This action might not be possible to undo. Are you sure you want to continue?
Grade 100% The answers in Green with a checkmark are the correct answers.
1. The fundamental set of assumptions, values, and ways of doing things, that has been accepted by most of a company’s members is called its: o o o Culture Values Environment Atmosphere
2. The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called: o o o Management information systems Information systems architecture Information systems literacy Information technology infrastructure
3. The term “management information systems” designates a specific category of information systems serving: o o o Transaction process reporting Employees with online access to historical records Integrated data processing throughout the firm middle management functions
A computerized system that performs and records the daily dealings necessary to conduct business is classified as a(n): o o o Transaction-processing system Management-level system Decision support system Executive support system 5.4. The use of digital technology and the Internet to execute the major business processes in the enterprise is called: o o o MIS E-business Enterprise applications E-commerce . Policies that determine which information technology will be used. when. and how are provided by: o o o IT management services Application software services IT standards services IT educational services 6.
7. Software that manages the resources of the computer is called: o o o Application software Network software Data management software System software 9. or if two organizations pool markets and expertise that result in lower costs and generate profits it is often referred to as creating: o o o Value webs Synergies Core competencies Value chains 8. When the output of some units can be used as inputs to other units. A high-speed network dedicated to storage that connects different kinds of storage devices. What would be a reason for using a workstation rather than a personal computer? o o o When you need to share resources When you need to access a network When you need to serve applications and data to client computers When you need more powerful computational abilities 10. Which of the following is not a type of output device? o Keyboard Speakers . such as tape libraries and disk arrays so they can be shared by multiple servers best describes: o o o LAN ASP SAN SSN 11.
Two categories of fourth-generation languages are: o o o Utility software and computer language translation software Graphics language and application software package Java and C++ SOAP and WSDL .o o Cathode ray tube Ink jet printer 12. A report generator is a type of: o o o Graphics language Fourth-generation language Procedural language Second-generation language 13.
support systems Executive support systems Transaction processing systems 16. Why does improving a small. 14. Are logically related tasks used primarily by operational personnel. routine decision have business value for a company? o o A small decision may have a great economic impact on the company Small. Are used primarily for sales and accounting functions. rapidly changing. Business Processes: o Include informal work practices.50. and not easily specified in advance: o o o Management information systems Decision. A DSS database is a collection of: o o o Current or historical data from several applications or groups Historical data extracted from transaction-processing systems External data typically mined from the Internet and other third-party sources The corporations current transaction data 17. routine decisions typically do not have any business value for a company . ________ support making decisions that are unique. Networking and Data Management Technology Networking and telecommunications technology Data and telecommunications technology 15. The hardware and software used to transfer data in an organization is called: o o o Data management technology. o o Are governed by information technology.
Which type of network treats all processors equally. A single decision has business value when added with all the other decisions made in the company Even a routine decision may have “ripple” effect through a corporation o 18. A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a: o o Switch NIC Hub . Expertise and experience of organizational members that has not been formally documented best describes: o o o Wisdom Information Tacit knowledge Data 20.CAD workstations: o Are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management Allow groups to work together on documents Provide an important source of expertise for organizations Provide engineers. and factory managers with precise control over industrial design and manufacturing o o 19. designers. and allows peripheral devices to be shared without going to a separate server? o o o LAN Peer-to-peer Wireless Ring 21.
One or more access points positioned on a ceiling. ___________ work by using radio waves to communicate with radio antennas placed within adjacent geographic areas. o o o Four Eight Ten Six . encrypted communications using Telnet 23. A VPN: o o o Is an Internet-based service for delivering voice communications Is more expensive than a dedicated network Is an encrypted private network configured within a public network Provides secure. o o o Microwave Cell phones WANs Satellites 24. wall. or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: o o o Wireless hubs Hot points Wireless spots Hotspots 25. radiobased communication.o Router 22. Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power.
the removal of important files.Online transaction processing requires: o o o A large server network Fault-tolerant computer systems A dedicated phone line More processing time 29. Information systems: o o Pose traditional ethical situations in new manners Raise ethical questions primarily related to information rights and obligations Raise new ethical questions . Statements ranking information risks and identifying security goals are included in a(n): o o o AUP Security policy Business impact analysis Risk assessment 27. and system administration errors. o o o Stateful inspections Intrusion detection systems Application proxy filtering technologies Packet filtering technologies 30. _______use scanning software to look for known problems such as bad passwords. Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n): o o o AUP Risk assessment Security policy Business impact analysis 28.26. security attacks in progress.
a business: o o o Uses only the processes in the software that match its own processes Changes the way it works to match the software’s business processes Selects only the software that best matches its existing business processes Customizes the software to match all of its business processes 35.o Raise the same ethical questions created by the industrial revolution 31. You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? o o o Map the company’s business processes to the software’s business processes Map the software’s business processes to the company’s business processes Select the business processes you wish to automate Select the functions of the system you wish to use 34. and political levels of actions 32. it is stored: o o o On the visitor’s computer On the Web site computer On the ISP’s computer In a Web directory 33. When a cookie is created during a Web site visit. In order to achieve maximum benefit from an enterprise software package. social. The moral dimensions of the information society: o o o Are predominantly quality-of-life issues Are geographically and politically biased Are primarily addressed by existing intellectual property rights laws Cut across individual. Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes: o Generic customer relationship management applications .
and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology? o o o Ubiquity Richness Interactivity Personalization/Customization 39.The integration of video.o o Supply chain management applications Operational customer relationship management applications Analytical customer relationship management applications 36. Through what channel did e-commerce first evolve? o o o Online book sales Online advertising sales Internet service providers Internet portals . Which of the following deals with employee issues that are closely related to CRM. and systems as CRM to enhance collaboration between a company and its selling partners. audio. o o o SCM modules PRM modules SFA modules ERM modules 38. performance-based compensation. tools. such as setting objectives. _______use many of the same data. and employee training? o o o Enterprise systems software Employee relationship management software Customer relationship management software Supply chain management software 37. employee performance management.
Businesses retailing products and services directly via the Internet to individual consumers best describes: o o o Consumer-to-consumer electronic commerce Business-to-consumer electronic commerce Business-to-business electronic commerce Mobile commerce 41. The electronic payment system in which users make micropayments and purchases on the Web. Which of the following is an ad that opens automatically and does not disappear until the user clicks on it? o o o Portal ad Pop-up ad Banner ad Controlled ad 42. The entire system-building effort is driven by: o o o Feasibility studies Data User information requirements Organizational change 44.40. Which process develops a detailed description of the functions that a new information system must perform? . accumulating a debit balance on their credit card or telephone bill is called a(n)________ payment system: o o o Smart card Digital wallet Accumulated balance digital Stored value 43.
o o o Feasibility study Test plan development Requirements analysis Systems design 45. The term structured. develop solutions. What is the order of steps you will follow in this project? Identify user requirements.Object-oriented modeling is based on the concepts of: . use the prototype. refers to the fact that: o o o The development process is highly documented A defined hierarchy of objects and classes are used to structure the programming The techniques are step by step. with each step building on the previous one The finished software is highly documented 47. revise and enhance the prototype Define the requirements. select the best prototype. As a technical project manager you have decided to propose implementing a prototyping methodology for a small Web-based design project. revise and enhance the prototype Define the requirements. revise and enhance the prototype Develop the prototype. and implement the prototype o o o 46. develop the prototype. develop the prototype. The primary tool for representing a system’s component processes and the flow of data between them is the: o o o Process specifications diagram Data dictionary Data flow diagram User documentation 48. when discussing structured methodologies. use the prototype.
o o o DFD PERT chart Feasibility study Gantt chart . o o o Class and inheritance Classes and objects Objects and inheritance Objects and relationships 49. A __________shows each task as a horizontal bar whose length is proportional to the time required to complete it.