You are on page 1of 64

CHƯƠNG 1: INFORMATION SYSTEMS IN BUSINESS TODAY

1. The six important business objectives of information technology are new


products, services and business models; customer and supplier intimacy;
survival; competitive advantage; operational excellence; and
Select one:
a. improved decision making
b. improved efficiency
c. improved flexibility
d. improved business practices

2. Dell Computer's use of information systems to improve efficiency and


implement "mass customization" techniques to maintain consistent
profitability and an industry lead illustrates which business objective?
Select one:
a. competitive advantage
b. improved flexibility
c. survival
d. improved business practices

3. The use of information systems because of necessity describes the business


objective of
Select one:
a. improved business practices.
b. improved flexibility.
c. improved business practices.
d. survival.

1
4. Which of the following choices may lead to competitive advantage: (1) new
products, services, and business models; (2) charging less for superior products; (3)
responding to customers in real time?
Select one:
a. 1 only
b. 1, 2, and 3
c. 2 and 3
d. 1 and 2
5. Verizon's implementation of a Web-based digital dashboard to provide managers
with real-time information such as customer complaints is an example of
Select one:
a. improved flexibility.
b. customer and supplier intimacy.
c. improved efficiency.
d. improved decision making.
6. The move of retail banking to use ATMs after Citibank unveiled its first ATMs
illustrates the use of information systems to achieve which business objective?
Select one:
a. survival
b. improved efficiency
c. customer and supplier intimacy
d. competitive advantage
7. Which of the following objectives best describes the business strategy behind the
development of smart grid initiatives by power companies, as discussed in the
chapter case?
Select one:
a. operational excellence
b. customer support

2
c. new products and services
d. competitive advantage
8. The three activities in an information system that produce the information
organizations use to control operations are
Select one:
a. input, processing, and output.
b. data analysis, processing, and feedback.
c. input, output, and feedback.
d. information retrieval, research, and analysis.
9. Order data for baseball tickets and bar code data are examples of
Select one:
a. raw input.
b. customer and product data.
c. sales information.
d. raw output.
10. Order data for baseball tickets and bar code data are examples of
Select one:
a. meaningful information.
b. feedback.
c. input
d. raw data.
11. The field that deals with behavioral issues as well as technical issues surrounding
the development, use, and impact of information systems used by managers and
employees in the firm is called
Select one:
a. information systems architecture
b. information systems literacy.

3
c. management information systems.
d. information technology infrastructure.
12. In a hierarchical organization, the upper levels consist of
Select one:
a. professional and operational employees.
b. managerial, professional, and technical employees.
c. managerial, professional, and operational employees.
d. managerial and professional employees.
13. Which of the following business objectives best describes the strategy behind the
use of technology in the new Yankee Stadium?
Select one:
a. improved decision making
b. survival
c. new products and services
d. competitive advantage
14. Data management technology consists of the
Select one:
a. hardware and software used to transfer data.
b. detailed, preprogrammed instructions that control and coordinate the computer
hardware components in an information system.
c. software governing the organization of data on physical storage media.
d. physical hardware and media used by an organization for storing data.
15. The hardware and software used to transfer data in an organization is called
Select one:
a. data management technology.
b. networking and telecommunications technology.

4
c. data and telecommunications technology.
d. networking and data management technology.
16. Networking and telecommunications technologies, along with computer
hardware, software, data management technology, and the people required to run
and manage them, constitute an organization's
Select one:
a. IT infrastructure.
b. data management environment.
c. networked environment.
d. information system.
17. An example of a business using information systems to create new products and
services is
Select one:
a. the Mandarin Oriental hotel's customer-preference tracking system.
b. Verizon's Web-based digital dashboard.
c. Wal-Mart's RetailLink system.
d. Apple Inc.'s iPod.
18. An example of a business using information systems to attain operational
excellence is
Select one:
a. Wal-Mart's RetailLink system.
b. Apple Inc.'s iPod.
c. Verizon's Web-based digital dashboard.
d. the Mandarin Oriental hotel's customer-preference tracking system.
19. Maintaining the organization's financial records is a central purpose of which
main business function?
Select one:

5
a. finance and accounting
b. manufacturing and accounting
c. finance and sales
d. sales and manufacturing
20. Which of the following would not be a complementary asset for a solar panel
manufacturer?
Select one:
a. innovation-driven management team
b. government funding for green technology
c. international solar equipment certification standards
d. centralized hierarchical decision making
21. Apple Computer dominates the online legal music sales industry primarily
because of a failure of recording label companies to
Select one:
a. adopt a new business model.
b. modernize their information value chain.
c. invest in complementary assets.
d. invest in technology.
22. An example of a social complementary asset is
Select one:
a. distributed decision-making rights.
b. technology and service firms in adjacent markets.
c. all of the above.
d. training programs
23. Disciplines that contribute to the technical approach to information systems are
Select one:

6
a. engineering, utilization management, and computer science.
b. management science, computer science, and engineering.
c. operations research, management science, and computer science.
d. computer science, engineering, and networking.
24. The discipline that focuses on mathematical techniques for optimizing
parameters of organizations, such as transportation and inventory control, is
Select one:
a. utilization management.
b. management science.
c. MIS.
d. operations research.
25. Engineers, scientists, or architects, who design new products or services for a
firm, belong to which level of a business hierarchy?
Select one:
a. knowledge workers
b. production workers
c. middle management
d. data workers

CHƯƠNG 2: GLOBAL E-BUSINESS AND COLLABORATION


1. Producing bills of materials is a business process within the ________ function.
Select one:
a. sales and marketing
b. human resources
c. finance and accounting
d. manufacturing and production

7
2. Which of the following is an example of a cross-functional business process?
Select one:
a. paying creditors
b. assembling a product
c. creating a new product
d. identifying customers
3. Which type of system would you use to change a production schedule if a key
supplier was late in delivering goods?
Select one:
a. ESS
b. TPS
c. MIS
d. DSS
4. To monitor the status of internal operations and the firm's relations with the
external environment, managers need ________ systems.
Select one:
a. knowledge
b. management information
c. decision-support
d. transaction processing
5. Which type of system would you use to determine the five suppliers with the worst
record in delivering goods on time?
Select one:
a. MIS
b. ESS
c. DSS
d. TPS

8
6. A relocation control system that reports summaries on the total moving,
house-hunting, and home financing costs for employees in all company divisions
would fall into the category of
Select one:
a. transaction processing systems.
b. executive support systems.
c. knowledge management systems.
d. management information systems.
7. The term "management information systems" designates a specific category of
information systems serving
Select one:
a. employees with online access to historical records.
b. integrated data processing throughout the firm.
c. transaction process reporting.
d. middle management functions.
8. Non-typical business problems with causes and effects that are rapidly changing
are typically handled by which type of information system ?
Select one:
a. DSS
b. ESS
c. MIS
d. TPS
9. All of the following statements regarding Lotus Notes are true except for
Select one:
a. It began as an e-mail and messaging client.
b. Firmwide installations at a large company require specialized servers and may cost
millions of dollars per year.

9
c. It is the most widely used collaboration tool at Fortune 1000 companies.
d. It provides tools for e-mail, calendars, help desk, CRM, blogs, and wikis.
10. ESS are specifically designed to serve which level of the organization?
Select one:
a. middle management
b. end-user
c. operational.
d. senior management
11. Executive support systems are information systems that support the
Select one:
a. knowledge and data workers in an organization.
b. long-range planning activities of senior management.
c. day-to-day processes of production.
d. decision-making and administrative activities of middle managers.
12. Which systems often deliver information to senior executives through a portal,
which uses a Web interface to present integrated personalized business content?
Select one:
a. executive support systems
b. management information systems
c. decision-support systems
d. transaction processing systems
13. Which type of system would you use to determine what trends in your supplier's
industry will affect your firm the most in five years?
Select one:
a. TPS
b. ESS

10
c. MIS
d. DSS
14. What is the most important function of an enterprise application?
Select one:
a. increasing speed of communicating
b. enabling a company to work collaboratively with customers and suppliers
c. enabling cost-effective e-business processes
d. enabling business functions and departments to share information
15. ________ are designed to support organization-wide process coordination and
integration.
Select one:
a. CRM systems
b. Management information systems
c. Enterprise applications
d. Decision-support systems
16. You manage the IT department at a small startup Internet advertiser. You need
to set up an inexpensive system that allows customers to see real-time statistics such
as views and click-throughs about their current banner ads. What type of system
will most efficiently provide a solution?
Select one:
a. extranet
b. CRM
c. enterprise system
d. intranet
17. The four major enterprise applications are
Select one:
a. enterprise systems, SCMs, CRMs, and KMSs.

11
b. SCMs, CRMs, DSSs, and KMSs.
c. enterprise systems, SCMs, DSSs, and CRMs.
d. SCMs, CRMs, ESSs, and KMSs
18. Enterprise systems are also known as ________ systems.
Select one:
a. enterprise support
b. management information
c. enterprise resource planning
d. resource planning
19. Enabling management to make better decisions regarding organizing and
scheduling sourcing, production, and distribution is a central feature of
Select one:
a. SCMs
b. KMSs
c. ERPs
d. TPSs
20. ________ systems integrate supplier, manufacturer, distributor, and customer
logistics processes.
Select one:
a. Reverse logistics
b. Supply-chain management
c. Collaborative distribution
d. Enterprise planning
21. ________ systems are designed to help firms manage their relationships with
their customers.
Select one:
a. CLU

12
b. MIS
c. CRM
d. CLE
22. Which types of systems consolidate the relevant knowledge and experience in the
firm to make it available to improve business processes and management decision
making?
Select one:
a. CRM
b. KMS
c. extranets
d. TPS
23. You are planning the launch of your new company, an application service
provider that provides an online timesheet and project tracking application. To best
communicate with and manage your relationship with your users, you would want
to implement a(n)
Select one:
a. CMS
b. extranet.
c. KMS
d. intranet.
24. Which of the following types of system helps expedite the flow of information
between the firm and its suppliers and customers?
Select one:
a. TPS
b. KMS
c. extranet
d. intranet

13
25. E-government refers to the application of ________ to digitally enable
government and public sector agencies' relationships with citizens, businesses, and
other arms of government.
Select one:
a. e-business
b. e-commerce
c. the Internet and networking technologies
d. any computerized technology
26. Buying or selling goods over the Internet is called
Select one:
a. an intranet.
b. an extranet.
c. e-business.
d. e-commerce.
27. The use of digital technology and the Internet to execute the major business
processes in the enterprise is called
Select one:
a. e-commerce.
b. e-business.
c. enterprise applications.
d. MIS.
28. The principal liaison between the information systems groups and the rest of the
organization is a(n)
Select one:
a. systems analyst.
b. programmer.
c. information systems manager.

14
d. CTO.
29. A ________ is a senior manager who oversees the use of IT in the firm.
Select one:
a. CIO
b. CEO
c. CFO
d. CTO.
30. You have been hired by a worldwide non-profit agency to implement a system to
handle their donations. The system must be able to handle and record telephone,
sms, and Internet donations, provide up-to-the-minute reports, and create highly
customizable mailing lists. In addition, event fundraisers need to be able to quickly
access a donor's information and history. Which of the following systems will best
meet these needs?
Select one:
a. TPS with DSS capabilities
b. TPS
c. TPS with ESS capabilities
d. TPS with MIS capabilities

CHƯƠNG 3: INFORMATION SYSTEMS, ORGANIZATIONS AND


STRATEGY
1. The interaction between information systems and organizations is influenced
Select one:
a. Primarily by the decision making of middle- and senior-managers.
b. By many factors, including structure, politics, culture, and environment.
c. By two main microeconomic forces: capital and labor.
d. Primarily by the organization's business processes and culture.

15
2. How does the technical view of organizations fall short of understanding the full
impacts of information systems in a firm?
Select one:
a. It sees information systems as a way to rearrange the inputs and outputs of the
organization.
b. It sees capital and labor as primary production factors.
c. It sees the inputs and outputs, labor and capital, as being infinitely malleable.
d. It sees the organization as a social structure similar to a machine.
3. Business processes are collections of
Select one:
a. Routines.
b. Formalized and documented practices.
c. Informal practices and behaviors.
d. Rights and privileges.
4. The costs incurred when a firm buys on the marketplace what it cannot make
itself are referred to as
Select one:
a. transaction costs.
b. procurement.
c. agency costs.
d. switching costs.
5. Which of the following statements is NOT true about information technology's
impacts on business firms?
Select one:
a. It helps reduce transaction costs.
b. It helps firms expand in size.
c. It helps reduce internal management costs.

16
d. It helps firms lower the cost of market participation.
6. According to Leavitt's model of organizational resistance, the four components
that must be changed in an organization in order to successfully implement a new
information system are
Select one:
a. technology, people, culture, and structure.
b. environment, organization, structure, tasks.
c. tasks, technology, people, and structure.
d. organization, culture, management, and environment
7. The ________ model is used to describe the interaction of external forces that
affect an organization's strategy and ability to compete.
Select one:
a. demand control
b. competitive advantage
c. competitive forces
d. network economics
8. The Internet raises the bargaining power of customers by
Select one:
a. making information available to everyone.
b. making information available to everyone.
c. making more products available.
d. creating new opportunities for building loyal customer bases.
9. The interaction between information systems and organizations is influenced
Select one:
a. by many factors, including structure, politics, culture, and environment.
b. primarily by the organization's business processes and culture.
c. by two main microeconomic forces: capital and labor.

17
d. primarily by the decision making of middle- and senior-managers.
10. How does the technical view of organizations fall short of understanding the full
impacts of information systems in a firm?
Select one:
a. It sees the inputs and outputs, labor and capital, as being infinitely malleable.
b. It sees capital and labor as primary production factors.
c. It sees information systems as a way to rearrange the inputs and outputs of the
organization.
d. It sees the organization as a social structure similar to a machine.
11. According to the ________ definition of organizations, an organization is seen as
a means by which primary production factors are transformed into outputs
consumed by the environment.
Select one:
a. macroeconomic
b. sociotechnical
c. micro economic
d. behavioral
12. All of the following are major features of organizations that impact the use of
information systems EXCEPT for
Select one:
a. business processes.
b. agency costs.
c. goals.
d. environments.
13. Which of the following would NOT be considered a disruptive technology?
Select one:
a. PCs

18
b. e-mail
c. Internet telephony
d. instant messaging
14. If two organizations pool markets and expertise that result in lower costs and
generate profits it is often referred to as creating
Select one:
a. core competencies.
b. synergies.
c. a value web
d. a value chain.
15. How are information systems used at the industry level to achieve strategic
advantage?
Select one:
a. by enforcing standards that reduce the differences between competitors
b. by building industry-wide, IT-supported consortia and symposia
c. by encouraging the entry of new competitors
d. by raising the bargaining power of suppliers
16. A collection of independent firms that use information technology to coordinate
their value chains to produce a product or service for a market collectively is called
a(n)
Select one:
a. consortia.
b. business ecosystem.
c. value web.
d. industry value chain.
17. The most successful solutions or methods for achieving a business objective are
called

19
Select one:
a. value activities.
b. best practices.
c. core competencies.
d. best processes.
18. Which of the following activities would you perform to measure and compare
your business processes to similar processes of other companies within your
industry?
Select one:
a. benchmarking
b. strategic systems analysis
c. value chain analysis
d. best practices
19. Which of the following is one of the support activities in a firm's value chain?
Select one:
a. technology
b. sales and marketing
c. inbound logistics
d. operations
20. The primary activities of a firm include
Select one:
a. inbound logistics, operations, outbound logistics, sales and marketing, and service.
b. procurement, inbound logistics, operations, technology, and outbound logistics.
c. procurement, operations, technology, sales and marketing, and services.
d. inbound logistics, operations, outbound logistics, technology, and service.
21. The value chain model

20
Select one:
a. categorizes five related advantages for adding value to a firm's products or services.
b. sees the supply chain as the primary activity for adding value.
c. categorizes four basic strategies a firm can use to enhance its value chain.
d. helps a firm identify points at which information technology can most effectively
enhance its competitive position.
22. To what competitive force did the printed encyclopedia industry succumb?
Select one:
a. low cost of entry
b. substitute products or services
c. customer's bargaining power
d. positioning and rivalry among competitors
23. Internet technology
Select one:
a. increases the difference between competitors because of the wide availability of
information.
b. imposes a significant cost of entry, due to infrastructure requirements.
c. makes it easy for rivals to compete on price alone.
d. makes it easy to sustain operational advantages.
24. A rival of your company, AutoTown, is going to implement analytic software that
mines customer data with a goal of enabling the building of automobiles that
customers actually want. This can be categorized as using information systems for
which competitive strategy?
Select one:
a. low-cost leadership
b. focus on market niche
c. product differentiation

21
d. customer intimacy
25. Upon which of the following industries has the Internet as a whole been a
disruptive technology?
Select one:
a. bill payments
b. books
c. air travel
d. real estate
26. An information system can enable a company to focus on a market niche
through
Select one:
a. complex trend forecasting.
b. intensive customer data analysis.
c. tailoring products to the client.
d. intensive product trend analysis.
27. ________ is the ability to offer individually tailored products or services using
the same production resources as bulk production.
Select one:
a. Dimension customization
b. Mass customization
c. Size customization
d. Magnitude customization
28. When a firm provides a specialized product or service for a narrow target
market better than competitors, they are using a ________ strategy.
Select one:
a. process efficiency
b. market niche

22
c. product differentiation
d. mass customization
29. The four major types of competitive strategy are
Select one:
a. low-cost leadership; product differentiation; focus on market niche; and customer and
supplier intimacy.
b. new market entrants; substitute products and services; customers; and suppliers.
c. low-cost leadership; substitute products and services; customers; and suppliers.
d. low-cost leadership; new market entrants; product differentiation; and focus on market
niche.
30. Amazon's use of the Internet as a platform to sell books more efficiently than
traditional bookstores illustrates a use of information services for
Select one:
a. focusing on market niche.
b. strengthening supplier intimacy.
c. marketing effectiveness.
d. low-cost leadership.
31. Which of the following can force a business and its competitors to compete on
price alone?
Select one:
a. demand control
b. transparent marketplace
c. poor process efficiency
d. high product differentiation
32. A substitute product of most concern for a cable TV distributor is
Select one:
a. satellite TV.

23
b. the Internet.
c. satellite radio.
d. broadcast TV.
33. A manufacturer of deep-sea oil rigs may be least concerned about this
marketplace force.
Select one:
a. low number of suppliers
b. product differentiation
c. traditional competitors
d. new market entrants
34. Which of the following is NOT one of the competitive forces?
Select one:
a. customers
b. other competitors
c. external environment
d. suppliers
35. The ________ model is used to describe the interaction of external forces that
affect an organization's strategy and ability to compete.
Select one:
a. demand control
b. competitive advantage
c. competitive forces
d. network economics
36. According to Leavitt's model of organizational resistance, the four components
that must be changed in an organization in order to successfully implement a new
information system are
Select one:

24
a. environment, organization, structure, tasks.
b. organization, culture, management, and environment
c. tasks, technology, people, and structure.
d. technology, people, culture, and structure.

CHƯƠNG 4: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS


1. Which of the following best describes how new information systems result in legal
gray areas?
Select one:
a. They are created from sets of logical and technological rules rather than social or
organizational mores.
b. They are implemented by technicians rather than managers.
c. They work with networked, electronic data, which are more difficult to control than
information stored manually.
d. They result in new situations that are not covered by old laws.
2. The introduction of new information technology has a
Select one:
a. dampening effect on the discourse of business ethics.
b. beneficial effect for society as a whole, while raising dilemmas for consumers.
c. waterfall effect in raising ever more complex ethical issues.
d. ripple effect raising new ethical, social, and political issues.
3. In the information age, the obligations that individuals and organizations have
concerning rights to intellectual property fall within the moral dimension of
Select one:
a. property rights and obligations.
b. system quality.
c. accountability and control.

25
d. information rights and obligations.
4. The ethical dilemma you may face as a manager of information systems typically is
reflected in _________ and ________________.
Select one:
a. Social and political debate
b. Risk Aversion Principle
c. Internet and electronic commerce
d. Utilitarian Principle
5. ________________ is a key element of ethical action
Select one:
a. Responsibility
b. Due process
c. Accountability
d. Ethical, social, and political
6. __________, __________, and _____________ issues are closely linked.
Select one:
a. Accountability
b. Responsibility
c. Ethical, social, and political
d. Internet and digital firm technologies
7. If an action is not right for everyone to take, it is not right for anyone
Select one:
a. Immanuel Kant's Categorical Imperative
b. Five moral dimensions of the information age.

26
c. Internet and digital firm technologies
d. Risk Aversion Principle
8. ________________ and __________________ make it easier than ever to assemble,
integrate, and distribute information,
Select one:
a. Internet and digital firm technologies
b. Ethical, social, and political

c. Internet and electronic commerce


d. Accountability
9. The use of computers to combine data from multiple sources and create electronic
dossiers of detailed information on individuals is called _________________.
Select one:
a. Privacy
b. Ethics
c. Accountability
d. Profiling
10. _________________ is a related feature of law-governed societies and is a process in
which laws are known and understood, and there is an ability to appeal to higher
authorities to ensure that the laws are applied correctly.
Select one:
a. Accountability
b. Internet and digital firm technologies
c. Due process
d. Responsibility
11. When using information systems, it is essential to ask,_______________________

27
Select one:
a. Internet and electronic commerce
b. "What is the ethical and socially responsible course of action?"
c. Immanuel Kant's Categorical Imperative
d. Internet and digital firm technologies
12. What values should be preserved in an information- and knowledge-based society?
Which institutions should we protect from violation? Which cultural values and practices
are supported by the new information technology? What moral dimension of the
information age is this?
Select one:
a. System quality
b. Quality of life
c. Descartes' rule of change
d. Accountability and control
13. What values should be preserved in an information- and knowledge-based society?
Which institutions should we protect from violation? Which cultural values and practices
are supported by the new information technology? What moral dimension of the
information age is this?
Select one:
a. Immanuel Kant's Categorical Imperative
b. Internet and digital firm technologies
c. Information rights and obligations
d. Five moral dimensions of the information age
14. What standards of data and system quality should we demand
to protect individual rights and the safety of society?
^What moral dimension of the information age is this? → Quality of life
Select one:
True

28
False
15. Take the action that achieves the higher or greater value → Risk Aversion Principle
Select one:
True
False
16. How will traditional intellectual property
rights be protected in a digital society in which tracing and accounting for
ownership are difficult and ignoring such property rights is so easy?
^What moral dimension of the information age is this? → Property rights and obligations
Select one:
True
False
17. Take the action that produces the least harm or the least potential cost → Utilitarian
Principle
Select one:
True
False
18. refers to the principles of right and wrong that individuals, acting as
free moral agents, use to make choices to guide their behaviors. → Privacy
Select one:
True
False
19. If an action cannot be taken repeatedly, it is not right to take at all → Descartes' rule
of change
Select one:
True

29
False
20. Identify and describe the facts clearly
Define the conflict or dilemma and identify the higher-order values involved.
Identify the stakeholders.
Identify the options that you can reasonably take.
Identify the potential consequences of your options. → social and political debate
Select one:
True
False
21.
1. Do unto others as you would have them do unto you (the Golden Rule).
2. If an action is not right for everyone to take, it is not right for anyone
(Immanuel Kant's Categorical Imperative).
3. If an action cannot be taken repeatedly, it is not right to take at all (Descartes' rule of
change)
4. Take the action that achieves the higher or greater value (Utilitarian Principle)
5. Take the action that produces the least harm or the least potential cost (Risk
Aversion Principle).
6. Assume that virtually all tangible and intangible objects are owned by someone
else unless there is a specific declaration otherwise. (This is the ethical "no free
lunch" rule.) → CANDIDATE ETHICAL PRINCIPLES
Select one:
True
False
22. is the claim of individuals to be left alone, free from surveillance or
interference from other individuals or organizations, including the state. → profiling

30
Select one:
True
False
23. Who can and will be held accountable and liable for
the harm done to individual and collective information and property rights?
^What moral dimension of the information age is this? → Descartes' rule of change
Select one:
True
False
CHƯƠNG 5: IT INFRASTRUCTURE AND EMERGING TECHNOLOGIES
1. A computer program or collection of programs (sets of instructions) that tell the
hardware what to do
Select one:
a. Computer Software
b. Computer Hardware
c. Internet Clients
d. Internet Protocols
2. Places where large networks interconnect.
Select one:
a. Network Access Points (NAP)
b. Point of Presence (POP)
c. Software as a Service (SaaS)
d. Local Area Network (LAN)
3. A piece of computer hardware or software that accesses a service made available by a
server.
Select one:

31
a. Computer Software
b. Internet Clients
c. Internet Servers
d. Internet Protocols
4. A strategy that builds all the software assets in the company using the service-oriented
programming methodology.
Select one:
a. Hypertext Transfer Protocol (HTTP)
b. Internet Service Provider (ISP)
c. Internet Clients
d. Service-oriented Architecture (SOA)
5. The collection of physical parts of a computer system.
Select one:
a. Computer Software
b. Computer Hardware
c. Operating Systems
d. Local Area Network (LAN)
6. Send messages over the internet.
Select one:
a. Internet Router
b. Internet Servers
c. Internet Clients
d. Internet Protocols
7. An application protocol for distributed, collaborative, hypermedia information
systems.
Select one:

32
a. Internet Service Provider (ISP)
b. Service-oriented Architecture (SOA)
c. Software as a Service (SaaS)
d. Hypertext Transfer Protocol (HTTP)
8. Where a firm subscribes to a third-party software service delivered online.
Select one:
a. Network Access Points (NAP)
b. Application Software
c. Internet Service Provider (ISP)
d. Software as a Service (SaaS)
9. A given application in a computer may function as a client with requests for services
from other programs and also as a server of requests from other programs.
Select one:
a. Internet Servers
b. Internet Protocols
c. Internet Clients
d. Internet Router
10. Which type of infrastructure services provides voice and video connectivity to
employees, computers and suppliers?
Select one:
a. Telephone
b. Telecommunictations
c. VOIP
d. Networking
11. Which of the folliwng is not an IT infrastructure service component?
Select one:

33
a. IT management services to plan and develop the infrastructure and provide project
management.
b. Operating system sofware
c. Computing platforms to provide a coherent digital enviroment
d. Physical facility management to manage the facilitites housing physcial components.
12. Places the following earas of IT infrastructure evolution in oder, from earliest to most
recent:

1. Cloud Computing Era; 2. Client / Server; 3. Enterprise Era; 4. Personal Computer; and
5. Mainframe and Minicomputer.
Select one:
a. 4, 5, 2, 3, 1
b. 5, 4, 2, 1, 3
c. 5, 4, 2, 3, 1
d. 4, 5, 3, 2, 1
13. The introduction of the minicomputer
Select one:
a. Enabled decentralized computring.
b. Offered new, powerful machines at lower prices than mainframes.
c. All of the above.
d. Allowed computers to be customized to the specific needs of departments or business
units.
14. A client computer networked to a server computer, with processing split between the
two types of machines, is called a (n)
Select one:
a. Multi-tiered client/server architecture.
b. Service-oriented architecture.

34
c. On-demand architecture.
d. Two-tiered client/server architecture.
15. In a multi-tiered network
Select one:
a. Processing is split between clients and servers
b. The work of the entire network is balanced over serveral levels of servers.
c. Processing is handled by multiple, geographically-remote clients.
d. The work of the entire network is centralized.
16. Interpretations of More’s law assert that
Select one:
a. Transistors decrease in size 50% every two years.
b. Computing power doubles every 18 months
c. Data storage costs decrease by 50% every 18 months
d. None of the above.
17. Which of the following factors provides an understanding of why computing
resources today are ever more avaiblale than in previous decades?
Select one:
a. Law of mass digital storage and More’s law
b. Network economics
c. All of the above
d. Declining communications costs, univeral standards, and the internet
18. Today’s manotechnology-produced computer transistors are roughly equivalent in
size to
Select one:
a. An atom
b. The width of a fingermail.

35
c. A virus
d. A buman hair.
19. Specifications that establish the compability of products and the ability to
communicate in a network are called
Select one:
a. Network standards
b. Telecommunications standards.
c. Internet standards.
d. Technology standards
20. _______________ unleash powerful economies of scale and result in declines in
manufactured
Select one:
a. Client / Server technologies.
b. Linux and open-source software
c. Technology standards
d. Internet and Web technologies
21. The multitasking, multi-user, operating system developed by Bell Laboratories that
operates on a wide variety of computing platofrms is
Select one:
a. Unix
b. COBO
c. OS X
d. Linux
22. The network standard of connecting desktop computers into local area netowks that
enabled the widedspread adoption of client/server computing and local area networks and
further stimulated the adoption of personal computers is
Select one:

36
a. ASCII
b. COBOL
c. TCP/IP
d. Ethernet
23. Which of the following is a leading networking hardware provider?
Select one:
a. IBM
b. Cisco
c. Dell
d. Seagate
24. Software that manages the resources of the computer is called
Select one:
a. Operating system software
b. Application software
c. Network software
d. Data management software
25. A SAN is a _____________ netowrk
Select one:
a. Scalable architecture
b. Service-oriented architecture
c. Server area
d. Storage architecture
26. As referred to in the text, legacy systems are
Select one:
a. Electronic spreadsheets used on a PC
b. Any pre-1990 Wintel systems.

37
c. Traditional mainframe-based business information systems.
d. System found on older ASPs
27. Which of the following is not an example of the emering mobile computing platform?
Select one:
a. Cell phones
b. Tables
c. CRM
d. The Kindle
28. All of the following are current hardware platform trends except
Select one:
a. Green computing
b. Virtualization
c. Cloud computing
d. Unix
29. The business case for using grid computing involles all of the following except
Select one:
a. Speed of computation
b. Cost savings
c. Increased accuracy
d. Agility
30. The process of presenting a set of computing resources (such as computing power or
data storage) so that they can all be accessed in ways that are not restricted by physical
configuration or geographic location is called
Select one:
a. Autonomic computing
b. Virtualization

38
c. Multicore processing
d. Cloud computing
31. an example of autonomic computing is
Select one:
a. Programing languges that allow non-programmers to create custom applicatons
b. Software programmed to run on any hardware platofrm
c. Cell phones taking on the functions of handheld computers
d. Spyware protection software that runs and updates itself automatically
32. TCO refers to the original cost of purchased technology: both hardware and software
Select one:
True
False
33. Has the task of delivering packets from the source host to the destination host solely
based on its address. → Internet Clients
Select one:
True
False
34. The software that supports a computer's basic functions. → Operating Systems
Select one:
True
False
35. A computer network covering a small physical area. → Local Area Network (LAN)
Select one:
True
False

39
36. Any situation in which computing is done in a remote location rather than on your
desktop or portable computing devices. → Computer Software
Select one:
True
False
37. Distributed application structure that partitions tasks or workloads between the
providers of a resource or service and service requesters. → Client-Server System
Select one:
True
False
38. Perform work that users and firms are directly interested in accomplishing. →
Application Software
Select one:
True
False
39. A company that provides customers with Internet access. → Hypertext Transfer
Protocol (HTTP)
Select one:
True
False
40. A place for local users to access a network. → Point of Presence (POP)
Select one:
True
False

CHƯƠNG 6: Foundations of Business Intelligence: Databases and Information


Management File

40
1. is a database that stores current and historical data of
potential interest to decision makers throughout the company.
Select one:
a. data mart
b. data dictionary
c. data warehouse
d. database server
2. use data mining techniques, historical data, and assumptions about future conditions to
predict outcomes of events, such as the probability a customer will respond to an offer or
purchase a specific product.
Select one:
a. predictive analytics
b. referential integrity
c. primary key
d. program-data dependence
3. consists of activities for detecting and correcting data in a database that are incorrect,
incomplete, improperly formatted, or redundant.
Select one:
a. online analytical processing (OLAP)
b. data cleansing or data scrubbing
c. data administration
d. database administration
4. is an automated or manual file that stores definitions of data elements and their
characteristics
Select one:
a. data administration

41
b. data dictionary
c. data warehouse
d. data definition
5. is a subset of a data warehouse in which a summarized or highly focused portion of the
organization's data is placed in a separate database for a specific population of users.
Select one:
a. data governance
b. data mining
c. data warehouse
d. data mart
6. provides insights into corporate data that cannot be obtained with OLAP by finding
hidden patterns and relationships in large databases and inferring rules from them to
predict future behavior.
Select one:
a. data administration
b. text mining
c. data mart
d. data mining
7. Database designers document their data model using diagrams that illustrates the
relationship between the entities
Select one:
a. object-oriented DBMS
b. database administration
c. entity-relationship diagram
d. online analytical processing (OLAP)
8. used with unstructured data, to help businesses analyze these such data
Select one:

42
a. text mining

b. data mining
c. web mining
d. key field
9. The most prominent data manipulation language today
Select one:
a. data manipulation language
b. data inconsistency
c. entity-relationship diagram
d. structured Query Language, or SQL

10. rules to ensure that relationships between coupled tables remain consistent
Select one:
a. text mining

b. database administration
c. program-data dependence
d. referential integrity
11. Extracts knowledge from the content of web pages, which may include text, image,
audio, and video data.
Select one:
a. Web content mining
b. Data quality audit
c. Web structure mining
d. Relational database

43
12. Type of text mining; able to mine text comments in an email, message, blog, social
media conversation, or survey form to detect favorable and unfavorable opinions about
specific subjects
Select one:
a. Analytic platforms
b. Relational database
c. Online analytical processing
d. Sentiment analysis
13. Examines data related to the structure of a particular web site
Select one:
a. Web content mining
b. Referential integrity
c. Web structure mining
d. Structured Query Language
14. Structured survey of the accuracy and level of completeness of the data in an
information system.
Select one:
a. Relational database
b. Data administration
c. Data quality audit
d. Web content mining
15. Specific type of software for creating, storing, organizing, and accessing data from a
database
Select one:
a. Data manipulation language
b. Database management system
c. Relational database

44
d. Data definition
16. Characteristics specific to an entity--ie: Entity "supplier" has attributes such as
supplier's name and address
Select one:
a. Data warehouse
b. Data cleansing
c. Attributes
d. Database
17. use both relational and non-relational technology that are optimized for analyzing
large datasets
Select one:
a. Data quality audit
b. Analytic platforms
c. In-memory computing
d. Relational database
18. Responsible for the specific policies and procedures through which data can be
managed as an organizational resource.
Select one:
a. Data warehouse
b. Data cleansing
c. Data administration
d. Data quality audit
19. crow's foot preceded by a short mark, ie: each supplier can supply more than one part
but each part can only have one supplier
Select one:
a. One to one relationship
b. Web content mining

45
c. One to many relationship
d. Online analytical processing
20. specifies the structure of the content of the database ; used to create database tables
and define the characteristics of the fields in each table
Select one:
a. Data definition
b. Data administration
c. Data dictionary
d. Data cleansing
21. Look-up field to find data about the supplier of a specific part; ie in the PART table,
the foreign key might be the supplier number and is used to match a part number
(primary key) with its supplier
Select one:
a. Data mining
b. Foreign key
c. Normalization
d. Primary key
22. Looks for patterns through content mining, structure mining, and usage mining.
Select one:
a. Text mining
b. Data dictionary
c. Web mining
d. Key field
23. Used to clarify table relationships in a relational database
Select one:
a. Data manipulation language
b. Entity-relationship diagram

46
c. Analytic platforms
d. Online analytical processing
24. Most common type of database, organizes data into two dimensional tables with
columns and rows
Select one:
a. Referential integrity
b. Analytic platforms
c. Data quality audit
d. Relational database
25. Facilitates big data analysis; relies primarily on a computer's main memory (RAM)
for data storage.
Select one:
a. Relational database
b. In-memory computing
c. Data quality audit
d. Analytic platforms
26. Used to add, change, delete, and retrieve the data in the database.
Select one:
a. Data quality audit
b. Data manipulation language

c. Data dictionary
d. Entity-relationship diagram
27. Relational databases represent data as two-dimensional tables (called relations).
Tables may be referred to as files. Each table contains data on an entity and its attributes.
→ data warehouse
Select one:

47
True
False
28. a group of records of the same type. → field
Select one:
True
False
29. is software that permits an organization to centralize data, manage them efficiently,
and provide access to the stored data by application programs. → database management
system (DBMS)
Select one:
True
False
30. A grouping of characters into a word, a group of words, or a complete number → file
Select one:
True
False
31. occurs when different groups in an organization independently collect the same piece
of data and store it independently of each other. → database management system
(DBMS)
Select one:
True
False
32. group of related fields, such as the student's name, the course taken, the date, and the
grade → field
Select one:
True
False

48
33. characteristic or quality describing a particular entity → data inconsistency
Select one:
True
False
34. Each table in a relational database has one field that is
designated as its primary key. This key field is the unique identifier for all the
information in any row of the table and this primary key cannot be duplicated. → primary
key
Select one:
True
False
35. a structured survey of the accuracy and level of completeness of the data in an
information system. Data quality audits can be performed by surveying entire data files,
surveying samples from data files, or surveying end users for their perceptions of data
quality. → data quality audit
Select one:
True
False
36. refers to the coupling of data stored in files and the specific programs required to
update and maintain those files such that changes in programs require changes to the
data. → Predictive analytics
Select one:
True
False
CHƯƠNG 7: Telecommunications, the Internet, and Wireless Technology File
1. High-speed transmission technology. Also designated a single communication
medium that can transmit multiple channels of data simultaneously
Select one:

49
a. Bandwidth
b. Bluetooth
c. T Lines
d. Broadband
2. networks linking digital devices that are close to one person
Select one:
a. Personal area networks (PANs)
b. Peer-to-peer architecture
c. Internet Protocol (IP) address
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
3. Technology that breaks messages into small, fixed bundles of data and routes them in
the most economical way through any available communications channel
Select one:
a. Packet switching
b. Wide area networks (WANs)
c. Bandwidth
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
4. A device for translating a computer's digital signals into analog form for transmission
over ordinary telephone lines, or for translating analog signals back into digital form for
reception by a computer.
Select one:
a. Router
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Modem
d. Switch
5. A group of technologies providing high-capacity transmission over existing copper
telephone lines

50
Select one:
a. Internet service provider (ISP)
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Digital Subscriber Line (DSL)
d. Network operating system (NOS)
6. Standards for wireless fidelity and refers to the 802.11 family of wireless networking
standards
Select one:
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Bluetooth
c. Switch
d. Wi-Fi
7. A commercial organization with a permanent connection to the internet that sells
temporary connections to subscribers
Select one:
a. Internet service provider (ISP)
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Cable internet connections
d. Internet Protocol (IP) address
8. Connection that provides network edge connectivity from an Internet service provider
to an end user
Select one:
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Wide area networks (WANs)
c. Peer-to-peer architecture
d. Cable internet connections

51
9. The capacity of a communications channel as measured by the difference between the
highest and lowest frequencies that can be transmitted by that channel
Select one:
a. Bandwidth
b. Internet2
c. Bluetooth
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
10. Telecommunications network that spans a large geographical distance. May consist of
a variety of cable, satellite, and microwave technolog
Select one:
a. Local area network (LAN)
b. Wide area networks (WANs)
c. Transmission Control Protocol/Internet Protocol (TCP/IP)
d. Cable internet connections
11. Special software that routes and manages communications on the network and
coordinates network resources
Select one:
a. Network operating system (NOS)
b. Digital Subscriber Line (DSL)
c. Domain Name System (DNS)
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
12. Four-part numeric address indicating a unique computer location on the Internet
Select one:
a. Internet service provider (ISP)
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Cable internet connections
d. Internet Protocol (IP) address

52
13. A telecommunications network that requires its own dedicated channels and that
encompasses a limited distance, usually one building or several buildings in close
proximity
Select one:
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Cable internet connections
c. Wide area networks (WANs)
d. Local area network (LAN)
14. Standard for wireless personal area networks that can transmit up to 722 Kbps within
a 10-meter area
Select one:
a. Wi-Fi
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Protocol
d. Bluetooth
15. Specialized communications processor that forwards packets of data from one
network to another network
Select one:
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Router
c. Bluetooth
d. Switch
16. Very simple devices that connect network components, sending a packet of data to all
other connected devices
Select one:
a. Router
b. Transmission Control Protocol/Internet Protocol (TCP/IP)

53
c. T1 lines
d. Hubs
17. English-like name that corresponds to the unique 32-bit numeric IP address for each
computer connected to the internet
Select one:
a. Domain name
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
c. Broadband
d. T1 lines
18. Research network with new protocols and transmission speeds that provides an
infrastructure for supporting high bandwidth Internet applications
Select one:
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Bluetooth
c. Internet2
d. Bandwidth
19. New IP addressing system using 128-bit IP addresses. Stands for Internet Protocol
version 6
Select one:
a. Transmission Control Protocol/Internet Protocol (TCP/IP)
b. Wi-Fi
c. Hubs
d. IPv6
20. Device to connect network components that has more intelligence than a hub and can
filter and forward data to a specified destination
Select one:
a. Router

54
b. Switch
c. Wi-Fi
d. Transmission Control Protocol/Internet Protocol (TCP/IP)
21. Specialized communications processor that forwards packets of data from one
network to another network → router
Select one:
True
False
22. Telecommunications network that spans a large geographical distance. May consist of
a variety of cable, satellite, and microwave technologies. → local area network (LAN)
Select one:
True
False
23. Ultra high-speed wireless networks that are entirely packet switched, with speeds
between 1 Mbps and 1 Gbps → 4G networks
Select one:
True
False
24. Very simple devices that connect network components, sending a packet of data to all
other connected devices → hubs
Select one:
True
False
25. Client/server computing, the use of packet switching, and the development of widely
used communications standards → 3 key technologies contemporary digital networks and
Internet are based on
Select one:
True

55
False
26. Technology that breaks messages into small, fixed bundles of data and routes them in
the most economical way through any available communications channel → packet
switching
Select one:
True
False
27. The capacity of a communications channel as measured by the difference between the
highest and lowest frequencies that can be transmitted by that channel → Transmission
Control Protocol/Internet Protocol (TCP/IP)
Select one:
True
False
28. Four-part numeric address indicating a unique computer location on the Internet. →
Transmission Control Protocol/Internet Protocol (TCP/IP)
Select one:
True
False
29. Special software that routes and manages communications on the network and
coordinates network resources. → network operating system (NOS)
Select one:
True
False
30. A commercial organization with a permanent connection to the internet that sells
temporary connections to subscribers. → internet service provider (ISP)
Select one:
True
False

56
CHƯƠNG 8: Securing information systems
1. Independent software programs that propagate themselves to disrupt the operation
of computer networks or destroy data and other programs.
Select one:
a. Patches
b. Worms
c. Pharming
d. Password
2. Specific controls unique to each computerized application that ensure that only
authorized data are completely and accurately processed by that application.
Select one:
a. Social engineering
b. Digital certificates
c. SSL (Secure Sockets Layer)
d. Application controls
3. Encryption using two keys: one shared (or public) and one private.
Select one:
a. Drive-by download
b. Public key encryption
c. Social engineering
d. Two-factor authentication
4. Fraudulently clicking an online ad in pay-per-click advertising to generate an improper
charge per click.
Select one:
a. Click fraud
b. Smart card
c. Ransomware

57
d. Evil twin
5. Planning that focuses on how the company can restore business operations after a
disaster strikes.

Select one:
a. MSSPs (Managed security service providers)
b. Business continuity planning
c. Information systems audit
d. Online transaction processing
6. The coding and scrambling of messages to prevent them from being read or accessed
without authorization.
Select one:
a. Password
b. Pharming
c. Encryption
d. Spyware
7. Hardware and software placed between an organization's internal network and an
external network to prevent outsiders from invading private networks.
Select one:
a. Phishing
b. Evil twin
c. Smart card
d. Firewall
8. Transaction processing mode in which transactions entered online are immediately
processed by the computer.
Select one:

58
a. SSL (Secure Sockets Layer)
b. Online transaction processing
c. Business continuity planning
d. Information systems audit
9. Tools to monitor the most vulnerable points in a network to detect and deter
unauthorized intruders.
Select one:
a. Zero-day vulnerabilities
b. Disaster recovery planning
c. Online transaction processing
d. Intrusion detection systems
10. Defines acceptable uses of the firm's information resources and computing
equipment, including desktop and laptop computers, wireless devices, telephones, and the
Internet, and specifies consequences for noncompliance.

Select one:
a. SSL (Secure Sockets Layer)
b. Fault-tolerant computer systems
c. AUP (Acceptable Use Policy)
d. DPI (Deep packet inspection)
11. The ability of each party in a transaction to ascertain the identity of the other party.
Select one:
a. SQL injection attack
b. Botnet
c. Authentication
d. Antivirus software

59
12. The ability of each party in a tLaw passed in 2002 that imposes responsibility on
companies and their management to protect investors by safeguarding the accuracy and
integrity of financial information that is used internally and released externally.ransaction
to ascertain the identity of the other party.
Select one:
a. General controls
b. Sarbanes-Oxley Act
c. Downtime
d. Gramm-Leach-Bliley Act
13. Software designed to detect, and often eliminate, computer viruses from an
information system.
Select one:
a. Hacker
b. Cyberwarfare
c. General controls
d. Antivirus software
14. Spyware that records every keystroke made on a computer.

Select one:
a. Keyloggers
b. Spyware
c. Ransomware
d. Smart card
15. The scientific collection, examination, authentication, preservation, and analysis of
data held on or retrieved from computer storage media in such a way that the information
can be used as evidence in a court of law.
Select one:

60
a. Computer forensics
b. Social engineering
c. Digital certificates
d. Identity theft
16. Attack against a website that takes advantage of vulnerabilities in poorly coded SQL
applications to introduce malicious program code into a company's systems and
networks.

Select one:
a. SQL injection attack
b. War driving
c. Downtime
d. DDoS (Distributed denial-of-service attack)
17. All of the methods, policies, and procedures that ensure protection of the
organization's assets, accuracy and reliability of its records, and operational adherence to
management standards.

Select one:
a. Computer virus
b. Security
c. Controls
d. Phishing
18. Malicious software programs such as computer viruses, worms, and Trojan horses.

61
Select one:
a. Malware
b. Smart card
c. Patches
d. Ransomware
19. Statements ranking information risks, identifying acceptable security goals, and
identifying the mechanisms for achieving these goals.

Select one:
a. Security
b. Digital certificates
c. Gramm-Leach-Bliley Act
d. Security policy
20. Planning for the restoration of computing and communications services after they
have been disrupted.

Select one:
a. Disaster recovery planning
b. DoS (Denial-of-service attack)
c. Intrusion detection systems
d. Online transaction processing
21. Attachments to an electronic message to verify the identity of the sender and provide
the receiver with the means to encode a reply. → Digital certificates

Select one:
True

62
False
22. A software program that appears legitimate but contains a second hidden function that
may cause damage. → Trojan horse
Select one:
True
False
23. Determining the potential frequency of the occurrence of a problem and the potential
damage if the problem were to occur. Used to determine the cost/benefit of a control. →
Risk assessment
Select one:
True
False
24. Protocol used for encrypting data flowing over the Internet; limited to individual
messages. → S-HTTP (Secure Hypertext Transfer
Protocol)
Select one:
True
False
25. Software designed to detect, and often eliminate, computer viruses from an
information system. → Antivirus software
Select one:
True
False
26. Law outlining medical security and privacy rules and procedures for simplifying the
administration of health care billing and automating the transfer of health care data
between health care providers, payers, and plans. → PKI (Public key infrastructure)
Select one:
True

63
False
27. Phishing technique that redirects users to a bogus web page, even when the individual
types the correct web page address into his or her browser. → Pharming
Select one:
True
False
28. The scientific collection, examination, authentication, preservation, and analysis of
data held on or retrieved from computer storage media in such a way that the information
can be used as evidence in a court of law. → Computer virus
Select one:
True
False
29. The ability of each party in a transaction to ascertain the identity of the other party. →
Authentication
Select one:
True
False
30. The coding and scrambling of messages to prevent them from being read or accessed
without authorization. → Information systems audit
Select one:
True
False

64

You might also like