internet for business- to - business interaction is called a(n):
A) network topology.
B) extranet.
C) intranet.
D) privileged network.

55)

56) The most common way to make an argument based on fact, where convincing quantitative analysis
proves the benefits outweigh the costs, is:
A) a cost- benefit analysis.
B) to demonstrate what competitors are doing.
C) hire independent consultants.
D) to look at industry trends.

56)

57) Before an organization can deploy new systems well, its people, structure, and processes must be:
A) young and innovative.
B) more technical than its rivals.
C) knowledge workers.
D) capable of adapting well to change.

57)

58) What type of argument is this: "I know I don't have good data to back this up, but I'm convinced
that having this CRM system will enable us to serve our customers better."?
A) An argument based on fear
B) An argument based on faith
C) An argument based on fact
D) None of the above.

58)

59) What is a computer- aided design system?


A) Using computers to do architecture.
B) Software that generates innovated designs and artistic patterns.
C) Computer software that dictates the best competitive strategy for your company.
D) The use of computers to design state- of- the- art, high- quality products.

59)

60) The IS manager:


A) has overall responsibility for managing IS development, implementation, and maintenance.
B) is a nonrecurring cost.
C) is not in a position to make recommendations to decision makers.
D) is an intangible cost.

60)

61) When presenting the business case for a new information system, the case may be made to:
A) company executives.
B) the steering committee.
C) the IS manager.
D) All of the above.

61)

62) ________ and justifying that value to various stakeholders in the organization has become one of
the most important aspects of information systems projects.
A) Measuring the value of IS
B) Outsourcing
C) Developing intranets
D) Hiring qualified employees

62)

63) ________ is using technology as a way to help complete a task within an organization faster, more
cheaply, and with, perhaps, a greater accuracy and/or consistency.
A) Automating
B) Strategizing
C) Learning
D) Processing

63)

64) When direct quantification of financial benefits is difficult, an alternative is the use of ________,
which are measures of changes in terms of perceived value.
A) proxy variables
B) work profile matrices
C) outside consultants
D) steering committees

64)

65) The mindset of managers in the past was to think about information systems as a(n) ________.
Managers must view IS as a(n) ________.
A) resource, expense
B) expense, overhead
C) competitive advantage, liability
D) necessary evil, asset

65)

66) Hot issues with senior management include:


A) customer feedback.
C) cycle time (time to process an order).

B) employee morale.
D) All of the above.

66)

67) All of the following strategies for presenting a business case to management for an information
system are valid EXCEPT:
A) measure what is important to employees.
B) convert benefits to monetary terms.
C) devise proxy variables.
D) assess the value of the IT infrastructure.

67)

68) The cost of employee salaries and benefits is an example of:


A) intangible costs.
B) infrastructure costs.
C) high- risk costs.
D) recurring costs.

68)

69) Benefits such as improved perception of the firm and faster turnaround on order fulfillment are
examples of:
A) recurring costs.
B) nonrecurring costs.
C) tangible benefits.
D) intangible benefits.

69)

70) Companies like Porsche, Nordstrom, and IBM, which offer better products or services than their
competitors, are using a(n):
A) best- cost provider strategy.
B) low- cost leadership strategy.
C) differentiation strategy.
D) organizational strategy.

70)

71) Rubin's four categories for assessing the value of IT infrastructure includes:
A) external benchmarks, useful frameworks, IT spending, and profitability.
B) interoperability, portability, scalability, and compatibility.
C) economic, architectural, operational, and regulatory value.
D) None of the above.

71)

72) A ________ organization is defined as an organization that is "skilled at creating, acquiring, and
transferring knowledge, and at modifying its behavior to reflect new knowledge and insights."
A) learning
B) profitable
C) technical
D) strategizing

72)

73) In terms of the productivity paradox, the failure of strategic information systems can not be
explained by the theories that they are:
A) making the whole pie bigger.
B) redistributing the pie.
C) a wash for the industry as a whole.
D) beneficial for one organization, but not for all.

73)

Answer Key
Testname: UNTITLED1
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

C
B
D
A
D
B
C
C
D
D
D
B
C
A
C
B
B
B
D
B
B
A
D
B
A
D
C
B
A
D
D
B
A
D
B
C
A
C
B
B
D
C
A
D
B
D
C
B
D
C
9

Answer Key
Testname: UNTITLED1
51)
52)
53)
54)
55)
56)
57)
58)
59)
60)
61)
62)
63)
64)
65)
66)
67)
68)
69)
70)
71)
72)
73)

B
B
B
D
B
A
D
B
D
A
D
A
A
A
D
D
A
D
D
C
C
A
A

10

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) The ________ Act is a government regulation formed as a reaction to large - scale accounting
scandals that led to the downfall of large corporations that includes the use of information systems
controls in compliance reviews.
A) Enron
B) CAAT
C) COBIT
D) Sarbanes- Oxley

1)

2) ________ are Web- based software systems used to integrate information from different
applications and databases as well as allow different applications from different sources to interact
over a network.
A) Web services
B) ASPs
C) Integration services
D) Middleware applications

2)

3) ________ software refers to software the source code is freely available for use and/or modification.
A) Source- code
B) Application
C) Free
D) Open- source

3)

4) Google's data center has been set up in The Dalles, OR due to all of the following EXCEPT:
A) high- speed connectivity.
B) availability of skilled labor.
C) access to unlimited water supply.
D) availability of cheap, uninterrupted power.

4)

5) A ________ backup site is backup facility consisting of an empty warehouse with all necessary
connections for power and communication, but nothing else.
A) cold
B) hot
C) empty
D) dormant

5)

6) Autonomic computing systems should be ________, so that users can continue working on tasks,
even if parts of the system are not operational.
A) self - protecting
B) self - healing
C) self - optimizing
D) self - configuring

6)

7) What is not among the most prominent threats to IS facilities?


A) Floods
B) Seismic activity
C) Hurricanes
D) Volcanic activity

7)

8) A single repository of database information integrated from multiple large databases and other
information sources is called a(n):
A) data warehouse.
B) data supermart.
C) informational system.
D) data mart.

8)

9) Information gathered from different business processes to improve organizational


decision- making are referred to as:
A) tacit knowledge.
B) street smarts.
C) explicit knowledge.
D) business intelligence.

9)

10) The Berkeley software development (BSD) license is a:


A) proprietary software.
B) nonprotective open source software.
C) public domain software.
D) protective open source software.

10)

11) ________ is the use of the Internet Protocol for transporting voice, video, fax, and data traffic.
A) IP conveyance
B) IP convergence
C) IP integration
D) IP communication

11)

12) Knowledge that can be documented, archived, and codified is called:


A) explicit knowledge.
B) implicit knowledge.
C) tacit knowledge.
D) best practices.

12)

13) Application service providers offer:


A) utility software.
C) utility computing.

13)

B) on- demand software.


D) on- demand computing.

14) ________, a big part of interactive e - commerce on the Internet, refers to immediate automated
responses to the requests of users.
A) Normalization
B) Online analytical processing
C) Entity relationship diagramming
D) Online transaction processing

14)

15) ________ is a set of best practices that help organizations to both maximize the benefits from their
information systems infrastructure, while at the same time establishing appropriate controls.
A) CAAT
B) S- OX
C) COBIT
D) CMMS

15)

16) ________ are controls helping to ensure the reliability of information, consisting of policies and
their physical implementation, access restrictions, or recordkeeping of actions and transactions.
A) Information systems controls
B) Infrastructure controls
C) Access controls
D) Audit controls

16)

17) A(n) ________ ASP offers a solution package for an entire industry.
A) local
B) vertical market
C) specialist or functional
D) enterprise

17)

18) ________ refers to immediate automated responses to user requests.


A) OLAP
B) OLIP
C) OLTP

18)

D) OLST

19) A(n) ________ ASP offers services for small businesses within a limited geographical area.
A) specialist or functional
B) local
C) enterprise
D) vertical market

19)

20) The GNU general public license is a:


A) nonprotective open source software.
C) protective open source software.

20)

B) public domain software.


D) proprietary software.

21) Software asset management includes all of the following EXCEPT:


A) matching installed software with licenses.
B) performing a software inventory.
C) creating a software asset management plan.
D) All of these are part of software asset management.
2

21)

22) ________ refers to the use of Internet technologies for placing telephone calls.
A) VoIP
B) PoIP
C) IPT

D) IPP

22)

23) ________ are systems used to interact with customers and run a business in real time.
A) Informational systems
B) Structured query systems
C) Office automation
D) Operational systems

23)

24) An autonomic computing system must know its:


A) configuration.
C) capacity.

24)

B) current status.
D) All of the above.

25) Knowledge management is:


A) the executive team in charge of the knowledge workers.
B) the executive team who creates data.
C) the executive team in an organization in charge of data.
D) the processes that an organization uses to gain the greatest value from its knowledge assets.

25)

26) To ________ means to synchronously store data on independent systems to achieve redundancy for
purposes of reliability and/or performance.
A) merge
B) mirror
C) reflect
D) synchronize

26)

27) ________ refers to combining the computing power of a large number of smaller, independent,
networked computers into a cohesive system in order to solve problems that only supercomputers
were previously capable of solving.
A) Autonomic computing
B) Grid computing
C) Pay- per- use computing
D) On- demand computing

27)

28) In a(n) ________ architecture, different repeatable business tasks are integrated (using Web
services) to better perform various business processes.
A) service- oriented
B) Web- oriented
C) e- Enabled
D) integrated

28)

29) In a ________ grid, the computers are just there to perform the grid's computing tasks.
A) dedicated
B) pure
C) uniform
D) homogeneous

29)

30) Systems designed to perform specific, predefined task such as a digital video recorder (TiVo) or a
network router are referred to as ________ systems.
A) integrated
B) embedded
C) specific
D) special- purpose

30)

31) Information systems controls include all of the following EXCEPT:


A) corrective controls.
B) detective controls.
C) preventive controls.
D) All of the above are parts of IS controls.

31)

32) ________ is a method of analyzing data used by companies to sort and analyze information to
better understand their customers, products, markets, or any other phase of their business.
A) Data mining
B) Business rules
C) OODB
D) Data warehousing

32)

33) When merging transaction and analytical processing a problem occurs. Real- time analytical
processing diminishes the performance of transaction processing. What is the solution to this
problem that many companies use?
A) Pause transaction processing while analytical processing is occurring.
B) Replicate all transactions on a second database server and run analytical processing off of the
second server.
C) Only allow transaction processing during off- peak hours.
D) None of the above.

33)

34) A(n) ________ ASP offers broad solutions for the needs of different organizations.
A) local
B) enterprise
C) vertical market
D) specialist or functional

34)

35) Using on - demand computing, resources are allocated on a(n) ________ basis.
A) demand- adjusted
B) most- important- application
C) as- needed
D) prioritized

35)

36) The most important aspect of preparing for disaster is:


A) creating a disaster recovery plan.
B) analyzing information systems risk.
C) having an evacuation route.
D) being prepared.

36)

37) Graphical software tools that provide complex analysis of stored data are:
A) OLAP.
B) OLST.
C) OLTP.

37)

D) OLIP.

38) Software asset management helps organizations to better manage their software infrastructure by
enabling to:
A) decide to retire unused software.
B) decide when to upgrade or replace software.
C) consolidate and standardize software titles.
D) All of the above.

38)

39) ________ are systems designed to support decision making based on point- in- time data or
historical data.
A) Office automation
B) Structured query systems
C) Operational systems
D) Informational systems

39)

40) ________ licenses usually contain limitations of liability and warranty disclaimers.
A) Consumer
B) Protected
C) Negotiated
D) Enterprise

40)

41) ________ is specific software to test applications and data, using test data or simulations.
A) CAAT
B) COBIT
C) CMMS
D) S- OX

41)

42) Today, it is often more cost effective to set up a ________ grid.


A) uniform
B) heterogeneous
C) uniform

42)

43) The purpose of a data warehouse is to:


A) centralize the manageability of data collection.
B) put key business information into the hands or more decision makers.
C) create backups for mission critical corporate data.
D) store all corporate transaction data in one single location.
4

D) dedicated

43)

44) What is not a question related to an organization's hardware infrastructure faced by executives?
A) How can reliability be assured?
B) What time interval should equipment be replaced?
C) What technologies should be chosen?
D) All of these questions are faced by executives.

44)

45) ________ is the operating system of choice for Web servers, embedded system, and supercomputers
alike.
A) Linux
B) Unix
C) Tux
D) Pengu- ware

45)

46) Internal sources for gathering business intelligence include all EXCEPT:
A) sales figures.
B) customer demographics.
C) performance indicators.
D) competitor analysis.

46)

47) The Windows operating systems is:


A) proprietary software.
C) nonprotective open source software.

47)

B) protective open source software.


D) public domain software.

48) ________ can increase the reliability of an organization's information systems infrastructure.
A) Grid computing
B) Autonomic computing
C) Pay- per- use computing
D) On- demand computing

48)

49) In order to be able to use different computing resources, autonomic computing systems should be:
A) self - healing.
B) self - protecting.
C) self - configuring.
D) self - optimizing.

49)

50) ________ computing systems are self- managing, meaning that they need only minimal human
intervention to operate.
A) Edge
B) Autonomic
C) Grid
D) Utility

50)

51) One way to increase independence while still being able to integrate various software applications
is the use of:
A) Web services.
B) ASPs.
C) integration services.
D) middleware applications.

51)

52) Systems for gaining business intelligence ________ data in order to better manage the organization.
A) store
B) gather
C) process and analyze
D) all of the above

52)

53) The Windows Update Service is an example of a ________ system.


A) software asset management
B) bug- fixing
C) online help and repair
D) patch management

53)

54) Which of the following is not considered a core business process?


A) Hire employees
B) Sell products
C) Manufacture goods
D) Provide service

54)

55) ________ are facilities housing a vast number of servers to support the information processing
needs of an organization.
A) Server farms
B) Server rooms
C) Server warehouses
D) Clusters

55)

56) A ________ is a facility in which businesses can rent space for servers or other information systems
equipment.
A) collocation facility
B) server warehouse
C) server room
D) data warehouse

56)

57) The Linux operating systems is an example of:


A) protective open source software.
C) nonprotective open source software.

57)

B) proprietary software.
D) public domain software.

58) One factor that adds to the popularity of using dedicated grids is:
A) the falling cost of computing hardware.
B) outsourcing of noncore activities.
C) the increased power.
D) the increasing skill level of grid engineers.

58)

59) ________ can help to deal with fluctuating computation needs.


A) Autonomic computing
B) Grid computing
C) On- demand computing
D) Pay- per- use computing

59)

60) ________ computing uses relatively small servers close to the end users to save resources in terms
of network bandwidth and access time.
A) Utility
B) Edge
C) Network
D) Grid

60)

61) A(n) ________ offers on- demand software on an as - needed basis to its clients over the web.
A) Web service provider
B) best- cost provider
C) software provider
D) application service provider

61)

62) The most common cause(s) of disaster is (are):


A) floods.
C) power outages.

62)

B) hardware failures.
D) All of the above.

63) Knowledge that reflects processes and procedures that are located in a person's mind is called:
A) best practices.
B) tacit knowledge.
C) implicit knowledge.
D) explicit knowledge.

63)

64) Some programs for outdated IBM mainframes are considered:


A) nonprotective open source software.
B) public domain software.
C) protective open source software.
D) proprietary software.

64)

65) A ________ is a data warehouse that is limited in scope. It contains selected information of the
company's business, for example finance data, inventory data, or personnel data.
A) data mart
B) data model
C) report
D) query

65)

66) ________ is a set of activities performed to better manage an organization's software infrastructure
by being able to consolidate and standardize their software titles, decide to retire unused software,
or decide when to upgrade or replace software.
A) Software audit
B) Software licensing
C) Patch management
D) Software asset management

66)

Answer Key
Testname: UNTITLED1
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

D
A
D
B
A
B
D
A
D
B
C
A
B
D
C
A
B
C
B
C
D
A
D
D
D
B
B
A
A
B
D
A
B
B
C
A
A
D
D
D
A
D
B
D
A
D
A
B
C
B
8

Answer Key
Testname: UNTITLED1
51)
52)
53)
54)
55)
56)
57)
58)
59)
60)
61)
62)
63)
64)
65)
66)

A
D
D
A
A
A
A
A
C
B
D
D
B
B
A
D

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) Entering batch data can be done with all of the following devices EXCEPT:
A) character reader.
B) bar code.
C) keyboard.
D) scanners.
2) A ________ is 1,024 bytes or approximately a thousand characters.
A) terabyte
B) gigabyte
C) kilobyte

1)

D) megabyte

2)

3) A(n) ________ computer is a microcomputer with minimal memory and storage designed to
connect to networks to use resources provided by servers.
A) midrange
B) network
C) workstation
D) server

3)

4) The ________ performs mathematics and logical operations.


A) a register
B) an arithmetic/logic unit
C) primary storage
D) cache

4)

5) The ________ is the computer's brain. It performs, coordinates, and manages all the calculations
and instructions of the computer.
A) register
B) control unit
C) RAM memory
D) central processing unit

5)

6) ________ devices transform inputs into outputs.


A) Processing
B) Output

6)

C) Input

D) Internet

7) RAID (redundant array of independent disks) is a type of:


A) hard drive.
B) primary storage.
C) ROM.
D) RAM.

7)

8) A temporary storage location where data must reside while it is being processed or manipulated is
called:
A) cache.
B) primary storage.
C) an arithmetic/logic unit.
D) a register.

8)

9) Information permanently stored on a hard disk, diskette, CD- ROM disk, or tape, is called ________
storage.
A) secondary
B) tertiary
C) primary
D) permanent

9)

10) ________ uses a camera to send a sequence of moving images in a compressed form over the
Internet.
A) MIDI
B) Streaming media
C) Video cameras
D) Streaming video

10)

11) Flash drives use a special type of memory called:


A) SIM.
B) EEPROM.

11)

C) SDRAM.

D) RAM.

12) A ________ is 1,073,741,824 bytes or approximately a billion characters.


A) kilobyte
B) terabyte
C) gigabyte

D) megabyte

12)

13) A touch pad is best associated with which information category?


A) Entering batch data
B) Selecting and pointing
C) Entering audio and video
D) Entering original text/numbers

13)

14) Text recognition software:


A) reads text as audible speech.
B) converts speech into text.
C) analyzes handwriting and identifies forgeries.
D) converts handwritten text into characters (as if typed on a keyboard).

14)

15) A ________ is used to solve massive computational problems.


A) workstation.
B) mainframe
C) supercomputer
D) midrange computer

15)

16) This type of scanner is used to scan questionnaires and test answer forms where answer choices are
circled or blocked in, using pencil or pen.
A) Optical mark recognition (OMR)
B) Magnetic ink character recognition (MICR)
C) Bar code/optical character readers
D) Optical character recognition (OCR)

16)

17) A ________ is 1,048,576 bytes or approximately a million characters.


A) megabyte
B) gigabyte
C) terabyte

17)

D) kilobyte

18) This type of scanner is used in grocery stores and other retail businesses to record prices at the
checkout counter.
A) Optical character recognition (OCR)
B) Optical mark recognition (OMR)
C) Bar code/optical character readers
D) Magnetic ink character recognition (MICR)

18)

19) A type of notebook computer that accepts input from both a keyboard and a stylus is called a
________.
A) handheld computer
B) tablet PC
C) PDA
D) portable

19)

20) The hypothesis that computer processing performance would double every 18 months is called:
A) Motorola's Law.
B) Moore's Law.
C) the theory of exponential returns.
D) exponential development.

20)

21) Registers, cache, random access memory (RAM), and read- only memory are examples of:
A) computer time.
B) primary storage.
C) central processing units.
D) secondary storage.

21)

22) Which binary code uses 16 bits?


A) ANSI
B) EBCDIC

22)

C) Unicode

D) ASCII

23) ________ convert(s) printed text and images into digital data.
A) Scanners
B) Ergonomics
C) Digitizers
D) Batch processing

23)

24) This type of scanner is used to read and digitize typewritten, computer - printed, and even
hand- printed characters such as on sales tags on department store merchandise or patient
information in hospitals.
A) Magnetic ink character recognition (MICR)
B) Bar code/optical character readers
C) Optical character recognition (OCR)
D) Optical mark recognition (OMR)

24)

25) A process called ________ makes it possible for your computer to digitize spoken words and
display them on the computer monitor.
A) Small Talk
B) file transfer protocol
C) Internet Relay Chat (IRC)
D) speech recognition

25)

26) A ________ is a pointing device that works by rolling a ball that sits in a holder. Selections are made
by pressing buttons located near or on the holder.
A) mouse
B) light pen
C) joystick
D) trackball

26)

27) A ________ is a pointing device that works by moving a small stick that sits in a holder. Selections
are made by pressing buttons located near or on the holder.
A) joystick
B) trackball
C) light pen
D) mouse

27)

28) Instructions in RAM are considered ________. That is, if the power goes out all information is RAM
is lost.
A) ephemeral
B) volatile
C) evaporative
D) transient

28)

29) Pointing devices are used to:


A) have ergonomically designed workplaces.
B) convert handwritten text into computer- based characters.
C) select items from menus.
D) enter batch dat

29)

30) A ________ is a pointing device that works by placing a pen- like device near a computer screen.
Selections are made by pressing the pen to the screen.
A) trackball
B) joystick
C) mouse
D) light pen

30)

31) A small block of memory used by processors to store those instructions most recently or most often
used is called:
A) an arithmetic/logic unit.
B) primary storage.
C) cache.
D) a register.

31)

32) A computer's ________ is the physical box that houses all of the electronic components that do the
work inside the computer.
A) CPU
B) system unit
C) memory
D) motherboard

32)

33) A ________ is 1,099,511,627,776 bytes or approximately a trillion characters.


A) terabyte
B) megabyte
C) kilobyte

33)

D) gigabyte

34) ________ are a special type of credit card with a magnetic strip, a microprocessing chip, and
memory circuits.
A) Smart cards
B) Scanners
C) Disc- cards
D) Intellisense cards

34)

35) CPU stands for:


A) control program unit.
C) character parsing unit.

35)

B) computer processing unit.


D) central processing unit.

36) The mainstay of large corporate computing has been large, high - powered computers called
________.
A) supercomputers
B) network computers
C) PDAs
D) mainframes

36)

37) A mouse is best associated with which information category?


A) Entering batch data
B) Entering original text/numbers
C) Selecting and pointing
D) Entering audio and video

37)

38) Fixed length binary code is called:


A) ASCII.
B) EBCDIC.

38)

C) ANSI.

D) Unicode.

39) This type of scanner is used by the banking industry to read data, account numbers, bank codes,
and check numbers on preprinted checks.
A) Bar code/optical character readers
B) Optical mark recognition (OMR)
C) Magnetic ink character recognition (MICR)
D) Optical character recognition (OCR)

39)

40) All of the following types of computer storage involve the use of a laser beam to read data from a
disk surface EXCEPT a:
A) CD- ROM.
B) hard disk.
C) magneto- optical disk.
D) optical disk.

40)

41) The binary digits that make up machine language (1s and 0s) are called:
A) electrons.
B) bits.
C) units.

41)

D) bytes.

42) Computers use a language called ________, which is based on 1s and 0s.
A) high- voltage current
B) data
C) binary code
D) streaming

42)

43) A keyboard is best associated with which information category?


A) Selecting and pointing
B) Entering original text/numbers
C) Entering batch data
D) Entering audio and video

43)

44) When considering elements of computer time, one millionth of a second is called a:
A) microsecond.
B) millisecond.
C) nanosecond.
D) picosecond.

44)

45) The computer's ________ contains all of the components that do the actual processing work of the
computer.
A) motherboard
B) foundation
C) control unit
D) main memory

45)

Answer Key
Testname: UNTITLED1
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)

C
C
B
B
D
C
A
D
A
D
B
C
B
D
C
A
A
C
B
B
B
C
A
C
D
D
A
B
C
D
C
B
A
A
D
D
C
A
C
B
B
C
B
A
A

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) Borland Paradox, Microsoft Access, Borland dBase, and Microsoft FoxPro are examples of what
type of software?
A) Spreadsheets
B) PC- based e- mail
C) Presentation software
D) Database management software

1)

2) Computer programs created using programming languages must be translated into code called
________.
A) automation language
B) compiler language
C) interpreted language
D) machine language

2)

3) ________ is a programming language developed by Sun Microsystems in the 1990s that enables
dynamic content and displays of moving graphics.
A) Java
B) SQL
C) HTML
D) C++

3)

4) CASE stands for:


A) computer- aided software engineering.
B) computer- architecture system event.
C) comprehensive- assessment software enterprise.
D) compressed- archive system event.

4)

5) The ________ utility archive(s) files from a hard disk to a diskette.


A) backup
B) file conversion
C) spam blockers
6) Windows and Macintosh operating systems have:
A) graphical user interfaces.
C) Internet- activated interfaces.

D) antivirus

B) voice- activated interfaces.


D) command- based interfaces.

5)

6)

7) ________ software is developed to meet specific organizational needs. It may be developed


in- house by the company's own IS staff or it may be contracted or outsourced.
A) System
B) Security
C) Customized application
D) Utility program

7)

8) Which computer language, developed in 1960, was the first language designed for business
software and is frequently used for transaction processing applications on mainframes?
A) FORTRAN
B) COBOL
C) Basic
D) Pascal

8)

9) Another name for a computer's system software is the ________.


A) system architecture
B) command based system
C) application software
D) operating system

9)

10) Netscape created a language that allows dynamic content to be added to Web pages called
________.
A) CASE.
B) JavaScript.
C) HTML.
D) Java.

10)

11) This operating system, the first graphical- based operating system, debuted in 1984 and runs on
Apple Macintosh personal computers.
A) MS- DOS
B) Linux
C) OS/390
D) Mac OS

11)

12) ________ allows more data to be stored on a disk.


A) File conversion
C) Data compression

12)

B) Disk recovery
D) Backup

13) The ________ utility translates a file from one format to another, so that it can be used by another
application.
A) antivirus
B) backup
C) spam blockers
D) file conversion

13)

14) Which computer language, developed by IBM in the 1950s, was designed for mathematical, science,
and engineering applications?
A) Basic
B) COBOL
C) Pascal
D) FORTRAN

14)

15) ________ is a powerful Web development language that enables users to create their own markup
tags and to build database queries.
A) XML
B) HTML
C) C++
D) Java

15)

16) Systems software which have freely distributed source code are called:
A) office automation software.
B) open source software.
C) personal productivity software.
D) business information systems.

16)

17) A text- based language with codes or tags used for developing Web pages is called ________.
A) Visual Basic
B) HTML
C) C++
D) SQL

17)

18) A small Java program that runs when a Web pages is accessed is called a(n) ________.
A) applet
B) Javalet
C) cotlet
D) miniprogram

18)

19) A program that translates an entire program (written in a particular programming language) into
machine language is called a(n) ________.
A) integrated
B) detailer
C) compiler
D) compressor

19)

20) Outcome- oriented language, like those used to execute queries, is an example of a
________- generation language.
A) second
B) fourth
C) third
D) fifth

20)

21) Which object- oriented computer language, developed by Sun Microsystems in the early 1990s, is a
popular Internet programming language because it is highly portable from one make of computer
to another?
A) LISP
B) Java
C) HTML
D) C++

21)

22) This multiuser, multitasking operating system is used on a wide variety of computer platforms
such as Sun Microsystems, Hewlett- Packard, and Silicon Graphics.
A) Linux
B) UNIX
C) OS/390
D) OS X

22)

23) ________ application software accomplishes a wide range of tasks from word processing to
graphics to e- mail.
A) Security
B) Customized
C) Office automation
D) System

23)

24) ________ languages provide interactive components to a Web page. These languages let you build
scripts directly into HTML code.
A) Scripting
B) Visual
C) Interactive
D) Assembly

24)

25) The process of grouping pieces of data together is called ________.


A) encapsulation
B) grouping
C) inheritance

D) merging

25)

26) Systems analyst use ________ to automate many routine tasks.


A) JavaScript.
B) CASE.
C) HTML.

D) Java.

26)

27) ________ languages allow programmers to group data and program instructions together into
modules that can be manipulated by the programmer.
A) Artificial intelligence
B) Compiled
C) Second generation
D) Object- oriented

27)

28) Which computer language is one of the main languages used to develop applications in artificial
intelligence?
A) Pascal
B) LISP
C) FORTRAN
D) Java

28)

29) A characteristic of object- oriented programming is ________, which refers to the fact that when one
class of objects is defined, all other objects with the same characteristics are automatically defined
by the same terms.
A) encapsulation
B) object- connectivity
C) ownership
D) inheritance

29)

30) ________ is/are designed to manage computer resources and files.


A) System software
B) Backup software
C) Application
D) Utility programs

30)

31) ________ consists of programs, or sets of instructions, that tell the computer to perform certain
processing functions.
A) Hardware
B) GUIs
C) Firmware
D) Software

31)

32) ________ allows the recovery of damaged or erased information from hard disks or floppy disks.
A) Backup
B) Defragmentation
C) Data compression
D) Data recovery

32)

33) ________ allow(s) new hardware added to your system to function with the operating system.
A) File conversion
B) Device drivers
C) Defragmentation
D) Data compression

33)

34) This operating system is a highly reliable system used on large IBM mainframe computers.
A) OS/390
B) Linux
C) UNIX
D) MS- DOS

34)

35) Applications developed to perform organization- wide operations are called:


A) office automation software.
B) open source software.
C) personal productivity software.
D) business information systems.

35)

36) The advantages of off- the- shelf application software include all of the following EXCEPT:
A) low cost.
B) fast procurement.
C) problem specificity.
D) low risk.

36)

37) Programs for creating Web pages are called ________.


A) XML
B) editors
C) event- driven
D) visual programming

37)

38) This command- based operating system is used on IBM- compatible PCs and was first introduced
in 1981.
A) MS- DOS
B) OS/390
C) UNIX
D) Linux

38)

39) The ________ requires that you type text commands into the computer to perform basic operations.
A) graphic user interface
B) voice- activated interface
C) Internet- activated interface
D) command- based interface

39)

40) ________ converts a fragmented file stored on a hard disk into a contiguously stored file which
leads more rapidly when referenced by the computer.
A) Data compression
B) File conversion
C) Data recovery
D) File defragmentation

40)

41) This operating system, especially popular for use on Web servers, was designed in 1991 by a
Finnish university student and is known for its security, low price, and adaptability.
A) Linux
B) OS X
C) UNIX
D) OS/390

41)

42) Diagramming tools, report generators, analysis tools, repositories, and code generators are all types
of ________.
A) system architecture
B) systems design
C) specifications
D) CASE tools

42)

43) A ________ archives or saves a copy of selected files from the hard disk to a diskette or to tapes.
A) conversion
B) defragmentation
C) device driver
D) backup

43)

44) A program that translates a programming language into machine language one line at a time is
called a(n):
A) compiler.
B) detailer.
C) interpreter.
D) compressor.

44)

45) This operating system was developed in 1988 by IBM for powerful PCs and can run applications
written for OS/2, MS- DOS, Java, or Windows.
A) OS/390
B) Linux
C) MS- DOS
D) Mac OS

45)

46) ________ software lets a user perform a specific task, such as writing a letter, processing payroll,
managing a stock portfolio, etc.
A) System
B) Application
C) Security
D) Custom

46)

47) Operating systems are often written in ________, a very low- level programming language that
allows the computer to operate quickly and efficiently.
A) COBOL
B) C
C) Visual Basic
D) assembly language

47)

48) Natural language, which uses true English sentences, to communicate with the computer is an
example of a ________ - generation language.
A) second
B) fourth
C) fifth
D) third

48)

49) ________ software is the collection of software that controls the basic functions of the computer.
That is, it coordinates the interaction between hardware devices, peripherals, application software,
and users.
A) Systems
B) Command
C) Applications
D) Integration

49)

Answer Key
Testname: UNTITLED1
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)

D
D
A
A
A
A
C
B
D
B
D
C
D
D
A
B
B
A
C
B
B
B
C
A
A
B
D
B
D
D
D
D
B
A
D
C
B
A
D
D
A
D
D
C
A
B
D
C
A
6

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) In the DBMS, the individual database is a(n):
A) collection of related attributes about entities.
B) set of records.
C) text file.
D) set of attributes.

1)

2) Database files in relational model databases exhibit how many dimensions?


A) Three
B) Four
C) One

D) Two

2)

3) Which of the following enables us to fill out a grid or template in order to extract information from
a database?
A) GUI
B) SQL
C) QBE
D) DBA

3)

4) A ________ is the most common language used to interface with databases.


A) standard query language
B) sample query language
C) query interface language
D) structured query language

4)

5) Databases can be billions or trillions of bytes in size. These quantities are called:
A) kilobytes and gigabytes.
B) megabytes and trillabytes.
C) terabytes and megabytes.
D) gigabytes and terabytes.

5)

6) Which of the following are costs or risks associated with database management?
A) Installation costs
B) Conversion costs
C) New, specialized personnel
D) All of the above.

6)

7) A database management package, which is based upon a relational database model, is called a:
A) DBMS
B) RMDB
C) RDBS
D) RDBMS

7)

8) A(n) ________ is a software application which one uses to create, store, organize, and retrieve data
from a single database or multiple databases.
A) database administrator
B) record
C) query by example
D) database management system

8)

9) The process of retrieving data from a database is called:


A) a removal.
B) filtration.
C) a query.

9)

10) A database management system:


A) creates, stores, organizes, and retrieves data from a database.
B) is primarily a report generation tool.
C) is used to develop interactive Web pages.
D) graphically displays relationships among entities.

D) an extraction.

10)

11) The elimination of data redundancy is a major goal and benefit of:
A) entities.
B) queries.
C) normalization.
D) a data dictionary.

11)

12) Which of the following would make a bad primary key?


A) Social security number
B) Student identification number (where numbers are unique)
C) Combination of last name and date of birth
D) Driver's license number

12)

13) Which of the following is the best example of a database?


A) An alphabetically listed address book
B) Articles within a magazine
C) A collection of books on a shelf
D) A set of coins in an envelope

13)

14) Which of the following non- computer items is an example of a database?


A) An alphabetic directory listing
B) An organized file cabinet
C) A card catalog in a library
D) All of the above.

14)

15) Database files in flat file databases exhibit how many dimensions?
A) Two
B) One
C) Three

D) Four

15)

16) Another term for an entity is a:


A) report.
B) table.

D) data.

C) query.

16)

17) An advantage of a database approach to information management is:


A) it is easier to enforce standards.
B) enhanced data quality.
C) it is easier to control and deploy data access.
D) All of the above.

17)

18) The world's largest bookstore, with 2.5 million titles is:
A) Amazon.com.
B) BordersBooks.com.
C) Books.com.
D) Barnes & Noble (bn.com).

18)

19) A diagramming technique for designing databases which shows associations between entities and
where each relationship can be labeled on the diagram is called:
A) an entity relationship diagram.
B) a flow chart.
C) a database model.
D) a structure chart.

19)

20) Which is the most common DBMS model?


A) Relational
B) System

20)

C) Hierarchical

D) Network

21) A(n) ________ is software that is used to retrieve data from a database and the results are
manipulated (aggregated, transformed, and grouped) into a nicely formatted display.
A) entity formatter
B) report generator
C) database designer
D) query

21)

22) A(n) ________ refers to an attribute that appears as a nonprimary key attribute in one entity and as
a primary key attribute in another entity.
A) secondary key
B) merge key
C) foreign key
D) master key

22)

23) To ensure proper security features in a database, the DBA should:


A) coordinate with the CEO.
B) coordinate with users.
C) coordinate with organizational managers.
D) work alone.

23)

24) A(n) ________ is a compilation of data from the database organized and produced in printed
format.
A) form
B) entity
C) report
D) table

24)

25) Database management systems enable organizations to ________ information easily.


A) retrieve
B) analyze
C) store
D) All of the above.

25)

26) A secondary key:


A) can be multiple attributes in a table.
B) identifies one or more records within a table that share a common value.
C) is an attribute not referred to as a primary key.
D) All of the above.

26)

27) Which of the following is NOT an advantage to a database management system?


A) Improved data quality
B) Increased productivity of application development
C) Reduced data consistency
D) Reduced data redundancy

27)

28) A disadvantage of a database approach to information management is:


A) reduced program maintenance.
B) higher expense.
C) minimal data redundancy.
D) improved data accessibility.

28)

29) ________ are standards governing the updating of data, including who has authority to view and
update data, acceptable range of data values, and how the data are to be updated.
A) Business rules
B) ANSI standards
C) Computer programs
D) Protocols

29)

30) Which of the following is a collection of information that describes data types, uses, storage
requirements, and rules that effect data?
A) Data dictionary
B) Data mart
C) Data warehouse
D) Data mine

30)

31) A database key not used as a primary key but used to identify records in a table that share a
common value is called a(n):
A) duplicate key.
B) dual key.
C) tertiary key.
D) secondary key.

31)

32) Databases do one no good if they are not organized. The process of organizing and structuring
databases efficiently is called:
A) database design.
B) data implementation.
C) infrastructure management.
D) systems architecture.

32)

33) One- to - one, one- to- many, and many- to - many are descriptions of "parent- child" database
relationships called:
A) linkages.
B) combinations.
C) associations.
D) constructions.

33)

34) A unique identifier for linking entities together is a:


A) merge link.
B) primary key.

34)

C) link list.

D) master key.

35) Most databases managed under a DBMS consist of several:


A) files.
B) entities.
C) tables.
D) All of the above.

35)

36) Which of the following is a computer language?


A) DBA
B) SQL

36)

C) GUI

D) QBE

37) Knowing the data type is useful because it helps the DBMS know how to:
A) sort data.
B) allocate storage space.
C) complete calculations.
D) All of the above.

37)

38) When considering data in a database entity, each row is a:


A) file.
B) data dictionary.
C) template.
D) record.

38)

39) Many DBMS packages such as Microsoft Access have a simple way of interfacing with the
databases using a concept called:
A) QBE.
B) QCC.
C) QBC.
D) QRC.

39)

40) A popular personal computer DBMS is:


A) Microsoft Access.
C) PageMaker Pro.

40)

B) Netscape Communicator.
D) PowerPoint.

41) A major goal and benefit of using data normalization is:


A) the elimination of data redundancy.
B) normalization eliminates the need for queries.
C) SQL works best with normalization.
D) faster database queries.
42) How many entities can a database have?
A) Many
B) Two

C) One

41)

D) None

43) What is a form?


A) A completed SQL program.
B) The process of shaping and designing a database.
C) A graphical user interface with some blanks (text boxes, list boxes, option buttons, etc.) where
the user can enter information or make choices.
D) A printed listing of results from a database query.

42)

43)

44) ERDs are:


A) used to show associations.
B) drawn with entities as boxes and lines for relationships.
C) useful when designing complex databases.
D) All of the above.

44)

45) ________ is the term used to identify whether a field is numeric, text, a date or time value, etc.
A) Data category
B) Data reference
C) Data type
D) Data value

45)

46) Query by example:


A) generates print- outs of customized database reports.
B) graphically displays relationships among entities.
C) is a language for manipulating the contents of a database.
D) is a technique using a template to select the attributes and criteria for extracting information
from a database.

46)

47) Entities are comprised of rows and columns. Each column is a(n):
A) DBMS.
B) table.
C) attribute.

47)

D) record.

48) Who is responsible for the management and development of the organization's database?
A) DBA
B) DFO
C) CEO
D) CIO

48)

49) Unique identifiers that are a combination of two or more attributes are called:
A) combination primary keys.
B) sequential primary keys
C) primary keys.
D) secondary keys.

49)

50) What technique makes complex databases more efficient and more easily handled by the DBMS?
A) Word processing
B) Entity management
C) Data definition
D) Normalization

50)

51) The database relationship example of each player participating in games and each game having
many players is an example of what type of relationship?
A) Many- to - many
B) One- to - one
C) One- to - many
D) None of the above.

51)

52) By placing a key from one entity in the table of another entity, we are creating inevitable but
necessary:
A) overlapping.
B) database conflicts.
C) incompatibility.
D) redundancy.

52)

53) A(n) ________ is a graphical user interface with some blanks (text boxes) where the user can enter
information or make choices, each of which represents an attribute (or field) within a database
record.
A) form
B) entity
C) QBE
D) GUI

53)

54) A(n) ________ is a map or diagram that represents entities and their relationships.
A) report
B) data model
C) table
D) entity mapper

54)

55) Which organization below uses databases in their business operations?


A) Nordstrom
B) Lands' End
C) Eddie Bauer
D) All of the above.

55)

56) Which of the following is an attribute about a person?


A) Name
B) Salary
C) Social security number
D) All of the above.

56)

57) Forms can be used to ________ data from a database.


A) modify
B) add
C) delete
D) All of the above.

57)

58) All of the following are true about costs or risks associated with database management EXCEPT:
A) increased database complexity.
B) additional employees and expenses.
C) organizational conflicts are reduced.
D) higher up- front costs associated with installation.

58)

59) The database relationship example of a player being on one team, but a team having many players,
is an example of what type of relationship?
A) One- to - many
B) One- to - one
C) Many- to - many
D) None of the above.

59)

60) A(n) ________ is a collection of related data organized in a way to facilitate data searches.
A) DBA
B) SQL
C) database
D) record

60)

61) A database key comprised of two or more attributes is called a(n):


A) duplicate key.
B) combination primary key.
C) combination lock.
D) conjoined key.

61)

62) The person responsible for designating who can look at a database and who is authorized to make
changes is the:
A) security officer.
B) chief information officer.
C) project leader.
D) database administrator.

62)

63) The database relationship example of each team having one home stadium and each home stadium
having one team is an example of what type of relationship?
A) Many- to - many
B) One- to - one
C) One- to - many
D) None of the above.

63)

Answer Key
Testname: UNTITLED1
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

A
A
C
D
D
D
D
D
C
A
C
C
A
D
A
B
D
A
A
A
B
C
C
C
D
D
C
B
A
A
D
A
C
B
D
B
D
D
A
A
A
A
C
D
C
D
C
A
A
D
7

Answer Key
Testname: UNTITLED1
51)
52)
53)
54)
55)
56)
57)
58)
59)
60)
61)
62)
63)

A
D
A
B
D
D
D
C
A
C
B
D
B

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) A ________ is used as a central point of connection between media segments for the purpose of
extending the network to accommodate additional workstations.
A) modem
B) hub
C) transmission media connector
D) bridge

1) b

2) ________ uses 24 active satellites to allow users to triangulate their position anywhere on the
planet.
A) LEO
B) LBS
C) GIS
D) GPS

2) d

3) There are two forms of media used in networks: cable and ________ media.
A) topology
B) wireless
C) coaxial

3) b

D) fiber - optic

4) A ________ performs protocol conversion so that different networks can communicate even though
they "speak" different languages.
A) router
B) gateway
C) hub
D) bridge

4) b

5) Which of the following is/are a type of network?


A) WANs
C) LANs

5) d

B) PANs
D) All of the above.

6) A medium- speed WAN that includes capabilities such as e- mail, EDI, or security, is called a
________ network.
A) personal area
B) local area
C) wide area
D) value- added

6) d

7) The ________ computing model occurs when multiple computers (such as personal computers) are
networked together to share information and services.
A) wide area network
B) distributed
C) local area network
D) centralized

7) b

8) ________ refers to the shape of a network.


A) Network topology
C) Communications mapping

8) a

B) Network morphology
D) Network geography

9) ________ cable contains a solid inner copper conductor, surrounded by plastic insulation and an
outer braided copper or rail shield.
A) Coaxial
B) Fiber- optic
C) Backbone
D) Twisted pair
10) ________ is the protocol of the Internet which allows different interconnected networks to
communicate using the same language.
A) OSI
B) LAN
C) EDI
D) TCP/IP

9) a

10) d

11) A company has a computer to store a large employee database, and another computer used to
process and update individual employee records. These two computers work together to keep the
employee records current. This is an example of ________ computing.
A) collaborative
B) distributed
C) centralized
D) networked

11) a

12) ________ are the rules that govern how a given node or workstation gains access to the network to
send or receive information.
A) Media access controls
B) Protocols
C) Message services
D) Application services

12) a

13) A ________ is any computer that may both request and provide services.
A) operating service
B) peer
C) modem
D) client/server

13) b

14) A ________ is used to terminate cable in order to be plugged into a network interface card or into
other network components.
A) distributor
B) connector
C) jack
D) hub

14) b

15) The network configuration in the shape of a closed loop is called a:


A) ring network.
B) star network.
C) bus network.

15) a

D) mesh network.

16) A ________ is a device that acts as a "buffer" between a LAN and a public carrier's WAN. It ensures
that all signals placed on the public lines from the LAN are appropriately timed and formed for the
public network.
A) bridge
B) hub
C) transmission media connector
D) channel service unit (CSU)

16) d

17) The enabling technology for PANs is called:


A) Viking
B) Bluetooth

17) b

C) Bluewave

D) Bluenet

18) ________ is the process of converting a photograph, a song, or text into digital information, or bits.
A) Digitizing
B) Atomizing
C) Bitmapping
D) Reduction

18) a

19) A ________ is an intelligent device used to connect two or more individual networks by looking at
the network address and passing the signals on to the appropriate network.
A) modem
B) router
C) multiplexer
D) connector

19) b

20) A(n) ________ is both a bridge and a router.


A) multiplexer
B) brouter

20) b

C) integrator

D) hub

21) A(n) ________ is a telephone system that serves a particular location.


A) PBX
B) ISP
C) LAN

D) EFT

22) Wireless LANs are based on the ________ family of standards.


A) 802.11
B) 311.1
C) 486.4

D) 911

23) A ________ consists of three separate components: servers, clients, and peers.
A) network
B) protocol
C) modem

D) control

21) a

22) a

23) a

24) A(n) ________ is used to share a communication line or medium among a number of users because
it is able to transmit several signals over a single channel.
A) merge unit
B) multiplexer
C) integrator
D) gateway

24) b

25) One of the differences between human and computer communication is that human
communication consists of words, whereas computer communications consist of ________, the
fundamental information units of computers.
A) protons
B) protocols
C) bits
D) blips

25) c

26) Devices with a keyboard and monitor, but with no localized computing power, that are connected
to a mainframe are called:
A) terminals.
B) end points.
C) distributed computers.
D) servers.

26) a

27) A ________ is any computer on the network that makes access to files, printing, communications,
and other services available to users of the network.
A) peer
B) topology
C) server
D) client

27) c

28) A(n) ________ is a PC expansion board that plugs into a computer so that it can be connected to a
network.
A) expansion card
B) hard card
C) network interface card
D) TCP/IP card

28) c

29) A ________ is a modulator/demodulator that enables computers to transmit data over telephone
lines and thereby connect your PC with other PCs in a computer network.
A) modem
B) signal switcher
C) hub
D) transmission media

29) a

30) A network in which the computers or devices are either fully or partially connected to each other is
called a:
A) star network.
B) mesh network.
C) ring network.
D) bus network.

30) b

31) The ________ computing model is a synergistic form of distributed computing, in which two or
more networked computers are used to accomplish a common processing task.
A) distributed
B) collaborative
C) centralized
D) networked

31) b

32) Procedures that different computers follow when they transmit and receive data are called
________.
A) controls
B) modems
C) networks
D) protocols

32) d

33) The time it takes for a signal to travel between the satellite and the receiver is called:
A) satellite lag
B) propagation delay
C) latency
D) transmission delay

33) b

34) ________ cable is made of a light- conducting glass or plastic core, surrounded by more glass, called
cladding, and a tough outer sheath.
A) Backbone
B) Fiber- optic
C) Twisted pair
D) Coaxial

34) b

35) High- speed network backbones are generally made of ________ cable.
A) coaxial
B) fiber - optic
C) backbone

35) b

D) twisted pair

36) The network configuration when the network is an open - ended line is called a:
A) star network.
B) bus network.
C) mesh network.
D) ring network.

36) b

37) ________ occurs when fluorescent lights, weather, or electronic signals interfere with the original
signal being sent.
A) EMI
B) Saturation
C) Bandwidth
D) Attenuation

37) a

38) ________ is the carrying capacity of the computer or communications channel.


A) Attenuation
B) Saturation
C) Bandwidth

38) c

D) EMI

39) A ________ network is a computer network that is used to connect to or more LANs.
A) metropolitan area
B) personal area
C) value- added
D) wide area

39) d

40) When considering LANs, WANs, PANs, and PBXs, which ones are always wireless?
A) PBX
B) LANs
C) PANs
D) WANs

40) c

41) Novell NetWare, Microsoft Windows Server, and LANtastic are examples of:
A) operating systems.
B) network operating systems.
C) groupware.
D) databases.

41) b

42) Computer networks require all of the following EXCEPT:


A) transmission medium.
B) modems.
C) senders and receivers that have something to share.
D) protocols.

42) b

43) The trend in business is to use ________ networks in which servers and clients have defined roles.
A) client- server
B) server- centric
C) integrated
D) peer- to- peer

43) b

44) The network configuration when all nodes or workstations are connected to a central hub or
concentrator through which all messages pass is called a:
A) ring network.
B) bus network.
C) star network.
D) mesh network.

44) c

45) A(n) ________ is a network device used to regenerate or replicate a signal as it weakens when
traveling on a network.
A) booster
B) amplifier
C) extender
D) repeater

45) d

46) The term ________ refers to the physical pathways used to carry network information.
A) transmission media
B) wireless
C) protocols
D) networks

46) a

47) As with human communications, computer networks require three things: senders and receivers, a
transmission medium, and rules or ________.
A) networks
B) protocols
C) audio
D) communications

47) b

48) A network that spans a relatively small area, allowing computer users to connect and share
information within a building or limited geographical area is called a ________ network.
A) local area
B) value- added
C) wide area
D) personal area

48) a

49) In ________ networks, any computer or device on the network can provide or request services.
A) peer- to- peer
B) client- server
C) integrated
D) server- centric

49) a

50) A ________ is used to connect two different LANs or two segments of the same LAN by forwarding
network traffic between network segments.
A) transmission media connector
B) modem
C) hub
D) bridge

50) d

51) ________ is the tendency of an electric signal to weaken as it is sent over increasing distance.
A) Dissipation
B) Bandweakening
C) Attenuation
D) Coaxial fade

51) c

52) A wireless local area network (LAN) is an example of which type of wireless media?
A) Modulator- demodulator
B) Microwave
C) High- frequency radio
D) Infrared line of sight

52) c

53) A ________ is any computer on the network that uses services provided by the server.
A) control
B) client
C) topology
D) peer

53) b

54) A ________ is system software that controls the network and enables computers to communicate
with each other.
A) router
B) web service
C) network operating system
D) gateway

54) c

55) ________ is a local area network protocol (developed by the Xerox Corporation in 1976) which uses
random access control to send data.
A) Arpanet
B) WireNet
C) SimNet
D) Ethernet

55) d

56) The most commonly used method of random access control is called ________.
A) token passing
B) carrier sense multiple access / collision detect
C) Transmission Control Protocol / Internet Protocol
D) client/server

56) b

57) A satellite communication is an example of which type of wireless media?


A) High- frequency radio
B) Infrared line of sight
C) Microwave
D) Modulator- demodulator

57) c

58) The Internet is an example of a(n) ________ network, one which spans multiple countries across the
world.
A) value- added
B) centralized
C) global
D) enterprise

58) c

59) ________ cable is made of two or more pairs of insulated copper wires twisted together.
A) Fiber- optic
B) Twisted pair
C) Coaxial
D) Backbone

59) b

60) A TV remote control is an example of which type of wireless media?


A) Microwave
B) High- frequency radio
C) Modulator- demodulator
D) Infrared line of sight

60) d

61) The ________ model is a protocol that represents a group of specific tasks as successive layers that
enable computers to communicate data.
A) TCP/IP
B) LAN
C) EDI
D) OSI

61) d

62) The most commonly used method of distributed access control is called ________.
A) client/server
B) Transmission Control Protocol / Internet Protocol
C) token passing
D) carrier sense multiple access / collision detect

62) c

63) The ________ computing model consists of a large mainframe computer connected to terminals.
A) centralized
B) network
C) distributed
D) decentralized

63) a

64) A cellular phone is an example of which type of wireless media?


A) Modulator- demodulator
B) High- frequency radio
C) Microwave
D) Infrared line of sight

64) b

65) A new standard for PANs, developed by Nokia to achieve lower power consumption, is called:
A) Wi- Light
B) N- PAN
C) Bluetooth
D) Wibree

65) d

66) ________ are agreed- upon formats for transmitting data between connected computers.
A) Protocols
B) Topologies
C) Multiplexers
D) Configurations

66) a

Answer Key
Testname: 4 BRIFING
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

B
D
B
B
D
D
B
A
A
D
A
A
B
B
A
D
B
A
B
B
A
A
A
B
C
A
C
C
A
B
B
D
B
B
B
B
A
C
D
C
B
B
B
C
D
A
B
A
A
D
7

Answer Key
Testname: 4 BRIFING
51)
52)
53)
54)
55)
56)
57)
58)
59)
60)
61)
62)
63)
64)
65)
66)

C
C
B
C
D
B
C
C
B
D
D
C
A
B
D
A

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) A technology capable of providing high- speed stationary wireless access without needing line- of
sight technology is called:
A) WiFi.
B) Internet over satellite.
C) WiMax.
D) broadband wireless.

1) c

2) The only job of ________ is to connect networks and forward data packets from one network to
another.
A) distributors
B) senders
C) backbones
D) routers

2) d

3) The Internet uses special- purpose computers called ________ to interconnect independent
networks.
A) routers
B) senders
C) backbones
D) distributors

3) a

4) Which of the following domain extensions, or top- level domains, belongs to an educational
institution?
A) .uni
B) .org
C) .edu
D) .gov

4) c

5) Web pages are hosted on:


A) ISPs.
C) clients.

5) b

B) web servers.
D) web page providers.

6) A domain name can be associated with ________ IP address(es).


A) one
B) about a dozen
C) unlimited

D) multiple

7) Which of the following is NOT a popular web browsing application?


A) Firefox
B) Internet Explorer
C) Jabber
D) Opera
8) The first WAN that linked universities and research center was called:
A) DARPA
B) WAN
C) NSFNET

6) d

7) c

D) ARPANET

8) d

9) The Internet relies on ________ technology, which enables millions of users to send large and small
chunks of data across the Internet concurrently, based on the concept of turn- taking.
A) mainframe
B) packet- switching
C) e- commerce
D) wireless

9) b

10) ________ is a text- based, menu - driven interface that enables users to access Internet resources as if
they were in folders and menus on their own computer.
A) Archie
B) Veronica
C) Gopher
D) Usenet

10) c

11) Which of the following is NOT a popular voice communication application?


A) MSN Messenger
B) GTalk
C) Skype
D) Bittorrent

11) d

12) DARPA started researching ways to interconnect networks of various kinds back in the late sixties,
producing ________.
A) NSFNET
B) WAN
C) ARPANET
D) DARPA

12) c

13) When considering Internet connections there are multiple options. One of them, ISDN, stands for:
A) Information Systems Dial- up Network.
B) Integrated Services Digital Network.
C) International Systems Data Network.
D) Internet Signal Direct Network.

13) b

14) An ISP connects to the Internet at an exchange point for Internet traffic, much like a railway station.
These exchange points are called:
A) intersections.
B) Network Access Points (NAPs).
C) interchange points.
D) onramps.

14) b

15) ________ started researching ways to interconnect networks of various kinds back in the sixties.
A) NSF
B) DARPA
C) WAN
D) ARPANET

15) b

16) Satellites that are placed in a fixed position above the earth's surface are known as:
A) fixed satellites.
B) fixed wireless.
C) geostationary.
D) Asymmetric Technology Modem.

16) c

17) POTS is also known as:


A) public online transfer system.
B) personal online telecommunications service.
C) public switched telephone network.
D) phone operation telecommunication system.

17) c

18) ________ defines how a data packet must be formed and where a router will forward each packet.
A) IP
B) NSF
C) TCP
D) UDP

18) a

19) Routers:
A) forward data packets from one network to another.
B) are used to interconnect independent networks.
C) have a central processor, memory, and network interfaces.
D) All of the above.

19) d

20) DSL stands for:


A) Direct Signal Licenses.
C) Data Source Libraries.

20) d

B) Dynamic Signal Links.


D) Digital Subscriber Lines.

21) A ________ is a dedicated digital transmission line that can carry 1.544 Mbps of information.
A) POTS system
B) satellite link- up
C) T1 line
D) wireless line

21) c

22) The system that uses existing power distribution wires for data transmission is called:
A) power line communication.
B) WiMax.
C) Internet over power lines.
D) power Internet.

22) a

23) A ________ manages the bulk of network traffic and typically uses a higher - speed connection than
the individual LAN segments.
A) distributor network
B) interconnection network
C) router
D) backbone network

23) d

24) ________ lines are transmission lines that can carry 45 Mbps of information.
A) T1
B) ATM
C) T3

24) c

D) IXC

25) The ________ acts as a central repository for Internet- related information.
A) IANA
B) Internet Registry
C) IAB
D) IETF

25) b

26) When considering Internet connections there are multiple options. One of them, IoS, stands for:
A) Information of Substance.
B) Information- online Service.
C) Internet over Satellite.
D) Internet on Site.

26) c

27) How does one typically connect to the Internet from home?
A) Through the ICANN.
B) Through the Domain Name System (DNS).
C) Through an InterNIC.
D) Through an Internet Service Provider (ISP).

27) d

28) What root database is used to associate Internet host names with their IP addresses?
A) InterNIC
B) IANA
C) TCP
D) DNS

28) d

29) An ATM, used in the context technology for connecting to the Internet, stands for:
A) Automated Telecommunications Mode.
B) Asymmetric Technology Modem.
C) Automated Teller Machine.
D) Asynchronous Transfer Mode.

29) d

30) ________ define the procedures that different computers follow when they transmit and receive
data.
A) Terminals
B) Protocols
C) Transmission media
D) Networks

30) b

31) Companies that sell long- distance services are called:


A) IXC
B) ATM
C) T3

31) a

32) NAPs are a key component of the:


A) Internet backbone.
C) DSL service.

D) T1

32) a

B) ISPs' infrastructure.
D) wide - area network.

33) A data packet that conforms to IP specifications is called a(n) ________.


A) transmission media.
B) IP datagram.
C) destination address.
D) information sequence.
34) Which of the following is NOT a popular instant messaging application?
A) Babbler
B) Jabber
C) AIM

33) b

D) GTalk

34) a

35) ________ are the fundamental building blocks of the Internet because they connect thousands of
LANs and WANs.
A) Packets
B) Routers
C) IP datagrams
D) Backbones

35) b

36) Which of the following is NOT a popular file sharing application?


A) Google
B) FreeNet
C) Bittorrent

36) d

D) WSFTP

37) Computers working as servers on the Internet are known as Internet ________.
A) hosts
B) servers
C) sites
D) routers

37) a

38) The protocol of the Internet is:


A) NSF.
B) UDP.

38) c

C) TCP/IP.

D) IP.

39) User requests for pages stored on Web servers are made with the ________ protocol.
A) HTTP
B) Internet2
C) gigaPoP
D) HTML

39) a

40) Every computer and router connected to the Internet has a ________ address.
A) media
B) protocol
C) standard

40) d

D) unique

41) In rural areas where other high- speed connectivity options are not available, home users often
choose ________, which requires line of sight between the sender and receiver.
A) cable modem
B) mobile wireless
C) fiber to the home
D) broadband wireless

41) d

42) A(n) ________ is a software application that can be used to locate and display web pages.
A) Gopher
B) Firefox
C) web browser
D) Internet Explorer

42) c

43) Packet switching uses the concept of:


A) turn taking
C) first in- first out

43) a

B) last in- first out


D) first come- first served

44) In 1986, the National Science Foundation initiated the development of ________, which became a
major component of the Internet.
A) DARPA
B) WAN
C) NSFNET
D) ARPANET

44) c

45) A(n) ________ document contains links to other documents that contain related information.
A) hypertext
B) hyperlink
C) referenced
D) cross - linked

45) a

46) Which of the following is NOT a popular search engine?


A) Opera
B) Google
C) MSN

46) a

D) Dogpile

47) ________ lines are transmission lines that can carry up to 2.2 Gbps of information.
A) T1
B) T3
C) IXC
D) ATM

47) d

48) Fiber to the home (FTTH) is also known as:


A) Fiber to the premises (FTTP)
C) Fiber optic connectivity (FOC)

48) a

B) Cable Internet
D) Broadband cable

49) A(n) ________ is a Web address containing a domain name, which identifies a particular Web page.
A) IP datagram
B) Uniform Resource Locator (URL)
C) data packet
D) HTTP

49) b

50) The technology that enables millions of users to send large and small chunks of data across the
Internet concurrently is ________.
A) internetworking.
B) sliding doors.
C) packet switching.
D) local area networks.

50) c

51) When considering Internet connections there are multiple options. One of them, POTS, stands for:
A) plain old telephone service.
B) personal online telecommunications service.
C) public online transfer system.
D) phone operation telecommunication system.

51) a

52) Which of the following domain extensions, or top- level domains, belongs to a commercial business
(whether technical or nontechnical)?
A) .org
B) .com
C) .mil
D) .net

52) b

53) The structure of the Internet is:


A) flat.
B) relational.

53) c

C) hierarchical.

D) convoluted.

54) Which of the following is NOT a popular E - mail application?


A) Outlook Express
B) Apple Mail
C) GTalk
D) Mozilla Thunderbird

54) c

55) Why are we transitioning to Ipv6?


A) to take the Internet worldwide.
B) to comply with new government regulations.
C) to avoid confusion when InterNIC morphed into ICANN.
D) the number of unassigned Internet addresses is running out.

55) d

56) Cable modems provide Internet service:


A) wirelessly.
C) over one's phone lines.

56) b

B) through cable TV lines.


D) with a fiber- optic cable.

57) In this Web address, www.google.com, what is the domain name?


A) google.com
B) com
C) www

D) index

57) a

58) Domain names have associated numbers such as 1.160.10.240 which enable networks to route
messages to the proper destination. These numbers are called:
A) Uniform Resource Locators.
B) IP datagrams.
C) IP addresses.
D) domain numbers.

58) c

59) The unique address assigned to every computer and router connected to the Internet is called:
A) TCP address.
B) destination address.
C) IP address.
D) IP datagram.

59) c

Answer Key
Testname: 5 BRIFING
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

C
D
A
C
B
D
C
D
B
C
D
C
B
B
B
C
C
A
D
D
C
A
D
C
B
C
D
D
D
B
A
A
B
A
B
D
A
C
A
D
D
C
A
C
A
A
D
A
B
C
6

Answer Key
Testname: 5 BRIFING
51)
52)
53)
54)
55)
56)
57)
58)
59)

A
B
C
C
D
B
A
C
C

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) Enterprise portals come in two basic forms, the distribution portal and the:
A) profitability portal.
B) production portal.
C) procurement channel.
D) procurement portal.
2) The telecommunications networks that enable EDI are termed:
A) CANs.
B) VANs.
C) LANs.

1) d

D) WANs.

2) b

3) Web- based B2B systems range from simple ________ applications to complex trading exchanges
where multiple buyers and sellers can congregate to conduct business online.
A) intranet
B) Web ring
C) extranet
D) Internet

3) c

4) eBay's typical transaction is an example of a Web site that employs the ________ type of EC.
A) B2E
B) B2B
C) B2C
D) C2C

4) d

5) The book relates a three- stage model of EC. Which of the following is not one of the stages?
A) E- initiation
B) E- information
C) E- transaction
D) E- integration

5) a

6) An intranet consists of an internal, ________ network using Web technologies to facilitate the
secured transmission of proprietary information.
A) government
B) private
C) corporate
D) public

6) b

7) The pricing scheme used by the company Priceline.com that allows customers to name their own
price is a(n) ________ system.
A) forward pricing
B) reverse pricing
C) immediate pricing
D) menu- driven pricing

7) b

8) Intranets and extranets provide many benefits to organizations, including:


A) low- cost deployment.
B) positive return on investment.
C) information timeliness and accuracy.
D) All of the above.

8) d

9) Click- only companies may experience challenges in realizing:


A) production.
B) reverse pricing.
C) economies of scale.
D) an IPO.

9) c

10) There are several types of EC. Transactions between businesses and consumers (B2C) are known as:
A) business- to- carrier.
B) business- to- customer.
C) business- to- controller.
D) business- to- consumer.

10) d

11) A(n) ________ is a vehicle for communicating proprietary information with authorized users
outside organizational boundaries.
A) Web ring
B) intranet
C) Internet
D) extranet

11) d

12) B2C focuses on retail transactions between a company and:


A) wholesalers.
B) end consumers.
C) retailers.
D) dealers.

12) b

13) A virtual company is another term for those companies that adopt a ________ strategy.
A) business- to- business
B) click- only
C) brick- and- mortar
D) click- and- mortar

13) b

14) By providing ways for customers and firms to conduct business online without assistance from
humans, the Internet and Web have significantly reduced ________ costs.
A) transaction
B) marketing
C) human resource
D) production

14) a

15) The Internet provides a set of interconnected ________ for individuals and businesses to complete
transactions electronically.
A) networks
B) communication technologies
C) platforms
D) Web rings

15) a

16) EDI allows companies to have up- to - date information at their command, which enables these
companies to make more accurate:
A) forecasts.
B) purchases.
C) marketing strategies.
D) None of the above.

16) a

17) Click- and- mortar businesses continue to operate their physical locations, but they have also added
a(n) ________ component to their business strategy.
A) EC
B) marketing
C) security
D) strategic

17) a

18) E- information is more flexible than traditional promotional methods because this type of
information:
A) may be modified and posted quickly.
B) users obtain outdated information.
C) labor expenses are increased.
D) is more difficult to update.

18) a

19) Organizations can use ________ to facilitate team efforts.


A) videoconferencing
B) IM Chat
C) their intranet
D) all of the above

19) d

20) An extranet allows two or more firms to use the ________ to conduct business together.
A) Internet
B) Web
C) intranet
D) telephone

20) a

21) The goal of the e- information stage is to achieve:


A) global dissemination of non- customized information.
B) customer transaction processing.
C) collaboration.
D) global dissemination of customized information.

21) a

22) In the term m- commerce, the "m" refers to:


A) miscellaneous.
B) multi - type.

22) c

C) mobile.

D) multimedia.

23) ________ actively pushes information at the consumer whether it is wanted or not.
A) Punch marketing
B) Pull marketing
C) Distribution marketing
D) Push marketing

23) d

24) The ability for computing to spread unobtrusively throughout its physical environment is called
________.
A) ubiquity.
B) embedding.
C) localization.
D) personalization.

24) a

25) B2B portals can be defined as ________ through which a business partner accesses secured,
proprietary information from an organization.
A) access points
B) intranets
C) back doors
D) tunnels

25) a

26) Which network is a private network restricted to authorized employees?


A) E- Net
B) Internet
C) Intranet

26) c

D) Extranet

27) Web technologies allow integration of information via Web sites, which can be linked to corporate
________ to provide real- time access to information.
A) databases
B) executives
C) warehouses
D) headquarters

27) a

28) A ________ model describes how the firm will generate profits and produce a superior return on
invested capital.
A) virtual
B) revenue
C) profit
D) business

28) b

29) Interactive communication via the Web enables firms to build ________ by providing immediate
communication and feedback to and from customers.
A) profit
B) firm image
C) customer loyalty
D) databases

29) c

30) Web- based technologies are ________, which means that disparate computing systems can
communicate with each other, provided that standard Web protocols have been implemented.
A) multi - platform
B) uni- platform
C) cross - platform
D) non- platform

30) c

31) A VAN is a ________ that provides a direct and secure vehicle for data transmission between a
company and its business partners.
A) vocal announcement network
B) voice analog network
C) value- added network
D) vehicle analog network

31) c

32) The concept of the ________ refers to a focus on niche markets, rather than purely on mainstream
products:
A) the long tail
B) m - commerce
C) e- tailers
D) dissemination

32) a

33) Employees access information on the intranet by means of a(n):


A) e- mail.
B) printer.
C) file.

33) d

34) The Web has provided interactive (two- way) communication, which is called:
A) interaction.
B) communication.
C) teamwork.
D) collaboration.

D) browser.

34) d

35) Firms that operate in both the physical and virtual (online) arenas are termed ________.
A) click- and- mortar
B) pure play
C) brick- and- mortar
D) click only

35) a

36) Click- only companies are also referred to as ________ companies.


A) click- thru
B) pure click
C) click- click

36) d

D) pure play

37) The Internet and the World Wide Web are extremely well suited for:
A) consumer service and support.
B) conducting business electronically.
C) marketing products.
D) All of the above.

37) d

38) Click- only companies are able to effectively compete with other types of companies on product or
service:
A) quality.
B) delivery.
C) price.
D) volume.

38) c

39) Web technologies help firms realize their goal of mass:


A) employment.
B) customization.
C) profitability.

39) b

D) production.

40) Which system allow customers to specify the product that they are looking for and set the price that
they are willing to pay for the product?
A) reverse pricing
B) watermarked pricing
C) forward pricing
D) menu- driven pricing

40) a

41) E- integration, the second stage of EC, is focused on accommodating requests for:
A) general information.
B) customized information.
C) legal information.
D) products.

41) b

42) Electronic commerce goes beyond buying and selling. EC can involve the events leading to a
purchase, as well as ________ after the sale.
A) communication
B) management
C) marketing
D) customer service

42) d

43) The e- information stage of EC involves the promotion of sales and marketing information via a(n):
A) e- mail.
B) voicemail.
C) e- brochure.
D) brochure.

43) c

44) Click- only companies do not have:


A) warehouses.
B) storefronts.

44) b

C) employees.

D) supply chains.

45) While EDI has been used for four decades to conduct B2B transactions, the trend today in business
is to use:
A) facsimiles.
B) facsimiles and the Web.
C) facsimiles and telephones.
D) the Internet and the Web.

45) d

46) ________ are operated by third- party vendors, meaning that they are built and maintained by a
particular company.
A) Electronic exchanges
B) Resource marketplaces
C) Multimedia marketplaces
D) Trading exchanges

46) d

47) The exchange of ________ in EDI follows a set of formatting standards, which specify how
information is transmitted electronically.
A) voice mail
B) e- mail
C) data
D) knowledge

47) c

48) Which network is an unrestricted public network?


A) E- Net
B) Internet

48) b

C) Extranet

D) Intranet

49) Use of the Internet and the Web for internal communications is accomplished by means of a(n):
A) LAN.
B) intranet.
C) extranet.
D) tunnel.

49) b

50) Electronic Data Interchange (EDI) is the forerunner of modern ________ EC, as it was used to
facilitate transactions between large corporations and their suppliers.
A) B2B
B) click- only
C) B2C
D) C2C

50) a

51) According to the book, EC was used as far back as the year ________ during the Berlin Airlift.
A) 1945
B) 1943
C) 1948
D) 1941

51) c

52) Another challenge for the click- and- mortar company is the requirement for Web- based computing
skills, which requires the company to make substantial investments in resources such as ________
and computers.
A) hardware
B) networks
C) software
D) people

52) d

53) EDI refers to the ________ transmission of business information between organizations via
telecommunications networks.
A) tunneling
B) digital
C) managerial
D) paper

53) b

54) The combination of the Internet and Web technologies has given rise to a global platform where
firms across the world can compete for customers and gain access to new:
A) markets.
B) monies.
C) employees.
D) competitors.

54) a

55) While EDI was generally limited to large corporations, the Internet and the Web have provided an
economical medium over which information can be transmitted, thus enabling small to midsize
enterprises to participate in ________ markets.
A) C2C
B) traditional
C) B2C
D) B2B

55) d

56) Organizations often install disparate applications on different computing platforms, which made it
difficult for users to consolidate the needed information. Today, these consolidation problems can
be solved by adding a single product to the ________.
A) web page.
B) firewall.
C) SiteMinder.
D) intranet Web server.

56) d

57) EDI began in the:


A) 1940s.

57) b

B) 1960s.

C) 1970s.

D) 1950s.

58) This type of technology allows for the tracking of illegal copies of music to be tracked to the
original purchaser.
A) DRM
B) Counterfeit technology
C) Tracker technology
D) Reverse download technology

58) a

59) ________ automate the business processes involved in selling or distributing products from a single
supplier to multiple buyers.
A) Resource portals
B) Procurement portals
C) Distribution portals
D) Enterprise portals

59) c

60) ________ are designed to automate the business processes that occur before, during, and after sales
have been transacted between a supplier and multiple customers.
A) Enterprise portals
B) Distribution portals
C) Procurement portals
D) Resource portals

60) b

61) Another term for an electronic marketplace is:


A) electronic exchange.
C) multimedia marketplace.

61) d

B) trading floor.
D) trading exchange.

62) ________ are designed to automate the business processes that occur before, during and after sales
have been transacted between a buyer and multiple suppliers.
A) Enterprise portals
B) Procurement portals
C) Resource portals
D) Distribution portals

62) b

63) Which network is a private network used for communications with business partners?
A) Extranet
B) Internet
C) Intranet
D) E- Net

63) a

64) One particular limitation associated with EDI is its:


A) monetary expense.
C) lack of need for skilled employees.

64) a

B) lack of utility across many businesses.


D) All of the above.

65) The Internet and the World Wide Web (Web) have fueled a revolution in the manner in which
products and services are sold. In this respect, their far- reaching effects have led to the creation of a
nearly limitless:
A) virtual auction house.
B) electronic social environment.
C) electronic marketplace.
D) virtual work environment.

65) c

66) B2B is a type of EC that refers to transactions that occur as:


A) buyer- to - business.
B) business- to- consumer.
C) business- to- business.
D) business- to- buyer.

66) c

67) In order to facilitate e- integration, Web sites must be integrated with organizational ________ in
order to extract and display the appropriate information.
A) databases
B) sales offices
C) IS team
D) headquarters

67) a

68) Electronic commerce (EC) is defined as the online exchange of ________ between firms, and also
between firms and their customers.
A) goods
B) money
C) services
D) All of the above.

68) d

69) Companies that choose to operate solely in the traditional physical markets are described as:
A) pure play.
B) business- and- mortar.
C) brick- and- mortar.
D) brick- and- click.

69) c

70) ________ is the phenomenon of cutting out the middle vendor ("middleman") and reaching
customers in a more direct and efficient manner.
A) Reverse pricing
B) Watermarking
C) Disintermediation
D) Tunneling

70) c

71) The ________ phase adds the ability for customers to enter orders and payments online.
A) E- bay
B) E- integration
C) E- information
D) E- transaction

71) d

72) B2E types of EC are referred to as:


A) business- to- everyone.
C) business- to- employee.

72) c

B) buyer- to - employee.
D) business- to- environment.

73) The chapter's opening case relates that eBay.com business model. eBay's profit possibly foretells:
A) a stabilizing of EDI.
B) that much more time is needed for electronic commerce to become mainstream.
C) a stabilizing of Internet- based electronic commerce.
D) None of the above.

73) c

74) One of the significant intranet applications used by organizations to leverage their EC investment
is:
A) application integration.
B) training.
C) real- time access to information.
D) All of the above

74) d

75) The factor of ________ is not a limitation as it is in traditional stores.


A) culture
B) employees
C) money

75) d

D) time

76) While an intranet looks and acts like a publicly accessible Web site, there are ________ that secure
proprietary information from the public.
A) telecommunication walls
B) firewalls
C) intranet walls
D) boundaries

76) b

77) It is the worldwide connectivity of the Internet that provides a relatively ________ medium for
marketing products over long distances.
A) economical
B) expensive
C) difficult
D) None of the above.

77) a

78) The major portion of B2C focuses on electronic retailing, which is also called:
A) retailing.
B) click- tailing.
C) e- selling.

78) d

D) e- tailing.

Answer Key
Testname: 5 CHAPTER
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

D
B
C
D
A
B
B
D
C
D
D
B
B
A
A
A
A
A
D
A
A
C
D
A
A
C
A
B
C
C
C
A
D
D
A
D
D
C
B
A
B
D
C
B
D
D
C
B
B
A
8

Answer Key
Testname: 5 CHAPTER
51)
52)
53)
54)
55)
56)
57)
58)
59)
60)
61)
62)
63)
64)
65)
66)
67)
68)
69)
70)
71)
72)
73)
74)
75)
76)
77)
78)

C
D
B
A
D
D
B
A
C
B
D
B
A
A
C
C
A
D
C
C
D
C
C
D
D
B
A
D

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) To execute denial of service attacks, intruders often use ________ computers.
A) android
B) monster
C) robot

D) zombie

1) d

2) Assuring the recipient that the received message has not been altered in any way from the original
that was sent is called:
A) Authentication
B) Privacy/confidentiality
C) Nonrepudiation
D) Integrity

2) d

3) Which of the following is NOT a way to react to identified risks?


A) Risk transference.
B) Risk acceptance.
C) Risk embracement.
D) Risk reduction.

3) c

4) ________ is electronic junk mail or junk newsgroup postings, usually for the purpose of advertising
some product and/or service.
A) Spam
B) Spyware
C) Adware
D) Spim

4) a

5) ________ attacks occur when electronic intruders deliberately attempt to prevent legitimate users
from using that service.
A) Information modification
B) Denial of service
C) Manipulation
D) Brute- force

5) b

6) ________ are the least used security technology.


A) Passwords
B) Encrypted files

6) c

C) Biometrics

D) Firewalls

7) Which of the following is NOT a threat to information systems security?


A) Links to outside business contacts.
B) Employees and consultants.
C) Accidents and natural disasters.
D) All of the above are threats to information systems security.

7) d

8) ________ is any software that covertly gathers information about a user though an Internet
connection without the user's knowledge.
A) Spyware
B) Worms
C) Viruses
D) Adware

8) a

9) A(n) ________ is an ongoing planning process involving risk assessment, risk reduction planning,
and plan implementation as well as ongoing monitoring.
A) risk assessment plan
B) information systems security plan
C) infrastructure management
D) disaster recovery plan

9) b

10) A(n) ________ system is an encryption system where both the sender and recipient use the same
key for encoding (scrambling) and decoding the message.
A) symmetric key
B) asymmetric key
C) certificate authority
D) public key

10) a

11) ________ technology is a data encryption technique that uses two keys a private key and a public
key to encrypt and decode messages.
A) Certificate authority
B) Public key
C) Asymmetric key
D) Symmetric key

11) b

12) ________ is the process of encoding messages before they enter the network or airwaves, then
decoding them at the receiving end of the transfer, so that only the intended recipients can read or
hear them.
A) Encryption
B) Authentication
C) Authorization
D) Encapsulation

12) a

13) ________ is the process of confirming the identity of a user who is attempting to access a system or
Web site.
A) Authentication
B) Privacy/confidentiality
C) Nonrepudiation
D) Integrity

13) a

14) A ________ is a network connection that is constructed dynamically within an existing network
often called a secure tunnel in order to securely connect remote users or nodes to an
organization's network.
A) virtually protected network
B) virtual private network
C) verified protected network
D) very protected network

14) b

15) ________ and antivirus software are the most widely used security technologies.
A) Encrypted files
B) Passwords
C) Biometrics
D) Firewalls

15) d

16) A firewall ________ is the manner in which a firewall is implemented such as hardware only,
software only, or a combination of hardware and software.
A) architecture
B) topology
C) topography
D) layout

16) a

17) A(n) ________ is a message passed to a Web browser on a user's computer by a Web server, that is
then stored in a text file by the browser; that message is sent back to the server each time the user's
browser requests a page from that server.
A) identifier
B) text file
C) message
D) cookie

17) d

18) A(n) ________ is a firewall that serves as, or creates the appearance of, an alternative server that
intercepts all messages entering and leaving the network, effectively hiding the true network
addresses.
A) Packet filtering
B) Application level control
C) Circuit- level control
D) Proxy server

18) d

19) ________ is a type of security that grants or denies access to a resource (e.g., facility, computer
systems) through the analysis of fingerprints, retinal patterns in the eye, or other bodily
characteristics.
A) Biometrics
B) Bioinformatics
C) Bio- authentication
D) Bio- identification

19) a

20) Human- based safeguards include:


A) federal and state laws.
C) effective management.

20) d

B) ethical behavior.
D) All of the above.

21) ________ is the prevention of unauthorized access to a private network by a firewall that detects
when a certain type of connection or circuit has been made between specified users or systems on
either side of the firewall.
A) Packet filtering
B) Application level control
C) Circuit- level control
D) Proxy server

21) c

22) ________ consist of destructive code that can erase a hard drive, seize control of a computer, or
otherwise do damage.
A) Worms
B) Zombies
C) Spyware
D) Viruses

22) d

23) An information systems security audit should include all EXCEPT:


A) hardware and software.
B) any business processes that involve hardware, software, data, and networks.
C) data and networks.
D) It should include all of the above.

23) d

24) Encryption software allows users to ensure:


A) nonrepudiation.
C) privacy/confidentiality.

24) d

B) authentication.
D) All of the above.

25) One critical components of a good information systems audit is a thorough ________ analysis.
A) threat
B) hazard
C) risk
D) cost- benefit

25) c

26) According to the CSI/FBI Cyber Crime Survey, ________ conduct routine and ongoing security
audits.
A) 25 percent or less
B) 75 percent
C) 90 percent or more
D) 50 percent

26) c

27) ________ is a computer attack in which an attacker accesses a computer network, intercepts data,
uses network services, and/or sends attack instructions without entering the office or organization
that owns the network.
A) Spoofing
B) Sneaking
C) Shoulder surfing
D) Drive- by hacking

27) d

28) ________ is a technology intended to generate unbreakable codes.


A) Pretty good privacy
B) RSA
C) Clipper chip
D) Secure sockets layer

28) c

29) ________ is a computer system security policy in which someone else absorbs the risk, as with
insurance.
A) Risk acceptance
B) Risk embracement
C) Risk transference
D) Risk reduction

29) c

30) Some spam consists of ________, asking you to donate money to nonexistent causes or warning you
of viruses and other Internet dangers that do not exist.
A) hoaxes
B) pranks
C) jokes
D) tricks

30) a

31) Firewalls can be implemented in:


A) hardware.
B) software.

31) d

C) data.

D) both A and B

32) Common responses to a security breach include all of the following EXCEPT:
A) tracing the attacker.
B) restoring lost data using backups.
C) implementing a combination of additional safeguards.
D) performing a new risk audit.

32) a

33) ________ is software used to keep track of computer activity so that auditors can spot suspicious
activity and take action if necessary.
A) Computer monitoring software
B) Internet security software
C) Security test software
D) Audit control software

33) d

34) Policies and procedures related to computer security include the following EXCEPT:
A) security policy.
B) information policy.
C) prevention policy.
D) backup policy.

34) d

35) Unauthorized access can be achieved by:


A) stealing storage media.
B) opening files on a computer that has not been set up to limit access.
C) physically stealing computers.
D) all of the above.

35) d

36) Some spam e- mail includes ________, which are attempts to trick financial account and credit card
holders into giving away their authorization information.
A) luring
B) tricking
C) phishing
D) freaking

36) c

37) Physical access is usually limited by making it dependent on:


A) something you are.
B) something you have.
C) something you know.
D) all of the above.

37) d

38) ________ is hardware or software designed to keep unauthorized users out of network systems.
A) A firewall
B) A network filter
C) A wall
D) Network protection software

38) a

39) A virtual private network uses ________ to encapsulate, encrypt, and transmit data over the
Internet infrastructure, enabling business partners to exchange information in a secured, private
manner between organizational networks.
A) enclosing
B) encryption
C) tunneling
D) encapsulation

39) c

40) ________, developed by Netscape, is a popular public- key encryption method used on the Internet.
A) Clipper chip
B) RSA
C) Pretty good privacy
D) Secure sockets layer

40) d

41) ________ is a type of software for securing information systems by only allowing specific users
access to specific computers, applications, or data.
A) Computer security software
B) Application restriction software
C) Access control software
D) Data protection software

41) c

42) A(n) ________ is a trusted middleman between computers that verifies that a Web sites is a trusted
site and is used when implementing public - key encryption on a large scale.
A) certificate authority
B) certificate provider
C) public key generator
D) verification service

42) a

43) ________ take advantage of security holes in operating systems and other software to replicate
endlessly across the Internet, thus causing servers to crash, denying service to Internet users.
A) Worms
B) Spyware
C) Zombies
D) Viruses

43) a

44) Other technological safeguards to protect against security breaches include all EXCEPT:
A) closed- circuit television..
B) backups.
C) uninterruptible power supply.
D) All of the above can help to protect against security breaches.

44) d

45) ________ is the prevention of unauthorized access to a computer network by a firewall at the data
packet level; data packets are accepted or rejected based on predefined rules.
A) Packet filtering
B) Application level control
C) Circuit- level control
D) Proxy server

45) a

46) The record showing who has used a computer system and how it was used is called ________.
A) electronic footprints
B) navigational trail
C) audit trail
D) breadcrumbs

46) c

47) One common way to gain access to a password- protected system is to use a ________ approach.
A) back- door
B) "sneak peek"
C) social engineering
D) brute- force

47) d

48) The science of encryption is called ________.


A) cryptology
B) cryptography

48) b

C) cryptics

D) cryptonics

49) ________ is the process of hiding computers' true network addresses by replacing the computers' IP
addresses with a firewall's address; thus, potential attackers only "see" the network address of the
firewall.
A) Packet filtering
B) Application level control
C) Circuit- level control
D) Network Address Translation

49) d

50) ________ is the prevention of unauthorized access to selected applications by some form of
security.
A) Packet filtering
B) Application level control
C) Circuit- level control
D) Proxy server

50) b

51) An information systems security plan involves:


A) plan implementation and ongoing monitoring.
B) planning ways to reduce risks.
C) assessing risks.
D) All of the above.

51) d

52) A mechanism using a digital signature to prove that a message did, in fact, originate from the
claimed sender is called:
A) Authentication
B) Privacy/confidentiality
C) Nonrepudiation
D) Integrity

52) c

53) According to the CSI/FBI Cyber Crime Survey, ________ of the organizations utilize
cyberinsurance.
A) 50 percent
B) 25 percent or less
C) 75 percent
D) 90 percent or more

53) b

54) ________, developed by Phil Zimmerman, is the global favorite for encrypting messages.
A) RSA
B) Secure sockets layer
C) Clipper chip
D) Pretty good privacy

54) d

55) Ensuring that no one can read the message except the intended recipient is called:
A) Authentication
B) Privacy/confidentiality
C) Nonrepudiation
D) Integrity

55) b

56) Risk analysis is a process in which you:


A) determine the likelihood of the assets being compromised.
B) assess the value of the assets being protected.
C) compare the probable costs of the assets being compromised with the estimated costs of
whatever protection you might have to take.
D) All of the above.

56) d

57) ________ is a computer system security policy in which no countermeasures are adopted, and any
damages that occur are simply absorbed.
A) Risk embracement
B) Risk reduction
C) Risk transference
D) Risk acceptance

57) d

58) Spam over ________ is referred to as spim.


A) blogs
C) instant messaging

58) c

B) skype
D) video telephony

59) ________ attacks occur when someone accesses electronic information and then changes the
information in some way.
A) Information modification
B) Brute- force
C) Denial of service
D) Manipulation

59) a

60) Any good approach to securing information systems begins first with a thorough ________ of all
aspects of those systems.
A) audit
B) cleaning
C) disinfection
D) quarantining

60) a

61) According to the CSI/FBI Cyber Crime Survey, ________ of the organizations report computer
intrusions to law enforcement.
A) 75 percent
B) 25 percent or less
C) 90 percent or more
D) 50 percent

61) b

62) ________ collects information about a person in order to customize Web browser banner
advertisements.
A) Adware
B) Viruses
C) Worms
D) Spyware

62) a

63) A(n) ________ is a distorted image displaying a combination of letters and/or numbers a user has to
input in a form.
A) passcode
B) CAPTCHA
C) GOTCHA
D) Turing test

63) b

64) ________ is the process of taking active countermeasures to protect information systems.
A) Risk embracement
B) Risk transference
C) Risk reduction
D) Risk acceptance

64) c

Answer Key
Testname: 6 CHAPTER
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

D
D
C
A
B
C
D
A
B
A
B
A
A
B
D
A
D
D
A
D
C
D
D
D
C
C
D
C
C
A
D
A
D
D
D
C
D
A
C
D
C
A
A
D
A
C
D
B
D
B
8

Answer Key
Testname: 6 CHAPTER
51)
52)
53)
54)
55)
56)
57)
58)
59)
60)
61)
62)
63)
64)

D
C
B
D
B
D
D
C
A
A
B
A
B
C

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) Functional area information systems are ________ level information systems that are designed to
support a discrete area of an organization.
A) executive
B) operational
C) managerial
D) cross - organizational

1) d

2) The inputs to an office automation system include:


A) messages, reports and schedules.
C) requests for help.

2) d

B) reports and trends.


D) documents, schedules and data.

3) Some typical uses for an electronic meeting system do NOT include:


A) emergency management.
B) marketing focus groups.
C) strategic planning sessions.
D) quality improvement.

3) a

4) A characteristic of the omni- directional camera is that:


A) it enables multiple people in different locations to communicate.
B) it can detect sound so that it will focus on the person who is talking.
C) it can detect motion and can find and focus on moving people's faces.
D) All of the above.

4) d

5) An example of a(n) ________ information system is an inventory management system for a shoe
store that keeps track of inventory and issues an order for additional inventory when levels drop
below a specified level.
A) operational
B) functional
C) managerial
D) executive

5) a

6) An executive information system consists of:


A) people.
C) software and hardware.

6) d

B) data and procedures.


D) All of the above.

7) Using the Internet or a high- speed phone line, desktop videoconferencing can be performed
________.
A) only with fast network connections.
B) on personal computers.
C) only in specially adapted conference rooms.
D) only with Microsoft Research's camera.

7) b

8) DSSs are typically used by managerial - level employees to help them solve ________ problems,
such as sales and resource forecasting.
A) semistructured
B) structured
C) complex
D) simple

8) a

9) The goal of a management information system is to:


A) support day- to - day activities.
B) support the decision making associated within a functional area of the organization.
C) provide reports which will be used as input to a TPS.
D) automate repetitive information- processing activities.

9) b

10) To be competitive, organizations need:


A) to ensure that people in teams have the knowledge and skills to solve problems quickly and
easy.
B) to bring together people who have the appropriate set of knowledge and skills into teams.
C) to form teams with the right combinations of people.
D) All of the above.

10) d

11) Examples of the types of activities that can be supported by expert systems include:
A) medical diagnosis and computer user help desk.
B) financial management and forecasting.
C) payroll processing and inventory management.
D) advertising and product pricing.

11) a

12) Are of the following are benefits to knowledge management systems EXCEPT.
A) Improved organizational performance
B) Enhanced employee retention
C) Enhanced innovation and creativity
D) Getting employee buy- in

12) d

13) ________ is an example of a groupware product that enables people to work together more
effectively.
A) Microsoft FrontPage
B) EXSYS
C) Notes
D) Infogate

13) c

14) A challenge of the executive information system is to provide timely ________ information to
executive decision makers.
A) soft
B) hard
C) day- to - day
D) None of the above.

14) a

15) Common DSS models in accounting do NOT include:


A) auditing.
B) payroll and deductions.
C) cost analysis.
D) budgeting.

15) b

16) The basic systems model is used to describe virtually all information systems and it consists of the
following elements:
A) processing.
B) output.
C) input.
D) All of the above.

16) d

17) A DSS is created to be a(n) ________ decision aid.


A) professional
B) passive

17) c

C) interactive

D) analytic

18) An example of a batch transaction system is:


A) an event ticket reservation processing system.
B) a payroll processing system.
C) a grocery store checkout processing system.
D) an airline reservation processing system.

18) b

19) Web- based implementations are supporting ________ meetings in which group members access
the EMS software from their computers in their offices or from home.
A) traditional
B) multi - functional
C) distributed
D) asynchronous

19) c

20) People in the ________ function focus on the activities that promote the organization and its
products in a way that attracts and retains customers.
A) accounting
B) finance
C) production
D) marketing

20) d

21) Examples of typical information systems in production and operations include:


A) resource analysis.
B) customer problem tracking.
C) new product development.
D) promotion and advertising.

21) b

22) The goal of ________ systems is to automate repetitive information- processing activities within
organizations.
A) management information
B) transaction processing
C) decision support
D) executive information

22) b

23) ________ is the second generation of video communication that allows the users to see a live
picture of the person(s) they are talking to with the phone calls.
A) Electronic meeting system
B) Desktop videoconferencing
C) Groupware
D) Stand- alone videoconferencing

23) b

24) A drill- down report provides ________ information as to why a key indicator is not at an
appropriate level.
A) unplanned
B) nonroutine
C) summarized
D) detailed

24) d

25) Problems at the executive level of the organization are:


A) relatively complex and nonroutine.
B) relatively complex and recurring.
C) repetitive and insignificant.
D) highly structured and recurring.

25) a

26) The advantages of transaction processing systems include:


A) decreased data entry errors and marketing expenses.
B) increased number of people in the process and less data entry errors.
C) increased number of people in the process, speed and accuracy.
D) decreased transaction costs and data entry errors.

26) d

27) Examples of asynchronous groupware include:


A) electronic meeting systems.
C) shared whiteboards.

27) d

B) voting systems.
D) e- mail and mailing lists.

28) ________ systems are used to mimic human expertise by manipulating knowledge rather than
simply information.
A) Office automation
B) Decision support
C) Functional area information
D) Intelligent

28) d

29) Some of the technologies that are most suitable for being used by members of virtual teams include:
A) videoconferencing and groupware.
B) E- mails.
C) fax machines.
D) pagers.

29) a

30) Some examples of the outputs created by a transaction processing system include:
A) counts and summary reports.
B) trends and summary reports.
C) recommendations and advice.
D) scheduled and ad hoc reports.

30) a

31) Managerial - level decision making is referred to as ________ decision making, because solutions
and problems are not clear- cut and often require judgment and precision.
A) semistructured
B) unstructured
C) structured
D) day- to - day

31) a

32) Information systems at the operational level of an organization are designed to:
A) improve the efficiency of the consumer interface.
B) automate repetitive activities.
C) improve the efficiency of business processes.
D) All of the above.

32) d

33) Typical information systems in marketing do NOT include:


A) market research and analysis.
B) customer service tracking.
C) pricing and sales analysis.
D) product location analysis.

33) b

34) An interactive class registration system that immediately notifies the user of his or her success to
register in a class is an example of ________ processing of transactions.
A) operational
B) batch
C) scheduled
D) online

34) d

35) The outputs of a DSS include:


A) summary reports and trend analysis.
C) textual and graphical reports.

B) exception and scheduled reports.


D) recommendations or advice.

35) c

36) The output from an expert system includes:


A) a report.
C) aggregated data

B) a trend analysis.
D) recommendations.

36) d

37) Managers at the executive level of the organization focus on:


A) problems within a specific business function.
B) improving the efficiency of business processes.
C) effectively utilizing and deploying organizational resources.
D) long- term strategic issues facing the organization.

37) d

38) For unstructured decisions, information systems are used to:


A) improve efficiency by automating routine activities.
B) obtain aggregate summaries of trends and projections of the future.
C) automate repetitive activities.
D) improve effectiveness by automating the monitoring and control of organizational activities.

38) b

39) An executive information system does NOT support:


A) long- range and strategic planning.
B) staffing and labor relations.
C) manufacturing planning and scheduling.
D) crisis management.

39) c

40) ________ systems are special- purpose information systems designed to support the decision
making related to a particular recurring problem in the organization.
A) Functional area information
B) Expert
C) Office automation
D) Decision support

40) d

41) Inputs to a management information system are data produced by a(n) ________ system, other
internal data and ad hoc requests for special reports or summaries.
A) expert
B) executive information
C) transaction processing
D) decision support

41) c

42) The processing aspect of an executive information system focuses on:


A) data sorting and summaries.
B) data aggregation and summaries.
C) data summaries and simulations.
D) data summaries and graphical interpretations.

42) d

43) ________ systems consist of technology and the people needed to consolidate information and to
support managers at the highest level of the organization.
A) Transaction processing
B) Decision support
C) Executive information
D) Management information

43) c

44) ________ reports are produced daily, weekly or monthly to support the routine informational
needs of managerial- level decision making.
A) Exception
B) Ad hoc reports
C) Scheduled
D) Drill- down

44) c

45) Some common DSS models in marketing include:


A) sales performance, product demand forecast and pricing strategies.
B) market share analysis, pricing strategies and product design.
C) product- mix inventory level, product design and product demand forecast.
D) product design, product demand forecast and pricing strategies.

45) a

46) ________ describe the transactions created in a business function and they serve as stimulus to a
transaction processing system.
A) Source documents
B) Business reports
C) Scheduled reports
D) Structured documents

46)

47) A(n) ________ is a way of encoding knowledge after collecting information from a user.
A) fact
B) statement
C) information
D) rule

47) d

48) Within the process component of a DSS, examples of the interactive processing of data and models
include:
A) optimization and simulations.
B) graphical interpretations and simulations.
C) data aggregation and forecasting.
D) data sorting and summaries.

48) a

49) An example of a ________ TPS is a data capture device which is used at the checkout counter of a
grocery store.
A) semiautomated
B) fully automated
C) manual
D) batch

49) a

50) In ________ decisions, the procedures for a given situation can be specified in advance.
A) unstructured
B) structured
C) semi - structured
D) day- to - day

50) b

51) A production manager at Nike uses information about sales forecasts for multiple product lines
provided by a(n) ________ information system to create multiple production schedules.
A) managerial - level
B) executive- level
C) operational- level
D) organizational- level

51) a

52) Groupware supports:


A) different time, different place meetings.
C) same time, different place meetings.

52) d

B) same time, same place meetings.


D) All of the above.

53) Are of the following are challenges to knowledge management systems EXCEPT.
A) Focusing too much on technology
B) Getting employee buy- in
C) Enhanced employee retention
D) Forgetting the goal

53) c

54) ________ consists of matching facts and rules, determining the sequence of questions and drawing
a conclusion.
A) Planning
B) Deduction
C) Inferencing
D) None of the above.

54) c

55) Some examples of boundary- spanning systems are:


A) decision support systems, expert systems and office automation systems.
B) transaction processing systems, management information systems and office automation
systems.
C) decision support systems, expert systems and executive information systems.
D) transaction processing systems, management information systems and executive information
systems.

55) a

56) Examples of the types of activities supported by an office automation system include:
A) manufacturing planning and scheduling.
B) financial planning and machine configuration.
C) sales and order planning.
D) communication and scheduling.

56) d

57) Ford Motor Company uses an online ________ system on the Web to post information about their
products and dealers where customers can locate their nearest dealer.
A) executive information
B) transaction processing
C) management information
D) expert

57) b

58) Rules in an expert system are typically expressed using a ________ format.
A) for- next
B) if- then
C) what- if
D) None of the above.

58) b

59) ________ decisions deal with complex problems with broad and long - term ramifications for the
organization.
A) Managerial - level
B) Executive- level
C) Operational - level
D) Functional- level

59) b

60) ________ systems are a collection of software and hardware for developing documents, scheduling
resources and communicating.
A) Management information
B) Decision support
C) Expert
D) Office automation

60) d

61) Routine, day- to- day business processes and interaction with customers occur at the ________ level
of a firm.
A) functional
B) operational
C) executive
D) managerial

61) b

62) Activities supported by transaction processing systems do NOT include:


A) accounts payable and receivable.
B) sales forecasting.
C) inventory management.
D) payroll processing.

62) b

63) Problems at the executive level of the organization are:


A) relatively complex and nonroutine.
B) relatively complex and recurring.
C) highly structured and recurring.
D) repetitive and insignificant.

63) a

64) An example of a decision analysis tool which is most commonly used with a DSS is:
A) Microsoft Excel.
B) Microsoft FrontPage.
C) Microsoft PowerPoint.
D) Microsoft Word.

64) a

65) Lower- level ________ generate much of the hard data provided by an EIS.
A) MISs and TPSs
B) MISs and DSSs
C) TPSs and DSSs
D) DSSs, MISs and TPSs

65) a

66) Examples of the types of activities supported by management information systems include:
A) financial management and forecasting.
B) product purchasing, receiving and shipping.
C) long- range and strategic planning.
D) payroll processing.

66) a

67) The processing aspect of a management information system focuses on:


A) data summaries and simulations.
B) data summaries and graphical interpretations.
C) data aggregation and summaries.
D) data sorting and summaries.

67) c

68) Data entry into a transaction processing system can be:


A) semiautomated.
B) manual.
C) fully automated.
D) All of the above.

68) d

69) At the managerial level, ________ managers focus on monitoring and controlling operational- level
activities and providing information to higher levels of the organization.
A) functional
B) operational
C) personnel
D) executive

69) a

70) Managers at the managerial level typically focus on problems:


A) across several departments.
B) within a specific business function, such as marketing or finance.
C) within a time frame.
D) across the organization.

70) b

71) The benefits of groupware include all of the following EXCEPT:


A) document preparation.
B) it automatically records member ideas and comments, and allows foe anonymity.
C) it allows easy access to external electronic data and files that can be easily distributed to
participants.
D) it allows larger groups to participate.

71) a

72) What- if analysis allows the manager to make ________ changes to the data associated with a
problem and observe how these changes influence the results.
A) real
B) scheduled
C) complex
D) hypothetical

72) d

73) A(n) ________ system combines information from multiple data sources into a structured report
that allow managers to monitor and manage the organization better.
A) office automation
B) management information
C) executive information
D) decision support

73) b

Answer Key
Testname: 7 CHAPTER
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

D
D
A
D
A
D
B
A
B
D
A
D
C
A
B
D
C
B
C
D
B
B
B
D
A
D
D
D
A
A
A
D
B
D
C
D
D
B
C
D
C
D
C
C
A
A
D
A
A
B
9

Answer Key
Testname: 7 CHAPTER
51)
52)
53)
54)
55)
56)
57)
58)
59)
60)
61)
62)
63)
64)
65)
66)
67)
68)
69)
70)
71)
72)
73)

A
D
C
C
A
D
B
B
B
D
B
B
A
A
A
A
C
D
A
B
A
D
B

10

Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1) ________ involves the business activities associated with receiving and stocking raw materials,
parts and products.
A) Marketing and sales
B) Operations and manufacturing
C) Inbound logistics
D) Outbound logistics

1) c

2) ________ is classified as a support activity since the primary activities cannot be accomplished
without the employees to perform them.
A) Technology development
B) Human resources
C) Infrastructure
D) Procurement

2) b

3) ________ tags are small and relatively inexpensive, and typically have a range up to a few feet.
A) Basic
B) Active
C) Passive
D) Simple

3) c

4) ________ applications provide support for the day - to - day sales activities of an organization.
A) Customer Relationship Management
B) Supply Chain Management
C) Sales Force Automation
D) Enterprise Resource Planning

4) c

5) At the heart of the ________ is the CIC.


A) Analytical CRM
C) Executional CRM

5) d

B) Operational CRM
D) Collaborative CRM

6) Companies must take special care when dealing with customization issues because:
A) maintaining and upgrading customizations can be troublesome.
B) new vanilla versions must be continually upgraded to accommodate the customization.
C) customizations can be costly.
D) All of the above.

6) d

7) ________ activities are functional areas within an organization that process inputs and produce
outputs.
A) Main
B) Core
C) Secondary
D) Support

7) b

8) ________ is often the most overlooked, underestimated and poorly budgeted expense involved in
planning enterprise system implementations.
A) Help from outside experts
B) Executive sponsorship
C) Customization
D) Training

8) d

9) Altering the way in which business processes are conducted is known as:
A) Enterprise Resource Planning.
B) Customer Relationship Management.
C) Supply Chain Management.
D) Business Process Management.

9) d

10) Enterprise portals can be defined as ________ through which a business partner accesses secured,
proprietary information from an organization.
A) back doors
B) intranets
C) access points
D) tunnels

10) c

11) ________ information systems are information systems that allow companies to integrate
information across operations on a company- wide basis.
A) Functional area
B) Enterprise- wide
C) Executive
D) Management

11) b

12) In contrast to ________, ERP applications make accessing information easier by providing a central
information repository.
A) packaged applications
B) data warehouses
C) custom applications
D) legacy systems

12) d

13) In most organizations, each department implements applications to assist it with its daily business
activities, and as a result, these applications tend to be:
A) run on the same platforms.
B) similar in each department.
C) infrastructure- specific.
D) externally focused.

13) c

14) Applications focusing on downstream information flows have two main objectives
potential customers and:
A) develop and maintain customer satisfaction.
B) achieve competitive advantage.
C) create customer loyalty.
D) None of the above.

14) c

to attract

15) Microsoft Word and Microsoft Excel have similar ________ and simply differ in the features and
functionality that each application offers.
A) capabilities
B) user interfaces
C) operations screens
D) None of the above.

15) b

16) One of the areas related to control involves the consistency of:
A) legacy systems used in each department.
B) business activities.
C) policies and procedures.
D) transactions involved in each department.

16) c

17) A successful CRM strategy must include:


A) employee training changes.
C) customer service changes.

17) d

B) policy and business process changes.


D) All of the above.

18) Marketing researchers have found that the cost of trying to get back customers that have gone
elsewhere can be up to ________ times as much as keeping a current one satisfied.
A) 0 to 25
B) 50 to 75
C) 25 to 100
D) 50 to 100

18) d

19) ERP applications that access the data warehouses are designed to have:
A) the same look and feel, regardless of the unique needs of a particular department.
B) a varying look and feel, depending on the needs of the organization.
C) different user interfaces to access different pieces of information.
D) a different look and feel, depending of the unique needs of a particular department.

19) a

20) In today's highly competitive markets, ________ hold the balance of power because, if they become
dissatisfied with the levels of service they are receiving, there are many alternatives readily
available to them.
A) customers
B) business partners
C) suppliers
D) competitors

20) a

21) An operational CRM system includes:


A) EMA
C) CSS

21) d

B) SFA
D) All of the above.

22) A comprehensive CRM system includes:


A) analytical CRM.
C) operational CRM.

22) d

B) collaborative CRM.
D) All of the above.

23) A more descriptive term to describe the flow of materials from suppliers to a company is ________
because multiple suppliers are involved in the process of servicing a single organization.
A) supply chain
B) value system
C) supply network
D) value chain

23) c

24) Like ERP and CRM applications, SCM packages are delivered in the form of ________, which
companies select and implement according to their business requirements.
A) modules
B) components
C) systems
D) solutions

24) a

25) The key purpose of a(n) ________ system is to streamline the flow of information from one
company's operations to another's.
A) management information
B) intraorganizational
C) operational
D) interorganizational

25) d

26) ________ are operated by third- party vendors, meaning that they are built and maintained by a
particular company.
A) Multimedia marketplaces
B) Resource marketplaces
C) Electronic exchanges
D) Trading exchanges

26) d

27) A recent survey suggested that ________ percent of companies that undertake enterprise system
implementations do not fully realize the results they had hoped.
A) 30 to 40
B) 10 to 20
C) 60 to 80
D) 40 to 60

27) d

28) Analytical CRM is commonly referred to as ________ system.


A) internal
B) external
C) front- office

28) d

D) back- office

29) The supply chain ________ module in SCM packages allows a company to monitor every stage of
the supply chain process, from price quotation to the moment the customer receives the products
and issue alerts when problem arise.
A) exchange
B) collaboration
C) performance management
D) event management

29) d

30) ________ are designed to automate the business processes that occur before, during and after sales
have been transacted between a buyer and multiple suppliers.
A) Procurement portals
B) Distribution portals
C) Enterprise portals
D) Resource portals

30) a

31) ________ allows Web page designers to create customized tags that specify how the document
should be formatted.
A) W3C
B) HTML
C) XBRL
D) XML

31) d

32) SAP's collaborative fulfillment module does NOT include the following functions:
A) supporting the entire logistics process, including picking, packing, shipping and international
activities.
B) sharing information and integrating processes up and down the supply chain.
C) fulfilling orders from channels on time with order management, transportation planning and
vehicle scheduling.
D) committing to delivery dates in real time.

32) b

33) ________ technology uses electromagnetic or electrostatic coupling to transmit signals.


A) RFID
B) XBRF
C) RFED
D) XBRL

33) a

34) The implementations of enterprise systems are often ________ originally envisioned.
A) less expensive than
B) as costly and time consuming as
C) more costly and more time consuming than
D) not as effective as

34) c

35) The emergence of the Internet and Web has resulted in ________, opening up new opportunities
and methods for conducting business.
A) the integration of customer and supplier networks
B) delineating the customer and supplier networks
C) the integration of all business processes within an organization
D) the globalization of customer and supplier networks

35) d

36) ________ systems are older systems that are close to or at the end of their useful life.
A) Internally- focused
B) Legacy
C) Conversion
D) Packaged

36) b

37) Applications focusing on ________ information flows have two main objectives - to accelerate
product development and to reduce costs associated with procuring raw materials, components
and services from suppliers.
A) integrated
B) downstream
C) upstream
D) internally- focused

37) c

38) A radical redesign of an organization is sometimes necessary to:


A) create best practices.
B) lower costs and increase quality.
C) develop an organizational vision.
D) focus on incremental changes.

38) b

39) Successful CSS systems enable:


A) faster response times.
B) improved productivity for service and support personnel.
C) increased first- contact resolution rates.
D) All of the above.

39) d

40) An Enterprise Marketing Automation system provides a comprehensive view of the:


A) environmental factors.
B) industry trends.
C) competitors.
D) All of the above.

40) d

41) Companies need to have a(n) ________ system that captures information from retail stores, Web
sites, call centers and various other ways that organizations can communicate downstream within
their value chain.
A) distributed
B) internally- focused
C) improved
D) integrated

41) d

42) ________ systems are highly useful for standardized, repetitive tasks such as making entries in a
check register.
A) Custom
B) Stand- alone
C) Expert
D) Packaged

42) d

43) MRP stands for:


A) Most Rapid Performance.
C) Material Resource Planning.

43) b

B) Material Requirements Planning.


D) Multiple Resource Planning.

44) Enterprise systems affect the entire organization and, thus, companies should include personnel
from ________ in the implementation project.
A) different levels in the same department
B) different levels and departments
C) the executive level
D) the same level in different departments

44) b

45) ________ is an XML- based specification for publishing financial information.


A) EDI
B) W3C
C) HTML

45) d

D) XBRL

46) Sharing ________ between organizations helps companies to adapt more quickly to changing
market conditions.
A) management
B) information
C) operations
D) packages

46) b

47) Support activities include infrastructure, human resources, ________ and procurement.
A) technology development
B) operations and management
C) marketing and sales
D) customer service

47) a

48) Problems such as excessive inventories, inaccurate manufacturing capacity plans and missed
production schedules can run rampant when:
A) there is a one- to - one relationship between the supplier and a company.
B) firms within a supply network do not collaborate effectively.
C) more and more suppliers are involved in a supply network.
D) multiple suppliers service a single organization.

48) b

49) The National Quality Research Center estimates that a one percent increase in customer satisfaction
can lead to a(n) ________ increase in a company's market capitalization.
A) insignificant
B) considerable
C) threefold
D) twofold

49) c

50) ________ automate the business processes involved in selling or distributing products from a single
supplier to multiple buyers.
A) Procurement portals
B) Resource portals
C) Enterprise portals
D) Distribution portals

50) d

51) ________ is a corporate- level strategy concentrating on the downstream information flows.
A) Enterprise Resource Planning.
B) Customer Relationship Management.
C) Business Process Management.
D) Supply Chain Management.

51) b

52) At ________ of the business process in an organization, value is added in the form of work
performed by people associated with that process and new, useful information is generated.
A) successive stages
B) various stages
C) some stages
D) each stage

52) d

53) Supply chain planning includes all of the following EXCEPT:


A) demand planning and forecasting.
B) supply chain execution.
C) distribution planning.
D) production scheduling.

53) b

54) Enterprise systems can help companies find innovative ways to conduct business, which lead to
several advantages. These advantages do NOT include:
A) a decrease in the number of anticipated surprises.
B) an increase in the accuracy of on- time shipments.
C) tremendous inefficiencies within an organization.
D) an increase in customer satisfaction.

54) c

55) Among the most prevailing issues facing management when selecting an ERP application are:
A) control.
B) best practices.
C) business requirements.
D) All of the above.

55) d

56) The process of conversion transfers information stored on legacy systems to a new, integrated
computer platform, which typically comes in the form of:
A) Enterprise Resource Planning.
B) Supply Chain Management.
C) Total Quality Management.
D) Customer Relationship Management.

56) a

57) ________ refers to systems for providing effective and efficient communication with the customer
from the entire organization.
A) Operational CRM
B) Executional CRM
C) Collaborative CRM
D) Analytical CRM

57) c

58) If the vanilla version of an ERP system does not support a certain business process, the software
may require ________ to accommodate it.
A) customizations
B) modifications
C) integrations
D) differentiations

58) a

59) Industry standard business processes are called:


A) customer relationship management.
C) workflow management.

59) d

B) functional process improvement.


D) best practices.

60) Operational CRM is commonly referred to as ________ system.


A) front- office
B) external
C) back- office

D) internal

61) The term ________ is commonly used to refer to the producers of supplies that a company uses.
A) supply network
B) value chain
C) value system
D) supply chain

60) a

61) d

62) If the inbound logistics and operations use different systems, information cannot readily flow
between these two departments. This leads to:
A) inaccurate and outdated data since inventory information may be stored in both systems.
B) unnecessary costs associated with entering, storing and updating data redundantly.
C) a highly inefficient process for operations personnel, who must have access to two systems in
order to get both the order entry and inventory information.
D) All of the above.

62) d

63) ________ are designed to automate the business processes that occur before, during, and after sales
have been transacted between a supplier and multiple customers
A) Resource portals
B) Distribution portals
C) Procurement portals
D) Enterprise portals

63) b

64) ERP core components include all of the following EXCEPT:


A) operations management.
B) human resources management.
C) supply chain management.
D) financial management.

64) c

65) A value system is formed when:


A) a company creates additional value by integrating internal applications with suppliers,
business partners and customers.
B) information flows from one company's value chain to another company's value chain.
C) companies connect their internal value chains.
D) All of the above.

65) d

66) ________ can be accomplished by integrating multiple business processes in ways that enable firms
to meet a wide range of unique customer needs.
A) Strategic information planning
B) Economies of scale
C) Competitive advantage
D) Process reengineering

66) c

67) The ________ information flow consists of information that is received from another organization.
A) downstream
B) internally- focused
C) upstream
D) value system

67) c

68) An information system can be used to support a billing process which would lead to:
A) reduced use of paper.
B) reduced material and labor costs.
C) less handling of paper.
D) All of the above.

68) d

69) Data warehouses are databases that store information:


A) required for a specific business activity.
B) related to a specific department.
C) related to the various business activities of an organization.
D) that is outdated.

69) c

70) Supply chain ________ is the extent to which a company's supply chain is focusing on maximizing
customer service.
A) efficiency
B) effectiveness
C) integration
D) none of the above.

70) b

71) If packaged applications cannot meet the requirements of the business, the managers must conduct
a ________ analysis to ensure that taking the custom application approach will prove worthwhile
to the company.
A) cost- benefit
B) earned value
C) what- if
D) None of the above

71) a

72) ________ provides the necessary components to facilitate a business process.


A) Procurement
B) Technology development
C) Human resources
D) Infrastructure

72) d

73) Companies use information systems to support their various business processes and activities for
internal operations, which does NOT include:
A) human resource management
B) order processing.
C) interaction with suppliers.
D) manufacturing.

73) c

74) One of the recommendations related to enterprise system implementations includes taking a
________ approach to implementations.
A) multidisciplinary
B) internally- focused
C) thorough
D) organizational

74) a

75) The ________ business activity can leverage information systems by accumulating purchase orders
from the different functional areas within the corporation.
A) operations and manufacturing
B) procurement
C) marketing and sales
D) technology development

75) b

76) ________ refers to the movement of information along the supply chain.
A) Information flow
B) Data flow
C) Financial flow
D) Product flow

76) a

77) Another term for an electronic marketplace is:


A) trading floor.
C) multimedia marketplace.

77) d

B) electronic exchange.
D) trading exchange.

78) Externally focused systems coordinate business activities with:


A) customers.
B) business partners.
C) suppliers.
D) All of the above.

78) d

79) ________ applications are systems that focus on the specific needs of individual departments and
are not designed to communicate with other systems of the organization.
A) Internally- focused
B) Stand- alone
C) Custom
D) Packaged

79) b

80) The supply chain ________ module in SCM packages reports key measurements in the supply
chain.
A) event management
B) performance management
C) exchange
D) collaboration

80) b

81) ________ refers to the movement of goods from the supplier to production.
A) Product flow
B) Financial flow
C) Information flow
D) Data flow

81) a

82) An upstream information flow consists of information that:


A) is produced by a company and sent along to another organization.
B) is produced by one department and sent along to other departments.
C) is received from another organization.
D) is passed on to the company's distributors and customers.

82) c

83) Applications running on different computing platforms are not desirable because:
A) the same pieces of data may be stored in several versions throughout the organization.
B) data cannot be readily shared between systems.
C) they are difficult to integrate.
D) All of the above.

83) d

84) One of the most important factors when deciding to implement enterprise solutions involves:
A) selecting the customers and suppliers to work with.
B) implementing applications that meet the requirements of the customers and suppliers.
C) selecting applications that meet the requirements of the business.
D) selecting and implementing applications that meet the requirements of the business, as well
as its customers and suppliers.

84) d

85) Companies typically either opt for ________ control or allow particular business units to govern
themselves.
A) decentralized
B) centralized
C) shared
D) distributed

85) b

86) CRM applications are commonly integrated with ERP to leverage ________ information to serve
customers.
A) external
B) internal or external
C) internal
D) internal and external

86) d

87) Customer Relationship Management applications concentrate on the ________ integrating the value
chains of a company and its distributors.
A) legacy systems
B) externally focused systems
C) downstream information flows
D) upstream information flows

87) c

88) A ________ refers to the flow of information through a set of business activities, in which
information flows through functional areas that facilitate the internal activities of the business.
A) company's inventory
B) value chain
C) flow diagram
D) data warehouse

88) b

89) The primary reason that enterprise system implementations fail is believed to be a direct result of
lack of ________ management support.
A) managerial level
B) operational level
C) organizational level
D) top- level

89) d

Answer Key
Testname: 8 CHAPTER
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
44)
45)
46)
47)
48)
49)
50)

C
B
C
C
D
D
B
D
D
C
B
D
C
C
B
C
D
D
A
A
D
D
C
A
D
D
D
D
D
A
D
B
A
C
D
B
C
B
D
D
D
D
B
B
D
B
A
B
C
D
10

Answer Key
Testname: 8 CHAPTER
51)
52)
53)
54)
55)
56)
57)
58)
59)
60)
61)
62)
63)
64)
65)
66)
67)
68)
69)
70)
71)
72)
73)
74)
75)
76)
77)
78)
79)
80)
81)
82)
83)
84)
85)
86)
87)
88)
89)

B
D
B
C
D
A
C
A
D
A
D
D
B
C
D
C
C
D
C
B
A
D
C
A
B
A
D
D
B
B
A
C
D
D
B
D
C
B
D

11

Potrebbero piacerti anche