Professional Documents
Culture Documents
Marks: 1
A collection of independent firms that use information technology to coordinate their value chains to produce a
product or service for a market collectively is called a
b. consortia.
c. business ecosystem.
d. value web.
Question2
Marks: 1
A DBMS makes the
Question3
Marks: 1
Downtime refers to periods of time in which a
Question4
Marks: 1
In the information age, the obligations that individuals and organizations have concerning rights to intellectual
property fall within the moral dimension of
c. system quality.
Question5
Marks: 1
Business processes are collections of
d. routines.
Question6
Marks: 1
Hardware and software acquisition costs account for about ________ percent of TCO.
a. 80
b. 60
c. 40
d. 20
Question7
Marks: 1
ESS are specifically designed to serve which level of the organization?
a. end-user
b. middle management
c. operational
d. senior management
Question8
Marks: 1
IPv6 is being developed in order to
Question9
Marks: 1
The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information
systems to achieve which business objective?
b. competitive advantage
c. survival
d. improved efficiency
Question10
Marks: 1
The small software programs that can be added to Web pages or placed on the desktop to provide additional
functionality are referred to as
a. applets.
b. mashups.
c. Web services.
d. widgets.
Question11
Marks: 1
A ________ system collects data from various key business processes and stores the data in a single,
comprehensive data repository, usable by other parts of the business.
a. automatic reporting
b. transaction
c. management information
d. enterprise
Question12
Marks: 1
The introduction of new information technology has a
c. beneficial effect for society as a whole, while raising dilemmas for consumers.
Question13
Marks: 1
________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the
organization's assets, the accuracy and reliability of its accounting records, and operational adherence to
management standards.
a. "Vulnerabilities"
b. "SSID standards"
c. "Legacy systems"
d. "Controls"
Question14
Marks: 1
The specialized language programmers use to add and change data in the database is called
Question15
Marks: 1
A corporation that funds a political action committee, which in turn promotes and funds a political candidate who
agrees with the values of that corporation, could be seen as investing in which main category of complementary
assets?
b. organizational
c. social
d. governmental
Question16
Marks: 1
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a
c. root domain.
Question1
Marks: 1
It is not feasible for companies to produce error-free software because
Question2
Marks: 1
A ________ system collects data from various key business processes and stores the data in a single,
comprehensive data repository, usable by other parts of the business.
a. management information
b. automatic reporting
c. transaction
d. enterprise
Question3
Marks: 1
CVS refers to
Question4
Marks: 1
________ unleash powerful economies of scale and result in declines in manufactured computer products.
c. Technology standards
d. Client/server technologies
Question5
Marks: 1
Enabling management to make better decisions regarding organizing and scheduling sourcing, production, and
distribution is a central feature of
a. KMSs
b. SCMs
c. ERPs
d. TPSs
Question6
Marks: 1
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
a. phishing
b. sniffing
c. social engineering
d. pharming
Question7
Marks: 1
Duplicate data in multiple data files is called data ________.
a. redundancy
b. repetition
c. partitions
d. independence
Question8
Marks: 1
According to agency theory, the firm is viewed as a :
a. entrepreneurial endeavor.
Question9
Marks: 1
Which of the following is NOT one of the competitive forces?
a. external environment
b. suppliers
c. customers
d. other competitors
Question10
Marks: 1
A network that spans a city, and sometimes its major suburbs as well, is called a
a. LAN.
b. CAN.
c. MAN.
d. WAN.
Question11
Marks: 1
A formal contract between customers and their service providers that outlines the specific responsibilities of the
service provider and to the customer is called a
a. TCO
b. SOA
c. SLA
d. RFQ
Question12
Marks: 1
An example of an organizational complementary asset is
Question13
Marks: 1
Web browser software requests Web pages from the Internet using which protocol?
a. HTML
b. URL
c. HTTP
d. DNS
Question14
Marks: 1
Data mining is a tool for allowing users to
Choose one answer.
Question15
Marks: 1
A corporation that funds a political action committee, which in turn promotes and funds a political candidate who
agrees with the values of that corporation, could be seen as investing in which main category of complementary
assets?
a. managerial
b. governmental
c. social
d. organizational
Question16
Marks: 1
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in
a
a. security policy.
b. AUP.
c. risk assessment.
Question 1
Marks: 1
The Internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for
lining networks and computers
Choose one answer.
Question 2
Marks: 1
The leading networking hardware providers include Cisco, Lucent, and Nortel
Choose one answer.
Question 3
Marks: 1
The Internet poses specific security problems because it was designed to be easily accessible
Choose one answer.
Question 4
Marks: 1
The Smart Site Solution system used by Johnny's Lunch to help identify the best locations to open new
franchises is best categorized as a DSS
Choose one answer.
Question 5
Marks: 1
___Security_____ refers to policies, procedures, and technical measures used to prevent unauthorized
access, alternation, theft, or physical damage to information systems.
Choose one answer.
Question 6
Marks: 1
European privacy protection is __much more stringent______ than in the United States.
Choose one answer.
Question 7
Marks: 1
Converting raw data into a more meaningful form is called processing
Choose one answer.
Question 8
Marks: 1
Which of the following is NOT one of the main problems with a traditional file environment? Program-
data independence
Choose one answer.
Question 9
Marks: 1
How would you determine the market demand for your firm's IT services? Focus groups
Choose one answer.
Question 10
Marks: 1
___mass customization_____ is the ability to offer individually tailored products or services using the
same production resources as bulk production.
Choose one answer.
Question 11
Marks: 1
Which type of system would you use to forecast the return on investment if you used new suppliers
with better delivery track records? DSS
Choose one answer.
Question 12
Marks: 1
The four major types of competitive strategy are
Choose one answer. Low cost, product differentiation,
Question 13
Marks: 1
The tool that enables users to view the same data in different ways using multiple dimensions is OLAP
Choose one answer.
Question 14
Marks: 1
T lines are lines leased from telephone companies to deliver data at high speed
Choose one answer.
Question 15
Marks: 1
The six important business objectives of information technology are new products, services, and
business models; customer and supplier intimacy; survival; competitive advantage; operational
excellence; and more efficient decision making
Choose one answer.
Question 16
Marks: 1
The four key technical trends responsible for current ethical stresses related to information technology
are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data
storage costs, and (4) advances in network and internet______.
Choose one answer.
Question 1
Marks: 1
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a
uniform resource locator
Choose one answer.
Question 2
Marks: 1
In the information age, the obligations that individuals and organizations have regarding the
preservation of existing values and institutions fall within the moral dimension of
Quality of life
Choose one answer.
Question 3
Marks: 1
The primary activities of a firm include: inbound logistics, operations, sales and marketing, service,
outbound logistics
Choose one answer.
Question 4
Marks: 1
Thomas Friedman's declaration that the world was now "flat" meant that
The internet took the advantages of developed countries away
Choose one answer.
Question 5
Marks: 1
The main security problem on the Internet is hackers
Choose one answer.
Question 6
Marks: 1
Hardware and software acquisition costs account for about ____20%____ percent of TCO.
Choose one answer.
Question 7
Marks: 1
The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of
information systems to achieve which business objective?
survival
Choose one answer.
Question 8
Marks: 1
Which of the following services enables logging on to one computer system and working on another?
NETLET
Choose one answer.
Question 9
Marks: 1
Duplicate data in multiple data files is called data ___redundancy_____.
Choose one answer.
Question 10
Marks: 1
Which of the following is not one of the main six factors to consider when evaluating how much your
firm should spend on IT infrastructure? The organization’s culture
Choose one answer.
Question 11
Marks: 1
A field identified in a table as holding the unique identifier of the table's records is called the primary
key
Choose one answer
Question 12
Marks: 1
____decision management____ systems are especially suited to situations in which the procedure for
arriving at a solution may not be fully defined in advance.
Choose one answer.
Question 13
Marks: 1
The four major enterprise applications are KMS, enterprise systems, CRM, SCM
Choose one answer.
Question 14
Marks: 1
A key logger is a type of spyware
Choose one answer.
Question 15
Marks: 1
The use of computers to combine data from multiple sources and create electronic dossiers of detailed
information on individuals is called profiling
Choose one answer.
Question 16
Marks: 1
The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as:
transaction costs
Choose one answer.