Popular in Course
verified elite notetaker
Popular in Department
This 211 page Study Guide was uploaded by dingyue shi on Wednesday February 25, 2015. The Study Guide belongs to a course at a university taught by a professor in Fall. Since its upload, it has received 586 views.
Reviews for ist202
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 02/25/15
Information Systems Today 5e ValacichSchneider Chapter 1 Managing in the Digital World 1 Knowledge workers are professionals who A use knowledge to perform their jobs but do not create knowledge B create modify andor synthesize knowledge as a fundamental part of their jobs C use their skills to help others gain knowledge D modify knowledge created by others but do not create knowledge themselves E work in the education industry 2 Which of the following predictions made by Peter Drucker is true A Knowledge workers have lesser bargaining power than workers in other industries B Knowledge workers do not possess valuable realworld skills C Knowledge workers are not reliant on formal education D Knowledge workers are continually learning how to do their jobs better E Knowledge workers are not paid as well as their prior industrial counterparts 3 During the time of the industrial revolution some individuals who felt threatened by the changes brought about by technology resorted to protesting against the technology Identify these individuals A Luddites B Utopists C Millenarists D Utilitarians E Preterists 4 Which of the following occurred when Alvin Tof er39s quotthird wavequot gained speed A Society moved from a predominantly agrarian culture to the urbanized machine age B Occupations changed to accommodate the mechanized society C The ability to perform repetitive tasks became a quality to be instilled and valued D Individuals shifted from handicrafting items for sale to working in factories E Information became the currency of the realm 5 The ability to independently learn new technologies as they emerge and assess their impact on your work and life is called A computer assisted learning B computer adaptation C computer uency D computer compatibility E computer programming 6 Which of the following best describes the phenomenon termed Web 20 A using the Internet as a platform for applications B uploading files on the Internet C learning new technologies as they emerge D setting up an online business E downloading free software from the Internet 7 Which of the following is an example of an economic change brought about by globalization A increases in the frequency of worldwide fads and phenomena B development of lowcost computing platforms C availability of lowcost communication systems D increases in the outsourcing of labor E decentralization of organizations 8 Which of the following is an example of a technological change brought about by globalization A increases in the frequency of international travel B increases in the levels of immigration C enforcement of global patent and copyright laws D decreases in the frequency of worldwide fads E decentralization of organizations 9 In his book The World Is Flat New York Times foreign affairs columnist Thomas L Friedman characterized the evolution of globalization as having distinct phases During this globalization phase mainly European countries were globalizing attempting to extend their territories into the New World Identify this globalization phase A Globalization 10 B Globalization 20 C Globalization 30 D Globalization 40 E Globalization 50 10 According to Thomas L Friedman which of the following is true about Globalization 20 A During this stage mainly European countries were globalizing B It brought continents closer together shrinking the world quotfrom size large to size mediumquot C During this stage virtually every nation joined the globalization movement D It was interrupted by the Great Depression and the two world wars E During this stage people didn39t notice how it affected their lives due to the slow pace of change 11 According to Thomas L Friedman which of the following is true about Globalization 30 A Industries changed slowly and change took generations B Continents were brought closer together shrinking the world quotfrom size medium to size smallquot C Individuals and small groups from virtually every nation joined the globalization movement D Mainly Americans and Europeans were globalizing E People didn39t notice how it affected their lives due to the slow pace of change 12 In 1994 a company called released the first mainstream Web browser thereby opening up the possibilities of the Internet for the general public A Netscape B Microsoft C Opera D Internet Explorer E Firefox 13 Uploading enables individuals to A access sensitive information on the Internet B be producers of information instead of mere consumers C copyright information available on the Internet D save information found on the Internet onto their personal computers E permanently remove information available on the Internet 14 The term refers to Web sites allowing users to add remove or edit content and is now often used synonymously with open source dictionaries A html B ajax C wiki D perl E Web 20 15 Which of the following best explains the process of moving business processes or tasks to another company A offshoring B informing C insourcing D exporting E outsourcing 16 Which of the following can be cited as an example of outsourcing A Microsoft hands over its customer service function to Convergys located in India B Volkswagon acquires a steel manufacturing plant to reduce its overall production costs C Dell sources computer parts from suppliers located in Russia D Audi starts a manufacturing facility in China to take advantage of low labor costs E PampG acquires a retail outlet to reduce its distribution costs 17 Which of the following refers to having certain functions performed by the same company but in a different country A outsourcing B offshoring C exporting D licensing E franchising 18 Aircraft manufacturer Boeing designed its new 787 Dreamliner aircraft in Russia making use of the availability of highly skilled aeronautical engineers Identify this strategy A offshoring B outsourcing C insourcing D franchising E licensing 19 In order to take advantage of the high quality talent pool Ernst amp Young sets up operations in the Philippines and moves part of its tax services to its new facility Identify this strategy A outsourcing B franchising C offshoring D insourcing E informing 20 TransCorp is a mediumsized IT firm that is looking to outsource its payroll processes Which of the following statements if true would M strengthen the decision to outsource A Companies in other countries can do the same amount of work at a comparable cost B Outsourcing has become a trend among most firms in developed nations C Companies in other countries are more efficient in all aspects of work along with lower cost D Firms across the globe are adopting cloud computing systems E The firm is enjoying good profit margins 21 TransCorp is a mediumsized IT firm that has outsourced its customerservice processes to the Philippines for the last two years Which of the following statements if true would M weaken the decision to continue outsourcing A Most firms in the Philippines have been accused of poor working conditions B The firm39s prime competitor recently withdrew its outsourcing process C Customers39 complaints about the quality of service have risen dramatically over the past two years D According to a company survey most employees feel that they require extensive training E The value of the company39s stock recently fell by 5 percent in the New York Stock Exchange 22 refers to the delegation of a company39s logistics operations to a subcontractor that specializes in that operation A Outsourcing B Informing C Offshoring D Insourcing E Licensing 23 Which of the following allows individuals to utilize powerful search engines on the Internet to build their quotown personal supply chain of information knowledge and entertainmentquot A offshoring B informing C insourcing D exporting E outsourcing 24 Thomas L Friedman uses the term quotthe steroidsquot to refer to technologies A that make different forms of collaboration digital mobile virtual and personal B that tightly integrate retailers their suppliers and their customers C that allow firms to outsource business processes on a global scale D that allow users to add remove or edit content from Web sites E that allow individuals to build their own personal supply chain of information and entertainment 25 Outsourcing has seen a huge increase because of the A increase in decentralization B decrease in transportation costs C increase in advertising costs D decrease in telecommunication costs E increase in the cost of raw materials 26 is the use of locations closer to the home country in terms of geographical political linguistic economic or cultural distance A Informing B Nearshoring C Onshoring D Insourcing E Outsourcing 27 US companies move work from India back to Mexico or British Columbia in order to address some of the challenges associated with overseas destinations This is an example of A insourcing B outsourcing C informing D onshoring E nearshoring 28 Which of the following is as an example of nearshoring A British Airways moves customer relations and passenger revenue accounting to India B Parts of Airbus and Boeing airplanes are designed and engineered in Moscow Russia C McKinsey sets up a global research division in India D Worldwide banking group HSBC moves backoffice operations to India E TMobile moves part of its content development process from India to the Czech Republic 29 Aortego a USbased automobile company has a manufacturing plant in India and has been able to reduce its manufacturing costs significantly because of the country39s highlyskilled yet low cost labor However Aortego is forced to shift its plant from India to Canada because of the introduction of a new law which mandates that all companies collaborate with Indian companies before entering into the country Which of the following best explains Aortego39s shift from India to Canada A offshoring B outsourcing C informing D nearshoring E insourcing 30 According to Nicholas Carr cloud computing may contribute to the decline in outsourcing Which of the following justifies this statement A An IT outsourcer39s business is built around managing complex internal systems A shift to a simpler cloudbased IT infrastructure should reduce the need for outsourcers B Outsourcing is based on the availability of cheap labor these workers will not be able to work on complex cloudbased IT infrastructures thereby contributing to the decline in outsourcing C Cloud computing is customized in each country thus making it impossible to outsource D Cloud computing is standardized in all countries reducing the need for outsourcing E An IT outsourcer39s business is built around managing simple internal systems A shift to a complex cloudbased IT infrastructure would discourage outsourcing 31 Which of the following is a cultural challenge of operating in the digital world A conducting videoconferences across different time zones B aging populations in the United States and Western Europe C differences in power distance and uncertainty avoidance D availability of labor force and salary differences E differences in academic degrees and measurement units 32 Which of the following is a geoeconomic challenge of operating in the digital world A differences in network infrastructures B differences in the concept of time and life focus C differences in measurement units D differences in export and import regulations E differences in languages 33 refers to physical computer equipment such as the computer monitor central processing unit or keyboard A Software B Malware C Data D Hardware E Telecommunication 34 refers to a program or set of programs that tell the computer to perform certain tasks A Software B Telecommunication C Hardware D Data E Networks 35 Which of the following statements is true about information systems IS and information technology IT A IS programs are more technical in nature than IT programs B IT programs have a stronger managerial focus than IS programs C Software and telecommunications are present in IS but excluded from IT D The differences between IT and IS is increasing due to globalization E IT programs are more technical in nature whereas IS programs have a stronger managerial focus 36 Which of the following statements is true about data A It can be defined as a representation of reality B It is the ability to understand information C It has no meaning in and of itself D It is the ability to make decisions or predictions based on information E It organizes or manipulates information to make it suitable for a given task 37 Which of the following statements is true about information A It has no meaning in and of itself B It organizes or manipulates knowledge to make it suitable for a given task C It is raw material recorded unformatted words and numbers D It is a representation of reality E It is the ability to make predictions based on data 38 Which of the following IS personnel is responsible for the maintenance of information systems A a systems analyst B a database administrator C a programmer D an IS security manager E a systems consultant 39 Which of the following IS personnel is responsible for coding testing debugging and installing programs A a programmer B a systems consultant C an IS manager D a systems analyst E an IS security manager 40 Which of the following IS personnel is responsible for strategic planning and IS use throughout a firm A the chief information officer B the IS security manager C the IS manager D the Webmaster E the IS auditor 41 In information systems management a systems consultant is responsible for A analyzing business requirements and selecting information systems that meet those needs B coding testing debugging and installing programs C auditing information systems for compliance with internal and external standards D managing security measures and disaster recovery E providing information systems knowledge to external clients 42 Which of the following is part of an IS personnel39s technical knowledge and skills A systems analysis and design B integrating subsystems and systems C alternative development methodologies D network operating systems E technological communication and presentation 43 Which of the following is part of an IS personnel39s business knowledge and skills A information gathering and synthesis B technological communication and presentation C systems development life cycle D problem identification and solution formulation E virtualization 44 Which of the following is part of an IS personnel39s systems knowledge and skills A hardware platforms B business processes C alternative development methodologies D cabling and network interface cards E application software 45 Identify the purpose of a transaction processing system used in organizations A to support the activities within a specific functional area of the firm B to handle daytoday business event data at the operational level of the organization C to support interaction between the firm and its customers D to support the coordination of suppliers product or service production and distribution E to enable customers to buy goods and services from a firm39s Web site 46 The purpose of an is to support and integrate all facets of the business including planning manufacturing sales marketing and so on A intelligent system B functional area information system C electronic commerce system D enterprise resource planning system E management information system 47 The purpose of an intelligent system is to A enable people to communicate collaborate and coordinate with each other B create store analyze and manage spatial data C emulate or enhance human capabilities D support the coordination of suppliers product or service production and distribution E produce detailed information to help manage a firm 48 Which of the following can be cited as an example of a supply chain management system A procurement planning B market analysis C knowledge portal D sales force automation E product demand forecasting system 49 Identify the purpose of an office automation system A to processes daytoday business event data at the operational level of the organization B to provide access to databases in order to support quantitative decision making C to support a wide range of predefined daytoday activities of individuals and small groups D to support interaction between the firm and its customers E to support the activities within a specific functional area of the firm 50 A grocery store checkout cash register with a connection to a network is an example of an A intelligent system B functional area information system C decision support system D transaction processing system E electronic commerce system 51 The process of connecting separate information systems and data to improve business processes and decision making is known as A database development B business intelligence C systems integration D application development E collaboration systems 52 Microsoft39s ExchangeOutlook and Lotus Notes provide people with email automated calendaring and online threaded discussions enabling close contact with others regardless of their location Identify this type of information system These are examples of A collaboration systems B office automation systems C data mining and visualization systems D functional area information systems E transaction processing systems 53 Which of the following statements is true about today39s serviceoriented IS personnel A They modify systems at a moment39s notice to meet customer needs quickly and effectively B They patiently wait for customers to come in with systems complaints C They believe that they own and control the computing resources D They give reasons why customers39 ideas cannot or will not work E They believe they should tell users what they can and cannot do with the computing resources 54 Toyota39s automotive electronics systems and FedEX39s Web site were not developed solely because managers in these organizations wanted to do things faster or because they wanted to have the latest greatest technology These organizations developed these systems to help gain or sustain competitive advantage The choices made in developing the systems at both Toyota and FedEx were in their intent A operational B functional C strategic D departmental E tactical 55 Which of the following is used to describe the issues and standards of conduct as they pertain to the use of information systems A virtual ethics B social informatics C cyber security D computer etiquette E computer ethics 56 is concerned with what information an individual should have to reveal to others in the workplace or through other transactions A Information accessibility B Information accuracy C Information privacy D Information asymmetry E Information piracy 57 SlamBook is a social networking site which currently has around 2000000 users The company has always valued its users39 privacy and has taken extensive measures to safeguard it However SlamBook has recently faced severe customer backlash regarding privacy issues associated with one of its applications Which of the following statements would best explain the apparent discrepancy above A Recently the government introduced stringent privacy regulations for Internet firms B The application did not have any provisions that restricted minors from using the application C MyPlace SlamBook39s closest competitor had seen great success with a similar application and an optout system D Launching optout applications instead of optin applications is an industry trend E The application was an optout system whereby all users were enrolled by default 58 WorldTravel wwwworldtravelcom is a travel Web site that provides detailed information about the different places that tourists can visit across the globe Additionally it also helps visitors to book tickets and hotels in these destinations Which of the following if true would M assure the customers about their online privacy A WorldTravel when collecting personal information explicitly states the purpose of the information and that it will not be used for anything else B WorldTravel informs its members that it is following the best practices in the industry C WorldTravel when collecting personal information explicitly tells all its customers that the information collected will be protected by a third party who specializes in this domain D WorldTravel decides not to send any spam mails to any of its members E WorldTravel when collecting personal information explicitly tells all its customers that the information collected is protected under the Electronic Communications Privacy Act 59 Which of the following statements is true about online privacy A A vendor cannot track the Web pages you look at B A vendor cannot track what products you examine in detail C A vendor is not capable of knowing the method of payment you choose to use D A vendor is not required by law to respect your privacy E A vendor cannot know where you are having the product delivered 60 Which of the following steps should be taken to ensure ones privacy online A Avoid Web sites that are monitored by independent organizations B Visit Web sites anonymously C Adjust your Web browser settings to save cookies D Ensure you receive a confirmation email whenever you buy products online E Maintain only one email account and use it when making online purchases 61 is concerned with ensuring the authenticity and fidelity of information as well as with identifying who is responsible for informational errors that harm people A Information privacy B Information accuracy C Information accessibility D Information property E Information protection 62 Information property focuses on A who owns information about individuals and how information can be sold and exchanged B information that has been encrypted by the owner to make it unaccessible to others C information an individual should or should not have to reveal to others in the workplace D information a person or organization has the right to obtain about others E the authenticity of information as well as responsibility for informational errors that harm people 63 Who owns the computerized information that is stored in thousands of databases by retailers credit card companies and marketing research companies A the government B the Chief Information Officer C the firm that maintains the database D the customers themselves E the company39s IT department 64 Information about quotwho am I and where do I livequot is an example of A behavioral data B geographic data C psychographic data D demographic data E attitudinal data 65 Information accessibility focuses on A defining what information a person or organization has the right to obtain about others B identifying who is responsible for informational errors that harm people C information that has been encrypted by the owner to make it unaccessible to others D who owns information about individuals and how information can be sold and exchanged E what information an individual should have to reveal to others in the workplace 66 The Act of 1986 made it much more difficult for anyone including the government to eavesdrop on phone conversations A Electronic Communication Modernization B Internet Privacy C SarbanesOxley D Gramm Leach Bliley E Electronic Communications Privacy 67 The gap between those individuals in our society who are computer literate and have access to information resources like the Internet and those who do not is referred to as the A horizontal disparity B digital divide C electronic gap D generation gap E knowledge divide 68 Which of the following can be cited as an example of a digital divide A Unlike Joey Ryan has access to more books and good advice because he studies in a better school B Unlike Ben Claudia possesses superior analytical skills which makes her better at mathematics C Kevin is more successful than Vincent because of his people skills D Lora has access to more information than Frank because she knows how to operate a computer E Trisha is wealthier than Neal because her father is a successful businessman 69 The digital divide is one of the major ethical challenges facing society today when you consider the strong linkage between computer literacy and a person39s ability to compete in the information age Which of the following statements if true would widen the digital divide A According to Moore39s law the cost of computing is expected to decrease drastically over the next few years B Companies like Microsoft and Berkshire Hathaway have invested billions of dollars in research on information technology C IT firms are concerned about and are conducting extensive research on the obsolescence of technology D The increase in the need for innovative technology has increased the cost of research which has resulted in an increase in the cost of computing E Certain IT firms are conducting exclusive research to make the technology product lifecycle longer 70 A global project called One Laptop per Child is attempting to distribute lowcost laptop computers to children in developing countries around the world in an attempt to shrink the A digital divide B electronic gap C power distance D horizontal disparity E knowledge gap Chapter 2 Gaining Competitive Advantage Through Information Systems 1 At the level of a firm the routine daytoday business processes and interactions with customers occur A strategic B tactical C operational D managerial E executive 2 Information systems at the level are designed to automate repetitive activities such as sales transaction processing and to improve the efficiency of business processes and the customer interface A tactical B executive C strategic D managerial E operational 3 Which of the following actions can be included as a part of operational planning A making daytoday decisions that are highly structured and recurring B effectively utilizing and deploying organizational resources to achieve strategic objectives C focusing on longterm strategic questions facing the organization D dealing with complex problems with broad and longterm ramifications for the organization E focusing on balancing performance across the organization 4 At the level information systems are typically used to optimize processes and to better understand the underlying causes of any performance problems A tactical B executive C managerial D operational E strategic 5 Ben White is the manager of a retail store His work typically includes the routine daytoday interactions with customers and once in a while solving a customer39s problem or dealing with a dissatisfied customer Additionally he has to keep track of inventory and issue an order for additional inventory with levels below a specified level Ben is an level manager A operational B tactical C strategic D managerial E executive 6 The managerial level of the organization is also known as the level A functional B tactical C executive D operational E strategic 7 Managers at the tactical level of the organization focus on A deploying organizational resources to achieve the objectives of the organization B routine daytoday business processes and interactions with customers C longterm strategic questions facing the organization D complex problems with broad and longterm ramifications for the organization E the efficiency of business processes and the customer interface 8 Jane Estroisch works as a manager in a multidomestic firm She focuses on the longterm questions facing the organization such as which countries to compete in and what organizational policies to follow Jane is in the the level of the organization A operational B tactical C executive D functional E managerial 9 Managers in the level are referred to as quotexecutivesquot A operational B tactical C functional D strategic E managerial 10 decisions deal with complex problems with broad and longterm ramifications for the organization A Executivelevel B Functionallevel C Tacticallevel D Operationallevel E Manageriallevel 11 To assist decision making information systems are used to obtain aggregate summaries of trends and projections of the future A manageriallevel B functionallevel C tacticallevel D operationallevel E executivelevel 12 Doing things faster is associated with information systems for A learning B automating C supporting D initiating E negotiating 13 Information systems at the level of an organization often help in automating repetitive activities A tactical B strategic C managerial D operational E executive 14 quotDoing Things Smarterquot is associated with information systems for A automating B organizational learning C encrypting D networking E supporting strategy 15 Which of the following actions would an organization take if it decides to pursue a bestcost provider strategy A offering the best prices in its industry on its goods andor services B providing better products or services than its competitors C offering products or services of reasonably good quality at competitive prices D providing high quality products at low prices in specific markets E offering low quality products at low prices with high quality aftersales services 16 Tere39OWind a fashion apparel company provides numerous lowcost products to a broad range of customers Tere39OWind is pursuing a strategy A focused lowcost B bestcost provider C broad differentiation D lowcost leadership E focused differentiation 17 Which of the following is an example of a focused differentiation strategy A Manufacturers like Ferrari Aston Martin and Lamborghini compete in the tiny super car category with prices starting at 150000 and running as high as 600000 B Global furniture retailer Ikea provides customers with quotaffordable solutions for better livingquot by offering home furnishings that combine good design function and quality with low prices C McDonald39s has extended its appeal across age groups social groups and national boundaries by emphasizing a few qualities with universal appeal speed consistency value hygiene and family lifestyles D WalMart39s every day low prices EDLP strategy hinges upon WalMart39s ability to obtain consumer goods at the cheapest possible price and pass these savings on to consumers E Toyota39s Lexus brand is considered a luxury car Some of Lexus39 models like the ES model however are in the midrange of prices for cars 18 Which of the following is an example of a focused lowcost strategy A McDonald39s has extended its appeal across age groups social groups and national boundaries by emphasizing a few qualities with universal appeal speed consistency value hygiene and family lifestyles B Toyota39s Lexus brand is considered a luxury car Some of Lexus39 models like the ES model however are in the midrange of prices for cars C Global furniture retailer Newton provides customers who live in highaltitude areas with quotaffordable solutions for better livingquot by offering home furnishings that combine good design function and quality with low prices D Walmart39s every day low prices EDLP strategy hinges upon Walmart39s ability to obtain consumer goods at the cheapest possible price and pass these savings on to consumers E Big Dog builds motorcycles that target only the very high end of the heavyweight market the highend premium cruiser market with names such as Pitbull Wolf Mastiff and Bulldog 19 Which of the following is an example of a bestcost provider strategy A Manufacturers like Ferrari Aston Martin and Lamborghini compete in the tiny super car category with prices starting at 150000 and running as high as 600000 B Toyota39s Lexus brand is considered a luxury car Some of Lexus39 models like the ES model however are in the midrange of prices for cars C Global furniture retailer Ikea provides customers with quotaffordable solutions for better livingquotby offering home furnishings that combine good design function and quality with low prices D Big Dog builds motorcycles that target only the very high end of the heavyweight market the highend premium cruiser market with names such as Pitbull Wolf Mastiff and Bulldog E WalMart39s every day low prices EDLP strategy hinges upon WalMart39s ability to obtain consumer goods at the cheapest possible price and pass these savings on to consumers 20 Firms targeting a niche market with low cost products are pursuing a strategy A bestcost provider B broad differentiation C focused lowcost D focused differentiation E lowcost leadership Answer C 21 A strategy can also be referred to as a middleof theroad strategy A bestcost provider B focused lowcost C lowcost leadership D broad differentiation E focused differentiation 22 Which of the following is an implication for firms that have a threat of new entrants in their market A increased cost B reduced quality C increased demand for services D increased price E decreased market share 23 Reduced prices need for increased quality and demand for more services would result due to high A threat of substitute products from other industries B customers39 bargaining power C threat of new entrants into the market D traditional rivals within the industry E increased suppliers39 bargaining power 24 With reference to assessing value for the IS infrastructure value is the contribution an investment makes toward improving the infrastructure39s ability to enhance the profitability of the business A architectural B operational C regulatory D compliance E economic 25 With reference to assessing value for the IS infrastructure architectural value is derived from A the infrastructure39s ability to enhance the profitability of the business B an investment39s ability to extend the infrastructure39s capabilities to meet business needs today and in the future C an investment39s impact on enabling the infrastructure to better meet business processing requirements D assessing the extent to which an investment helps to meet requirements for control security and integrity as required by a governing body or a key customer E the infrastructure39s ability to improve product quality and customer satisfaction 26 While assessing value of the IS infrastructure quotbeforeandafterquot assessments of infrastructure characteristics such as interoperability portability scalability recoverability and compatibility can be taken to measure value A economic B operational C regulatory D architectural E compliance 27 While assessing value of the IS infrastructure value is derived from assessing an investment39s impact on enabling the infrastructure to better meet business processing requirements A architectural B regulatory C operational D economic E compliance 28 While assessing value of the IS infrastructure if we measure the impact of not investing in a particular project we are deriving the value A operational B economic C compliance D regulatory E architectural 29 While assessing value of the IS infrastructure value is derived from assessing the extent to which an investment helps to meet requirements for control security and integrity as required by a governing body or a key customer A architectural B tactical C operational D regulatory and compliance E economic 30 Which of the following international business strategies is associated with low degree of global integration and high degree of local responsiveness A global strategy B homereplication strategy C international strategy D multidomestic strategy E transnational strategy 31 A global strategy is associated with A low degree of global integration and high degree of local responsiveness B low degree of global integration and lack of local responsiveness C high degree of global integration and high degree of local responsiveness D low degree of global integration and low degree of local responsiveness E high degree of global integration and low degree of local responsiveness 32 A firm that enjoys high degree of global integration and local responsiveness is pursuing an strategy A transnational B global C international D multidomestic E homereplication 33 Which of the following statements is true about firms pursuing a homereplication strategy A They attempt to achieve economies of scale by producing identical products in large quantities for a variety of different markets B They develop products for the global market C They focus on their domestic customers39 needs and wants and merely export their products to generate additional sales D They have a need to create integrated networks between the home office and the multiple local subsidiaries E They leverage the exibility offered by a decentralized organization while at the same time reaping economies of scale enjoyed by centralization 34 Companies pursuing an strategy attempt to achieve economies of scale by producing identical products in large quantities for a variety of different markets A global B international C export D multidomestic E homereplication 35 While pursuing a global business strategy the prohibits the implementation of local strategies and thus a global company cannot quickly react to local challenges and opportunities A increased bargaining power of customers B threat of new entrants into the market C increased bargaining power of suppliers D need to achieve economies of scale E threat of substitute products from other industries 36 Which of the following statements is true about organizations pursuing a global business strategy A They use a loose federation of associated business units each of which is rather independent in their strategic decisions B They attempt to achieve economies of scale by producing identical products in large quantities for a variety of different markets C They are extremely exible and responsive to the needs and demands of local markets D They focus on their domestic customers39 needs and wants and merely export their products to generate additional sales E They leverage the exibility offered by a decentralized organization while at the same time reaping economies of scale enjoyed by centralization 37 Which of the following is a disadvantage of firms that pursue a global strategy A lack of control over subsidiaries B limited knowledge transfer between individual subsidiaries C lack of interest in obtaining additional knowledge about foreign operations D inability to control decentralization E inability to react quickly to local challenges and opportunities 38 Which of the following statements is true about firms pursuing a multidomestic business strategy A They leverage the exibility offered by a decentralized organization while at the same time reaping economies of scale enjoyed by centralization B They focus on their domestic customers39 needs and wants and merely export their products to generate additional sales C They cannot react quickly to local challenges and opportunities D They are extremely exible and responsive to the needs and demands of local markets E They work in a centralized fashion and the home location exerts strong control on the subsidiaries 39 Which of the following is a disadvantage for firms pursuing a multidomestic business strategy A limited knowledge transfer between individual subsidiaries B exerting unnecessary control over subsidiaries C lack of interest in obtaining additional knowledge about foreign operations D inability to react quickly to local challenges and opportunities E restriction of decisionmaking ability of subsidiaries Scenario Glasco Hardware Co is a multinational firm that manufacturers hardware components for companies like Dell Sony and Toshiba Glasco has seen steady growth for the past 3 years and cites its decision to start manufacturing firms in developing nations as the primary reason for its steady growth even during recession 40 Which of the following statements if true would support the argument that Glasco implements a global business strategy A Glasco39s top managers have a global view and look for the best approaches and people regardless of origin B Glasco39s top managers have the view that employees in the host country know the best work approaches and practices for running their business C Glasco39s top managers believe that the best work approaches and practices are those of the home country D Glasco39s top managers view every foreign operation as different and hard to understand E Glasco39s top managers believe that decentralization is the ideal approach in todays dynamic environment 41 Which of the following statements if true would imply that Glasco implements a multidomestic business strategy A Glasco39s top managers have a global view and look for the best approaches and people regardless of origin B Glasco39s top managers believe that people in foreign countries don39t have the needed skills expertise knowledge or experience to make the best business decisions C Glasco39s top managers ignore others39 values and customs and rigidly apply an attitude of quotours is better than theirsquotto foreign cultures D Glasco39s top managers believe that the best work approaches and practices are those of the home country E Glasco39s top managers have the view that employees in the host country know the best work approaches and practices for running their business 42 Which of the following statements if true would support the argument that Glasco pursues a transnational business strategy A Glasco39s top managers believe that the best work approaches and practices are those of the home country B Glasco39s top managers have a global view and look for the best approaches and people regardless of origin C Glasco39s top managers are facing a problem that has arisen because of the lack of communication between its two subsidiaries D Glasco39s top managers believe that people in foreign countries don39t have the needed skills expertise knowledge or experience to make the best business decisions E Glasco39s top managers ignore others39 values and customs and rigidly apply an attitude of quotours is better than theirsquotto foreign cultures 43 The business strategy allows companies to leverage the exibility offered by a decentralized organization while at the same time reaping economies of scale enjoyed by centralization A international B global C multidomestic D transnational E homereplication 44 Which of the following actions distinguish firms pursuing a transnational business strategy A responding to local challenges and opportunities quickly B exerting strong control over its subsidiaries C striking a balance between centralization and decentralization D responding to global challenges and opportunities quickly E standardizing product offerings to achieve economies of scale 45 Mystic a Texasbased fashion apparel company with subsidiaries in more that 25 countries across the world is one of the most recognized brands in the global and domestic markets In a recent interview with The New York Times the CEO and the spearhead of Mystic Co Burt Swager said quotThe secret of the company39s success is its ability to strike the right balance between centralization and decentralizationquot Mystic Co is a firm that successfully pursues an business strategy A global B transnational C homereplication D multidomestic E international 46 According to the number of transistors that could be squeezed onto a silicon chip would double every 18 months A Metcalfe39s law B Megan39s law C Murphy39s law D Moore39s law E Ashby39s law 47 To deploy innovative information systems well people in the organization must be willing to do whatever they can to bypass and eliminate internal bureaucracy set aside political squabbles and pull together for the common good These requirements can be categorized as requirements A process B customer C resource D quality E risk tolerance 48 Which of the following actions would fulfill the process requirements for the deployment of an innovative information system A hiring the necessary human capital B finding system partners C concentrating on economies of scale D eliminating internal bureaucracy E discouraging decentralization 49 Organizations deploying innovative information systems must have the human capital necessary to deploy the new systems These requirements can be categorized as requirements A resource B process C risk tolerance D customer E quality 50 Which of the following actions would fulfill the resource requirements for the deployment of an innovative information system A discouraging decentralization B evaluating the risk tolerance of employees C concentrating on economies of scale D eliminating internal bureaucracy E finding system partners 51 are new technologies products or services that eventually surpass the existing dominant technology or product in a market A Constructive innovations B Destructive innovations C Disruptive innovations D Facultative innovations E Extensive innovations 52 Which of the following statements is true about disruptive innovations A They have a very short life span and are discarded quickly B They surpass the existing dominant technology or product in a market C They are innovations used to incapacitate a rival firm D They lack the ability to destroy an organization or industry E They are innovations created or used with the intention of harming the human race 53 The innovator39s dilemma refers to how disruptive innovations A force rival firms to copy the innovations often leading to intellectual property violations B cause the failure of the firm that created it C encourage firms to make heavy investments that result in losses when these innovations fail D cause established firms or industries to lose market dominance when ignored E lead to loss of government control in these industries 54 According to the disruptive growth engine executive leadership will allow a firm to A effectively identify and evaluate potential disruptive innovations B gain credibility and to bridge sustaining and disruptive product development C gain the greatest opportunities D build a competent team of expert innovators E educate those closest to customers and competitors in order to identify opportunities 55 According to the disruptive growth engine firms need to build a team of expert innovators to A effectively identify and evaluate potential disruptive innovations B gain credibility and to bridge sustaining and disruptive product development C gain the greatest opportunities D educate those closest to customers and competitors in order to identify opportunities E build a competent team of expert innovators 56 Which of the statements explains the difference between quotecommercequot and quotebusinessquot A Ecommerce is the use of nearly any information technologies or systems to support commerce ebusiness is the use of the Internet and related technologies to support every part of the business B Ecommerce is the use of nearly any information technologies or systems to support commerce ebusiness is the use of nearly any information technologies or systems to support every part of the business C Ecommerce is the use of nearly any information technologies or systems to support commerce ebusiness is the use of ecommerce to support every part of the business D Ecommerce is the use of the Internet and related technologies to support commerce e business is the use of nearly any information technologies or systems to support ecommerce E Ecommerce is the use of the Internet and related technologies to support commerce e business is the use of nearly any information technologies or systems to support every part of the business 57 Which of the following statements is true about the ebusiness innovation cycle A The vertical dimension of the cycle shows the life expectancy of a particular information technology and the horizontal dimension shows time B The vertical dimension of the cycle shows the extent to which an organization derives value from a particular information technology and the horizontal dimension shows time C The vertical dimension of the cycle shows the expected investments required for a particular information technology and the horizontal dimension shows time D The vertical dimension of the cycle shows the efficiency of a particular information technology and the horizontal dimension shows time E The vertical dimension of the cycle shows the userfriendliness of a particular technology and the horizontal dimension shows the amount of investment in that technology 58 In an ebusiness innovation cycle after an organization scans the environment for new emerging and enabling technologies the next step is to A create jobs groups and processes that are all devoted to scanning the environment B select the database and data storage advances C address the current opportunity to grab customers and market share D match the most promising new technologies with current economic opportunities E assess the value of the use of technology for customers and internal clients 59 In an ebusiness innovation cycle after a firm executes business innovation for growth the next step is to A assess the value of the use of technology for customers and internal clients B create jobs groups and processes that are all devoted to scanning the environment C select the database and data storage advances D match the most promising new technologies with current economic opportunities E address the current opportunity to grab customers and market share 60 Freeconomics is the leveraging of digital technologies to A provide high quality products and services at low prices as a business strategy for gaining a competitive advantage B allow free product information to customers as a business strategy for gaining a competitive advantage C allow dissatisfied customers easy access to business premises and top management of the firm D match customer preferences with product features E provide free goods and services to customers as a business strategy for gaining a competitive advantage 61 According to basic economics within a competitive marketplace the price of a product is set by its A opportunity cost B sunk cost C marginal cost D transaction cost E fixed cost 62 Which of the following defines marginal cost A It is the cost of an alternative that must be forgone in order to pursue a certain action B It is the cost of producing an additional unit of output C It is the cost that is not dependent on the level of goods or services produced by the business D It is the cost that has already been incurred and cannot be recovered E It is the cost incurred in making an economic exchange 63 Which of the following actions of a firm suggests that it is using the freemium approach to applying freeconomics A providing free services to customers and getting paid for it by third parties B reducing the sale price of one item in order to sell something else of value C distributing products to customers without an appreciable cost to anyone D offering basic services for free but charging a premium for special features E allowing people to participate and collaborate to create something of value 64 Musicmatch Jukebox is an allinone music management tool that was first marketed in 1999 Most users can use the BasicFree version but a 1999 upgrade provides extra features such as supertagging and faster ripping and burning Which of the following explains this approach to applying freeconomics A advertising approach B freemium approach C zero marginal cost approach D cross subsidies approach E gift economy approach 65 Tele39Wire a mobile manufacturer offers free connections to customers who buy its mobile phones This cost of connection is actually included in the price of the mobile phone Tele39Wire is pursuing an approach to applying freeconomics A cross subsidies B gift economy C zero marginal cost D advertising E freemium 66 Web sites like eztracks and beemp3 pursue an approach to applying freeconomics when they offer free music downloads for users because reproduction and distribution of these products come at no cost A gift economy B zero marginal cost C advertising D cross subsidies E freemium 67 Wikipedia is a free webbased collaborative multilingual encyclopedia project supported by the nonprofit Wikimedia Foundation Its 17 million articles have been written collaboratively by volunteers around the world and almost all of its articles can be edited by anyone with access to the site This allows people to participate and create something of value for everyone Wikipedia is pursuing an approach to applying freeconomics A gift economy B zero marginal cost C advertising D cross subsidies E freemium Chapter 3 Managing the Information Systems Infrastructure and Services 1 are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer a biometric fingerprint reader to authenticate a person entering a secure laboratory or RFID scanners to track valuable inventory in a warehouse A Processing technologies B Storage technologies C Input technologies D Computational technologies E Output technologies 2 Which of the following statements is true about processing technologies A They are used to enter information into a computer B They deliver information in a usable format C They define the procedures that different computers follow when they transmit and receive data D They transform inputs into outputs E They move data storage away from a centralized location to thequotedgesquot of a network 3 deliver information to you in a usable format A Output technologies B Computational technologies C Storage technologies D Input technologies E Processing technologies 4 An is also referred to as the computer39s brain A randomaccess memory B operating system C readonly memory D application software E microprocessor 5 The is responsible for performing all the operations of the computer A randomaccess memory B central processing unit C readonly memory D application software E operating system 6 Any input your computer receives is digitized and then is processed by the CPU Which of the following explains the meaning of the word quotdigitizedquot in the preceding sentence A stored in randomaccess memory B encrypted in the operating system C stored in a hard drive D translated into binary code E converted into application software 7 The primary storage is also known as A volatile memory B permanent memory C nonvolatile memory D protocols E longterm memory 8 Which of the following statements is true about secondary storage A The instructions and work stored in secondary storage are lost when the computer is shut off B It retains the data when the power to the computer is shut off C It is a temporary storage place for data that is currently being processed D It is considerably faster than primary storage E The work stored in secondary storage is lost when new data is placed 9 The CPU interacts with for permanently storing data A primary storage B volatile memory C randomaccess memory D output technologies E secondary storage 10 is the collection of programs that control the basic operations of computer hardware A Application software B Transitory software C Systems software D Open source software E Peripheral software 11 The operating system of a computer is an example of an software A systems B open source C transitory D peripheral E application 12 Operating systems are often written in a very low level computer programming language that allows the computer to operate quickly and efficiently A structured query language B hyper text markup language C assembly language D extensible markup language E practical extraction and report language 13 Which of the following tasks is performed by the systems software A writing a business letter B managing a stock portfolio C coordination of suppliers product or service production and distribution D printing documents E manipulating a series of forecasts 14 Which of the following tasks is performed by the application software A printing documents B writing a business letter C presenting information via a monitor D updating the system clock E saving data to a disk 15 The customer relationship management system and personal productivity software are examples of A application software B peripheral software C systems software D transitory software E open source software 16 Which of the following statements is true about open source software A These programs are used by a few professional users B These programs do not include systems software C They are backup software used when a system is converting from systems to application software D These programs do not include application software E These programs39 source code is freely available for use andor modification 17 A is the most expensive and most powerful kind of computer which is used primarily to assist in solving massive scientific problems A supercomputer B workstation C mainframe D server E microcomputer 18 A is used primarily as the main central computing system for major corporations A microcomputer B supercomputer C server D mainframe E workstation 19 A is any computer on a network that makes access to files printing communications and other services available to users of the network A workstation B server C microcomputer D supercomputer E mainframe 20 Designed for medical engineering or animation and graphics design uses are optimized for visualization and rendering of threedimensional models A mainframes B supercomputers C workstations D servers E microcomputers 21 A is used for personal computing and small business computing A workstation B microcomputer C mainframe D server E supercomputer 22 Which of the following statements is true about servers A They are used to provide services to users within large organizations or to Web users B They are primarily used as the main central computing system for major corporations C They are used primarily to assist in solving massive scientific problems D They are optimized for visualization and rendering of threedimensional models E They are used for personal computing and small business computing 23 define the procedures that different computers follow when they transmit and receive data A Consoles B Ports C Protocols D Hosts E Domains 24 is the transmission capacity of a computer or communications channel A Latency B Throughput C Bandwidth D Jitter E Codec 25 Bandwidth is measured in A moles per second B joules per second C parts per million D bits per second E relays per second 26 A is any computer on the network or any software application that uses only the services provided by the server A peer B client C host D console E port 27 A is any computer that requests and provides services A console B client C peer D host E port 28 In networks servers and clients have defined roles A servercentric B peertopeer C peercentric D clientcentric E servertopeer 29 networks enable any computer or device on the network to provide and request services All members of the network have equivalent capabilities and responsibilities A Servercentric B Servertopeer C Clienttopeer D Peertopeer E Clientcentric 30 The Internet relies on technology to deliver data and information across networks A circuitswitching B framerelay C packetswitching D packetsniffing E storeandforward 31 is based on the concept of turn taking and enables millions of users to send large and small chunks of data across the Internet concurrently A Packet switching B Storeandforward C Framerelay D Circuitswitching E Packetsniffing 32 Which of the following is mandatory for packet switching to work A Each packet being sent across a network must go through a supercomputer B Each packet being sent across a network must be labeled with a header C Each packet being sent across a network must be thoroughly scanned D Each packet being sent across a network must be broken down into subpackets E Each packet being sent across a network must pass through a mainframe computer 33 Which of the following statements is true about packetswitching systems A For this system to work each packet being sent across a network must be verified B In this system each computer attached to a network has the same network address C Packet switching is used when only one computer needs to use the network D These systems adapt instantly to changes in network traffic E Wide Area Networks and the Internet do not use these technologies 34 Which of the following occurs if only one computer needs to use the network in a packet switching system A Data is sent continuously B The system waits for another computer to send data C Data is verified by the central server D Data blocks the network traffic and slows the system E Data is sent through the packetswitching technology 35 Internet protocol or the protocol used by the Internet is called the A Transmission Control Protocol TCP B Dynamic Host Configuration Protocol DHCP C Address Resolution Protocol ARP D Trivial File Transfer Protocol TFTP E TOC protocol 36 A is a device used to connect two or more individual networks A port B console C router D jitter E codec 37 Datagram routing and delivery are possible because every computer and router connected to the Internet is assigned an A IP packet B IP console C IP router D IP address E IP port 38 Prior to the invention of the Web content posted on the Internet could be accessed through the Internet tool Gopher The Web took Gopher one step further by introducing A animation B hypertext C simulation D file sharing E instant chat 39 The standard method of specifying the format of Web pages is called A Structured Query Language SQL B Practical Extraction and Report Language PERL C Extensible Markup Language XML D Assembly Language AL E Hypertext Markup Language HTML 40 Web servers process user requests for pages using the A Hypertext Transfer Protocol B TOC protocol C Address Resolution Protocol D Dynamic Host Configuration Protocol E Trivial File Transfer Protocol 41 Which of the following statements is true about the Information Infrastructure Act A It allowed the use of the Web by education institutions such as universities B It allotted certain governmental agencies with the power to pickandscan any document on the Web for security reasons C It opened the Web for commercial purposes D It permitted the controlled use of pornography over the Internet E It allowed the use of peertopeer networks on the Web 42 Which of the following is true about the graphical Web browser Mosaic A It provided users with references or links to other documents B It initiated file sharing on the Web C It is the basis of popular browsers such as Internet Explorer and Mozilla Firefox D It made the tracking of IP addresses possible E It allowed users to open and use more than one Web page simultaneously 43 Which of the following statements is true about a uniform resource locator A It is used to locate specific information in a Web page B It is used to identify and locate a particular Web page C It is a protocol that helps Web servers store Web pages D It is a standard method for specifying the format of Web pages E It is a software application used to display the features of a Web page 44 The suffix quotorgquot is reserved for A governmental entities B commercial organizations C network organizations D educational institutions E nonprofit organizations 45 Which of the following is likely to have the suffix quotcomquot after the domain name in its URL A UNICEF B the Federal Reserve C Microsoft D the World Wide Fund for Nature E Massachusetts Institute of Technology 46 Which of the following is likely to have the suffix quotorgquot after the domain name in its URL A the Red Cross Society B Starbucks C the Federal Bureau of Investigation D McDonalds E Harvard Business School 47 Which of the following is likely to have the suffix quoteduquot after the domain name in its URL A Yahoo B UNICEF C the Federal Reserve D Harvard Business School E America Online 48 In a URL the is the particular Web server or group of Web servers if it is a larger Web site that will respond to the Web request A domain name B host name C client name D toplevel domain name E port name 49 Which of the following is the host name in the URL quot1absgooglecoinjack carverquot A labs B google C co D in E jack carver 50 Which of the following statements is true about an IP address A The format of an IP address is a 64bit numeric address B It is written as eight numbers separated by periods C Each number separated by periods can have any number between 0 to 999 D It can be used to navigate to particular Web addresses E It is written as one number with a period at the end of the number 51 The prediction that the number of transistors on a chip would double about every two years is known as A Megan39s law B Ashby39s law C Murphy39s law D Metcalfe39s law E Moore39s law 52 The first CPU had 2200 transistors whereas the newest models have broken the 2billion transistor mark Take for example the Intel Core i7 Extreme CPU which can complete hundreds of millions of operations every second Which of the following is the most similar to this scenario A Advanced quotcloudquot applications can be used for grid computing edge computing and IP convergence B Apple has seen its sales volumes skyrocket by being able to come up with products that leverage existing technology C New generation digital cameras have a higher number and size of pixels than older digital camera models D The value of social networking sites increases as the number of users and membership increase E The greater the number of contributors to an open source software the greater the quothidden costsquot of running it 53 Which of the following occurred in the l964l990s generation of computing A The mainframe era began B The personal computer era began and interpersonal computing began C The mainframe era ended and the personal computer era began D The interpersonal computing era ended and the Internetworking era began E The Internetworking era ended 54 Which of the following occurred in the 1990s2000 generation of computing A The mainframe era began B The personal computer era ended and interpersonal computing began C The mainframe era ended and the personal computer era began D The interpersonal computing era ended and the Internetworking era began E Internetworking era ended 55 Manufacturers of hardware and software often apply the concept of planned obsolescence meaning that A the companies have already decided when to launch their next product B the product is designed in such a way as to extend its life span C the product is designed to last only for a certain life span D the product is designed to avoid obsolescence E the companies do not enter markets which have the risk of product obsolescence 56 Data centers managed by a third party that rents out space to multiple organizational customers are known as A collocation facilities B multi bay stations C serial port facilities D data ease facilities E datahub stations 57 Under the model organizations quotrentquot resources such as processing data storage or networking from an external provider on an asneeded basis and pay only for the serVices used A cluster computing B grid computing C distributed computing D utility computing E parallel computing 58 Utility computing offers tremendous benefits in terms of for companies operating in the digital world A reliability B usability C portability D extensibility E scalability 59 The ability to adapt to increases or decreases in demand for processing or data storage is known as A extensibility B portability C reliability D scalability E usability 60 Using multiple machines located at different locations and each with its own applications can be configured to run on one single computer enabling the IT service providers to better utilize their resources A indemnification B gentrification C demutualization D ramification E Virtualization 61 Which of the following statements is true about the software as a service model A The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure applicationspecific settings B The customer has to manage the licenses for the operating systems being used C The customer can run his or her own applications that are typically designed using tools provided by the service provider D The customer is provided with the basic capabilities of processing storage and networking E The user has control over the applications but has limited or no control over the underlying infrastructure 62 Which of the following statements is true about the platform as a service model A The customer is provided with the basic capabilities of processing storage and networking B The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure applicationspecific settings C The customer can run his or her own applications that are typically designed using tools provided by the service provider D The customer uses an application provided via a cloud infrastructure E The customer has to manage the licenses for the operating systems being used 63 Which of the following statements is true about the infrastructure as a service model A The customer has to manage the licenses for the operating systems being used B The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure applicationspecific settings C The customer can run his or her own applications that are typically designed using tools provided by the service provider D The customer uses an application provided via a cloud infrastructure E The user has control over the applications but has limited or no control over the underlying infrastructure 64 Which of the following statements is true about a public cloud A It gives the organization a high degree of customizability over their data and applications B It can be used by any interested party on a payperuse basis C It is internal to an organization D It does not free an organization from the issues associated with managing the cloud infrastructure E It gives the organization a high degree of control over their data and applications 65 EasyQuery is a knowledge management company that is contemplating a partnership with Kasko a cloud service provider The management of EasyQuery is particularly concerned about Kasko39s viability and will start a partnership only when it is sure that Kasko meets this criteria Assume that viability is the only criteria that a cloud service provider needs to meet If EasyQuery enters into a partnership with Kasko it means that A Kasko can meet EasyQuery39s current and future business needs B Kasko has longterm sustainability C Kasko offers other services that EasyQuery would require in the future D Kasko will protect the privacy of customers E Kasko will provide sufficient bandwidth to access large amounts of data 66 is used to solve largescale computing problems A Trusted computing B Edge computing C IP convergence D Grid computing E Distributed computing 67 is used to increase Web application performance A Trusted computing B Distributed computing C Edge computing D IP convergence E Green computing 68 is used to transmit voice and video communication over the Internet A Edge computing B IP convergence C Distributed computing D Green computing E Trusted computing 69 ImmuneEarth a research and development company has a motto to quoteradicate all diseasesquot It has numerous departments that research the cure of various diseases One of its largest departments include the AIDS department where more than 500 scientists are researching the cure for AIDS ImmuneEarth has numerous computers that have been grouped into a cohesive system for this purpose Recently one of its computers was updated because it had low performance which had slowed the entire system Which of the following is ImmuneEarth using to research the cure for AIDS A grid computing B cloud computing C trusted computing D edge computing E IP convergence 70 Which of the following differentiates grid computing from cloud computing A Grid computing uses a large number of computers B Grid computing is a natural evolution of the widespread adoption of Virtualization and utility computing C Grid computing is applied to a single large problem D Grid computing involves overtheInternet provision of dynamically scalable and often virtualized resources E Grid computing is a model for enabling convenient ondemand network access to a shared pool of configurable computing resources 71 In grid computing the slowest computer creates a bottleneck and slows down the entire grid A can help overcome these problems A trusted grid B edged grid C clustered grid D dedicated grid E parallel grid 72 has allowed enterprises to make use of new forms of communication and collaboration as well as traditional forms of communication at much lower costs A Grid computing B Green computing C IP convergence D Edge computing E Trusted computing Technology Brie ng Foundations of Information Systems Infrastructure Hardware and Software 1 Which of the following input technologies has been historically used for entering text and numbers on computers A graphics tablet B QWERTY keyboard C optical mouse D scanner E joystick 2 Which of the following selecting and pointing devices is used to simulate the process of drawing or sketching on a sheet of paper A eyetracking device B joystick C optical mouse D graphics tablet E ergonomic keyboard 3 The is an innovative pointing device developed primarily for the disabled for help with computer pointing A eyetracking device B graphics tablet C optical mouse D joystick E touch screen 4 Which of the following pointing devices works by moving a small lever that sits in a holder A QWERTY keyboard B optical mouse C trackball D touch screen E joystick 5 Entering a large number of separate forms or documents into a computer system and manipulating this data at a single time is referred to as A cluster analysis B data mining C batch processing D sequential coupling E line coding 6 Which of the following types of specialized scanners is used to scan questionnaires and test answer forms where answer choices are indicated by filling in circles using pencils or pens A optical mark recognition B biometric scanner C bar code reader D magnetic ink character recognition E optical character recognition 7 is a scanning technology used to read and digitize typewritten computerprinted and even handwritten characters such as those on sales tags on department store merchandise patient information in hospitals or the address information on a piece of postal mail A Magnetic ink character recognition B Optical mark recognition C Biometric scanning D Optical character recognition E Batch processing 8 Which of the following scanning technologies is used by the banking industry to read data account numbers bank codes and check numbers on preprinted checks A optical mark recognition B bar code reading C magnetic ink character recognition D biometric scanning E optical character recognition 9 Which of the following specialized scanners is used to scan human body characteristics for identification and security purposes A biometric scanner B optical scanner C bar code scanner D smart card scanner E port scanner 10 Which of the following speech recognitionbased technologies is used for telephone surveys and to guide customers through the various menu options when calling a company39s customer service line A transcription B telemetrics C speaker diarization D interactive voice response E computeraided translation 11 Which of the following statements accurately describes the difference between digital and filmbased cameras A Highquality digital cameras are generally less expensive than filmbased cameras B The storage capacity of filmbased cameras depends on picture resolution while digital cameras offer consistent storage capacity C Digital cameras record still images or short video clips in digital form on small removable memory cards rather than on film D Filmbased cameras offer video recording facilities while digital cameras are specialized for still photography E Digital cameras must record images by using a scanner while filmbased cameras do not offer that functionality 12 are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit CPU of a computer A Binary codes B Morse codes C Protocols D Hexadecimal codes E Octal codes 13 Which of the following character encoding formats based on the English alphabet represents symbols in binary form A MIME B ASCII C UTF D UCS E MAC OS Roman 14 Which of the following encoding formats is the standard coding for email over the Internet A ACSII B UTF C MIME D UCS E MAC OS Roman 15 Which of the following encoding formats has become an industry standard that was designed to allow symbols from all languages including Arabic and Chinese A ASCII B MIME C MAC OS Roman D EBCDIC E UTF 16 Which of the following is considered as the heart of a computer39s system unit A motherboard B random access memory RAM C hard drive D central processing unit CPU E readonly memory ROM 17 The electronic circuit that generates pulses at a rapid rate to set the pace for processing events to take place within a computer is known as the A peripheral port B motherboard C system clock D universal serial bus E system board 18 In microcomputers the processor39s clock speed is measured in A hertz B milliseconds C angstrom D amperes E nanoseconds 19 A is a small block of memory used by processors to store those instructions most recently or most often used A random access memory B BIOS C cache D readonly memory E ash memory 20 is used to store programs and instructions that are automatically loaded when the computer is turned on A Random access memory B Cache memory C Readonly memory D Flash memory E Virtual memory 21 Which of the following is an example of secondary storage A cache memory B readonly memory C hard disk drives D random access memory E virtual memory 22 is a technology in which extra copies of data are stored on two or more hard drives to ensure that critical data is not lost A J BOD B RAID C SLED D BIOS E SPAN 23 An occurs if a readwrite head for some reason touches one of the disks in a hard drive leading to a loss of data A head crash B click of death C bad sector D disk compression E base isolation 24 Which of the following is a secondary storage technology that uses microchips to store information A cache memory B virtual memory C redundant array of independent disks D solid state drive E readonly memory 25 Which of the following is a valid observation regarding the difference between solid state drives and hard diskbased drives A Hard disk drives are typically faster than solid state drives B Solid state drives have no moving parts while hard disk drives have both electronic and mechanical parts C Solid state drives are louder and less reliable than hard disk drives D Hard disk drives are more expensive than solid state drives E Hard disk drives use microchips to store data while solid state drives use magnetic disks 26 Data stored on disks is easier and faster to locate than data on magnetic tapes because A the data on disks is stored in binary form B disks have larger and more efficient storage capacities C disks have both mechanical and electronic parts D magnetic tapes store data in tiny magnetic spots E computers do not have to scan an entire tape to find a specific data file 27 An provides a hardware interface such as plugs and sockets for connecting to computers A input device B Universal Serial Bus C removable storage device D motherboard E port 28 Which of the following types of ports is used to transfer one bit at a time and hence has the slowest data transfer rates A USB port B parallel port C IEEE 1394 port D serial port E ethernet port 29 Which of the following types of ports used to connect networks is the most common standard for local area networks A ethernet port B VGA port C serial port D parallel port E USB port 30 Which of the following types of ports is used to connect printers to computers A serial ports B HDMI ports C parallel ports D ethernet ports E VGA ports 31 Which of the following types of ports is used to connect digital disks and camcorders to computers A IEEE 1394 port B Ethernet C DVI port D VGA port E HDMI port 32 Which of the following is a multiuser multitasking operating system that is available for a wide variety of computer platforms and is commonly used because of its superior security A Android B iOS C Windows D Unix E 08390 33 Which of the following operating systems was the first commercial graphicalbased operating system which made its debut in 1984 A Mac OS B Linux C Windows D Unix E 08390 34 Google39s Linuxbased operating system for mobile devices is known as A iOS B Symbian C Java D Bada E Android 35 Which of the following is an operating system designed for mobile devices jointly developed by Nokia Ericsson and Psion A Linux B iOS C Symbian OS D Android E Mac OS 36 Which of the following types of computer software utilities is used to archive files from hard disks to tapes ash drives or other storage devices A data compression B file defragmentation C disk and data recovery D backup E device drivers 37 Which of the following types of computer software utilities allows more data to be stored on a disk by substituting short code for frequently repeated patterns of data allowing more data to be stored on a disk A file defragmentation B data compression C device drivers D file conversion E disk and data recovery 38 Which of the following types of computer software utilities monitors users39 incoming email messages and filters unwanted messages from arriving A spam blockers B antivirus C spyware detection and removal D disk and data recovery E data compression 39 Which of the following types of computer software utilities transfers a file from one format to another so that it can be used by an application other than the one used to create it A file conversion B data compression C backup D file defragmentation E device drivers 40 Which of the following is an example of a word processing software A Microsoft Outlook B Opera Presto C Apple Keynote D Lotus Notes E OpenOffice Writer 41 Which of the following is an example of presentation software A Mozilla Thunderbird B Microsoft Excel C Lotus Notes D Apple Ke not E ACT y e 42 Microsoft Access is an example of A word processing software B database management software C presentation software D calendar and contact management software E Web browsers 43 An is a type of program that translates a program39s source code into machine language and executes one statement at a time A compiler B disassembler C interpreter D executable E linker 44 Which of the following statements accurately re ects a difference between compilers and interpreters A Interpreters translate assembly language to machine language while compilers translate machine language to assembly language B Compilers convert a program39s entire source code into an executable while interpreters translate source code one statement at a time C Compiled programs run much slower than interpreted programs D Compiling programs is a slower process compared to their execution while with interpreters the translation and execution happens concurrently E Compared to interpreters it is easier to quickly evaluate the effects of any changes made to a program39s source code when using a compiler 45 Which of the following is the most widely used language for developing Web pages A CC B Java C LISP D HTML E NET 46 LISP is a programming language that finds application in A business B scientific research C artificial intelligence D teaching structured programming E developing Web pages 47 languages use common modules which combine properties and behaviors to define the relevant system components A Objectoriented B Markup C Structured query D Metaprogramming E Synchronous 48 Which of the following objectoriented programming concepts uses modules that allow programmers to group properties and behaVior together A encapsulation B inheritance C class D polymorphism E abstraction 49 Which of the following objectoriented programming concepts is re ected by a word processor that reacts to a user39s typing and clicking A inheritance B eventdriven program execution C encapsulation D class E delegation 50 Which of the following programming languages allows programmers to easily add a command button to a screen with a few clicks of a mouse instead of programming the button pixel by pixel and using many lines of code A objectoriented languages B Web development languages C Visual programming languages D scripting languages E prototypebased programming languages 51 Which of the following is an example of a Visual programming language A VBNET B Java C HTML D MicrosoftNET E XML 52 Which of the following is an example of an HTML editor A Microsoft Expression Web B Adobe Acrobat Reader C Apple Keynote D OpenOffice Base E Harvard Graphics 53 Which of the following HTML tags sets off the visible portion of the HTML document A lthtmlgt lthtmlgt B ltheadgt ltheadgt C ltbodygt ltbodygt D lttablegt lttablegt E ltlinlltgt ltlinlltgt 54 Which of the following HTML tags is used to create a hyperlink A lthtmlgt lthtmlgt B ltheadgt ltheadgt C ltbodygt ltbodygt D ltobjectgt ltobjectgt E lta hrefquotURLquotgt ltagt 55 What is the function of markup languages such as HTML A adding dynamic content to Web pages B developing applications in highspeed arcade graphics C checking the accuracy of userentered information on Web pages D supplying interactive components to Web pages E laying out or formatting Web pages 56 a programming language developed by Sun Microsystems in the early 1990s is used to add dynamic content to Web pages A HTML B Visual Basic C Java D XML E PHP 57 is a programming platform that is used to develop applications that are highly interoperable across a variety of platforms and devices A Adobe Dreamweaver B Microsoft Expression Web C HTML D PHP E MicrosoftNET 58 Which of the following is used by Web services to support the interoperability between machines A XML B PHP C HTML D MySQL E Adobe Flash 59 Which of the following purposes was XML designed to serve A adding dynamic content to Web pages B building database queries C developing applications in highspeed arcade graphics D checking the accuracy of userentered information on Web pages E supplying interactive components to Web pages 60 Which of the following functions do scripting languages perform A creating animation and video that can be compressed small enough for fast download speeds B developing applications in highspeed arcade graphics C checking the accuracy of userentered information on Web pages D automating or supporting activities throughout the information systems development process E laying out or formatting Web pages 61 Which of the following statements re ects the difference between Java and J avaScript most accurately A Java can be used across multiple platforms and operating systems while J avaScript cannot be used similarly B J avaScript is used to check accuracy of userentered information which Java does not support C Java is used to supply interactive components to Web pages while J avaScript is not D J avaScript can be used as a useful component tool for creating Web pages while Java is not used to create Web pages E Java allows users to create or add applets that lend dynamic content to Web pages while J avaScript does not 62 Which of the following software tools allows developers to create animation and video that can be compressed small enough for fast download speeds A Adobe Flash B MySQL C PHP D HTML E XML 63 Which of the following computeraided software engineering CASE tools enable system process data and control structures to be represented diagrammatically A repositories B code generators C diagramming tools D screen and report generators E analysis tools 64 Which of the following matches the description of screen and report generators A tools that enable system process data and control structures to be represented graphically B tools that automatically check for incomplete inconsistent or incorrect specifications in diagrams screens and reports C tools that help produce both technical and user documentation in standard formats D tools that make it easier for the systems analyst to identify data requirements and relationships and also help model how systems look and feel to users E tools that enable the automatic generation of program and database definition code directly from the design documents diagrams screens and reports 65 are CASE tools that enable the integrated storage of specifications diagrams reports and project management information A Repositories B Analysis tools C Code generators D Diagramming tools E Documentation generators 66 Which of the following is an example of an open source Web server software that provides access to Web sites A Ubuntu Linux B GRASS GIS C Mozilla Firefox D MySQL E Apache 67 MySQL is an A proprietary application development suite B open source software for accessing and maintaining data in a database C proprietary software that operates the hardware on mainframe computers D open source software used to provide users access to Web sites E automated software tool suite used by systems developers to design and implement information systems Information Systems Today 5e ValacichSchneider Chapter 4 Enabling Commerce Using the Internet 1 Electronic commerce is used to conduct business with business partners such as suppliers and intermediaries This form of EC is commonly referred to as electronic commerce A businesstoconsumer B peertopeer C businesstobusiness D consumertoconsumer E businesstoemployee 2 Which of the following statements is true about electronic commerce A Businesstobusiness is by far the largest form of electronic commerce in terms of revenues B It is limited to transactions between businesses and consumers C Electronic commerce between businesses and their employees is not possible D All forms of electronic commerce involve business firms E Consumertoconsumer electronic commerce is a complete reversal of the traditional businesstoconsumer electronic commerce 3 Which of the following is an example of businesstoconsumer electronic commerce A Brenda files her income tax online B A manufacturer conducts business over the Web with its retailers C Juan buys Kevin39s guitar on eB aycom D Reuben buys a shoe on Yebhicom E Sandra an employee uses the Web to make a change her health benefits 4 Which of the following is an example of consumertoconsumer electronic commerce A Niobi makes an online deposit of 5000 into her friend Carla39s account because she needs financial help B Heath buys a gift for Vannessa from Amazoncom C Blanco a manufacturer conducts business over the Web with its retailers D Ted files his income tax online E Marty buys Lobsang39s mountaineering equipment from eBaycom 5 Ben buys an Olympus EPL2 from Sony which starts malfunctioning When he opts for an exchange the customer representative says that an exchange or repair is not possible because the damage was of a physical nature and not covered under warranty Which of the following consequences if true would be an example of consumertoconsumer electronic commerce A Ben sells the Olympus EPL2 to Balvinder Singh in India through eB aycom B Ben files an online suit against Sony C Ben files a complaint on Sony39s Web site asking for an escalation D Ben buys a Canon G 12 E Ben sells the Olympus EPL2 to the world39s largest used camera dealer KEHcom 6 Which of the following is a result of global information dissemination A Firms link Web sites to corporate databases to provide realtime access to personalized information B Firms tailor their products and services to meet a customer39s particular needs on a large scale C Firms market their products and services over vast distances D Firms provide immediate communication and feedback to and from customers E Firms provide ways for clients and firms to conduct business online without human assistance 7 Which of the following actions explains mass customization A Firms tailor their products and services to meet a customer39s particular needs on a large scale B Firms provide immediate communication and feedback to and from customers C Firms provide ways for clients and firms to conduct business online without human assistance D Firms market their products and services over vast distances E Firms link Web sites to corporate databases to provide realtime access to personalized information 8 Which of the following is an advantage of using interactive communication via the Web A reduced transaction costs B increased customer loyalty C enhanced operational efficiency D reduced brand dilution E decreased cannibalization 9 The phenomenon of cutting out the quotmiddlemanquot and reaching customers more directly and efficiently is known as A gentrification B demutualization C reintermediation D mutualization E disintermediation 10 Which of the following is an example disintermediation A Land Rover markets most of its fourwheel drives in high altitude regions where vehicles require more power B Dunkin39 Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals which consists of items like Dunkin39 Dawgs hot dogs wrapped in dough C Gatorade Thirst Quencher is a market leader in sports drinks It is now planning to market its drinks to working women in urban areas D OakTeak a furniture manufacturing firm started selling directly to its customers after it experienced a dip in sales due to channel con icts between retailers E A luxury car company creates a hybrid line of automobiles for consumers who are concerned about the environment 11 refers to the design of business models that reintroduce middlemen in order to reduce the challenges brought on by dealing directly with customers A Reintermediation B Demutualization C Gentrification D Disintermediation E Mutualization 12 Which of the following is an example of reintermediation A The black Centurian card is issued by inVitation only to customers who spend more than 250000 a year on other American Express cards B PampG acquires the list of parentstobe and showers them with samples of Pampers and other baby products to capture a share of their future purchases C Kambo a fashion apparel company that deals directly with customers to sell its products added retailers to its supply chain to cater to its target audience in remote geographic locations D OakTeak a furniture manufacturing firm started selling directly to its customers after it experienced a dip in sales due to channel con icts between retailers E Dunkin39 Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals which consists of items like Dunkin39 Dawgs hot dogs wrapped in dough 13 Companies following a business strategy choose to operate solely in the traditional physical markets A clickonly B clickandmortar C brickandclick D clickandbrick E brickandmortar 14 Which of the following statements is true about firms pursuing a brickandmortar business strategy A These firms do not have physical store locations B These firms do not indulge in electronic commerce C These firms focus purely on electronic commerce to conduct business D These firms conduct business electronically in cyberspace E These firms operate in both physical and Virtual arenas Answer B 15 Which of the following statements is true about companies pursuing a clickonly business strategy A These companies approach business actiVities in a traditional manner by operating physical locations B These companies operate in both physical and Virtual arenas C These companies do not indulge in electronic commerce to conduct their businesses D These companies do not have physical store locations E These companies choose to operate solely in the traditional physical markets 16 Which of the following statements is true about firms pursuing a clickandmortar business strategy A These firms focus purely on electronic commerce to conduct businesses B These firms operate in both physical and virtual arenas C These firms do not indulge in electronic commerce D These firms only conduct business electronically in cyberspace E These firms do not have physical store locations 17 Which of the following firms would most likely pursue the brickandmortar strategy A KEHcom is a used camera dealer that buys and sells cameras across the globe B Castro39s is a watch manufacturing firm known for its effective mass customization C Smartan is a brokerage firm that allows its customers to personalize their portfolios D BestBaker is a local bakery store in Bantam Connecticut and caters exclusively to its residents E Nebo a computer manufacturer has pursued disintermediation and sells directly to customers 18 Which of the following statements is true about firms pursuing a clickandmortar business strategy A These firms learn how to fully maximize commercial opportunities in both domains B These firms can often compete more effectively on price C These firms tend to be highly adept with technology and can innovate very rapidly as new technologies become available D Customers of these firms find it difficult to return a product in case of damages E These firms can reduce prices to rockbottom levels although a relatively small firm may not sell enough products 19 EZBiz the brainchild of three college friends is a startup venture which plans to produce and market sports gear They are currently trying to decide between a brickandclick strategy and a clickonly strategy Which of the following if true would most undermine the decision to adopt a clickonly strategy A The company has limited access to funds and is looking to keep its costs low B The public is wary of sharing confidential information after a recent spate of credit card scandals C A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain D Several companies who have switched from brickandmortar strategy to a clickonly are experiencing severe channel con icts E Some clickonly companies have been unable to achieve economies of scale and subsequently are unable to offer lower prices 20 EZBiz the brainchild of three college friends is a startup venture which plans to produce sports gear They are currently trying to decide between a brickandclick strategy and a click only strategy Which of the following if true would most support the decision to adopt a click only strategy A Ecommerce places firms on a global platform in direct competition with the best in the business B Retailers have a preference for established brands that can pay good margins C Research suggests that some customers prefer online shopping because of the convenience it offers D Product trials and demonstrations are an essential part of the consumer buying process E Cyber laws are yet to reach the level of sophistication required to facilitate safe online transactions 21 Which of the following statements is true about the revenue model A It emphasizes the utility that the productservice has to offer to customers B It analyzes the existing players in the market and the nature of the competition C It describes the promotion plan of the productservice D It describes how the firm will produce a superior return on invested capital E It analyzes the background and experience of the company leadership 22 Which of the following questions should a manager consider while analyzing the quotvalue propositionquot component of the business model A How much are you selling the product for B How fierce is the competition C How do you plan to let your potential customers know about your productservice D Can the leaders of the organization get the job done E Why do customers need your productservice 23 While preparing a business model a manager considers the question quotHow do you plan to let your potential customers know about your productservicequot Which of the following components of the businessing model is heshe considering A Revenue model B Management team C Marketing strategy D Value proposition E Competitive environment 24 Paying businesses that bring or refer customers to another business is known as A affiliate marketing B subscription marketing C viral marketing D stealth marketing E buzz marketing 25 A collection of companies and processes are involved in moving a product from the suppliers of raw materials to the suppliers of intermediate components to final production and ultimately to the customer these companies are collectively referred to as A customer management B product lifecycle C enterprise resource management D supply chain E market entry 26 Prior to the introduction of the Internet and Web the secure communication of proprietary information in businesstobusiness electronic commerce was facilitated using A enterprise resource planning B electronic data interchange C cloud computing D supply chain management E executive information system 27 Which of the following statements is true about the extranet A It restricts the company39s information from going quoton the Webquot B It can be accessed only by employees within an organization C It contains company related information which all the employees of an organization can access D It enables two or more firms to use the Internet to do business together E It requires large expenditures to train users on the technologies 28 Webbased technologies are cross platform meaning that disparate computing systems can communicate with each other provided that A the computing systems have been manufactured by the same company B the computing system manufacturing companies are business partners C they are located in the same country D standard Web protocols have been implemented E the computing system manufacturing companies allow it 29 Companies use to secure proprietary information stored within the corporate local area network andor wide area network so that the information can be viewed only by authorized users A firewalls B phishing C rootkits D bots E pharming 30 Organizations primarily use extranets to A conduct market research B manage their supply chains C identify their target market D control brand dilution E manage public relations 31 In the context of B2B supply chain management can be defined as access points through Which a business partner accesses secured proprietary information from an organization A bots B forums C portals D rootkits E hosts 32 can provide substantial productivity gains and cost savings by creating a single point of access Where the company can conduct business With any number of business partners A Rootkits B Pharming C Bots D Phishing E Portals 33 automate the business processes involved in selling products from a single supplier to multiple buyers A Supplier portals B Reference portals C Customer portals D Procurement portals E Sourcing portals 34 are designed to automate the business processes that occur before during and after sales have been transacted between a supplier and multiple customers A Sourcing portals B Reference portals C Supplier portals D Customer portals E Procurement portals 35 are set up as B2B Web sites that provide customtailored offers or specific deals based on sales volume A Sourcing portals B Customer portals C Procurement portals D Reference portals E Supplier portals 36 What is the difference between customer and supplier portals and businesstobusiness B2B marketplaces A Unlike customer and supplier portals B2B marketplaces cannot be classified as extranets B Unlike customer and supplier portals B2B marketplaces are secured by firewalls C Unlike customer and supplier portals B2B marketplaces only serve vertical markets D Unlike customer and supplier portals B2B marketplaces are associated with a particular buyer or supplier who deals with multiple business partners E Unlike customer and supplier portals B2B marketplaces allow many buyers and many sellers to come together 37 Markets comprised of firms operating within a certain industry sector are known as markets A vertical B parallel C horizontal D stipulated E focused 38 Which of the following statements is true about B2B and B2C payments A Most B2B payments are made through credit cards B Most B2C payments are made by checks C Most B2B payments are made through electronic payment services D Most B2B payments are made by cash E Most B2B payments are made by checks 39 Credit cards and electronic payment services are not used for large B2B transactions because of A the risks associated with these services B the complications arising out of these transactions C preset spending limits D the resulting decrease in working capital E the expenses associated with these services 40 Organizations implement intranets to support electronic commerce A businesstobusiness B businesstoconsumer C businesstogovernment D businesstoemployee E consumertobusiness 41 Intranets mostly affect the of an organization A suppliers B employees C customers D retailers E advertisers 2 is used to facilitate the secured transmission of proprietary information within an organization A Intranet B Transnet C Ethernet D Extranet E Telnet 43 Which of the following distinguishes an intranet from an extranet A An intranet looks and acts just like a publicly accessible Web site B An intranet uses the same hardware as a publicly accessible Web site C Users access their company39s intranet using their Web browser D An intranet uses the same networking technologies as a publicly accessible Web site E In its simplest form intranet communications do not travel across the Internet 44 are temporary work groups with a finite task and life cycle A Intensive forces B Cross functional teams C Task forces D Staff committees E Self directed work teams 45 The term refers to a class of software that enables people to work together more effectively A malware B groupware C freeware D webware E pestware 46 Which of the following is an asynchronous groupware tool A shared whiteboard B online chat C intranet D electronic meeting support system E video communication system 47 One of the benefits of groupware is its parallelism Which of the following statements best explains this sentence A It keeps the group on track and helps avoid costly diversions B It can easily incorporate external electronic data and files C It enables members to collaborate from different places at different times D It automatically records member ideas comments and votes E It enables many people to speak and listen at the same time 48 Which of the following is a synchronous groupware tool A email B intranet C group calendar D online chat E automation system 49 Which of the following provides customers with the ability to obtain personalized information by querying corporate databases and other information sources A efiling B eintegration C einformation D etransaction E etailing 50 The online sales of goods and services is known as A einformation B eintegration C etailing D ecollaboration E efiling 51 Which of the following occurs in a reverse pricing system A Customers specify the product they are looking for and how much they are willing to pay for it B Customers are provided with the product and its price C Customers are provided with a product and can decide how much they are willing to pay for it D Customers specify the product they are looking for and the company provides the product with a price E Customers cannot decide the product but they can decide the price of the products available 52 How do comparison shopping sites generate revenue A by charging a commission on transactions B by selling their products C by charging a virtual shelfspace fee to manufacturers D by increasing the clickcount on their site E by charging distribution fees to consumers 53 The concept of the Long Tail refers to a focus on A mainstream products B broad markets C generic brands D brand dilution E niche markets 54 Which of the following is a disadvantage of etailing A It is limited by physical store and shelf space restrictions B It requires additional time for products to be delivered C It complicates the process of comparison shopping D It restricts companies to effectively compete on price E It reduces a company39s inventory turnover time 55 Which of the following explains Web analytics A conducting online marketing research to improve product quality B analyzing Web sites in order to find the best one in its category C tracking all online purchasers to try and increase their frequency of visit to a particular Web site D analyzing Web surfers39 behavior in order to improve Web site performance E analyzing Web sites in order to find the best online business practices 56 Which of the following is a mechanism for consumertoconsumer transactions A etailing B eintegration C efiling D etendering E eauctions 57 is a form of eauction in which the highest bidder wins A Reverse auction B Bartering C Exchange D Forward auction E Request for quote 58 is a form of eauction where buyers post a request for quote A A reverse auction B Bartering C An exchange D A forward auction E A request for proposal 59 Which of the following forms of eauction typically takes place on a businesstobusiness level A reverse auctions B bartering C exchanges D forward auctions E request for quotes 60 Doug is a frequent visitor of online auction sites He uses two different accounts to place a low followed by a very high bid on the desired item This leads other bidders to drop out of the auction He then retracts the high bid and wins the item at the low bid This form of eauction fraud is known as A shill bidding B bid luring C payment fraud D nonshipment E bid skimming 61 Which of the following types of eauction fraud is associated with the sellers failure to ship an item after the payment has been received A bid luring B bid shielding C nonshipment D shipping fraud E payment failure 62 If a company39s Web site is listed in the sponsored list of a search engine the search engine receives revenue on a basis A payperclick B paypersale C clickthrough D payperconversion E clickpervisit 63 Under the pricing model the firm running the advertisement pays only when a Web surfer actually clicks on the advertisement A payperrefresh B paypersale C payperclick D payperconversion E clickpervisit 64 Clickthrough rate re ects A the ratio of surfers who visited the Web site divided by the number of surfers who clicked on the ad B the ratio of surfers who click on an ad divided by the number of times it was displayed C the percentage of visitors who actually perform the marketer39s desired action D the ratio of surfers who clicked on the ad divided by the number of people who made the purchase E the ratio of surfers who visited the Web site divided by the number of people who made a purchase 65 allows individual Web site owners to post companies39 ads on their pages A Bum marketing B Stealth marketing C Viral marketing D Buzz marketing E Affiliate marketing 66 In a a site hosting an advertisement creates fake clicks in order to get money from the advertiser A competitive click fraud B irate click fraud C network click fraud D shill click fraud E dedicated click fraud 67 MakeYourClick is an online ad agency that is known for its ability to create ads which lure customers to purchase Brenda an eXemployee of the firm was fired from the agency on baseless grounds An angry Brenda in ates MakeYourClick39s online advertising cost by repeatedly clicking on the advertiser39s link Brenda has committed A competitive click fraud B irate click fraud C network click fraud D shill click fraud E dedicated click fraud 68 is used in order to have small welldefined tasks performed by a scalable ad hoc workforce of everyday people A Nearshoring B Insourcing C Offshoring D Crowdsourcing E Homesourcing 69 is an example of mcommerce A eauctions B etailing C e911 D efiling E eintegrating 70 Which of the following is an argument against digital rights management A It encourages unauthorized duplication B It enables publishers to infringe on existing consumer rights C It discourages publishers to control their digital media D It inhibits online transactions in the industry E It restricts copyright holders to minimize sales losses 71 Efiling is an example of a tool A governmenttoCitizen B consumertoconsumer C governmenttogovernment D consumertobusiness E businesstobusiness Chapter 5 Enhancing Collaboration Using Web 20 1 Which of the following is a basic concept associated with Web 20 A shift in users39 preference from online sites to encyclopedias as sources of unbiased information B shift in users39 role from the passive consumer of content to its creator C shift in users39 interest from sharing information to finding information D shift in users39 lifestyle due to increased purchasing power E shift in users39 preference to environmentoriented products 2 Which of the following is a consequence of the use of social software A People are using encyclopedias as sources of unbiased information B People are using environmentallyfriendly products C People have increased purchasing power D People are sharing more personal information E People have become passive consumers of content 3 The use of within a company39s boundaries or between a company and its customers or stakeholders is referred to as Enterprise 20 A Web 10 techniques and intranet B extranet and intranet C Web 20 techniques and social software D extranet and Web 10 techniques E social software and extranet 4 Which of the following statements is true about Web 10 A It helps users share information B It helps users find information C Users rule these applications D Users receive and give recommendations to friends E It helps connect ideas and people 5 A major benefit of social software is the ability to harness the quotwisdom of crowdsquot which is also referred to as A collaborative filtering B preference elicitation C creative commons D consensus democracy E collective intelligence 6 The concept of is based on the notion that distributed groups of people with a divergent range of information and expertise will be able to outperform the capabilities of individual experts A cognitive dissonance B creative commons C collective intelligence D consensus democracy E preference elicitation 7 Which of the following statements is true about a discussion forum A It started out as a novice39s way of expressing themselves using very simple Web pages B It is the process of creating an online text diary made up of chronological entries that comment on everything C Rather than trying to produce physical books to sell or use as gifts users merely want to share stories about their lives or voice their opinions D It is dedicated to a specific topic and users can start new threads E It enables a person to voice hisher thoughts through short quotstatus updatesquot 8 Which of the following statements is true about blogs A They emulate traditional bulletin boards and allow for threaded discussions between participants B They allow individuals to express their thoughts in a onetomany fashion C They are dedicated to specific topics and users can start new threads D They are moderated so that new postings appear only after they have been vetted by a moderator E They enable people to voice their thoughts through short quotstatus updatesquot 9 Which of the following Web 20 applications has been classified as the quotamateurizationquot of journalism A blogs B discussion forums C social presence tools D instant messaging E online chats 10 Keith Norat the Chief Technology Officer of Kender Internationals relies on blogs while making decisions In his words quotBlogs are an important part of our purchase decisions In todays environment blogs provide diverse information that help us to make good decisionsquot Which of the following is an underlying assumption A Information in blogs is accurate B Some of the blogs are not written well C Blogs are company sponsored D Professional bloggers rely heavily on advertisements to sustain their operations E Blogs lead to the quotamateurizationquot of journalism 11 Which of the following explains the term quotblogospherequot A the movement against blogs B the amateurization of blogs C the revolution against microblogging D the community of all blogs E the movement against discussion forums 12 Social presence tools are also known as tools A social bookmarking B instant chatting C microblogging D videoconferencing E geotagging 13 Which of the following facilitates realtime written conversations A instant messaging B discussion forums C status updates D blogs E tagging 14 take the concept of realtime communication a step further by allowing people to communicate using avatars A Blogging B Microblogging C Instant messaging D Discussion forums E Virtual worlds 15 Which of the following statements is true about virtual worlds A It allows people to communicate using avatars B Small firms have not been successful in consumeroriented virtual worlds C It is designed for short quotstatus updatesquot D It is the process of creating an online text diary made up of chronological entries that comment on everything E Large companies have been able to realize the potential of consumeroriented virtual worlds 16 The network effect refers to the notion that the value of a network is dependent on A the speed of the network B the number of other users C the knowledge of the users D the commitment of the users E the technical expertise of the moderators 17 is a cooperative Web 20 application making use of the network effect A Media sharing B RSS C Tagging D Instant messaging E A discussion forum 18 is the distribution of digital media such as audio or Video files Via syndication feeds for playback on digital media players A Narrowcasting B Crowdsourcing C Blogging D Netcasting E Phishing 19 Podcasting is a misnomer because podcasts A are concerned with the dissemination of information to a narrow audience B cannot be played on Apple39s iPods C are not related to distribution of digital media for digital deVices D are concerned with outsourcing tasks to a large group of people or community E can be played on a variety of deVices in addition to Apple39s iPods 20 Social bookmarking allows users to share Internet bookmarks and to create categorization systems These categorization systems are referred to as A tag clouds B podcasts C folksonomies D geospatial metadata E microblogs 21 Which of the following statements is true about social bookmarking A It is the distribution of digital media B It allows netcasters to publish and push current shows to the watcherslisteners C It allows people to communicate using avatars D It allows users to create folksonomies E It allows users to post short quotstatus updatesquot 22 is the creation of a categorization system by users A Social cataloging B Podcasting C Social blogging D Netcasting E Crowdsourcing 23 refers to manually adding metadata to media or other content A Phishing B Tagging C Crowdsourcing D Podcasting E Netcasting 24 Which of the following statements is true about tagging A It is the process of creating a categorization systems by users B It is the process of distributing digital media for playback on digital media players C It is the process of adding metadata to pieces of information D It is the process of of creating avatars and syndication feeds E It is the process of creating an online text diary 25 refers to a way of visualizing user generated tags or content on a site A Crowdsourcing B Tag clouds C Phishing D Podcasting E Pharming 26 Which of the following is one of the uses of geotagging A to use avatars while chatting online B to create categorization systems for social cataloging C to know the location of a person sending out a breaking news update D to create folksonomies for social bookmarking E to use syndicate feeds while sharing media 27 Which of the following is an example of synchronous communication A online reviews B work ow automation systems C intranets D videoconferencing E collaborative writing tools 28 Which of the following is an example of asynchronous communication A group calendars B videoconferencing C online chatting D shared whiteboards E electronic meeting support system 29 Which of following factors differentiates asynchronous communication from synchronous communication A language B network speed C coordination in time D expertise E distance 30 In today39s business environment project teams comprise highly specialized members many of whom are not colocated are comprised of members from different geographic areas A Work groups B Virtual teams C Work teams D Task forces E Command groups 31 Which of the following is an electronic communication tool that allows users to files documents and pictures to each other and share information A email B instant messaging C application sharing D electronic calendars E knowledge management systems 32 Which of the following is an electronic conferencing tool that facilitates information sharing and rich interactions between users A email B wikis C blogs D instant messaging E online document systems 33 Which of the following is a collaboration management tool that is used to facilitate Virtual or colocated meetings A Internet forums B Videoconferencing C wikis D fax E intranets 34 Webbased collaboration tools A allow for easy transferability from one person to another B have welldocumented procedures for system complexities C reduce the risk of exposing sensitive corporate data D require users to frequently upgrade their software E are complex and timeconsuming to learn 35 Which of the following statements is true about Gmail A It is an enterpriselevel collaboration tool that allows users to create group Web sites and share team information B It allows users to select a custom domain name for an additional fee C It allows users to share events and subscribe to public calendars for new events D It is an instant messaging client E It is an online office suite comprised of a spreadsheet application a word processor and a presentation application 36 Which of the following Google Apps is an instant messaging client A Gmail B Google Calendar C Google Talk D Google Sites E Google Docs 37 is an online office suite comprised of a spreadsheet application a word processor and a presentation application A Gmail B Google Talk C Google Sites D Google Calendar E Google Docs 38 Which of the following statements is true about Google Sites A It is an enterpriselevel collaboration tool that allows users to create group Web sites and share team information B It allows users to select a custom domain name for an additional fee C It allows users to share events and subscribe to public calendars for new events D It is an instant messaging client E It is an online office suite comprised of a spreadsheet application a word processor and a presentation application 39 An system allows users to publish edit version track and retrieve digital information A social presence B collective intelligence C application sharing D content management E peer production 40 Which of the following statements is true about content management systems A It is the creation of goods or services by selforganizing communities B The creation of the goods or services is dependent on the incremental contributions of the participants C It allows the assignment of different roles for different users D Anyone can help in producing or improving the final outcome E It is a family of syndication feeds used to publish the most current blogs podcasts videos and news stories 41 Which of the following is the responsibility of an administrator in a content management system A editing the content into a final form B managing account access levels to the digital information C sharing team information D publishing new information E creating database applications 42 is the creation of goods or services by selforganizing communities A Peer production B A folksonomy C Creative commons D Groupware E Social software 43 Which of the following statements is true about peer production A The creator is responsible for publishing new information B Only editors have the right to develop new content C It is also known as enterprise content systems D Anyone can help in producing or improving the final outcome E The guest is a person who can only view the digital information 44 Which of the following occurs during wiki wars A editors do not agree with the creators of the content B participants debate on a particular topic before creation C administrators refuse to publish a creator39s content D guests edit the creator39s content without permission E contributors continuously edit or delete each others39 posts 45 is a phenomenon where companies use everyday people as a cheap labor force A Nearshoring B Phishing C Crowdsourcing D Narrowcasting E Pharming 46 enables people to work in more exible ways on a variety of Internetrelated projects A Efiling B Eauction C Etailing D Elancing E Etiming 47 sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate A Crowdsourcing B Social cataloging C Social networking D Social bookmarking E Media sharing 48 Which of the following statements is true about viral marketing A It uses the network effect to increase brand awareness B It uses everyday people as a cheap labor force C It is the dissemination of information to a narrow audience D It enables people to work in more exible ways on a variety of Intemetrelated projects E It is used to market a product without the audience realizing it 49 Which of the following is a critical factor in the success of a viral marketing campaign A restricting access to viral content B doing what the audience expects C making sequels D restricting easy distribution E distributing products for free 50 attempts to provide relevant search results by including content from blogs and microblogging services A Social search B OpenSearch C Enterprise search D Metasearch E Netsearch 51 Which of the following statements is true about Real Simple Syndication RSS A It is used to increase brand awareness through the network effect B It is used to disseminate information to a narrow audience C It is used to market the product without the audience realizing it D It is used to enable people to work in more exible ways on a variety of Internetrelated projects E It is used to publish the most current blogs podcasts videos and news stories 52 For companies operating in the digital world online collaboration with suppliers business partners and customers is crucial to being successful allows data to be accessed without intimate knowledge of other organizations39 systems enabling machinetomachine interaction over the Internet A Web services B Widgets C RSS feeds D Social search E Peer production 53 Android is a Web service hosted by Google to A create customized search features B build mobile phone applications C manage personal calendars D integrate Google39s mapping system into Web sites E allow users to build applications that work with multiple social communities 54 Which of the following statements is true about widgets A They can be placed on a desktop but cannot be integrated into a Web page B They can integrate two or more Web services C They are created by the integration of Web services and mashups D They are small interactive tools used for a single purpose E They can be integrated into a Web page but cannot be placed on a desktop 55 Together Web services and widgets enable the creation of A protocols B mashups C codecs D folksonomies E tag clouds 56 Which of the following statements is true about a mashup A It is a small interactive tool used for a single purpose B It is used to increase brand awareness through the network effect C It is the process of allowing companies to use everyday people as a cheap labor force D It is used to disseminate information to a narrow audience E It is an application or a Web site that integrates one or more Web services 57 Which of the following is a reason for the development of semantic Web A Web pages can be understood by people but not by computers B Users should be able to use any device in any network for any service C Users give a lot of unnecessary personal information to social networking sites D Widgets cannot be integrated into Web pages E Users are skeptical while making purchases online due to the fear of getting cheated 58 Which of the followings is NOT true about an Enterprise 20 strategy A Web 20 sites base their success on userdriven selfexpression B Enterprise 20 applications are not suited to traditional topdown organizational structures C Enterprise 20 applications should be driven by a specific usage context D Organizationwide Enterprise 20 implementations typically need changes in terms of organizational culture E Within organizations the critical mass needed for an Enterprise 20 application is often easily achieved 59 Enterprise 20 is likely to fail if A an organization39s workforce is dominated by baby boomers B an organization has a at organizational hierarchy C an organization emphasizes open communication D an organization39s workforce is dominated by millennials E it is integrated well with an organization39s existing information systems infrastructure Technology Brie ng Foundations of Information Systems Infrastructure Networks the Internet and Databases 68 is a computer networking model in which multiple types of computers are networked together to share data and services A Centralized computing B Mainframe computing C Task computing D Distributed computing E Serial computing 69 An is a computer network that spans a relatively small area allowing all computer users to connect with each other to share data and peripheral devices such as printers A enterprise network B wide area network C campus area network D local area network E valueadded network 70 An is a wide area network connecting disparate networks of a single organization into a single network A valueadded network B global network C enterprise network D local area network E personal area network 71 are private thirdpartymanaged medium speed WANs that are shared by multiple organizations A Valueadded networks B Enterprise networks C Global networks D Local area networks E Personal area networks 72 An is an emerging technology that uses Wireless communication to exchange data between computing devices using shortrange radio communication typically within an area of 10 meters A valueadded network B local area network C personal area network D enterprise network E campus area network 73 are network services that include the storing accessing and delivering of text binary graphic and digitized video and audio data across a network A Print services B File services C Message services D Application services E Software services 74 The highspeed central networks to which many smaller networks can be connected are known as A lastmile networks B ISPs C Internet exchange points D private branch exchanges E backbones 75 Which of the following wireless communication technologies uses highfrequency light waves to transmit data on an unobstructed path between nodes computers or some other device such as a printer on a network at a distance of up to 244 meters A Bluetooth B wireless LAN C highfrequency radio D infrared line of sight E microwaves WLANs based on a family of standards called 80211 are also referred to as A Bluetooth B wireless fidelity C ethernet D personal area networks E infrared line of sight 77 Which of the following is a characteristic of terrestrial microwave communication A high attenuation B speeds up to 16 Mbps C low expense D high susceptibility to eavesdropping E low electromagnetic interference 78 is the set of rules that governs how a given node or workstation gains access to the network to send or receive data A Media access control B Logical link control C Hypertext transfer protocol D File transfer protocol E Internet control message protocol 79 is a commonly used method of random access control in which each workstation quotlistensquot to traffic on the transmission medium either wired or wireless to determine whether a message is being transmitted A Code division multiple access B Carrier sense multiple access C Hybrid coordination function D Group packet radio service E Point coordination function 80 In an network all nodes or workstations are connected to a central hub or concentrator through which all messages pass A ring B bus C star D mesh E tree 81 Which of the following network topologies is capable of covering the largest distance A star network B bus network C ring network D mesh network E tree network 82 Which of the following statements is true of a bus network topology A A bus network has the most complex wiring layout B Extending a bus network is more difficult to achieve than it is for other topologies C A bus network topology enables all network nodes to receive the same message through the network cable at the same time D The configuration of bus networks facilitates easy diagnosis and isolation of network faults E In a bus network every computer and device is connected to every other computer and device 83 As per the Open Systems Interconnection OSI model which of the following layers defines the way data is formatted converted and encoded A application layer B transport layer C presentation layer D data link layer E session layer 84 According to the OSI model the layer defines the protocols for structuring messages A physical B session C transport D data link E network 85 According tot he OSI model the physical layer defines A the protocols for data routing to ensure that data arrives at the correct destination B the way data is formatted converted and encoded C the mechanism for communicating with the transmission media and interface hardware D the way that application programs such as electronic mail interact with the network E the protocols for structuring messages 86 A is a device that converts digital signals from a computer into analog signals so that telephone lines may be used as a transmission medium to send and receive electronic data A modem B LAN card C network adapter D PCI connector E USB port 87 A is a PC expansion board that plugs into a computer so that it can be connected to a network A transceiver B multiport repeater C cable router D network interface card E modular connector 88 An is a piece of networking hardware that manages multiple access points and can be used to manage transmission power and channel allocation to establish desired coverage throughout a building and minimize interference between individual access points A router B wireless controller C network switch D modem E network interface card 89 Which of the following entities is responsible for managing global and country code top level domains as well as global IP number space assignments A American Registry for Internet Numbers ARIN B World Wide Web Consortium W3C C Internet Assigned Numbers Authority IANA D Internet Governance Forum IGF E European Organization for Nuclear Research CERN 90 Which of the following Internet connectivity technologies enables data to be sent over existing copper telephone lines by sending digital pulses in the highfrequency area of telephone wires A integrated services digital network technology B digital subscriber line technology C dialup service technology D cable modem technology E fiber to the home technology 91 Computers working as servers on the Internet are known as A network adapters B modems C network switches D Ethernet hubs E Internet hosts 92 An is a unique identifier that should be created and used when designing a database for each type of entity in order to store and retrieve data accurately A foreign key B surrogate key C primary key D superkey E candidate key 93 In which of the following database models does the DBMS view and present entities as two dimensional tables with records as rows and attributes as columns A relational database model B hierarchical database model C network database model D objectoriented database model E semantic database model 94 is a technique to make complex databases more efficient and more easily handled by the DBMS A Assertion B Exception handling C Normalization D Model elimination E Structural induction Information Systems Today 5e ValacichSchneider Chapter 6 Enhancing Business Intelligence Using Information Systems 1 Which of the following statements is true about business intelligence A It is the act of outsourcing tasks traditionally performed by an employee or contractor to an undefined large group of people or community through the use of information technology B It is the process by which a customerowned mutual organization or cooperative changes legal form to a joint stock company C It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions D It is an organization39s process of defining its strategy or direction and making decisions on allocating its resources to pursue this strategy including its capital and people E It is the use of human resources to gather and analyze information from external sources in order to make better business decisions 2 quotBackward lookingquot budgets are typically based on A forecasts B marketing research C future trends D historical data E current market conditions 3 Responding to threats and opportunities and continuous planning is based on analyzing data from the level of the organization A operational B executive C tactical D business E strategic 4 Taking entities as tables each row is a A field B record C attribute D form E query 5 Taking entities as tables each column is an A attribute B record C form D bot E query 6 An attribute is also referred to as an A form B record C field D query E bot 7 An is a collection of related attributes about a single instance of an entity A bot B form C query D field E record 8 In DBMS data are kept separate from the applications39 programming code This means that A an application cannot be changed Without making changes to the database B an application39s programming code needs to be updated continuously to keep up With the database C an application needs to be changed When database is changed D database does not need to be changed if a change is made to an application E database needs to be changed When a change is made to an application 9 A common way to represent a data model is an A entityrelationship diagram B normalization diagram C reportquery diagram D formrecord diagram E report generator 10 Data type helps the DBMS A present the data in a useful format B format data C allocate storage space D eliminate data duplication E retrieve information 11 To finalize the data model in order to actually build the database a process called is used to make sure the database Will operate efficiently A slicing and dicing B normalization C clustering D Visualization E inferencing 12 In DBMS normalization helps to A eliminate data duplication B retrieve information C format data D present the data in a useful format E allocate storage space 13 Once the data model is created the format of the data is documented in an A data warehouse B data mart C expert system D data type E data dictionary 14 A data dictionary is also known as A data mart B data warehouse C metadata repository D entityrelationship diagram E clickstream data 15 Bringes a retail chain has retail stores across three states With its current legacy system Bringes is having problems tracking the inventory levels for its stores It is planning to implement Oracle database systems to replace this legacy system Which of the following most supports Bringes39 decision to replace its legacy system with an Oracle database system A Implementing Oracle database system means hiring additional specialized personnel to manage it B Partial implementation of the Oracle database system can create more problems than it solves C Conversion cost required for the implementation of Oracle database system is supported by IT budgets D Bringes39 channel partners use a database system that supports the Oracle database system E Maintenance cost of an Oracle database system is more than the legacy system presently in use 16 Treston an automobile manufacturer has recently implemented a new database system It is confident that this system will help enhance the company39s internal employees and external customers and channel partners communication Treston is planning to pursue a justintime inventory system soon after the database system is implemented After the implementation of the database system however Treston realized that the database system was not effective Which of the following if true can be cited as a reason for the failure of Treston39s database system A Microsoft launched a new version of Enterprise Microsoft Access which is better than Treston39s database system B The maintenance cost of Treston39s new database system was three times more than the one it was previously using C Treston39s new database system was not supported by the database system of its suppliers and distributors D Treston39s competitors implemented its database a few days prior to Treston39s implementation date E Treston had to hire specialized personnel to manage its new database system which added to its costs 17 Business rules are captured by the designers of the database and included in the data dictionary to A organize and sort the data complete calculations and allocate storage space B prevent illegal or illogical entries from entering the database C eliminate data duplication D make sure that each table contains only attributes that are related to the entity E capture the structure of the database 18 are used to capture data to be added modified or deleted from the database A Forms B Reports C Queries D Bots E Layers 19 An is a compilation of data from the database that is organized and produced in printed format A form B attribute C field D entity E report 20 A query is used to A organize and sort the data in a database B allocate storage space for a database C eliminate data duplication D retrieve information from a database E prevent illegal or illogical entries from entering the database 21 Which of the following statements is true about query by example capabilities in a database A It helps to create a query quickly and easily B It refers to immediate automated responses to the requests of users C It is designed to handle multiple concurrent transactions from customers D Its primary use is gathering new information E It prevents illegal entries into a database 22 The systems that are used to interact with customers and run a business in real time are called A tactical systems B strategic systems C operational systems D informational systems E executive systems 23 is the data that is deemed most important in the operation of a business A Metadata B Master data C Reference data D Query data E Tactical data 24 Which of the following statements is true about an operational system A Its primary purpose is to support managerial decision making B It consists of historical or pointintime data C Its goal is to enhance ease of access and use D It consists of narrow and simple updates and queries E It is primarily used by managers 25 Which of the following statements is true about informational systems A Its primary purpose is to run the business on a current basis B It is primarily used by online customers clerks salespersons and administrators C It consists of narrow and simple updates and queries D Its goal is to enhance performance E Its goal is to enhance ease of access and use 26 integrates data from various operational systems A Data warehouse B Metadata repository C Data modeling D Master data B Data mining 27 The purpose of a data warehouse is to A standardize the format of data retrieved from different systems B allow managers to run queries and reports themselves without having to know query languages or the structure of the underlying data C provide capabilities for discovering quothiddenquot predictive relationships in the data D put key business information into the hands of more decision makers E reduce the complexity of the data to be analyzed 28 refers to the process of standardizing the format of data retrieved from different systems A Data cleansing B Data mining C Normalization D Content mining E Clustering 29 A is a data warehouse that is limited in scope A metadata repository B master data C data model D data reduction E data mart 30 Which of the following statements is true about a data mart A It standardizes the format of data retrieved from different systems B It contains selected information from the data warehouse C It stores master data only D It is is a compilation of data from the database that is organized and produced in printed format E It helps to eliminate data duplication 31 Information and knowledge discovery tools are used primarily to A standardize the format of data retrieved from different systems B reduce the complexity of the data to be analyzed C extract information from existing data D discover quothiddenquot predictive relationships in the data E allow managers to learn query language for the effective maintenance of the database 32 are produced at predefined intervals to support routine decisions A Ad hoc queries B Exception reports C Drilldown reports D Scheduled reports E Keyindicator reports 33 Which of the following statements is true about keyindicator reports A They provide a summary of critical information on a recurring schedule B They help analyze why a key indicator is not at an appropriate level or why an exception occurred C They are produced at predefined intervals to support routine decisions D They highlight situations that are out of the normal range E They answer unplanned information requests to support a nonroutine decision 34 Which of the following statements is true about exception reports A They help analyze why a key indicator is not at an appropriate level or why an exception occurred B They are produced at predefined intervals to support routine decisions C They answer unplanned information requests to support a nonroutine decision D They provide a summary of critical information on a recurring schedule E They highlight situations that are out of the normal range 35 help analyze why a key indicator is not at an appropriate level or why an exception occurred A Ad hoc queries B Exception reports C Drilldown reports D Scheduled reports E Keyindicator reports 36 Which of the following statements is true about ad hoc queries A They are produced at predefined intervals to support routine decisions B They provide a summary of critical information on a recurring schedule C They help analyze why a key indicator is not at an appropriate level or why an exception occurred D They answer unplanned information requests to support a nonroutine decision E They highlight situations that are out of the normal range 37 refers to the process of quickly conducting complex multidimensional analyses of data stored in a database that is optimized for retrieval typically using graphical software tools A Inferencing B Online analytical processing C Normalization D Data mining E Predictive analysis 38 Online analytical processing tools enable users to A discover quothiddenquot predictive relationships in the data B find associations or correlations among sets of items C analyze different dimensions of data beyond simple data summaries D group related records together on the basis of having similar values for attributes E extract textual information from Web documents 39 Which of the following statements is true about online analytical processing server A It is a data structure allowing for multiple dimensions to be added to a traditional two dimensional table B It groups related records together on the basis of having similar values for attributes C It allows you to make hypothetical changes to the data associated with a problem and observe how these changes in uence the results D It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice E It understands how data is organized in the database and has special functions for analyzing the data 40 How do online analytical processing systems improve performance A They preaggregate data so that only the subset of the data necessary for the queries is extracted B They use reasoning methods based on knowledge about a specific problem domain C They make hypothetical changes to the data associated with a problem D They allow for multiple dimensions to be added to a traditional twodimensional table E They provide capabilities for discovering quothiddenquot predictive relationships in the data 41 In online analytic processing systems are the values or numbers the user wants to analyze A dimensions B forms C measures D queries E entities 42 In online analytic processing systems provide a way to summarize the data A forms B measures C facts D records E dimensions 43 Which of the following statements is true about the online analytic processing cube A It allows you to make hypothetical changes to the data associated with a problem and observe how these changes in uence the results B It groups related records together on the basis of having similar values for attributes C It understands how data is organized in the database and has special functions for analyzing the data D It is a data structure allowing for multiple dimensions to be added to a traditional two dimensional table E It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice 44 Data mining complements online analytic processing in that it A finds associations or correlations among sets of items B provides capabilities for discovering quothiddenquot predictive relationships in the data C extracts textual information from Web documents D groups related records together on the basis of having similar values for attributes E analyzes different dimensions of data beyond simple data summaries 45 can be achieved by rolling up a data cube to the smallest level of aggregation needed reducing the dimensionality or dividing continuous measures into discrete intervals A Data cleansing B Normalization C Clustering D Data reduction E Inferencing 46 Which of the following statements is true about association discovery A It is a technique used to find correlations among sets of items B It is the process of grouping related records together on the basis of having similar values for attributes C It is the use of analytical techniques for extracting information from textual documents D It is a type of intelligent system that uses reasoning methods based on knowledge about a specific problem domain in order to provide advice E It makes sure that each table contains only attributes that are related to the entity 47 is the process of grouping related records together on the basis of having similar values for attributes A Normalization B Data mining C Clustering D Inferencing E Slicing and dicing 48 Which of the following is a recording of a user39s path through a Web site A clustering B normalization C slicing and dicing D clickstream data E inferencing 49 is the ability to attract and keep visitors A Normalization B Inferencing C Stickiness D Crowdsourcing E Visualization 50 Which of the following analysis are you conducting to make hypothetical changes to the data associated with a problem and observe how these changes in uence the results A predictive analysis B timeseries analysis C linear regression analysis D whatif analysis E multivariate analysis 51 Which of the following statements is true about expert systems A It is composed of a network of processing elements that work in parallel to complete a task attempt to approximate the functioning of the human brain and can learn by example B It is a program that works in the background to provide some service when a specific event occurs C It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice D It allows you to make hypothetical changes to the data associated with a problem and observe how these changes in uence the results E It groups related records together on the basis of having similar values for attributes 52 Which of the following statements is true about a rule in expert systems A It groups related records together on the basis of having similar values for attributes B It makes sure that each table contains only attributes that are related to the entity C It allows multiple dimensions to be added to a traditional twodimensional table D It is typically expressed using an quotif thenquot format E It allows you to make hypothetical changes to the data associated with a problem and observe how these changes in uence the results 53 allows expert system rules to be represented using approximations or subjective values in order to handle situations where information about a problem is incomplete A Fuzzy logic B Normalization C Clustering D Whatif analysis E Stickiness 54 The processing in an ES is called A clustering B inferencing C normalization D recommending E data cleansing 55 Which of the following statements is true about neural networks A It allows multiple dimensions to be added to a traditional twodimensional table B It works in the background to provide some service when a specific event occurs C It attempts to approximate the functioning of the human brain and can learn by example D It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice E It helps analyze why a key indicator is not at an appropriate level or why an exception occurred 56 Which of the following statements is true about user agents A They are also known as Web spiders B They are agents that search to find the best price for a particular product you wish to purchase C They are agents that continuously analyze large data warehouses to detect changes deemed important by a user D They are agents that automatically perform a task for a user E They are agents designed by spammers and other Internet attackers to farm email addresses off Web sites or deposit spyware on machines 57 Which of the following is a role of monitoring and sensing agents A tracking inventory levels B sending a report at the first of the month C assembling customized news D analyzing data warehouses to detect changes deemed important to a user E finding the best price for a particular product the user wants to purchase 58 Which of the following is a role of data mining agents A tracking inventory levels B sending a report at the first of the month C assembling customized news D analyzing data warehouses to detect changes deemed important to a user E finding the best price for a particular product the user wants to purchase 59 Which of the following statements is true about explicit knowledge assets A It re ects the processes and procedures that are located in a person39s mind on how to effectively perform a particular task B It re ects the person39s ability to effectively solve a problem without external help C It re ects knowledge that can be documented archived and codified often with the help of information systems D It re ects an individual39s special knowledge about a newtotheworld product E It re ects the strategies that are located in a person39s mind on how to effectively perform a particular task 60 Which of the following is the primary goal of a knowledge management system A Identifying how to recognize generate store share and manage tacit knowledge B Continuously analyzing large data warehouses to detect changes deemed important by a user C Grouping related records together on the basis of having similar values for attributes D Allowing hypothetical changes to the data associated with a problem to observe how these changes in uence the results E Identifying how to recognize generate store share and manage explicit knowledge 61 Social network analysis is a technique that attempts to A analyze large data warehouses to detect changes deemed important by a user B analyze why a key indicator is not at an appropriate level or why an exception occurred C discover quothiddenquot predictive relationships in the data D allow hypothetical changes to the data associated with a problem to observe how these changes in uence the results E find experts in particular subject areas 62 refers to the display of complex data relationships using a variety of graphical methods A Normalization B Visualization C Clustering D Inferencing E Textual mining 63 Which of the following statements is true about digital dashboards A It is the combination of various analysis techniques and interactive visualization to solve complex problems B It supports usage models like push reporting exception reporting and alerts and pull reporting C It can visualize features and relationships between features drawn from an underlying geographic database D Analysts can combine geographic demographic and other data for locating target customers E It a system for creating storing analyzing and managing geographically referenced information 64 Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational statistics and trends This usage model is known as A exception reporting B pull reporting C ad hoc reporting D drilldown reporting E push reporting 65 While using digital dashboards pull reporting is conducted to A alert the user of any items that require immediate attention B provide the decision makers with a quick overview of key performance indicators C discover quothiddenquot predictive relationships in the data D analyze the root causes of an exception E extract textual information from Web documents 66 Which of the following statements is true about hard data A It involves the use of text mining technologies B It includes nonanalytical information C It involves input from dedicated personnel D It includes textual news stories E It includes facts and numbers 67 Which of the following explains the phrase quotdata is geocodedquot A It is transformed into coordinates B It is shared in the Internet C It is used to create Web pages D It is compared with similar historical data E It is converted into soft data Chapter 7 Enhancing Business Processes Using Enterprise Information Systems 1 Traditionally companies are organized around four distinct functional areas Which of the following is one of those four areas A supply chain management B risk management C technology management D communication management E systems management 2 Which of the following is a core business process A timetopurchase B maketostock C plantoproduce D accounttoreport E hiretoretire 3 Whenever an order is placed with online retailers the retailers put together the order ship it and charge the customer39s credit card This process of selling a product or service is known as the process A maketoorder B timetomarket C ordertocash D procuretopay E maketostock 4 For most businesses the process entails subprocesses such as creating a customer record checking the customer39s creditworthiness creating an order checking and allocating stock picking packing and shipping invoicing and collecting the payment A ordertocash B maketoorder C procuretopay D maketostock E plantoproduce 5 An online retailer has finished creating a customer record What should the retailer do next in an ordertocash process A create order B allocate stock C pick pack and ship D prepare and send invoice E check customer credit 6 In the ordertocash process once quotchecking creditquot is done it is followed by A collecting payment B creating an order C allocating stock D picking packing and shipping E preparing and sending the invoice 7 An online retailer has just finished creating an order for a customer In an ordertocash process What should the retailer do next A collect payment B create customer record C allocate stock D pick pack and ship E prepare and send invoice 8 The processes associated With the acquiring of goods from external vendors are together referred to as the process A maketostock B maketoorder C ordertocash D plantoproduce E procuretopay 9 Which of the following is typically the first step in the procuretopay process A negotiate price and terms B issue purchase order C receive goods D receive invoice E settle payment 10 In the procuretopay process the negotiation of price and terms is followed by A settling the payment B creating the customer record C issuing the purchase order D receiving the goods E receiving the invoice 11 immediately after the purchase order is issued in the procuretopay process A Payment is settled B Price and terms are negotiated C Credit is checked D Goods are received E Invoices are received 12 Receiving the goods is immediately followed by in the procuretopay process A settling the payment B negotiating the price and terms C issuing the purchase order D creating the order E receiving the invoice 13 In the process goods are produced based on forecasts and are stored in a warehouse and sales orders are then fulfilled from the inventory A configuretostock B maketostock C maketoorder D engineertoorder E assembletoorder 14 Which of the following uses a pushbased approach A ordertocash B procuretopay C productiontoorder D maketostock E maketoorder 15 In the process raw materials subcomponents and accessories are procured based on forecasts but actual manufacturing does not start until sales orders are received A ordertocash B procuretopay C maketostock D acquiretodispose E maketoorder 16 Which of the following uses a pullbased approach A maketoorder B maketostock C plantoproduce D accounttoreport E acquiretodispose 17 Which of the following is typically the first step in the maketostock process A scheduling production B procuring inputs C processing sales orders D negotiating price and terms E creating customer records 18 Which of the following goods are typically produced under a maketoorder approach A expensive highvolume goods B cheap lowvolume goods C very expensive lowvolume goods D massproduced goods E goods from external vendors 19 Which of the following goods are produced using the maketoorder approach A commercial aircraft B shampoos C lipsticks D televisions E refrigerators 20 are performed by the functional areas that process inputs and produce outputs A Base activities B Core activities C Support activities D Extended activities E Focus activities 21 Which of the following is a core activity A human resource activities B technology development C operations and manufacturing D administrative activities E infrastructure activities 22 Inbound logistics involves business activities associated with A distributing end products within the ordertocash business process B creating marketing literature C communicating with potential and existing customers D receiving and stocking raw materials parts and products E order processing 23 Assembly processes are activities A outbound logistics B marketing and sales C customer sales D administrative E operations and manufacturing 24 Outbound logistics activities focus on the A processing of orders B distribution of end products within the ordertocash business process C pricing of goods and services D transformation of raw materials into end products E receiving and stocking of raw materials parts and products 25 Administrative activities focus on the A design and development of applications that support the primary business activities B hardware and software that must be implemented to support the applications that the primary activities use C business activities associated with employee management D processes and decision making to orchestrate the daytoday operations of an organization E purchasing of goods and services that are required as inputs for the primary activities 26 The hardware and software that must be implemented to support the applications that the primary activities use are a part of the activities A human resources B technology development C procurement D inbound logistics E infrastructure 27 Which of the following is a support activity A outbound logistics activities B operations and manufacturing activities C technology development activities D customer service activities E marketing and sales activities 28 Human resource activities A is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them B includes the design and development of applications that support the primary business activities C includes the purchasing of goods and services that are required as inputs to the primary activities D integrate the internal applications with suppliers business partners and customers E streamline the organization39s internal value chain 29 Designing and developing applications that support the primary business activities are a part of the activities A operations and manufacturing B outbound logistics C technology development D procurement E inbound logistics 30 An information ow consists of information that is received from another organization A standalone B legacy C packaged D upstream E downstream 31 An information ow relates to the information that is produced by a company and sent along to another organization A standalone B legacy C packaged D custom E downstream 32 Systems that focus on the specific needs of individual departments and are not designed to communicate with other systems in the organization are referred to as A internally focused applications B externally focused systems C standalone applications D enterprisewide systems E enterpriseinformation systems 33 Standalone systems are also known as A ethernet systems B automated business systems C peripheral systems D legacy systems E converter systems 34 Legacy systems can prove problematic when information from multiple departmental systems is required to support business processes and decision making Which of the following is most similar to the above scenario A Chuck39s is a retail chain that has an inventory management system which is tied to an RFID system This system notifies Chuck39s managers when the inventory in its stores fall below a certain level B Quick Software Solutions has an automated system to track employee absence It also uses a nonautomated system like attendance registers that employees sign everyday This information is updated to Quick39s database management system on a weekly basis C Nuok Tires supplies its products to Fresto an automobile manufacturer Nuok Tires39 factories are located close to Fresto39s factories to minimize transportation costs D Fender a guitar manufacturer allows customers to design their guitars online Potential buyers need to send this design with the order to receive their customized guitars E J sutmi successfully pursues a justintime inventory system Recently however it has not been able to meet demand due to labor problems 35 An is an integrated suite of business applications for virtually every department process and industry allowing companies to integrate information across operations on a companywide basis using one large database A legacy system B management information system C decision support system D distributed system software E enterprise system 36 An internally focused system helps an organization coordinate with A its suppliers B its business partners C the government D its departments E its customers 37 An coordinates business processes with customers suppliers and business partners of an organization A internally focused system B legacy system C standalone system D intermediary system E externally focused system 38 A system that communicates across organizational boundaries is sometimes referred to as an A legacy system B interorganizational system C intraorganizational system D internally focused system E standalone system 39 are applications written by thirdparty vendors for the needs of many different users and organizations A Packaged software B Custom software C Bespoke software D Personalized software E Tailored software 40 Applications that are designed and developed exclusively for a specific organization are known as A collaborative software B custom software C groupware D readymade application software E packaged software 41 Customers can purchase software off the shelf to help them with their personal documents and communications A personalized B tailored C packaged D custom E bespoke 42 Packaged software is A used for standardized repetitive tasks B developed exclusively for a specific organization C unique to a particular business or organization D an application that needs to be maintained internally when changes are required E used to accommodate a customer39s particular preferences and expectations 43 Which of the following software is very cost effective since the vendor that builds the application spreads out the development costs by selling them to a large number of users A packaged software B bespoke software C adapted software D corrected software E custom software 44 Which type of software is best suited for tasks that are unique to a particular business A collaborative B custom C groupware D packaged E readymade application 45 Which of the following is true regarding packaged software and custom software A Packaged software are applications that are designed and developed exclusively for a specific organization B The development costs of custom software are much higher than for packaged software because of the time money and resources that are required to design and develop them C Packaged software is well suited for tasks that are unique to a particular business D Custom software is cost effective since the vendor that builds the application can spread out development costs through selling to a large number of users E Custom software is highly useful for standardized repetitive tasks such as writing a report or preparing a presentation 46 The features and modules that an enterprise system comes with out of the box are referred to as the A bestpractices version B reengineered version C vanilla version D customized version E modified version 47 is a systematic structured improvement approach by all or part of an organization whereby people critically examine rethink and redesign business processes in order to achieve dramatic improvements in one or more performance measures such as quality cycle time or cost A Business process management B Business activity monitoring C Business service management D Application performance management E Application service management 48 In the 1990s business process management was known as A business systems management B business process reengineering C business service reengineering D application performance management E application service management 49 After deciding to focus on business process management the management of a company has just finished developing a vision for the organization This vision specifies the company39s business objectives Typically what should be the management39s next step A They should identify the ways in which information systems can be used to improve the various business processes B They should design and implement a prototype of the new processes C They should manage the information technology to be used from a business transaction perspective D They should identify the critical processes that are to be redesigned E They should understand and measure the existing processes as a baseline for future improvements 50 After identifying the ways in which information systems can be used to improve the processes which of the following is the next step in business process management A identifying the critical processes that are to be redesigned B understanding and measuring the existing processes as a baseline for future improvements C reducing costs and shortening the time it takes to get products to market D designing and implementing a prototype of the new process E developing a vision for the organization that specifies the business objectives 51 How is business process management similar to total quality management A They are intended to be crossfunctional approaches to improve an organization B They focus on radical redesign and drastic improvement of processes C They focus on incremental change of processes D They focus on the activities typically occurring at the operational level of the organization E They focus on providing capabilities for discovering quothiddenquot predictive relationships while conducting a forecast 52 Applications that integrate business activities across departmental boundaries are often referred to as systems A manufacturing resource planning B computerintegrated manufacturing C capacity requirement planning D enterprise resource planning E materials requirement planning 53 Which of the following is true regarding enterprise resource planning ERP A It stores data in different locations B It is an older version of materials requirement planning C It helped in developing the manufacturing resource planning package D Standalone applications are a developed version of ERP E It makes the process of sharing information between business activities easier 54 support the important internal activities of the organization for producing their products and services A ERP focus components B ERP core components C ERP extended components D ERP base components E ERP covering components 55 Financial management operations management human resource management and other important internal activities require the support of A ERP essence components B ERP exterior components C ERP core components D ERP extended components E ERP basis components 56 support the primary external activities of the organization for dealing With suppliers and customers A ERP components B ERP aggrandized components C ERP abridged components D ERP extended components E ERP core components 57 Specifically ERP extended components focus primarily on A customer relationship management and product lifecycle management B product lifecycle management and supply chain management C customer relationship management and human capital management D human capital management and supply chain management E customer relationship management and supply chain management 58 Which of the following is true regarding the formula for success of an enterprise system A Enterprise systems implementations should include personnel from different departments B The success of an enterprise system depends directly on the support received from middle management C Enterprise systems are simple to understand and implement When compared to standalone systems D Using outside consultants tends to complicate the implementation of an enterprise system E Once enterprise systems go live employees experience an immediate growth in productivity 59 In serviceoriented architecture A business processes are broken down into individual components or services B business processes of an organization are standardized C business processes of an organization are integrated from individual components D business processes are shared With channel partners E business processes are modified to prevent illegal activities Within the process 60 By breaking down business processes into individual services organizations can react more swiftly to changing business needs To achieve these benefits services have to follow three main principles A reusability interoperability and reliability B reusability reliability and componentization C reusability interoperability and componentization D reusability interoperability and accessability E reusability accessability and componentization Chapter 8 Improving Supply Chains and Strengthening Customer Relationships Using Enterprise Information Systems 1 The term is commonly used to refer to a collection of companies and processes involved in moving a product from the suppliers of raw materials to the customer A distribution resource planning B supply chain C procurement D demand chain E value network 2 Which of the following statements about justintime strategies is true A Retailers using this strategy allow suppliers to maintain ownership of inventory within their warehouses or stores until items are scanned at the point of sale B Companies using this strategy allow the suppliers to manage the manufacturer39s inventory levels based on preestablished service levels C Companies using this strategy maintain large inventories of supplies parts warehousing resources and extra workers to meet production contingencies D Companies using this strategy are trying to optimize their ordering quantities such that parts or raw material arrive just when they are needed for production E The manufacturer or retailer using this strategy shares realtime sales data with their suppliers who maintain inventory levels based on preestablished agreements 3 Altrix Corp an Indonesian firm recently faced an unanticipated decline in the demand for its product This dented the company39s financial strength not only through loss of sales but also because it ended up with a substantial inventory of raw materials that the company wasn39t able to use As a result Altrix has been rethinking its approach to inventory management Some of its board members are suggesting that they use the justintime JIT system to avoid such situations in the future Which of the following if true could undermine the argument in favor of J IT A Some of the raw materials Altrix requires are perishable in nature B Altrix Corp has already integrated backward by purchasing supplies located in different parts of Indonesia C Altrix Corp recently entered into a 3year contract with a leading warehousing firm to use their storage space on a quotneed bequot basis D Altrix Corp is bidding for a huge government contract that could give its sales some stability E Labor problems are a critical issue in this country 4 is a business model in which the suppliers to a manufacturer manage the manufacturer39s inventory levels based on preestablished service levels A Justincase manufacturing B Scanbased trading C Vendormanaged inventory D Lean manufacturing E Justintime 5 Which of the following statements about vendormanagement inventory VMI is true A To make VMI possible the manufacturer must maintain large inventories of supplies parts warehousing resources and extra workers to meet production contingencies B Manufacturers using VMI business model manage the inventories themselves and send out requests for additional items to the vendors as needed C Companies using this strategy are trying to optimize their ordering quantities such that parts or raw material arrive just when they are needed for production D To make VMI possible the manufacturer allows the supplier to monitor stock levels and ongoing sales data E Retailers using this strategy allow suppliers to maintain ownership of inventory within their warehouses or stores until items are scanned at the point of sale 6 One major problem affecting supply chains are ripple effects referred to as the A back ush effect B multiplier effect C bullwhip effect D incremental effect E stockwhip effect 7 Computer maker Dell realized the problems with keeping large inventories especially because of the fast rate of obsolescence of electronics components Dell now keeps only about two hours of inventory in its factories The company is most likely using a A scanbased trading system B customermanaged inventory system C justintime inventory management system D vendormanaged inventory system E justincase inventory management system 8 MaxSteel Inc has been supplying steel to a well known car manufacturer Agis Corp for the past 3 years Concerned employees at Max can directly access Agis Corp39s inventory and sales information via electronic data interchangeThis allows MaxSteel to monitor Agis Corp39s inventory levels on a realtime basis The system has worked well for both companies so far and there has never been any delay in the supply of steel Which of the following if true would most strengthen Agis39 supply chain strategy A Agis Corp39s management decides to take strong measures for increasing their safety stock of all raw materials B Agis Corp is taking measures to add wholesalers and retailers into their supply chain C Agis Corp has a strong desire to purchase MaxSteel in order to reduce dependency D Agis Corp is taking measures to directly contact the consumers by removing wholesalers and retailers from their supply chain E Agis Corp understands that the information shared with MaxSteel will not be shared outside their organization 9 Fenphen was an antiobesity medication that consisted of two drugs fen uramine and phentermine Fen uramine was initially marketed by American Home Products but was shown to cause potentially fatal pulmonary hypertension and heart valve problems This eventually led to the withdrawal of the drug and legal damages of over 13 billion This is an example of A a product recall B lean manufacturing C production control D the bullwhip effect E a green business 10 La Belle Inc introduced a new line of accessories for teenaged girls last season Following its immense popularity with the targeted group the company anticipated high sales this season It ordered raw materials accordingly and even ensured that they had sufficient inventory to meet excess demand if any However the success of the new line turned out to be a fad as the teens soon turned to other products offered by competing brands and La Belle39s sales declined This caused a huge discrepancy in the amount of raw materials they needed and the amount of inventory they had piled up in anticipation of good sales This is an example of A the multiplier effect B hindsight bias C product recall D the bullwhip effect E safety stock planning 11 Which of the following is the main objective of information systems that focus on improving supply chains A discouraging vendormanaged inventory systems B accelerating product development and innovation C encouraging sustainable production processes D decentralizing the organizations E encouraging the bullwhip effect 12 Which of the following is the key use of distribution planning module of supply chain management A to ensure that the materials required for production are available when needed B to forecast and plan anticipated demand for products C to optimize the allocation of available supply to meet demand D to support production processes taking into account capacity and material constraints E to support receiving storing and picking of goods in a warehouse 13 The key use of order promising module of supply chain management is to A work with partners across the supply network to improve accuracy of demand forecasts reduce inventory buffers and improve customer service B monitor key performance indicators to assess performance across the supply chain C manage logistics between company locations or from company to customers taking into account transportation modes and constraints D assign optimal safety stock and target stock levels in all inventories in the supply network E provide answers to customer relationship management queries regarding product availability costs and delivery times 14 The key use of manufacturing execution module of supply chain management is to A forecast and plan anticipated demand for products B support production processes taking into account capacity and material constraints C ensure that the materials required for production are available where needed when needed D assign optimal safety stock and target stock levels in all inventories in the supply network E support receiving storing and picking of goods in a warehouse 15 involves the development of various resource plans to support the efficient and effective production of goods and services A Supply chain visibility B Supply chain analytics C Supply chain execution D Supply chain network E Supply chain planning 16 Supply chain planning begins with A product demand planning and forecasting B distribution planning C production scheduling D inventory planning E safety stock planning 17 Demand planning and forecasting leads to the development of the overall A sourcing plan B transportation schedule C production plan D expected demand E safety stock plan 18 focuses on delivering products or services to consumers as well as warehousing delivering invoicing and payment collection A Product demand planning B Production planning C Distribution planning D Safety stock planning E Inventory planning 19 Distribution planning leads to the development of the overall A production plan B safety stock plan C demand forecast D transportation schedule E sourcing plan 20 Production scheduling A focuses on the coordination of all activities needed to create the product or service B focuses on delivering products or services to consumers as well as warehousing C leads to the development of a sourcing plan D focuses on the development of inventory estimates E focuses on delivering products or services to consumers as well as invoicing and payment collection 21 Using analytical tools to optimally utilize labor materials and equipment is a part of the step of supply chain planning A demand forecasting B production scheduling C distribution planning D inventory planning E transportation scheduling 22 Inventory and safety stock planning A leads to the development of the overall demand forecast B focuses on the coordination of all activities needed to create the product or service C focuses on the development of inventory estimates D focuses on delivering products or services to consumers as well as warehousing E leads to the development of a transportation schedule 23 Inventory and safety stock planning leads to the development of an A outsourcing plan B production plan C transportation schedule D demand forecast E sourcing plan 24 Supply chain execution A involves the development of a sourcing plan B refers to the use of key performance indicators to monitor production C involves the management of information ow D refers to the ability to track products as they move through the supply chain E involves the development of demand forecast 25 Which of the following statements is true about product ow a key element of supply chain A It refers to the ability to track products as they move through the supply chain B It refers to the movement of information along the supply chain such as order processing and delivery status updates C It refers to the movement of goods from the supplier to production from production to distribution and from distribution to the consumer D It tracks a oneway ow of products from producers to consumers but cannot process returns or customer refunds E It refers primarily to the movement of financial assets throughout the supply chain 26 Which of the following statements is true about information ow a key element of supply chain execution A A key element of this aspect of supply chain execution is to foresee external events B Information can only ow up the supply chain C It refers to the use of key performance indicators to monitor performance of the entire supply chain D The key element to the information ow is the complete removal of paper documents E It refers primarily to the movement of financial assets throughout the supply chain 27 Which of the following key elements of a supply chain includes information related to payment schedules consignment and ownership of products and materials A financial ow B personnel ow C information ow D product ow E material ow 28 refers not only to the ability to track products as they move through the supply chain but also to foresee external events A Supply chain visibility B Demand planning and forecasting C Supply chain analytics D Supply network collaboration E Supply chain efficiency 29 refers to the use of key performance indicators to monitor performance of the entire supply chain including sourcing planning production and distribution A Demand forecasting B Supply network collaboration C Supply chain visibility D Supply chain efficiency E Supply chain analytics 30 is the extent to which a company39s supply chain is focusing on minimizing procurement production and transportation costs sometimes by sacrificing excellent customer service A Supply chain analytics B Supply chain effectiveness C Supply network collaboration D Supply chain efficiency E Supply chain visibility 31 is the extent to which a company39s supply chain is focusing on maximizing customer service regardless of procurement production and transportation costs A Supply chain visibility B Supply chain effectiveness C Supply chain analytics D Supply chain efficiency E Supply network collaboration 32 Which of the following is an example of supply chain efficiency A Federal Express focuses on providing superior service B Caterpillar has high spare parts availability C Dr Pepper introduces a new avor of soft drink D Rolex positions itself as a prestige brand E Apple sources its raw materials in a way to keep costs low 33 is a data presentation standard first specified by the World Wide Web Consortium an international consortium of companies whose purpose is to develop open standards for the Web A Extensible Markup Language B Perl C MySQL D Active Server Pages E Unified Modeling Language 34 allows designers of Web documents to create their own customized tags enabling the definition transmission validation and interpretation of data between applications and between organizations A MySQL B Active Server Pages C Extensible Markup Language D Perl E Unified Modeling Language 35 Which of the following statements is true about XML A XML is standardized B XML specifies a particular formatting C XML cannot be tailored to share any data across applications over the Web D XML tags are used to supply interactive content to a Web page E XML instructs systems as to how information should be interpreted and used 36 is an XMLbased specification for publishing financial information A Extensible Rights Markup Language B Extensible Application Markup Language C Extensible Access Control Markup Language D Extensible Business Reporting Language E Enterprise Mashup Markup Language 37 includes tags for data such as annual and quarterly reports Securities and Exchange Commission filings general ledger information and net revenue and accounting schedules A Extensible Application Markup Language B Extensible Business Reporting Language C Extensible Access Control Markup Language D Enterprise Mashup Markup Language E Extensible Rights Markup Language 38 Lee39s department store uses the every day low prices strategy This strategy hinges upon the store39s ability to obtain consumer goods at the cheapest possible price and pass these savings on to consumers Lee39s store also developed its own distribution network for supplying its retail outlets with consumer goods This distribution network allowed them to cut out external suppliers and middlemen further driving down business costs This implies that the competitive strategy used by this store would most likely focus on A supply chain efficiency B supply chain visibility C supply chain effectiveness D operational CRM E analytical CRM 39 Comptel a world leader in computer hardware differentiates itself from its customers by providing excellent aftersales service This implies that the competitive strategy used by Comptel would most likely focus on A supply chain analytics B supply chain visibility C supply chain effectiveness D supply network collaboration E supply chain efficiency 40 uses the electromagnetic energy to transmit information between a reader transceiver and a processing device A Radio frequency identification B High capacity color barcode C Interferometric modulator display D Photonic computing E Electronic product code 41 can be used just about anywhere a unique identification system might be needed such as on clothing pets cars keys missiles or manufactured parts A HTML tags B RFID tags C Spintronics D XML tags E High capacity color barcode 42 Which of the following statements is true about RFID systems A RFID scanning can be done at greater distances than bar code scanning B RFID information is readable depending on the entity39s position C RFID tags contain less information than bar codes D All RFID tags are small and relatively inexpensive E RFID requires timeconsuming hand scanning 43 Which of the following statements about an RFID passive tag is true A They are small and inexpensive B They have a range up to 300 feet or more C They cost more than active tags D They have an internal battery source E They typically cost about 10 44 Which of the following statements about an RFID active tag is true A They are inexpensive with the starting price being 10 cents B They have a range up to 40 feet C They are small compared to passive tags D They have an internal battery source E They are less expensive as compared to passive tags 45 Which of the following is a main objective of customer relationship management applications focusing on downstream information ows A to track global spend by supplier B to encourage bullwhip effect C to develop demand forecasts D to portray a positive corporate image E to collaborate demand and production planning 46 Which of the following portrays the individualized service benefit of a CRM system A Learning how each customer defines product and service quality so that customized product pricing and services can be designed or developed collaboratively B Webbased interfaces providing product information sales status support information issue tracking and so on C Integrating all information for all points of contact with the customers so that all who interact with customers have the same view and understand current issues D Integrated information removing information handoffs which speeds both sales and support processes E Improved record keeping and efficient methods of capturing customer complaints helping to identify and solve problems faster 47 Which of the following rightly explains improved product development on using a CRM system A Learning how each customer defines product and service quality so that customized product pricing and services can be designed or developed collaboratively B Webbased interfaces that provide product information sales status support information issue tracking and so on C Integrated information that removes information handoffs speeding both sales and support processes D Improved record keeping and efficient methods of capturing customer complaints that assist in identifying problems faster E Tracking customer behavior over time that helps to identify future opportunities for product and service offerings 48 Which of the following examples portray the 247365 operation of a CRM system A Webbased interfaces that provide product information sales status support information issue tracking and so on B Improved record keeping and efficient methods of capturing customer complaints that assist 1n identifying problems faster C Tracking customer behavior over time that helps to identify future opportunities for product and service offerings D Integrated information that removes information handoffs speeding both sales and support processes E Learning how each customer defines product and service quality so that customized product pricing and services can be designed or developed collaboratively 49 Which of the following rightly explains improved planning on using a CRM system A Improved record keeping and efficient methods of capturing customer complaints that assist in identifying problems faster B Learning how each customer defines product and service quality so that customized product pricing and services can be designed or developed collaboratively C Providing mechanisms for managing and scheduling sales followups to assess satisfaction repurchase probabilities time frames and frequencies D Tracking customer behavior over time that helps to identify future opportunities for product and service offerings E Integrated information that removes information handoffs speeding both sales and support processes 50 includes the systems used to enable customer interaction and service A Operational CRM B Integrated CRM C Collaborative CRM D Data warehouse E Analytical CRM 51 help create the mass email marketing campaigns wherein each consumer receives an individualized email based on their prior purchase history A Data warehouses B Operational CRM systems C Analytical CRM systems D Integrated CRM systems E Collaborative CRM systems 52 Which of the following is a component of the operational CRM system A sales force automation B data warehouses C ERP systems D data mining and visualization E business intelligence 53 Which of the following is a component of the analytical CRM system A enterprise marketing management B sales force automation C technologies to facilitate communication D data mining and visualization E customer service and support 54 Which of the following is a component of the collaborative CRM system A sales force automation B data mining and visualization C enterprise resource planning systems D enterprise marketing management E technologies to facilitate communication 55 is the first component of an operational customer relationship management that supports a broad range of business processes including account and contact management territory management and order processing and tracking A Enterprise marketing management B Sales force automation C Data warehouse D Execution management E Customer service and support 56 Which of the following best explains improved morale of sales personnel due to sales force management systems A Customer contact information being recorded using eforms that automatically provide known customer data B Common systems ensuring that sales personnel follow common processes and procedures C Improved training and less quotbusyworkquotallowing a greater focus on selling and revenue generation D Sharing of all salesrelated information facilitating successful team selling E Eforms ensuring that customer data is automatically entered 57 refers to systems that automate complaints product returns and information requests among others A Data warehouse B Enterprise marketing management C Customer service and support D Execution management E Sales force automation 58 Which of the following advantages accruing to sales personnel can be attributed to sales force management A better planning B better sales force tracking C better forecasts D improved teamwork E improved scheduling 59 Which of the following best explains improved information for sales managers on account of sales force management systems A sales performance data automatically tabulated and presented in easytounderstand tables charts and graphs B streamlined selling processes and improved communications that allow sales managers to focus more on nonselling activities C common systems ensuring that sales managers follow common processes and procedures D improved training and less quotbusyworkquotallows a greater focus on selling and revenue generation E sharing of all salesrelated information facilitates successful team selling and the sharing of best practices 60 refers to using multiple communication channels to support the communication preferences of users such as the Web the company39s Facebook page industry blogs telephone and so on A Business intelligence B Customer interaction center C Enterprise marketing management D Execution management E Sales force automation 61 tools help a company in the execution of the CRM strategy by improving the management of promotional campaigns A Business intelligence B Sales force automation C Enterprise marketing management D Customer interaction center E Execution management 62 focuses on studying customer behavior and perceptions in order to provide the business intelligence necessary to identify new opportunities and to provide superior customer service A Analytical CRM B Sales force automation C Operational CRM D Collaborative CRM E Integrated CRM 63 Organizations that effectively utilize can more easily customize marketing campaigns from the segment level to even the individual customer A operational CRM B integrated CRM C analytical CRM D collaborative CRM E sales force automation 64 Which of the following business processes can be enhanced by the analytical CRM system A sales forecasting and performance analyses B account and contact management C price quality and satisfaction analysis of competitors D customer history and preferences management E order processing and tracking 65 refers to systems for providing effective and efficient communication With the customer from the entire organization A Analytical CRM B Sales force automation C Collaborative CRM D Operational CRM E Business intelligence 66 facilitate the sharing of information across the various departments of an organization in order to increase customer satisfaction and loyalty A Collaborative CRM systems B Data warehousing systems C Operational CRM systems D Analytical CRM systems E Data mining systems Chapter 9 Developing and Acquiring Information Systems 1 Which of the following statements best describes the productivity paradox for technology investment A The productivity of any technology is directly proportional to the investment in that technology B While it is easy to quantify the costs associated with developing an information system it is often difficult to quantify tangible productivity gains from its use C As investment in technology increases productivity decreases steadily D While it is easy to identify and quantify the intangible benefits of an information system it is not easy to quantify the tangible benefits E The productivity of an information system is in no way related to the investment in the technology 2 System efficiency is the extent to which a system A allows firms to reach their operational targets B allows people to plan tasks that are achievable C enables people to accomplish goals or tasks well D enables people to do things faster or at lower cost E allows employees to reduce the risks associated with tasks 3 Which of the following is true for system effectiveness A It is the extent to which a system enables the firm to accomplish goals well B It is the extent to which a system allows a firm to plan its tasks C It is the extent to which a system enables the firm to do things faster at lower cost D It is the extent to which a system allows a firm to cut operational costs E It is the extent to which a system enables people to accomplish tasks with relatively little time and effort 4 Which of the following scenarios demonstrates system efficiency A Barker39s new information system allowed the company to reach its monthly targets B Barker39s was able to easily reach its sales goals through the use of its information system C Barker39s new information system allowed the company to set achievable targets D Barker39s new information system helped employees to achieve their individual goals alongside the company39s goals E The new information system at Barker39s helped employees work faster with less effort 5 BelAir Tech replaced its outdated information system with a newer version As a result its employees reported a significant increase in work speed Which of the following is most similar to BelAir39s situation A Barker39s new information system allowed the company to reach its monthly sales target easily B Twining Co targeted a 5 percent increase in customer acquisition and achieved this with the new information system C Employees at Niven Ltd felt that customer satisfaction increased after the new information system was implemented D Castle39s new information system helped employees to achieve their individual goals alongside the company39s goals E At Sterling Inc the average number of application forms processed in an hour rose from 4 to 6 as a result of the new system 6 BampZ Inc implemented a new information system two months ago but there have been no concrete increases in productivity as a result of the system A similar system has been in place at the company headquarters for the past two years and this system has resulted in significant quantifiable benefits Which of the following reasons is the most likely explanation for the lack of results A The benefits of the new information system are difficult to pinpoint because the firm is considering the wrong indicators B The new system is being used to redistribute market share rather than make the whole market bigger C It can take years from the first implementation of this new system before the magnitude of benefits is felt by the organization D The benefits of the new information system are difficult to pinpoint because the firm is not familiar with the working of the system E The new system may be beneficial for individual firms but not for a particular industry or the economy as a whole 7 Business case arguments based on focus on beliefs about organizational strategy competitive advantage industry forces customer perceptions market share and so on A faith B fear C facts D fiction E fallacy 8 Business case arguments based on fear are based on A the belief that implementing the new information system can have significant positive consequences for the firm B beliefs about organizational strategy competitive advantage industry forces customer perceptions market share and so on C data quantitative analysis andor indisputable factors D the notion that if the system is not implemented the firm will lose out to the competition or go out of business E the results of a qualitative analysis of employee responses to the new information system 9 Business case arguments based on data quantitative analysis andor indisputable factors are known as arguments based on A fads B faith C facts D fear E fiction 10 Which of the following is an example of a business case argument based on fear A If we do not implement this system our competitors could gain a significant advantage over us B This system has the potential to reduce required effort by 40 percent C Using this system will help our employees serve customers more efficiently D The system can help us meet both individual as well as organizational goals E The new system is userfriendly and can be implemented almost immediately 11 The total cost of ownership of a system refers to A all nonrecurring costs associated with a system B all costs associated with ongoing use and maintenance of a system C the total cost of acquisition of a particular system D the total cost of acquisition and all costs associated with use and maintenance of a system B only the recurring costs associated with a system 12 Which of the following is an example of a recurring cost associated with an information system A installation charges B purchase of office space C employee salaries D technology purchases E cost of system acquisition 13 Which of the following is an example of an intangible cost for a system A cost of losing customers B employee salaries C cost of installation and maintenance D cost of employee recruitment and retention E customer support costs 14 BelAir Tech is conducting a costbenefit analysis for its IS department In this the salary of an employee is an example of an A intangible and tangible cost B tangible and recurring cost C intangible and recurring cost D tangible and nonrecurring cost E recurring and nonrecurring cost 15 Which of the following is true for tangible costs A They are only recurring costs B They are always nonrecurring costs C They are relatively easy to quantify D They are the same as intangible benefits E They are difficult to qualify 16 BelAir Tech implements a new information system and sees a 5 percent increase in monthly sales after implementation This is an of the system A intangible benefit B tangible cost C tangible benefit D recurring cost E nonrecurring cost 17 quotIncreased customer reach of the new Webbased system will result in at least a modest increase in salesquot This statement represents for the company A a recurring cost B an intangible cost C a tangible benefit D a nonrecurring cost E an intangible benefit 18 Which of the following is an example of an intangible benefit for a firm A lower transport and operational costs B a significant increase in sales C a reduction in operational errors D cost reductions as compared to preVious data E improved customer perceptions of the firm 19 A breakeven analysis A identifies at what point tangible benefits equal tangible costs B analyzes the relevant cash ow streams associated with the system at the organization39s discount rate C refers to the discounted sum or present value or a stream of costs associated with a project or proposal D attempts to summarize the overall value for money of a project or proposal E is the rate of return used by an organization to compute the present value of future cash ows 20 A method for deciding among different IS investments or when considering alternative designs for a given system is A transactional analysis B weighted multicriteria analysis C finite element analysis D independent component analysis E link quality analysis 21 are alternative measures of outcomes that can help clarify what the impact of a change will be for a firm A Proxy variables B Pseudocodes C Patches D Prototypes E Protocols 22 Which of the following is the main advantage of customizable software over offtheshelf software A cost effectiveness B ease of procurement C problem specificity D lower risks E userfriendliness 23 The first phase of the systems development life cycle is A systems design B systems implementation C systems analysis D systems planning and selection E systems operation 24 During the first phase of the systems development life cycle organizations A transform the system design into a working information system B identify plan and select a development project from all possible projects that could be performed C gain a thorough understanding of an organization39s current way of doing things in the area for which the new information system will be constructed D elaborate on the details of the chosen approach and design the system E decommission the current way of doing things and install the new system in the organization 25 The final phase of the systems development life cycle is A systems design B systems implementation C systems analysis D systems maintenance E systems operation 26 Requirements collection takes place during the phase of the systems development life cycle A systems design B systems implementation C systems analysis D systems maintenance E systems operation 27 is the process of gathering and organizing information from users managers customers business processes and documents to understand how a proposed information system should function A Data modeling B Requirements collection C Beta testing D Enduser development E External acquisition 28 is a group meetingbased process for requirements collection A Joint application design B Computeraided design C Humancomputer interface D Reverse engineering E Total ownership 29 represents the movement of data through an organization or within an information system A Data entities B Data ux C Data attributes D Data ows E Data modeling 30 represents the way in which data are transformed A Data parallelism B Processing logic C Data streaming D Process control E Transaction processing 31 Processing logic is often expressed in which is independent of the actual programming language being used A semantics encoding B prefix code C source code D semiotics E pseudocode 32 After systems analysis the next phase in the systems development life cycle is A systems implementation B systems operation C systems planning D systems maintenance E systems design 33 In an information system a is the point of contact between a system and users A biointerface B network interface C pointtopoint link D human computer interface E data link 34 A is a business document containing some predefined data often including some areas where additional data can be filled in A form B script C sheet D report E module 35 A is a business document containing only predefined data for online viewing or printing A form B script C sheet D report E module 36 The processing and logic operations of an information system refers to A the procedures for entering data into a system B the transfer of data across system components C the procedures that transform raw data inputs into new or modified information D the multiple points of contact between a system and users E the process of transforming the system design into a working computer system 37 Software programming and testing takes place during the stage of the systems development process A systems planning B systems analysis C systems maintenance D systems implementation E systems design 38 Which of the following best describes developmental testing A testing the correctness of individual modules and the integration of multiple modules B testing the system to see if it meets design requirements C testing of the capabilities of the system in the user environment with actual data D testing the system as a whole to see if it performs adequately E testing the system in an experimental context using sample data 39 testing is testing of the overall system to see whether it meets design requirements A Developmental B Beta C Evolutionary D Alpha E Comparative 40 Jason has just made some changes to the information system at BelAir Tech and wants to check if the system is working correctly He wants to conduct a beta test of the system Which of the following should he do to achieve this A He should ask other programmers to check the modules he changed B He should check to see if the changed components are integrated well into the system C He should ask users of the system to test it using actual data D He should ask the software tester to test if the changed system meets design requirements E He should test the changed modules for correctness 41 testing involves testing of the capabilities of the system in the user environment with actual data A Developmental B Beta C Evolutionary D Alpha E Comparative 42 Developmental testing of an information system is performed by A software testers B actual users C programmers D systems analysts E project managers 43 testing is performed by actual users of the system A Developmental B Beta C Evolutionary D Alpha E Comparative 44 Which of the following can be considered beta testing A A programmer at Linus Systems checks the integration of multiple modules of an information system B Software testers compare the finished system against user requirements to see if it satisfies all necessary criteria C Taro Inc checks the correctness of the modules of its new information system D System users at URP feed data into a new information system to test its capability E MNP Inc checks the system to ensure that it meets all the necessary design requirements 45 Programming is the process of A transforming the system design into a working computer system B testing the correctness of individual modules of a system C testing the integration of multiple modules of a system D transforming raw data inputs into new or modified information E gathering and organizing information from users and managers 46 is the process of decommissioning the current way of doing things and installing the new system in the organization A Reverse engineering B System programming C Adaptive maintenance D Patch management E System conversion 47 Which of the following is true for patch management A It helps in testing the correctness of individual modules and the integration of multiple modules of a system B It helps in the process of transforming the system design into a working computer system C It helps in performing corrective or preventive maintenance for a system D It helps in decommissioning the current system and installing the new system in the organization E It helps to develop system documentation that details the inner workings of the system to ease future maintenance 48 use the Internet to check the software vendor39s Web site for available fixes for problems The application downloads and installs these in order to fix software aws A Alpha testing systems B Proxy variables C Benchmarking systems D Patch management systems E Workarounds 49 The process of making changes to an information system to repair aws in design coding or implementation is known as A adaptive maintenance B perfective maintenance C preventive maintenance D corrective maintenance E predictive maintenance 50 The process of making changes to an information system to evolve its functionality to accommodate changing business needs or to migrate it to a different operating environment is known as A adaptive maintenance B perfective maintenance C preventive maintenance D corrective maintenance E predictive maintenance 51 Which of the following types of system maintenance involves making enhancements to improve processing performance or interface usability A adaptive maintenance B perfective maintenance C preventive maintenance D corrective maintenance E predictive maintenance 52 Preventive maintenance of a system involves A making changes to an information system to repair aws in the design B making enhancements to improve processing performance or interface usability C making changes to a system to reduce the chance of future system failure D adding desired but not necessarily required system features E making changes to an information system to accommodate changing business needs 53 BelAir Tech has a fivemember team in charge of the development and maintenance of its information systems An information system is in place and the team performs routine maintenance to keep it running smoothly Which of the following scenarios is an example of perfective maintenance A Jason notices a faulty component in the system and modifies the component B Justin works on the system to make the user interface more userfriendly C Sara knows that the company is migrating to a different operating environment in the next month and makes changes to the system D Dylan predicts that the company39s old system may fail under new demands and takes steps to avert this E Kiera detects a fault in the coding which is hampering system performance and rectifies it 54 BelAir Tech has a fivemember team in charge of development and maintenance of its information systems An information system is in place and the team performs routine maintenance to keep it running smoothly Which of the following scenarios is an example of adaptive maintenance A Jason notices a faulty component in the system and modifies the component B Justin works on the system to make the user interface more userfriendly C Sara knows that the company is migrating to a new operating environment in the next month and makes the appropriate changes to the system D Dylan predicts that the company39s old system may fail under new demands and takes steps to avert this E Kiera detects a fault in the coding which is hampering system performance and rectifies it 55 Which of the following is true for prototyping A It is a part of the fourth stage of the systems development life cycle B It is synonymous with adaptive maintenance of a system C It does not consider user requirements for the system D It uses a trialanderror approach for discovering how a system should operate E It is also known as enduser development 56 BelAir Tech needs a new information system to manage increasing customer orders and changing demands The company39s fivemember IS team is competent and capable of developing a new system but BelAir decides against developing a system inhouse Which of the following if true would most weaken BelAir39s decision A The company39s preferred vendor is willing to provide a basic information system at a reduced rate B The company39s IS team is shortstaffed and is finding it difficult to cope with increased work C The costs of outsourcing systems development are greater than those of adapting an offthe shelf system D The company39s IS department has the qualifications to develop the new system E The company39s requirements for the new system are very specialized 57 Which of the following steps takes place in an organization during both inhouse systems development as well as external acquisition A vendor selection B systems selection C systems analysis D development of an RFP E proposal evaluation 58 BelAir has decided to buy an information system from an external vendor The company has made a list of its requirements and asked prospective vendors to submit proposals for the system Which of the following is the next step in the company39s external acquisition process A systems planning B systems analysis C vendor selection D proposal evaluation E system installation 59 Which of the following statements is true for a request for proposal A It is a form sent by vendors to potential customers B It requests vendors to provide a complete list of all their products C It invites customers to bid for a product offered by a vendor D It is a summary of the vendor39s offerings to a client E It is a list of user requirements sent to prospective vendors 60 is the use of standardized performance tests to facilitate comparison between systems A Beta testing B Systems benchmarking C Data modeling D Systems prototyping E Alpha testing 61 BelAir has submitted a request for proposal to a number of vendors It must now evaluate the proposals it has received Which of the following methods can it use to compare the different systems A systems benchmarking B alpha testing C data modeling D beta testing E prototyping 62 licenses are activated as soon as the packaging of the software has been removed A Clickwrap B Shareware C Shrinkwrap D Volume E Implied 63 An license refers to a license primarily used for downloaded software that requires computer users to choose quotI acceptquotbefore installing the software A click wrap B shareware C enterprise D volume E implied 64 An enterprise license is also known as an license A shrinkwrap B volume C clickwrap D shareware E implied 65 Which of the following is true for software as a service A It is not scalable in response to large increases in demand B It involves fixed monthly and yearly costs for the services C It requires the installation of specialized interfaces at the client end D It allows clients to access services on an asneeded basis E It requires an organization to maintain and develop the software 66 BelAir Tech has developed and run its own information system for the past ten years However the company has now decided to outsource its IS function to a service provider Which of the following if true will strengthen BelAir39s decision A BelAir39s IS team developed the existing system from scratch and has ironed out most faults over the years B The service provider is highly recommended by its other clients C Most BelAir employees are familiar with the current information system D BelAir has seen a fall in company revenue over the last year E Outsourcing its IS function did not benefit BelAir39s competitor Amis Systems 67 Which of the following is an example of a basic relationship between an outsourcing vendor and client A STS Systems usually offers BelAir a discount on every purchase it makes B BelAir sets its system preferences according to STS products C BelAir buys a system from the vendor who offers the cheapest prices D STS has a direct stake in the success of BelAir39s performance E STS modifies its product prices according to BelAir39s requirements Chapter 10 Securing Information Systems 1 A group of inexperienced computer operators cause the loss of valuable information This information loss can be classified as one caused due to A natural disasters B interactions with consultants C accidents D links to outside contacts E external forces 2 Which of the following is the most complete definition of a computer crime A the act of using a computer to commit an illegal act B processing private information from an official computer system C unauthorized use of a computer device or patented software D stealing of computer devices or software licenses E unauthorized access of passwords and personal information 3 Which of the following is one of the main federal laws in the United States against computer crimes A Satellite Act of 1962 B Trade Expansions Act of 1962 C United States Information and Educational Exchange Act D Central Intelligence Agency Act E Electronic Communications Privacy Act of 1986 4 The Computer Fraud and Abuse Act of 1986 prohibits A accessing company email or other such confidential information from public computers B threatening to damage computer systems in order to extort money or other valuables C the use of encoded chips to provide access to companies39 confidential information D contracting with consultants outside the United States to process key information E gaining access to voicerelated communications for investigation or any other purpose 5 Which of the following US laws amended the Computer Fraud and Abuse Act to allow investigators access to voicerelated communications A the Electronic Communications Privacy Act B the Computer Abuse Amendments Act C the USA Patriot Act D the Foreign Intelligence Surveillance Act E the Family Educational Rights and Privacy Act 6 Which of the following acts have made it a crime to break into any electronic communications service including telephone services A the Electronic Communications Privacy Act B the Foreign Intelligence Surveillance Act C the Computer Fraud and Abuse Act D the USA Patriot Act E the Family Educational Rights and Privacy Act 7 Violating data belonging to banks or other financial institutions is a crime in the United States Which of the following legislations prohibit such violations A the Foreign Intelligence Surveillance Act B the Computer Fraud and Abuse Act C the USA Patriot Act D the Banking Rights and Privacy Act E the Electronic Communications Privacy Act 8 Some violations of state and federal computer crime laws are punishable by fines and by not more than one year in prison Such violations are charged as A misdemeanors B felonies C federal crimes D indictments E record sealings 9 Some computer criminals attempt to break into systems or deface Web sites to promote political or ideological goals They are called A hacktivists B crackers C ethical hackers D patriot hackers E cyber soldiers 10 Today people Who break into computer systems With the intention of doing damage or committing a crime are usually called A hackers B hacktivists C patriot hackers D cyber soldiers E crackers 11 WikiLeaks is a famous notforprofit Whistleblowing Web site MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this These attackers Who tried to protect WikiLeaks can be called A hacktivists B crackers C ethical hackers D patriot hackers E cyber soldiers 12 Employees steal time on company computers to do personal business This can be considered an example of A unauthorized access B hacking C Web vandalism D cyberstalking E cyberbullying 13 An is a destructive program that disrupts the normal functioning of computer systems A virus B worm C Trojan horse D spam E adware 14 In May 2000 a malware email With quotI LOVE YOUquotin the subject field spread to numerous computers in the world The program replicated itself to everyone in the user39s Outlook address book and then destroyed local files This love email forced several organizations to shut down their email systems The malware discussed here is an example of a A Trojan horse B spyware C computer virus D spam E logic bomb 15 Ronald downloads a movie from the Internet During this process his system gets affected by malicious software The file does nothing initially and his system functions as usual for a few days Later the file reproduces itself and starts to slow down his system In a month39s time his system is fully affected by the malware Which of the following is most similar to the situation described here A Albert visits a travel Web site to book a ight from New York to Los Angeles He visits the Web site from his computer after 15 days and his home page is set by default to book return tickets from Los Angeles to New York B Mary39s computer gets affected by malicious software Her computer appears to be performing as usual though the malware is performing underlying functions dictated by the intrusive code C Andrew uses Windows operating system A malicious code affects his computer and changes the name of his Internet explorer to ABC Net The malware steals his personal information by remaining as a host D Robert receives a mail with the subject line quotI am herequot When he opens the mail he loses all the local files and the file is sent to all the contacts in his outlook ID E Anderson receives a malware file through email On January 1st the malware alters the name of his local files and displays funny names 16 An is a variation of a virus that is targeted at networks and takes advantage of security holes in operating systems and other software to replicate endlessly across the Internet This causes servers to crash and denies service to Internet users A spyware B worm C virus D Trojan horse E DOS virus 17 The official Web site of the Iranian government was made unreachable by foreign activists seeking to help the opposition parties during the 2009 Iranian election protests Web sites belonging to many Iranian news agencies were also made unreachable by the activists This cyber protest is an example of an attack A denial of service B logic bombs C Trojan horse D online predator E bot herder 18 refers to any software that covertly gathers information about a user through an Internet connection without the user39s knowledge A Spyware B Spam C Web filter D Cookie E Bot herder 19 Which of the following terms represents junk newsgroup postings used for the purpose of advertising for some product or service A spam B adware C cookie D Internet hoax E Web filter 20 Robert receives a mail which says he has won an online lottery worth 50 Billion Robert was wondering how he could win it without even buying the lottery It was a spam mail intended to obtain the bank account details and the credit card number of Robert Such attempts to trick financial account and credit card holders are called A logic bombing B spim hacking C phishing D tunneling E cyberterrorism 21 Phishing refers to the A attempts to trick financial account and credit card holders into giving away their authorization information B process of causing system instability or system crashes to steal information from client computers across a network C practice of providing free software paid for by advertisements appearing during the use of the software D act of ooding customers with unwanted information images and other marketable information E process of installing a software in the customers39 browser to extract personal information of users 22 Which of the following is a message passed to a Web browser on a user39s computer by a Web server A cookie B botnet C honeypot D spim E spam 23 When using Yahoo Messenger you get an unsolicited advertisement from a company This advertisement contained a link to connect to the merchant39s Web site Which of the following is the best way of classifying this advertisement A Adware B Cookie C Internet hoax D Spim E cyber squat 24 Which of the following is the most accurate definition of a botnet A group of hackers working together to obtain unauthorized access to a system or network B spider software used by a search algorithm to crawl various Web sites to return a query C group of destructive softwares working independently to achieve a common goal D a common platform used by search engines to index the contents of a Web site E destructive software robots working together on a collection of zombie computers via the Internet 25 A hacker takes an individual39s social security number credit card number and other personal information for the purpose of using the victim39s credit rating to borrow money buy merchandise and otherwise run up debts that are never repaid This practice is called A identity theft B cyberstalking C cyberbullying D internet spamming E internet hoaXing 26 are false messages often circulated online about new viruses earthquakes kids in trouble cancer causes or any other topic of public interest A Internet hoaxes B Honeypots C Cookies D Logic bombs E Malware 27 Arbitron consultants a leading software consulting firm in the United States decide to launch ERP an ERP Solution The company chooses the brand name ArbitEnterprise for the new solution However when the company attempted to register the domain name it found that the domain name was registered to an unknown firm The small firm is now attempting to sell the domain name to Arbitron Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks A cybersquatting B logic bombing C cyberbullying D hot backing up E cyberstalking 28 Identify the term that represents the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person company or organization most likely to want it A cybersquatting B cyberstalking C cyberbullying D cyberwar E cyberharassment 29 Cyber criminals gain information on a victim by monitoring online activities accessing databases and so on and make false accusations that damage the reputation of the victim on blogs Web sites chat rooms or ecommerce sites Such acts are called A cybersquatting B cyberstalking C cyberbullying D cyberwar E cyberboating 30 Which of the following refers to the practice of deliberately causing emotional distress in the victim A cyberbullying B cyberboating C cyberstalking D bot herdering E cybersquatting 31 Which of the following creations typically obtain patent rather than copyright A material inventions B software C music files D literature E paintings 32 An organized attempt by a country39s military to disrupt or destroy the information and communication systems of another countryWhich of the following terms best represents such attacks by a country A cyberwar B Internet hoaXing C cyber terrorism D Web vandalism E logic bomb 33 Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called A patriot hackers B bot herders C online predators D hacktivists E ethical hackers 34 Jester is a famous hacker who describes himself as a quothacktivist for goodquot He launches attacks on terrorist sites that pose threats to nations Jester claims that he is obstructing the lines of communication for terrorists sympathizers fixers facilitators oppressive regimes and other general bad guys Jester can be called an A ethical hacker B cyber terrorist C bot herder D patriot hacker E honeypot 35 is the use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments civilians or any segment of society in order to attain political religious or ideological goals A Cyberterrorism B Web vandalism C Cyberwar D Patriot hacking E Cyberbullying 36 A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested the country39s policies The attack involved a denialof service in which selected sites were bombarded with traffic to force them of ine This is an example of A cyberterrorism B logic bombing C hot backing up D cyberbullying E cybersquatting 37 refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning recruitment and numerous other endeavors A Data mining B Information dissemination C Data mobilization D Cyber audit E Cybersquatting 38 Which of the following is a significant disadvantage to using acts of cyberterrorism as a weapon A Cyberattacks are difficult to control and may not achieve the desired destruction B Information destruction is not often considered crucial by opposing nations C Cyberattacks cause more emotions in the public than the actual material destruction caused D Cyberattacks lead to more drama than physical attacks and could lead to severe action against them E Such attacks cannot be used against the military and governmental departments 39 refers to precautions taken to keep all aspects of information systems safe from destruction manipulation or unauthorized use or access A Information systems security B Information systems management C Information systems organization D Information systems audit E Information systems control 40 Which of the following is a process in which you assess the value of the assets being protected determine their likelihood of being compromised and compare the probable costs of their being compromised with the estimated costs of whatever protection you might have to take A risk analysis B information systems audit C physical access analysis D operational analysis E data authentication 41 An organization takes active countermeasures to protect its systems such as installing firewalls This approach is A risk reduction B risk acceptance C risk rescheduling D risk transference E risk postponing 42 An organization does not implement countermeasures against information threats instead it simply absorbs the damages that occur This approach is called A risk acceptance B risk reduction C risk mitigation D risk transference E risk rescheduling 43 Ciscon Telecom is a mobile operator in the European Union The company provides personalized services to its customers and its databases contain valuable information about its customers The loss of customer information used to decide services would be extremely harmful to the organization Which of the following strategies used by Ciscon is an example of risk transference A The company insures any possible data loss for a large sum B The company forms a special team of top executives to monitor and correct the information policies C It installs a corporate firewall to protect unauthorized access to information D It enforces a strict employee data policy and prohibits employees from unauthorized access E The company decides to absorb any damages that might occur 44 RBS Publishing is a leading media company in France The company handles sensitive information and often finds it susceptible to information threats As a counter measure the company installs strong firewalls and protective software These steps are a part of strategy A risk acceptance B risk reduction C risk mitigation D risk transference E risk rescheduling 45 An organization is using physical access restrictions to safeguard information systems when it uses A auditcontrol software B firewalls C encryption D passwords E secure data centers 46 Your company uses a fingerprint recognition system instead of an access card This helps the company prevent unauthorized physical access Which of the following technologies is used for restriction here A biometrics B virtual private networks C secure tunneling D accesscontrol software E encryption 47 An organization is using biometrics when it uses to identify employees A fingerprints B access cards C pattern formations D bar codes E code numbers 48 software allows computer users access only to those files related to their work A Accesscontrol B Firewall C Auditcontrol D Denialofservice E Risk analysis 49 An attacker accesses a network intercepts data from it and uses network services and sends attack instructions to it without entering the home office or organization that owns the network This new form of attack is known as attack A driveby hacking B hacktivist C honeypot D cybersquatting E denialofservice 50 AlbitreX Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe The company is heavily dependent on Internet for transporting data The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised Which of the following would be most helpful to the company in achieving this goal A spam filtering B hot backing up C tunneling D open transmitting E disaster recovery planning 51 Which of the following is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network A firewall B cookie C botnet D honeypot E spam filter 52 Which of the following is a valid observation about encryption A Encrypted messages cannot be deciphered without the decoding key B It is used for data enhancement rather than data protection C Encryption is performed only after the messages enter the network D The encryption approach is not dependent on the type of data transmission E Encryption implementation should be performed without involving third parties 53 Implementing encryption on a large scale such as on a busy Web site requires a third party called an A certificate authority B virtual private network C arbitrative authority D control center E backup site 54 software is used to keep track of computer activity so that inspectors can spot suspicious activity and take action A Accesscontrol B Firewall C Auditcontrol D Denialofservice E Risk analysis 55 A cold backup site is an A empty warehouse with all necessary connections for power and communication B warehouse that contains noncritical information C warehouse that contains information on metadata rather than operational data D database that contains historical information and data E database that is used less frequently than other databases 56 An organization builds a fully equipped backup facility having everything from office chairs to a onetoone replication of the most current data This facility is called an backup site A replica B recurring C hot D virtual private E collaborative 57 Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power backups connectivity and security Such data centers are called A collocation facilities B hot backup sites C zombie computers D offshore networks E virtual private networks 58 Which of the following terms refers to a computer data or network site that is designed to be enticing to crackers so as to detect de ect or counteract illegal activity A honeypot B firewall C bot herder D botnet E zombie computer 59 The policy explains technical controls on all organizational computer systems such as access limitations auditcontrol software firewalls and so on A account management B security C incident handling D information E disaster recovery 60 Identify the policy that lists procedures for adding new users to systems and removing users who have left the organization A information policy B use policy C incident handling procedures D disaster recovery plan E account management policy 61 Which of the following types of plans describes how a business resumes operation after a disaster A business continuity plan B internal operations plan C collocation facilities plan D emergency operation plan B virtual private network plan 62 Recovery point objectives of a recovery plan specify A the maximum time allowed to recover from a catastrophic event B data structures and patterns of the data C the minimum time allowed to recover from a catastrophic event D how current the backup data should be E the capacity of a backup server in storing the necessary data 63 Controls that are used to assess whether anything went wrong such as unauthorized access attempts are called controls A detective B preventive C corrective D adaptive E protective 64 Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls This process is called A an information systems audit B risk analysis C information modification D a recovery point objective analysis E a recovery time objective analysis 65 Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse or fraud controls to detect any potential problems and effective measures to correct any problems A SarbanesOxley Act B Trade Expansions Act of 1962 C Electronic Communications Privacy Act of 1986 D Central Intelligence Agency Act E USA Patriot Act 66 Which of the following types of control is used to define the aims and objectives of an organization A standards B procedures C schemes D policies E systems 67 Which of the following is an example of organization and management control A policies about incident reporting B collocation facilities at an organization C general policies about rights of access D generation of actiVity logs of employees E general policies about disaster planning LING 110 Language and Mind EXAM 1 Review Questions for Discussion c Why were his works significant 1 What is the wug test and what does it tell us about language 5 Who coined the terms langue and parole and what do they mean a provide plural forms of the following 1 wug and 2 wuk a How might this relate to our conclusions about language which we derived from the wug test i What are the differences in the sounds of each plural suffix b What s1milar contrast1ve terms d1d a later 11ngu1st c01n wh1ch ii Why is the sound difference in pluralization important and what resemble these does it signify 6 Why are Franz Boas and Edward Sapir important in Linguistics 2 What two views of language amp meaning did Plato consider a What did they encounter in their research of Native American a What are the possible relations between words and meanings languageS i What did Plato conclude b What did they conclude about command of a language in order to understand it 3 What is the difference between being prescriptive and being descriptive 7 What is structuralism and who proposed it a Under wh1ch category do trad1t10nal Lat1n grammars fall and why a How did this theory contribute to the study of language 4 What were Panini s contributions to linguistics and language study 8 How does classical conditioning relate to linguistics a When did Panini livewrite b When were his works rediscovered a Where does the term classical conditioning come from LING 110 Language and Mind EXAM 1 Review b What does it imply for stimulus and response c How does it relate to operant conditioning 9 What is behaviorism and who proposed it a What famous book was published in 1957 that proposed a behaviorist view of language b Why does behaviorism fail as a model of language acquisition 10 What is generative linguistics and who proposed it a What book marked the beginning of generative linguistics b Who originally distinguished linguistic competence from linguistic performance and to what does each refer i What are surface structure and deep structure and why are they important ii What is the importance of syntactic structure and what examples can you give to illustrate this importance c What are language universals d What is universal grammar UG 11 What are the propositions of rationalism relevant to linguistics a List the properties of rationalism discussed in class and explain their significance b What philosophers and linguists are associated with this philosophical framework 12 What are the propositions of empiricism relevant to linguistics a List the properties of empiricism discussed in class and explain their significance b What philosophers and psychologists are associated with this philosophical framework 13 What is the IndoEuropean language family a Fill in the blanks for the following simplified language family tree make sure to include English BaltoSlavic Celtic Albanian Hellenic Armenian Anatolian IndoIranian Tocharian LING 110 Language and Mind EXAM 1 Review 9 d German Yiddish Norwegian Swedish Is English Latinate or Germanic Portuguese Spanish Catalan French What is the difference between descent and borrowing and what is an example of each a How might these distinctions question the notion that English is a corrupt form of either Latin or Greek What is ProtoIndoEuropean What are some language families other than IndoEuropean 14 What is the SapirWhorf hypothesis a What are the two parts of this hypothesis b What are strong and weak forms of this hypothesis c What are some examples we discussed in relation to this hypothesis i ii iii d Which examples support the SapirWhorf hypothesis and why e Which examples do not support the hypothesis and why f What is mentalese and how does it relate if at all to the Sapir Whorf hypothesis 15 What are the various theories for the origins of language 16 What type of sound change is taking place in the following words and why is this pertinent to linguistics timr gt timber cemti gt empty spinel gt spindle a Other than sound changes what other types of language change have we discussed or read about LING 110 Language and Mind EXAM 1 Review oral amp written language Leonard Bloomfield structuralism Wilhelm Wundt introspection Note These questions are not intended to be exhaustive in their coverage of PaVlOV the material for Exam 1 Additional terms and concepts from the lectures discussions and readings which are not provided above may also appear on the exam Terms Concepts amp People to Know wug test tacit knowledge Plato Roman Latin grammars prescriptive v descriptive Panini Ferdinand de Saussure langue v parole Franz Boas Edward Sapir stimulus amp response John B Watson B F Skinner behaviorism Noam Chomsky competence v performance generative linguistics innateness hypothesis surface v deep structure rationalism classical conditioning operant conditioning Middle English Modern English diachronic variationchange synchronic variationchange external change internal change language amp thought Benjamin Lee Whorf SapirWhorf Hypothesis linguistic determinism empiricism Sir William Jones IndoEuropean ProtoIndoEuropean borrowing descentlineage language similarities Old English linguistic relativ snow fire amp tl implicational hit color terms perceptual univc John Lucy cardboard boxes LING 110 Language and Mind EXAM 1 Review Note This is not a comprehensive list Terms from the lectures discussions and readings which are not provided above may also appear on the exam Also remember to pay attention to boldface terms in the textbook
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'