You are on page 1of 43

CHƯƠNG 1

Câu 1: The six important business objectives of information technology are new
products, services and business models; customer and supplier intimacy; survival;
competitive advantage; operational excellence; and
a. improved business practices
b. improved flexibility
c. improved decision making 
d. improved efficiency
Câu 2: Dell Computer's use of information systems to improve efficiency and implement
"mass customization" techniques to maintain consistent profitability and an industry lead
illustrates which business objective?
a. survival
b. competitive advantage 
c. improved flexibility
d. improved business practices
Câu 3: The use of information systems because of necessity describes the business
objective of
a. survival. 
b. improved business practices.
c. improved business practices.
d. improved flexibility.
Câu 4: Which of the following choices may lead to competitive advantage: (1) new
products, services, and business models; (2) charging less for superior products; (3)
responding to customers in real time?
a. 1, 2, and 3 
b. 1 only
c. 2 and 3
d. 1 and 2
Câu 5: Verizon's implementation of a Web-based digital dashboard to provide managers
with real-time information such as customer complaints is an example of
a. improved flexibility.
b. improved decision making. 
c. customer and supplier intimacy.
d. improved efficiency.
Câu 6: The move of retail banking to use ATMs after Citibank unveiled its first ATMs
illustrates the use of information systems to achieve which business objective?
a. customer and supplier intimacy
b. survival 
c. competitive advantage
d. improved efficiency
Câu 7: Which of the following objectives best describes the business strategy behind the
development of smart grid initiatives by power companies, as discussed in the chapter
case?
a. new products and services 
b. competitive advantage
c. operational excellence 
d. customer support
Câu 8: The three activities in an information system that produce the information
organizations use to control operations are
a. information retrieval, research, and analysis.
b. data analysis, processing, and feedback.
c. input, output, and feedback.
d. input, processing, and output. 
Câu 9: Order data for baseball tickets and bar code data are examples of
a. raw output.
b. customer and product data.
c. sales information.
d. raw input. 
Câu 10: Order data for baseball tickets and bar code data are examples of
a. meaningful information. 
b. input
c. feedback.
d. raw data.
Câu 11: The field that deals with behavioral issues as well as technical issues
surrounding the development, use, and impact of information systems used by managers
and employees in the firm is called
a. information technology infrastructure.
b. information systems architecture
c. information systems literacy.
d. management information systems. 
Câu 12: In a hierarchical organization, the upper levels consist of
a. professional and operational employees.
b. managerial, professional, and technical employees. 
c. managerial and professional employees.
d. managerial, professional, and operational employees.
Câu 13: Which of the following business objectives best describes the strategy behind
the use of technology in the new Yankee Stadium?
a. survival
b. improved decision making
c. competitive advantage
d. new products and services 
Câu 14: Data management technology consists of the
a. hardware and software used to transfer data.
b. detailed, preprogrammed instructions that control and coordinate the computer
hardware components in an information system.
c. physical hardware and media used by an organization for storing data.
d. software governing the organization of data on physical storage media. 
Câu 15: The hardware and software used to transfer data in an organization is called
a. networking and data management technology.
b. networking and telecommunications technology. 
c. data management technology.
d. data and telecommunications technology.
Câu 16: Networking and telecommunications technologies, along with computer
hardware, software, data management technology, and the people required to run and
manage them, constitute an organization's
a. networked environment.
b. data management environment.
c. information system.
d. IT infrastructure. 
Câu 17: An example of a business using information systems to create new products and
services is
a. Apple Inc.'s iPod. 
b. Verizon's Web-based digital dashboard.
c. Wal-Mart's RetailLink system.
d. the Mandarin Oriental hotel's customer-preference tracking system.
Câu 18: An example of a business using information systems to attain operational
excellence is
a. Apple Inc.'s iPod.
b. Verizon's Web-based digital dashboard.
c. the Mandarin Oriental hotel's customer-preference tracking system.
d. Wal-Mart's RetailLink system. 
Câu 19: Maintaining the organization's financial records is a central purpose of which
main business function?
a. manufacturing and accounting
b. sales and manufacturing
c. finance and sales
d. finance and accounting 
Câu 20: Which of the following would not be a complementary asset for a solar panel
manufacturer?
a. innovation-driven management team
b. international solar equipment certification standards
c. centralized hierarchical decision making
d. government funding for green technology
Câu 21: Apple Computer dominates the online legal music sales industry primarily
because of a failure of recording label companies to
a. adopt a new business model. 
b. modernize their information value chain.
c. invest in complementary assets.
d. invest in technology.
Câu 22: An example of a social complementary asset is
a. training programs
b. technology and service firms in adjacent markets. 
c. all of the above.
d. distributed decision-making rights.
Câu 23: Disciplines that contribute to the technical approach to information systems are
a. operations research, management science, and computer science. 
b. management science, computer science, and engineering.
c. computer science, engineering, and networking.
d. engineering, utilization management, and computer science.
Câu 24: The discipline that focuses on mathematical techniques for optimizing
parameters of organizations, such as transportation and inventory control, is

a. operations research. 
b. MIS.
c. management science.
d. utilization management.
Câu 25: Engineers, scientists, or architects, who design new products or services for a
firm, belong to which level of a business hierarchy?
a. production workers
b. knowledge workers 
c. data workers
d. middle management
CHƯƠNG 2
Câu 1: Producing bills of materials is a business process within the ________ function.
a. manufacturing and production 
b. sales and marketing
c. finance and accounting
d. human resources
Câu 2: Which of the following is an example of a cross-functional business process?
a. assembling a product
b. identifying customers
c. paying creditors
d. creating a new product 
Câu 3: Which type of system would you use to change a production schedule if a key
supplier was late in delivering goods?
a. MIS
b. DSS
c. ESS
d. TPS 
Câu 4: To monitor the status of internal operations and the firm's relations with the
external environment, managers need ________ systems.
a. transaction processing 
b. management information
c. decision-support
d. knowledge
Câu 5: Which type of system would you use to determine the five suppliers with the
worst record in delivering goods on time?
a. DSS
b. ESS
c. MIS 
d. TPS
Câu 6: A relocation control system that reports summaries on the total moving, house-
hunting, and home financing costs for employees in all company divisions would fall into
the category of
a. management information systems. 
b. transaction processing systems.
c. executive support systems.
d. knowledge management systems.
Câu 7: The term "management information systems" designates a specific category of
information systems serving
a. middle management functions. 
b. integrated data processing throughout the firm.
c. transaction process reporting.
d. employees with online access to historical records.
Câu 8: Non-typical business problems with causes and effects that are rapidly changing
are typically handled by which type of information system ?
a. MIS
b. TPS
c. ESS
d. DSS 
Câu 9: All of the following statements regarding Lotus Notes are true except for
a. It is the most widely used collaboration tool at Fortune 1000 companies.
b. Firmwide installations at a large company require specialized servers and may cost
millions of dollars per year.
c. It began as an e-mail and messaging client. 
d. It provides tools for e-mail, calendars, help desk, CRM, blogs, and wikis.
Câu 10: ESS are specifically designed to serve which level of the organization?
a. end-user
b. senior management 
c. middle management
d. operational.
Câu 11: Executive support systems are information systems that support the
a. decision-making and administrative activities of middle managers.
b. knowledge and data workers in an organization.
c. day-to-day processes of production.
d. long-range planning activities of senior management. 
Câu 12: Which systems often deliver information to senior executives through a portal,
which uses a Web interface to present integrated personalized business content?
a. executive support systems 
b. management information systems
c. transaction processing systems
d. decision-support systems
Câu 13: Which type of system would you use to determine what trends in your supplier's
industry will affect your firm the most in five years?
a. ESS 
b. MIS
c. DSS
d. TPS
Câu 14: What is the most important function of an enterprise application?
a. enabling cost-effective e-business processes
b. increasing speed of communicating
c. enabling a company to work collaboratively with customers and suppliers
d.  enabling business functions and departments to share information 
Câu 15: ________ are designed to support organization-wide process coordination and
integration.
a. CRM systems
b. Management information systems
c. Enterprise applications 
d. Decision-support systems
Câu 16: You manage the IT department at a small startup Internet advertiser. You need
to set up an inexpensive system that allows customers to see real-time statistics such as
views and click-throughs about their current banner ads. What type of system will most
efficiently provide a solution?
a. extranet 
b. CRM
c. intranet
d. enterprise system
Câu 17: The four major enterprise applications are
a. SCMs, CRMs, DSSs, and KMSs.
b. enterprise systems, SCMs, DSSs, and CRMs.
c. SCMs, CRMs, ESSs, and KMSs
d. enterprise systems, SCMs, CRMs, and KMSs. 
Câu 18: Enterprise systems are also known as ________ systems.
a. enterprise resource planning 
b. resource planning
c. enterprise support
d. management information
Câu 19: Enabling management to make better decisions regarding organizing and
scheduling sourcing, production, and distribution is a central feature of
a. TPSs
b. SCMs 
c. ERPs
d. KMSs
Câu 20: ________ systems integrate supplier, manufacturer, distributor, and customer
logistics processes.
a. Collaborative distribution
b. Reverse logistics
c. Supply-chain management 
d. Enterprise planning
Câu 21: ________ systems are designed to help firms manage their relationships with
their customers.
a. CRM 
b. MIS
c. CLU
d. CLE
Câu 22: Which types of systems consolidate the relevant knowledge and experience in
the firm to make it available to improve business processes and management decision
making?
a. TPS
b. KMS 
c. CRM
d. extranets
Câu 23: You are planning the launch of your new company, an application service
provider that provides an online timesheet and project tracking application. To best
communicate with and manage your relationship with your users, you would want to
implement a(n)
a. intranet.
b. extranet.
c. CMS 
d. KMS
Câu 24: Which of the following types of system helps expedite the flow of information
between the firm and its suppliers and customers?
a. KMS
b. extranet 
c. intranet
d. TPS
Câu 25: E-government refers to the application of ________ to digitally enable
government and public sector agencies' relationships with citizens, businesses, and other
arms of government.
a. e-commerce
b.  e-business
c. the Internet and networking technologies 
d. any computerized technology
Câu 26: Buying or selling goods over the Internet is called
a. e-business.
b. an extranet.
c. an intranet.
d.  e-commerce. 
Câu 27: The use of digital technology and the Internet to execute the major business
processes in the enterprise is called
a. enterprise applications.
b. e-commerce.
c. e-business. 
d. MIS.

Câu 28: The principal liaison between the information systems groups and the rest of the
organization is a(n)
a. programmer.
b. CTO.
c. information systems manager.
d. systems analyst. 
Câu 29: A ________ is a senior manager who oversees the use of IT in the firm.
a. CEO
b. CFO
c. CTO.
d. CIO 
Câu 30: You have been hired by a worldwide non-profit agency to implement a system
to handle their donations. The system must be able to handle and record telephone, sms,
and Internet donations, provide up-to-the-minute reports, and create highly customizable
mailing lists. In addition, event fundraisers need to be able to quickly access a donor's
information and history. Which of the following systems will best meet these needs?
a. TPS with ESS capabilities
b. TPS with DSS capabilities
c. TPS
d. TPS with MIS capabilities 
CHƯƠNG 3
Câu 1: The interaction between information systems and organizations is influenced
a. By many factors, including structure, politics, culture, and environment. 
b. Primarily by the organization's business processes and culture.
c. Primarily by the decision making of middle- and senior-managers.
d. By two main microeconomic forces: capital and labor.
Câu 2: How does the technical view of organizations fall short of understanding the full
impacts of information systems in a firm?
a. It sees information systems as a way to rearrange the inputs and outputs of the
organization.
b. It sees the inputs and outputs, labor and capital, as being infinitely malleable. 
c. It sees capital and labor as primary production factors.
d. It sees the organization as a social structure similar to a machine.
Câu 3: Business processes are collections of
a. Informal practices and behaviors.
b. Routines. 
c.  Formalized and documented practices.
d. Rights and privileges.
Câu 4: The costs incurred when a firm buys on the marketplace what it cannot make
itself are referred to as
a. agency costs.
b. switching costs.
c. procurement.
d.  transaction costs. 
Câu 5: Which of the following statements is NOT true about information technology's
impacts on business firms?
a. It helps firms expand in size. 
b. It helps reduce transaction costs.
c. It helps reduce internal management costs.
d. It helps firms lower the cost of market participation.
Câu 6: According to Leavitt's model of organizational resistance, the four components
that must be changed in an organization in order to successfully implement a new
information system are
a. tasks, technology, people, and structure. 
b. environment, organization, structure, tasks.
c. technology, people, culture, and structure.
d. organization, culture, management, and environment
Câu 7: The ________ model is used to describe the interaction of external forces that
affect an organization's strategy and ability to compete.
a. competitive advantage
b. network economics
c. competitive forces 
d. demand control
Câu 8: The Internet raises the bargaining power of customers by
a. making more products available.
b.  making information available to everyone.
c. creating new opportunities for building loyal customer bases.
d.  making information available to everyone. 
Câu 9: The interaction between information systems and organizations is influenced
a. by many factors, including structure, politics, culture, and environment. 
b. by two main microeconomic forces: capital and labor.
c. primarily by the decision making of middle- and senior-managers.
d. primarily by the organization's business processes and culture.
Câu 10: How does the technical view of organizations fall short of understanding the full
impacts of information systems in a firm?
a. It sees information systems as a way to rearrange the inputs and outputs of the
organization.
b. It sees capital and labor as primary production factors.
c. It sees the organization as a social structure similar to a machine.
d.  It sees the inputs and outputs, labor and capital, as being infinitely malleable. 
Câu 11: According to the ________ definition of organizations, an organization is seen
as a means by which primary production factors are transformed into outputs consumed
by the environment.
a. sociotechnical
b. behavioral
c.  micro economic 
d. macroeconomic
Câu 12: All of the following are major features of organizations that impact the use of
information systems EXCEPT for 
a. environments.
b. business processes.
c. agency costs. 
d. goals.
Câu 13: Which of the following would NOT be considered a disruptive technology?
a.  Internet telephony
b.  instant messaging 
c. e-mail
d. PCs
Câu 14: If two organizations pool markets and expertise that result in lower costs and
generate profits it is often referred to as creating
a. core competencies.
b. a value web
c. a value chain.
d. synergies. 
Câu 15: How are information systems used at the industry level to achieve strategic
advantage?
a. by encouraging the entry of new competitors
b. by building industry-wide, IT-supported consortia and symposia 
c. by raising the bargaining power of suppliers
d. by enforcing standards that reduce the differences between competitors
Câu 16: A collection of independent firms that use information technology to coordinate
their value chains to produce a product or service for a market collectively is called a(n)
a. consortia.
b. value web. 
c. business ecosystem.
d. industry value chain.
Câu 17: The most successful solutions or methods for achieving a business objective are
called
a. value activities.
b. best practices. 
c. core competencies.
d. best processes.
Câu 18: Which of the following activities would you perform to measure and compare
your business processes to similar processes of other companies within your industry?
a. best practices
b. value chain analysis
c. benchmarking 
d. strategic systems analysis
Câu 19: Which of the following is one of the support activities in a firm's value chain?
a. sales and marketing
b. technology 
c. inbound logistics
d. operations
Câu 20: The primary activities of a firm include
a. procurement, operations, technology, sales and marketing, and services.
b. inbound logistics, operations, outbound logistics, technology, and service.
c. inbound logistics, operations, outbound logistics, sales and marketing, and service. 
d. procurement, inbound logistics, operations, technology, and outbound logistics.
Câu 21: The value chain model
a. sees the supply chain as the primary activity for adding value.
b. categorizes four basic strategies a firm can use to enhance its value chain.
c. helps a firm identify points at which information technology can most effectively
enhance its competitive position. 
d. categorizes five related advantages for adding value to a firm's products or
services.
Câu 22: To what competitive force did the printed encyclopedia industry succumb?
a. substitute products or services 
b.  low cost of entry
c. customer's bargaining power
d.  positioning and rivalry among competitors
Câu 23: Internet technology
a. increases the difference between competitors because of the wide availability of
information.
b.  makes it easy to sustain operational advantages.
c. makes it easy for rivals to compete on price alone. 
d.  imposes a significant cost of entry, due to infrastructure requirements.
Câu 24:  A rival of your company, AutoTown, is going to implement analytic software
that mines customer data with a goal of enabling the building of automobiles that
customers actually want. This can be categorized as using information systems for which
competitive strategy?
a. low-cost leadership
b. focus on market niche
c. product differentiation
d. customer intimacy 
Câu 25: Upon which of the following industries has the Internet as a whole been a
disruptive technology?
a. real estate
b. books
c. bill payments
d. air travel 
Câu 26: An information system can enable a company to focus on a market niche
through
a.  intensive customer data analysis. 
b. complex trend forecasting.
c.  intensive product trend analysis.
d. tailoring products to the client.
Câu 27: ________ is the ability to offer individually tailored products or services using
the same production resources as bulk production.
a. Size customization
b. Dimension customization
c. Mass customization 
d. Magnitude customization
Câu 28: When a firm provides a specialized product or service for a narrow target market
better than competitors, they are using a ________ strategy.
a. process efficiency
b. product differentiation
c. market niche 
d. mass customization
Câu 29: The four major types of competitive strategy are
a. low-cost leadership; product differentiation; focus on market niche; and customer
and supplier intimacy. 
b.  low-cost leadership; new market entrants; product differentiation; and focus on
market niche.
c. low-cost leadership; substitute products and services; customers; and suppliers.
d. new market entrants; substitute products and services; customers; and suppliers.
Câu 30: Amazon's use of the Internet as a platform to sell books more efficiently than
traditional bookstores illustrates a use of information services for
a. marketing effectiveness.
b. focusing on market niche.
c. strengthening supplier intimacy.
d.  low-cost leadership. 
Câu 31: Which of the following can force a business and its competitors to compete on
price alone?
a. demand control
b. poor process efficiency
c. transparent marketplace 
d. high product differentiation
Câu 32: A substitute product of most concern for a cable TV distributor is
a. satellite TV. 
b.  the Internet.
c. broadcast TV.
d. satellite radio.
Câu 33: A manufacturer of deep-sea oil rigs may be least concerned about this
marketplace force.
a.  product differentiation
b. low number of suppliers
c. traditional competitors
d. new market entrants 
Câu 34: Which of the following is NOT one of the competitive forces?
a. customers
b. external environment 
c. suppliers
d.  other competitors
Câu 35: The ________ model is used to describe the interaction of external forces that
affect an organization's strategy and ability to compete.
a. network economics
b. competitive forces 
c. demand control
d. competitive advantage
Câu 36: According to Leavitt's model of organizational resistance, the four components
that must be changed in an organization in order to successfully implement a new
information system are
a. tasks, technology, people, and structure. 
b. technology, people, culture, and structure.
c. organization, culture, management, and environment
d.  environment, organization, structure, tasks.
CHƯƠNG 4
Câu 1: Which of the following best describes how new information systems result in
legal gray areas?
a. They are implemented by technicians rather than managers.
b. They are created from sets of logical and technological rules rather than social or
organizational mores.
c. They work with networked, electronic data, which are more difficult to control than
information stored manually.
d. They result in new situations that are not covered by old laws. 
Câu 2: The introduction of new information technology has a
a. ripple effect raising new ethical, social, and political issues. 
b. beneficial effect for society as a whole, while raising dilemmas for consumers.
c. waterfall effect in raising ever more complex ethical issues.
d. dampening effect on the discourse of business ethics.
Câu 3: In the information age, the obligations that individuals and organizations have
concerning rights to intellectual property fall within the moral dimension of
a.  accountability and control.
b. system quality.
c.  information rights and obligations.
d. property rights and obligations. 
Câu 4: The ethical dilemma you may face as a manager of information systems typically
is reflected in _________ and ________________.
a. Social and political debate
b. Risk Aversion Principle
c. Internet and electronic commerce
d. Utilitarian Principle
Câu 5:  ________________ is a key element of ethical action
a. Accountability
b. Responsibility 
c. Due process
d. Ethical, social, and political
Câu 6: __________, __________, and _____________ issues are closely linked.

a. Accountability
b. Internet and digital firm technologies
c. Responsibility
d. Ethical, social, and political
Câu 7: If an action is not right for everyone to take, it is not right for anyone
a. Internet and digital firm technologies
b. Five moral dimensions of the information age.
c. Risk Aversion Principle
d. Immanuel Kant's Categorical Imperative
Câu 8: ________________ and __________________ make it easier than ever to
assemble, integrate, and distribute information,
a. Internet and digital firm technologies 
b. Internet and electronic commerce
c. Ethical, social, and political
d. Accountability
Câu 9: The use of computers to combine data from multiple sources and create electronic
dossiers of detailed information on individuals is called _________________.
a. Accountability
b. Ethics
c. Profiling
d. Privacy
Câu 10: _________________ is a related feature of law-governed societies and is a
process in which laws are known and understood, and there is an ability to appeal to
higher authorities to ensure that the laws are applied correctly.
a. Internet and digital firm technologies
b. Due process
c. Responsibility
d. Accountability
Câu 11: When using information systems, it is essential to
ask,_______________________
a. Internet and electronic commerce
b.  "What is the ethical and socially responsible course of action?"
c. Immanuel Kant's Categorical Imperative
d. Internet and digital firm technologies
Câu 12: What values should be preserved in an information- and knowledge-based
society? Which institutions should we protect from violation? Which cultural values and
practices are supported by the new information technology? What moral dimension of the
information age is this?
a. Quality of life
b. System quality
c. Accountability and control
d. Descartes' rule of change
Câu 13: What values should be preserved in an information- and knowledge-based
society? Which institutions should we protect from violation? Which cultural values and
practices are supported by the new information technology? What moral dimension of the
information age is this?
a. Information rights and obligations
b. Immanuel Kant's Categorical Imperative
c. Internet and digital firm technologies
d. Five moral dimensions of the information age
Câu 14: What standards of data and system quality should we demand
to protect individual rights and the safety of society?
^What moral dimension of the information age is this? → Quality of life
True
False 
It should be → System quality
Câu 15: Take the action that achieves the higher or greater value → Risk Aversion
Principle
True
False 
It should be → Utilitarian Principle
Câu 16: How will traditional intellectual property
rights be protected in a digital society in which tracing and accounting for
ownership are difficult and ignoring such property rights is so easy?
^What moral dimension of the information age is this? → Property rights and obligations
True 
False
Câu 17: Take the action that produces the least harm or the least potential
cost → Utilitarian Principle
True
False 
It should be → Risk Aversion Principle
Câu 18: refers to the principles of right and wrong that individuals, acting as
free moral agents, use to make choices to guide their behaviors. → Privacy
True
False 
It should be → Ethics
Câu 19: If an action cannot be taken repeatedly, it is not right to take at all → Descartes'
rule of change
True 
False
Câu 20: Identify and describe the facts clearly
Define the conflict or dilemma and identify the higher-order values involved.
Identify the stakeholders.
Identify the options that you can reasonably take.
Identify the potential consequences of your options. → social and political debate
True
False 
It should be → Ethical Analysis
Câu 21
1. Do unto others as you would have them do unto you (the Golden Rule).
2. If an action is not right for everyone to take, it is not right for anyone
(Immanuel Kant's Categorical Imperative).
3. If an action cannot be taken repeatedly, it is not right to take at all (Descartes' rule of
change)
4. Take the action that achieves the higher or greater value (Utilitarian Principle)
5. Take the action that produces the least harm or the least potential cost (Risk
Aversion Principle).
6. Assume that virtually all tangible and intangible objects are owned by someone
else unless there is a specific declaration otherwise. (This is the ethical "no free
lunch" rule.) → CANDIDATE ETHICAL PRINCIPLES
True 
False
Câu 22: is the claim of individuals to be left alone, free from surveillance or
interference from other individuals or organizations, including the state. → profiling
True
False 
It should be → Privacy
Câu 23: Who can and will be held accountable and liable for
the harm done to individual and collective information and property rights?
^What moral dimension of the information age is this? → Descartes' rule of change
True
False 
It should be → Accountability and control
CHƯƠNG 5
Câu 1: A computer program or collection of programs (sets of instructions) that tell the
hardware what to do
a. Computer Hardware 
b. Internet Clients
c. Internet Protocols
d. Computer Software
Câu 2: Places where large networks interconnect.
a. Point of Presence (POP)
b. Network Access Points (NAP) 
c. Software as a Service (SaaS)
d. Local Area Network (LAN)
Câu 3: A piece of computer hardware or software that accesses a service made available
by a server.
a. Computer Software
b. Internet Protocols
c. Internet Servers
d. Internet Clients 
Câu 4: A strategy that builds all the software assets in the company using the service-
oriented programming methodology.
a. Hypertext Transfer Protocol (HTTP)
b. Internet Service Provider (ISP)
c. Service-oriented Architecture (SOA) 
d. Internet Clients
Câu 5: The collection of physical parts of a computer system.
a. Computer Hardware 
b. Local Area Network (LAN)
c. Computer Software
d. Operating Systems
Câu 6: Send messages over the internet.
a. Internet Clients
b. Internet Router 
c. Internet Protocols
d. Internet Servers
Câu 7: An application protocol for distributed, collaborative, hypermedia information
systems.
a. Hypertext Transfer Protocol (HTTP) 
b. Service-oriented Architecture (SOA)
c. Internet Service Provider (ISP)
d. Software as a Service (SaaS)

Câu 8: Where a firm subscribes to a third-party software service delivered online.


a. Application Software
b. Software as a Service (SaaS) 
c. Internet Service Provider (ISP)
d. Network Access Points (NAP)
Câu 9: A given application in a computer may function as a client with requests for
services from other programs and also as a server of requests from other programs.
a. Internet Servers 
b. Internet Clients
c. Internet Protocols
d. Internet Router
Câu 10: Which type of infrastructure services provides voice and video connectivity to
employees, computers and suppliers?
a. Telecommunictations 
b. Telephone
c. VOIP
d. Networking
Câu 11: Which of the folliwng is not an IT infrastructure service component?
a. Computing platforms to provide a coherent digital enviroment
b. Operating system sofware 
c. Physical facility management to manage the facilitites housing physcial
components.
d. IT management services to plan and develop the infrastructure and provide project
management.
Câu 12: Places the following earas of IT infrastructure evolution in oder, from earliest to
most recent:
1. Cloud Computing Era; 2. Client / Server; 3. Enterprise Era; 4. Personal Computer; and
5. Mainframe and Minicomputer.
a. 5, 4, 2, 1, 3
b. 4, 5, 3, 2, 1 
c. 5, 4, 2, 3, 1
d. 4, 5, 2, 3, 1
Câu 13: The introduction of the minicomputer
a. Enabled decentralized computring.
b. All of the above. 
c. Offered new, powerful machines at lower prices than mainframes.
d. Allowed computers to be customized to the specific needs of departments or
business units.

Câu 14: A client computer networked to a server computer, with processing split
between the two types of machines, is called a (n)
a. Service-oriented architecture.
b. Two-tiered client/server architecture. 
c. Multi-tiered client/server architecture.
d. On-demand architecture.
Câu 15: In a multi-tiered network
a. Processing is split between clients and servers
b. Processing is handled by multiple, geographically-remote clients.
c. The work of the entire network is centralized.
d. The work of the entire network is balanced over serveral levels of servers. 
Câu 16: Interpretations of More’s law assert that
a. Data storage costs decrease by 50% every 18 months
b. Computing power doubles every 18 months 
c. None of the above.
d. Transistors decrease in size 50% every two years.
Câu 17: Which of the following factors provides an understanding of why computing
resources today are ever more avaiblale than in previous decades?
a. Declining communications costs, univeral standards, and the internet
b. All of the above 
c. Law of mass digital storage and More’s law
d. Network economics
Câu 18: Today’s manotechnology-produced computer transistors are roughly equivalent
in size to
a. An atom
b. A virus 
c. A buman hair.
d. The width of a fingermail.
Câu 19: Specifications that establish the compability of products and the ability to
communicate in a network are called
a. Network standards
b. Telecommunications standards.
c. Internet standards.
d. Technology standards 

Câu 20: _______________ unleash powerful economies of scale and result in declines in
manufactured
a. Client / Server technologies.
b. Linux and open-source software
c. Internet and Web technologies
d. Technology standards 
Câu 21: The multitasking, multi-user, operating system developed by Bell Laboratories
that operates on a wide variety of computing platofrms is
a. OS X
b. Linux
c. Unix 
d. COBO
Câu 22: The network standard of connecting desktop computers into local area netowks
that enabled the widedspread adoption of client/server computing and local area networks
and further stimulated the adoption of personal computers is
a. Ethernet 
b. TCP/IP
c. COBOL
d. ASCII
Câu 23: Which of the following is a leading networking hardware provider?
a. Cisco 
b. IBM
c. Dell
d. Seagate
Câu 24: Software that manages the resources of the computer is called
a. Application software
b. Network software
c. Operating system software 
d. Data management software
Câu 25: A SAN is a _____________ netowrk
a. Server area
b. Storage architecture 
c. Scalable architecture
d. Service-oriented architecture
Câu 26: As referred to in the text, legacy systems are

a. Electronic spreadsheets used on a PC


b. Any pre-1990 Wintel systems.
c. System found on older ASPs
d. Traditional mainframe-based business information systems. 
Câu 27
Which of the following is not an example of the emering mobile computing platform?
a. Tables
b. Cell phones
c. The Kindle
d. CRM 
Câu 28: All of the following are current hardware platform trends except
a. Unix 
b. Virtualization
c. Cloud computing
d. Green computing
Câu 29: The business case for using grid computing involles all of the following except
a. Cost savings
b. Speed of computation
c. Increased accuracy 
d. Agility
Câu 30: The process of presenting a set of computing resources (such as computing
power or data storage) so that they can all be accessed in ways that are not restricted by
physical configuration or geographic location is called
a. Virtualization
b. Multicore processing
c. Autonomic computing
d. Cloud computing 
Câu 31: an example of autonomic computing is
a. Spyware protection software that runs and updates itself automatically 
b. Software programmed to run on any hardware platofrm
c. Programing languges that allow non-programmers to create custom applicatons
d. Cell phones taking on the functions of handheld computers

Câu 32: TCO refers to the original cost of purchased technology: both hardware and
software
True
False 
Câu 33: Has the task of delivering packets from the source host to the destination host
solely based on its address. → Internet Clients
True
False 
Câu 34: The software that supports a computer's basic functions. → Operating Systems
True 
False
Câu 35: A computer network covering a small physical area. → Local Area Network
(LAN)
True 
False
Câu 36: Any situation in which computing is done in a remote location rather than on
your desktop or portable computing devices. → Computer Software
True
False 
Câu 37
Distributed application structure that partitions tasks or workloads between the providers
of a resource or service and service requesters. → Client-Server System
True 
False
Câu 38: Perform work that users and firms are directly interested in
accomplishing. → Application Software
True 
False
Câu 39: A company that provides customers with Internet access. → Hypertext Transfer
Protocol (HTTP)
True
False 
Câu 40: A place for local users to access a network. → Point of Presence (POP)
True 
False
CHƯƠNG 6
Câu 1: …. is a database that stores current and historical data of
potential interest to decision makers throughout the company.
a. data warehouse 
b. database server
c. data dictionary
d. data mart
Câu 2: use data mining techniques, historical data, and assumptions about future
conditions to predict outcomes of events, such as the probability a customer will respond
to an offer or purchase a specific product.
a. referential integrity
b. program-data dependence
c. primary key
d. predictive analytics 
Câu 3: … consists of activities for detecting and correcting data in a database that are
incorrect, incomplete, improperly formatted, or redundant.
a. data cleansing or data scrubbing 
b. data administration
c. database administration
d. online analytical processing (OLAP)
Câu 4: … is an automated or manual file that stores definitions of data elements and their
characteristics
a. data dictionary 
b. data definition
c. data warehouse
d. data administration
Câu 5: … is a subset of a data warehouse in which a summarized or highly focused
portion of the organization's data is placed in a separate database for a specific population
of users.
a. data warehouse
b. data mining
c. data governance
d. data mart
Câu 6: … provides insights into corporate data that cannot be obtained with OLAP by
finding hidden patterns and relationships in large databases and inferring rules from them
to predict future behavior.
a. text mining
b. data mining
c. data administration
d. data mart
Câu 7: Database designers document their data model using diagrams that illustrates the
relationship between the entities
a. online analytical processing (OLAP)
b. database administration
c. entity-relationship diagram 
d. object-oriented DBMS
Câu 8: … used with unstructured data, to help businesses analyze these such data
a. key field
b. text mining
c. data mining
d. web mining
Câu 9: The most prominent data manipulation language today
a. data manipulation language
b. entity-relationship diagram
c. data inconsistency
d. structured Query Language, or SQL
Câu 10: rules to ensure that relationships between coupled tables remain consistent
a. program-data dependence
b. text mining
c. referential integrity 
d. database administration
Câu 11: Extracts knowledge from the content of web pages, which may include text,
image, audio, and video data.
a. Web content mining
b. Web structure mining
c. Relational database
d. Data quality audit
Câu 12: Type of text mining; able to mine text comments in an email, message, blog,
social media conversation, or survey form to detect favorable and unfavorable opinions
about specific subjects
a. Online analytical processing
b. Sentiment analysis 
c. Relational database
d. Analytic platforms
Câu 13: Examines data related to the structure of a particular web site
a. Structured Query Language
b. Web structure mining

c. Referential integrity
d. Web content mining
Câu 14: Structured survey of the accuracy and level of completeness of the data in an
information system.
a. Relational database
b. Data administration
c. Data quality audit
d. Web content mining
Câu 15: Specific type of software for creating, storing, organizing, and accessing data
from a database
a. Relational database
b. Data definition
c. Database management system 
d. Data manipulation language
Câu 16: Characteristics specific to an entity--ie: Entity "supplier" has attributes such as
supplier's name and address
a. Database
b. Data cleansing
c. Attributes 
d. Data warehouse
Câu 17: … use both relational and non-relational technology that are optimized for
analyzing large datasets
a. In-memory computing
b. Data quality audit
c. Relational database
d. Analytic platforms
Câu 18: Responsible for the specific policies and procedures through which data can be
managed as an organizational resource.
a. Data administration 
b. Data quality audit
c. Data cleansing
d. Data warehouse
Câu 19: crow's foot preceded by a short mark, ie: each supplier can supply more than one
part but each part can only have one supplier
a. One to one relationship
b. Online analytical processing
c. Web content mining
d. One to many relationship 
Câu 20: specifies the structure of the content of the database ; used to create database
tables and define the characteristics of the fields in each table

a. Data cleansing
b. Data definition 
c. Data administration
d. Data dictionary
Câu 21: Look-up field to find data about the supplier of a specific part; ie in the PART
table, the foreign key might be the supplier number and is used to match a part number
(primary key) with its supplier
a. Data mining
b. Primary key
c. Normalization
d. Foreign key
Câu 22: Looks for patterns through content mining, structure mining, and usage mining.
a. Text mining
b. Key field
c. Web mining
d. Data dictionary
Câu 23: Used to clarify table relationships in a relational database
a. Entity-relationship diagram 
b. Analytic platforms
c. Data manipulation language
d. Online analytical processing
Câu 24: Most common type of database, organizes data into two dimensional tables with
columns and rows
a. Referential integrity
b. Relational database 
c. Analytic platforms
d. Data quality audit
Câu 25: Facilitates big data analysis; relies primarily on a computer's main memory
(RAM) for data storage.
a. Data quality audit
b. In-memory computing 
c. Analytic platforms
d. Relational database
Câu 26: Used to add, change, delete, and retrieve the data in the database.
a. Data dictionary
b. Data quality audit
c. Entity-relationship diagram
d. Data manipulation language
Câu 27: Relational databases represent data as two-dimensional tables (called relations).
Tables may be referred to as files. Each table contains data on an entity and its
attributes. → data warehouse
True
False 
Câu 28: a group of records of the same type. → field
True
False 
Câu 29: is software that permits an organization to centralize data, manage them
efficiently, and provide access to the stored data by application programs. → database
management system (DBMS)
True 
False
Câu 30: A grouping of characters into a word, a group of words, or a complete
number → file
True
False 
Câu 31: occurs when different groups in an organization independently collect the same
piece of data and store it independently of each other. → database management system
(DBMS)
True
False 
Câu 32: group of related fields, such as the student's name, the course taken, the date, and
the grade → field
True
False 
Câu 33: characteristic or quality describing a particular entity → data inconsistency
True
False 
Câu 34: Each table in a relational database has one field that is
designated as its primary key. This key field is the unique identifier for all the
information in any row of the table and this primary key cannot be duplicated. → primary
key

True 
False
Câu 35: a structured survey of the accuracy and level of completeness of the data in an
information system. Data quality audits can be performed by surveying entire data files,
surveying samples from data files, or surveying end users for their perceptions of data
quality. → data quality audit
True 
False
Câu 36: refers to the coupling of data stored in files and the specific programs required to
update and maintain those files such that changes in programs require changes to the
data. → Predictive analytics
True
False 
CHƯƠNG 7
Câu 1: High-speed transmission technology. Also designated a single communication
medium that can transmit multiple channels of data simultaneously
a. Bandwidth
b. T Lines
c. Broadband 
d. Bluetooth
Câu 2: networks linking digital devices that are close to one person
a. Peer-to-peer architecture
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Personal area networks (PANs) 
d. Internet Protocol (IP) address
Câu 3: Technology that breaks messages into small, fixed bundles of data and routes
them in the most economical way through any available communications channel
a. Bandwidth
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Wide area networks (WANs)
d. Packet switching 
Câu 4: A device for translating a computer's digital signals into analog form for
transmission over ordinary telephone lines, or for translating analog signals back into
digital form for reception by a computer.
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Modem 
c. Switch
d. Router
Câu 5: A group of technologies providing high-capacity transmission over existing
copper telephone lines
a. Network operating system (NOS)
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Digital Subscriber Line (DSL) 
d. Internet service provider (ISP)
Câu 6: Standards for wireless fidelity and refers to the 802.11 family of wireless
networking standards
a. Wi-Fi 
b. Bluetooth
c. Switch
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
Câu 7: A commercial organization with a permanent connection to the internet that sells
temporary connections to subscribers
a. Internet Protocol (IP) address
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Cable internet connections
d. Internet service provider (ISP) 
Câu 8: Connection that provides network edge connectivity from an Internet service
provider to an end user
a. Wide area networks (WANs)
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Peer-to-peer architecture
d. Cable internet connections 
Câu 9: The capacity of a communications channel as measured by the difference between
the highest and lowest frequencies that can be transmitted by that channel
a. Bandwidth 
b. Internet2
c. Bluetooth
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
Câu 10: Telecommunications network that spans a large geographical distance. May
consist of a variety of cable, satellite, and microwave technolog
a. Cable internet connections
b. Wide area networks (WANs) 
c. Local area network (LAN)
d. Transmission Control Protocol/Internet Protocol (TCP/IP)

Câu 11: Special software that routes and manages communications on the network and
coordinates network resources
a. Domain Name System (DNS)
b. Digital Subscriber Line (DSL)
c. Transmission Control Protocol/Internet Protocol (TCP/IP)
d. Network operating system (NOS) 
Câu 12: Four-part numeric address indicating a unique computer location on the Internet
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Internet Protocol (IP) address 
c. Internet service provider (ISP)
d. Cable internet connections
Câu 13: A telecommunications network that requires its own dedicated channels and that
encompasses a limited distance, usually one building or several buildings in close
proximity
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Wide area networks (WANs)
c. Local area network (LAN) 
d. Cable internet connections
Câu 14: Standard for wireless personal area networks that can transmit up to 722 Kbps
within a 10-meter area
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Wi-Fi
c. Protocol
d. Bluetooth 
Câu 15: Specialized communications processor that forwards packets of data from one
network to another network
a. Bluetooth
b. Router 
c. Switch
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
Câu 16: Very simple devices that connect network components, sending a packet of data
to all other connected devices
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Router
c. T1 lines
d. Hubs 
Câu 17: English-like name that corresponds to the unique 32-bit numeric IP address for
each computer connected to the internet
a. Domain name 
b. Broadband
c. T1 lines
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
Câu 18: Research network with new protocols and transmission speeds that provides an
infrastructure for supporting high bandwidth Internet applications
a. Bandwidth
b. Bluetooth
c. Internet2 
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
Câu 19: New IP addressing system using 128-bit IP addresses. Stands for Internet
Protocol version 6
a. Hubs
b. Wi-Fi
c. Transmission Control Protocol/Internet Protocol (TCP/IP)
d. IPv6 
Câu 20: Device to connect network components that has more intelligence than a hub
and can filter and forward data to a specified destination
a. Switch 
b. Wi-Fi
c. Transmission Control Protocol/Internet Protocol (TCP/IP)
d. Router
Câu 21: Specialized communications processor that forwards packets of data from one
network to another network → router
True 
False
Câu 22: Telecommunications network that spans a large geographical distance. May
consist of a variety of cable, satellite, and microwave technologies. → local area network
(LAN)
True
False 
Câu 23: Ultra high-speed wireless networks that are entirely packet switched, with
speeds between 1 Mbps and 1 Gbps → 4G networks
True 
False

Câu 24: Very simple devices that connect network components, sending a packet of data
to all other connected devices → hubs
True 
False
Câu 25: Client/server computing, the use of packet switching, and the development of
widely used communications standards → 3 key technologies contemporary digital
networks and Internet are based on
True 
False
Câu 26: Technology that breaks messages into small, fixed bundles of data and routes
them in the most economical way through any available communications
channel → packet switching
True 
False
Câu 27: The capacity of a communications channel as measured by the difference
between the highest and lowest frequencies that can be transmitted by that
channel → Transmission Control Protocol/Internet Protocol (TCP/IP)
True
False 
Câu 28: Four-part numeric address indicating a unique computer location on the
Internet. → Transmission Control Protocol/Internet Protocol (TCP/IP)
True
False 
Câu 29: Special software that routes and manages communications on the network and
coordinates network resources. → network operating system (NOS)
True 
False
Câu 30: A commercial organization with a permanent connection to the internet that sells
temporary connections to subscribers. → internet service provider (ISP)
True 
False
CHƯƠNG 8
Câu 1: Independent software programs that propagate themselves to disrupt the operation
of computer networks or destroy data and other programs.
a. Worms 
b. Pharming
c. Patches
d. Password
Câu 2: Specific controls unique to each computerized application that ensure that only
authorized data are completely and accurately processed by that application.
a. Digital certificates
b. Social engineering
c. SSL (Secure Sockets Layer)
d. Application controls 
Câu 3: Encryption using two keys: one shared (or public) and one private.
a. Two-factor authentication
b. Public key encryption 
c. Social engineering
d. Drive-by download
Câu 4: Fraudulently clicking an online ad in pay-per-click advertising to generate an
improper charge per click.
a. Evil twin
b. Click fraud 
c. Smart card
d. Ransomware
Câu 5: Planning that focuses on how the company can restore business operations after a
disaster strikes.
a. Business continuity planning 
b. Information systems audit
c. MSSPs (Managed security service providers)
d. Online transaction processing
Câu 6: The coding and scrambling of messages to prevent them from being read or
accessed without authorization.
a. Pharming
b. Encryption 
c. Password
d. Spyware
Câu 7: Hardware and software placed between an organization's internal network and an
external network to prevent outsiders from invading private networks.
a. Evil twin
b. Firewall 
c. Smart card
d. Phishing
Câu 8: Transaction processing mode in which transactions entered online are
immediately processed by the computer.
a. SSL (Secure Sockets Layer)
b. Online transaction processing 
c. Information systems audit
d. Business continuity planning
Câu 9: Tools to monitor the most vulnerable points in a network to detect and deter
unauthorized intruders.
a. Disaster recovery planning
b. Online transaction processing
c. Zero-day vulnerabilities
d. Intrusion detection systems 
Câu 10: Defines acceptable uses of the firm's information resources and computing
equipment, including desktop and laptop computers, wireless devices, telephones, and the
Internet, and specifies consequences for noncompliance.
a. SSL (Secure Sockets Layer)
b. DPI (Deep packet inspection)
c. Fault-tolerant computer systems
d. AUP (Acceptable Use Policy) 
Câu 11: The ability of each party in a transaction to ascertain the identity of the other
party.
a. Botnet
b. Authentication 
c. SQL injection attack
d. Antivirus software
Câu 12: The ability of each party in a tLaw passed in 2002 that imposes responsibility on
companies and their management to protect investors by safeguarding the accuracy and
integrity of financial information that is used internally and released externally.ransaction
to ascertain the identity of the other party.
a. General controls
b. Downtime
c. Gramm-Leach-Bliley Act
d. Sarbanes-Oxley Act 
Câu 13: Software designed to detect, and often eliminate, computer viruses from an
information system.
a. Hacker
b. Cyberwarfare
c. General controls
d. Antivirus software 
Câu 14: Spyware that records every keystroke made on a computer.
a. Smart card
b. Keyloggers 
c. Spyware
d. Ransomware
Câu 15: The scientific collection, examination, authentication, preservation, and analysis
of data held on or retrieved from computer storage media in such a way that the
information can be used as evidence in a court of law.
a. Digital certificates
b. Identity theft
c. Social engineering
d. Computer forensics 
Câu 16: Attack against a website that takes advantage of vulnerabilities in poorly coded
SQL applications to introduce malicious program code into a company's systems and
networks.
a. War driving
b. DDoS (Distributed denial-of-service attack)
c. SQL injection attack 
d. Downtime
Câu 17: All of the methods, policies, and procedures that ensure protection of the
organization's assets, accuracy and reliability of its records, and operational adherence to
management standards.
a. Security
b. Controls 
c. Computer virus
d. Phishing
Câu 18: Malicious software programs such as computer viruses, worms, and Trojan
horses.
a. Ransomware
b. Patches
c. Malware 
d. Smart card
Câu 19: Statements ranking information risks, identifying acceptable security goals, and
identifying the mechanisms for achieving these goals.
a. Digital certificates
b. Security
c. Security policy 
d. Gramm-Leach-Bliley Act
Câu 20: Planning for the restoration of computing and communications services after
they have been disrupted.
a. DoS (Denial-of-service attack)
b. Intrusion detection systems
c. Online transaction processing
d. Disaster recovery planning 
Câu 21: Attachments to an electronic message to verify the identity of the sender and
provide the receiver with the means to encode a reply. → Digital certificates
True 
False
Câu 22: A software program that appears legitimate but contains a second hidden
function that may cause damage. → Trojan horse
True 
False
Câu 23: Determining the potential frequency of the occurrence of a problem and the
potential damage if the problem were to occur. Used to determine the cost/benefit of a
control. → Risk assessment
True 
False
Câu 24: Protocol used for encrypting data flowing over the Internet; limited to individual
messages. → S-HTTP (Secure Hypertext Transfer Protocol)
True 
False
Câu 25: Software designed to detect, and often eliminate, computer viruses from an
information system. → Antivirus software
True 
False
Câu 26: Law outlining medical security and privacy rules and procedures for simplifying
the administration of health care billing and automating the transfer of health care data
between health care providers, payers, and plans. → PKI (Public key infrastructure)
True
False 
Câu 27: Phishing technique that redirects users to a bogus web page, even when the
individual types the correct web page address into his or her browser. → Pharming
True 
False
Câu 28: The scientific collection, examination, authentication, preservation, and analysis
of data held on or retrieved from computer storage media in such a way that the
information can be used as evidence in a court of law. → Computer virus
True
False 
Câu 29: The ability of each party in a transaction to ascertain the identity of the other
party. → Authentication
True
False 
The correct answer is 'True'.
Câu 30: The coding and scrambling of messages to prevent them from being read or
accessed without authorization. → Information systems audit
True
False 

You might also like