Professional Documents
Culture Documents
Multiple Choice
What is the most important reason for Google being
able to pursue four business strategies
simultaneously?
A. The company has a global platform.
B. The company has a huge amount of cash reserves.
C. The companys platform enables it to develop
applications quickly and deliver applications and
results to users almost instantaneously.
D. The company saw that Microsoft was vulnerable
as a result of Microsofts proprietary software model.
E. The company has excellent employee benefits.
ANS: C
REF: Chapter 1 opening case
Which of the following statements is not correct?
A. To succeed in todays environment, it is often
necessary to change business models and strategies.
B. IT enables organizations to survive in the face of
business pressures.
C. IT requires small investments over a long period
of time.
D. Organizations can leverage their platforms to
develop Web-based applications, products, and
services.
ANS: C
REF: Material following chapter opening case
The fact that you practice continuous computing
means all of the following except:
A. You are surrounded by a movable information
network.
B. You can pull information about almost everything
from anywhere all the time.
C. You can push your ideas to the Web.
D. Your daily routines are exactly the same as
students 20 years ago, but you can do your tasks
much slower and with more effort.
C. competitive
D. relatively static
E. real-time
ANS: D
REF: Material following chapter opening case
_____ deal with the planning for and the
development, management, and use of technology
to help people perform their tasks related to
information processing.
A. IT architecture
B. IT infrastructure
C. information technology
D. management information systems
E. IT services
ANS: D
REF: 1.1 Information Systems: Concepts and
Definitions
_____ conveys understanding, accumulated learning,
and expertise as they apply to a current problem.
A. data
B. information
C. knowledge
D. experience
E. wisdom
ANS: C
REF: 1.1 Information Systems: Concepts and
Definitions
_____ is (are) data that have been organized to have
meaning and value to a recipient.
A. data
B. information
C. knowledge
D. experience
E. wisdom
ANS: D
REF: Material following chapter opening case
ANS: B
REF: 1.1 Information Systems: Concepts and
Definitions
C. knowledge
D. experience
E. wisdom
ANS: B
REF: 1.1 Information Systems: Concepts and
Definitions
ANS: E
REF: 1.1 Information Systems: Concepts and
Definitions
_____ are the computer hardware, software, and
communications technologies that are used by IT
personnel to produce IT services.
A. IT components
B. IT services
C. information technology
D. information system
E. computer-based information system
ANS: A
REF: 1.1 Information Systems: Concepts and
Definitions
An organizations _____ consists of the physical
facilities, IT components, IT services, and IT
management that will support the entire organization.
A. information technology architecture
B. information technology infrastructure
C. information technology
D. information system
E. computer-based information system
ANS: B
REF: 1.1 Information Systems: Concepts and
Definitions
_____ is the integration of economic, social, cultural,
and ecological facets of life, enabled by information
technologies.
A. regionalization
B. nationalization
C. globalization
D. business environment
ANS: C
REF: 1.2 The Global, Web-Based Platform
The Global, Web-Based Platform enables individuals
to do which of the following?
A. connect, compute, communicate, collaborate, and
compete everywhere and all the time
B. access information, services, and entertainment
C. exchange knowledge
D. produce and sell goods and services
E. all of the above
ANS: E
REF: 1.2 The Global, Web-Based Platform
The force behind globalization in _____ was the
amount of muscle, horsepower, wind power, or steam
power that a country could deploy.
A. Globalization 1.0
B. Globalization 2.0
C. Globalization 3.0
D. None of these
ANS: A
REF: 1.2 The Global, Web-Based Platform
ANS: B
REF: 1.2 The Global, Web-Based Platform
ANS: B
REF: 1.2 The Global, Web-Based Platform
C. offshoring
D. outsourcing
E. uploading
ANS: D
REF: 1.2 The Global, Web-Based Platform
If UPS is taking Dell computers at the loading dock,
and then shipping them to Dell customers, then Dell
is practicing which of the following?
A. informing
B. insourcing
C. offshoring
D. outsourcing
E. uploading
ANS: B
REF: 1.2 The Global, Web-Based Platform
_____ means that you can create content and send or
post it to the Web.
A. informing
B. insourcing
C. delivering
D. participating
E. uploading
ANS: E
REF: 1.2 The Global, Web-Based Platform
If your university hires a company to manage its
entire human resources function, then your university
is practicing _____.
A. insourcing
B. outsourcing
C. offshoring
D. temporary hiring
E. consulting
ANS: B
REF: 1.2 The Global, Web-Based Platform
ANS: D
REF: 1.2 The Global, Web-Based Platform
_____ involves taking a specific function that your
company was doing itself, having another company
perform that same function for you, and then
integrating their work back into your operation.
A. informing
B. insourcing
Chapter 2
Multiple Choice
Which of the following statements about information
systems is not correct?
A. Information systems are concentrated in the IS
Department.
B. Information systems tend to follow the structure of
the organization.
C. Information systems are based on the needs of
employees.
D. Any information system can be strategic.
E. Managing information systems is difficult.
Ans: A
Ref: Discussion immediately following Chapter
opening case
A collection of related files, tables, and so on that
stores data and the associations among them is
_____.
A. hardware
B. software
C. database
D. network
E. procedures
Ans: C
Ref: 2.1 Types of Information Systems
A set of programs that enable the hardware to process
data is _____.
A. hardware
B. software
C. database
D. network
E. procedures
Ans: B
Ref: 2.1 Types of Information Systems
Which of the following is not a major capability of
information systems?
A. perform high-speed, high-volume numerical
computations
B. provide fast, accurate communications among
organizations
C. store very small amounts of information in a very
large space
D. increase the effectiveness and efficiency of people
working in groups
E. automate semiautomatic business processes
Ans: C
Ref: 2.1 Types of Information Systems
Two information systems that support the entire
organization are:
A. Enterprise resource planning systems, dashboards
B. Transaction processing systems, office automation
systems
C. Enterprise resource planning systems, transaction
processing systems
D. Expert systems, office automation systems
E. Expert systems, transaction processing systems
Ans: C
Ref: 2.1 Types of Information Systems
_____ systems are designed to correct a lack of
communications among _____.
A. Office automation systems, expert systems
C. knowledge workers
D. middle level managers
E. executives
Ans: C
Ref: 2.1 Types of Information Systems
Ans: C
Ref: 2.1 Types of Information Systems
Ans: E
Ref: 2.1 Types of Information Systems
_____ attempt to duplicate the work of human
experts by applying reasoning capabilities.
A. expert systems
B. dashboards
C. functional area information systems
D. decision support systems
E. business intelligence systems
Ans: A
Ref: 2.1 Types of Information Systems
An information system that analyzes credit card
applications and suggests approval or denial is a(n):
A. expert system
B. dashboard
C. functional area information system
D. decision support system
E. business intelligence system
Ans: A
Ref: 2.1 Types of Information Systems
_____ provide rapid access to timely information
and direct access to structured information in the
form of reports.
A. expert systems
B. dashboards
C. functional area information systems
D. decision support systems
E. business intelligence systems
Ans: B
Ref: 2.1 Types of Information Systems
Ans: D
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Competitive advantage for an organization manifests
as all of the following except:
A. lower costs
B. higher quality
C. increased time to market
D. increased profits
E. increased speed
Ans: C
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
For most companies, the Web _____ the threat that
new competitors will enter the market by _____
traditional barriers to entry.
A. decreases, increasing
B. increases, decreasing
C. increases, increasing
D. decreases, decreasing
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
_____ is a feature that must be offered by a
competing organization for it to survive in the
marketplace.
A. Competitive advantage
B. Entry barrier
C. Strategic advantage
D. Rapid time-to-market
E. One-to-one marketing
Ans: B
Ans: D
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
The threat of competitors entering a market is very
high in industries that perform a(n) _____ role, and in
industries where the primary product or service is
_____.
A. intermediation, physical
B. broker, physical
C. sales, financial
D. financial, digital
E. intermediation, digital
Ans: E
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
The Internet has had which of the following impacts
on the way you purchase your textbooks?
A. The Internet gives you fewer choices.
B. The Internet increases your bargaining power.
C. The Internet provides you with less information.
D. The Internet decreases your bargaining power.
E. The Internet increases your switching costs.
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Buyer power is _____ when buyers have many
choices from whom to buy and _____ when buyers
have few choices.
A. high, the same
B. high, low
C. low, low
D. low, high
E. low, the same
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
The costs of delivering products in the _____ channel
are much higher than delivering products in the
_____ channel.
A. e-commerce, digital
B. digital, e-commerce
C. digital, physical
D. physical, financial
E. physical, digital
Ans: E
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Porters competitive forces model helps organizations
identify _____, where his value chain model helps
organizations identify specific _____.
A. competitive opportunities, activities
B. general strategies, activities
C. activities, competitive opportunities
D. activities, general strategies
E. primary activities, support activities
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
_____ activities create value for which customers are
willing to pay, where _____ activities do not add
value directly to the firms products or services.
A. Support, primary
B. Human resource management, inbound logistics
C. Procurement, operations
D. Primary, support
E. Accounting, outbound logistics
Ans: D
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
If there are _____ substitutes for an organizations
products or services, then the threat of substitutes is
_____.
A. many, high
B. few, few
C. few, high
D. many, few
E. few, negligible
Ans: A
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
New technologies can produce new products very
_____, which _____ the threat from substitute
products.
A. slowly, decreases
B. slowly, increases
C. slowly, does not affect
D. quickly, increases
E. quickly, does not affect
Ans: D
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
The visibility of Internet applications on the Web
makes proprietary systems more difficult to keep
secret. This is an example of which of Porters five
forces?
A. threat of entry of new competitors
B. bargaining power of suppliers
C. bargaining power of customers
D. threat of substitute products
E. rivalry among existing firms in an industry
Ans: E
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Wal-Marts automatic replenishment system, which
enables the company to reduce inventory storage
requirements, is an example of which strategy for
competitive advantage?
A. cost leadership
B. differentiation
C. innovation
D. operational effectiveness
E. customer-orientation
Ans: A
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Offering different products, services, or product
features is which strategy for competitive advantage?
A. cost leadership
B. differentiation
C. innovation
D. operational effectiveness
E. customer-orientation
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Introducing new products and putting new features in
existing products is which strategy for competitive
advantage?
A. cost leadership
B. differentiation
C. innovation
D. operational effectiveness
E. customer-orientation
Ans: C
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
The introduction of ATM machines by Citibank was a
classic example of which strategy for competitive
advantage?
A. cost leadership
B. innovation
C. differentiation
D. operational effectiveness
E. customer-orientation
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Southwest Airlines low-cost, short-haul strategy is
an example of which strategy for competitive
advantage?
A. cost leadership
B. differentiation
C. innovation
D. operational effectiveness
E. customer-orientation
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
10
Ans: E
Ref: 2.4 Managing Information Resources
Ans: D
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Which of the following statements about the impact
of IT on managers is not correct?
A. IT makes managers more productive.
B. IT increase the number of employees who can
report to one manager.
C. IT will increase the number of managerial levels in
an organization.
D. IT will reduce the number of line and staff
managers.
Ans: C
Ref: 2.3 Why Are Information Systems So Important
to Us?
Which of the following statements concerning
information resources is not correct?
A. Information resources include all the hardware,
information systems and applications, data, and
networks in an organization.
B. Without their information resources, organizations
cannot function.
C. Information resources typically do not change
quickly.
D. Information resources are expensive to acquire,
operate, and maintain.
Ans: C
Ref: 2.4 Managing Information Resources
_____ is the direct use of information systems by
employees in their work.
A. Transaction processing systems
B. Executive information systems
Technology Guide 1
Multiple Choice
11
Ans: A
Ref: TG1.2 The Central Processing Unit
The _____ is the size of the physical paths down
which the data and instructions travel in the CPU.
A. clock speed
B. word length
C. bus width
D. line width
E. bandwidth
Ans: C
Ref: TG1.2 The Central Processing Unit
The _____ is the distance between transistors on a
chip.
A. clock speed
B. word length
C. bus width
D. line width
E. bandwidth
Ans: D
Ref: TG1.2 The Central Processing Unit
Gordon Moore (with Moores Law) predicted that
microprocessor complexity would do which of the
following?
A. Double every year
B. Double every two years
C. Increase slowly
D. Decrease slowly
E. Decrease rapidly
Ans: B
Ref: TG1.2 The Central Processing Unit
Increased microprocessor complexity comes from
which of the following?
A. Decreasing line width
B. Increasing transistor miniaturization
C. Using new materials for the chip that increase
conductivity
D. Putting more transistors on the chip
E. All of the above
Ans: E
Ref: TG1.2 The Central Processing Unit
12
C. Archival data
D. Operating system programs
E. None of the above
Ans: E
Ref: TG1.3 Computer Memory
Ans: C
Ref: TG1.3 Computer Memory
Ans: E
Ref: TG1.3 Computer Memory
Which of the following is not a type of primary
storage?
A. Register
B. Random access memory
C. Flash memory
D. Read-only memory
E. Cache memory
Ans: C
Ref: TG1.3 Computer Memory
The part of primary storage that holds a software
program (or portion of it) and small amounts of data
when they are brought from secondary storage is
called
A. read-only memory
B. random access memory
C. cache memory
D. registers
E. flash memory
Ans: B
Ref: TG1.3 Computer Memory
Random access memory is _____ and _____.
A. volatile, temporary
B. nonvolatile, permanent
C. nonvolatile, temporary
D. volatile, permanent
E. None of the above
Ans: A
Ref: TG1.3 Computer Memory
13
Ans: D
Ref: TG1.3 Computer Memory
Which of the following is not a type of primary
storage?
A. Random access memory
B. Registers
C. Cache
D. Read-only memory
E. Optical Storage
Ans: E
Ref: TG1.3 Computer Memory
The type of primary storage, closest to the CPU
where the computer can temporarily store blocks of
data used most often is called
A. read-only memory
B. registers
C. random access memory
D. cache memory
E. flash memory
Ans: D
Ref: TG1.3 Computer Memory
The type of primary storage where certain critical
instructions are safeguarded because the storage is
nonvolatile and the instructions can be read only by
the computer and not changed by the user is called
A. read-only memory
B. random access memory
C. cache memory
D. registers
E. flash memory
Ans: A
Ref: TG1.3 Computer Memory
14
C. third generation
D. fourth generation
E. fifth generation
Ans: A
Ref: TG1.4 Computer Hierarchy
Ans: B
Ref: TG1.3 Computer Memory
_____, a type of enterprise storage system, links
groups of hard drives to a specialized
microcontroller, which coordinates the drives so they
appear to be a single, logical drive.
A. Redundant array of independent disks
B. Storage area network
C. Network-attached storage
D. Secondary storage
E. Primary storage
Ans: A
Ref: TG1.3 Computer Memory
_____, a type of enterprise storage system, is an
architecture for building dedicated networks that
allow rapid and reliable access to storage devices by
multiple servers.
A. Redundant array of independent disks
B. Storage area network
C. Network-attached storage
D. Secondary storage
E. Primary storage
Ans: B
Ref: TG1.3 Computer Memory
_____ are electronic storage devices that contain no
moving parts.
A. Hard drives
B. Flash memory devices
C. Magnetic tape
D. DVDs
E. CDs
Ans: B
Ref: TG1.3 Computer Memory
The _____ of computers used vacuum tubes to store
and process information.
A. first generation
B. second generation
15
Ans: A
Ref: TG1.4 Computer Hierarchy
Ans: C
Ref: TG1.4 Computer Hierarchy
Ans: B
Ref: TG1.4 Computer Hierarchy
A _____ is used in large enterprises for extensive
computing applications that are accessed by
thousands of concurrent users.
A. supercomputer
B. mainframe
C. midrange computer
D. microcomputer
E. laptop computer
Ans: B
Ref: TG1.4 Computer Hierarchy
Many firms are recentralizing their applications to
mainframes for which of the following reasons?
A. To support the large number of transactions caused
by electronic commerce
B. To reduce the total cost of ownership of distributed
systems
C. To simplify administration of IT resources
D. To improve system performance
E. all of the above
Ans: E
Ref: TG1.4 Computer Hierarchy
Ans: D
Ref: TG1.4 Computer Hierarchy
A _____ is the least expensive general-purpose
computer.
A. supercomputer
B. mainframe
C. midrange computer
D. microcomputer/personal computer
E. None of the above
Ans: D
Ref: TG1.4 Computer Hierarchy
_____ applies the unused processing resources of
many geographically dispersed computers in a
network to form a virtual supercomputer.
A. Server farm
B. Virtualization
C. Grid computing
D. Utility/Subscription computing
E. The Internet
Ans: C
Ref: TG1.6 Innovations in Hardware Utilization
In _____, a service provider makes computing
resources and infrastructure management available to
a customer as needed.
16
A. server farm
B. virtualization
C. grid computing
D. utility/subscription computing
E. the Internet
Ans: D
Ref: TG1.6 Innovations in Hardware Utilization
Ans: E
Ref: TG2.1 Significance of Software
Ans: A
Ref: TG1.6 Innovations in Hardware Utilization
Ans: B
Ref: TG2.1 Significance of Software
Ans: A
Ref: TG1.6 Innovations in Hardware Utilization
Ans: A
Ref: TG2.1 Significance of Software
Technology Guide 2
Multiple Choice
Over the past twenty years, hardware costs have
_____, while software costs have _____.
A. increased, increased
B. decreased, decreased
C. decreased, increased
D. increased, decreased
E. increased, remained level
Ans: C
Ref: TG2.1 Significance of Software
Today, software comprises a larger percentage of the
cost of modern computer systems than it did in the
early 1950s for which of the following reasons?
A. Hardware costs have decreased
Ans: E
Ref: TG2.1 Significance of Software
_____ are sequences of instructions used to direct
the workings of a computer.
A. Computer programs
B. Microcode instructions
C. Assembler commands
D. XML
E. Input/output instructions
17
Ans: A
Ref: TG2.1 Significance of Software
The set of computer programs used to manage
hardware resources is called
A. Microsoft Office Suite
B. application software
C. general software
D. systems software
E. personal application software
Ans: D
Ref: TG2.1 Significance of Software
The set of computer instructions that provides
specific functionality to a user is called
A. transaction processing software
B. application software
C. general software
D. systems software
E. microcode
Ans: B
Ref: TG2.1 Significance of Software
Which of the following is not a function of the
operating system?
A. Allocates CPU time and main memory to
programs running on the computer
B. Provides an interface between the user and the
hardware
C. Supervises the overall operation of the computer
D. Increases the complexity of the system to the user
E. None of the above
Ans: D
Ref: TG2.2 Systems Software
The main system control program is the _____.
A. operating system
B. cache software
C. virtual memory
D. security monitor
E. multithread register
Ans: A
Ref: TG2.2 Systems Software
18
B. application software
C. graphical user interface
D. plug-and-play
E. operating system
Ans: C
Ref: TG2.2 Systems Software
_____ are programs that sort records, create
directories and sub-directories, restore accidently
deleted files, and manage memory usage.
A. System utilities
B. General application software
C. Personal application software
D. System performance monitors
E. System security monitors
Ans: A
Ref: TG2.2 Systems Software
_____ are programs that manage the processing of
jobs on a computer system.
A. System utilities
B. General application software
C. Personal application software
D. System performance monitors
E. System security monitors
Ans: D
Ref: TG2.2 Systems Software
_____ are programs that protect a computer system
from unauthorized use, fraud, and destruction.
A. System utilities
B. General application software
C. Personal application software
D. System performance monitors
E. System security monitors
Ans: E
Ref: TG2.2 Systems Software
Creating specific application software using an
organizations own resources is called what?
A. Outsourcing
B. Consultant-based development
C. In-house development
D. Contract software
E. Application service providers
Ans: C
Ref: TG2.3 Application Software
Off-the-shelf software _____.
A. may not match an organizations current work
processes and data
B. is more flexible in making modifications
C. requires more risk because all features and
performance are not known
D. is rarely tested prior to release
Ans: A
Ref: TG2.3 Application Software
_____ programs are often used when analyzing
financial data.
A. Database
B. Word processing
C. Spreadsheet
D. Graphics
E. Communications
Ans: C
Ref: TG2.3 Application Software
Which of the following is not a characteristic of
todays typical software?
A. Efficient
B. Full of errors
C. Poorly designed
D. Expensive
E. An art as well as a science
Ans: A
Ref: TG2.4 Software Issues
Which of the following is not a factor in the
selection of software?
A. Size and location of the user base
B. Number of the databases required for the software
C. Costs
D. In-house technical skills
E. System capabilities
Ans: B
Ref: TG2.4 Software Issues
The concept of _____ refers to competing computing
products working together.
19
Ans: C
Ref: TG2.4 Software Issues
_____ is software whose source code is available at
no cost to developers and users.
A. Freeware
B. Shareware
C. Open systems
D. Open source software
E. Software-as-a-service
Ans: D
Ref: TG2.4 Software Issues
Which of the following is not an advantage of opensource software?
A. Produces high quality code
B. Produces code that can be changed to meet the
needs of the users
C. Bugs are discovered quickly
D. Limited support is available only through online
communities of core developers
E. Produces reliable code
Ans: D
Ref: TG2.4 Software Issues
Which of the following is not a disadvantage of opensource software?
A. Organizations need in-house technical support or a
maintenance contract from a third party
B. May not be easy to use
C. May take time and money to train users
D. May not be compatible with existing systems
20
Chapter 4
Multiple Choice
In the opening case of Chapter 4, which of the
following are problems that Panasonic faces when it
wants to introduce a new product?
A. The company has multiple sales subsidiaries and
manufacturing facilities.
B. The company has difficulties procuring the right
materials from the right sources.
C. Language barriers.
D. The amount of time required to modify product
materials for national product releases.
E. All of the above.
Ans: E
Ref: Chapter opening case
In the opening case of Chapter 4, what is the most
significant benefit of Panasonics new data
management system?
A. Cost savings
B. Improved time-to-market for products
C. Reduced time required for creating and
maintaining product information
D. Company moved from push inventory model to
pull model
E. Improved response to retailer orders
Ans: B
Ref: Chapter opening case
It is very difficult to manage data for which of the
following reasons?
A. amount of data stays about the same over time
B. data are scattered throughout organizations
21
Ans: A
Ref: 4.2 The Database Approach
_____ occurs when the same data are stored in many
places.
A. Data isolation
B. Data integrity
C. Data consistency
D. Data redundancy
E. Application/data dependence
Ans: D
Ref: 4.2 The Database Approach
_____ occurs when various copies of the data agree.
A. Data isolation
B. Data integrity
C. Data consistency
D. Data redundancy
E. Application/data dependence
Ans: C
Ref: 4.2 The Database Approach
You have moved to a different apartment, but your
electricity bill continues to go to your old address.
The Post Office in your town has a problem with its
data management, which is:
A. Data redundancy
B. Data inconsistency
C. Data isolation
D. Data security
E. Data dependence
Ans: B
Ref: 4.2 The Database Approach
A(n) _____ is a logical grouping of characters into a
word, a small group of words, or a complete number.
A. byte
B. field
C. record
D. file
E. database
Ans: B
Ref: 4.2 The Database Approach
22
Ans: A
Ref: 4.2 The Database Approach
At Umass, students can take more than one class, and
each class can have more than one student. This is an
example of what kind of relationship?
A. one-to-one
B. one-to-many
C. many-to-one
D. many-to-many
E. some-to-many
Ans: D
Ref: 4.2 The Database Approach
In a universitys relational database, the student
record contains information regarding the students
last name. The last name is a(n):
A. attribute
B. entity
C. primary key
D. object
E. file
Ans: A
Ref: 4.2 The Database Approach
In the relational database model, related tables can be
joined when they contain common _____.
A. Files
B. Rows
C. Records
D. Columns
Ans: D
Ref: 4.3 Database Management Systems
_____ tell the database management system which
records are joined with others in related tables.
A. Primary keys
B. Secondary keys
C. Common attributes
D. Common files
E. Common fields
Ans: A
Ref: 4.3 Database Management Systems
23
C. Query by example
D. Joining
E. Relational analysis
Ans: B
Ref: 4.3 Database Management Systems
When data are normalized, attributes in the table
depend only on the _____.
A. Common record
B. Common attribute
C. Primary key
D. Common row
Ans: C
Ref: 4.3 Database Management Systems
The data in a data warehouse have which of the
following characteristics?
A. are organized by subject
B. are coded in different formats
C. are updated in real time
D. are typically retained for a defined, but limited,
period of time
E. are organized in a hierarchical structure
Ans: A
Ref: 4.4 Data Warehousing
The data in a data warehouse:
A. Are updated constantly in real time
B. Are updated in batch mode, approximately once
per day
C. Are not updated
D. Are purged constantly as new data enter
E. Are available for MIS analysts, but not users
Ans: C
Ref: 4.4 Data Warehousing
The process of moving data from various sources into
the data warehouse is called:
A. Upload
B. Extract, transform, load
C. Online transaction processing
D. Master data management
E. Online analytical processing
Ans: B
Ref: Data Warehousing
24
Ans: A
Ref: 4.4 Data Warehousing
_____ is a formal approach to managing data
consistently across an entire organization.
A. Database management
B. Enterprise information management
C. Data warehousing
D. Data governance
E. Data mart
Ans : D
Ref : Data Governance
Difficulty : Easy
_____ provides companies with a single version of
the truth for their data.
A. Data warehouse
B. Data mart
C. Database
D. Master data management
E. Enterprise information management
Ans: D
Ref: 4.5 Data Governance
_____ describe the activities of the business, where
_____ categorize, aggregate, and evaluate data
generated by the organizations activities.
A. Transaction data, master data
B. Source data, transaction data
C. Operational data, master data
D. Master data, source data
E. Business dimensional data, databases
Ans: A
Ref: 4.5 Data Governance
_____ is a process that helps organizations identify,
select, organize, disseminate, transfer, and apply
expertise that are part of the organizations memory
25
D. Improved morale
E. More efficient product development
Ans: B
Ref: Knowlege Management
26