You are on page 1of 12

Chapter 1 Quiz

1. If almost all of an organization's significant business relationships are digitally enabled, it would be called a(n) ________.
digital firm

2. The world's largest network is the ________.


Internet

3. In 2014, American business will spend approximately ________ on information systems hardware, software, and telecommunications
equipment.
$600 billion

4. ________ deals with both behavioral and technical issues regarding information systems, and focuses on the development, use, and
impact of systems by managers and employees.
Management information systems (MIS)

5. A company that produces a new low-cost product based on improved decision making has likely achieved a(n) ________.
competitive advantage

6. _______ includes hardware and software an organization needs to compete in the marketplace.
Information technology (IT)

7. Using Internet technology to create an internal system is called a(n) ________.


intranet

8. A raw fact would be considered ________.


data

9. In information systems, SaaS stands for ________.


Software as a Service

10. A ________ links two or more computers which enables the sharing of information.
network

11. The emergence of the Internet into a full-blown international communications system has drastically ________ the costs of operating
and transacting on a global scale.
reduced

12. A scanner used to capture a products code (i.e., SKU) is considered ________.
an input

13. A raw fact shaped into a meaningful form is ________.


information

14. The value of an information system to a business, as well as the decision to invest in any new information system, is in large part
determined by the extent to which the system will lead to better management decisions, more efficient business processes, and higher
firm ______________.
Profitability

15. A(n) ________, such as a clerk, uses data for things such as scheduling.
worker

16. An engineer or scientist is considered a(n) ________.


knowledge worker

17. A philosophy on how a company conducts business (i.e., how it produces, delivers and sells) in the marketplace is called a(n)
________.
business model
18. The information systems approach to this textbook is the ________.
sociotechnical approach

19. ________ includes components that collect, process, store, and distribute information to support decision making and control in a
business.
Information systems (IS)

20. The behavioral approach to information systems includes ________.


psychology and sociology

21. Companies analyzing huge amounts of data, social media, and other data points represent an emerging area of ________.
big data

22. The technical approach to information systems includes ________.


management science and operations research

23. Data are converted to information through ________.


processing

24. Workers that produce and deliver products and services are called ________.
service workers

Chapter 2 Quiz

1. A display which presents graphs and charts of key performance indicators on a single screen for managing a company is called a
________.
digital dashboard

2. _________ help businesses become more flexible and productive by integrating groups of processes so they focus on efficient
management of resources and customer service such as sales, marketing, and accounting.
Enterprise resource planning (ERP) systems

3. Downloading a Kindle e-book from Amazon, buying a computer online at Best Buy, and downloading a music track from iTunes, are
examples of how information systems help business processes ________.
change the flow of information

4. Customer relationship management includes ________.


customer support applications

5. BASF, a leading German chemical company, needed ________ to provide the foundation for a social network within the company.
a central resource that would support dynamic knowledge-sharing

6. Management information systems (MIS) provide ________.


middle managers with reports on the organization's current performance

7. A(n) ________ system helps capture, manage, and apply the experience of the organization.
knowledge management (KM)

8. A supply chain management system is considered a type of ________ system because it shares data across multiple organizations.
interorganizational

9. ________ include(s) the strategy and policies for using information technology within an organization.
IT governance

10. ___________________ filter, compress, and track critical data, displaying the data of greatest importance to senior managers
including business intelligence analytics for analyzing trends, forecasting, and "drilling down" to data at greater levels of detail.
Executive support systems (ESS)

11. Transaction processing systems (TPS) are ________.


often so central to a business that TPS failure for a few hours can lead to a firm's demise and perhaps that of other firms
linked to it
12. If a cookie company uses Facebook to help sell a product, they are embracing ________.
social business

13. Working together as a team to produce a business plan to align strategy with the company's goals is an example of ________.
collaboration

14. Decision-support systems (DSS) focus on problems ________.


that require supporting more non-routine decision making

15. In many companies, the information systems department is headed by a(n) ________.
chief information officer (CIO)

16. Decision-support systems (DSS) support management decisions that are unique and rapidly changing by providing ___________.
advanced analytical models

17. Businesses that collaborate and use social business often see benefits in productivity, quality, innovation, sales growth, and ________.
customer service

18. The technical approach to information systems includes ________.


computer science and management science

19. Business intelligence provides software tools that help ________.


managers and other enterprise users make more informed decisions

20. An extranet is a system that shares data ________.


across multiple organizations

21. A Web interface which presents integrated personalized business content delivered to senior managers is ________.
a portal

22. A key word in social business is ________.


Conversations

23. Which of the following is NOT an example of a company's transaction processing system?
A company's internal email system

24. A(n) ________ is used by senior managers to make decisions.


executive support system (ESS)

25. The order fulfillment process requires a great deal of information to flow rapidly both within the firm from one decision maker to
another; with business partners, such as delivery firms; and with the customer. What makes it possible is ___________________.
information systems

Chapter 3 Quiz

1. According to the value chain model, sales and marketing is considered a ________ of the firm.
primary activity

2. The assumption that an MIS professor knows more about normalization than a student is an example of ________.
organizational culture

3. ________ developed the competitive forces model.


Porter
4. A ________ consists of a networked system that can synchronize the value chains of business partners ________.
value web; within an industry

5. According to research, about ________ of a firm's profits can be explained by alignment of IT with business.
50 percent

6. An innovation that dramatically changes the business environment is called a(n) ________.
disruptive technology

7. The power of the customer ________ if they have an easy time switching from one company (e.g., not having to pay an exit fee) to
another.
grows

8. According to the value chain model, human resources is considered a ________ of the firm.
support activity

9. A virtual company uses ________ to link people, assets, and ideas.


networks

10. Customer relationship management (CRM) that includes analytical capabilities is often called ________.
contemporary CRM

11. According to the value chain model, technology is considered a ________ of the firm.
support activity

12. In the music industry, ________ are considered a newer substitute for CD-based music stores.
Internet music sites

13. Technological change generally implies some changes to organizations, and very often requires changes in who owns and controls
information, who has the right to access and update that information, and who makes decisions about whom, when, and how. This
more complex view forces us to look at the way work is designed and the _____________________________.
procedures used to achieve outputs

14. According to the value chain model, operations are considered a ________ of the firm.
primary activity

15. A collection of routines for producing goods and services is called a(n) ________.
business process

16. In most cases, a business ecosystem includes ________.


a few keystone firms

17. The Internet has ________ competitive rivalry.


increased

18. Information systems can ________ the organization by giving lower-level employees more capabilities.
flatten

19. Information systems technology can be viewed as a factor of production that can be substituted for traditional capital and labor. As the
cost of information technology __________, it is substituted for labor, which historically has been a rising cost.
decreases

20. Hilton Hotels' OnQ system analyzes detailed data collected on active guests in all of its properties to determine the preferences of each
guest and each guest's ___________ to choose guests for additional privileges such as late checkouts.
profitability

21. Nike sells customized sneakers through NIKEiD to establish ________.


product differentiation

22. In Porter's competitive forces model, the strategic position of the firm and its strategies are determined not only by competition with
its traditional direct competitors but also by four other forces in the industry's environment: _________________________________.
new market entrants, substitute products, customers, and suppliers

23. ________ include two organizations sharing expertise.


Synergies

24. A(n) ________ includes interdependent networks of suppliers, distributors, and outsourcing firms.
business ecosystem

25. Another name for standard operating procedures for creating goods and services is (are) ________.
26. routines

Chapter 4 Quiz

1. The most common type of computer security incident is ________.


malware infection

2. _____________is more tightly regulated in Europe than in the United States, considering that in 2002, the European Parliament
passed a ban on unsolicited commercial messaging.
Spamming

3. Regarding moral dimensions of the information age, ________ include(s) the issue of what standards should we demand to protect the
safety of society.
system quality

4. Regarding moral dimensions of the information age, ________ include(s) the issue of who can and will be held liable for harm done to
property rights.
accountability and control

5. Copyright protects creators (corporate-owned) of intellectual property for ________.


95 years after the initial creation

6. ________ are small text files loaded on a computer when a user visits Web sites.
Cookies

7. Copyright protects creators (individuals) of intellectual property for ________.


70 years after the author's death

8. Advances in information technology facilitate ___________________, such as credit card purchases making personal information
available to market researchers, telemarketers, and direct mail companies.
invasion of privacy

9. The "patent trial of the century" in 2011 was between ________ and ________ for violating patents for iPhones.
Apple; Samsung

10. ________ refers to the principles of right and wrong that individuals use to make choices.
Ethics

11. EU member nations cannot transfer personal data to countries that do not have similar privacy protection regulations to theirs, such as
_____________.
the United States

12. ________ scans data and can help identify a man at a ticket counter who shares a phone number with a known terrorist.
NORA

13. The ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and
financial records.
Privacy Act of 1974

14. The act that aims at protecting consumers in the mobile market place regarding tracking is the ________.
Do-Not-Track Online Act of 2011

15. he Internet has made intellectual property ________.


difficult to protect

16. Regarding moral dimensions of the information age, ________ include(s) the issue addressing intellectual property rights in a digital
society.
property rights and obligations
17. Related to technology raising ethical issues, the doubling of computing power every 18 months makes it possible ________.
for organizations to use information system for their core production processes

18. The Golden Rule is an example of ________.


an ethical principle

19. Regarding moral dimensions of the information age, ________ include(s) which cultural values are supported by a digital society.
quality of life

20. Under the United Kingdom's ________________________, the employer must ensure that employee monitoring is justified. It takes
into account any negative effects the monitoring may have on staff.
data protection law

21. Related to technology raising ethical issues, advances in data storage techniques and rapidly declining associated costs are responsible
for ________.
the multiplying databases on individuals, employees, customers, and potential customers

22. The act that aims at protecting medical records is the ________.
HIPAA

23. ________ is an Internet advertising broker that tracks activities of users.


DoubleClick

24. A(n) ________ grants the owner an exclusive monopoly on an invention for 20 years.
patent

25. Regarding moral dimensions of the information age, ________ include(s) the issue of what individuals and organizations can protect.
information rights and obligations

Chapter 5 Quiz

1. _____________ continue to be used to reliably and securely handle huge volumes of transactions, for analyzing very large quantities
of data, and for handling large workloads in cloud computing centers.
Mainframes

2. Your firm's IT strategy is a(n) ________ of the competitive forces model for IT infrastructure.
internal part

3. The Law of Mass Digital Storage suggests ________.


the amount of digital information doubles each year

4. Competitor firms' IT services is a(n) ________ of the competitive forces model for IT infrastructure.
external part

5. About _____________ people worldwide own smartphones, and most of these users access the Internet with their mobile devices.
1.75 billion

6. ________ is defined as the shared technology resources that provide the platform for the firm's specific information systems
applications.
Information technology infrastructure

7. An IT infrastructure includes ________.


hardware, software, and services

8. Regarding the IT infrastructure ecosystem, Internet platforms include ________.


Apache and Microsoft IIS

9. The services a firm is capable of providing to its customers, suppliers, and employees are a direct function of its IT infrastructure,
which should support the firm's business and information systems ____________.
strategy

10. According to Moore's Law (1965), the ratio of price to performance has ________.
fallen

11. A cloud ________.


can be private or public

12. Setting up a system so that it is not restricted by physical configuration or geographic location is an example of ________.
Virtualization

13. Infrastructure as a service (IaaS) provides ________.


processing, storage, and networking resources

14. Regarding the IT infrastructure ecosystem, Microsoft Windows, Unix, and Mac OS X are examples of ________.
operating systems platforms

15. ________ computing emerged in 2000.


Cloud

16. The five eras of computer evolution are general-purpose mainframe and minicomputer computing, ________________________,
client/server networks, enterprise computing, and cloud and mobile computing.
personal computers

17. ________ is a markup language that allows for tagging selected elements of the content of documents for their meanings and is used
for transferring data.
XML

18. Regarding the IT infrastructure ecosystem, SAP is an example of ________.


enterprise software applications

19. Your firm's business strategy is a(n) ________ of the competitive forces model for IT infrastructure.
internal part

20. Regarding the IT infrastructure ecosystem, data management includes ________.


Oracle, SQL Server, and MySQL

21. A positive regarding cloud computing includes ________.


rapid elasticity

22. Google Apps are an example of ________.


software as a service (SaaS)

23. ________ is the most well-known open source operating system.


Linux

24. The size of a nanotube is about ________ thinner than a human hair.
10,000 times

25. ________ is a page description language for generating Web pages (e.g., text, dynamic links).
HTML
Chapter 6 Quiz

1. SQL stands for ________.


Structured Query Language

2. Another term for a key field is a ________.


primary key

3. Microsoft's most powerful DBMS is ________.


SQL Server

4. A(n) ________ is the most popular method to model a database.


entity-relationship (ER) model
5. A database is a(n) ___________ of data organized to serve many applications efficiently by centralizing the data and controlling
redundant data.
collection

6. A ________ provides the link from one table to another table's primary key.
foreign key

7. Amazon is one of the first to provide cloud computing relational databases. This effort is called ________.
Amazon Relational Database Service

8. The formal process to remove data problems such as repeating groups is called ________.
normalization

9. Although "Big Data" doesn't refer to a specific amount of data, it usually does involve ________.
Petabytes

10. An emerging non-relational database management system is called ________.


NoSQL

11. Another name for a database field is a(n) ________.


attribute

12. The DBMS acts as a(n) ________ between application programs and physical data files.
interface

13. For DBMS's that do NOT include a reports generator, ________ is a popular option for large corporate DBMS.
Crystal Reports

14. Data cleansing, working to identify and fix incorrect data, is also called ________.
data scrubbing

15. A ________ is a component in the computer system data hierarchy consists of multiple records of the same type.
file

16. Software that allows an organization to manage and provide access to data is a ________.
database management system (DBMS)
17. ____________ data management services have special appeal for Web-focused start-ups or small- to medium-sized businesses
seeking database capabilities at a lower price than in-house database products.
Cloud-based

18. Microsoft's DBMS that includes built-in report generation and reporting is called ________.
Access

19. A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to
what data.
information policy

20. Another term for a database row is a(n) ________.


record

21. A ________ is the smallest component in the computer system data hierarchy.
bit

22. A computer system organizes data in a hierarchy that starts with the ____, which represents either a 0 or a 1. Bits can be grouped to
form a _____ to represent a letter, number, or symbol.
bit, byte

23. _________ is a widely used open source DBMS.


MySQL

24. The field that uniquely identifies a row in a relational database table is called a ________.
primary key

25. A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and
Grade A.
field

Chapter 7 Quiz

1. A(n) ________ uses the Internet to create a secure network connection.


virtual private network (VPN)

2. On a client/server system, most of the powerful processing is handled by the ________.


server

3. Slicing digital messages into parcels is called ________.


packet switching

4. A router is a communications processer used to route ________ through different networks.


packets of data

5. Coaxial cable is a(n) ________ for linking network components.


connection medium

6. Bluetooth is another name for the ________ wireless networking standard.


802.15

7. The domain extension .mil represents ________.


the U.S. Military

8. Digital information transfer speeds are measured in ________.


bits per second

9. 802.11 is also known as ________.


Wi-Fi

10. EarthLink and NetZero are examples of ________.


Internet service providers

11. Corporate networks today are increasingly using a single, common, worldwide networking standard called ______________.
Transmission control protocol/internet protocol (TCP/IP)

12. A network that stretches between Paris and Rome is a(n) ________.
wide area network

13. ________ is the standard for wireless technologies.


802.11

14. Client/server computing is a __________ computing model in which some of the processing power is located within small,
inexpensive client computers, and resides literally on desktops, laptops, or in handheld devices.
distributed

15. The number of cycles per second that can be sent through a network medium is calculated in ________.
hertz

16. The Domain Name System (DNS) converts ________ to ________.


domain names; IP addresses

17. If a computer is sending a file, and a packet being sent is damaged, the ________ computer asks the ________ computer to retransmit
it.
receiving; sending

18. A(n) ________ signal is represented by a continuous waveform that passes through a communications medium.
Analog

19. No one "owns" the Internet, and it has no formal management. However, worldwide Internet policies are established by a number of
professional organizations and government bodies, including _____________________, which helps define the overall structure of the
Internet.
the Internet Architecture Board (IAB)

20. A(n) ________ signal is a discrete, binary waveform.


digital

21. ________ are used to track movements of products through the supply chain.
RFIDs
22. A ________ links two or more computers which enable the sharing of information.
network

23. he ________ is the world's most extensive, public communication system.


Internet

24. A small business that connects personal devices within a 500-meter radius is a(n) ________.
local area network

25. An Internet Protocol (IP) address ________.


is a 32-bit number assigned to every computer on the Internet

Chapter 8 Quiz

1. If someone loads a program that tracks everything you type, the specific spyware is a ________.
key logger

2. A ________ is a program that monitors information traveling over a network and ________.
sniffer; can be used for criminal purposes

3. The most commonly used authentication technique used for end users is a(n) ________.
password

4. Someone who intends to gain unauthorized access to a computer system is considered to be a ________.
hacker

5. ______________refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or
physical damage to information systems.
Security

6. If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are
________.
Phishing

7. In 2002, the ________ Act was passed to help protect investors with new financial statements reforms.
Sarbanes-Oxley

8. IS security firewalls are an example of a ________.


gatekeeper

9. ________ is used to ensure the person is who he/she claims to be.


Authentication

10. Using your fingerprint to access a smartphone is an example of ________ authentication.


biometric

11. A ________ is a software program that mimics another program and often causes damage.
Trojan horse

12. If someone asks you to stay home and click advertising without being interested in the product or service, they may be asking you to
commit ________.
click fraud

13. Public key encryption uses ________ key(s).


two

14. ________ deal(s) with both behavioral and technical issues regarding information systems, and focuses on the development, use, and
impact of systems by managers and employees.
Information systems (IS)

15. An intrusion detection system (IDS) ________.


helps protect a system using full-time monitoring tools

16. ________ is a method for encrypting network traffic on the Web.


SSL

17. According to McAfee, ________ now pose the greatest security risks.
mobile devices

18. The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to
databases, with each presenting _________ challenges and vulnerabilities.
security

19. ________ includes computer viruses, worms, and Trojan horses.


Malware

20. _______________ are sources of customer personal information name, address, and phone number that are key
targets for identity theft and other criminal uses.
E-commerce sites

21. Viruses differ from worms because worms ________.


can operate on their own without attaching to other computer program files

22. MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are
disrupted.
disaster recovery planning

23. An information systems ________ examines a firm's overall security environment and determines if the organization is properly
prepared to address threats.
audit

24. ________ are data files used to identify and protect online transactions using a trusted third party.
Digital certificates

You might also like