You are on page 1of 32

Chapter 1

Multiple Choice
Which of the following statements is not correct?
A. To succeed in todays environment, it is often
necessary to change business models and strategies.
. !T enables organi"ations to survive in the face of
business pressures.
C. !T re#uires small investments over a long period
of time.
$. %rgani"ations can leverage their platforms to
develop Web&based applications, products, and
services.
A'() C
*+,) Material following chapter opening case
The modern business environment has all of the
following characteristics e-cept)
A. global
. interconnected
C. competitive
$. relatively static
+. real&time
A'() $
*+,) Material following chapter opening case
..... deal with the planning for / and the
development, management, and use of / technology
to help people perform their tas0s related to
information processing.
A. !T architecture
. !T infrastructure
C. information technology
$. management information systems
+. !T services
A'() $
*+,) 1.1 !nformation (ystems) Concepts and
$efinitions
..... is 2are3 data that have been organi"ed to have
meaning and value to a recipient.
A. data
. information
C. 0nowledge
$. e-perience
+. wisdom
A'()
*+,) 1.1 !nformation (ystems) Concepts and
$efinitions
!f Ama"on uses a list of all your purchases 2boo0s
bought, price paid, dates3 to recommend other boo0s
to you, then Ama"on is applying its ......
A. data
. information
C. 0nowledge
$. e-perience
+. wisdom
A'() C
*+,) 1.1 !nformation (ystems) Concepts and
$efinitions
An organi"ations information technology
architecture)
A. provides a guide for current operations
. provides a blueprint for future directions
C. integrates the information re#uirements of the
organi"ation and all users
$. is analogous to the architecture of a house
+. all of the above
A'() +
*+,) 1.1 !nformation (ystems) Concepts and
$efinitions
..... are the computer hardware, software, and
communications technologies that are used by !T
personnel to produce !T services.
A. !T components
. !T services
C. information technology
$. information system
+. computer&based information system
A'() A
*+,) 1.1 !nformation (ystems) Concepts and
$efinitions
An organi"ations ..... consists of the physical
facilities, !T components, !T services, and !T
management that will support the entire organi"ation.
A. information technology architecture
. information technology infrastructure
C. information technology
$. information system
+. computer&based information system
1
A'()
*+,) 1.1 !nformation (ystems) Concepts and
$efinitions
..... is the integration of economic, social, cultural,
and ecological facets of life, enabled by information
technologies.
A. regionali"ation
. nationali"ation
C. globali"ation
$. business environment
A'() C
*+,) 1.4 The 5lobal, Web&ased 6latform
5lobali"ation 1.7 focused on ....., 5lobali"ation
4.7 focused on ....., and 5lobali"ation 8.7 focuses
on ......
A. companies, groups, countries
. countries, groups, companies
C. countries, companies, groups
$. groups, companies, countries
+. groups, countries, companies
A'() C
*+,) 1.4 The 5lobal, Web&ased 6latform
..... enables computer applications to interoperate
without human interaction.
A. supply&chaining
. informing
C. uploading
$. wor0&flow software
+. outsourcing
A'() $
*+,) 1.4 The 5lobal, Web&ased 6latform
..... involves ta0ing a specific function that your
company was doing itself, having another company
perform that same function for you, and then
integrating their wor0 bac0 into your operation.
A. informing
. insourcing
C. offshoring
$. outsourcing
+. uploading
A'() $
*+,) 1.4 The 5lobal, Web&ased 6latform
..... means that you can create content and send or
post it to the Web.
A. informing
. insourcing
C. delivering
$. participating
+. uploading
A'() +
*+,) 1.4 The 5lobal, Web&ased 6latform
!f your university hires a company to manage its
entire human resources function, then your university
is practicing ......
A. insourcing
. outsourcing
C. offshoring
$. temporary hiring
+. consulting
A'()
*+,) 1.4 The 5lobal, Web&ased 6latform
The wor0force in developed countries has which of
the following characteristics?
A. more diversified
. more women
C. more single parents
$. more persons with disabilities
+. all of the above
A'() +
*+,) 1.8 usiness 6ressures, %rgani"ational
*esponses, and !T (upport
Todays customers have which of the following
characteristics?
A. less 0nowledge about products
. less sophistication
C. difficulty in finding information about products
$. higher e-pectations
+. difficulty in comparing prices
A'() $
*+,) 1.8 usiness 6ressures, %rgani"ational
*esponses, and !T (upport
4
When identical items are produced in large #uantities,
this is called)
A. strategic systems
. customer focus
C. continuous improvement
$. mass production
+. mass customi"ation
A'() $
*+,) 1.8 usiness 6ressures, %rgani"ational
*esponses, and !T (upport
Which of the following is not a fact about !T careers?
A. The four&fastest growing 9.(. :obs that re#uire
college degrees from 4774 through 4714 are !T&
related.
. ;ighly&s0illed !T :obs will typically not be
offshored.
C. There are no computing :obs.
$. M!( ma:ors usually receive high starting salaries.
A'() C
*+,) 1.< Why Are !nformation (ystems !mportant to
=ou?
Chapter 2
Multiple Choice
Which of the following statements about information
systems is not correct?
A. !nformation systems are concentrated in the !(
$epartment.
. !nformation systems tend to follow the structure of
the organi"ation.
C. !nformation systems are based on the needs of
employees.
$. Any information system can be strategic.
+. Managing information systems is difficult.
Ans) A
*ef) $iscussion immediately following Chapter
opening case
A collection of related files, tables, and so on that
stores data and the associations among them is
......
A. hardware
. software
C. database
$. networ0
+. procedures
Ans) C
*ef) 4.1 Types of !nformation (ystems
Which of the following is not a ma:or capability of
information systems?
A. perform high&speed, high&volume numerical
computations
. provide fast, accurate communications among
organi"ations
C. store very small amounts of information in a very
large space
$. increase the effectiveness and efficiency of people
wor0ing in groups
+. automate semiautomatic business processes
Ans) C
*ef) 4.1 Types of !nformation (ystems
Two information systems that support the entire
organi"ation are)
A. +nterprise resource planning systems, dashboards
. Transaction processing systems, office automation
systems
C. +nterprise resource planning systems, transaction
processing systems
$. +-pert systems, office automation systems
+. +-pert systems, transaction processing systems
Ans) C
*ef) 4.1 Types of !nformation (ystems
When your purchases are swiped over the bar&code
reader at the point&of&sale terminals at Wal&Mart, a
..... records the data.
A. transaction processing system
. functional area information system
C. dashboard
$. enterprise resource planning system
+. office automation system
Ans) A
*ef) 4.1 Types of !nformation (ystems
(upply chain systems are which type of information
system?
A. departmental information systems
. enterprisewide information systems
C. interorgani"ational information systems
8
$. end&user computing systems
+. individual information systems
Ans) C
*ef) Types of !nformation (ystem
..... attempt to duplicate the wor0 of human
e-perts by applying reasoning capabilities.
A. e-pert systems
. dashboards
C. functional area information systems
$. decision support systems
+. business intelligence systems
Ans) A
*ef) 4.1 Types of !nformation (ystems
..... provide rapid access to timely information and
direct access to structured information in the form of
reports.
A. e-pert systems
. dashboards
C. functional area information systems
$. decision support systems
+. business intelligence systems
Ans)
*ef) 4.1 Types of !nformation (ystems
!nformation&based industries are most susceptible to
which one of 6orters five forces?
A. threat of entry of new competitors
. bargaining power of suppliers
C. bargaining power of customers
$. threat of substitute products
+. rivalry among e-isting firms in an industry
Ans) $
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
,or most companies, the Web ..... the threat that
new competitors will enter the mar0et by .....
traditional barriers to entry.
A. decreases, increasing
. increases, decreasing
C. increases, increasing
$. decreases, decreasing
Ans)
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
The threat of competitors entering a mar0et is very
high in industries that perform a2n3 ..... role, and in
industries where the primary product or service is
......
A. intermediation, physical
. bro0er, physical
C. sales, financial
$. financial, digital
+. intermediation, digital
Ans) +
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
uyer power is ..... when buyers have many
choices from whom to buy and ..... when buyers
have few choices.
A. high, the same
. high, low
C. low, low
$. low, high
+. low, the same
Ans)
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
6orters competitive forces model helps organi"ations
identify ....., where his value chain model helps
organi"ations identify specific ......
A. competitive opportunities, activities
. general strategies, activities
C. activities, competitive opportunities
$. activities, general strategies
+. primary activities, support activities
Ans)
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
..... activities create value for which customers are
willing to pay, where ..... activities do not add
value directly to the firms products or services.
A. (upport, primary
. ;uman resource management, inbound logistics
C. 6rocurement, operations
$. 6rimary, support
<
+. Accounting, outbound logistics
Ans) $
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
%ffering different products, services, or product
features is which strategy for competitive advantage?
A. cost leadership
. differentiation
C. innovation
$. operational effectiveness
+. customer&orientation
Ans)
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
!ntroducing new products and putting new features in
e-isting products is which strategy for competitive
advantage?
A. cost leadership
. differentiation
C. innovation
$. operational effectiveness
+. customer&orientation
Ans) C
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
!mproving the manner in which internal business
processes are e-ecuted is which strategy for
competitive advantage?
A. cost leadership
. differentiation
C. innovation
$. operational effectiveness
+. customer orientation
Ans) $
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
When Ama"on welcomes you by name bac0 to its
Web site on your second visit, this is an e-ample of
which strategy for competitive advantage?
A. cost leadership
. differentiation
C. innovation
$. operational effectiveness
+. customer orientation
Ans) +
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
The impact of !T on managers :obs is all of the
following e-cept)
A. gives managers time to get into the field
. managers can spend more time planning
C. managers must spend more time managing fewer
employees
$. managers can gather information more #uic0ly
+. none of the above
Ans) C
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
6orters ..... help2s3 companies identify general
strategies, where his ..... help2s3 to identify
specific activities where companies can use the
strategies for greatest impact.
A. >alue chain model, competitive forces model
. 6rimary activities, support activities
C. Competitive forces model, primary activities
$. Competitive forces model, value chain model
+. >alue chain model, support activities
Ans) $
*ef) 4.4 Competitive Advantage and (trategic
!nformation (ystems
Which of the following statements concerning
information resources is not correct?
A. !nformation resources include all the hardware,
information systems and applications, data, and
networ0s in an organi"ation.
. Without their information resources, organi"ations
cannot function.
C. !nformation resources typically do not change
#uic0ly.
$. !nformation resources are e-pensive to ac#uire,
operate, and maintain.
Ans) C
*ef) 4.< Managing !nformation *esources
?
..... is the direct use of information systems by
employees in their wor0.
A. Transaction processing systems
. +-ecutive information systems
C. $ecision support systems
$. Management information systems
+. +nd&user computing
Ans) +
*ef) 4.< Managing !nformation *esources
$ividing the responsibility for developing and
maintaining information resources between the
!nformation (ystem $epartment and end users
depends on all of the following e-cept )
A. (i"e of the organi"ation
. Amount and type of information resources in the
organi"ation
C. %rgani"ations revenue and profits
$. %rgani"ations attitude towards computing
+. Maturity level of the organi"ations information
technologies
Ans) C
*ef) 4.< Managing !nformation *esources
The role of the director of the !nformation (ystems
$epartment is changing from more ..... to more
......
A. hands&on, managing
. technical, managerial
C. operational, technical
$. hands&on, decision&ma0ing
+. managerial, technical
Ans)
*ef) 4.< Managing !nformation *esources
Chapter 3
Which of the following was not one of T@As
problems?
A. The companys security was originally breached.
. The company disclosed the security breach to its
customers too #uic0ly.
C. The attac0ers had the companys encryption 0ey.
$. The company did not 0now about the breach
immediately when it occurred.
+. The company did not 0now which data were stolen
and when.
Ans)
*esponse) Chapter opening case
>arious organi"ations that promote fair and
responsible use of information systems often develop
.....)
A. a code of ethics
. a strategic plan
C. a mission statement
$. responsibility charters
+. a goals outline
Ans) A
*esponse) 8.1 +thical !ssues
What is ..... is not necessarily ......
A. !llegal, unethical
. +thical, illegal
C. 9nethical, illegal
$. 9nethical, legal
+. +thical, legal

Ans) C
*esponse) 8.1 +thical !ssues
..... issues involve collecting, storing and
disseminating information about individuals.
A. privacy
. accuracy
C. transferability
$. property
+. accessibility
Ans) A
*esponse) 8.1 +thical !ssues
..... issues involve the authenticity and fidelity of
information that is collected and processed.
A. privacy
. accuracy
C. transferability
$. property
+. accessibility
Ans)
*esponse) 8.1 +thical !ssues
..... issues involve who may obtain information
and how much they should pay for this information.
B
A. privacy
. accuracy
C. transferability
$. property
+. accessibility
Ans) +
*esponse) 8.1 +thical !ssues
Which of the following statements is correct?
A. An individuals right to privacy is absolute.
. !t is difficult to determine and enforce privacy
regulations.
C. An individuals right to privacy supersedes the
needs of society.
$. Advances in information technologies have not
affected individual privacy.
+. The !nternet has increased individuals privacy.
Ans)
*esponse) 8.1 +thical !ssues
Which of the following statements is not correct?
A. +mployees have limited protection against
surveillance by employers.
. The large ma:ority of organi"ations monitor
employee !nternet usage.
C. The large ma:ority of organi"ations use 9*C
filtering.
$. As with normal first&class mail, employers cannot
read employee e&mail.
+. +mployees should be aware that surveillance is
legal.
Ans) $
*esponse) 8.1 +thical !ssues
Which of the following statements is correct?
A. !nternational privacy and security laws are very
consistent.
. Consistent international privacy and security laws
help companies with their regulatory re#uirements
from country to country.
C. Consistent international privacy and security laws
enable information to flow freely among countries.
$. !nternational privacy and security laws have led to
a comple- global legal framewor0.
+. Consistent international privacy and security laws
are followed by all countries.
Ans) $
*esponse) 8.1 +thical !ssues
When Ce-is&'e-is suffered a security breach, the
most important lesson that the company learned was
which of the following?
A. +ncrypt your data.
. 9se biometric identification.
C. !t is enough to protect your own internal networ0.
$. =ou must ta0e responsibility for the security of
your business partners and customers.
+. =ou must have insurance to cover the costs of a
security breach.
Ans) $
*esponse) 8.1 +thical !ssues
Which of the following factors are not increasing the
threats to information security?
A. smaller computing devices
. downstream liability
C. the !nternet
$. limited storage capacity on portable devices
+. due diligence
Ans) $
*esponse) 8.4 Threats to !nformation (ecurity
The computing s0ills necessary to be a hac0er are
decreasing for which of the following reasons?
A. More information systems and computer science
departements are teaching courses on hac0ing so that
their graduates can recogni"e attac0s on information
assets.
. Computer attac0 programs, called scripts, are
available for download from the !nternet.
C. !nternational organi"ed crime is training hac0ers.
$. Cybercrime is much more lucrative than regular
white&collar crime.
+. Almost anyone can buy or access a computer
today.
Ans )
*esponse ) Threats to !nformation (ecurity
=our companys computers have been ta0en over by
an attac0er and used to attac0 another organi"ations
information systems. =our problem is which of the
following?
A. poor security policies and procedures
. lac0 of due diligence
D
C. downstream liability
$. poor service&level agreements
+. users have a lac0 of information security
awareness
Ans) C
*esponse) 8.4 Threats to !nformation (ecurity
*an0 the following in terms of dollar value of the
crime, from highest to lowest.
A. robbery / white collar crime / cybercrime
. white collar crime / e-tortion / robbery
C. cybercrime / white collar crime / robbery
$. cybercrime / robbery / white collar crime
+. white collar crime / burglary / robbery
Ans) C
*esponse) 8.4 Threats to !nformation (ecurity
A2n3 ..... is any danger to which an information
resource may be e-posed.
A. vulnerability
. ris0
C. control
$. threat
+. compromise
Ans) $
*esponse) 8.4 Threats to !nformation (ecurity
A2n3 information systems ..... is the possibility
that the system will suffer harm by a threat.
A. vulnerability
. ris0
C. control
$. danger
+. compromise
Ans) A
*esponse) 8.4 Threats to !nformation (ecurity
+mployees in which functional areas of the
organi"ation pose particularly grave threats to
information security?
A. human resources, finance
. human resources, management information
systems
C. finance, mar0eting
$. operations management, management information
systems
+. finance, management information systems
Ans)
*esponse) 8.4 Threats to !nformation (ecurity
..... involves building an inappropriate trust
relationship with employees for the purpose of
gaining sensitive information or unauthori"ed access
privileges.
A. reverse social engineering
. hac0ing
C. spoofing
$. social engineering
+. spamming
Ans) $
*esponse) 8.4 Threats to !nformation (ecurity
$umpster diving is)
A. always illegal because it is considered trespassing
. never illegal because it is not considered
trespassing
C. typically committed for the purpose of identity
theft
$. always illegal because individuals own the
material in the dumpster
+. always legal because the dumpster is not owned by
private citi"ens
Ans) C
*esponse) 8.4 Threats to !nformation (ecurity
A2n3 ..... is intellectual wor0 that is 0nown only to
a company and is not based on public information.
A. copyright
. patent
C. trade secret
$. 0nowledge base
+. private property
Ans) C
*esponse) 8.4 Threats to !nformation (ecurity
A2n3 ..... is a document that grants the holder
e-clusive rights on an invention for 47 years.
A. copyright
. patent
C. trade secret
$. 0nowledge base
+. private property notice
E
Ans)
*esponse) 8.4 Threats to !nformation (ecurity
..... are segments of computer code that attach to
e-isting computer programs and perform malicious
acts.
A. viruses
. worms
C. Tro:an horses
$. bac0 doors
+. alien software
Ans) A
*esponse) 8.4 Threats to !nformation (ecurity
..... are software programs that hide in other
computer programs and reveal their designed
behavior only when they are activated.
A. viruses
. worms
C. Tro:an horses
$. bac0 doors
+. alien software
Ans) C
*esponse) 8.4 Threats to !nformation (ecurity
..... are segments of computer code embedded
within an organi"ations e-isting computer programs,
that activate and perform a destructive action at a
certain time or date.
A. viruses
. worms
C. Tro:an horses
$. bac0 doors
+. logic bomb
Ans) +
*esponse) 8.4 Threats to !nformation (ecurity
..... uses deception to fraudulently ac#uire
sensitive personal information by mas#uerading as an
official e&mail.
A. "ero&day attac0
. denial&of&service
C. distributed denial&of&service
$. phishing
+. brute force dictionary attac0
Ans) $
*esponse) 8.4 Threats to !nformation (ecurity
!n a2n3 ..... attac0, a coordinated stream of re#uests
is launched against a target system from many
compromised computers at the same time.
A. phishing
. denial&of&service
C. worm
$. bac0 door
+. distributed denial&of&service
Ans) +
*esponse) 8.4 Threats to !nformation (ecurity
..... is designed to use your computer as a launch
pad for sending unsolicited e&mail to other
computers.
A. spyware
. spamware
C. adware
$. virus
+. worm
Ans)
*esponse) 8.4 Threats to !nformation (ecurity
..... is the process in which an organi"ation
assesses the value of each asset being protected,
estimates the probability that each asset might be
compromised, and compares the probable costs of
each being compromised with the costs of protecting
it.
A. ris0 management
. ris0 analysis
C. ris0 mitigation
$. ris0 acceptance
+. ris0 transference
Ans)
*esponse) 8.8 6rotecting !nformation *esources
!n ....., the organi"ation ta0es concrete actions
against ris0s.
A. ris0 management
. ris0 analysis
C. ris0 mitigation
$. ris0 acceptance
+. ris0 transference
F
Ans) C
*esponse) 8.8 6rotecting !nformation *esources
!n ....., the organi"ation purchases insurance as a
means to compensate for any loss.
A. ris0 management
. ris0 analysis
C. ris0 mitigation
$. ris0 acceptance
+. ris0 transference
Ans) +
*esponse) 8.8 6rotecting !nformation *esources
Which of the following statements is not correct
concerning the difficulties in protecting information
resources?
A. Computing resources are typically decentrali"ed.
. Computer crimes often remain undetected for a
long period of time.
C. *apid technological changes ensure that controls
are effective for years.
$. +mployees typically do not follow security
procedures when the procedures are inconvenient.
+. Computer networ0s can be located outside the
organi"ation.
Ans) C
*esponse) 8.8 6rotecting !nformation *esources
..... controls restrict unauthori"ed individuals
from using information resources and are concerned
with user identification.
A. access controls
. physical controls
C. data security controls
$. administrative controls
+. input controls
Ans) A
*esponse) 8.8 6rotecting !nformation *esources
Which of the following is not a characteristic of
strong passwords?
A. should be difficult to guess
. should contain special characters
C. should not be a recogni"able word
$. should not be a recogni"able string of numbers
+. should be shorter rather than longer so the
password can be remembered
Ans) +
*esponse) 8.8 6rotecting !nformation *esources
Chapter 4
Multiple Choice
!t is very difficult to manage data for which of the
following reasons?
A. amount of data stays about the same over time
. data are scattered throughout organi"ations
C. decreasing amount of e-ternal data needs to be
considered
$. data security is easy to maintain
+. data are stored in the same format throughout
organi"ations
Ans)
*ef) <.1 Managing $ata
6lace the following members of the data hierarchy in
the correct order)
A. bit / byte / field / record / database / fileGtable
. bit / field / byte / record / fileGtable / database
C. byte / bit / record / field / database
$. bit / byte / field / record / fileGtable / database
+. bit / record / field / byte / fileGtable && database
Ans) $
*ef) <.4 The $atabase Approach
>erifying that no alphabetic characters are in a (ocial
(ecurity 'umber field is an e-ample of ..... )
A. data isolation
. data integrity
C. data consistency
$. data redundancy
+. applicationGdata dependence
Ans)
*ef) <.4 The $atabase Approach
..... occurs when the same data are stored in many
places.
A. $ata isolation
. $ata integrity
C. $ata consistency
$. $ata redundancy
+. ApplicationGdata dependence
17
Ans) $
*ef) <.4 The $atabase Approach
..... occurs when various copies of the data agree.
A. $ata isolation
. $ata integrity
C. $ata consistency
$. $ata redundancy
+. ApplicationGdata dependence
Ans) C
*ef) <.4 The $atabase Approach
A2n3 ..... represents a character, such as a letter,
number, or symbol.
A. byte
. field
C. record
$. file
+. database
Ans) A
*ef) <.4 The $atabase Approach
!n a database, the primary 0ey field is used to .....)
A. specify an entity
. create lin0ed lists
C. identify duplicated data
$. uni#uely identify a record
+. uni#uely identify an attribute
Ans) $
*ef) <.4 The $atabase Approach
As an individual student in your universitys student
database, you are a2n3 ..... of the (T9$+'T class.
A. instance
. individual
C. representative
$. entity
+. relationship
Ans) A
*ef) <.4 The $atabase Approach
At 9mass, students can ta0e more than one class, and
each class can have more than one student. This is an
e-ample of what 0ind of relationship?
A. one&to&one
. one&to&many
C. many&to&one
$. many&to&many
+. some&to&many
Ans) $
*ef) <.4 The $atabase Approach
!n the relational database model, related tables can be
:oined when they contain common ......
A. ,iles
. *ows
C. *ecords
$. ColumnsG,ields
Ans) $
*ef) <.8 $atabase Management (ystems
$ata dictionaries perform all of the following
functions e-cept)
A. 6rovide information on each record
. 6rovide information on why fieldsGattributes are
needed in the database
C. $efine the format necessary to enter data into the
database
$. 6rovide information on name of fieldsGattributes
+. 6rovide information on how often fieldsGattributes
should be updated
Ans) A
*ef) <.8 $atabase Management (ystems
!n a relational database, every row represents a
.....)
A. file
. record
C. attribute
$. primary 0ey
+. secondary 0ey
Ans)
*ef) <.8 $atabase Management (ystems
A standardi"ed language used to manipulate data is
.....)
A. M(&Access
. %racle
C. #uery&by&e-ample language
$. structured #uery language 2(HC3
+. data manipulation language 2$MC3
11
Ans) $
*ef) <.8 $atabase Management (ystems
$ata dictionaries provide which of the following
advantages to the organi"ation?
A. reduce data inconsistency
. provide for faster program development
C. ma0e it easier to modify data and information
$. all of the above
Ans) $
*ef) <.8 $atabase Management (ystems
..... is a method for analy"ing and reducing a
relational database to its most streamlined form.
A. (tructured #uery
. 'ormali"ation
C. Huery by e-ample
$. @oining
+. *elational analysis
Ans)
*ef) <.8 $atabase Management (ystems
When data are normali"ed, fieldsGattributes in the
table depend only on the ......
A. Common record
. Common attribute
C. 6rimary 0ey
$. Common row
Ans) C
*ef) <.8 $atabase Management (ystems
The data in a data warehouse)
A. Are updated constantly in real time
. Are updated in batch mode, appro-imately once
per day
C. Are not updated
$. Are purged constantly as new data enter
+. Are available for M!( analysts, but not users
Ans) C
*ef) <.< $ata Warehousing
The process of moving data from various sources into
the data warehouse is called)
A. 9pload
. +-tract, transform, load
C. %nline transaction processing
$. Master data management
+. %nline analytical processing
Ans)
*ef) $ata Warehousing
..... is a formal approach to managing data
consistently across an entire organi"ation.
A. $atabase management
. +nterprise information management
C. $ata warehousing
$. $ata governance
+. $ata mart
Ans ) $
*ef ) $ata 5overnance
$ifficulty ) +asy
..... provides companies with a single version of
the truth for their data.
A. $ata warehouse
. $ata mart
C. $atabase
$. Master data management
+. +nterprise information management
Ans) $
*ef) <.? $ata 5overnance
..... is a process that helps organi"ations identify,
select, organi"e, disseminate, transfer, and apply
e-pertise that are part of the organi"ations memory
and typically reside inside the organi"ation in an
unstructured manner.
A. discovery
. 0nowledge management
C. decision support
$. online analytical processing
+. data mining
Ans)
*ef) <.B Inowledge Management
;istorically, management information systems have
focused on capturing, storing, managing, and
reporting ..... 0nowledge.
A. tacit
. e-plicit
C. managerial
14
$. geographical
+. cultural
Ans)
*ef) <.B Inowledge Management
The most important benefit of 0nowledge
management systems is)
A. !mproved customer service
. Ma0e best practices available to employees
C. *etention of scarce 0nowledge if employees retire
$. !mproved morale
+. More efficient product development
Ans)
*ef) Inowlege Management
Chapter 5
Multiple Choice
,undamental points about networ0 computing in
organi"ations include all of the following e-cept)
A. Computers constantly e-change data
. Computer data e-change provides significant
advantages to organi"ations
C. 'etwor0s can be of any si"e, from small to
enormous
$. 'etwor0s have had limited impact on
organi"ational productivity
+. 'etwor0s support new ways of doing business
Ans) $
*esponse) Material immediately following chapter
opening case
'etwor0s enable which of the following
applications?
A. $iscovery
. Communications
C. Collaboration
$. Web services
+. All of the above
Ans) +
*esponse) Material immediately following chapter
opening case
Which of the following are advantages of computer
networ0s?
A. enable organi"ations to be more fle-ible
. enable companies to share hardware, computer
applications, and data
C. enable geographically dispersed employees to
wor0 together
$. provide a critical lin0 between businesses and
their customers
+. all of the above
Ans) +
*esponse) Material immediately following chapter
opening case
The networ0 application, ....., enables users to
access information located in databases all over the
world.
A. discovery
. communications
C. collaboration
$.Web services
+. none of the above
Ans) A
*esponse) ?.1 'etwor0 Applications
(earch engines and metasearch engines are e-amples
of which networ0 application?
A. $iscovery
. Communications
C. Collaboration
$. Web services
+. 'one of the above
Ans) A
*esponse) ?.1 'etwor0 Applications
The amount of information on the Web .....
appro-imately each year.
A. stays about the same
. decreases
C. doubles
$. #uadruples
+. triples
Ans) C
*esponse) ?.1 'etwor0 Applications
..... portals offer content for diverse communities
and are intended for broad audiences.
A. !ndustrywide
. 6ersonal
18
C. Affinity
$. Corporate
+. Commercial
Ans) +
*esponse) ?.1 'etwor0 Applications
..... portals support communities such as hobby
groups or a political party.
A. !ndustrywide
. 6ersonal
C. Affinity
$. Corporate
+. Commercial
Ans) C
*esponse) ?.1 'etwor0 Applications
..... portals coordinate content within relatively
narrow organi"ational and partners communities.
A. publishing
. personal
C. affinity
$. corporate
+. commercial
Ans) $
*esponse) ?.1 'etwor0 Applications
Many organi"ations have implemented corporate
portals for which of the following reasons?
A. to cut costs
. free up time for busy managers
C. improve profitability
$. offer customers self&service opportunities
+. all of the above
Ans) +
*esponse) ?.1 'etwor0 Applications
6ortals are an e-ample of which networ0 application?
A. $iscovery
. Collaboration
C. Communications
$. Web services
+. 'one of the above
Ans) A
*esponse) ?.1 'etwor0 Applications
With ....., every call opened up a dedicated circuit
for the duration of the call.
A. voice over !6
. plain old telephone service
C. chat room
$. teleconference
+. !nternet relay chat
Ans)
*esponse) ?.1 'etwor0 Applications
With ....., phone calls are treated as :ust another
0ind of data.
A. >oice over !6
. 6lain old telephone service
C. Chat room
$. Teleconference
+. !nternet relay chat
Ans) A
*esponse) ?.1 'etwor0 Applications
Wor0flow, groupware, and telepresence systems are
e-amples of which networ0 application?
A. $iscovery
. Communications
C. Collaboration
$. Web services
+. 'one of the above
Ans) C
*esponse) ?.1 'etwor0 Applications
Iey developments of the first generation of the Web
were)
A. Creation of Web sites
. ;eavy user interactivity with Web sites
C. Commerciali"ation of the Web
$. A and
+. A and C
Ans) +
*esponse) ?.4 Web 4.7
9sers typically have little interaction with .....,
which provide information that users receive
passively.
A. Affinity portals
. Web 1.7 sites
1<
C. Web 4.7 sites
$. Wi0is
+. Web 8.7 sites
Ans)
*esponse) ?.4 Web 4.7
..... is a Web development techni#ue that allows
portions of Web pages to reload with fresh data rather
than re#uiring the entire page to reload.
A. A@AA
. Tagging
C. *eally simple syndication
$. Wi0is
+. logging
Ans) A
*esponse) ?.4 Web 4.7
A process that allows users to place information in
multiple, overlapping associations is called ......
A. A@AA
. Tagging
C. *eally simple syndication
$. Wi0is
+. logging
Ans)
*esponse) ?.4 Web 4.7
$ifficulty) +asy
A process that enables users to create a personal Web
site containing his or her thoughts, feelings, and
opinions is called ......
A. A@AA
. Tagging
C. *eally simple syndication
$. Wi0is
+. logging
Ans) +
*esponse) ?.4 Web 4.7
A Web site on which anyone can post material and
ma0e changes to other material is a2n3 ......
A. log
. Wi0i
C. Affinity portal
$. *eally simple syndication feed
+. 6odcast
Ans)
*esponse) ?.4 Web 4.7
%nly the author may ma0e changes to a2n3 .....,
where anyone can ma0e changes to any content on
a2n3 ......
A. log, really simple syndication feed
. log, Wi0i
C. 6odcast, Wi0i
$. 6odcast, really simple syndication feed
+. Wi0i, blog
Ans)
*esponse) ?.4 Web 4.7
..... allows users to receive customi"ed
information when they want it, without having to surf
thousands of Web sites.
A. A@AA
. Tagging
C. logging
$. 6odcasting
+. *eally simple syndication
Ans) +
*esponse) ?.4 Web 4.7
A2n3 ..... is a digital audio file that is distributed
over the Web for playbac0 on portable media players
or personal computers.
A. *eally simple syndication feed
. log
C. 6odcast
$. >ideocast
+. Wi0i
Ans) C
*esponse) ?.4 Web 4.7
..... Web sites allow users to upload their content
to the Web, in the form of te-t, voice, images, and
videos.
A. Aggregators
. Mashups
C. (ocial networ0ing
$. Affinity portals
+. *eally simple syndication
Ans) C
1?
*esponse) ?.4 Web 4.7
A particularly valuable business&oriented social
networ0ing site is)
A. My(pace
. ,aceoo0
C. ,lic0r
$. Cin0ed!n
+. Twitter
Ans) $
*esponse) ?.4 Web 4.7
..... are Web sites that provide collections of
content from all over the Web.
A. Aggregators
. (ocial networ0s
C. Mashups
$. Corporate portals
+. *eally simple syndication
Ans) A
*esponse) ?.4 Web 4.7
A2n3 ..... is a Web site that ta0es content from
other Web sites and puts it together to create a new
type of content.
A. Aggregators
. (ocial networ0s
C. Mashups
$. Corporate portals
+. *eally simple syndication
Ans) C
*esponse) ?.4 Web 4.7
ChicagoCrime is a Web site that combines the
Chicago 6olice $epartments crime&report
information with 5oogle Maps to provide a guide to
crime in Chicago. ChicagoCrime is an e-ample of
which 0ind of Web 4.7 site?
A. Aggregators
. (ocial networ0s
C. Mashups
$. Corporate portals
+. *eally simple syndication
Ans) C
*esponse) ?.4 Web 4.7
..... are applications, delivered over the !nternet,
that use shared protocols to interoperate without
human intervention.
A. 6ortals
. Web services
C. (ervice&oriented architectures
$. Wi0is
+. Webcrawlers
Ans)
*esponse) ?.4 Web 4.7
..... is a protocol that ma0es it easier to e-change
data among a variety of applications and to validate
and interpret such data.
A. +-tensible mar0up language 2AMC3
. (imple ob:ect access protocol
C. Web services description language 2W($C3
$. 9niversal description, discovery, and integration
29$$!3
+. ;yperte-t mar0up language 2;TMC3
Ans) A
*esponse) ?.4 Web 4.7
..... is a set of rules that define how messages can
be e-changed among different networ0 systems and
applications.
A. +-tensible mar0up language
. (imple ob:ect access protocol
C. Web services description language
$. 9niversal description, discovery, and integration
+. ;yperte-t mar0up language
Ans)
*esponse) ?.4 Web 4.7
..... is used to create the document that describes
the tas0s performed by various Web services.
A. +-tensible mar0up language
. (imple ob:ect access protocol
C. Web services description language
$. 9niversal description, discovery, and integration
+. ;yperte-t mar0up language
Ans) C
*esponse) ?.4 Web 4.7
1B
The benefits of e&learning include which of the
following?
A. increased content retention
. current, high&#uality content
C. consistency
$. fle-ibility
+. all of the above
Ans) +
*esponse) ?.8 +&Cearning and $istance Cearning
Which of the following is not a disadvantage of
telecommuting for employees?
A. decreased feelings of isolation
. possible loss of fringe benefits
C. lower pay 2in some cases3
$. no wor0place visibility
+. slower promotions
Ans) A
*esponse) ?.< Telecommuting
Chapter 6
Multiple Choice
The nature of business competition is changing
drastically as a result of all of the following e-cept)
A. new online companies
. new business models
C. the diversity of +C&related products and services
$. the increase in the number of digiti"able products
+. companies are having difficulty integrating their
physical and electronic channels
Ans) +
*esponse) Material immediately following chapter
opening case
+lectronic commerce provides opportunities to do all
of the following e-cept)
A. ,or companies to e-pand their reach
. ,or companies to e-pand at relatively high cost
C. ,or companies to put rich information on their
Web sites
$. ,or companies to increase mar0et share
+. ,or companies to adopt new business models
Ans)
*esponse) Material immediately following chapter
opening case
!n this type of e&commerce, the sellers and buyers are
organi"ations.
A. government&to&citi"en
. consumer&to&consumer
C. business&to&business
$. business&to&consumer
+. consumer&to&business
Ans) C
*esponse) B.1 %verview of +&usiness and +&
Commerce
!n this type of e&commerce, an organi"ation provides
information and services to its wor0ers.
A. business&to&employee
. consumer&to&consumer
C. consumer&to&business
$. business&to&consumer
+. government&to&business
Ans) A
*esponse) B.1 %verview of +&usiness and +&
Commerce
$irect payment of (ocial (ecurity benefits is an
e-ample of which type of e&commerce?
A. government&to&citi"en
. consumer&to&consumer
C. consumer&to&business
$. business&to&consumer
+. business&to&business
Ans) A
*esponse) B.1 %verview of +&usiness and +&
Commerce
!f you are an employee managing your fringe benefits
over your companys intranet, you are engaging in
which of the following?
A. business&to&business
. business&to&consumer
C. consumer&to&consumer
$. business&to&employee
+. government&to&citi"en
Ans) $
1D
*esponse) B.1 %verview of +&usiness and +&
Commerce
Which of the following statements regarding the
relationship between electronic commerce and search
is not correct?
A. 6urchases often follow successful online searches
. (hopping carts are often abandoned after
unsuccessful online searches
C. *etailers will provide fewer product details to
avoid information overload for customers
$. Customers will be able to find the closest store
offering the product that they want
+. Customers will have more relevant product
information in the near future
Ans) C
*esponse) B.1 %verview of +&usiness and +&
Commerce
!n ..... auctions, there is one buyer who wants to
buy a product. (uppliers submit bids and the lowest
bid wins.
A. forward
. static
C. reverse
$. physical
+. simple
Ans) C
*esponse) B.1 %verview of +&usiness and +&
Commerce
1?. eay uses a ..... auction.
A. forward
. static
C. reverse
$. physical
+. simple
Ans) A
*esponse) B.1 %verview of +&usiness and +&
Commerce
1B. ..... auctions employ a re#uest for #uotation.
A. forward
. static
C. reverse
$. physical
+. simple
Ans) C
*esponse) B.1 %verview of +&usiness and +&
Commerce
!n which of the following business models do
businesses re#uest #uotes from suppliers and use
4 with a reverse auction mechanism?
A. find&the&best&price
. electronic tendering system
C. name&your&own&price
$. online direct mar0eting
+. affiliate mar0eting
Ans)
*esponse) B.1 %verview of +&usiness and +&
Commerce
>endors as0 partners to place logos or banners on
partners site. !f customers clic0 on logo, go to
vendors site and buy, then vendor pays commissions
to partners. This is which business model?
A. find&the&best&price
. electronic tendering system
C. name&your&own&price
$. online direct mar0eting
+. affiliate mar0eting
Ans) +
*esponse) B.1 %verview of +&usiness and +&
Commerce
Which type of electronic commerce is the largest by
volume?
A. business&to&employee
. consumer&to&consumer
C. business&to&business
$. business&to&consumer
+. none of the above
Ans) C
*esponse) B.8 usiness&to&usiness 243 +lectronic
Commerce
Which type of electronic commerce does Ama"on
practice?
A. business&to&employee
. consumer&to&consumer
C. consumer& to&business
$. business&to&consumer
1E
+. employee&to&business
Ans) $
*esponse) B.4 usiness&to&Consumer 24C3
+lectronic Commerce
This type of e&commerce is 0nown as e&tailing.
A. business&to&business
. collaborative commerce
C. intrabusiness
$. business&to&consumer
+. consumer&to&business
Ans) $
*esponse) B.4 usiness&to&Consumer 24C3
+lectronic Commerce
The advantages of 4C for consumers include all of
the following e-cept)
A. =ou can buy from home 4< hours per day, D days
per wee0.
. =ou have a wider variety of products to choose
from.
C. =ou typically cannot access additional
information, so you do not have information
overload.
$. =ou can easily compare prices and features.
+. =ou can find uni#ue items.
Ans) C
*esponse) B.4 usiness&to&Consumer 24C3
+lectronic Commerce
Which of the following is not an advantage of e&
tailing?
A. you can buy from home, 4< hours per day
. you have :ust a few products to choose from
C. you can obtain detailed information on products
$. you can compare competitors products and prices
+. all of the above
Ans)
*esponse) B.4 usiness&to&Consumer 24C3
+lectronic Commerce
When middlemen are eliminated in a fully automated
electronic commerce transaction, this is called ......
A. disintegration
. supply chain integration
C. direct sales
$. disintermediation
+. value&added services
Ans) $
*esponse) B.4 usiness&to&Consumer 24C3
+lectronic Commerce
When ,ord Motor Company decided to avoid direct
online sales, the company was trying to eliminate
which of the following?
A. federal sales ta-es
. customer irritation
C. channel conflict
$. channel integration
+. state sales ta-es
Ans) C
*esponse) B.4 usiness&to&Consumer 24C3
+lectronic Commerce
!n ....., direct and indirect materials in one industry
are purchased on an as&needed basis.
A. hori"ontal e-changes
. vertical e-changes
C. buy&side mar0etplaces
$. functional e-changes
+. sell&side mar0etplaces
Ans)
*esponse) B.8 usiness&to&usiness 243 +lectronic
Commerce
..... connect buyers and sellers across many
industries and are used mainly for indirect materials.
A. ;ori"ontal e-changes
. >ertical e-changes
C. uy&side mar0etplaces
$. ,unctional e-changes
+. (ell&side mar0etplaces
Ans) A
*esponse) B.8 usiness&to&usiness 243 +lectronic
Commerce
Which of the following is not a limitation of
traditional payment methods in electronic commerce?
A. cash cannot be used because there is no face&to&
face contact
. ta0es time for payment in the mail
C. not all organi"ations accept credit cards
1F
$. it is more secure for the buyer to use the telephone
than to complete a secure transaction on a computer
+. none of the above
Ans) $
*esponse) B.< +lectronic 6ayments
..... are a payment mechanism similar to regular
ban0 chec0s but transmitted electronically, with a
signature in digital form.
A. +lectronic chec0s
. +lectronic credit cards
C. +lectronic cash
$. +lectronic wallet
+. +lectronic debit cards
Ans) A
*esponse) B.< +lectronic 6ayments
..... use credit card numbers, transmitted
electronically over the !nternet, to pay for goods and
services and are encrypted
A. +lectronic chec0s
. +lectronic credit cards
C. +lectronic cash
$. +lectronic wallet
+. +lectronic debit cards
Ans)
*esponse) B.< +lectronic 6ayments
..... are typically used for unplanned 4
purchases for amounts under J4777.
A. +lectronic chec0s
. (tored&value money cards
C. 6urchasing cards
$. (mart cards
+. 6erson&to&person payments
Ans) C
*esponse) B.< +lectronic 6ayments
A form of e&cash, ..... allows you to store a fi-ed
amount of prepaid money and then spend it as
necessary.
A. electronic chec0s
. stored&value money cards
C. purchasing cards
$. smart cards
+. person&to&person payments
Ans)
*esponse) B.< +lectronic 6ayments
..... contain a chip that can store information and
can be used for several purposes.
A. +lectronic chec0s
. (tored&value money cards
C. 6urchasing cards
$. (mart cards
+. 6erson&to&person payments
Ans) $
*esponse) B.< +lectronic 6ayments
The practice of using similar but not identical domain
names is called ......
A. $omain spoofing
. $omain mas#uerading
C. $omain tasting
$. Cybers#uatting
+. $omain fraud
Ans) C
*esponse) B.? +thical and Cegal !ssues in +&usiness
..... refers to the practice of registering or using
domain names for the purpose of profiting from the
goodwill or trademar0 belonging to someone else.
A. $omain spoofing
. $omain mas#uerading
C. $omain tasting
$. Cybers#uatting
+. $omain fraud
Ans) $
*esponse) B.? +thical and Cegal !ssues in +&usiness
Chapter 7
Multiple Choice
!ndividuals are finding it convenient and productive
to use wireless devices for which of the following
reasons?
A. To ma0e use of time that was formerly wasted
. To become more efficient
C. Wor0 locations are more fle-ible
$. To be able to allocate wor0ing time around
personal and professional obligations
+. All of the above
47
Ans) +
*esponse) D.1 Wireless Technologies
Which type of satellite has the largest footprint?
A. low earth orbit
. medium earth orbit
C. geostationary
$. polar orbit
+. e#uatorial orbit
Ans) C
*esponse) D.1 Wireless Technologies
The area of the earth reached by a satellites
transmission is called ......
A. ;otspot
. Coverage
C. ,ootprint
$. Kone
+. Wireless area
Ans) C
*esponse) D.1 Wireless Technologies
The greatest problem with 5+% satellites is which of
the following?
A. 6ropagation delay
. +-pense
C. %rbital life
$. (i"e of footprint
+. *elative speed with respect to a point on the
earths surface
Ans) A
*esponse) D.1 Wireless Technologies
..... is a satellite&based trac0ing system that
enables the determination of a persons position.
A. luetooth
. wireless application protocol
C. short message service
$. wi&fi
+. global positioning system
Ans) +
*esponse) D.1 Wireless Technologies
The main problem with radio transmission is which
of the following?
A. *adio waves cannot travel through walls
. When you travel too far from the source, the signal
fades
C. $evices are difficult to install
$. *adio waves are slow
+. $evices are e-pensive to install
Ans)
*esponse) D.1 Wireless Technologies
..... is a wireless standard that enables temporary,
short&range connection between mobile devices.
A. luetooth
. wireless application protocol
C. short message service
$. wi&fi
+. global positioning system
Ans) A
*esponse) D.4 Wireless Computer 'etwor0s and
!nternet Access
....., with the shortest range of any wireless
networ0, is designed to be used with contactless
credit cards.
A. 'ear field communications
. luetooth
C. 9ltra&wideband
$. Wi&,i
+. !nfrared
Ans) A
*esponse) D.4 Wireless Computer 'etwor0s and
!nternet Access
Microwave transmission systems are used for .....
volume, ..... distance, ..... communications.
A. Cow, long, broadcast
. Cow, short, line&of&sight
C. ;igh, long, broadcast
$. ;igh, short, broadcast
+. ;igh, long, line&of&sight
Ans) +
*esponse) D.4 Wireless Computer 'etwor0s and
!nternet Access
41
Which of the following statements about Wi&,i is not
correct?
A. Wi&,i provides simple !nternet access.
. Captop 6Cs can contain chips that send and
receive Wi&,i signals.
C. Many companies offer free Wi&,i access in their
stores.
$. Wi&,i re#uires encryption for secure
transmissions.
+. Wi&,i is e-pensive to set up.
Ans) +
*esponse) D.4 Wireless Computer 'etwor0s and
!nternet Access
A small geographical perimeter within which a
wireless access point provides service to a number of
users is called)
A. transceiver
. hotspot
C. local reception
$. wireless networ0
+. 56( location
Ans)
*esponse) D.4 Wireless Computer 'etwor0s and
!nternet Access
Today, most wireless local area networ0s use the
..... standard, which can transmit up to ?< Mbps
and has a range of about 877 feet.
A. ???.11aGb
. D74.11gGn
C. ED4.11c
$. E74.11gGn
+. Wi&Ma-
Ans) $
*esponse) D.4 Wireless Computer 'etwor0s and
!nternet Access
..... communicate via radio waves using radio
antennas placed within ad:acent geographic areas.
A. luetooth
. Cell phones
C. (atellite
$. 9ltra&wideband
+. 'ear field communications
Ans)
*esponse) D.4 Wireless Computer 'etwor0s and
!nternet Access
Mobile computing has two ma:or characteristics that
differentiate it from other forms of computing. What
are these two characteristics?
A. Mobility, broad reach
. Mobility, lac0 of e-pense
C. (ecurity, broad reach
$. (ecurity, mobility
+. road reach, locali"ation
Ans) A
*esponse) D.8 Mobile Computing and Mobile
Commerce
With regard to mobile computing, ..... means that
0nowing where a user is physically is a 0ey to
offering relevant products and services.
A. ubi#uity
. convenience
C. instant connectivity
$. personali"ation
+. locali"ation of products and services
Ans) +
*esponse) D.8 Mobile Computing and Mobile
Commerce
The development of mobile commerce is driven by
all of the following factors e-cept)
A. widespread availability of mobile devices
. the cell phone culture
C. increasing prices
$. bandwidth improvement
+. no need for a 6C
Ans) C
*esponse) D.8 Mobile Computing and Mobile
Commerce
Which of the following is not a mobile application in
financial services?
A. transaction processing systems
. mobile ban0ing
C. wireless electronic payment systems
$. micropayments
+. wireless wallets
Ans) A
44
*esponse) D.8 Mobile Computing and Mobile
Commerce
6ar0ing meters that you can pay via your mobile
telephone is an e-ample of)
A. mobile ban0ing
. wireless electronic payment
C. wireless wallet
$. bro0erage service
+. money transfer
Ans)
*esponse) D.8 Mobile Computing and Mobile
Commerce
6utting ads on top of ta-icabs in 'ew =or0 City that
change as the cabs travel around the city is an
e-ample of)
A. viral mar0eting
. permission advertising
C. geographical advertising
$. location&based advertising
+. direct mar0eting
Ans) $
*esponse) D.8 Mobile Computing and Mobile
Commerce
The generic term for technologies that use radio
waves to automatically identify individual items is)
A. telemetry
. bar codes
C. shipping labels
$. radio&fre#uency identification 2*,!$3
+. wireless access point 2WA63
Ans) $
*esponse) D.< 6ervasive Computing
Which of the following is not a problem with bar
codes?
A. They do not provide enough data.
. They re#uire line&of&sight.
C. They can be ripped or soiled.
$. They are e-pensive.
+. They identify the manufacturer and product, but
not the actual item.
Ans) $
*esponse) D.< 6ervasive Computing
..... collect data from many points over an
e-tended space.
A. luetooth networ0s
. 9ltra&wideband networ0s
C. Wireless sensor networ0s
$. Wi&Ma- networ0s
+. Wi&,i networ0s
Ans) C
*esponse) D.< 6ervasive Computing
The act of locating wireless local area networ0s while
moving around a city is called)
A. war dialing
. war driving
C. war hac0ing
$. war crac0ing
+. war chal0ing
Ans)
*esponse) D.? Wireless (ecurity
A2n3 ..... allows unauthori"ed entry into a wireless
networ0.
A. Cac0 of encryption
. $isgruntled employee
C. %pen node
$. !llegal server
+. *ogue access point
Ans) +
*esponse) D.? Wireless (ecurity
..... refers to efforts by unauthori"ed users to
access data traveling over wireless networ0s.
A. *, :amming
. War driving
C. +avesdropping
$. War chal0ing
+. !nstalling rogue access points
Ans) C
*esponse) D.? Wireless (ecurity
!n ....., a person or a device intentionally or
unintentionally interferes with your wireless networ0
transmissions.
A. *, :amming
48
. War driving
C. +avesdropping
$. War chal0ing
+. !nstalling rogue access points
Ans) A
*esponse) D.? Wireless (ecurity
Technology Guide 1
Multiple Choice
Which of the following is not a component of
hardware?
A. 6rimary and secondary storage
. The operating system
C. !nput and output technologies
$. Central processing unit
+. Communication technologies
Ans)
*ef) T51.4 The Central 6rocessing 9nit
Which of the following is not a component of the
central processing unit?
A. *egisters
. Control unit
C. (econdary storage
$. Arithmetic&logic unit
Ans) C
*ef) T51.4 The Central 6rocessing 9nit
The ..... is measured in megahert" or gigahert".
A. cloc0 speed
. word length
C. bus width
$. line width
+. bandwidth
Ans) A
*ef) T51.4 The Central 6rocessing 9nit
5ordon Moore 2with Moores Caw3 predicted that
microprocessor comple-ity would do which of the
following?
A. $ouble every year
. $ouble every two years
C. !ncrease slowly
$. $ecrease slowly
+. $ecrease rapidly
Ans)
*ef) T51.4 The Central 6rocessing 9nit
!ncreased microprocessor comple-ity comes from
which of the following?
A. $ecreasing line width
. !ncreasing transistor miniaturi"ation
C. 9sing new materials for the chip that increase
conductivity
$. 6utting more transistors on the chip
+. All of the above
Ans) +
*ef) T51.4 The Central 6rocessing 9nit
The amount and type of memory that a computer
possesses affects which of the following?
A. The type of program the computer can run
. The speed of the computer
C. The cost of the computer
$. The cost of processing data
+. All of the above
Ans) +
*ef) T51.8 Computer Memory
Arrange in the correct se#uence, from smallest to
largest)
A. megabyte / 0ilobyte / gigabyte / terabyte
. 0ilobyte / megabyte / terabyte / gigabyte
C. 0ilobyte / megabyte / gigabyte / terabyte
$. megabyte / terabyte / 0ilobyte / gigabyte
+. 0ilobyte / gigabyte / megabyte / terabyte
Ans) C
*ef) T51.8 Computer Memory
Which of the following is not stored in primary
storage?
A. $ata to be processed by the C69
. !nstructions for the C69 as to how to process the
data
C. Archival data
$. %perating system programs
+. 'one of the above
Ans) C
*ef) T51.8 Computer Memory
4<
Which of the following is not a type of primary
storage?
A. *egister
. *andom access memory
C. ,lash memory
$. *ead&only memory
+. Cache memory
Ans) C
*ef) T51.8 Computer Memory
The part of primary storage that holds a software
program 2or portion of it3 and small amounts of data
when they are brought from secondary storage is
called
A. read&only memory
. random access memory
C. cache memory
$. registers
+. flash memory
Ans)
*ef) T51.8 Computer Memory
*andom access memory is ..... and ......
A. volatile, temporary
. nonvolatile, permanent
C. nonvolatile, temporary
$. volatile, permanent
+. 'one of the above
Ans) A
*ef) T51.8 Computer Memory
Which of the following is not a type of primary
storage?
A. *andom access memory
. *egisters
C. Cache
$. *ead&only memory
+. %ptical (torage
Ans) +
*ef) T51.8 Computer Memory
The type of primary storage, closest to the C69
where the computer can temporarily store bloc0s of
data used most often is called
A. read&only memory
. registers
C. random access memory
$. cache memory
+. flash memory
Ans) $
*ef) T51.8 Computer Memory
The type of primary storage where certain critical
instructions are safeguarded because the storage is
nonvolatile and the instructions can be read only by
the computer and not changed by the user is called
A. read&only memory
. random access memory
C. cache memory
$. registers
+. flash memory
Ans) A
*ef) T51.8 Computer Memory
(econdary storage has which of the following
characteristics?
A. 'onvolatile
. More cost effective than primary storage
C. (lower than primary storage
$. Can utili"e a variety of media
+. All of the above
Ans) +
*ef) T51.8 Computer Memory
....., a type of enterprise storage system, lin0s
groups of hard drives to a speciali"ed
microcontroller, which coordinates the drives so they
appear to be a single, logical drive.
A. *edundant array of independent dis0s 2*A!$3
. (torage area networ0 2(A'3
C. 'etwor0&attached storage 2'A(3
$. (econdary storage
+. 6rimary storage
Ans) A
*ef) T51.8 Computer Memory
....., a type of enterprise storage system, is an
architecture for building dedicated networ0s that
allow rapid and reliable access to storage devices by
multiple servers.
A. *edundant array of independent dis0s 2*A!$3
4?
. (torage area networ0 2(A'3
C. 'etwor0&attached storage 2'A(3
$. (econdary storage
+. 6rimary storage
Ans)
*ef) T51.8 Computer Memory
To model the weather or simulate nuclear weapons
testing, you would most li0ely use a
A. mainframe computer
. wor0station
C. supercomputer
$. personal computer
+. active badge
Ans) C
*ef) T51.< Computer ;ierarchy
A ..... is used in large enterprises for e-tensive
computing applications that are accessed by
thousands of concurrent users.
A. supercomputer
. mainframe
C. midrange computer
$. microcomputer
+. laptop computer
Ans)
*ef) T51.< Computer ;ierarchy
Many firms are recentrali"ing their applications to
mainframes for which of the following reasons?
A. To support the large number of transactions caused
by electronic commerce
. To reduce the total cost of ownership of distributed
systems
C. To simplify administration of !T resources
$. To improve system performance
+. all of the above
Ans) +
*ef) T51.< Computer ;ierarchy
A ..... is the least e-pensive general&purpose
computer.
A. supercomputer
. mainframe
C. midrange computer
$. microcomputerGpersonal computer
+. 'one of the above

Ans) $
*ef) T51.< Computer ;ierarchy
!n ....., a service provider ma0es computing
resources and infrastructure management available to
a customer as needed.
A. server farm
. virtuali"ation
C. grid computing
$. utilityGsubscription computing
+. the !nternet
Ans) $
*ef) T51.B !nnovations in ;ardware 9tili"ation
..... refers to the creation of materials, devices, and
systems on a scale of billionths of a meter.
A. 'anotechnology
. 9ltra&large scale integration
C. >ery&large scale integration
$. 9tility computing
+. +dge computing
Ans) A
*ef) T51.B !nnovations in ;ardware 9tili"ation
Technology Guide 2
Multiple Choice
Today, software comprises a larger percentage of the
cost of modern computer systems than it did in the
early 1F?7s for which of the following reasons?
A. ;ardware costs have decreased
. ;ardware performance has increased
C. (oftware has become increasingly comple-
$. uilding software applications remains slow,
comple-, and error&prone
+. All of the above
Ans) +
*ef) T54.1 (ignificance of (oftware
The set of computer programs used to manage
hardware resources is called
A. Microsoft %ffice (uite
. application software
C. general software
$. systems software
+. personal application software
4B
Ans) $
*ef) T54.1 (ignificance of (oftware
The set of computer instructions that provides
specific functionality to a user is called
A. transaction processing software
. application software
C. general software
$. systems software
+. microcode
Ans)
*ef) T54.1 (ignificance of (oftware
Which of the following is not a function of the
operating system?
A. Allocates C69 time and main memory to
programs running on the computer
. 6rovides an interface between the user and the
hardware
C. (upervises the overall operation of the computer
$. !ncreases the comple-ity of the system to the user
+. 'one of the above
Ans) $
*ef) T54.4 (ystems (oftware
..... means that several parts of the same
application can wor0 simultaneously.
A. Multithreading
. Multitas0ing
C. Time&sharing
$. (calability
+. Multiprocessing
Ans) A
*ef) T54.4 (ystems (oftware
..... occurs when a computer system with two or
more processors runs more than one program, or
thread, at a given time by assigning them to different
processors.
A. Multithreading
. Multitas0ing
C. Time&sharing
$. (calability
+. Multiprocessing
Ans) +
*ef) T54.4 (ystems (oftware
..... are programs that sort records, create
directories and sub&directories, restore accidently
deleted files, and manage memory usage.
A. (ystem utilities
. 5eneral application software
C. 6ersonal application software
$. (ystem performance monitors
+. (ystem security monitors
Ans) A
*ef) T54.4 (ystems (oftware
..... are programs that protect a computer system
from unauthori"ed use, fraud, and destruction.
A. (ystem utilities
. 5eneral application software
C. 6ersonal application software
$. (ystem performance monitors
+. (ystem security monitors
Ans) +
*ef) T54.4 (ystems (oftware
Creating specific application software using an
organi"ations own resources is called what?
A. %utsourcing
. Consultant&based development
C. !n&house development
$. Contract software
+. Application service providers
Ans) C
*ef) T54.8 Application (oftware
%ff&the&shelf software ......
A. may not match an organi"ations current wor0
processes and data
. is more fle-ible in ma0ing modifications
C. re#uires more ris0 because all features and
performance are not 0nown
$. is rarely tested prior to release
Ans) A
*ef) T54.8 Application (oftware
Which of the following is not a factor in the selection
of software?
4D
A. (i"e and location of the user base
. 'umber of the C$s re#uired for the software
C. Costs
$. !n&house technical s0ills
+. (ystem capabilities
Ans)
*ef) T54.< (oftware !ssues
!n order to protect their software from illegal
distribution, vendors often rely on .....
A. encryption
. private security agents
C. software licensing
$. !nternet&based distribution methods
Ans) C
*ef) T54.< (oftware !ssues
..... is software whose source code is available at
no cost to developers and users.
A. ,reeware
. (hareware
C. %pen systems
$. %pen source software
+. (oftware&as&a&service
Ans) $
*ef) T54.< (oftware !ssues
Which of the following is not an advantage of open&
source software?
A. 6roduces high #uality code
. 6roduces code that can be changed to meet the
needs of the users
C. ugs are discovered #uic0ly
$. Cimited support is available only through online
communities of core developers
+. 6roduces reliable code
Ans) $
*ef) T54.< (oftware !ssues
Which of the following is not a disadvantage of open&
source software?
A. %rgani"ations need in&house technical support or a
maintenance contract from a third party
. May not be easy to use
C. May ta0e time and money to train users
$. May not be compatible with e-isting systems
+. *uns slower than comparable vendor&developed
software
Ans) +
*ef) T54.< (oftware !ssues
..... is software that typically allows no access to
the underlying source code.
A. ,reeware
. (hareware
C. %pen systems
$. %pen source software
Ans)
*ef) T54.< (oftware !ssues
6rogramming languages that use icons, symbols, and
pull&down menus to develop applications are called
.....
A. ob:ect&oriented languages
. second generation languages
C. visual programming languages
$. @ava
+. third generation languages
Ans) C
*ef) T54.? 6rogramming Canguages
!n an ob:ect&oriented language, one of the primary
advantages of an ob:ect is that it contains .....
A. reusable code
. reusable data
C. embedded graphics
$. messages
+. no errors
Ans) A
*ef) T54.? 6rogramming Canguages
Technology Guide 3
Multiple Choice
Which of the following statements is not correct?
A. =ou should use credit cards with your picture on
them.
. =ou may use virtual credit cards for additional
security.
4E
C. =ou should use debit cards whenever possible for
additional security.
$. >irtual credit cards cannot be used for in&store
purchases.
+. (ignatures on credit cards are often impossible to
read.
Ans) C
*esponse) T58.4 ehavioral Actions to 6rotect =our
!nformation Assets
=our liability with credit cards is typically .....,
where your liability with debit cards is .....?
A. the amount in your ban0 account, your credit limit
. your credit limit, the amount in your ban0 account
C. the amount in your ban0 account, "ero
$. your credit limit, "ero
+. "ero to J?7, the amount in your ban0 account
Ans) +
*esponse) T58.4 ehavioral Actions to 6rotect =our
!nformation Assets
Which of the following statements about companies
that provide proactive protection of your information
assets is not correct?
A. These companies allow their customers to loc0
their credit files.
. These companies ensure that new lines of credit
cannot be opened unless their clients unloc0 their
credit files.
C. These companies operate independently of the
three ma:or credit reporting agencies.
$. (igning up with these companies means that
merchants and ban0s must have verbal or written
permission from their customers before opening new
credit in their names.
+. These companies will proactively monitor their
clients credit files at the three credit reporting
agencies.
Ans) C
*esponse) T58.4 ehavioral Actions to 6rotect =our
!nformation Assets
6ersonal firewalls perform all of the following
functions e-cept)
A. They should ma0e your computer invisible.
. They should see0 out the origin of malware in an
attempt to bloc0 it in the future.
C. They should alert you to suspicious behavior.
$. They should bloc0 outbound connections that you
do not initiate.
+. They should tell you when a program or
connection is attempting to do something that you do
not want.
Ans)
*esponse) T58.8 Computer&ased Actions to 6rotect
=our !nformation Assets
..... software logs 0eystro0es, e&mails,
applications, windows, Web sites, !nternet
connection, passwords, chat conversations, Web
cams, and screenshots.
A. ,irewall
. Anti&malware
C. Monitoring
$. Content filtering
+. Anti&spyware
Ans) C
*esponse) T58.8 Computer&ased Actions to 6rotect
=our !nformation Assets
Content filtering software performs all of the
following functions e-cept
A. bloc0s access to undesirable Web sites
. records all Web sites visited
C. proactively monitor computers against malware
attac0s
$. records both sides of chat conversations
+. enable users to selectively filter content
Ans) C
*esponse) T58.8 Computer&ased Actions to 6rotect
=our !nformation Assets
Methods you should use to protect your portable
devices and information include all of the following
e-cept
A. use two&factor authentication
. do not leave your portable devices in plain view in
a car
C. 0eep your portable devices in an inconspicuous
container
$. encrypt the hard drive of your laptop
+. all of the above
Ans) +
*esponse) T58.8 Computer&ased Actions to 6rotect
=our !nformation Assets
4F
,or security in your wireless computing, you should
use the ..... encryption standard, rather than the
older ..... encryption standard.
A. W6A, W+6
. W6A4, W6A
C. W+6, W6A
$. W6A4, W+6
+. W+6, W6
Ans) $
*esponse) T58.8 Computer&ased Actions to 6rotect
=our !nformation Assets
Technology Guide 4
The function of ..... is to convert digital signals to
analog signals and vice&versa.
A. Modems
. Multiple-ers
C. ,ront&end processors
$. (ervers
+. Clients
Ans) A
*esponse) T5<.1 The Telecommunications (ystem
..... signals convey information in wave form,
where ..... signals convey information in digital,
binary form.
A. Analog, pac0et
. Analog, digital
C. $igital, pac0et
$. $igital, analog
+. 6ac0et, analog
Ans)
*esponse) T5<.1 The Telecommunications (ystem
..... allow a single communications channel to
carry data transmissions simultaneously from many
sources.
A. Modems
. Multiple-ers
C. ,ront&end processors
$. (ervers
+. Clients
Ans)
*esponse) T5<.1 The Telecommunications (ystem
..... manage all routing communications with
peripheral devices for a large computer system.
A. Modems
. Multiple-ers
C. ,ront&end processors
$. (ervers
+. Clients
Ans) C
*esponse) T5<.1 The Telecommunications (ystem
Which of the following is not a communications
channel?
A. ,iber optic cable
. (atellite transmission
C. Twisted&pair wire
$. !ntegrated circuits
+. Cellular radio
Ans) $
*esponse) T5<.1 The Telecommunications (ystem
The cable medium with the highest bandwidth is)
A. Twisted&pair wire
. Coa-ial cable
C. ,iber optic cable
$. Cellular radio
+. Copper cable
Ans) C
*esponse) T5<.1 The Telecommunications (ystem
$ata is sent through a fiber&optic cable by)
A. %ptical switch
. +lectromagnetic switch
C. Caser
$. Multiple-er
+. %ptical modem
Ans) C
*esponse) T5<.1 The Telecommunications (ystem
y using an !ntegrated (ervices $igital 'etwor0
2!($'3 service, an organi"ation will be able to
transmit ..... data than if it used $igital (ubscriber
Cine 2$(C3 .
A. More voice
87
. More
C. Cess
$. The same amount of
+. More streaming video
Ans) C
*esponse) T5<.1 The Telecommunications (ystem
..... refers to the range of fre#uencies available in
any communications channel.
A. 6rotocol
. roadband
C. Capacity
$. 'arrowband
+. andwidth
Ans) +
*esponse) T5<.1 The Telecommunications (ystem
Which of the following are advantages of computer
networ0s?
A. +nable organi"ations to be more fle-ible
. +nable companies to share hardware, computer
applications, and data
C. +nable geographically dispersed employees to
wor0 together
$. 6rovide a critical lin0 between businesses and
their customers
+. All of the above
Ans) +
*esponse) T5<.4 Types of 'etwor0s
The components of a local area networ0 include
which of the following?
A. ,ile server
. Client computers
C. Wireline or wireless communications media
$. 'etwor0 interface cards
+. All of the above
Ans) +
*esponse) T5<.4 Types of 'etwor0s
Which of the following is not a component of a local
area networ0?
A. ,ile server
. Client computers
C. ridge
$. 'etwor0 interface cards
+. All of the above
Ans) C
*esponse) T5<.4 Types of 'etwor0s
A2n3 ..... connects dissimilar networ0s.
A. +thernet
. networ0 interface card
C. bridge
$. gateway
+. file server
Ans) $
*esponse) T5<.4 Types of 'etwor0s
A2n3 ..... connects two or more devices in a limited
geographical area.
A. local area networ0
. wide area networ0
C. personal area networ0
$. enterprise networ0
+. value added networ0
Ans) A
*esponse) T5<.4 Types of 'etwor0s
A2n3 ..... connects similar networ0s.
A. router
. networ0 interface card
C. bridge
$. gateway
+. file server
Ans) C
*esponse) T5<.4 Types of 'etwor0s
A2n3 ..... sends messages through several
connected CA's or to a wide area networ0.
A. router
. networ0 interface card
C. bridge
$. gateway
+. file server
Ans) A
*esponse) T5<.4 Types of 'etwor0s
A2n3 ..... allows a device to physically connect to a
local area networ0s communications medium.
81
A. file server
. networ0 interface card
C. networ0 operating system
$. communications channel
+. gateway
Ans)
*esponse) T5<.4 Types of 'etwor0s
Characteristics of wide area networ0s include all of
the following e-cept)
A. provided by individual companies
. have large capacity
C. cover large geographical areas
$. combine multiple communications channels
+. the !nternet is an e-ample of a wide area networ0
Ans) A
*esponse) T5<.4 Types of 'etwor0s
!n order to ensure that computers developed by
different manufacturers can communicate, .....
have been developed.
A. protocols
. clientGserver architectures
C. WA's
$. application software pac0ages
+. developmental architectures
Ans) A
*esponse) T5<.8 'etwor0 ,undamentals
A protocol is
A. a device that handles the switching of voice and
data in a local area networ0
. a standard set of rules and procedures for control
of communications in a networ0
C. a communications service for the connection of
devices in a local area networ0
$. the main communications channel in a wide area
networ0
+. synonymous with networ0 interface card
Ans)
*esponse) T5<.8 'etwor0 ,undamentals
!n TC6G!6, !6 is responsible for
A. disassembling and reassembling of pac0ets during
transmission
. establishing the !nternet connection between two
computers
C. moving pac0ets over the networ0
$. se#uencing the transfer of pac0ets across the
networ0
+. error chec0ing
Ans) A
*esponse) T5<.8 'etwor0 ,undamentals
Which of the following is not a characteristic of
pac0et switching ?
A. 6ac0ets contain a se#uence number
. 6ac0ets are routed through different paths
C. 6ac0ets re#uire dedicated circuits
$. 6ac0ets use TC6G!6 to carry their data
+. 6ac0ets contain destination addressing
Ans) C
*esponse) T5<.8 'etwor0 ,undamentals
A type of processing that lin0s two or more
computers in an arrangement in which some
machines provide computing services for user
computers is best described as
A. open systems
. clientGserver
C. peer&to&peer
$. centrali"ed
+. mainframe&centric
Ans)
*esponse) T5<.8 'etwor0 ,undamentals
itTorrent uses a process called ....., which
eliminates file&sharing bottlenec0s by having
everyone share little pieces of a file at the same time.
A. leeching
. collaboration
C. pac0et switching
$. torrents
+. swarming
Ans) +
*esponse) T5<.8 'etwor0 ,undamentals
84