You are on page 1of 13

6 2) An example of scripting language such as AJAX on current web sites is all the following EXCEPT: (1point) Window Live

Hotmail. GMail. Google Maps. All of the above. 6) Content management systems have a variety of user access which include all EXCEPT: (1point) guest. editor. creator. provider. Score: 0 Answer(s): provider 10) Customized printing that is done in small batches via Internet web sites is called? (1point) RSS feeds Open source printing Printing-on-demand Print blogs Score: 0 Answer(s): Printing-on-demand A project with team members in India, Germany and New York is also known as a(n) ________ project. (1point) virtual teams collaborative teams electronic teams synchronous teams Score: 1 Answer(s): virtual teams used existing Internet infrastructure to access local or remote data without having to know the complexities of this access. (1point) Score: 0 Answer(s): Web services Test 6 1) Web 2.0 offers all of the following technologies EXCEPT: AJAX. ECommerce. (1point) social networking. RSS feed. Score: 0 Answer(s): ECommerce. 2) Which Web 2.0 Pillar centers on using the Internet not just as a addon to the PC? (1point) Harnessing collective intelligence Leveraging the data Utilizing the Web as a platform Implementing innovative Web capabilities Score: 0 Answer(s): Utilizing the Web as a platform 3) Which Web 2.0 Pillar asks sites to base their businesses on "powerful" databases? (1point) Harnessing collective intelligence Implementing innovative Web capabilities Leveraging the data Utilizing the Web as a platform Score: 0 Answer(s): Leveraging the data 4) Which Web 2.0 Pillar suggests that scripting languages and dynamic composition of content is an important factor for Web 2.0 businesses? (1point) Utilizing the Web as a platform Leveraging the data Harnessing collective intelligence Implementing innovative Web capabilities Score: 0 Answer(s): Leveraging the data 5) ________ allow data to be accessed without intimate knowledge of other organization's systems, enabling machine-to-machine interaction over the Internet. (1point) Web services Widgets Peer-to-peer AJAX Score: 1 Answer(s): Web services 6) Web services have several benefits including: no programming required. utilizing the existing Internet. peer-to-peer. widgets. (1point) Score: 1 Answer(s): utilizing the existing Internet. 7) With Web services you can access which of the following? Maps (1point) Remote or local data without knowing the complexities Search All of the above are Web services. Score: 1 Answer(s): All of the above are Web services. 8) Which company pioneered widgets on its early versions of its operating system? (1point) Microsoft Linux Google Apple Score: 0 Answer(s): Apple 9) Which of the following are examples of tools that create Mashups? (1point) Microsoft Popfly Yahoo! Pipes Google Mashup Editor Apple Widgets Score: 0 Answer(s): Apple Widgets 10) Which of the following allows users to easily access, share, post and transfer documents back and forth using a web interface? (1point) Mashups Microsoft Popfly Collaboration tools Email Score: 0 Answer(s): Collaboration tools 11) MS Outlook, Blogger.com and Wikipedia are examples of which type of collaborative tools? (1point) Electronic conferencing tools Electronic communication tools Collaboration management tools Content communication tools Score: 0 Answer(s): Electronic communication tools 12) Google Docs, MS OfficeLive, MS SharePoint are examples of which type of collaborative tools? (1point) Collaboration management tools Electronic conferencing tools Electronic communication tools Content communication tools Score: 0 Answer(s): Collaboration management tools 13) This tool is used to facilitate virtual or co-located meetings and manage group activities: (1point) Electronic communication tools. Electronic conferencing systems. Collaboration management tools. Content management systems. Score: 1 Answer(s): Collaboration management tools. 14) Which one of the following is NOT a candidate for Web 3.0? (1point) Open technologies Web services World wide database Open ID Score: 0 Answer(s): Web services 15) ________ , a possible Web 3.0 technology, uses agents, machine learning, and semantic Web concepts to complete "smart" tasks

for users. (1point) Open technologies Intelligent applications World wide database Open ID Score: 0 Answer(s): Intelligent applications 16) ________ , a possible Web 3.0 technology, allows the ability for databases to be distributed and accessed from anywhere. (1point) Open ID World wide database Intelligent applications Open technologies Score: 0 Answer(s): World wide database 17) ________ can be simply thought of as data about data. Blogging Open data (1point) Metadata Tagging Score: 0 Answer(s): Metadata 18) Nicholas Carr, noted technology journalist, classifies blogging as what? (1point) True journalism The new newspaper A danger Amateurization of journalism Score: 0 Answer(s): Amateurization of journalism 19) This is also known as podcasting or the distribution of digital media. (1point) Vlogging Tagging Syndicating Podcasting Score: 0 Answer(s): Podcasting 20) This is a family of syndication feeds used to publish the most current blogs, podcasts, videos, and news stories. (1point) Google's Open source iTunes Real Simple Syndication Score: 0 Answer(s): Real Simple Syndication 21) When collaborating on a project ________ communication means at the same time. (1point) synchronous standards asynchronous virtual Score: 0 Answer(s): synchronous 22) ________ comprised of members from different geographic areas, are assembled to collaborate on a project. (1point) Synchronous teams Virtual teams Collaborative teams Electronic teams Score: 0 Answer(s): Virtual teams 23) A project with team members in India, Germany and New York is also known as a(n) ________ project. (1point) electronic teams synchronous teams collaborative teams virtual teams Score: 0 Answer(s): virtual teams 24) The most popular social networking site in March of 2008 was? (1point) Facebook.com Classmates.com MySpace.com Bebo.com Score: 0 Answer(s): MySpace.com 25) BMW creating a series of short films by popular directors and allowing them to be easily distributed on the Internet is known as? (1point) Viral marketing virtual networking Blogging effect Social networking Score: 0 Answer(s): Viral marketing 26) Eli Lilly created a site called InnoCentive, where companies can post scientific problems, and everybody can take a shot at solving the problem. This is called? Network effect Social networking Viral marketing Crowdsourcing (1point) Score: 1 Answer(s): Crowdsourcing 27) oih has been used to express the change in strategies of EC-based businesses. (1point) Score: 0 Answer(s): Web 2.0 28) According to Tim O'Reilly, jb includes such things as wikis, blogs, keyword ads and tagging content. (1point) Score: 0 Answer(s): Web 2.0 29) iouh , a Web 2.0 pillar, calls for companies to constantly monitor and upgrade their systems. (1point) Score: 0 Answer(s): Implementing Innovative Web Capabilities 30) uioh is the technology used to connect any device using any network to any service. (1point) Score: 0 Answer(s): Web services Quiz 7 1) ________ attacks occur when electronic intruders deliberately attempt to prevent legitimate users from using that service (1point) Manipulation Information modification Brute-force Denial of service Score: 0 Answer(s): Denial of service 6) ________ is a type of software for securing information systems by only allowing specific users access to specific computers, applications, or data. (1point) Access control software Computer security software Application restriction software Data protection software Score: 0 Answer(s): Access control software 9) A firewalls are typically configured: in one standard way. to limit Internet access for employees. many different ways. None of the above. (1point) Score: 0 Answer(s): many different ways. 12) Other technological safeguards to protect against security breaches include all EXCEPT: (1point) backups. closed-circuit television. uninterruptible power supply. All of the above can help to protect against security breaches. Score: 0 Answer(s): All of the above can help to protect against security breaches. attacks occur when electronic intruders deliberately attempt to prevent legitimate users from using that service. (1point) Score: 0 Answer(s): Denial of service Test 7 1) Unauthorized access can be achieved by:

physically stealing computers. stealing storage media. (1point) opening files on a computer that has not been set up to limit access. all of the above. Score: 1 Answer(s): all of the above. 2) ________ are a type of virus that target networks and take advantage of operating system security holes to replicate endlessly. (1point) Worms Denial of service Brute-force Manipulation Score: 0 Answer(s): Worms 3) To execute denial of service attacks, intruders often use ________ computers. (1point) robot monster zombie android Score: 0 Answer(s): zombie 4) ________ is any software that covertly gathers information about a user though an Internet connection without the user's knowledge. (1point) Spyware Viruses Worms Adware Score: 0 Answer(s): Spyware 5) Some spam consists of ________, asking you to donate money to nonexistent causes or warning you of viruses and other Internet dangers that do not exist. (1point) hoaxes tricks pranks threat Score: 0 Answer(s): hoaxes 6) Spoofing or ________ is an attempt to trick the users into providing financial account, social security or other personal information via email. (1point) luring spim tricking phishing Score: 1 Answer(s): phishing 7) ________ is a method of authentication which uses images that cannot be read by computers. (1point) Image map CAPTCHA Double authentication Image types Score: 0 Answer(s): CAPTCHA 8) ________ is when the browsers stores information about a user in a text file that can be accessed by server at a later time. (1point) Text file Cookie Identifier Message Score: 0 Answer(s): Cookie 9) ________ is implementing no countermeasures and simply absorbing any damage. (1point) Risk acceptance Risk reduction Risk transfer Risk audit Score: 0 Answer(s): Risk acceptance 10) Risk analysis is a process in which you: assess the value of the assets being protected. (1point) determine the likelihood of the assets being compromised. compare the probable costs of the assets being compromised with the estimated costs of whatever protection you might have to take. All of the above. Score: 1 Answer(s): All of the above. 11) Physical access is usually limited by making it dependent on: (1point) something you know. something you are. something you have. all of the above. Score: 1 Answer(s): all of the above. 12) ________ uses identification by fingerprints, retinal patterns in the eye, body weight, and so on. (1point) Biomeasurement Bio-identify Biometrics Bioinformatics Score: 0 Answer(s): Biometrics 13) ________ are radio waves that can be accessed from hundreds of feet away and are important to configure secure access. (1point) Wireless local area network Local area network Wide area network Personal area network Score: 0 Answer(s): Wireless local area network 14) A virtual private network uses ________ to encapsulate, encrypt, and transmit data over the Internet infrastructure, enabling business partners to exchange information in a secured, private manner between organizational networks. (1point) tunneling encapsulation enclosing encryption Score: 0 Answer(s): tunneling 15) ________ is hardware or software designed to keep unauthorized users out of network systems. (1point) A firewall A network filter Network protection software A wall Score: 0 Answer(s): A firewall 16) ________ is the prevention of unauthorized access to a computer network by a firewall at the data packet level; data packets are accepted or rejected based on predefined rules. (1point) Packet filtering Proxy server Application level control Circuit-level control Score: 0 Answer(s): Packet filtering 17) ________ is the process of hiding computers' true network addresses by replacing the computers' IP addresses with a firewall's address; thus, potential attackers only "see" the network address of the firewall. (1point) Network address translation Application level control Circuit-level control Packet filtering Score: 0 Answer(s): Network address translation 18) A firewall ________ is the manner in which a firewall is implemented such as hardware only, software only, or a combination of hardware and software. topography layout topology architecture (1point) Score: 1 Answer(s): architecture 19) ________ is the process of encoding messages

before they enter the network or airwaves, then decoding them at the receiving end of the transfer, so that only the intended recipients can read or hear them. (1point) Authentication Authorization Encapsulation Encryption Score: 1 Answer(s): Encryption 20) ________ is the process of confirming the identity of a user who is attempting to access a system or Web site. (1point) Integrity Nonrepudiation Authentication Privacy/confidentiality Score: 0 Answer(s): Authentication 21) A(n) ________ system is an encryption system where both the sender and recipient use the same key for encoding (scrambling) and decoding the message. (1point) certificate authority asymmetric key public key symmetric key Score: 1 Answer(s): symmetric key 22) A ________ is a trusted middleman between computers that verifies that a Web sites is a trusted site and is used when implementing publickey encryption on a large scale. (1point) public key generator certificate authority certificate provider verification service Score: 0 Answer(s): certificate authority 23) ________, developed by Netscape, is a popular public-key encryption method used on the Internet. (1point) Secure sockets layer RSA Clipper chip Pretty good privacy Score: 0 Answer(s): Secure sockets layer 24) ________ is a set of activities for detecting and preventing unwanted harmful computer software. (1point) Virus prevention Security test software Computer monitoring software Internet security software Score: 0 Answer(s): Virus prevention 25) Human-based safeguards include: federal and state laws. (1point) effective management. ethical behavior. All of the above. Score: 1 Answer(s): All of the above. 26) An information systems security plan involves: assessing risks. planning ways to reduce risks. plan implementation and ongoing monitoring. All of the above. (1point) Score: 1 Answer(s): All of the above. 27) To ________ means to synchronously store data on independent systems to achieve redundancy for purposes of reliability and/or performance. (1point) mirror synchronize reflect merge Score: 0 Answer(s): mirror 28) Policies and procedures related to computer security include the following EXCEPT: (1point) information policy. prevention policy. security policy. backup policy. Score: 1 Answer(s): backup policy. 29) ________ is a set of best practices that help organizations to both maximize the benefits from their information systems infrastructure, while at the same time establishing appropriate controls. (1point) S-OX COBIT CMMS CAAT Score: 0 Answer(s): COBIT 30) A(n) iyg is a distorted image displaying a combination of letters and/or numbers a user has to input in a form. (1point) Score: 0 Answer(s): CAPTCHA Quiz 8 4) Some examples of the outputs created by a transaction processing system include: (1point) counts and summary reports. recommendations and advice. trends and summary reports. scheduled and ad hoc reports. Score: 0 Answer(s): counts and summary reports. 7) Analyzing the data on subsets such as by product type or region only for the second quarter of 2009 is called? (1point) OLAP cube Slicing and dicing Measures Dimensions Score: 0 Answer(s): Slicing and dicing 12) An example of a decision analysis tool which is most commonly used with a DSS is: (1point) Microsoft PowerPoint. Microsoft Word. Microsoft Excel. Microsoft FrontPage. Score: 1 Answer(s): Microsoft Excel 13) Functional area information systems are ________ level information systems that are designed to support a discrete area of an organization. (1point) managerial operational executive cross-organizational Score: 0 Answer(s): cross-organizational 14) Examples of the types of activities that can be supported by expert systems include: (1point) medical diagnosis and computer user help desk. financial management and forecasting. payroll processing and inventory management. advertising and product pricing. Score: 0 Answer(s): medical diagnosis and computer user help desk. Test 8 1) An organizations have turned to ________ to gather and analyze information from internal and external sources in order to make better decisions. (1point) internet business intelligence corporate partnerships consultants Score: 0 Answer(s):

business intelligence 2) Business intelligence can be collected from which of the following? (1point) Spreadsheets Reports Internet All of the above. Score: 1 Answer(s): All of the above. 3) Successful organizations are utilizing a(n) ________ to continuously plan, monitor and analyze business processes. (1point) continuous planning process Internet OLAP continuous updating Score: 0 Answer(s): continuous planning process 4) An example of a(n) ________ information system is an inventory management system for a shoe store that keeps track of inventory and issues an order for additional inventory when levels drop below a specified level. functional executive managerial operational (1point) Score: 1 Answer(s): operational 5) A production manager at Reebok uses information about sales forecasts for several product lines provided by a(n) ________ information system to create multiple production schedules. (1point) managerial-level executive-level organizational-level operational-level Score: 0 Answer(s): managerial-level 6) ________ decisions deal with complex problems with broad and longterm ramifications for the organization. (1point) Executive-level Managerial-level Operational-level Functional-level Score: 0 Answer(s): Executive-level 7) The goal of ________ systems is to automate repetitive informationprocessing activities within organizations. (1point) transaction processing management information decision support executive information Score: 0 Answer(s): transaction processing 8) Activities supported by transaction processing systems do NOT include: (1point) sales forecasting. accounts payable and receivable. inventory management. payroll processing. Score: 0 Answer(s): sales forecasting. 9) An example of a batch transaction system is: a payroll processing system. a grocery store checkout processing system. an airline reservation processing system. an event ticket reservation processing system. (1point) Score: 0 Answer(s): a payroll processing system. 10) Coupled with business intelligence a transaction processing system are be used for which of the following? (1point) Library catalog Grocery checkout system Office automation All of the above. Score: 0 Answer(s): Grocery checkout system 11) ________ query tools provide an easy-to-use interface, allowing managers to run queries and reports themselves. (1point) Key-Indicator Drill-down Ad Hoc Exception Score: 0 Answer(s): Ad Hoc 12) ________ is a method of analyzing data used by companies to sort and analyze information to better understand their customers, products, markets, or any other phase of their business. (1point) Data mining Business rules Data warehousing OODB Score: 0 Answer(s): Data mining 13) When merging transaction and analytical processing a problem occurs. Real-time analytical processing diminishes the performance of transaction processing. What is the solution to this problem that many companies use? (1point) Pause transaction processing while analytical processing is occurring. Only allow transaction processing during off-peak hours. Replicate all transactions on a second database server and run analytical processing off of the second server. None of the above. Score: 0 Answer(s): Replicate all transactions on a second database server and run analytical processing off of the second server. 14) ________ is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table. (1point) OLAP Cube OLAP server Data mining Dimensions Score: 0 Answer(s): OLAP Cube 15) ________ complements OLAP in that it provides for discovering "hidden" predictive relationships in the data. (1point) OLAP Cube OLAP Server Data mining Drill-downs Score: 0 Answer(s): Data mining 16) ________ is used when groups ("classes") are known beforehand and records are segmented into these classes. (1point) Sequence discovery Association discovery Classification Clustering Score: 0 Answer(s): Classification 17) In OLAP, ________ (sometimes called facts) are the values or numbers the user wants to analyze, such as the sum of sales or the number of orders placed. (1point) dicing dimensions measures slicing Score: 0 Answer(s): measures 18) The goal of

a management information system is to: (1point) support the decision making associated within a functional area of the organization. automate repetitive information-processing activities. support dayto-day activities. provide reports which will be used as input to a TPS. Score: 0 Answer(s): support the decision making associated within a functional area of the organization. 19) Examples of the types of activities supported by management information systems include: (1point) payroll processing. financial management and forecasting. product purchasing, receiving and shipping. long-range and strategic planning. Score: 0 Answer(s): financial management and forecasting. 20) The processing aspect of a management information system focuses on: (1point) data aggregation and summaries. data sorting and summaries. data summaries and simulations. data summaries and graphical interpretations. Score: 0 Answer(s): data aggregation and summaries. 21) Lower-level ________ generate much of the hard data provided by an EIS. (1point) DSSs, MISs and TPSs MISs and DSSs MISs and TPSs TPSs and DSSs Score: 0 Answer(s): MISs and TPSs 22) The processing aspect of an executive information system focuses on: (1point) data summaries and graphical interpretations. data aggregation and summaries. data sorting and summaries. data summaries and simulations. Score: 0 Answer(s): data summaries and graphical interpretations. 23) ________ systems are special-purpose information systems designed to support the decision making related to a particular recurring problem in the organization. (1point) Expert Office automation Decision support Functional area information Score: 0 Answer(s): Decision support 24) A DSS is created to be a(n) ________ decision aid. (1point) professional interactive passive analytic Score: 0 Answer(s): interactive 25) The outputs of a DSS include: recommendations or advice. exception and scheduled reports. textual and graphical reports. (1point) summary reports and trend analysis. Score: 0 Answer(s): textual and graphical reports. 26) ________ systems are used to mimic human expertise by manipulating knowledge rather than simply information. (1point) Functional area information Decision support Office automation Intelligent Score: 1 Answer(s): Intelligent 27) People in the ________ function focus on the activities that promote the organization and its products in a way that attracts and retains customers. finance production marketing accounting (1point) Score: 0 Answer(s): marketing 28) A(n) ________ is a way of encoding knowledge after collecting information from a user. (1point) fact information statement rule Score: 1 Answer(s): rule 29) The output from an expert system includes: aggregated data. recommendations. a report. a trend analysis. (1point) Score: 0 Answer(s): recommendations. 30) Some of the technologies that are most suitable for being used by members of virtual teams include: (1point) videoconferencing and groupware. E-mails. fax machines. pagers. Score: 0 Answer(s): videoconferencing and groupware Quiz 9 1) One of the most important factors when deciding to implement enterprise solutions involves: (1point) selecting the customers and suppliers to work with. selecting applications that meet the requirements of the business. selecting and implementing applications that meet the requirements of the business, as well as its customers and suppliers. implementing applications that meet the requirements of the customers and suppliers. Score: 0 Answer(s): selecting and implementing applications that meet the requirements of the business, as well as its customers and suppliers. 2) Sharing ________ between organizations helps companies to adapt more quickly to changing market conditions. (1point) information packages operations management Score: 0 Answer(s): information 3) Support activities include infrastructure, human resources, ________ and procurement. (1point) customer service operations and management marketing and sales technology development Score: 0 Answer(s): technology development 4) An upstream information flow consists of information that: (1point) is produced by a company and sent

along to another organization. is produced by one department and sent along to other departments. is passed on to the company's distributors and customers. is received from another organization. Score: 1 Answer(s): is received from another organization. 5) ________ systems are older systems that are close to or at the end of their useful life. (1point) Internally-focused Legacy Conversion Packaged Score: 0 Answer(s): Legacy 6) If the vanilla version of an ERP system does not support a certain business process, the software may require ________ to accommodate it. (1point) differentiations integrations modifications customizations Score: 1 Answer(s): customizations 7) Data warehouses are databases that store information: that is outdated. (1point) related to a specific department. related to the various business activities of an organization. required for a specific business activity. Score: 0 Answer(s): related to the various business activities of an organization. 8) Among the most prevailing issues facing management when selecting an ERP application are: (1point) control. business requirements. best practices. All of the above. Score: 1 Answer(s): All of the above. 9) Applications focusing on downstream information flows have two main objectivesto attract potential customers and: (1point) create customer loyalty. develop and maintain customer satisfaction. achieve competitive advantage. None of the above. Score: 0 Answer(s): create customer loyalty. 10) A successful CRM strategy must include: policy and business process changes. (1point) customer service changes. employee training changes. All of the above. Score: 1 Answer(s): All of the above. 11) ________ applications provide support for the day-today sales activities of an organization. (1point) Sales Force Automation Enterprise Planning Resource Customer Relationship Management Supply Chain Management Score: 0 Answer(s): Sales Force Automation 12) The term ________ is commonly used to refer to the producers of supplies that a company uses. (1point) supply chain value system supply network value chain Score: 0 Answer(s): supply chain 13) Supply chain planning includes all of the following EXCEPT: (1point) supply chain execution. production scheduling. demand planning and forecasting. distribution planning. Score: 0 Answer(s): supply chain execution. 14) ________ refers to the movement of information along the supply chain. (1point) Data flow Financial flow Product flow Information flow Score: 1 Answer(s): Information flow 15) ________ are designed to automate the business processes that occur before, during and after sales have been transacted between a buyer and multiple suppliers. (1point) Resource portals Procurement portals Distribution portals Enterprise portals Score: 0 Answer(s): Procurement portals Test 9 1) ________ information systems are information systems that allow companies to integrate information across operations on a companywide basis. (1point) Management Functional area Executive Enterprisewide Score: 1 Answer(s): Enterprise-wide 2) Enterprise systems can help companies find innovative ways to conduct business, which lead to several advantages. These advantages do NOT include: (1point) an increase in customer satisfaction. an increase in the accuracy of on-time shipments. a decrease in the number of anticipated surprises. tremendous inefficiencies within an organization. Score: 1 Answer(s): tremendous inefficiencies within an organization. 3) An information system can be used to support a billing process which would lead to: (1point) reduced use of paper. less handling of paper. reduced material and labor costs. All of the above. Score: 1 Answer(s): All of the above. 4) Externally focused systems coordinate business activities with: (1point) customers. suppliers. business partners. All of the above. Score: 1 Answer(s): All of the above. 5) A ________ refers to the flow of information through a set of business activities, in which information flows through functional areas that facilitate the internal activities of the business. (1point) value chain data warehouse company's inventory flow diagram Score: 0 Answer(s): value chain 6) ________ involves the business activities associated with receiving and

stocking raw materials, parts and products. (1point) Marketing and sales Outbound logistics Inbound logistics Operations and manufacturing Score: 0 Answer(s): Inbound logistics 7) ________ provides the necessary components to facilitate a business process. (1point) Procurement Infrastructure Human resources Technology development Score: 0 Answer(s): Infrastructure 8) The ________ business activity can leverage information systems by accumulating purchase orders from the different functional areas within the corporation. (1point) procurement technology development marketing and sales operations and manufacturing Score: 0 Answer(s): procurement 9) ________ systems are highly useful for standardized, repetitive tasks such as making entries in a check register. (1point) Packaged Custom Expert Stand-alone Score: 0 Answer(s): Packaged 10) ________ applications are systems that focus on the specific needs of individual departments and are not designed to communicate with other systems of the organization. (1point) Packaged Custom Internally-focused Stand-alone Score: 1 Answer(s): Standalone 11) In most organizations, each department implements applications to assist it with its daily business activities, and as a result, these applications tend to be: (1point) run on the same platforms. externally focused. infrastructure-specific. similar in each department. Score: 0 Answer(s): infrastructure-specific. 12) The process of conversion transfers information stored on legacy systems to a new, integrated computer platform, which typically comes in the form of: (1point) Enterprise Resource Planning. Customer Relationship Management. Supply Chain Management. Total Quality Management. Score: 0 Answer(s): Enterprise Resource Planning. 13) Industry standard business processes are called: functional process improvement. workflow management. best practices. customer relationship management. (1point) Score: 0 Answer(s): best practices. 14) A radical redesign of an organization is sometimes necessary to: (1point) develop an organizational vision. lower costs and increase quality. focus on incremental changes. create best practices. Score: 0 Answer(s): lower costs and increase quality. 15) In contrast to ________, ERP applications make accessing information easier by providing a central information repository. (1point) legacy systems packaged applications data warehouses custom applications Score: 0 Answer(s): legacy systems 16) ERP applications that access the data warehouses are designed to have: (1point) the same look and feel, regardless of the unique needs of a particular department. different user interfaces to access different pieces of information. a different look and feel, depending of the unique needs of a particular department. a varying look and feel, depending on the needs of the organization. Score: 0 Answer(s): the same look and feel, regardless of the unique needs of a particular department. 17) One of the areas related to control involves the consistency of: (1point) transactions involved in each department. legacy systems used in each department. business activities. policies and procedures. Score: 1 Answer(s): policies and procedures. 18) In today's highly competitive markets, ________ hold the balance of power because, if they become dissatisfied with the levels of service they are receiving, there are many alternatives readily available to them. (1point) customers competitors business partners suppliers Score: 0 Answer(s): customers 19) ________ is a corporate-level strategy concentrating on the downstream information flows. (1point) Customer Relationship Management Business Process Management Supply Chain Management Enterprise Resource Planning Score: 0 Answer(s): Customer Relationship Management 20) CRM applications are commonly integrated with ERP to leverage ________ information to serve customers. (1point) internal internal or external external internal and external Score: 1 Answer(s): internal and external 21) Operational CRM is commonly referred to as ________ system. (1point) back-office external internal front-office Score: 1 Answer(s): front-office 22) An operational CRM system includes: SFA. EMM. (1point) CSS. All of the

above. Score: 1 Answer(s): All of the above. 23) Successful CSS systems enable: faster response times. (1point) increased first-contact resolution rates. improved productivity for service and support personnel. All of the above. Score: 1 Answer(s): All of the above. 24) ________ refers to systems for providing effective and efficient communication with the customer from the entire organization. (1point) Analytical CRM Operational CRM Executional CRM Collaborative CRM Score: 1 Answer(s): Collaborative CRM 25) Problems such as excessive inventories, inaccurate manufacturing capacity plans and missed production schedules can run rampant when: (1point) more and more suppliers are involved in a supply network. firms within a supply network do not collaborate effectively. multiple suppliers service a single organization. there is a one-to-one relationship between the supplier and a company. Score: 0 Answer(s): firms within a supply network do not collaborate effectively. 26) Like ERP and CRM applications, SCM packages are delivered in the form of ________, which companies select and implement according to their business requirements. (1point) components solutions systems modules Score: 1 Answer(s): modules 27) SAP's collaborative fulfillment module does NOT include the following functions: (1point) fulfilling orders from channels on time with order management, transportation planning and vehicle scheduling. supporting the entire logistics process, including picking, packing, shipping and international activities. sharing information and integrating processes up and down the supply chain. committing to delivery dates in real time. Score: 0 Answer(s): sharing information and integrating processes up and down the supply chain. 28) The supply chain ________ module in SCM packages reports key measurements in the supply chain. (1point) collaboration exchange event management performance management Score: 1 Answer(s): performance management 29) Enterprise portals can be defined as ________ through which a business partner accesses secured, proprietary information from an organization. (1point) access points tunnels intranets back doors Score: 0 Answer(s): access points 30) ________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a supplier and multiple customers (1point) Distribution portals Procurement portals Resource portals Enterprise portals Score: 0 Answer(s): Distribution portals Test 10 1) Systems analysis and design involves: designing. building. maintenance. All of the above. (1point) Score: 1 Answer(s): All of the above. 2) The programmers' discipline of common methods and techniques is called: (1point) transforming information systems. software engineering. systems analysis. systems development. Score: 0 Answer(s): software engineering. 3) Systems analysts must become adept at ________ problems into multiple small programs. (1point) making turning decomposing coding Score: 0 Answer(s): decomposing 4) SDLC is short for: (1point) systems deployment learning cycle. systems development learning cycle. systems development life cycle. systems deployment life cycle. Score: 0 Answer(s): systems development life cycle. 5) Some organizations have a formal ________ process whereby a senior manager, a business group, an IS manager, and other committee members identify and assess all possible systems development projects that an organization could undertake. (1point) information systems planning steering committee information systems purchasing implementation committee Score: 0 Answer(s): information systems planning 6) Projects identified by steering committees tend to have a: narrow focus. HR focus. (1point) cross-functional focus. financial focus. Score: 0 Answer(s): cross-functional focus. 7) ________ are criteria used by organizations to evaluate whether to accept or reject a project. (1point) Strategic alignments and risks Potential benefits and project size Potential costs and resource availability All of the above. Score: 1 Answer(s): All of the above. 8) The collection and structuring of ________ is arguably

the most important activity in systems development. (1point) system requirements system design system identification system implementation Score: 0 Answer(s): system requirements 9) CSF is short for: (1point) Critical Success Factor. Crucial Success Function. Critical Success Function. Crucial Success Factor. Score: 0 Answer(s): Critical Success Factor. 10) ________ is a special type of group meeting in which all or most of the users meet with the analyst at the same time. (1point) CSF Systems analysis Interviews JAD Score: 0 Answer(s): JAD 11) Analysts use ________ to collect and describe the data to users, so as to confirm that all needed data are known and presented to uses as useful information. (1point) JAD data modeling tools CSF All of the above. Score: 0 Answer(s): data modeling tools 12) ________ represent(s) the movement of data through an organization or within an information system. (1point) Data flows Processing logic System design System logic Score: 0 Answer(s): Data flows 13) During the ________ phase the details of the chosen approach are developed. (1point) system logic data flows processing logic system design Score: 1 Answer(s): system design 14) A ________ is a business document containing some predefined data and often some spaces for additional information. (1point) dialogue file form report Score: 0 Answer(s): form 15) Interfaces that enable the user to select pictures, icons, and menus to send instructions to the computer are referred to as: (1point) database systems. information system software. files. GUIs. Score: 1 Answer(s): GUIs. 16) One way of representing the logic and steps needed to perform calculations is to use: (1point) P-charts. pseudocode. hierarchy charts. flow charts. Score: 0 Answer(s): pseudocode. 17) ________ is testing the overall system to see whether it meets design requirements. (1point) Beta testing Developmental testing Alpha testing Systems testing Score: 0 Answer(s): Alpha testing 18) In addition to having good communication skills and being good at problem solving, support personnel must also: (1point) be expert users of the system. understand the business processes. be a developer. have programming skills. Score: 0 Answer(s): be expert users of the system. 19) The four types of software conversion strategies include: parallel, direct, phased, and pilot. identification, analysis, implementation, and maintenance. reuse, discontinued, implementation, single location. (1point) reference, discontinued, installation, single location. Score: 0 Answer(s): parallel, direct, phased, and pilot. 20) Who is usually responsible for collecting maintenance requests from systems users after the new system has been installed? (1point) A member of the development team Help desk personnel Information center personnel All of the above. Score: 0 Answer(s): A member of the development team 21) ________ maintenance is making changes to an information system to reduce the chance of future system failure. (1point) Adaptive Perfective Preventative Corrective Score: 0 Answer(s): Preventative 22) Making enhancements to improve processing performance or interface usability, or adding desired but not necessarily required systems features is: (1point) perfective maintenance. corrective maintenance. preventative maintenance. adaptive maintenance. Score: 0 Answer(s): perfective maintenance. 23) Using this type of development methodology the people building the system and the users of the system keep cycling between user design and construction until the system is complete. (1point) Object-oriented analysis and design RAD Prototyping JAD Score: 0 Answer(s): RAD 24) Using this type of development methodology, analysts identify common modules that combine the data and the operations to be performed. (1point) Prototyping RAD Object-oriented analysis and design JAD Score: 0 Answer(s): Object-oriented analysis and design 25) A common evaluative tool when using ________ is to ask the vendors to set up their system so that you and your colleagues can "test drive" the system. (1point) external acquisition outsourcing end-user development All of the above. Score: 0 Answer(s): external acquisition 26) A(n) ________ is a report which tells your

vendors what your requirements are and to invite them to provide information about how they might be able to meet your requirements. (1point) performa proposition RFP purchase order Score: 0 Answer(s): RFP 27) Which of the following is not a commonly used criteria for evaluating software? (1point) Training and documentation Access time Memory requirements Maintenance and repair Score: 0 Answer(s): Access time 28) Organizations may elect to outsource because of: (1point) cost and quality concerns. supplier pressures. downsizing. All of the above. Score: 1 Answer(s): All of the above. 29) The types of outsourcing relationships identified are: basic, preferred and strategic. basic, preferred and incidental. basic, incidental and strategic. incidental, preferred and strategic. (1point) Score: 0 Answer(s): basic, preferred and strategic. 30) In many organizations, the growing number of sophisticated information systems users allows the IS managers the option of allowing: (1point) external acquisition. outsourcing. end-user development. All of the above. Score: 0 Answer(s): end-user development. Quiz 11 1) Knowing how to use a computer can also open up myriad sources of information to those who have learned how to use the computer as a device to gather, store, organize, and otherwise process information. This is also called: (1point) computer comprehension. computer literacy. computer ability. computer competency. Score: 0 Answer(s): computer literacy. 2) The digital divide is a term that refers to the: (1point) gap between those individuals who have access to information resources and those who do not. gap between those individuals who have access to digital telephone technology and those who do not. gap between those computer literate individuals who have access to digital information resources (e.g., the Internet) and those who do not. gap between those individuals who have access to digital television technology and those who do not. Score: 0 Answer(s): gap between those computer literate individuals who have access to digital information resources (e.g., the Internet) and those who do not. 3) When one describes the issues and standards of conduct associated with the use of information systems, one is discussing: (1point) computer ethics. computer hacking. computer crime. computer civility. Score: 0 Answer(s): computer ethics. 4) One of the fastest growing "information" crimes in recent years has been: (1point) Information theft Information resource theft Identity theft Computer theft Score: 0 Answer(s): Identity theft 5) ________ must be concerned with the integrity of data. Information system developers Data entry workers Everyone Information system designers (1point) Score: 0 Answer(s): Everyone 6) ________ is electronic junk mail or junk newsgroup postings, usually for the purpose of advertising some product and/or service. (1point) Spyware Spam Adware Spim Score: 0 Answer(s): Spam 7) ________ is a special type of technology that collects information about a person in order to customize Web browser banner advertisements. (1point) Cookies Spam Adware Spyware Score: 0 Answer(s): Adware 8) To prevent illegal sharing of DRM-free content, media is often ________ so that any illegal copy can be traced to the original purchaser. (1point) information secured watermarked Digital Rights Management (DRM)ed data assuranced Score: 0 Answer(s): watermarked 9) Examples of the ethical conundrum include all but the following: (1point) the government regulating computer crimes. organizations compiling personal information about shopping habits. using computer time at work to read personal e-mail. using technology to rearrange photographs. Score: 0 Answer(s): the government regulating computer crimes. 10) Responsible computer use includes: not using a computer to harm others. not snooping in other persons' files. not using a computer to steal. All of the above. (1point) Score: 1 Answer(s): All of the above. 11) The Electronic Communications Privacy Act of 1986 makes it a crime to ________ any electronic communications service, including telephone services. (1point) copy view record break into Score: 1

Answer(s): break into 12) The majority of unlawful intrusions into computer systems are made by: (1point) competitors. terrorists. outside computer hackers. employees. Score: 1 Answer(s): employees. 13) Crimes committed against telephone company computers are an example of: (1point) data diddling. spoofing. carding. phreaking. Score: 1 Answer(s): phreaking. 14) Software piracy is a(n): ethical issue. crime. economic problem. All of the above. (1point) Score: 1 Answer(s): All of the above. 15) ________ is a crime in many states and countries, broadly refers to the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress. (1point) Cyber harassment Social engineering Cyberterrorism Cyberbattles Score: 0 Answer(s): Cyber harassment Test 11 1) During the Third Wave, ________ became the common currency. (1point) food money the Internet information Score: 1 Answer(s): information 2) As the ________ progressed, not only did occupations change to accommodate the mechanized society, but so did educational, business, social, and religious institutions. (1point) Agriculture and Handwork Information Age Space Age Industrial Revolution Score: 1 Answer(s): Industrial Revolution 3) ________ is an attribute possessed by someone who knows how to use a computer. (1point) Computer literacy Computer comprehension Computer ability Computer competency Score: 0 Answer(s): Computer literacy 4) The book describes populations in terms of those people who know how to use a computer and those who do not. The people who do not know how to use a computer are described as the: (1point) information needy. information havenots. information haves. information don't haves. Score: 0 Answer(s): information have-nots. 5) The ________ is one of the major ethical challenges facing society today when you consider the strong linkage between computer literacy and a person's ability to compete in the Information Age. (1point) computer fluency One Laptop Per Child (OLPC) Luddites digital divide Score: 1 Answer(s): digital divide 6) Central to information systems ethics are: (1point) information accessibility and culture control. information privacy and information property. information accuracy and culture control. information property and information technology. Score: 0 Answer(s): information privacy and information property. 7) An issue central to the debate on computer ethics is: information privacy. information accuracy. (1point) information property. All of the above. Score: 1 Answer(s): All of the above. 8) Information privacy is a term that describes what ________ an individual should have to reveal to others in the course of conducting transactions or accepting employment. (1point) credit records crime records information None of the above. Score: 0 Answer(s): information 9) According to the Consumer Protection Working Group of the American Bar Association at safeshopping.org, a seller's privacy policy should indicate at least the following: (1point) what information the seller is gathering from you. how the seller will use this information. whether and how you can "opt out" of these practices. All of the above. Score: 1 Answer(s): All of the above. 10) ________ is concerned with ensuring the authenticity and fidelity of information as well as with identifying who is responsible for informational errors that harm people. (1point) Information assurance Information accuracy Information assertiveness Information accessibility Score: 0 Answer(s): Information accuracy 11) The top tem dot-cons from the Federal Trade Commission include: (1point) web domain sales. real estate. Internet auctions. information acquisition. Score: 0 Answer(s): Internet auctions. 12) ________ is unsolicited e-mail that promotes a product or service. (1point) Cookies Spyware Spam None of the above. Score: 0 Answer(s): Spam 13) ________ is when the browsers store information about a user in a text file that can be accessed by server at a later time. (1point) Identifier Text file Cookie Message Score: 0 Answer(s): Cookie 14) ________ is software that runs on your computer, collecting information which is then transmitted

to another party. (1point) Cookies Spam Spyware Spim Score: 0 Answer(s): Spyware 15) ________ the dubious practice of registering a domain name, then trying to sell the name for big bucks to the person, company, or organization most likely to want it. (1point) Spamming Spyware Cybersquatting Phishing Score: 0 Answer(s): Cybersquatting 16) ________ is a technological solution that allows publishers to control their digital media (music, movies, and so on) to discourage, limit, or prevent illegal copying and distribution. (1point) Digital Rights Management Water marking Information securing Data assurance Score: 0 Answer(s): Digital Rights Management 17) ________ was the FBI software abandoned in 2005 which allowed Internet traffic to be monitored. (1point) T-Rex Blue Steel DRM Carnivore Score: 1 Answer(s): Carnivore 18) The ECPA offers stronger support for the privacy of ________ communications than for the privacy of electronic mail communications. (1point) paper mail voice mail facsimile None of the above. Score: 0 Answer(s): voice mail 19) Companies can do many things to more ethically use technologies. All of the following would be good ways to achieve this EXCEPT: (1point) be prudent and open about their e-mail monitoring. compile information on Web preferences of customers for internal use only. devise guidelines for ethical use of technology. have written rules regarding any monitoring that they do. Score: 0 Answer(s): compile information on Web preferences of customers for internal use only. 20) ________ is defined as the act of using a computer to commit an illegal act. (1point) Computer abuse Computer crime Computer bad will Computer misuse Score: 0 Answer(s): Computer crime 21) Most organizations ________ report their incidents of computer crimes. (1point) do not under over accurately Score: 0 Answer(s): do not 22) The global reach of computer networks has raised concerns over: (1point) copyrights. privacy. security. All of the above. Score: 1 Answer(s): All of the above. 23) A particular difficulty in combating cybercrime is that cybercriminals often attack across: (1point) state borders. county borders. city borders. international borders. Score: 1 Answer(s): international borders. 24) The term "hacker" was first coined in the 1960s, and it was originally used to describe MIT students who were expert computer users and programmers who roamed freely through computer systems out of: (1point) curiosity. malicious intent. boredom. None of the above. Score: 0 Answer(s): curiosity. 25) Persons who plant viruses are called: predators. computer hackers. vandals. cyberterrorists. (1point) Score: 0 Answer(s): vandals. 26) Salami slicing is a special type of: social networking. phreaking. data diddling. spoofing. (1point) Score: 0 Answer(s): data diddling. 27) ________ requires no technical expertise, but involves looking for papers that contain useful information. (1point) Social engineering Data diddling Phreaking Dumpster diving Score: 1 Answer(s): Dumpster diving 28) ________ is the term that describes the legal purchase of one copy of a software application, followed by the illegal copying and distribution of that same software application. (1point) Software borrowing Software use Software stealing Software piracy Score: 1 Answer(s): Software piracy 29) Logic bombs and time bombs are variations of: worms. dust bunnies. viruses. Trojan horses. (1point) Score: 1 Answer(s): Trojan horses. 30) To help protect your valuable computer files, make backups of your files in case you receive a(n) ________ that erases files from your hard drive. (1point) macrophage cricket virus worm Score: 0 Answer(s): virus

You might also like