You are on page 1of 47

Grading Summary

These are the automatically


computed results of your exam.
Grades for essay questions, and
comments from your instructor, are
in the "Details" section below.

Date Taken:
Time Spent:
Points Received:

Question Type:
Multiple Choice
Essay

6/2/2013
1 h , 16 min , 28 secs
115 / 150 (76.7%)

# Of Questions:
5
4

# Correct:
4
N/A

Grade Details - All Questions


1. Question :
Student Answer:

(TCO A) Cloud computing


is the same as e-commerce.
reduces the size of IT organizations.
increases business costs.

Instructor
Explanation:
Points Received:

requires special software, other than a browser, to be installed on


each computer.
Week 1 Lecture

0 of 10

Comments:
2. Question :

(TCO A) Maintaining the organization's financial records is a


central purpose of which main business function?

Student Answer:

manufacturing and accounting


finance and accounting (Correct answer)
sales and manufacturing
finance and sales

Instructor
Explanation:
Points Received:

p. 19
10 of 10

Comments:
3. Question :
Student Answer:

(TCO B) The value chain model


categorizes five related advantages for adding value to a firm's
products or services.
sees the supply chain as the primary activity for adding value.

categorizes four basic strategies a firm can use to enhance its value
chain.

Instructor
Explanation:
Points Received:

helps a firm identify points at which information technology can most


effectively enhance its competitive position.
p. 102

10 of 10

Comments:
4. Question :
Student Answer:

(TCO C) The difference between a data warehouse and a data mart is


data warehouses tend to serve an entire enterprise and a data mart a
single department.
a data warehouse is historical data only and a data mart is the most
recent transactions.
a data mart requires normalized data, whereas a data warehouse
does not.
They are different names for the same thing.

Instructor
Explanation:
Points Received:

p. 223

10 of 10

Comments:
5. Question :

(TCO D) _____ work by using radio waves to communicate with radio


antennas placed within adjacent geographic areas.

Student Answer:

Cell phones
Microwaves
Satellites
WANs

Instructor
Explanation:
Points Received:

p. 257

10 of 10

Comments:
6. Question :
Student Answer:

(TCO A) What is the difference between information technology and


information systems? Describe some of the functions of information
systems.

Information technology also referred to as IT consists of all the


hardware that a firm needs to attain its business goals. IT can be

viewed as a way of implementation and management of computer


information systems. Information systems on the other hand are a
bit more challenging and complex in comparison to IT. Information
systems are a set of interrelated components responsible for
collecting, storing and distributing information that directly impacts
decision-making and control within an organization. An
information system helps employees analyze problems, helps create
new products, supports decision-making and control in an
organization, and also helps employees visualize complex subjects.
(Management Information Systems, 12/e- Pg 15-16)
Instructor
Explanation:

Information technology (IT) consists of all the hardware and software that a
firm needs to use to achieve its business objectives. Information systems are
more complex. An information system can be defined technically as a set of
interrelated components that collect (or retrieve), process, store, and
distribute information to support decision making and control in an
organization.
An information system:
supports decision making, coordination, and control
helps employees analyze problems
helps employees visualize complex subjects
helps create new products
@ pp. 1516

Points Received:

15 of 25

Comments:

While you cited this properly, I mentioned that DeVry does not
want straight "Copy and Paste" in answers...

7. Question :
Student Answer:

Instructor
Explanation:

(TCO B)"Knowledge increases exponentially" is a phrase with which we


are all familiar. How does this concept apply to electronic business and
the emergence of the digital firm? Support your contentions.

To put the quote into perspective, I think one way to interpret is to


break down how the use of data affects knowledge/wisdom. Data
arranged in a certain manner leads to information, and information
leads to knowledge and knowledge leads to wisdom. As one
becomes wiser and more experienced, then it can be said that their
knowledge increases exponentially because of the continual
discovery of new information. Everything we know today can be
tracked down practically in a chain/pyramid type of history. Today,
the internet enables us to feed our minds and expand our
knowledge; so much information is at our finger tips. And with
that, all human knowledge can be connected to anyone with access
to a computer. Businesses in turn take advantage of the human
knowledge to increase electronic business.
Student answers will vary. A sample answer is: The exponential increases of
knowledge refer to shared information. For example, once the concept of a
wheel is established, inheritors of that knowledge do not have to reinvent the
wheel. The Internet is a tool similar to the wheel: it is based on shared
standards and universal tools. The Internet and shared networking
technologies are allowing new techniques for attracting customers and
selling customers to be developed and adapted very quickly. For example,

although early Internet retailers had difficulty setting up secure credit card
transactions and payment systems, today there are many systems in place
as vendors step in to create shared tools for doing this. The Internet is
fostering shared knowledge and, as such, propagating ever greater
increases in that knowledge.
@ pp. 373405

Points Received:

25 of 25

Comments:
8. Question :
Student Answer:

Instructor
Explanation:

Points Received:

(TCO C) What types of relationships are possible in a relational


database? Describe and give an example of each.

In a relational database, there are three basic operations used to


develop sets of useful data: select join and project. The select
operation creates a subset of records in the file that meet the
criteria. Select creates a subset of rows in a table to meet certain
criteria. The join operation combines relational tables to provide the
user with additional information that is not directly available in
individual tables. The project operation creates a subset consisting
of columns in a table. The columns would allow the user to create a
table using only the required information. For example in a table,
one would need to extract information in columns that they need to
create the new table. (Management Information Systems, 12/e- Pg
215)
A one-to-one relationship occurs when each record in one table has only one
related record in a second table. An example might be a table of salespeople
and a separate table of company cars. Each salesperson can only have one
car, or be related to the one car in the database. A one-to-many relationship
occurs when a record in one table has many related records in a second
table. An example might be a table of salespeople and clients. Each
salesperson may have several clients. A many-to-many relationship occurs
when records in one table have many related records in a second table, and
the records in the second table have many related records in the first table.
An example might be a clients table and a products table. Clients may buy
more than one product, and products are sold to more than one client.
@ p. 221

10 of 25

Comments:
9. Question :
Student Answer:

(TCO D) Describe the effect of cloud computing on traditional IT


infrastructure.

The biggest effect of cloud computing on traditional IT


infrastructure is that the user no longer needs to own their own
infrastructure. The fact that ownership of the infrastructure is not
needed, allows the user capital expenditure by renting usage of
infrastructure from a third party provider. By doing that, the user
only consumes resources as a service and pays for what he/she uses.
Based on that, the user can be billed monthly or quarterly based on
the amount of service used. With resources on the cloud, multiple

users can share computing power amongst themselves and also


improve utilization rates so services aren't left stagnant/idle. Cloud
computing in turn helps reduce and cut costs.
Instructor
Explanation:

Points Received:

Because websites, applications, and databases have been moved to a cloud


vendor, the corporation does not need infrastructure, such as Web,
application, and database servers, as part of its in-house computing
infrastructure. It is replaced by a network infrastructure that provides
employees with Internet access to the cloud services.
@ Week 4 Lecture

25 of 25

Comments:

Week 1

1. Question :

Which of the following choices may lead to competitive advantage (1) new
products, services and business models; (2) charging less for superior
products; (3) responding to customers in real time?

Student Answer:

1 only
1 and 2
2 and 3
1, 2, and 3

Instructor
Explanation:
Points Received:

p. 15

1 of 1

Comments:
2. Question :

An information system can be defined technically as a set of interrelated


components that collect (or retrieve), process, store, and distribute
information to support

Student Answer:

decision making and control in an organization.


communications and data flow.
manager's analysis of the organizations raw data.
the creation of new products and services.

Instructor
Explanation:
Points Received:
Comments:

p. 15

1 of 1

3. Question :

The three activities in an information system that produce the information


that organizations use to control operations are

Student Answer:

information retrieval, research, and analysis.


input, output, and feedback.
input, processing, and output.
data analysis, processing, and feedback.

Instructor
Explanation:
Points Received:

p. 16

0 of 1

Comments:
4. Question :

The fundamental set of assumptions, values, and ways of doing things


that has been accepted by most of a company's members is called its

Student Answer:

culture.
environment.
atmosphere.
values.

Instructor
Explanation:
Points Received:

p. 20

1 of 1

Comments:
5. Question :
Student Answer:

The average number of tickets sold daily online is an example of


input.
raw data.
meaningful information.
output.

Instructor
Explanation:
Points Received:

p. 16

1 of 1

Comments:
6. Question :
Student Answer:

Networking and telecommunications technologies, along with computer


hardware, software, data management technology, and the people
required to run and manage them, constitute an organization's
data management environment.
networked environment.

IT infrastructure.
information system.

Instructor
Explanation:
Points Received:

p. 21

1 of 1

Comments:
7. Question :
Student Answer:

Lower global costs of labor have


Left many highly skilled technical employees unemployed.
increased the demand for local labor.
created a whole new set of skilled jobs in industrialized nations.

Instructor
Explanation:
Points Received:

allowed skilled employees to move into management positions.


Week 1 Lecture

1 of 1

Comments:
8. Question :
Student Answer:

What's new in MIS?


Mobile platforms that compete with PCs

Virtual meetings
Cloud computing platforms
All of the above

Instructor
Explanation:
Points Received:

p. 7

1 of 1

Comments:
9. Question :
Student Answer:

Key corporate assets are


intellectual property, core competencies, and financial and human
assets.
production technologies and business processes for sales,
marketing, and finance.
knowledge and the firm's tangible assets, such as goods and
services.
time and knowledge.

Instructor

p. 11

Explanation:
Points Received:

1 of 1

Comments:
10. Question :

Engineers, scientists, or architects who design new products or services


for a firm belong to which level of a business hierarchy?

Student Answer:

Middle management
Production workers
Knowledge workers
Data workers

Instructor
Explanation:
Points Received:

p. 18

1 of 1

Comments:
11. Question :
Student Answer:

What is the difference between the Internet and cloud computing?


None they are the same.
They are not related.
In cloud computing, both information and function are moved to the
Internet.

Instructor
Explanation:
Points Received:

Cloud computing applications do not use browsers.


Week 1 Lecture

1 of 1

Comments:
12. Question :
Student Answer:

An exponential rate of innovation means that


the number of new innovations increases linearly.
innovation occurs as described by Moore's law.
as much progress is made in 10 years as the previous 20.

Instructor
Explanation:
Points Received:

All of the above


Week 1 Lecture

1 of 1

Comments:
13. Question :

In a business hierarchy, the level that is responsible for monitoring the


daily activities of the business is

Student Answer:

middle management.
service workers.
production management.
operational management.

Instructor
Explanation:
Points Received:

p. 18

1 of 1

Comments:
14. Question :

The term "management information systems" designates a specific


category of information systems serving

Student Answer:

integrated data processing throughout the firm.


transaction process reporting.
employees with online access to historical records.
middle management functions.

Instructor
Explanation:
Points Received:

p. 47

1 of 1

Comments:
15. Question :

To monitor the status of internal operations and the firm's relations with
the external environment, managers need _____ systems.

Student Answer:

decision support
knowledge
transaction processing
management information

Instructor
Explanation:
Points Received:

p. 45

1 of 1

Comments:
16. Question :
Student Answer:

Which systems are typically a major source of data for other systems?
Transaction processing systems
Management information systems
Executive support systems
Decision support systems

Instructor
Explanation:
Points Received:

p. 45

1 of 1

Comments:
17. Question :

Decisions that are unique, rapidly changing, and not easily specified in
advance are best suited to which type of system?

Student Answer:

Management
Transaction processing
Executive support
Decision-support

Instructor
Explanation:
Points Received:

p. 48

1 of 1

Comments:
18. Question :

Which systems are especially suited to situations in which the procedure


for arriving at a solution may not be fully predefined in advance?

Student Answer:

Management information systems


Transaction processing systems
Decision-support systems
Knowledge management systems

Instructor
Explanation:
Points Received:

p. 48

1 of 1

Comments:
19. Question :

Which systems are designed to span functional areas and focus on


executing business processes across the firm?

Student Answer:

Decision-support systems
Management information systems
CRM
Enterprise applications

Instructor
Explanation:
Points Received:
Comments:

p. 51

1 of 1

20. Question :
Student Answer:

Today's companies need fewer levels of management because


workers need less supervision.
information systems make daily management decisions.
the average worker has more extensive training.
the increased flow of information throughout the organization
supplants one of the traditional roles of management.

Instructor
Explanation:
Points Received:

Week 1 Lecture

1 of 1

Comments:

WEEK 2

1. Question :
Student Answer:

A characteristic or quality describing an entity is called a(n)


field.
tuple.
key field.
attribute.

Instructor
Explanation:
Points Received:

p. 210

1 of 1

Comments:
2. Question :

The confusion created by _____ makes it difficult for companies to create


customer relationship management, supply chain management, or
enterprise systems that integrate data from different sources.

Student Answer:

batch processing
data redundancy
data independence
online processing

Instructor
Explanation:
Points Received:
Comments:

p. 211

1 of 1

3. Question :
Student Answer:

Duplicate data in multiple data files is called


data redundancy.
data multiplication.
data independence.
data backups.

Instructor
Explanation:
Points Received:

p. 211

1 of 1

Comments:
4. Question :
Student Answer:

A DBMS
makes the physical database available for different logical views.
makes the logical database available for different analytical views.
makes the physical database available for different analytical views.
makes the relational database available for different analytical views.

Instructor
Explanation:
Points Received:

p. 212

1 of 1

Comments:
5. Question :
Student Answer:

The logical view


shows how data are organized and structured on the storage media.
presents an entry screen to the user.
allows the creation of supplementary reports.
presents data as they would be perceived by end users.

Instructor
Explanation:
Points Received:

p. 212

1 of 1

Comments:
6. Question :
Student Answer:

The type of logical database model that treats data as if they were stored
in two-dimensional tables is the
OODBMS.
pre-digital DBMS.
relational DBMS.

hierarchical DBMS.

Instructor
Explanation:
Points Received:

p. 213

1 of 1

Comments:
7. Question :

A field identified in a table as holding the unique identifier of the table's


records is called the

Student Answer:

primary key.
key field.
primary field.
unique ID.

Instructor
Explanation:
Points Received:

p. 213

1 of 1

Comments:
8. Question :
Student Answer:

The data dictionary serves as an important data management tool by


assigning attributes to the data.
creating an inventory of data contained in the database.
presenting data as end users or business specialists would perceive
them.
maintaining data in updated form.

Instructor
Explanation:
Points Received:

p. 217

1 of 1

Comments:
9. Question :

An automated or manual file that stores information about data elements


and data characteristics such as usage, physical representation,
ownership, authorization, and security is the

Student Answer:

data dictionary.
data definition diagram.
entity-relationship diagram.
relationship dictionary.

Instructor
Explanation:
Points Received:

p. 217

1 of 1

Comments:
10. Question :

Which is the type of database management approach that can handle a


large number of pages or documents?

Student Answer:

Hierarchical DBMS
Relational DBMS
Network DBMS

Instructor
Explanation:
Points Received:

NoSQL
Week 3 Lecture

1 of 1

Comments:
11. Question :
Student Answer:

Which is the most prominent data manipulation language today?


Access
DB2
SQL

Instructor
Explanation:
Points Received:

Crystal Reports
pp. 217218

1 of 1

Comments:
12. Question :
Student Answer:

DBMSs typically include report-generating tools in order to


retrieve and display data.
display data in an easier-to-read format.
display data in graphs.
perform predictive analysis.

Instructor
Explanation:
Points Received:

p. 219

1 of 1

Comments:
13. Question :
Student Answer:

A schematic of the entire database that describes the relationships in a


database is called
the data dictionary.
the intersection relationship diagram.

the entity-relationship diagram.


the data definition diagram.

Instructor
Explanation:
Points Received:

p. 221

1 of 1

Comments:
14. Question :

What is the process of streamlining data to minimize redundancy and


awkward many-to-many relationships?

Student Answer:

Normalization
Data scrubbing
Data cleansing
Data defining

Instructor
Explanation:
Points Received:

p. 219

1 of 1

Comments:
15. Question :
Student Answer:

Cloud computing offers


no database functions.
some database functions.
products only from Amazon and Microsoft.
None of the above

Instructor
Explanation:
Points Received:

p. 217

1 of 1

Comments:
16. Question :
Student Answer:

A data warehouse is composed of


historical data from legacy systems.
current data.
internal and external data sources.
historic and current internal data.

Instructor
Explanation:
Points Received:

p. 222

1 of 1

Comments:
17. Question :
Student Answer:

A data mart usually can be constructed more rapidly and at lower cost
than a data warehouse because
a data mart typically focuses on a single subject area or line of
business.
all the information is historical.
a data mart requires a Web interface.
all of the information belongs to a single company.

Instructor
Explanation:
Points Received:

p. 223

1 of 1

Comments:
18. Question :
Student Answer:

Data mining is a tool that allows users to


quickly compare transaction data gathered over many years.
find hidden relationships in data.
obtain online answers to ad hoc questions in a rapid amount of time.

Instructor
Explanation:
Points Received:

summarize massive amounts of data into much smaller, traditional


reports.
p. 224

1 of 1

Comments:
19. Question :

What is the tool that enables users to view the same data in different
ways using multiple dimensions?

Student Answer:

Predictive analysis
SQL
OLAP
Data mining

Instructor
Explanation:
Points Received:

p. 224

1 of 1

Comments:
20. Question :
Student Answer:

OLAP is a tool that enables


users to obtain online answers to ad hoc questions in a short amount

of time.
users to view both logical and physical views of data.
programmers to quickly diagram data relationships.
programmers to normalize data.

Instructor
Explanation:
Points Received:

p. 224

1 of 1

Comments:

Week 3

1. Question :
Student Answer:

A characteristic or quality describing an entity is called a(n)


field.
tuple.
key field.
attribute.

Instructor
Explanation:
Points Received:

p. 210

1 of 1

Comments:
2. Question :

The confusion created by _____ makes it difficult for companies to create


customer relationship management, supply chain management, or
enterprise systems that integrate data from different sources.

Student Answer:

batch processing
data redundancy
data independence
online processing

Instructor
Explanation:
Points Received:

p. 211

1 of 1

Comments:
3. Question :
Student Answer:

Duplicate data in multiple data files is called


data redundancy.
data multiplication.

data independence.
data backups.

Instructor
Explanation:
Points Received:

p. 211

1 of 1

Comments:
4. Question :
Student Answer:

A DBMS
makes the physical database available for different logical views.
makes the logical database available for different analytical views.
makes the physical database available for different analytical views.
makes the relational database available for different analytical views.

Instructor
Explanation:
Points Received:

p. 212

1 of 1

Comments:
5. Question :
Student Answer:

The logical view


shows how data are organized and structured on the storage media.
presents an entry screen to the user.
allows the creation of supplementary reports.
presents data as they would be perceived by end users.

Instructor
Explanation:
Points Received:

p. 212

1 of 1

Comments:
6. Question :

The type of logical database model that treats data as if they were stored
in two-dimensional tables is the

Student Answer:

OODBMS.
pre-digital DBMS.
relational DBMS.
hierarchical DBMS.

Instructor
Explanation:
Points Received:

p. 213

1 of 1

Comments:
7. Question :

A field identified in a table as holding the unique identifier of the table's


records is called the

Student Answer:

primary key.
key field.
primary field.
unique ID.

Instructor
Explanation:
Points Received:

p. 213

1 of 1

Comments:
8. Question :
Student Answer:

The data dictionary serves as an important data management tool by


assigning attributes to the data.
creating an inventory of data contained in the database.
presenting data as end users or business specialists would perceive
them.
maintaining data in updated form.

Instructor
Explanation:
Points Received:

p. 217

1 of 1

Comments:
9. Question :

An automated or manual file that stores information about data elements


and data characteristics such as usage, physical representation,
ownership, authorization, and security is the

Student Answer:

data dictionary.
data definition diagram.
entity-relationship diagram.
relationship dictionary.

Instructor
Explanation:
Points Received:

p. 217

1 of 1

Comments:
10. Question :

Which is the type of database management approach that can handle a


large number of pages or documents?

Student Answer:

Hierarchical DBMS
Relational DBMS
Network DBMS

Instructor
Explanation:
Points Received:

NoSQL
Week 3 Lecture

1 of 1

Comments:
11. Question :
Student Answer:

Which is the most prominent data manipulation language today?


Access
DB2
SQL

Instructor
Explanation:
Points Received:

Crystal Reports
pp. 217218

1 of 1

Comments:
12. Question :
Student Answer:

DBMSs typically include report-generating tools in order to


retrieve and display data.
display data in an easier-to-read format.
display data in graphs.
perform predictive analysis.

Instructor
Explanation:
Points Received:

p. 219

1 of 1

Comments:
13. Question :

A schematic of the entire database that describes the relationships in a


database is called

Student Answer:

the data dictionary.


the intersection relationship diagram.
the entity-relationship diagram.
the data definition diagram.

Instructor

p. 221

Explanation:
Points Received:

1 of 1

Comments:
14. Question :

What is the process of streamlining data to minimize redundancy and


awkward many-to-many relationships?

Student Answer:

Normalization
Data scrubbing
Data cleansing
Data defining

Instructor
Explanation:
Points Received:

p. 219

1 of 1

Comments:
15. Question :
Student Answer:

Cloud computing offers


no database functions.
some database functions.
products only from Amazon and Microsoft.
None of the above

Instructor
Explanation:
Points Received:

p. 217

1 of 1

Comments:
16. Question :
Student Answer:

A data warehouse is composed of


historical data from legacy systems.
current data.
internal and external data sources.
historic and current internal data.

Instructor
Explanation:
Points Received:

p. 222

1 of 1

Comments:
17. Question :

A data mart usually can be constructed more rapidly and at lower cost
than a data warehouse because

Student Answer:

a data mart typically focuses on a single subject area or line of


business.
all the information is historical.
a data mart requires a Web interface.
all of the information belongs to a single company.

Instructor
Explanation:
Points Received:

p. 223

1 of 1

Comments:
18. Question :
Student Answer:

Data mining is a tool that allows users to


quickly compare transaction data gathered over many years.
find hidden relationships in data.
obtain online answers to ad hoc questions in a rapid amount of time.

Instructor
Explanation:
Points Received:

summarize massive amounts of data into much smaller, traditional


reports.
p. 224

1 of 1

Comments:
19. Question :

What is the tool that enables users to view the same data in different
ways using multiple dimensions?

Student Answer:

Predictive analysis
SQL
OLAP
Data mining

Instructor
Explanation:
Points Received:

p. 224

1 of 1

Comments:
20. Question :
Student Answer:

OLAP is a tool that enables


users to obtain online answers to ad hoc questions in a short amount
of time.
users to view both logical and physical views of data.
programmers to quickly diagram data relationships.

programmers to normalize data.

Instructor
Explanation:
Points Received:

p. 224

1 of 1

Comments:

WEEK 4

1. Question :

A device that acts as a connection point between computers and that can
filter and forward data to a specified destination is called a

Student Answer:

hub.
switch.
router.
NIC.

Instructor
Explanation:
Points Received:

p. 248

1 of 1

Comments:
2. Question :
Student Answer:

Which device sends data packets to all connected devices in a network?


Network interface card
Hub
Router
None of the above

Instructor
Explanation:
Points Received:

p. 248

1 of 1

Comments:
3. Question :

The method of slicing digital messages into parcels, transmitting them


along different communication paths, and reassembling them at their
destination is called

Student Answer:

multiplexing.
packet switching.
packet routing.
ATM.

Instructor

p. 250

Explanation:
Points Received:

1 of 1

Comments:
4. Question :

What is the most important communication standard today for linking


disparate computers and networks?

Student Answer:

Transmission Control Protocol/Internet Protocol (TCP/IP)


International Standards Organization (ISO)
Open Systems Interconnection (OSI)
File Transfer Protocol (FTP)

Instructor
Explanation:
Points Received:

p. 251

1 of 1

Comments:
5. Question :
Student Answer:

In TCP/IP, IP is responsible for


disassembling and reassembling packets during transmission.
establishing an Internet connection between two computers.
moving packets over the network.
sequencing the transfer of packets.

Instructor
Explanation:
Points Received:

p. 251

0 of 1

Comments:
6. Question :
Student Answer:

On which protocol is the Internet based?


TCP/IP
FTP
Packet switching
Frame relay

Instructor
Explanation:
Points Received:

p. 251

1 of 1

Comments:
7. Question :
Student Answer:

All network computers connect to a single hub in a


star network.

bus network.
domain network.
peer-to-peer network.

Instructor
Explanation:
Points Received:

p. 254

1 of 1

Comments:
8. Question :
Student Answer:

In a bus network,
signals are broadcast to the next station.
signals are broadcast in both directions to the entire network.
multiple hubs are organized in a hierarchy.
messages pass from computer to computer in a loop.

Instructor
Explanation:
Points Received:

p. 254

1 of 1

Comments:
9. Question :

A network that covers a large geographic area is most commonly referred


to as a(n)

Student Answer:

local area network .


intranet.
peer-to-peer network.
wide area network.

Instructor
Explanation:
Points Received:

p. 254

1 of 1

Comments:
10. Question :

Which communications medium uses single copper wire surrounded by


thick insulation?

Student Answer:

Twisted pair cable


A satellite
Optical fiber
Coaxial cable

Instructor
Explanation:

p. 255

Points Received:

1 of 1

Comments:
11. Question :

Which type of signal follows a straight line and does not bend with the
curve of the Earth?

Student Answer:

Radio
Satellite
Microwave
Fiber optic

Instructor
Explanation:
Points Received:

p. 256

1 of 1

Comments:
12. Question :
Student Answer:

Data is sent through the fiber optic cable by a


router.
laser device.
optical device.
multiplexer.

Instructor
Explanation:
Points Received:

p. 255

1 of 1

Comments:
13. Question :
Student Answer:

A domain name server


provides interconnectivity on the Internet.
serves a single domain.
converts domain names to IP addresses.
prevents hackers from bringing down the Internet.

Instructor
Explanation:
Points Received:

p. 255

0 of 1

Comments:
14. Question :
Student Answer:

Net neutrality means


that everyone pays the same for Internet access.

that everyone has equal access to information on the Internet.


that cable providers can charge different prices based on bandwidth.
that there will be no federal regulation of the Internet.

Instructor
Explanation:
Points Received:

p. 262

1 of 1

Comments:
15. Question :
Student Answer:

Which technology uses the Internet Protocol to deliver voice information


in digital form using packet switching?
TCP/IP
VPN
VoIP

Instructor
Explanation:
Points Received:

None; voice information is digitally delivered using ATM.


Week 4 Lecture, p. 265

1 of 1

Comments:
16. Question :
Student Answer:

In the cloud computing model,


servers to support intranet and extranet are virtualized to a cloud.
enterprise networks disappear.
users lose access to certain applications.

Instructor
Explanation:
Points Received:

corporate resources increase.


Week 4 Lecture

1 of 1

Comments:
17. Question :
Student Answer:

A cloud computing model


reduces the staff required to operate a typical IT organization.
increases the staff required to operate a typical IT organization.
does not change the staff required to operate a typical IT
organization.

Instructor
Explanation:

moves all IT infrastructure to the cloud.


Week 4 Lecture

Points Received:

0 of 1

Comments:
18. Question :
Student Answer:

Cost reductions in using cloud based services stem from


reductions in staff.
reductions in energy usage.
reductions in servers.

Instructor
Explanation:
Points Received:

All of the above


Week 4 Lecture

1 of 1

Comments:
19. Question :

In an RFID system, a(n) _____ is electronically programmed with


information that can uniquely identify an item, such as an electronic code.

Student Answer:

reader
antenna
microchip
tag

Instructor
Explanation:
Points Received:

p. 279

1 of 1

Comments:
20. Question :
Student Answer:

The cloud computing model described in the lecture is an example of


which cloud computing model?
SaaS (Software as a Service)
Cloud based operating systems
Virtualization of servers

Instructor
Explanation:
Points Received:
Comments:

WEEK 5

Cloud based applications


Week 4 Lecture

1 of 1

1. Question :

Which type of infrastructure services provides voice and video


connectivity to employees, customers, and suppliers?

Student Answer:

Networking
Telephone
VOIP
Telecommunications

Instructor
Explanation:
Points Received:

p. 165

1 of 1

Comments:
2. Question :

Specifications that establish the compatibility of products and the ability to


communicate in a network are called

Student Answer:

network standards.
telecommunications standards.
technology standards.
Internet standards.

Instructor
Explanation:
Points Received:

p. 174

1 of 1

Comments:
3. Question :

_____ unleash powerful economies of scale and result in declines in


manufactured computer products.

Student Answer:

Internet and web technologies


Technology standards
Linux and open-source software
Client/server technologies

Instructor
Explanation:
Points Received:

p. 174

1 of 1

Comments:
4. Question :
Student Answer:

Which model can be used to analyze the direct and indirect costs to help
firms determine the actual cost of specific technology implementations?
Total cost of ownership
Return on investment
Breakeven point

Cost benefit analysis

Instructor
Explanation:
Points Received:

p. 196

1 of 1

Comments:
5. Question :

The practice of contracting custom software development to an outside


firm is commonly referred to as

Student Answer:

outsourcing.
scaling.
service-oriented architecture.
application integration.

Instructor
Explanation:
Points Received:

p. 191

1 of 1

Comments:
6. Question :

What is the act of providing hardware and software capabilities as


services over the Internet?

Student Answer:

Autonomic computing
Cloud computing
Grid computing
Outsourcing

Instructor
Explanation:
Points Received:

p. 183

1 of 1

Comments:
7. Question :
Student Answer:

In order to achieve maximum benefit from an enterprise software


package, a business
customizes the software to match all of its business processes.
uses only the processes in the software that match its own
processes.
changes the way it works to match the software business processes.

Instructor
Explanation:

selects only the software that best matches its existing business
processes.
p. 339

Points Received:

1 of 1

Comments:
8. Question :

Which best describes a suite of integrated software modules for finance


and accounting, human resources, manufacturing and production, and
sales and marketing that allows data to be used by multiple functions and
business processes?

Student Answer:

Process management software


ERP systems
Groupware
Application software

Instructor
Explanation:
Points Received:

p. 338

1 of 1

Comments:
9. Question :
Student Answer:

Which type of software enables data to be used by multiple functions and


business processes for organization coordination and control?
Groupware
Application software
Collaboration software

Instructor
Explanation:
Points Received:

Enterprise software
pp. 339340

1 of 1

Comments:
10. Question :
Student Answer:

Which type of software is built around thousands of predefined business


processes?
Process management software
Collaboration software
Enterprise software

Instructor
Explanation:
Points Received:
Comments:

Groupware
pp. 338339

1 of 1

11. Question :

A company's suppliers, their supplier's suppliers, and the processes for


managing relationships with them constitute

Student Answer:

the supplier's internal supply chain.


the external supply chain.
the upstream portion of the supply chain.
the downstream portion of the supply chain.

Instructor
Explanation:
Points Received:

p. 341

1 of 1

Comments:
12. Question :

A company's organizations and processes for distributing and delivering


products to the final customers constitute

Student Answer:

the supplier's internal supply chain.


the external supply chain.
the upstream portion of the supply chain.
the downstream portion of the supply chain.

Instructor
Explanation:
Points Received:

p. 341

1 of 1

Comments:
13. Question :
Student Answer:

Inefficiencies arise in a supply chain because of


inaccurate or untimely information.
poor integration between systems of suppliers, manufacturers, and
distributors.
inefficient or inaccurate systems.
unforeseeable events.

Instructor
Explanation:
Points Received:

p. 344

1 of 1

Comments:
14. Question :
Student Answer:

Companies with effective supply chain management systems can expect


improved customer service and responsiveness.
cost reduction.
reduced inventory levels.

All of the above

Instructor
Explanation:
Points Received:

p. 344

1 of 1

Comments:
15. Question :

When tailoring a particular aspect of a system to the way a company does


business, enterprise software can provide the company with

Student Answer:

configuration tables.
Web services.
data dictionaries.
middleware.

Instructor
Explanation:
Points Received:

p. 338

1 of 1

Comments:
16. Question :

A scheduling system for minimizing inventory by having components


arrive exactly at the moment they are needed and finished goods shipped
as soon as they leave the assembly line best describes a _____ strategy.

Student Answer:

just-in-time
frictionless
bullwhip
safety-stock

Instructor
Explanation:
Points Received:

p. 342

1 of 1

Comments:
17. Question :
Student Answer:

Enterprise application vendors have created _____ to make their own


customer relationship management, supply chain management, and
enterprise systems work closely together.
e-business suites
ERP systems
middleware

Instructor
Explanation:

legacy systems
pp. 356357

Points Received:

1 of 1

Comments:
18. Question :

_____ integrate(s) multiple applications from multiple business functions,


business units, or business partners to deliver a seamless experience for
the customer, employee, manager, or business partner and provide(s) a
greater degree of cross-functional integration than the traditional
enterprise applications.

Student Answer:

PRM software
SFA software
ERP suites
Service platforms

Instructor
Explanation:
Points Received:

p. 360

1 of 1

Comments:
19. Question :

Which metric is based on the relationship between the revenue produced


by a specific customer, the expenses incurred in acquiring and servicing
that customer, and the expected life of the relationship between the
customer and the company?

Student Answer:

Churn rate
CLTV
Cost per lead
Cost per sale

Instructor
Explanation:
Points Received:

p. 355

1 of 1

Comments:
20. Question :
Student Answer:

Operational CRM applications include tools for


identifying buying patterns.
calculating CLTV.
sales force automation.
pinpointing unprofitable customers.

Instructor
Explanation:
Points Received:

p. 354

1 of 1

Comments:

WEEK 6

1. Question :

What will you need to understand and measure for an effective


reengineering project?

Student Answer:

Cost and risk


Performance of existing processes for a baseline
Strategic analysis and workflow
Inputs and outputs

Instructor
Explanation:
Points Received:

p. 492

1 of 1

Comments:
2. Question :

Enabling organizations to make continual improvements to many


business processes and to use processes as the fundamental building
blocks of corporate information systems is the goal of

Student Answer:

BPM.
BPR.
reengineering.
workflow management.

Instructor
Explanation:
Points Received:

p. 492

1 of 1

Comments:
3. Question :
Student Answer:

The _____ is directly responsible for the individual systems project.


project management group
project team
IS steering committee
corporate strategic planning committee

Instructor
Explanation:
Points Received:
Comments:

p. 532

1 of 1

4. Question :

Which process develops a detailed description of the functions that a new


information system must perform?

Student Answer:

Feasibility study
Requirements analysis
Systems design
Test plan development

Instructor
Explanation:
Points Received:

p. 497

1 of 1

Comments:
5. Question :
Student Answer:

The entire system-building effort is driven by


organizational change.
feasibility studies.
the information value change.
user information requirements.

Instructor
Explanation:
Points Received:

p. 497

1 of 1

Comments:
6. Question :
Student Answer:

Systems design
describes what a system should do to meet information
requirements.
shows how the new system will fulfill the information requirements.
always tries to increase precision.
includes the testing phases.

Instructor
Explanation:
Points Received:

p. 498

1 of 1

Comments:
7. Question :
Student Answer:

Transferring transaction data from a legacy system to the new system


would be defined by which category of system design specifications?
Input
Database
Manual procedures

Conversion

Instructor
Explanation:
Points Received:

p. 500

1 of 1

Comments:
8. Question :

What is the primary driving factor in firms to select domestic outsourcing


firms to build system solutions?

Student Answer:

To take advantage of technical skills the firm does not have


To save labor costs
To avoid change management issues
All of the above

Instructor
Explanation:
Points Received:

p. 511

1 of 1

Comments:
9. Question :

The four kinds of structural organizational change enabled by IT, in order


from least to most risky, are

Student Answer:

rationalization, automation, reengineering, and redesigning.


rationalization, automation, reengineering, and paradigm shift.
automation, rationalization, reengineering, and paradigm shift.
automation, redesigning, restructuring, and paradigm shift.

Instructor
Explanation:
Points Received:

p. 489

1 of 1

Comments:
10. Question :
Student Answer:

Traditional software development methodologies often fail because


insufficient funds are allocated.
users are not an integral part of the development process.
not enough planning is done.
the IT staff does not have the necessary skills.

Instructor
Explanation:
Points Received:
Comments:

p. 506

1 of 1

11. Question :

You have been hired by a pharmaceutical company to evaluate its


inventory of systems and IT projects. Which types of projects would be
best avoided?

Student Answer:

Any high-risk projects


Any low-benefit projects
All high-risk, low benefit projects
None; any project might be beneficial

Instructor
Explanation:
Points Received:

p. 535

1 of 1

Comments:
12. Question :

To best evaluate, from a financial standpoint, an IT investment whose


benefits cannot be firmly established in advance, you would use

Student Answer:

capital budgeting.
the real option pricing model.
the scoring model.
net present value.

Instructor
Explanation:
Points Received:

p. 538

1 of 1

Comments:
13. Question :

What do many companies overlook when making information system


investment decisions?

Student Answer:

Benefits from the new system


Organizational disruption costs
Social and organizational dimensions
All of the above

Instructor
Explanation:
Points Received:

p. 539

1 of 1

Comments:
14. Question :
Student Answer:

Information systems projects are valued similarly to stock options in which


model of financial evaluation?
IRR

Real options pricing model


Capital budgeting
Accounting rate of return on ROI

Instructor
Explanation:
Points Received:

p. 538

1 of 1

Comments:
15. Question :
Student Answer:

An example of an external integration tool would be:


to define task dependencies.
to include user representatives as active members of the project
team.
to create a PERT chart.
to hold frequent project team meetings.

Instructor
Explanation:
Points Received:

p. 545

1 of 1

Comments:
16. Question :
Student Answer:

Agile methodologies emphasize


thorough planning before the project starts.
sequential execution of the six steps of system development.
isolation of users from developers.

Instructor
Explanation:
Points Received:

incremental development of small working pieces of the project.


Week 6 Lecture

1 of 1

Comments:
17. Question :
Student Answer:

The major variables in project management are


scope, time, cost, and performance.
scope, time, cost, quality, and risk.
time, cost, quality, performance, and risk.
time, cost, scope, and performance.

Instructor
Explanation:

p. 490

Points Received:

1 of 1

Comments:
18. Question :

Using a strategic analysis approach, an organization's information


requirements are known through a small number of

Student Answer:

milestones and dates.


critical success factors.
key management decisions.
organizational changes.

Instructor
Explanation:
Points Received:

p. 506

1 of 1

Comments:
19. Question :

In which approach to systems building are the development stages


organized so that tasks in one stage are completed before the tasks in the
next stage have begun?

Student Answer:

Traditional
Prototyping
RAD
All of the above

Instructor
Explanation:
Points Received:

p. 514

1 of 1

Comments:
20. Question :

The process of building an experimental system quickly and inexpensively


for demonstration and evaluation so that users can better determine
information requirements.

Student Answer:

agile.
JAD.
prototyping.
agile or prototyping.

Instructor
Explanation:
Points Received:
Comments:

p. 507

1 of 1

WEEK 7

1. Question :
Student Answer:

Social media sites result in loss of personal information because


sites lack appropriate tools to prevent security fraud.
hackers spend more time working to penetrate the sites.
users are not careful and share inappropriate business or personal
information.

Instructor
Explanation:
Points Received:

Wikileaks is publishing social media site information.


Week 7 Lecture

1 of 1

Comments:
2. Question :
Student Answer:

Information systems
pose traditional ethical situations in new manners.
raise new ethical questions.
raise the same ethical questions created by the Industrial Revolution.

Instructor
Explanation:
Points Received:

raise ethical questions primarily related to information rights and


obligations.
p. 124

1 of 1

Comments:
3. Question :

The feature of social institutions that means mechanisms are in place to


determine responsibility for an action is called

Student Answer:

due process.
accountability.
courts of appeal.
the judicial system.

Instructor
Explanation:
Points Received:

p. 129

1 of 1

Comments:
4. Question :
Student Answer:

The process in law-governed societies in which laws are known and


understood and there is an ability to appeal to higher authorities to ensure
that the laws are applied correctly is called
liability.

due process.
courts of appeal.
FOI appeals.

Instructor
Explanation:
Points Received:

p. 129

1 of 1

Comments:
5. Question :
Student Answer:

Immanuel Kant's Categorical Imperative states that


if an action cannot be taken repeatedly, then it is not right to be taken
at any time.
one should take the action that produces the least harm or incurs the
least cost.
one can put value in rank order and understand the consequences of
various courses of action.

Instructor
Explanation:
Points Received:

if an action is not right for everyone to take, it is not right for anyone
to take.
p. 130

1 of 1

Comments:
6. Question :
Student Answer:

The ethical "no free lunch" rule states that


if an action cannot be taken repeatedly, then it is not right to be taken
at any time.
one should take the action that produces the least harm or incurs the
least cost.
one can put values in rank order and understand the consequences
of various courses of action.

Instructor
Explanation:
Points Received:

everything is owned by someone else, and that the creator wants


compensation for this work.
p. 130

1 of 1

Comments:
7. Question :
Student Answer:

European privacy protection is _____ than in the United States.


less far-reaching
less liable to laws

much less stringent


much more stringent

Instructor
Explanation:
Points Received:

p. 134

1 of 1

Comments:
8. Question :
Student Answer:

Intellectual property can best be described as


intangible property created by individuals or corporations.
unique creative work or ideas.
tangible property created from a unique idea.

Instructor
Explanation:
Points Received:

the manifestation of an intangible idea.


pp. 138139

1 of 1

Comments:
9. Question :
Student Answer:

It is not feasible for companies to produce error-free software because


any programming code is susceptible to error.
it is not possible to create perfect software on a large scale.
errors can be introduced in the maintenance stage of development.
any software of any complexity will have errors.

Instructor
Explanation:
Points Received:

p. 143

1 of 1

Comments:
10. Question :
Student Answer:

The practice of spamming has been growing because


it is unregulated.
it is good advertising practice and brings in many new customers.
it helps pay for the Internet.
it is so inexpensive and can reach so many people.

Instructor
Explanation:
Points Received:
Comments:

p. 145

1 of 1

11. Question :

Which of the five moral dimensions of the information age does


spamming raise?

Student Answer:

Quality of life
System quality
Accountability and control

Instructor
Explanation:
Points Received:

Information rights and obligations


p.s 125126

1 of 1

Comments:
12. Question :

Policies, procedures, and technical measures used to prevent


unauthorized access, alteration, theft, or physical damage to information
systems refers to

Student Answer:

security.
controls.
benchmarks.
algorithms.

Instructor
Explanation:
Points Received:

p. 293

1 of 1

Comments:
13. Question :

Security challenges posed by the communications between layers in a


client/server environment are

Student Answer:

line taps and denial of service attacks.


tapping, sniffing, and message alteration.
computer viruses, line taps, and loss of machine.
vandalism, theft and fraud, and line taps.

Instructor
Explanation:
Points Received:

p. 293

1 of 1

Comments:
14. Question :
Student Answer:

Phishing involves
redirecting users to a fraudulent website even when the user has
typed in the correct address in the Web browser.

pretending to be a legitimate business' representative in order to


garner information about a security system.
pretending that attached information is from a business associate, or
directing users to fake websites.
Using e-mails for threats and harassment.

Instructor
Explanation:
Points Received:

p. 301

1 of 1

Comments:
15. Question :
Student Answer:

Evil twins are


Trojan horses that appears to the user to be legitimate commercial
software applications.
E-mail messages that mimic the e-mail message of a legitimate
business.
Fraudulent websites that mimic a legitimate business's website.
bogus wireless networks that look legitimate to users.

Instructor
Explanation:
Points Received:

p. 301

1 of 1

Comments:
16. Question :
Student Answer:

The HIPAA Act of 1996


requires financial institutions to ensure the security of customer data.
specifies best practices in information systems security and control.
imposes responsibility on companies and management to safeguard
the accuracy of financial information.
outlines medical security and privacy rules.

Instructor
Explanation:
Points Received:

p. 306

1 of 1

Comments:
17. Question :
Student Answer:

Financial institutions are required to ensure the security and


confidentiality of customer data through the
Investor Protection Act.
Financial Services Modernization Act of 1999.
Financial Security Act of 1997.

Personal Security and Confidentiality Act of 1986.

Instructor
Explanation:
Points Received:

p. 306

1 of 1

Comments:
18. Question :

Automated data are more susceptible to destruction, fraud, error, and


misuse because information systems concentrate data in computer files
that

Student Answer:

are usually embedded in legacy systems that are easy to access.


are not secure because the technology to secure them did not exist
at the time the files were created.
have the potential to be accessed by large numbers of people and by
groups outside of the organization.
are frequently available on the Internet.

Instructor
Explanation:
Points Received:

p. 293

1 of 1

Comments:
19. Question :
Student Answer:

The vulnerability inherent in wireless networking is due to


use of the SSIDs.
broken encryption or users who do not set up secure systems.
the lack of robust encryption capabilities.
the lack of protection against war driving.

Instructor
Explanation:
Points Received:

p. 317

1 of 1

Comments:
20. Question :
Student Answer:

Statement ranking information risks are included in a(n)


security policy.
AUP.
risk assessment.
business impact analysis.

Instructor
Explanation:
Points Received:

p. 310

1 of 1

Comments:

You might also like