You are on page 1of 13

Question1

Marks: 1
A collection of independent firms that use information technology to coordinate their value chains to produce a
product or service for a market collectively is called a

Choose one answer.

a. industry value chain.

b. consortia.

c. business ecosystem.

d. value web.

Question2
Marks: 1
A DBMS makes the

Choose one answer.

a. relational database available for different physical views.

b. physical database available for different logical views.

c. logical database available for different analytical views.

d. physical database available for different analytical views.

Question3
Marks: 1
Downtime refers to periods of time in which a

Choose one answer.

a. corporation or organization is not operational.

b. computer is not online.

c. computer system is malfunctioning.

d. computer system is not operational.

Question4
Marks: 1
In the information age, the obligations that individuals and organizations have concerning rights to intellectual
property fall within the moral dimension of

Choose one answer.

a. information rights and obligations.


b. accountability and control.

c. system quality.

d. property rights and obligations.

Question5
Marks: 1
Business processes are collections of

Choose one answer.

a. formalized and documented practices.

b. informal practices and behaviors.

c. rights and privileges.

d. routines.

Question6
Marks: 1
Hardware and software acquisition costs account for about ________ percent of TCO.

Choose one answer.

a. 80

b. 60

c. 40

d. 20

Question7
Marks: 1
ESS are specifically designed to serve which level of the organization?

Choose one answer.

a. end-user

b. middle management

c. operational

d. senior management

Question8
Marks: 1
IPv6 is being developed in order to

Choose one answer.


a. support Internet2.

b. create more IP addresses.

c. allow for different levels of service.

d. update the packet transmission protocols for higher bandwidth.

Question9
Marks: 1
The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information
systems to achieve which business objective?

Choose one answer.

a. customer and supplier intimacy

b. competitive advantage

c. survival

d. improved efficiency

Question10
Marks: 1
The small software programs that can be added to Web pages or placed on the desktop to provide additional
functionality are referred to as

Choose one answer.

a. applets.

b. mashups.

c. Web services.

d. widgets.

Question11
Marks: 1
A ________ system collects data from various key business processes and stores the data in a single,
comprehensive data repository, usable by other parts of the business.

Choose one answer.

a. automatic reporting

b. transaction

c. management information

d. enterprise
Question12
Marks: 1
The introduction of new information technology has a

Choose one answer.

a. waterfall effect in raising ever more complex ethical issues.

b. ripple effect raising new ethical, social, and political issues.

c. beneficial effect for society as a whole, while raising dilemmas for consumers.

d. dampening effect on the discourse of business ethics.

Question13
Marks: 1
________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the
organization's assets, the accuracy and reliability of its accounting records, and operational adherence to
management standards.

Choose one answer.

a. "Vulnerabilities"

b. "SSID standards"

c. "Legacy systems"

d. "Controls"

Question14
Marks: 1
The specialized language programmers use to add and change data in the database is called

Choose one answer.

a. a data access language.

b. a data definition language.

c. a data manipulation language.

d. structured Query language.

Question15
Marks: 1
A corporation that funds a political action committee, which in turn promotes and funds a political candidate who
agrees with the values of that corporation, could be seen as investing in which main category of complementary
assets?

Choose one answer.


a. managerial

b. organizational

c. social

d. governmental

Question16
Marks: 1
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a

Choose one answer.

a. unified resource locator.

b. uniform resource locator.

c. root domain.

d. third level domain.

Question1
Marks: 1
It is not feasible for companies to produce error-free software because

Choose one answer.

a. any software of any complexity will have errors.

b. any programming code is susceptible to error.

c. it is too expensive create perfect software.

d. errors can be introduced in the maintenance stage of development.

Question2
Marks: 1
A ________ system collects data from various key business processes and stores the data in a single,
comprehensive data repository, usable by other parts of the business.

Choose one answer.

a. management information

b. automatic reporting

c. transaction

d. enterprise

Question3
Marks: 1
CVS refers to

Choose one answer.

a. eyestrain related to computer display screen use.

b. wrist injuries brought about by incorrect hand position when using a


keyboard.
c. carpal vision syndrome.

d. stress induced by technology.

Question4
Marks: 1
________ unleash powerful economies of scale and result in declines in manufactured computer products.

Choose one answer.

a. Internet and web technologies

b. Linux and open-source software

c. Technology standards

d. Client/server technologies

Question5
Marks: 1
Enabling management to make better decisions regarding organizing and scheduling sourcing, production, and
distribution is a central feature of

Choose one answer.

a. KMSs

b. SCMs

c. ERPs

d. TPSs

Question6
Marks: 1
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called

Choose one answer.

a. phishing

b. sniffing

c. social engineering
d. pharming

Question7
Marks: 1
Duplicate data in multiple data files is called data ________.

Choose one answer.

a. redundancy

b. repetition

c. partitions

d. independence

Question8
Marks: 1
According to agency theory, the firm is viewed as a :

Choose one answer.

a. entrepreneurial endeavor.

b. unified, profit-maximizing entity.

c. "nexus of contracts" among self-interested individuals.

d. task force organization that must respond to rapidly changing environments.

Question9
Marks: 1
Which of the following is NOT one of the competitive forces?

Choose one answer.

a. external environment

b. suppliers

c. customers

d. other competitors

Question10
Marks: 1
A network that spans a city, and sometimes its major suburbs as well, is called a

Choose one answer.

a. LAN.
b. CAN.

c. MAN.

d. WAN.

Question11
Marks: 1
A formal contract between customers and their service providers that outlines the specific responsibilities of the
service provider and to the customer is called a

Choose one answer.

a. TCO

b. SOA

c. SLA

d. RFQ

Question12
Marks: 1
An example of an organizational complementary asset is

Choose one answer.

a. using the appropriate business model.

b. a collaborative work environment.

c. laws and regulations.

d. all of the above.

Question13
Marks: 1
Web browser software requests Web pages from the Internet using which protocol?

Choose one answer.

a. HTML

b. URL

c. HTTP

d. DNS

Question14
Marks: 1
Data mining is a tool for allowing users to
Choose one answer.

a. find hidden relationships in data.

b. summarize massive amounts of data into much smaller, traditional reports.

c. obtain online answers to ad hoc questions in a rapid amount of time.

d. quickly compare transaction data gathered over many years.

Question15
Marks: 1
A corporation that funds a political action committee, which in turn promotes and funds a political candidate who
agrees with the values of that corporation, could be seen as investing in which main category of complementary
assets?

Choose one answer.

a. managerial

b. governmental

c. social

d. organizational

Question16
Marks: 1
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in
a

Choose one answer.

a. security policy.

b. AUP.

c. risk assessment.

d. business impact analysis.

Question 1
Marks: 1
The Internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for
lining networks and computers
Choose one answer.

Question 2
Marks: 1
The leading networking hardware providers include Cisco, Lucent, and Nortel
Choose one answer.
Question 3
Marks: 1
The Internet poses specific security problems because it was designed to be easily accessible
Choose one answer.

Question 4
Marks: 1
The Smart Site Solution system used by Johnny's Lunch to help identify the best locations to open new
franchises is best categorized as a DSS
Choose one answer.

Question 5
Marks: 1
___Security_____ refers to policies, procedures, and technical measures used to prevent unauthorized
access, alternation, theft, or physical damage to information systems.
Choose one answer.
Question 6

Marks: 1
European privacy protection is __much more stringent______ than in the United States.
Choose one answer.

Question 7
Marks: 1
Converting raw data into a more meaningful form is called processing
Choose one answer.

Question 8
Marks: 1
Which of the following is NOT one of the main problems with a traditional file environment? Program-
data independence
Choose one answer.

Question 9
Marks: 1
How would you determine the market demand for your firm's IT services? Focus groups
Choose one answer.

Question 10
Marks: 1
___mass customization_____ is the ability to offer individually tailored products or services using the
same production resources as bulk production.
Choose one answer.

Question 11
Marks: 1
Which type of system would you use to forecast the return on investment if you used new suppliers
with better delivery track records? DSS
Choose one answer.

Question 12
Marks: 1
The four major types of competitive strategy are
Choose one answer. Low cost, product differentiation,
Question 13

Marks: 1
The tool that enables users to view the same data in different ways using multiple dimensions is OLAP
Choose one answer.

Question 14
Marks: 1
T lines are lines leased from telephone companies to deliver data at high speed
Choose one answer.

Question 15
Marks: 1
The six important business objectives of information technology are new products, services, and
business models; customer and supplier intimacy; survival; competitive advantage; operational
excellence; and more efficient decision making
Choose one answer.

Question 16
Marks: 1
The four key technical trends responsible for current ethical stresses related to information technology
are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data
storage costs, and (4) advances in network and internet______.
Choose one answer.

Question 1
Marks: 1
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a
uniform resource locator
Choose one answer.

Question 2
Marks: 1
In the information age, the obligations that individuals and organizations have regarding the
preservation of existing values and institutions fall within the moral dimension of
Quality of life
Choose one answer.

Question 3
Marks: 1
The primary activities of a firm include: inbound logistics, operations, sales and marketing, service,
outbound logistics
Choose one answer.

Question 4
Marks: 1
Thomas Friedman's declaration that the world was now "flat" meant that
The internet took the advantages of developed countries away
Choose one answer.

Question 5
Marks: 1
The main security problem on the Internet is hackers
Choose one answer.

Question 6
Marks: 1
Hardware and software acquisition costs account for about ____20%____ percent of TCO.
Choose one answer.

Question 7
Marks: 1
The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of
information systems to achieve which business objective?
survival
Choose one answer.

Question 8
Marks: 1
Which of the following services enables logging on to one computer system and working on another?
NETLET
Choose one answer.

Question 9
Marks: 1
Duplicate data in multiple data files is called data ___redundancy_____.
Choose one answer.

Question 10
Marks: 1
Which of the following is not one of the main six factors to consider when evaluating how much your
firm should spend on IT infrastructure? The organization’s culture
Choose one answer.

Question 11
Marks: 1
A field identified in a table as holding the unique identifier of the table's records is called the primary
key
Choose one answer

Question 12
Marks: 1
____decision management____ systems are especially suited to situations in which the procedure for
arriving at a solution may not be fully defined in advance.
Choose one answer.

Question 13
Marks: 1
The four major enterprise applications are KMS, enterprise systems, CRM, SCM
Choose one answer.

Question 14
Marks: 1
A key logger is a type of spyware
Choose one answer.

Question 15
Marks: 1
The use of computers to combine data from multiple sources and create electronic dossiers of detailed
information on individuals is called profiling
Choose one answer.

Question 16
Marks: 1
The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as:
transaction costs
Choose one answer.

You might also like