Essentials of MIS, 13GE (Laudon/Laudon) Chapter 1 Business Information Systems in Your Career 1) Which of the following is the key business metric behind the technologies implemented by Kroger, as discussed in the chapter-opening case? A) Higher customer satisfaction levels B) Survival C) Improved employee morale D) Improved decision making E) Reduced cost of supplies Answer: A Difficulty: 3: Challenging AACSB: Analytical Thinking; Information Technology LO: 1-1: Why are information systems so essential for running and managing a business today? 2) Journalist Thomas Friedman's description of the world as "flat" refers to the: A) flattening of economic and cultural advantages of developed countries. B) use of the Internet and technology for instantaneous communication. C) reduction in travel times and the ubiquity of global exchange and travel. D) growth of globalization. E) increased use of global currencies. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 3) The six important business objectives of information system investment include all of the following except: A) competitive advantage. B) employee morale. C) improved decision making. D) survival. E) new products. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 1 Copyright © 2019 Pearson Education, Ltd. 4) A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives? A) Survival B) Improved decision making C) Competitive advantage D) Operational excellence E) Customer intimacy Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 1-1: Why are information systems so essential for running and managing a business today? 5) Walmart exemplifies the power of information systems coupled with excellent business practices and supportive management to achieve which of the following? A) New business models B) Operational efficiency C) Customer intimacy D) Competitive advantage E) Survival Answer: B Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 1-1: Why are information systems so essential for running and managing a business today? 6) Verizon's implementation of a web-based digital dashboard to provide managers with realtime information, such as customer complaints, is an example of: A) improved flexibility. B) improved decision making. C) competitive advantage. D) supplier intimacy. E) a new product. Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 1-1: Why are information systems so essential for running and managing a business today? 7) Which business objective were competitors seeking when they rushed to provide ATMs after Citibank introduced the first ATMs in New York? A) Improved efficiency B) Customer and supplier intimacy C) Survival D) Competitive advantage E) Improved decision making Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 1-1: Why are information systems so essential for running and managing a business today? 2 Copyright © 2019 Pearson Education, Ltd. 8) All of the following describe the effects of globalization except: A) significant decreases in operating costs. B) reduction of labor costs through outsourcing. C) ability to find low-cost suppliers. D) increases in transaction costs. E) replication of business models in multiple countries. Answer: D Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 1-1: Why are information systems so essential for running and managing a business today? 9) A firm that must invest in a new information system in order to comply with federal legislation is investing to achieve which of the following business objectives? A) Customer intimacy B) Operational excellence C) New products. D) Improved decision making E) Survival Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 10) Which of the following is an example of a business using information systems to create new products and services? A) Apple's creation of the iPad B) JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced C) The Mandarin Oriental's use of computers to keep track of guests' preferences D) Verizon's web-based digital dashboard providing real-time company information for managers E) Walmart's Retail Link system Answer: A Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 1-1: Why are information systems so essential for running and managing a business today? 3 Copyright © 2019 Pearson Education, Ltd. 11) An example of a business using information systems for supplier intimacy is: A) Apple's creation of the iPad. B) JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced. C) Citibank's ATM system. D) Verizon's web-based digital dashboard providing real-time company information for managers. E) the Mandarin Oriental's use of computers to keep track of guests' preferences. Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 1-1: Why are information systems so essential for running and managing a business today? 12) To make sure it stocks clothes that its customers will purchase, a department store implements a new application that analyzes spending levels at its stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support? A) New products B) Survival C) Customer intimacy D) Improved decision making E) Operational excellence Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 1-1: Why are information systems so essential for running and managing a business today? 13) Telepresence is an example of which of the following? A) Business intelligence B) Social business C) IoT D) Mobile digital platform E) Virtual meeting Answer: E Difficulty: 1: Easy AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 4 Copyright © 2019 Pearson Education, Ltd. 14) The enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as: A) IoT. B) big data. C) the mobile digital platform. D) cloud computing. E) business intelligence. Answer: B Difficulty: 1: Easy AACSB: Analytical Thinking; Information Technology LO: 1-1: Why are information systems so essential for running and managing a business today? 15) E-commerce and Internet advertising reached $83 billion in 2017, growing at about: A) 5 percent. B) 10 percent. C) 15 percent. D) 20 percent. E) 25 percent. Answer: C Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 16) What percent of employed Americans report spending some time working remotely? A) 13 percent B) 23 percent C) 33 percent D) 43 percent E) 53 percent Answer: D Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 17) All of the following are new technology-related trends in MIS except: A) cloud computing. B) big data. C) IoT. D) the mobile digital platform. E) co-creation of business value. Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 5 Copyright © 2019 Pearson Education, Ltd. 18) Which of the following statements is not true? A) In 2016, American businesses invested nearly $2.8 trillion in information systems hardware, software, and telecommunications equipment. B) In 2016, American businesses spent $800 billion on business and management consulting and information technology services. C) In 2016, about 25 percent of all capital investment in the United States was for information systems hardware, software, and telecommunications equipment. D) Expenditures in the United States for information systems are growing at a faster rate than the U.S. economy as a whole. E) Worldwide, non-U.S. expenditures for information technology exceeded $3.5 trillion. Answer: C Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 19) Approximately how many adult Americans are online? A) 118 million B) 173 million C) 205 million D) 220 million E) 273 million Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 20) What percent of the Fortune 500 companies uses Twitter to communicate with their customers? A) 20 percent B) 40 percent C) 50 percent D) 60 percent E) 80 percent Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 21) Purchase of information systems hardware, software, and telecommunications equipment will constitute more than half of all capital investment in the United States in 2017. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 1-1: Why are information systems so essential for running and managing a business today? 6 Copyright © 2019 Pearson Education, Ltd. 22) A business model describes how a company produces, delivers, and sells a product or service to create wealth. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 23) Federal law requires many businesses to keep email messages for ten years. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-1: Why are information systems so essential for running and managing a business today? 24) Define operational excellence. How can information systems help achieve it? Answer: Operational excellence is the achievement of higher levels of productivity and efficiency. Information systems can help achieve operational excellence by improving communications to suppliers and optimizing the supply chain. Information systems could help managers communicate with workers more efficiently, enable technological innovation in products, minimize warehouse overhead, and streamline distribution. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication; Reflective Thinking LO: 1-1: Why are information systems so essential for running and managing a business today? 25) You work for an auto manufacturer and distributor. How could you use information systems to achieve greater customer intimacy? Answer: You could create a website that allows customers to customize cars, communicate with support personnel and other car owners. You could create an automated email service reminding car owners to take their car in for periodic check-ups. You could have an information system that tracks customer preferences in local areas, so you can provide cars that reflect local customer needs and desires. Difficulty: 2: Moderate AACSB: Application of Knowledge; Information Technology; Written and Oral Communication LO: 1-1: Why are information systems so essential for running and managing a business today? 7 Copyright © 2019 Pearson Education, Ltd. 26) Which of the following is the best definition of an information system? A) A set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization B) Computers, keyboards, printers, and telecommunications devices C) A set of detailed programmed instructions that transform raw data into information D) Physical devices and software that can be connected to share voice, data, images, sound, and video E) A global network that uses universal standards Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 27) The three activities in an information system that produce the information organizations use to control operations are: A) information, research, and analysis. B) input, output, and feedback. C) input, processing, and output. D) data analysis, processing, and feedback. E) information, data, and processing. Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 28) The average number of baseball tickets sold at a particular price is an example of: A) input. B) raw data. C) meaningful information. D) output. E) feedback. Answer: C Difficulty: 1: Easy AACSB: Analytical Thinking LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 8 Copyright © 2019 Pearson Education, Ltd. 29) Output: A) is feedback that has been processed to create meaningful information. B) is information that is returned to appropriate members of the organization to help them evaluate the input stage. C) transfers raw data to the people who will use it or to the activities for which it will be used. D) transfers processed information to the people who will use it or to the activities for which it will be used. E) is a stream of raw facts representing events occurring in organizations or the physical environment. Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 30) Converting raw data into a more meaningful form is called: A) capturing. B) processing. C) organizing. D) feedback. E) inputting. Answer: B Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 31) Which of the following is an example of raw data from an automobile manufacturer? A) An average of 130 Subarus sold daily in New York in 2017 B) 1,300 Subaru Outbacks sold during the first quarter 2017 in New York C) One Subaru Outback sold January 7, 2017 in Mount Kisco, New York for $25,000 D) Annual sales of Subaru Outbacks increased 4.5 percent E) An average sale price of $26,000 for all Subaru Outbacks sold during January 2017 in Mount Kisco, New York Answer: C Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 9 Copyright © 2019 Pearson Education, Ltd. 32) Which of the following fields deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm? A) Information systems literacy B) Information systems architecture C) Management information systems D) Information technology infrastructure E) Computer information systems Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 33) All of the following are examples of environmental actors in an information system except: A) customers. B) stockholders. C) feedback. D) competitors. E) regulatory agencies. Answer: C Difficulty: 1: Easy AACSB: Application of Knowledge LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 34) In a hierarchical organization, the upper levels consist of: A) managerial, professional and knowledge workers. B) managerial, professional, and technical workers. C) professional and operational workers. D) managerial, professional, and operational workers. E) knowledge, technical and operational workers. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 10 Copyright © 2019 Pearson Education, Ltd. 35) The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its: A) business process. B) environment. C) atmosphere. D) values. E) culture. Answer: E Difficulty: 1: Easy AACSB: Application of Knowledge LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 36) All of the following can be considered managerial responsibilities except: A) making action plans to solve organizational problems. B) creating new products and services. C) designing new information systems. D) allocating human resources to coordinate the work to be done. E) setting strategy for responding to business challenges in the environment. Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 37) Data management technology consists of the: A) physical hardware and media used by an organization for storing data. B) detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. C) software governing the organization of data on physical storage media. D) hardware and software used to transfer data. E) universally accepted standards for storing data. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 11 Copyright © 2019 Pearson Education, Ltd. 38) Intranets: A) are based on mainframe technology. B) are multiple networks joined together. C) are typically used to communicate with the business's trusted vendors. D) use Internet technology for a private company network. E) provide the platform on which a firm builds its information systems. Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 39) As described in the chapter case, which of the following constitutes an organizational element in the UPS tracking system? A) The specification of procedures for identifying packages with sender and recipient information B) Monitoring service levels C) Promoting the company strategy of low-cost, superior service D) The use of handheld computers and networks for managing package delivery E) Routing software that creates the most efficient delivery route for each driver Answer: A Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 40) As described in the chapter case, which of the following constitutes a people element of the UPS tracking system? A) The web-based Post Sales Order Management System B) The ability to provide package status reports to customers C) The decision to use automation D) The implementation of in-house package tracking software E) The ability to embed UPS functions in external sites Answer: C Difficulty: 3: Challenging AACSB: Analytical Thinking; Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 12 Copyright © 2019 Pearson Education, Ltd. 41) A moving company has an information system that analyzes travel patterns and decides which routes are the most efficient for every van. The need for employees to follow procedures to update this system with arrival and departure times is a(n) ________ dimension of the system. A) organizational B) managerial C) people D) technology E) cultural Answer: A Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 42) The culture of UPS places service to the customer among the company's highest business objectives, which is reflected in its use of information systems to enable customer tracking of their packages. Based on your reading of Chapter 1, why is "culture" an important factor to consider when building information system solutions to business problems? A) Culture is one element that can be radically changed, not always for the better, by new information systems. B) Culture affects how information system solutions are implemented and used. C) Culture is a cauldron of employee perspectives and conflicts, which can be used to improve business processes. D) Culture is the driving force behind decision making and innovation. E) Culture is the basis for organizational politics. Answer: B Difficulty: 3: Challenging AACSB: Analytical Thinking; Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 43) Which of the following is a global network that uses universal standards to connect millions of different networks around the world? A) An extranet B) The World Wide Web C) The Internet D) An intranet E) Verizon Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 13 Copyright © 2019 Pearson Education, Ltd. 44) ________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. A) Software B) Programming C) Enterprise applications D) Business intelligence E) Data management technology Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 45) ________ is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format. A) FTP B) Email C) The World Wide Web D) HTML E) An extranet Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 46) Information systems contain information about significant people, places, and things within the organization or in the environment surrounding it. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 47) Firms use extranets to coordinate their activities with other firms for making purchases, collaborating on design, and performing other interorganizational work. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 14 Copyright © 2019 Pearson Education, Ltd. 48) Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 49) People, organizations, and information technology are all dimensions of information systems. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 50) In order to understand how a specific business firm uses information systems, you need to know something about the history and culture of the company. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 51) Developing a new product, fulfilling an order, and hiring a new employee are all examples of business processes. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 52) Business processes are logically related tasks for accomplishing work that have been formally encoded by an organization. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 53) Employee attitudes about their jobs, employers, or technology can have a powerful effect on their abilities to use information systems productively. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 15 Copyright © 2019 Pearson Education, Ltd. 54) A network requires at least three computers and a shared resource. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 55) A firm's IT infrastructure provides the platform on which the firm can build its information systems. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 56) UPS's use of web-based tools that allow customers to embed UPS functions, such as tracking and cost calculations, into their own websites, described in the chapter case, is an information systems solution used to achieve customer intimacy. Answer: TRUE Difficulty: 3: Challenging AACSB: Analytical Thinking; Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 57) Data is information that has been shaped into a form that is meaningful to human beings. Answer: FALSE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 58) Feedback is a specific type of output. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 59) Intranets are private corporate networks extended to authorized users outside the organization. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 16 Copyright © 2019 Pearson Education, Ltd. 60) What important managerial function is impaired by not having access to timely and accurate information? What is the effect of this lack of data? Answer: The managerial function is decision making. Without access to timely and accurate information, business managers rely on forecasts, best guesses, and luck. The result is over- or under-production of goods and services, misallocation of resources, and poor response times. The potential poor outcomes can raise costs, and the company can lose customers. Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology; Written and Oral Communication LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 61) Describe the people dimension of information systems and give an example. Is this dimension as vital as the technology dimension when considering a technology-based solution to a business problem? Answer: The people dimension describes all of the factors related to employees, from operational personnel to senior management. Essentially, an organization and its information systems are worthless without skilled employees. For example, a people dimension of implementing a new information system is ensuring users are properly trained to use the system. The people dimension is just as vital as the other dimensions - the success of an information system depends on the people implementing and operating it. In addition, as a resource, employees are expensive to hire, manage, and train, whereas technology and hardware can be relatively inexpensive. Difficulty: 2: Moderate AACSB: Reflective Thinking; Information Technology; Written and Oral Communication LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 62) You are a marketing manager for a national movie theater chain. Give an example of data that your department could use for creating meaningful information. What type of information could that data produce? Answer: Movie ticket sales from individual theaters would be an example of raw data. Meaningful information from this would be: average number of tickets sold to seniors on certain days of the week. Difficulty: 1: Easy AACSB: Application of Knowledge; Information Technology; Written and Oral Communication LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 63) Define a business process. What might be a business process used at a hospital? Answer: A business process is a set of logically related tasks and behaviors for accomplishing work. Hiring a new employee, customer intake, and filing medical records are examples of business processes at a hospital. Difficulty: 2: Moderate AACSB: Reflective Thinking; Written and Oral Communication LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 17 Copyright © 2019 Pearson Education, Ltd. 64) What is the difference between information technology and information systems? Answer: Information technology (IT) consists of all the hardware and software that a firm needs to use to achieve its business objectives. Information systems are more complex. An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization. Difficulty: 2: Moderate AACSB: Application of Knowledge; Written and Oral Communication LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 65) This chapter discusses how each organization has its own culture and sets of values shared by most of its members. What kind of shared values might you find at a law firm? Answer: Shared values at a law firm might be: The legal system works, the legal system is fair, lawyers help people, and people need help with the legal system because it is complicated. Difficulty: 2: Moderate AACSB: Analytical Thinking; Written and Oral Communication LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 66) Why is the building of a house an appropriate analogy for the building of an information system? Answer: Houses are built with hammers, nails, and wood, but these alone do not make a house. The architecture, design, setting, landscaping, and all of the decisions that lead to the creation of these features are part of the house and are crucial for solving the problem of putting a roof over one's head. Computers and programs are the hammer, nails, and lumber of computer-based information systems, but alone they cannot produce the information a particular organization needs. To understand information systems, you must understand the problems they are designed to solve, their architectural and design elements, and the organizational processes that lead to these solutions. Difficulty: 3: Challenging AACSB: Analytical Thinking; Written and Oral Communication LO: 1-2: What exactly is an information system? How does it work? What are its people, organizational, and technology components? 18 Copyright © 2019 Pearson Education, Ltd. 67) A database into which employees manually input customer names and addresses is riddled with errors and you have been charged with rectifying the situation. In considering the organizational dimensions of this problem, you should consider the: A) skill levels of the employees inputting the data. B) training given to the employees inputting the data. C) business processes in place governing the manual input of the data. D) types of automatic error checking provided by the input software. E) storage capacity of the database. Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge; Information Technology LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 68) The first step in the model of business problem solving discussed in the chapter is: A) interviewing the people involved in the problem. B) identifying the problem. C) outlining the problem's causes. D) assigning the problem to a problem solver. E) evaluating possible solutions to the problem. Answer: B Difficulty: 1: Easy AACSB: Application of Knowledge LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 69) Outdated software is an example of the ________ dimension of business problems. A) technology B) organizational C) people D) management E) cultural Answer: A Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 19 Copyright © 2019 Pearson Education, Ltd. 70) Work environment is an example of the ________ dimension of business problems. A) management B) organizational C) people D) technology E) cultural Answer: C Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 71) You are a new manager at a plumbing supply manufacturer where there are an unusually high number of returns for a new aerator used in the production of high-end faucets. In examining the problem, you determine that the primary cause is the improperly designed die cast for the aerator. Which dimension of a business problem does this reflect? A) People B) Technology C) Management D) Organizational E) Cultural Answer: A Difficulty: 3: Challenging AACSB: Application of Knowledge; Analytical Thinking LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 72) Inadequate resources are an example of the ________ dimension of business problems. A) management B) organizational C) people D) infrastructure E) cultural Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 20 Copyright © 2019 Pearson Education, Ltd. 73) The owners of Speed-EZ, a new bike messenger service, are concerned about how they will manage their messengers once the messengers have left the office. This is a business problem that falls into the: A) management dimension. B) people dimension. C) organizational dimension. D) technology dimension. E) cultural dimension. Answer: B Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 74) Flapjack Flats, a new pancake restaurant chain, is having difficulty finding pancake chefs. This is a business problem that falls into the: A) management dimension. B) people dimension. C) organizational dimension. D) technical dimension. E) cultural dimension. Answer: C Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 75) In choosing the best solution for a business problem, all of the following are important considerations except: A) the cost of the solution. B) the feasibility of the solution given existing resources and skills. C) the length of time to implement the solution. D) the attitudes of employees. E) the ability to forget about the problem once it has been solved. Answer: E Difficulty: 3: Challenging AACSB: Reflective Thinking LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 21 Copyright © 2019 Pearson Education, Ltd. 76) The final step in the four-step model of business problem solving is: A) outcome. B) implementation. C) change management. D) feedback. E) employee retraining. Answer: B Difficulty: 1: Easy AACSB: Application of Knowledge LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 77) Which of the following would not be considered part of the implementation phase of problem solving? A) Change management B) Purchasing hardware for an information systems solution C) Training an employee on new systems software D) Evaluating a selection of software packages for implementing a new business process E) Determining the attitude of employees about the solution Answer: D Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 78) The failure of NASA's initial solution to preventing the space shuttle shedding foam illustrates the: A) importance of training employees on new business processes. B) need to prepare for measuring outcomes of a business solution. C) continuous nature of problem solving. D) need to quickly adapt to new technological innovations. E) importance of organizational change in problem solving. Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 22 Copyright © 2019 Pearson Education, Ltd. 79) Perhaps the most frequent error in problem solving is: A) rushing to judgment about the nature of a problem. B) not being aware of personal limitations. C) being too doubtful. D) following a rote pattern of decision making. E) failing to consider all dimensions of a problem. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 80) Assume you work for a package delivery service in a major metropolitan area and that the business has been losing customers for several years. You have been asked to find a solution to this problem. What is the correct way to proceed? A) Look for solutions, evaluate the solutions, identify the problem more clearly, and then implement the solution. B) Think about what solutions can be implemented, look for solution designs, evaluate the designs, and then implement the solution. C) Identify the problem, design alternative solutions, choose the best solution, and then implement the solution. D) Design solutions, evaluate and identify the problems, choose the best solution, and then implement the solution. E) Identify relevant information technologies, interview employees, choose a technology, and implement the technology. Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking; Application of Knowledge; Information Technology LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 81) Which are the three major dimensions of business problem solving? A) Organizational dimensions, people dimensions, and technology dimensions B) Organizational dimensions, people dimensions, and environmental dimensions C) People dimensions, technology dimensions, and environmental dimensions D) Technology dimensions, organizational dimensions, and environmental dimensions E) Organizational dimensions, technology dimensions, and cultural dimensions Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 23 Copyright © 2019 Pearson Education, Ltd. 82) Identifying a problem includes agreeing that a problem exists. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 83) An unsupportive culture is an example of the people dimension of business problems. Answer: FALSE Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 84) Encouraging employees to adapt to new business processes is an important factor in change management. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 85) Describe the four steps taken in solving a business problem. Answer: The four steps are problem identification, solution design, choice of a solution, and implementation. In the problem identification step, relevant people in an organization must agree that a problem exists, what the problem is, what its causes are, and what can be done about the problem given the organization's resources. In the solution design step, as many solutions as possible should be determined. In the choice step, you choose the best solution from the list of options determined in the previous step. It is important to match a choice to existing resources, skills, and feasibility. In the last step, implementation, the solution is put in place. In information systems solutions, this may include purchasing hardware or software and testing it. Implementation also includes employee training, change management, and using a method to measure the outcome. Difficulty: 2: Moderate AACSB: Analytical Thinking; Written and Oral Communication LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 24 Copyright © 2019 Pearson Education, Ltd. 86) What are the three dimensions of business problems? Give an example of each. Answer: (1) Organizational: This may include outdated business processes, unsupportive culture and attitudes, political conflict, turbulent business environment and change, complexity of task, inadequate resources. (2) Technology: This may include insufficient or aging hardware, outdated software, inadequate data management, insufficient telecommunications capacity, incompatibility of old systems with new technology, and rapid technological change. (3) People: This may include lack of employee training, difficulties in evaluation performance, legal and regulatory compliance, work environment, lack of employee support and participation, indecisive management, or poor management. Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 87) The department chain you work for has had numerous complaints about slow customer service. Your colleague, a sales manager, informs you that this happened at a previous store she worked for, and it was cleared up by hiring more sales representatives. Should you take her advice? Why or why not? What techniques can you use in evaluating the problem? Answer: The advice should not be taken, as it is a rush to judgment, which could mean that the wrong solution is used, wasting time and resources. You should ask the colleague to employ critical thinking. Critical thinking is sustained suspension of judgment with an awareness of multiple perspectives and alternatives. It involves at least four elements: • Maintaining doubt and suspending judgment • Being aware of different perspectives • Testing alternatives and letting experience guide • Being aware of organizational and personal limitations Difficulty: 3: Challenging AACSB: Interpersonal Relations and Teamwork LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 25 Copyright © 2019 Pearson Education, Ltd. 88) How does critical thinking relate to the problem-solving process? Answer: Simply following a rote pattern of decision making, or a model, does not guarantee a correct solution. The best protection against incorrect results is to engage in critical thinking throughout the problem-solving process. Perhaps the most frequent error in problem solving is to arrive prematurely at a judgment about the nature of the problem. By doubting all solutions at first and refusing to rush to a judgment, you create the necessary mental conditions to take a fresh, creative look at problems and you keep open the chance to make a creative contribution. Second, it is important to recognize that all interesting business problems have many dimensions and that the same problem can be viewed from different perspectives such as the technology perspective, the organization perspective, and the people perspective. The third element of critical thinking involves testing alternatives, or modeling solutions to problems, and letting experience be the guide. Not all contingencies can be known in advance and much can be learned through experience. Therefore, it is important to experiment, gather data, and reassess the problem periodically. Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 1-3: How will a four-step method for business problem solving help you solve information system-related problems? 89) Which of the following is an important skill for an accounting major? A) An understanding of online transaction and reporting systems B) An understanding of product management enterprise systems C) An understanding of supplier management enterprise systems D) An understanding of enterprise systems that enhance leadership E) An understanding of enterprise systems for customer relationship management Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 1-4: What information systems skills and knowledge are essential for business careers? 90) Which of the following is an important skill for a marketing major? A) An understanding of online transaction and reporting systems B) An understanding of product management enterprise systems C) An understanding of supplier management enterprise systems D) An understanding of enterprise systems that enhance leadership E) An understanding of financial reporting systems Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 1-4: What information systems skills and knowledge are essential for business careers? 26 Copyright © 2019 Pearson Education, Ltd. 91) What is the estimated growth rate for information systems managers' jobs through 2024? A) 5% B) 8% C) 12% D) 15% E) 17% Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 1-4: What information systems skills and knowledge are essential for business careers? 92) Financial managers work directly with ________ to ensure investments in information systems help achieve corporate goals. A) operations managers B) senior managers C) marketing managers D) accounting managers E) knowledge workers Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 1-4: What information systems skills and knowledge are essential for business careers? 93) Which of the following statements is not true? A) The most common and successful offshore outsourcing projects involve production programming and system maintenance programming work, along with call center work. B) Inflation in Indian and Chinese wages for technology work is leading to a counter movement of some IT jobs back to the United States. C) Outsourcing has actually accelerated the development of new systems in the United States by reducing the cost of building and maintaining them. D) The impact of domestic IT outsourcing has been very disruptive to some regional areas of the United States. E) Management and organizational tasks required in systems development usually are not outsourced. Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 1-4: What information systems skills and knowledge are essential for business careers? 94) As a result of new public laws, accountants require an intimate knowledge of databases, reporting systems, and networks. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 1-4: What information systems skills and knowledge are essential for business careers? 27 Copyright © 2019 Pearson Education, Ltd. 95) IT managerial jobs are outsourced easily because of the universal standards used by the Internet. Answer: FALSE Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 1-4: What information systems skills and knowledge are essential for business careers? 96) An understanding of enterprise-wide systems for customer relationship management is one of the skills relevant to careers in marketing. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 1-4: What information systems skills and knowledge are essential for business careers? 97) Whereas marketing and financial careers have been transformed by the growth in information systems, thus far managerial positions have remained relatively unaffected. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 1-4: What information systems skills and knowledge are essential for business careers? 98) There are two types of outsourcing: offshore outsourcing and foreign outsourcing. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 1-4: What information systems skills and knowledge are essential for business careers? 99) Describe at least three of the general information skills essential for all business careers. Answer: General information skills essential for all business careers include (1) understanding how information systems and technologies can help firms achieve business objectives such as operational efficiency, developing new products and services, and maintaining customer intimacy. Also essential is (2) developing skills in the analysis of information in order to help firms understand and make their data, as well as (3) business analytics and intelligence skills, in order to be able to analyze the mountains of big data that the online business environment and Internet of Things produce. (4) All business majors need to be able to work with specialists and system designers who build and implement information systems. This is necessary to ensure that the systems that are built actually service business purposes and provide the information and understanding required by managers and employees. In addition, students need to (5) understand how information systems can be used to meet business requirements for reporting to government regulators and the public and how information systems affect the ethical issues in their fields. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 1-4: What information systems skills and knowledge are essential for business careers? 28 Copyright © 2019 Pearson Education, Ltd. 100) What types of jobs are not likely to be outsourced and why? Answer: Jobs involved with the creation of innovative new products, services, and systems are rarely outsourced either domestically or globally. The advantage of low-wage countries is their low wages and ready availability of technical talent, not their keen sense of new products, services, and technologies for other countries' markets. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 1-4: What information systems skills and knowledge are essential for business careers? 29 Copyright © 2019 Pearson Education, Ltd. Essentials of MIS, 13GE (Laudon/Laudon) Chapter 2 Global E-Business and Collaboration 1) Suppliers, customers, invoices and payments, products and services, and ________ are the five basic components with which businesses must deal. A) the environment B) manufacturing and production C) sales and marketing D) employees E) technology Answer: D Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 2) Producing a bill of materials is a responsibility of the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing E) technology Answer: C Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 3) Identifying potential customers for the businesses' products or services is an activity associated with the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) technology E) sales and marketing Answer: E Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 1 Copyright © 2019 Pearson Education, Ltd. 4) Which of the following is an interorganizational business process? A) Hiring an employee B) Identifying a customer C) Creating financial statements D) Ordering raw materials E) Checking product quality Answer: D Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 2-1: What major features of a business are important for understanding the role of information systems? 5) Employees that assist with administrative work at all levels of the firm are called: A) data workers. B) knowledge workers. C) operational management. D) service workers. E) senior managers. Answer: A Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 6) The three principal levels of hierarchies within a business organization are: A) senior management, knowledge workers, and service workers. B) senior management, middle management, and operational management. C) senior management, data workers, and operational management. D) senior management, operational management, and workers. E) senior management, operational management, and data workers. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 7) Key forces in a business' immediate environment include: A) regulations. B) technological innovations. C) economic conditions. D) politic conditions. E) global events. Answer: A Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 2 Copyright © 2019 Pearson Education, Ltd. 8) Engineers and scientists are examples of: A) senior management. B) production workers. C) knowledge workers. D) middle management. E) operational management. Answer: C Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 9) Which of the following is an example of a key force in a firm's broader, less immediate environment? A) Competitors B) Regulations C) Suppliers D) Socioeconomic trends E) Customers Answer: D Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 10) Which of the following is not a true statement with respect to business processes? A) Every business can be seen as a collection of business processes. B) Analyzing business processes can enable you to achieve a clear understanding of how a business actually works. C) The efficiency of a business firm is not related to its business processes. D) Information systems can automate many steps in business processes that were formerly performed manually. E) A business process may involve a unique way in which work, information, and knowledge are coordinated within an organization. Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 2-1: What major features of a business are important for understanding the role of information systems? 11) Business organizations are hierarchies consisting of three principal levels. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 3 Copyright © 2019 Pearson Education, Ltd. 12) Operational-level manufacturing systems provide transaction-level information that enable monitoring of the daily activities of a business. Answer: TRUE Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 2-1: What major features of a business are important for understanding the role of information systems? 13) Business processes that impede organizational responsiveness are a source of competitive strength for a company. Answer: FALSE Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 14) Senior management is responsible for ensuring the financial performance of the firm. Answer: TRUE Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 2-1: What major features of a business are important for understanding the role of information systems? 15) A business is a formal organization created to sell services or products at a profit. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 16) Every business process is tied to one specific functional area. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 17) The efficiency of a business firm depends to a large extent on how well its internal and interorganizational business processes are designed and coordinated. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 2-1: What major features of a business are important for understanding the role of information systems? 4 Copyright © 2019 Pearson Education, Ltd. 18) What is the connection between organizations, information systems, and business processes? Answer: Business processes are how work is actually performed, step by step, in an organization. An organization can be seen as a collection of business processes. Information systems are used to help the organization execute its business processes. In some cases, an information system might hinder a business process, making it more complex than necessary, or it might greatly improve a business process, moving essential information seamlessly between parts of the organization and different business processes. Difficulty: 2: Moderate AACSB: Reflective Thinking; Information Technology; Written and Oral Communication LO: 2-1: What major features of a business are important for understanding the role of information systems? 19) Define and give an example of a cross-functional business process within a firm. Answer: Cross-functional processes are those that require input, cooperation, or coordination between the major business functions in an organization. For instance, when a salesman takes an order, the major business functions of planning, production, inventory control, shipping, accounting, and customer relations will all be involved before the order is completed. What at first appears to be a simple process, fulfilling an order, turns out to be a very complicated series of business processes that require the close coordination of major functional groups in a firm. Difficulty: 1: Easy AACSB: Analytical Thinking; Written and Oral Communication LO: 2-1: What major features of a business are important for understanding the role of information systems? 20) Why do businesses invest in information systems? Answer: Businesses invest in information systems as a way to cope with and manage their internal production functions and cope with the demands of key actors in their environments. Specifically, firms invest in information systems to achieve operational excellence (productivity, efficiency, agility); to develop new products and services; to attain customer intimacy and service (continuous marketing, sales, and service; customization and personalization); to improve decision making (accuracy and speed); to achieve competitive advantage; and to ensure survival. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 2-1: What major features of a business are important for understanding the role of information systems? 5 Copyright © 2019 Pearson Education, Ltd. 21) A(n) ________ performs and records the daily activities of a firm necessary to conduct business. A) executive support system B) management-level system C) decision support system D) transaction processing system E) business intelligence system Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 22) Which type of system would you use to change a production schedule if a key supplier was late in delivering goods? A) ESS B) CRM system C) MIS D) DSS E) SCM system Answer: E Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 23) A human resources system that summarizes the total moving, house-hunting, and home financing costs for employees in all company divisions is an example of which of the following? A) KMS B) TPS C) ESS D) MIS E) CRM system Answer: D Difficulty: 3: Challenging AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 6 Copyright © 2019 Pearson Education, Ltd. 24) The term management information systems refers to a specific category of information systems serving: A) integrated data processing throughout the firm. B) transaction process reporting. C) senior management. D) middle management functions. E) knowledge workers. Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 25) Which of the following systems is designed to summarize and report on the company's basic operations? A) KMS B) DSS C) ESS D) TPS E) MIS Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 26) Which of the following systems supports making decisions that are unique, rapidly changing, and not easily specified in advance? A) MIS B) TPS C) ESS D) DSS E) KWM Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 7 Copyright © 2019 Pearson Education, Ltd. 27) Which of the following systems would you use to determine the five suppliers with the worst record in delivering goods on time? A) ESS B) TPS C) MIS D) DSS E) CRM Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 28) Which of the following systems is especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance? A) MIS B) TPS C) DSS D) KMS E) CRM Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 29) Which of the following systems would you use to forecast the return on investment if you used new suppliers with better delivery track records? A) ESS B) TPS C) MIS D) DSS E) CRM Answer: D Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 8 Copyright © 2019 Pearson Education, Ltd. 30) DSS and MIS are also referred to as ________ systems. A) collaboration B) business intelligence C) executive support D) business model E) expert Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 31) An ESS is an information system that supports the: A) long-range planning activities of senior management. B) knowledge and data workers in an organization. C) decision-making and administrative activities of middle managers. D) day-to-day processes of production. E) management of customer relationships. Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 32) Which of the following systems would you use to determine which trends in your supplier's industry will affect your firm the most during the next five years? A) ESS B) TPS C) MIS D) DSS E) KWM Answer: A Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 9 Copyright © 2019 Pearson Education, Ltd. 33) Which of the following statements about the National Football League's use of RFID technology is not true? A) NFL teams use the data generated by the system to evaluate player and team performance and to analyze tactics. B) The system relies on cloud computing. C) NFL teams use the data generated by the system to analyze fan behavior. D) Information gathered by the system is used by commentators on live game broadcasts. E) Microsoft gathers and displays the data using NFL.com. Answer: C Difficulty: 3: Challenging AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 34) Which of the following systems is designed to support organization-wide process coordination and integration? A) DSS B) MIS C) CRM D) Enterprise applications E) ESS Answer: D Difficulty: 1: Easy AACSB: Application of Knowledge; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 35) A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, usable by many parts of the business. A) TPS B) DSS C) automatic reporting system D) MIS E) enterprise system Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 10 Copyright © 2019 Pearson Education, Ltd. 36) What is the most important benefit of an enterprise application? A) Enabling speed of communicating B) Enabling business functions and departments to share information C) Enabling a company to work collaboratively with customers and suppliers D) Enabling cost-effective, e-business processes E) Enabling managers to make better decisions Answer: B Difficulty: 3: Challenging AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 37) ________ systems integrate and share information from suppliers, manufacturers, distributors, and logistics companies. A) Collaborative distribution B) Supply chain management C) Reverse logistics D) Enterprise planning E) Digital dashboard Answer: B Difficulty: 1: Easy AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 38) A ________ provides information to coordinate all of the business processes that deal with customers in sales, marketing, and service to optimize revenue, customer satisfaction, and customer retention. A) TPS B) MIS C) ESS D) CPS E) CRM system Answer: E Difficulty: 1: Easy AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 11 Copyright © 2019 Pearson Education, Ltd. 39) Which of the following can typically access a company's intranet? A) The general public B) The firm's employees C) The firm's customers D) The firm's suppliers E) The firm's outside contractors Answer: B Difficulty: 3: Challenging AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 40) You manage the Information Systems department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics, such as views and click-throughs, about their current display ads. Which type of system will most efficiently provide a solution? A) CRM B) Enterprise system C) Extranet D) Intranet E) KWM Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 41) Which of the following refers to the purchase or sale of goods and services over the Internet? A) E-commerce B) E-business C) CRM D) MIS E) SCM Answer: A Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 12 Copyright © 2019 Pearson Education, Ltd. 42) The use of digital technology and the Internet to execute the major business processes in the enterprise is called: A) e-commerce. B) e-business. C) enterprise applications. D) MIS. E) KWM. Answer: B Difficulty: 1: Easy AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 43) You work for a highly successful advertiser that is about to expand nationally. Of utmost importance will be finding a way to store and disseminate its clients' frequently updated branding and style guides throughout the organization. The guides include multiple image files and text documents. What system will best serve these needs? A) A wiki B) An extranet with KMS capabilities C) A TPS with KMS capabilities D) A telepresence system E) A virtual world Answer: B Difficulty: 3: Challenging AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 13 Copyright © 2019 Pearson Education, Ltd. 44) You have been hired by Inspiration Inc. to help improve its financial performance. Inspiration Inc. is a business communications consulting firm that services many clients in different industries throughout the world. The firm provides its clients with customized written recommendations about how to best use the client's existing resources to improve the client's internal communications. The company has approximately 100 consultants, all of whom are located in its central headquarters in Chicago. Which of the following systems would you recommend to improve Inspiration Inc.'s business processes and improve its financial performance? A) Extranet, to enable quick collaboration via the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed B) CRM, to maintain easily accessible customer records to minimize the time spent looking for client data C) KMS, to minimize redundant work on similar clients D) Video conferencing system, to improve collaboration E) MIS, to produce reports on the firm's operations Answer: A Difficulty: 3: Challenging AACSB: Analytical Thinking; Application of Knowledge; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 45) Which of the following types of systems could be used to enable different firms to work collaboratively on a product? A) Intranet B) Extranet C) KMS D) CRM E) DSS Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 46) SCM systems are considered to be a(n) ________ because they automate the flow of information across company boundaries. A) KMS B) enterprise system C) MIS D) interorganizational system E) cross-functional system Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 14 Copyright © 2019 Pearson Education, Ltd. 47) The principal purpose of a TPS is to answer routine questions and track the flow of transactions through an organization. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 48) A TPS helps managers monitor the firm's relations with the external environment. Answer: TRUE Difficulty: 3: Challenging AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 49) A payroll system is a typical example of an MIS. Answer: FALSE Difficulty: 1: Easy AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 50) An MIS typically uses data supplied by a TPS. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 51) An MIS generally is not flexible and has little analytical capability. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 52) Most MIS's use sophisticated mathematical models or statistical techniques. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 15 Copyright © 2019 Pearson Education, Ltd. 53) A DSS often uses information from external sources. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 54) An ESS is designed to serve the middle management of the organization. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 55) An ESS is designed to incorporate data about external events, but it also draws summarized information from internal MIS and DSS. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 56) An ESS is designed primarily to solve specific problems. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 57) Information supplied by an enterprise system is structured around cross-functional business processes. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 58) SCM systems are more externally oriented than enterprise systems. Answer: TRUE Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 16 Copyright © 2019 Pearson Education, Ltd. 59) Enterprise systems do not utilize order transaction data. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 60) A KMS and a CRM system are both types of enterprise applications. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 61) Identify the different types of systems used for the different levels of management in a business. Answer: The types of information systems used for different levels of management are transaction processing systems (TPS), management information systems (MIS), decision-support systems (DSS), and executive support systems (ESS). TPS, such as payroll or order processing, track the flow of the daily routine transactions that are necessary to conduct business. They are used by operational managers to manage day-to-day operations. MIS summarize and report on the company's basic operations using data supplied by TPS. They provide middle managers with reports on the organization's current performance and are not highly analytical. DSS also support middle management decisions when these decisions are unique, rapidly changing, and not specified easily in advance. They use advanced analytical models and data analysis capabilities and often draw on information from external as well as internal sources. ESS support senior management by providing data of greatest importance to senior management decision makers. ESS provide a generalized computing and communications capacity that can be applied to a changing array of problems. ESS present graphs and data from many sources through an interface that is easy for senior managers to use, often a portal. Difficulty: 1: Easy AACSB: Information Technology; Written and Oral Communication LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 17 Copyright © 2019 Pearson Education, Ltd. 62) Eternal Friend, a family-owned manufacturer of pet caskets, has grown exponentially over the last few years. However, they are having difficulty in preparing for future growth. The only information system used at Eternal Friend is an antiquated accounting system. The company has one manufacturing plant located in Arkansas, and three warehouses, in Arkansas, Delaware, and California. The Eternal Friend sales force is national, and Eternal Friend purchases most of its raw materials from a single overseas supplier. You have been hired to recommend the information systems Eternal Friend should implement in order to maintain their competitive edge. However, there is not enough money for a full scale, cross-functional enterprise application, and you will need to limit the first step to a single management level. What will you choose, and why? Answer: A TPS, as this is the basis of business systems and used to keep day-to-day operations running smoothly. A TPS will help to keep production costs low while maintaining quality, and can be used for communicating with other possible vendors. The TPS could later be used to feed MIS and other higher-level systems when they are installed. Difficulty: 3: Challenging AACSB: Application of Knowledge; Information Technology; Written and Oral Communication LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 63) Describe at least two benefits of using enterprise systems. Answer: Enterprise systems integrate the firm's key business processes in sales, production, finance, logistics, and human resources into a single software system so that information can flow throughout the organization, improving coordination, efficiency, and decision making. These systems help create a more uniform organization in which everyone uses similar processes and information, and measures their work in terms of organization-wide performance standards. The coordination of the firm's key business processes allows the firm to respond more rapidly to customer demands. Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology; Written and Oral Communication LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 64) How can a good CRM system increase profits for a company? Answer: Customer relationship management uses information systems to coordinate all of the business processes surrounding the firm's interactions with its customers. The systems consolidate customer information from multiple sources—telephone, email, wireless devices, traditional sales and marketing systems, and the web—so that the firm can obtain a unified view of a customer. Understanding the customer allows a firm to increase the effectiveness of their marketing campaigns. Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology; Written and Oral Communication LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 18 Copyright © 2019 Pearson Education, Ltd. 65) The automotive tire supply company you work for, Tires4U, has noticed that one of its brands of tires is not selling nearly as well as anticipated at most of its locations. For each of the four main types of information systems found in a business, identify a query that might help understand this development. Of the four types of systems, which do you think will be the most helpful and why? Answer: You might query operational level TPS to make sure that the product is actually getting to the stores and being restocked. You could query MIS to see average sales levels according to geography, location, and other factors to see if there are any specific factors affecting the sales. You might query ESS to see if the same tires are being sold by competitors and what these prices are. You might use DSS to see what factors could increase sales. Assuming that the tires are being properly stocked at the stores, the most important system to query is the MIS for summaries of sales records to help pinpoint any other factors, sales and marketing to assure that promotion and pricing is accurate. Difficulty: 3: Challenging AACSB: Application of Knowledge; Information Technology; Written and Oral Communication LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 66) What is a digital dashboard, and why are they becoming an increasingly popular tool? Answer: A digital dashboard displays graphical information and charts of key performance indicators on a single screen. They are becoming increasingly popular because they provide comprehensive and accurate information for decision making that helps managers quickly spot areas that need attention. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 67) How have the technologies associated with e-business impacted government? Answer: Governments on all levels are using Internet technology to deliver information and services to citizens, employees, and businesses with which they work. The term e-government refers to the application of the Internet and networking technologies to enable government and public sector agencies' relationships with citizens, businesses, and other arms of government digitally. In addition to improving delivery of government services, e-government can make government operations more efficient and empower citizens by giving them easier access to information and the ability to network digitally with other citizens. For example, citizens in some states can renew their driver's licenses or apply for unemployment benefits online, and the Internet has become a powerful tool for instantly mobilizing interest groups for political action and fund-raising. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 2-2: How do systems serve different management groups in a business, and how do systems that link the enterprise improve organizational performance? 19 Copyright © 2019 Pearson Education, Ltd. 68) From your reading of the chapter-opening case study discussing Sanofi Pasteur's use of enterprise social networking, which of the following statements best expresses Sanofi Pasteur's experience? A) Sanofi Pasteur's primary motivation was to enhance its security. B) Sanofi Pasteur's primary motivation was to give employees more opportunities to experiment and innovate on their own. C) Efforts to implement Yammer were met with significant resistance from employees. D) Yammer provided Sanofi Pasteur with a single entry point to all the information and tools employees need for their jobs. E) Sanofi Pasteur is primarily using Yammer to create an external network to link suppliers, customers, and others outside the organization. Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 69) Interaction jobs are those jobs which: A) require close coordination and collaboration. B) involve knowledge that can't be put into an information system. C) are performed typically by operational-level employees. D) require intense levels of interaction with clients. E) require an emphasis on innovation. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge; Interpersonal Relations and Teamwork LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 70) In a business environment, the focus of collaboration is to: A) accomplish the task at hand. B) provide a sense of community. C) foster better communication. D) prevent miscommunication. E) increase a firm's profit margin. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge; Interpersonal Relations and Teamwork LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 20 Copyright © 2019 Pearson Education, Ltd. 71) Which of the following statements is not true about collaboration in a business setting? A) Collaboration may be a short-lived activity, lasting just a few minutes. B) Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity. C) Meaningful collaboration requires a supportive business firm culture and the right, decentralized structure. D) The evidence of the business benefits of collaboration is largely anecdotal. E) Special types of information systems are available to support collaboration. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge; Interpersonal Relations and Teamwork LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 72) Each of the following is required for successful collaboration, except: A) open culture. B) strong hierarchy. C) decentralized structure. D) breadth of collaboration. E) appropriate collaboration technology. Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking; Interpersonal Relations and Teamwork LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 73) A wiki is a type of collaborative: A) social network. B) blog. C) virtual world. D) website. E) MIS. Answer: D Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 21 Copyright © 2019 Pearson Education, Ltd. 74) Second Life is an example of a(n): A) virtual world. B) wiki. C) social network. D) mind mapping tool. E) extranet. Answer: A Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 75) The goal of social commerce applications is to: A) connect through personal and business profiles. B) use social media to connect with customers. C) share opinions about purchasing products or services. D) upload and share business documents. E) harness collective knowledge to generate new ideas. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 76) What analytical framework discussed in the chapter helps understand and evaluate the benefits and uses of collaboration tools? A) Cost/use matrix B) Task/time matrix C) Space/cost matrix D) Time/space matrix E) Time/cost matrix Answer: D Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 22 Copyright © 2019 Pearson Education, Ltd. 77) Adobe Connect is an example of which of the following types of collaboration tools? A) Blog B) Team room C) Online meeting D) Group calendar E) Wiki Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology; Interpersonal Relations and Teamwork LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 78) Which of the following Google tools allows people to engage in group video chat? A) Google Drive B) Google Docs C) Google Sites D) Google Circles E) Google Hangouts Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 79) Instant messaging, videoconferencing, and shared screens are all examples of ________ collaboration tools. A) bimodal B) colocated C) synchronous D) spontaneous E) asynchronous Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 23 Copyright © 2019 Pearson Education, Ltd. 80) ________ technology allows a videoconference participant to give the appearance of being present at a location other than his or her true physical location. A) Telepresence B) Virtual reality C) Screen sharing D) Mind mapping E) Virtual world Answer: A Difficulty: 2: Moderate AACSB: Information Technology; Interpersonal Relations and Teamwork LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 81) SVF uses which of the following collaboration tools? A) EMC Documentum eRoom B) IBM Notes C) Microsoft SharePoint Online D) Microsoft Yammer E) Salesforce Chatter Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 82) As discussed in the chapter case, what is the primary reason why Spacebook failed? A) It was too expensive to implement. B) It was designed and developed without taking the organization's culture into consideration. C) It did not include enough collaboration tools. D) Its user interface was confusing. E) It was riddled with technical issues. Answer: B Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 24 Copyright © 2019 Pearson Education, Ltd. 83) Jive is an example of which of the following? A) MIS B) Enterprise social networking tool C) E-commerce system D) Intranet E) Extranet Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 84) Nearly all of the research on the business benefits of collaboration is anecdotal. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge; Interpersonal Relations and Teamwork LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 85) The primary goal of social business is to deepen interactions with employees and customers. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge; Interpersonal Relations and Teamwork LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 86) You are consulting on software purchases for a translation agency whose headquarters is in New Jersey, but which works with translators located globally. Headquarters needs to share documents with groups of translators working on the same documents, who also need to communicate with each other, in real time if possible, as many people are working in different time zones. (1) What is your process for determining the most appropriate collaboration software? (2) In this particular case, what features will you be looking for? Answer: (1) The first step is to determine what the challenges facing the company are and to place these needs in the time/space matrix—does collaboration need to be synchronous or asynchronous; does it need to be remote or colocated? Once the firm's location in the matrix is determined, you can look for vendor products that fill these needs and analyze the products' cost, features, benefits, risks, training, and implementation issues. A selection of the top contenders can be presented to the company. (2) In this case, we will be looking for products that allow remote interactions that are both synchronous and asynchronous. Difficulty: 3: Challenging AACSB: Application of Knowledge; Information Technology; Written and Oral Communication LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 25 Copyright © 2019 Pearson Education, Ltd. 87) Identify and describe at least four business benefits of collaboration. Which do you feel is the most important and why? Answer: Business benefits from collaboration are (1) productivity; (2) quality; (3) innovation; (4) customer service; and (5) financial performance. Collaboration helps productivity because people working together on a task can complete the task more quickly. It helps quality because people working together will be more able to correct each other's mistakes. It helps innovation because people working in groups come up with more ideas than those working in isolation. It helps customer service because teams can solve customer complaints more quickly together rather than working in isolation. And as a result of all of these benefits, collaboration helps finance, because collaborative firms have superior sales, sales growth, and financial performance. Student evaluations will vary: for example, the most important of the benefits might be: innovation, because new products, services, and means of production are at the heart of being able to outperform your competitors. Difficulty: 2: Moderate AACSB: Analytical Thinking; Interpersonal Relations and Teamwork; Written and Oral Communication LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 88) Why are "conversations" relevant to social business? Answer: Customers, suppliers, employees, managers, and even oversight agencies continually have conversations about firms, often without the knowledge of the firm or its key actors (employees and managers). Supporters of social business assert that if firms could tune into these conversations, they will strengthen their bonds with consumers, suppliers, and employees, increasing their emotional involvement in the firm. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 26 Copyright © 2019 Pearson Education, Ltd. 89) How does a firm with collaborative business culture and business processes differ from a "command-and-control" firm? Answer: In command-and-control organizations, the top leaders determine all the really important matters and then order lower-level employees to execute senior management plans. The job of middle management is to pass messages back and forth up and down the hierarchy. Command-and-control firms require lower-level employees to carry out orders without asking too many questions, with no responsibility to improve processes, and with no rewards for teamwork or team performance. If workgroups need help from another work group, that is something for the bosses to figure out. Employees never communicate horizontally, always vertically, so management can control the process. A collaborative business culture and business processes are very different. Senior managers are responsible for achieving results but rely on teams of employees to achieve and implement the results. Policies, products, designs, processes, and systems are much more dependent on teams at all levels of the organization to devise, to create, and to build. Teams are rewarded for their performance, and individuals are rewarded for their performance in a team. The function of middle managers is to build the teams, coordinate their work, and monitor their performance. The business culture and business processes are more social. In a collaborative culture, senior management establishes collaboration and teamwork as vital to the organization, and it actually implements collaboration for the senior ranks of the business as well. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 2-3: Why are systems for collaboration and social business so important, and what technologies do they use? 90) Which of the following is most likely to have direct responsibility for ensuring that his or her company complies with existing data privacy laws? A) CPO B) CKO C) CIO D) CIP E) CSO Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 2-4: What is the role of the information systems function in a business? 91) The principal liaison between the information systems groups and the rest of the organization is a(n): A) programmer. B) information systems manager. C) systems analyst. D) CIO. E) CSO. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 2-4: What is the role of the information systems function in a business? 27 Copyright © 2019 Pearson Education, Ltd. 92) A ________ is a senior manager who oversees the use of IT in the firm. A) CEO B) CFO C) CIO D) CIT E) CPO Answer: C Difficulty: 1: Easy AACSB: Application of Knowledge LO: 2-4: What is the role of the information systems function in a business? 93) Development and support services for a firm's business systems are provided by: A) IT educational services. B) IT management services. C) data management services. D) IT standards services. E) application software services. Answer: E Difficulty: 3: Challenging AACSB: Information Technology LO: 2-4: What is the role of the information systems function in a business? 94) Policies that determine which information technology will be used, when, and how, are provided by: A) IT educational services. B) IT management services. C) application software services. D) IT standards services. E) data management services. Answer: D Difficulty: 3: Challenging AACSB: Information Technology LO: 2-4: What is the role of the information systems function in a business? 95) Which of the following would a CSO not be responsible for? A) Educating and training users about security B) Keeping management aware of security threats C) Maintaining tools chosen to implement security D) Providing physical security E) Enforcing the firm's information security policy Answer: D Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 2-4: What is the role of the information systems function in a business? 28 Copyright © 2019 Pearson Education, Ltd. 96) Which of the following would be primarily responsible for enterprise-wide governance and usage of information to maximize the value of an organization's data? A) CKO B) CPO C) End users D) CDO E) CSO Answer: D Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 2-4: What is the role of the information systems function in a business? 97) Which of the following is not a service typically provided by an information systems department? A) Telecommunications services B) Physical facilities management services C) Data management services D) Project management services E) Human resources services Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 2-4: What is the role of the information systems function in a business? 98) Systems analysts are the principal liaisons between the information systems group and the rest of the organization. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 2-4: What is the role of the information systems function in a business? 99) End users are playing an increasing role in the design and development of information systems. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 2-4: What is the role of the information systems function in a business? 29 Copyright © 2019 Pearson Education, Ltd. 100) The role of the information systems department in a company is solely to support the needs of other groups as determined by senior managers. Explain why you agree or disagree with this statement. Answer: Answers will vary, but should include an understanding of the role this department plays in creating new products and services and coordinating organizational change. An example answer is: I disagree with this statement. While a major function of the information systems department is to install, run, and manage the technology infrastructure, another role that it should play is to inform the company about new technologies, suggest capabilities the firm could have based on new or existing technologies, and helping the firm manage business processes and change. Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology; Written and Oral Communication LO: 2-4: What is the role of the information systems function in a business? 30 Copyright © 2019 Pearson Education, Ltd. Essentials of MIS, 13GE (Laudon/Laudon) Chapter 5 IT Infrastructure: Hardware and Software 1) Software that manages the resources of the computer is called: A) system software. B) application software. C) data management software. D) network software. E) web services software. Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 5-1: What are the components of IT infrastructure? 2) Software used to apply the computer to a specific task for an end user is called: A) system software. B) application software. C) data management software. D) network software. E) web services software. Answer: B Difficulty: 1: Easy AACSB: Information Technology LO: 5-1: What are the components of IT infrastructure? 3) Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called: A) system software. B) application software. C) data management software. D) network software. E) web services software. Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 5-1: What are the components of IT infrastructure? 4) Which of the following is an example of a legacy system? A) Transaction processing system running on a mainframe B) Scalable grid computing system C) Web services running on a cloud computing platform D) MDM software E) Quantum computing system Answer: A Difficulty: 3: Challenging AACSB: Information Technology LO: 5-1: What are the components of IT infrastructure? 1 Copyright © 2019 Pearson Education, Ltd. 5) A firm's IT infrastructure provides the foundation for supporting all the information systems in the business. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 5-1: What are the components of IT infrastructure? 6) Today, most system and application software is custom built by in-house programmers. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 5-1: What are the components of IT infrastructure? 7) Systems integration means ensuring the legacy systems work with new elements of the infrastructure. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 5-1: What are the components of IT infrastructure? 8) System software manages the resources and activities of computers Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 5-1: What are the components of IT infrastructure? 9) Describe the five major categories of IT infrastructure and provide an example of each. Answer: The major components of IT infrastructure are computer hardware, computer software, data management technology, networking and telecommunications technology, and technology services. Computer hardware consists of technology for computer processing, data storage, input, and output, such as large mainframes, servers, midrange computers, desktop and laptop computers, and mobile devices. Computer software includes both system software and application software. System software, such as the Windows operating system, manages the resources and activities of the computer. Application software, such as Microsoft Word, applies the computer to a specific task for an end user, such as processing an order or generating a mailing list. Data management technology is specialized software to organize the data and make it available to business users. Networking and telecommunications technology provides data, voice, and video connectivity to employees, customers, and suppliers. Technology services includes the people to run and manage the other infrastructure components and to train employees in how to use these technologies for their work. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 5-1: What are the components of IT infrastructure? 2 Copyright © 2019 Pearson Education, Ltd. 10) In a ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. A) scalable B) quantum C) grid D) hybrid cloud E) private cloud Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 11) What would be a reason for using a workstation rather than a personal computer? A) When you need more powerful computational abilities B) When you need to access a network C) When you need to serve applications and data to client computers D) When you need to share resources E) When you need to connect to a cloud computing platform Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 12) Which of the following types of computers would you use to support a computer network? A) Server B) Mainframe C) Workstation D) PC E) Tablet Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 3 Copyright © 2019 Pearson Education, Ltd. 13) Which of the following types of computers are used for weather forecasting on a national or worldwide scale? A) Mainframe B) Server C) Minicomputer D) Supercomputer E) PC Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 14) Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: A) co-location. B) cloud computing. C) grid computing. D) client/server computing. E) centralized processing. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 15) The use of multiple computers linked by a communications network for processing is called: A) grid computing. B) distributed processing. C) client/server computing. D) centralized processing. E) supercomputing. Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 4 Copyright © 2019 Pearson Education, Ltd. 16) The business case for using grid computing involves all of the following except: A) cost savings. B) centralized maintenance. C) speed of computation. D) agility. E) increased computational power. Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 17) Which of the following statements about client/server computing is not true? A) The client provides the user interface. B) The bulk of processing occurs on the client. C) Computing on the Internet is based on the client/server model. D) The client is normally a desktop or laptop computer. E) The server provides security, remote access, and user authentication. Answer: B Difficulty: 3: Challenging AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 18) In a multitiered network: A) the work of the entire network is centralized. B) the work of the entire network is balanced over several levels of servers. C) processing is split between clients and servers. D) processing is handled by multiple, geographically remote clients. E) users interface with the server rather than the client. Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 5 Copyright © 2019 Pearson Education, Ltd. 19) A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. A) service-oriented B) on-demand C) multitiered client/server D) two-tiered client/server E) grid Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 20) How many transactions per day can the IBM Z13 mainframe process? A) 2.5 million B) 25 million C) 250 million D) 2.5 billion E) 25 billion Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 21) Which of the following is a type of optical drive storage? A) Blu-ray B) Hard drive C) USB flash drive D) Magnetic tape E) SSD Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 6 Copyright © 2019 Pearson Education, Ltd. 22) In lightweight PCs, smartphones, and tablets, which of the following have replaced hard drives? A) CD-ROM B) RAID C) SSDs D) Magnetic tape E) SANs Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 23) All of the following are traditional storage technologies except: A) magnetic disks. B) optical drives. C) magnetic tape. D) cloud computing. E) storage networks. Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 24) What type of device gathers data and converts them into electronic form for use by the computer? A) Output device B) Input device C) Optical storage D) Magnetic storage E) SAN Answer: B Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 7 Copyright © 2019 Pearson Education, Ltd. 25) Which of the following devices collects data directly from the environment for input into a computer system? A) Sensor B) Touch screen C) Audio input D) Trackball E) Digital scanner Answer: A Difficulty: 3: Challenging AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 26) Which of the following is not a type of input device? A) Digital scanner B) Flat panel (LCD) display screen C) Trackball D) Keyboard E) Sensor Answer: B Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 27) Virtualization: A) allows one operating system to manage several physical machines. B) has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. C) can boost server utilization rates to 70% or higher. D) allows smartphones to run full-fledged operating systems. E) uses the principles of quantum physics to represent data. Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 8 Copyright © 2019 Pearson Education, Ltd. 28) Which of the following statements is not true about cloud computing? A) It is the fastest-growing form of computing. B) It removes the concern about data and systems security for businesses. C) It allows smaller firms to use resources previously unaffordable. D) It relies on the Internet as the platform for delivering services to users. E) Charges for cloud resources are based on resources actually used. Answer: B Difficulty: 3: Challenging AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 29) Which of the following is not an essential characteristic of cloud computing? A) On-demand self-service B) Rapid elasticity C) Measured service D) Open source software E) Ubiquitous network access Answer: D Difficulty: 3: Challenging AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 30) ________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices. A) Capacity planning B) Cloud computing C) Green computing D) Utility computing E) On-demand computing Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 9 Copyright © 2019 Pearson Education, Ltd. 31) The world's data centers use as much energy as the output of ________ nuclear power plants, which is about ________ percent of all the energy use in the world. A) 10; 1 B) 20; 2.5 C) 30; 1.5 D) 50; 10 E) 100; 25 Answer: C Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 32) All of the following are techniques being used to make data centers more "green" except: A) air-cooling. B) virtualization. C) use of wind power. D) use of hydropower. E) use of backup generators. Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 33) Which of the following is not an example of the consumerization of IT? A) Google's G Suite B) BYOD C) Facebook D) Gmail E) Amazon Web Services Answer: E Difficulty: 3: Challenging AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 10 Copyright © 2019 Pearson Education, Ltd. 34) All of the following are examples of wearable computing devices except: A) smartwatches. B) smart badges. C) activity trackers. D) smart glasses. E) smartphones. Answer: E Difficulty: 3: Challenging AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 35) As discussed in the chapter case, all of the following are benefits of wearable computing devices except: A) providing geolocation information for employees. B) delivering instant notifications to sales managers. C) using analytic software for performance metrics. D) processing customer credit card information. E) providing access to corporate databases. Answer: D Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 36) Which of the following is considered to be the fastest-growing form of computing? A) Wearable computing B) Green computing C) Nanocomputing D) Enterprise computing E) Cloud computing Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 37) A mainframe is a type of legacy workstation. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 11 Copyright © 2019 Pearson Education, Ltd. 38) Client/server computing is the most widely used form of centralized processing. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 39) Application server software is responsible for locating and managing stored web pages. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 40) Using an online storage service such as Dropbox is a type of virtualization. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 41) In cloud computing, rapid elasticity refers to the ability of computing resources to be quickly obtained, increased, or decreased to meet demand. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 42) A private cloud is operated for the benefit of a single organization but may be managed by a third party and located off premises. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 43) Google Suite is an example of SaaS. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 12 Copyright © 2019 Pearson Education, Ltd. 44) Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 45) A SaaS provider maintains a large web server, or series of servers, and provides fee-paying subscribers with space to maintain their websites. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 46) In client/server computing, the server provides users access to system resources. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 47) Desktop PCs, laptops, and smartphones are the primary interface for accessing the Internet. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 48) An international ad hoc group of climatologists and oceanographers needs to set up a system to analyze massive amounts of data on ocean temperatures, collected hourly by hundreds of ships worldwide. What types of hardware might they need for storage and processing? What techniques might they use to make their research more efficient and lower costs? Answer: To store their data they will need a SAN. To process their data, they will need a supercomputer or grid computing. To lower costs, they could look at on-demand or utility computing, as well as multicore processors and virtualization. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 13 Copyright © 2019 Pearson Education, Ltd. 49) You are starting a small market research company with a single business partner, and are planning the hardware and software needs for the two of you. You realize that you will need to make daily backups of your data. What choices do you have as backup media, and what will you choose? Why? Answer: Storage options are: magnetic disks or hard drives, USB flash drives, CD-ROM or CDR-W, DVDs, Magnetic tape, SAN. Student answers will vary as to their choice of backup media. An example answer is: I would probably choose an online backup service or a SAN, because you can automatically back up your data, or an external or separate hard drive so that you do not have to keep inserting and removing CDs or DVDs. Difficulty: 1: Easy AACSB: Information Technology; Written and Oral Communication LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 50) List and describe the major trends in computer hardware. Which of these do you think will create the biggest changes in business information systems, and why? Answer: The major trends in hardware are: the mobile digital platform, consumerization of IT and BYOD, nanotechnology and quantum computing, virtualization, cloud computing, green computing, and high performance and power-saving processors. In the mobile digital platform trend, business computing is increasingly moving to smaller, mobile devices such as smartphones, and tablet computers, and netbooks. The consumerization of IT describes the phenomenon in which new information technology first emerges in the consumer market and then spreads to business organizations. One aspect of this is BYOD, or bring your own device, which describes the use of personal mobile devices for work. Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit. In quantum computing, data is processed using principles of quantum physics rather than binary digits or bits, making processing speeds millions of times faster than today. Virtualization is the process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location. Server virtualization enables companies to run more than one operating system at the same time on a single machine. In cloud computing, firms and individuals obtain computing resources and software applications over the Internet ("the cloud"). In green computing, companies utilize practices for manufacturing, deploying, and disposing of technology assets that minimize waste and pollution. The development and use of high performance and power-saving microprocessors is an additional method of increasing computational power without increasing or with reducing the power and cooling requirements of computers. Student opinions regarding the effects of the trends will vary. An example answer is: I think mobile computing will create the biggest changes, because this means that the amount of information and types of information being used in business, as well as the locations and hours of business, will increase drastically. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 14 Copyright © 2019 Pearson Education, Ltd. 51) You are an IT consultant advising a building inspection company that conducts home inspections throughout your state. The company wishes to switch to primarily mobile computing, so that inspectors can finalize reports without having to return to the office, but they are not sure how to go about this. What will be your advice? Answer: An example answer is: To support the use of multiple mobile devices, including employee devices, the company will need to configure its networks to receive connections from these devices, and create an inventory of all mobile devices authorized for access. They will also need to track what company information is being stored on these devices. If the information stored on employee's personal devices is highly confidential, they may want to consider the additional expense of purchasing work-only mobile devices. I would also ask the company what types of applications would be used in order to determine if tablet computers, netbooks, or smartphones will be best, as the operating systems for these devices differ. They may also want to consider mobile device management software to monitor and manage their mobile devices. It is probably best to sit down with the company and review the home inspection workflow and data needs in detail and determine how mobile computing would be employed most efficiently. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 52) What are the essential characteristics of cloud computing? Answer: As defined by the U.S. National Institute of Standards and Technology, cloud computing is characterized by on-demand self-service, ubiquitous network access, locationindependent resource pooling, rapid elasticity, and measured service. On-demand self-service means that consumers can use server time and network storage as they need it on their own. Ubiquitous network refers to the ability to access cloud resources across all devices and platforms, including mobile. Location independent resource pooling describes the ability to allocate resources to any part of the world without a dip in service quality. Rapid elasticity is the capacity for resources to be increased or decreased as needed to meet demand. Lastly, measured service refers to the payment technique whereby users are charged based on the resources they use, as opposed to monthly or yearly rates. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 5-2: What are the major computer hardware, data storage, input, and output technologies used in business and the major hardware trends? 15 Copyright © 2019 Pearson Education, Ltd. 53) Which of the following is an interactive, multiuser operating system developed by Bell Laboratories in 1969 to be highly supportive of communications and networking? A) UNIX B) Linux C) OS X D) COBOL E) Chrome Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 54) Linux is: A) primarily concerned with the tasks of end users. B) designed for specific machines and specific microprocessors. C) an example of open source software. D) especially useful for processing numeric data. E) the operating system for the Macintosh computer. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 55) Linux plays a major role in supporting business information systems, and has garnered about ________ of the U.S. server market. A) 10 percent B) 25 percent C) 35 percent D) 50 percent E) 80 percent Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 16 Copyright © 2019 Pearson Education, Ltd. 56) Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating systems? A) Java B) C++ C) XML D) Visual Basic E) COBOL Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 57) The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution? A) Mashups B) Extranet C) Web services D) Cloud computing E) Intranet Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 58) The National Institute of Standards (NIST) defines cloud computing as having all of the following characteristics except: A) measured service. B) ubiquitous network access. C) collaboration service. D) rapid elasticity. E) on-demand self-service. Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 17 Copyright © 2019 Pearson Education, Ltd. 59) Microsoft Word is an example of: A) open source software. B) word processing software. C) software productivity suite. D) data management software. E) presentation graphics software. Answer: B Difficulty: 1: Easy AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 60) Which of the following statements about Linux is not true? A) Linux is a UNIX-like operating system. B) Linux plays a major role in running web servers and local area networks. C) Linux is the primary OS used in quantum computing. D) Linux is a robust alternative to Windows operating systems. E) Linux is an example of open source software. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 61) Microsoft Excel is an example of: A) data management software. B) spreadsheet software. C) presentation graphics. D) word processing software. E) presentation graphics software. Answer: B Difficulty: 1: Easy AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 18 Copyright © 2019 Pearson Education, Ltd. 62) Which type of software provides more control over text and graphic placement in the layout of a page than word processing software? A) Desktop publishing software B) Spreadsheet software C) Graphics software D) Presentation software E) Data management software Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 63) ________ refers to the ability of a system to expand to serve a number of users without breaking down. A) Capacity planning B) Management future planning C) Scalability D) Guaranteed levels of service E) Service level agreements Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 64) Running a Java program on a computer requires: A) a Java Virtual Machine to be installed on the computer. B) a Java Virtual Machine to be installed on the server hosting the Java applet. C) an applet to be downloaded to the user's computer. D) no extra or specialized software, as Java is platform-independent. E) an Intel processor and the Windows operating system. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 19 Copyright © 2019 Pearson Education, Ltd. 65) What is the foundation technology for web services? A) HTML B) XML C) SOAP D) UDDI E) Java Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 66) A(n) ________ is a set of self-contained services that communicate with each other to create a working software application. A) web service B) hybrid cloud C) SOA D) ERP E) mashup Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 67) ZipRealty, which combines Google Maps with real estate data, is an example of: A) cloud computing. B) SOA. C) a widget. D) a mashup. E) a web service. Answer: D Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 5-3: What are the major types of computer software used in business and the major software trends? 20 Copyright © 2019 Pearson Education, Ltd. 68) Software applications that combine different components of online software applications are referred to as: A) integrated software. B) widgets. C) mashups. D) grid computing. E) web services. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 69) Which of the following software tools would you use to prepare a break-even analysis? A) Word processing B) Spreadsheet C) Desktop publishing D) Personal information management E) Presentation graphics Answer: B Difficulty: 3: Challenging AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 70) Which of the following is an open-source operating system designed for mobile devices? A) iOS B) OS X C) Chrome D) Android E) Apache HTTP Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 21 Copyright © 2019 Pearson Education, Ltd. 71) ________ is an operating system-independent, processor-independent, object-oriented programming language that has become a leading interactive programming environment for the web. A) XML B) SOA C) HTML D) Java E) COBOL Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 72) ________ provides users with free access to its program code. A) An app B) Open source software C) Cloud-based software D) A web service E) Office software Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 73) The ability of a person booking a flight on Southwest.com's website to reserve a car from Dollar Rent-A-Car without having to leave the airline's website is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following? A) Cloud computing B) Web services C) Nanotechnology D) SaaS E) PaaS Answer: B Difficulty: 3: Challenging AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 74) HTML specifies how text, graphics, video, and sound are placed on a document. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 5-3: What are the major types of computer software used in business and the major software trends? 22 Copyright © 2019 Pearson Education, Ltd. 75) HTML5 is the latest evolution of HTML, and is designed to make it much easier to embed third-party add-ons in web pages. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 5-3: What are the major types of computer software used in business and the major software trends? 76) Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 77) XML is limited to describing how data should be presented in the form of web pages, while HTML can perform presentation, communication, and storage of data. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-3: What are the major types of computer software used in business and the major software trends? 78) You are starting an Internet marketing and data mining company. What types of software can you anticipate needing, and what will these types of software be used for? Answer: I anticipate needing: • Operating system software for computers to run. • Word processing software for communications. • Spreadsheet software for modeling data. • Data management software to combine data downloaded/mined from different sources. • Presentation graphics and desktop publishing software for marketing reports. • Email, web-browsers for daily communication and research. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 5-3: What are the major types of computer software used in business and the major software trends? 23 Copyright © 2019 Pearson Education, Ltd. 79) Identify and describe some of the current trends in contemporary software platforms. Answer: Current trends in software include open source software, cloud-based software services and tools, such as mashups and apps. One of the most influential software trends is the movement towards open source software. Open source software is developed by a community of programmers around the world, who make their programs available to users under one of several different licensing schemes. In cloud-based software, users access software tools and services over the Internet, as in the various Google Apps. Mashups combine the capabilities of two or more online applications to create a kind of hybrid that provides more customer value than the original sources alone. Apps are small pieces of software that run on the Internet, on your computer, mobile, or tablet, and are usually downloaded from the Internet. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 5-3: What are the major types of computer software used in business and the major software trends? 80) Identify and describe the leading PC and server operating systems. Answer: The five most widely used operating systems are Windows 10, Windows Server, UNIX, Linux, and OS X. Windows 10 is the traditional Windows client operating system and is now used on both mobile devices and traditional PCs. Windows Server is used for network servers as well as workstations and PCs, and supports networking tasks. UNIX is used for PCs and network servers and was developed in the late 1960s to support communications and networking across large systems. UNIX is highly customizable. Linux is an open source variation of UNIX which has become popular as a low-cost alternative to UNIX as well as Windows. Linux powers as much as 35 percent of web servers worldwide. OS X is Apple's operating system. The iOS operating system for mobile devices like the iPhone is derived from OS X. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 5-3: What are the major types of computer software used in business and the major software trends? 81) Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) Modifiability B) Scalability C) Expandability D) Disintermediation E) SLA Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 24 Copyright © 2019 Pearson Education, Ltd. 82) To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: A) total cost of ownership model. B) return on investment model. C) break-even point. D) cost benefit analysis. E) capacity plan. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 5-4: What are the principal issues in managing hardware and software technology? 83) Translating software to different languages is commonly referred to as: A) software localization. B) scaling. C) service-oriented architecture. D) outsourcing. E) open sourcing. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 84) In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): A) TCO. B) SOA. C) SLA. D) API. E) capacity plan. Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 5-4: What are the principal issues in managing hardware and software technology? 85) In co-location, a firm: A) purchases and owns its web server but locates the server in the physical facility of a hosting service. B) contracts with an external vendor to run its computer center and networks. C) off-loads peak demand for computing power to remote, large-scale data centers. D) utilizes an external, distributed computing grid. E) uses only open source software to operate its computer systems. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 25 Copyright © 2019 Pearson Education, Ltd. 86) You use ________ to predict when a computer hardware system becomes saturated. A) capacity planning B) virtualization C) localization D) measured service E) SLAs Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 87) An analyst asked to perform capacity planning for a system would need to take into account all of the following factors except: A) the maximum number of users a system can accommodate at one time. B) the minimum response time for processing business transactions. C) the impact of future software applications. D) the purchase price of new computer hardware equipment. E) the volume of transactions. Answer: D Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 5-4: What are the principal issues in managing hardware and software technology? 88) An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except: A) the minimum response time for processing business transactions. B) lost productivity if hardware or software failures cause the system to be unavailable for processing and user tasks. C) real estate and utility costs for housing and providing power for the technology. D) the purchase or license of software for each user. E) the cost to provide training to information systems specialists and end users. Answer: A Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 5-4: What are the principal issues in managing hardware and software technology? 89) The total cost of ownership refers to the direct costs of owning hardware and software. Answer: FALSE Difficulty: 3: Challenging AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 26 Copyright © 2019 Pearson Education, Ltd. 90) A service level agreement specifies the nature and level of services provided by service providers. Answer: TRUE Difficulty: 3: Challenging AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 91) Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 92) Total cost of ownership components include costs for downtime, training, and support. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 93) One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 94) Software localization refers to the entire process of converting software to operate in a second language. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 5-4: What are the principal issues in managing hardware and software technology? 95) What is scalability? Why is it essential to the success of the modern business firm? Answer: Scalability is the ability of the computer, product, or system to expand to serve a larger number of users without breaking down. It is important because as firms grow, they can quickly outgrow their infrastructure. Any modern company must be able to make plans for the future, even though that future may be different than what was expected. Computer equipment is expensive, though dropping in price, and budgets must be planned to allow for new infrastructure and IT support. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 5-4: What are the principal issues in managing hardware and software technology? 27 Copyright © 2019 Pearson Education, Ltd. 96) A small design agency you are a financial consultant for will be creating client websites and wants to purchase a web server so they can host the sites themselves. How will you advise them on this purchase? Answer: They should understand the concept or model of total cost of ownership: the costs will go beyond the cost of the server, but they will also need to purchase the server software, along with any application software they will be using. They will also need someone in their IT department to manage and maintain the computers. They will also incur facilities costs for running the computer. They need to have a backup plan should the server fail. The design agency will need to add up all the potential costs and risks. Additionally, they need to prepare for the possibility they may need more servers. Will they eventually have to run and maintain their own server farm? What about scalability? What if one of their clients' sites is more popular than anticipated and the server has difficulty handling the load? How quickly can they add servers or processing power? The company should look at co-location, web hosting services, and service providers to see if their needs will be better met this way. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 5-4: What are the principal issues in managing hardware and software technology? 97) You have been given the task of creating localized versions of your company's software for overseas branches. What are your chief concerns? Answer: The software will have to be built in a local language interface. Menu bars, commands, error messages, reports, queries, online data entry forms, and system documentation may need to be translated into all the languages of the countries where the system will be used. To be truly useful for enhancing productivity of a global workforce, the software interfaces must be easily understood and mastered quickly. The entire process of converting software to operate in a second language is called software localization. Global systems must also consider differences in local cultures and business processes. Cross-functional systems such as enterprise and supply chain management systems are not always compatible with differences in languages, cultural heritages, and business processes in other countries. In a global systems environment, all of these factors add to the TCO and will influence decisions about whether to outsource or use technology service providers. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 5-4: What are the principal issues in managing hardware and software technology? 98) Define outsourcing and explain some of the computing tasks that are well suited to outsourcing. Answer: Outsourcing is the shift of IT infrastructure and systems development to external vendors. This is a good option for companies without the resources or technical capability to perform certain computing tasks. Tasks well suited to outsourcing include website hosting, web design, development of custom software, and software maintenance. More basic tasks such as data entry and call center operation are often outsourced as well. Outsourcing often requires firms to enter into a service level agreement (SLA) that defines the specific responsibilities of the service provider. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 5-4: What are the principal issues in managing hardware and software technology? 28 Copyright © 2019 Pearson Education, Ltd. 99) What are the components that must be considered in a TCO analysis? Answer: TCO cost components include hardware acquisition, which includes the purchase price of computer hardware equipment, including computers, terminals, storage, and printers; software acquisition, which includes the purchase or license of software for each user; installation, which includes the cost to install computers and software; training, which includes the cost to provide training to information systems specialists and end users; support, which includes the cost to provide ongoing technical support; maintenance, which includes the cost to upgrade hardware and software; infrastructure, which includes the cost to acquire, maintain, and support related infrastructure, such as networks and specialized equipment; downtime, which includes the cost of lost productivity if hardware or software failures cause the system to be unavailable; and space and energy, such as real estate and utility costs. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 5-4: What are the principal issues in managing hardware and software technology? 100) What are some of the challenges companies face in managing the mobile platform? Answer: Today, employees want to be able to use a variety of personally owned mobile devices, including the iPad, iPhone, and Android handhelds, to access corporate systems such as email, databases, and applications. Gains in productivity from equipping employees with mobile computing devices must be balanced against increased costs from integrating these devices into the firm's IT infrastructure and providing technical support. For personal mobile devices to access company information, the company's networks must be configured to receive connections from that device. Firms need an efficient inventory management system that keeps track of which devices employees are using, where each device is, and what software is installed on it. They also need to know what pieces of corporate data are on those personal devices, and this is not always easy to determine. It is more difficult to protect the company's network and data when employees access them from their privately owned devices. If a device is stolen or compromised, companies need to ensure that sensitive or confidential company information isn't exposed. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 5-4: What are the principal issues in managing hardware and software technology? 29 Copyright © 2019 Pearson Education, Ltd. Essentials of MIS, 13GE (Laudon/Laudon) Chapter 6 Foundations of Business Intelligence: Databases and Information Management 1) From your reading of the chapter-opening case study, the Charlotte Hornets implemented a data warehouse in order to solve which of the following problems? A) Online ticket sales were falling. B) There were too many sources of data. C) The entities and attributes of customer records were poorly organized. D) There was too much unorganized customer data for decision makers to digest. E) The team's computer hardware was outdated. Answer: D Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 6-1: What is a database and how does a relational database organize data? 2) In a business relational database, tables contain: A) one table for each entity. B) relations among entities. C) bytes. D) three-dimensional relations. E) links to other tables. Answer: A Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 6-1: What is a database and how does a relational database organize data? 3) Which of the following best illustrates the relationship between entities and attributes? A) The entity CUSTOMER with the attribute PRODUCT B) The entity CUSTOMER with the attribute ADDRESS C) The entity PRODUCT with the attribute PURCHASE D) The entity PRODUCT with the attribute CUSTOMER E) The entity ADDRESS with the attribute CUSTOMER Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 6-1: What is a database and how does a relational database organize data? 1 Copyright © 2019 Pearson Education, Ltd. 4) Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables? A) Two-tiered DBMS B) Pre-digital DBMS C) Open source DBMS D) Hierarchical DBMS E) Relational DBMS Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 5) What are the relationships that the relational database is named for? A) Relationships between rows and columns B) Relationships between entities C) Relationships between fields and records D) Relationships between databases E) Relationships between attributes Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 6-1: What is a database and how does a relational database organize data? 6) A characteristic or quality describing an entity is called a(n): A) field. B) tuple. C) key field. D) attribute. E) table. Answer: D Difficulty: 1: Easy AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 7) The most basic business database is comprised of: A) three tables: for suppliers, parts, and sales. B) four tables: for customers, suppliers, parts, and sales. C) four tables: for customers, suppliers, sales, and employees. D) five tables: for customers, employees, suppliers, parts, and sales. E) attributes instead of tables. Answer: D Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 6-1: What is a database and how does a relational database organize data? 2 Copyright © 2019 Pearson Education, Ltd. 8) In a table for customers, the information about a single customer would reside in a single: A) field. B) entity. C) column. D) table. E) row. Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 9) In a relational database, a record is also called a(n): A) tuple. B) key field. C) entity. D) field. E) table. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 10) A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) foreign key. E) identifying field. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 11) A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) foreign key. E) identifying field. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 3 Copyright © 2019 Pearson Education, Ltd. 12) A schematic of the entire database that describes the relationships in a database is called a(n): A) data dictionary. B) intersection relationship diagram. C) field key diagram. D) data definition diagram. E) entity-relationship diagram. Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 13) A one-to-one relationship between two entities is symbolized in a diagram by a line that ends: A) in two short marks. B) in one short mark. C) with a crow's foot. D) with a crow's foot topped by a short mark. E) with a crow's foot topped by two short marks. Answer: A Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 14) A one-to-many relationship between two entities is symbolized in a diagram by a line that ends: A) in two short marks. B) in one short mark. C) with a crow's foot. D) with a crow's foot preceded by a short mark. E) in three short marks. Answer: D Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 15) A table that links two tables that have a many-to-many relationship is often called a(n): A) derived table. B) intersection relation. C) foreign table. D) entity-relationship table. E) derived relation. Answer: B Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 6-1: What is a database and how does a relational database organize data? 4 Copyright © 2019 Pearson Education, Ltd. 16) The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data administration. E) data management. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 6-1: What is a database and how does a relational database organize data? 17) Which of the following best describes the importance of creating an accurate data model for your business's database? A) It is not essential, as the data model itself is modified by the database continuously. B) It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve. C) It is essential, as table relationships cannot be created without an accurate data model. D) It is somewhat important, as the type of data model will define what kinds of data will be stored. E) It is unnecessary, as a well-designed database should not require one. Answer: B Difficulty: 3: Challenging AACSB: Information Technology LO: 6-1: What is a database and how does a relational database organize data? 18) You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table? A) One-to-many B) One-to-one C) Many-to-many D) Many-to-one E) One-to-all Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 6-1: What is a database and how does a relational database organize data? 5 Copyright © 2019 Pearson Education, Ltd. 19) As described in the chapter case, the Charlotte Hornets used a ________ to consolidate fan data from multiple sources. A) database management system B) relational database C) data warehouse D) data model E) fan management system Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 6-1: What is a database and how does a relational database organize data? 20) The smallest unit of data a computer can handle is called a: A) file. B) record. C) field. D) byte. E) bit. Answer: E Difficulty: 1: Easy AACSB: Information Technology LO: 6-1: What is a database and how does a relational database organize data? 21) A grouping of characters into a word, a group of words, or a complete number is called a tuple Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 6-1: What is a database and how does a relational database organize data? 22) Every record in a file must contain at least one key field. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 6-1: What is a database and how does a relational database organize data? 23) A foreign key is a field that links to a separate table. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-1: What is a database and how does a relational database organize data? 6 Copyright © 2019 Pearson Education, Ltd. 24) A small publishing company that you work for would like to develop a database that keeps track of the contracts that authors and publishers sign before starting a book. What fields do you anticipate needing for this database? Identify at least seven fields. Which of these fields might be in use in other databases within the firm? Answer: Author first name, author last name, author address, agent name, agent address, title of book, book ISBN, date of contract, amount of money, payment schedule, date contract ends. Other databases might be an author database (author names, address, and agent details), a book title database (title and ISBN of book), and financial database (payments made). Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 6-1: What is a database and how does a relational database organize data? 25) What types of relationships are possible in a relational database? Describe and give an example of each. Answer: There are three types of relationships: one-to-one, one-to-many, and many-to-many. A one-to-one relationship occurs when each record in one table has only one related record in a second table. An example might be a table of salespeople and a separate table of company cars. Each salesperson can only have one car, or be related to the one car in the database. A one-tomany relationship occurs when a record in one table has many related records in a second table. An example might be a table of salespeople and clients. Each salesperson may have several clients. A many-to-many relationship occurs when records in one table have many related records in a second table, and the records in the second table have many related records in the first table. An example might be a clients table and a products table. Clients may buy more than one product, and products are sold to more than one client. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 6-1: What is a database and how does a relational database organize data? 26) The small publishing company you work for wants to create a new database for storing information about all of their author contracts. What difficulties do you anticipate? Answer: Data accuracy when the new data is input, establishing a good data model, determining which data is important and anticipating what the possible uses for the data will be, beyond looking up contract information, technical difficulties linking this system to existing systems, new business processes for data input and handling, and contracts management, determining how end users will use the data, making data definitions consistent with other databases, what methods to use to cleanse the data. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 6-1: What is a database and how does a relational database organize data? 7 Copyright © 2019 Pearson Education, Ltd. 27) A DBMS makes the: A) relational database available for different analytical views. B) logical database available for different analytical views. C) physical database available for different relational views. D) relational database available for different physical views. E) physical database available for different logical views. Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 28) The logical view of a database: A) shows how data are organized and structured on the storage media. B) presents an entry screen to the user. C) allows the creation of supplementary reports. D) presents data as they would be perceived by end users. E) shows the relationships between entities and attributes. Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 29) Which of the following allows users to add, change, delete, or retrieve data in a database? A) Attribute generation B) Report generation tools C) Data dictionary D) Query wizard tool E) Data manipulation language Answer: E Difficulty: 1: Easy AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 30) In a relational database, the three basic operations used to develop useful sets of data are: A) select, project, and where. B) select, join, and where. C) select, project, and join. D) select, from, and join. E) who, what, and where. Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 8 Copyright © 2019 Pearson Education, Ltd. 31) The select operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria. E) specifies the content of the database. Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 32) The project operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected. E) stores definitions of data elements. Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 33) Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A) Referential integrity module B) Data definition diagram C) Entity-relationship diagram D) Relationship dictionary E) Data dictionary Answer: E Difficulty: 1: Easy AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 34) Which of the following is the most prominent data manipulation language today? A) Access B) DB2 C) SQL D) Crystal Reports E) Hadoop Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 9 Copyright © 2019 Pearson Education, Ltd. 35) Non-relational databases: A) store information in an unstructured format. B) use rows and columns to organize data. C) are used to store structured and unstructured data. D) are used to store low volumes of transactional data. E) use database-mapping to normalize relations. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 36) DBMS typically include report-generating tools in order to: A) retrieve and display data. B) display data in tables. C) display data in graphs. D) perform predictive analysis. E) display data in an easier-to-read-format. Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 37) Both Oracle and Microsoft Access use SQL to retrieve information from a database. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 38) DBMS simplify how end users work with databases by separating the logical and physical views of the data. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 39) Microsoft Access is a database management system for large mainframes computers. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 40) A logical view of data shows data as it is organized on the storage media. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 10 Copyright © 2019 Pearson Education, Ltd. 41) The select operation in a relational database joins records from different tables. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 42) Identify and describe the three basic operations used to extract useful sets of data from a relational database? Answer: The select operation creates a subset consisting of all records (rows) in the table that meet stated criteria. The join operation combines relational tables to provide the user with more information than is available in individual tables. The project operation creates a subset consisting of columns in a table, permitting the user to create new tables that contain only the information required. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 6-2: What are the principles of a database management system? 43) Describe the process of querying and reporting in a database using DBMS. Answer: DBMS include tools for accessing and manipulating information in databases. A data manipulation language is used to handle data in the database—adding, changing, deleting, and retrieving data. Structured Query Language (SQL) is the most common data manipulation language in use today. DBMS also include the ability to generate reports to display information in a more accessible format using a report generator. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 6-2: What are the principles of a database management system? 44) What are some of the benefits of using the cloud as a database platform? Answer: Cloud-based data management services are ideal for smaller to medium-sized businesses looking to establish database capabilities without paying for expensive in-house database products. Companies can use public cloud-based services or they can use a private cloud to share hardware and software between users, reducing the number of servers, DBMS, and storage devices required. Difficulty: 1: Easy AACSB: Application of Knowledge; Written and Oral Communication LO: 6-2: What are the principles of a database management system? 11 Copyright © 2019 Pearson Education, Ltd. 45) MongoDB and SimpleDB are both examples of: A) open source databases. B) SQL databases. C) NoSQL databases. D) cloud databases. E) big data databases. Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 6-2: What are the principles of a database management system? 46) A ________ is a repository for raw unstructured data or structured data that for the most part have not yet been analyzed. A) data mart B) data warehouse C) dashboard D) data lake E) relational DBMS Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 47) In clustering, a data mining tool will find: A) new groupings within data. B) related predictions from existing values. C) several events grouped by time. D) new associations. E) forecasts for future events. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 48) Big data refers to any database that: A) contains more than one petabyte of data. B) discovers patterns in data. C) has a large volume and variety of data. D) includes data from thousands of websites. E) stores data in rows and columns. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 12 Copyright © 2019 Pearson Education, Ltd. 49) Data mining is more ________ than OLAP. A) data-focused B) multidimensional C) query oriented D) discovery driven E) streamlined Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 50) All of the following are tools or technologies for extracting information from unstructured data sets except: A) sentiment analysis software. B) SQL queries. C) Hadoop. D) a non-relational DBMS. E) text mining. Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 51) Which of the following database types would be best suited for storing multimedia? A) SQL DBMS B) Open source DBMS C) Non-relational DBMS D) Cloud-based database E) NoSQL DBMS. Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 13 Copyright © 2019 Pearson Education, Ltd. 52) Pre-configured hardware-software systems that use both relational and non-relational technology optimized for analyzing large data sets are referred to as: A) hybrid DBMS. B) Hadoop. C) BI. D) analytic platforms. E) data marts. Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 53) Which of the following statements about data warehouses is not true? A) They store supply data to be used across the enterprise for management analysis and decision making. B) Data warehouse systems provide a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities. C) They may include data from website transactions. D) Data warehouse systems provide easy-to-use tools for managers to easily update data. E) Data warehouses make data available for anyone to access as needed. Answer: D Difficulty: 3: Challenging AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 54) A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because: A) it typically focuses on a single subject area or line of business. B) all the information is historical. C) it uses a web interface. D) all of the information belongs to a single company. E) it is open-source. Answer: A Difficulty: 3: Challenging AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 14 Copyright © 2019 Pearson Education, Ltd. 55) Capabilities and tools to manage and analyze large quantities and different types of data from multiple sources are collectively known as: A) DSS. B) business intelligence infrastructure. C) OLAP. D) data mining. E) in-memory computing. Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 56) Which of the following enables users to view the same data in different ways using multiple dimensions? A) Hadoop B) SQL C) Big data D) Data mining E) OLAP Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 57) OLAP is a tool that enables users to: A) obtain online answers to ad hoc questions in a rapid amount of time. B) view both logical and physical views of data. C) quickly diagram data relationships. D) normalize data. E) find hidden patterns in large databases. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 15 Copyright © 2019 Pearson Education, Ltd. 58) Data mining is a tool for allowing users to: A) quickly compare transaction data gathered over many years. B) perform multidimensional data analysis. C) obtain online answers to ad hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports. E) find hidden relationships in data. Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 59) In terms of the data relationships found by data mining, associations refers to: A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings. E) classification when no groups have yet been defined. Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 60) In terms of the data relationships found by data mining, sequences refers to: A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings. E) classifications when no groups have yet been defined. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 16 Copyright © 2019 Pearson Education, Ltd. 61) Which of the following would you use to find patterns in user interaction data recorded by web servers? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining E) Web protocol mining Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 62) Which of the following would you use to find out which websites with content related to database design were the most often linked to by other websites? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining E) Web protocol mining Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 63) Businesses use ________ tools to search and analyze unstructured data sets, such as emails and memos. A) Hadoop B) web mining C) text mining D) OLAP E) DBMS Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 17 Copyright © 2019 Pearson Education, Ltd. 64) Hadoop is a(n): A) NoSQL database technology that stores both data and procedures acting on the data as objects. B) data mining platform designed for storing and analyzing big data produced by web communications and transactions. C) open source software framework designed for distributing data-processing over inexpensive computers. D) pre-configured hardware-software system designed for analyzing big data. E) high-speed platform used to analyze large data sets. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 65) A data ________ stores current and historical data of potential interest to decision makers throughout the company. A) warehouse B) mart C) archive D) mine E) center Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 66) A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS. A) web server B) online server C) database server D) client server E) application server Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 18 Copyright © 2019 Pearson Education, Ltd. 67) Which of the following is an example of a company whose business model is based on access to large databases through the web? A) Gartner B) Fortune C) IBM D) Microsoft E) Facebook Answer: E Difficulty: 1: Easy AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 68) Links pointing to an online document are a sign of: A) richness or variety of topics covered. B) popularity. C) data quality. D) data usage. E) marketing. Answer: B Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 69) Links coming out of an online document are a sign of: A) richness or variety of topics covered. B) popularity. C) data quality. D) data usage. E) marketing. Answer: A Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 70) Text mining is the discovery of useful patterns on the web. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 19 Copyright © 2019 Pearson Education, Ltd. 71) Sentiment analysis is used to identify patterns in blogs and social media conversations to detect favorable and unfavorable comments. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 72) Hadoop is an open source software framework for processing large quantities of any type of data, including video and Twitter feeds. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 73) Two key services of Hadoop are HDFS and HBase non-relational database. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 74) A data warehouse is best used for storing unstructured data. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 75) A data warehouse extracts current and historical data from multiple operational systems in an organization. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 76) OLAP enables users to view data from different perspectives. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 20 Copyright © 2019 Pearson Education, Ltd. 77) OLAP is used to quickly find answers to ad hoc questions. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 78) In-memory computing relies on a computer's main memory for storing data. Answer: TRUE Difficulty: 3: Challenging AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 79) Web servers can directly access a firm's back-end databases using HTML. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 80) CGI is a specification for processing data on a web server. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 81) In linking databases to the web, the role of the application server is to host the DBMS. Answer: FALSE Difficulty: 3: Challenging AACSB: Information Technology LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 21 Copyright © 2019 Pearson Education, Ltd. 82) List and describe three main capabilities or tools of a DBMS. Answer: A DBMS includes capabilities and tools for organizing, managing, and accessing the data in the database. The most important are its data definition capability, data dictionary, and data manipulation language. The data definition capability specifies the structure of the content of the database. It is used to create database tables and to define the characteristics of the fields in each table. This information about the database would be documented in a data dictionary. A data dictionary is an automated or manual file that stores definitions of data elements and their characteristics. Data dictionaries for large corporate databases may capture additional information, such as usage; ownership (who in the organization is responsible for maintaining the data); authorization; security; and the individuals, business functions, programs, and reports that use each data element. The data manipulation language is a specialized language used to add, change, delete, and retrieve the data in the database. This language contains commands that permit end users and programming specialists to extract data from the database to satisfy information requests and develop applications. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 83) Describe the ways in which database technologies could be used by an office stationery supply company to achieve low-cost leadership. Answer: Student answers will vary; an example answer is: Databases could be used to make the supply chain more efficient and minimize warehousing and transportation costs. You can use OLAP to better analyze sales forecasts. You can also use sales databases and predictive analysis to determine what supplies are in demand by which customers, and whether needs are different in different geographical areas. DSS databases could be used to predict future trends in office supply needs, to help anticipate demand. You could use text mining to identify service issues or inefficiencies within the company. Databases could be used to determine the most efficient methods of transportation and delivery. In addition, you could allow customers to order supplies through the web and have these orders influence the entire supply chain and minimize warehousing costs. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 22 Copyright © 2019 Pearson Education, Ltd. 84) Explain what big data refers to. What benefits does it have, and what challenges does it pose? Answer: Big data are datasets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze. Big data is often characterized by the "3Vs": the extreme volume of data, the wide variety of data types and sources, and the velocity at which the data must be processed. Big data doesn't designate any specific quantity but usually refers to data in the petabyte and exabyte range—in other words, billions to trillions of records, respectively, from different sources. Big data are produced in much larger quantities and much more rapidly than traditional data. It is created by the explosion of data coming from the web, such as web traffic, email, Twitter, and Facebook, as well as information from other electronic and networked devices such as sensors and meters. Businesses are interested in big data because they contain more patterns and interesting anomalies than smaller data sets, with the potential to provide new insights into customer behavior, weather patterns, financial market activity, or other phenomena. However, to derive business value from these data, organizations need new technologies and tools capable of managing and analyzing non-traditional data along with their traditional enterprise data. They also need to know what questions to ask of the data and limitations of big data. Capturing, storing, and analyzing big data can be expensive, and information from big data may not necessarily help decision makers. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 85) What are the differences between data mining and OLAP? When would you advise a company to use OLAP? Answer: Data mining uncovers hidden relationships and is used when you are trying to discover data and new relationships, and is used to answer questions such as, are there any product sales that are related in time to other product sales. In contrast, OLAP is used to analyze multiple dimensions of data and is used to find answers to complex, but known, questions, such as what were sales of a product broken down by month and geographical region, and compared to sales forecasts. I would advise a company to use OLAP when they need to analyze sales in different areas or for different products to see complex views of data. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 23 Copyright © 2019 Pearson Education, Ltd. 86) What makes data mining an important business tool? What types of information does data mining produce? In what type of circumstance would you advise a company to use data mining? Answer: Data mining is one of the data analysis tools that helps users make better business decisions and is one of the key tools of business intelligence. Data mining allows users to analyze large amounts of data and find hidden relationships between data that otherwise would not be discovered. For example, data mining might find that a customer that buys product X is ten times more likely to buy product Y than other customers. Data mining finds information such as: • Associations, or occurrences that are linked to a single event. • Sequences, or events that are linked over time. • Classification, or patterns that describe the group to which an item belongs, found by examining existing items that have been classified and by inferring a set of rules. • Clusters, or unclassified but related groups. I would advise a company to use data mining when they are looking for new products and services, or when they are looking for new marketing techniques or new markets. Data mining might also be helpful when trying to analyze unanticipated problems with sales whose causes are difficult to identify. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 87) What are the similarities and differences between a data warehouse and a data mart? Answer: A data warehouse stores current and historical data of potential interest throughout a company. Data warehouses gather data from multiple operational systems inside the organization. Data warehouses make data available, but do not allow that information to be altered. Data marts are subsets of data warehouses, in which a highly focused portion of an organization's data is placed in a separate database for specific users. Data marts are decentralized, whereas data warehouses are enterprise-wide, central locations for data. Difficulty: 2: Moderate AACSB: Application of Knowledge; Written and Oral Communication LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 88) Imagine you are running a growing business with an active presence on social media. How would you better understand what your customers think about your business using these platforms? Answer: Text mining and web mining techniques would help a business in this situation. Using text mining tools, businesses can analyze transcripts of calls, texts of email messages, blogs, and social media posts using sentiment analysis, or survey forms, gleaning valuable information about customer opinions on specific topics. web mining involves similar techniques, but using web pages and Google search results as the source of data. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 6-3: What are the principal tools and technologies for accessing information from databases to improve business performance and decision making? 24 Copyright © 2019 Pearson Education, Ltd. 89) Within a corporate information services department, the task of establishing the physical database and its logical relations are responsibilities of the ________ function. A) data management B) data administration C) server administration D) data modeling E) database administration Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 90) Rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is referred to as: A) data cleansing. B) data mining. C) an information policy. D) logical database design. E) a data quality audit. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 91) Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: A) data auditing. B) defragmentation. C) data scrubbing. D) data optimization. E) data repair. Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 25 Copyright © 2019 Pearson Education, Ltd. 92) A(n) ________ is a structured survey of the accuracy and level of completeness of the data in an information system. A) data quality audit B) systems analysis C) systems audit D) data analysis E) data overview Answer: A Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 93) Common data quality problems include all of the following except: A) misspelled names. B) transposed numbers. C) incorrect codes. D) missing codes. E) Internet connectivity problems. Answer: E Difficulty: 1: Easy AACSB: Information Technology LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 94) A firm's information policy lays out who is responsible for updating and maintaining the information in a database system. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 95) Redundant data often stems from the use of different codes to identify the same data in a firm's various information systems. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 96) Data cleansing is the same process as data scrubbing. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 26 Copyright © 2019 Pearson Education, Ltd. 97) An information policy specifies the procedures and rules for defining the structure and content of corporate databases. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 98) Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 99) List at least two ways that a business's data can become redundant or inconsistent. Answer: Data redundancy and inconsistency can occur because of (1) employing different names and descriptions for the same entities or attributes; (2) multiple systems feeding a data warehouse; (3) incorrect data entry. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 100) Why might you receive multiple pieces of the same piece of mail, or multiple emails featuring the same promotion? Answer: These events often occur because of redundant information in a database. If you used your middle initial one time and not another, it might generate two entries for you, leading to extra advertising. These types of errors are caused by data input, and are becoming more frequent as companies migrate to the web and allow individuals to enter their own data into websites. Organizations must identify and correct this type of error using a data quality audit and by performing data cleansing. Difficulty: 3: Challenging AACSB: Analytical Thinking; Written and Oral Communication LO: 6-4: Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources? 27 Copyright © 2019 Pearson Education, Ltd. Essentials of MIS, 13GE (Laudon/Laudon) Chapter 7 Telecommunications, the Internet, and Wireless Technology 1) Which of the following is a device that sends packets of data through different networks assuring they go to the correct address? A) Hub B) Switch C) Router D) NIC E) Modem Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 2) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP E) Email, instant messaging, and newsgroups Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 3) Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A) Multiplexing B) Packet shifting C) Packet routing D) ATM E) Packet switching Answer: E Difficulty: 1: Easy AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 1 Copyright © 2019 Pearson Education, Ltd. 4) The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched E) client/server Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 5) Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors. E) Packets are reassembled into the original message when they reach their destinations. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 6) In TCP/IP, IP is responsible for which of the following? A) Disassembling and reassembling packets during transmission B) Establishing an Internet connection between two computers C) Moving packets over the network D) Sequencing the transfer of packets E) Breaking messages down into packets Answer: A Difficulty: 3: Challenging AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 2 Copyright © 2019 Pearson Education, Ltd. 7) Which of the following is the best description of a protocol in a telecommunications network architecture? A) A device that handles the switching of voice and data in a local area network B) A standard set of rules and procedures for control of communications in a network C) A communications service for microcomputer users D) The main computer in a telecommunications network E) A pathway through which packets are routed Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 8) What are the four layers of the TCP/IP reference model? A) Physical, Application, Transport, and Network Interface B) Physical, Application, Internet, and Network Interface C) Application, Transport, Internet, and Network Interface D) Application, Hardware, Internet, and Network Interface E) Software, Hardware, Network Interface, Internet Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 9) On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 3 Copyright © 2019 Pearson Education, Ltd. 10) Client/server computing is a: A) network that connects sensors to desktop computers. B) network where centralized mainframe computers serve local devices. C) centralized model of computing for large corporations. D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer. E) centralized computing model where local computers are connected to one another by a network. Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 11) Computer networks are based on the same principles as telephone networks. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 12) A NOS must reside on all the local computers in a network. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 13) A hub is a networking device that sends packets of data to all other devices on the network. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 14) In a client/server network, a network server sets the rules of communication for the network. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 4 Copyright © 2019 Pearson Education, Ltd. 15) A computer network consists of at least two computers. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 16) Client/server computing has largely replaced centralized mainframe computing. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 17) Computer networks that use packet switching are much more efficient than telephone networks that use circuit switching. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 18) Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 19) In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 20) TCP/IP was developed during the early 1970s to support efforts to help scientists transmit data among different types of computers over long distances. Answer: TRUE Difficulty: 2: Moderate AACSB: Reflective Thinking LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 5 Copyright © 2019 Pearson Education, Ltd. 21) How does packet switching work? Answer: Packet switching is a method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destinations. Packet switching makes much more efficient use of the communications capacity of a network than did circuit-switching. In packet-switched networks, messages are first broken down into small fixed bundles of data called packets. The packets include information for directing the packet to the right address and for checking transmission errors along with the data. The packets are transmitted over various communication channels using routers, each packet traveling independently. Packets of data originating at one source will be routed through many different paths and networks before being reassembled into the original message when they reach their destinations. Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 22) Identify the layers of the Department of Defense reference model for TCP/IP, and describe how this model works. Answer: The application layer enables client application programs to access the other layers and defines the protocols that applications use to exchange data. One of these application protocols is the Hypertext Transfer Protocol (HTTP), which is used to transfer Web page files. The transport layer is responsible for providing the application layer with communication and packet services. This layer includes TCP and other protocols. The Internet layer is responsible for addressing, routing, and packaging data packets called IP datagrams. The Internet Protocol is one of the protocols used in this layer. The network interface layer is responsible for placing packets on and receiving them from the network medium, which could be any networking technology. Data sent from one computer to the other passes downward through all four layers, starting with the sending computer's application layer and passing through the network interface layer. After the data reach the recipient host computer, they travel up the layers and are reassembled into a format the receiving computer can use. If the receiving computer finds a damaged packet, it asks the sending computer to retransmit it. This process is reversed when the receiving computer responds. Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 6 Copyright © 2019 Pearson Education, Ltd. 23) How are modern telephone and computer networks different from what firms used in the past? Answer: Modern telephone and computer networks are converging into a single digital network using shared Internet-based standards and technology. Telecom companies offer full suites of telecommunication and Internet service. In the past, these two types of networks were distinct— telephone networks and computer networks performed completely different services and were not affiliated with one another. Additionally, modern communication networks are much faster and more cost effective than they were in the past. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 7-1: What are the principal components of telecommunications networks and key networking technologies? 24) Which signal types are represented by a binary waveform? A) Laser B) Optical C) Digital D) RFID E) Analog Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 7-2: What are the different types of networks? 25) Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network? A) Local area network B) Modem C) DSL D) Twisted wire E) TCP/IP Answer: B Difficulty: 1: Easy AACSB: Information Technology LO: 7-2: What are the different types of networks? 26) Which type of network is used to connect digital devices within a city or metropolitan area? A) Wi-Fi B) LAN C) WAN D) MAN E) SAN Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 7-2: What are the different types of networks? 7 Copyright © 2019 Pearson Education, Ltd. 27) Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? A) MAN B) Wireless C) LAN D) Windows domain network E) Peer-to-peer Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 7-2: What are the different types of networks? 28) Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? A) MAN B) Domain-based LAN C) Peer-to-peer network D) WAN E) SAN Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 7-2: What are the different types of networks? 29) A network that spans a college or corporate facility is called a: A) CAN. B) MAN. C) LAN. D) WAN. E) WSN. Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 7-2: What are the different types of networks? 30) A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. E) metropolitan area network. Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 7-2: What are the different types of networks? 8 Copyright © 2019 Pearson Education, Ltd. 31) Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. E) geographical distance spanned by a network. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 7-2: What are the different types of networks? 32) The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. E) RPMs. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 7-2: What are the different types of networks? 33) A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A) modulated B) broadband C) T1 D) analog E) digital Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 7-2: What are the different types of networks? 34) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-2: What are the different types of networks? 9 Copyright © 2019 Pearson Education, Ltd. 35) Fiber-optic cable is more expensive and harder to install than wireless media. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-2: What are the different types of networks? 36) Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-2: What are the different types of networks? 37) You have been hired by a small new web design firm to set up a network for its single office location. The network is primarily needed for exchanging files, accessing and managing beta websites on their web server, and connecting to the Internet. The firm hires many freelancers who come into the office on an ad-hoc basis and it does not have a lot of money to spend on infrastructure. What type of network will you recommend? Answer: Student answers will vary. An example answer is: I would recommend a mixed wired and wireless network. The wired LAN would connect the web servers and primary workstations and connect via cable service to the Internet. Freelancers could connect wirelessly via access points. Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 7-2: What are the different types of networks? 38) What are the two types of signals used to communicate a message in a network and how are they different? What device converts one type to the other type? Answer: The two ways to communicate a message in a network are analog signals and digital signals. An analog signal is represented by a continuous waveform that passes through a communications medium and is used for voice communication. Examples include the telephone handset and other types of speakers that generate analog sound. On the other hand, digital signals are binary waveforms (not continuous) that communicate information as strings of two discrete states: one bit or zero bits (often depicted as strings of zeroes and ones). Computers use these types of signals and use modems to convert digital signals to analog signals. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 7-2: What are the different types of networks? 10 Copyright © 2019 Pearson Education, Ltd. 39) What are some of the common types of physical transmission media and what differentiates them from one another? Answer: Common types of physical transmission media include twisted pair wire, coaxial cable, fiber-optic cable, and wireless transmission media. Twisted pair wire consists of strands of copper wire twisted in pairs for voice and data communications. Coaxial cable consists of thickly insulated copper wires capable of high-speed data transmission and resistance to interference. Fiber-optic cable consists of strands of clear glass fiber that transmit data as pulses of light generated by lasers. Wireless transmission media is based on radio signals and involves satellite microwave systems and cellular networks. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 7-2: What are the different types of networks? 40) Which of the following is not one of the top five search engines? A) Facebook B) Yahoo C) Microsoft Bing D) Baidu E) Google Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 41) Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial cable lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels. E) are assigned to every computer on the Internet. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 11 Copyright © 2019 Pearson Education, Ltd. 42) T1 lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) do not provide guaranteed service levels, but simply "best effort." D) have up to twenty-four 64-Kbps channels. E) are high-speed, leased data lines providing guaranteed service levels. Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 43) What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) FTP C) IP D) HTTP E) DNS Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 44) The domain .gov is a(n): A) Internet root domain. B) top-level domain. C) host domain. D) network domain. E) third level domain. Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 12 Copyright © 2019 Pearson Education, Ltd. 45) In the domain name "http://books.azimuth-interactive.com", which element is the secondlevel domain? A) books B) azimuth-interactive.com C) com D) none; there is no second-level domain in this name E) books.azimuth-interactive Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 46) Which organization manages the domain name system of the Internet? A) none (no one "owns" the Internet) B) W3C C) ICANN D) The Department of Commerce (U.S.) E) IAB Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 47) IPv6 has been developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2. E) reduce excess IP addresses. Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 13 Copyright © 2019 Pearson Education, Ltd. 48) Predictive search in Google's search engine: A) maintains a history of your searches and then predicts what you will search on next. B) uses a tracking service and cookies on your browser to predict search results. C) uses a knowledge graph of what similar people searched on to predict your search interests. D) uses a semantic approach to predict what you are looking for. E) predicts what you are looking for as you enter words into the query box. Answer: E Difficulty: 3: Challenging AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 49) Instant messaging is a type of ________ service. A) chat B) cellular C) email D) wireless E) network Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 50) ________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Modems E) Unified communications Answer: E Difficulty: 1: Easy AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 14 Copyright © 2019 Pearson Education, Ltd. 51) A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. E) is a proprietary networking service technology developed by individual corporations. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 52) Web browser software requests web pages from the Internet using which of the following protocols? A) URL B) HTTP C) DNS D) HTML E) FTP Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 53) Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. E) child domain. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 15 Copyright © 2019 Pearson Education, Ltd. 54) The most common web servers today are: A) Microsoft IIS and IBM HTTP Server. B) WebSTAR and Netscape Server. C) IBM HTTP Server and Apache HTTP Server. D) Netscape Server and Apache HTTP. E) Apache HTTP Server and Microsoft IIS. Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 55) Which of the following pulls content from websites and feeds it automatically to a user's computers? A) FTP B) RSS C) HTTP D) Bluetooth E) IPv6 Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 56) Which of the following can be used to help a website achieve a higher ranking with the major search engines? A) VPN B) IAB C) SEM D) SEO E) RSS Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 16 Copyright © 2019 Pearson Education, Ltd. 57) Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. E) Users are increasingly using search engines on mobile devices. Answer: D Difficulty: 1: Easy AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 58) Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet-switching E) Chaining Answer: A Difficulty: 3: Challenging AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 59) ________ monetizes the value of the data stored by search engines. A) TCP/IP B) RSS C) WiMax D) IoT E) Search Engine Marketing Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 17 Copyright © 2019 Pearson Education, Ltd. 60) Shopping bots use ________ software for searching the Internet. A) Web 2.0 B) Web 3.0 C) intelligent agent D) comparison E) SEO Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 61) Which of the following is not a defining feature of Web 2.0? A) Interactivity B) Real-time user control C) Semantic search D) Social participation (sharing) E) User-generated content Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 62) A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A) RSS B) WAN C) NFP D) ISP E) FTP Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 18 Copyright © 2019 Pearson Education, Ltd. 63) The backbone networks of the Internet are typically owned by long-distance telephone companies called: A) regional network providers. B) enhanced service providers. C) internet bulk providers. D) backbone providers. E) network service providers. Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 64) A(n) ________ is software for locating and managing stored web pages. A) web server B) net server C) router D) modem E) hub Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 65) By 2018, it is estimated that more than 200 million Americans will use mobile search. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 66) Wikis allow visitors to change or add to the original posted material. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 67) The Domain Name System (DNS) converts domain names to IP addresses. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 19 Copyright © 2019 Pearson Education, Ltd. 68) VoIP technology delivers voice information in digital form using packet switching. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 69) Web 3.0 is an effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information. Answer: TRUE Difficulty: 2: Moderate AACSB: Reflective Thinking LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 70) Mobile search makes up more than 50% of all Internet searches. Answer: TRUE Difficulty: 1: Easy AACSB: Reflective Thinking LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 71) The "Internet of Things" refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 72) Digital rights activists believe differentiated pricing violates net neutrality principles. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 73) In addition to being an online retailer, Amazon is also a powerful product search engine. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 20 Copyright © 2019 Pearson Education, Ltd. 74) The Internet of Things is based on billions of Internet-connected sensors throughout the physical world. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 75) What is IPv6 and why is it necessary? Answer: The Internet was not originally designed to handle the transmission of massive quantities of data and billions of users. Because of sheer Internet population growth, the world is about to run out of available IP addresses using the old addressing convention. The old addressing system is being replaced by a new version of the IP addressing schema called IPv6 (Internet Protocol version 6), which contains 128-bit addresses (2 to the power of 128), or more than a quadrillion possible unique addresses. IPv6 is compatible with most modems and routers sold today, and IPv6 will fall back to the old addressing system if IPv6 is not available on local networks. The transition to IPv6 will take several years as systems replace older equipment. Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 76) What are the business advantages of using voice over IP (VoIP) technology? Answer: Business can lower costs by using the Internet to deliver voice information, avoiding the tolls charged by local and long-distance telephone networks. They can lower costs from not having to create a separate telephone network. VOIP enables communication by supporting Internet conference calls using video. VOIP also provides flexibility—phones can be added or moved to different offices without rewiring or reconfiguring the network. Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 77) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses? Answer: The key features of Web 3.0 are more tools for individuals to make sense out of the trillions of pages on the Internet, or the millions of apps available for smartphones and a visual, even three-dimensional (3D) web where you can walk through pages in a 3D environment. Student views on the impact on businesses would vary. An example answer is: This potentially could have huge effects on businesses as simple analysis becomes mechanized, requiring fewer humans to perform this basic task. Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 21 Copyright © 2019 Pearson Education, Ltd. 78) Blogs, wikis, and social networking sites were designed for individuals to communicate with each other. What uses do businesses have for these tools? Give specific examples. Answer: Businesses can use these tools to reach out and market to potential new customers. For example, many businesses have Facebook sites to market their product to specific groups on Facebook. They can use these tools to support and give added value to existing customers. For example, a software company could have a blog that discusses in-depth use of a software product. Businesses can also use these tools within their company to communicate between departments and share knowledge. For example, a company wiki could be set up as a repository of expert information. Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 79) What has made the Google search engine so successful? Answer: The Google search engine became so successful because it was one of the first search engines to incorporate page ranking. Not only does it index the web pages it finds according to both keywords and combinations of keywords, it also ranks each page according to the number of pages that link to it, and the number of pages it links to itself. This helped make search results more relevant when compared to search engines relying solely on key words used on web pages. A user could be relatively certain that they would find relevant information within the top results of a Google search. Improved search results for the user, along with continual improvements to its search engine, the development and other web applications, tools, and its Ad Sense product where it sells keywords to the highest bidder has made Google so successful as a search engine and marketing firm. Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 80) Explain the Domain Name System. What are some of the common domain name extensions currently available and what types of services do they designate? Answer: The Domain Name System (DNS) converts domain names to IP addresses. Domain names are the English-like names that correspond to the unique 32-bit numeric IP address for each computer connected to the Internet. DNS is a hierarchy, with the root domain at the top, top-level domains such as .com and .edu one level below, and second-level domains designate a top-level name and a second-level name, like amazon.com. Common domain name extensions include .edu (educational institutions), .gov (government agencies), .mil (military), .net (network computers), .org (nonprofit organizations and foundations), .biz (business firms), and .info (information providers). Additionally, countries have their own domain names. Answers may cite a variety of other domain name extensions. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 7-3: How do the Internet and Internet technology work, and how do they support communication and e-business? 22 Copyright © 2019 Pearson Education, Ltd. 81) All of the following are physical components of an RFID system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 82) Which digital cellular standard is used widely throughout the world except the United States? A) GSM B) CDMA C) WLAN D) LTD E) 4G Answer: A Difficulty: 3: Challenging AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 83) The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called: A) the Internet of Things. B) the Semantic Web. C) Internet2. D) a 3-D Web. E) Web 2.0. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 23 Copyright © 2019 Pearson Education, Ltd. 84) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFID tags and antennas come in a variety of shapes and sizes. Answer: D Difficulty: 2: Moderate AACSB: Reflective Thinking LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 85) Wireless sensor networks (WSNs) are used for the following tasks except: A) processing consumer transactions. B) monitoring machines. C) detecting radioactive materials. D) protecting property. E) identifying vehicles for trucking firms. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 86) 4G networks use which of the following standards? A) GSM and LTD B) CDMA and PAN C) LTE and LTD D) T-Mobile and AT&T E) LTE and WiMax Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 87) The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) IEEE 802.11b. C) Wi-Fi. D) Bluetooth. E) RFID. Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 24 Copyright © 2019 Pearson Education, Ltd. 88) Bluetooth can be used to link up to ________ devices within a 10-meter area using lowpower, radio-based communication. A) two B) five C) eight D) fifteen E) twenty Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 89) One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) netcenters. C) hot points. D) wireless hubs. E) hotspots. Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 90) The 802.11 set of standards is known as: A) WLAN. B) WSN. C) Wi-Fi. D) WiMax. E) WAN. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 25 Copyright © 2019 Pearson Education, Ltd. 91) The WiMax standard can transmit up to a distance of approximately: A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles. E) 70 miles. Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 92) Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication E) Improving employee engagement Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 93) Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? A) Web 3.0 application B) IoT application C) BLE application D) GPS application E) RFID application Answer: B Difficulty: 3: Challenging AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 26 Copyright © 2019 Pearson Education, Ltd. 94) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) RFID receiver B) WiMax receiver C) access point D) hub E) hotspot Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 95) RFID technology is being gradually replaced by less costly technologies such as WSNs. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 96) Apple Pay uses an RFID-related technology called near field communication. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 97) NFC tags are always passive. Answer: FALSE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 98) How are RFID systems used in inventory control and supply chain management? Answer: In inventory control and supply chain management, RFID systems capture and manage more detailed information about items in warehouses or in production than bar coding systems. If a large number of items are shipped together, RFID systems track each pallet, lot, or even unit item in the shipment. This technology may help companies improve receiving and storage operations by enhancing their ability to "see" exactly what stock is stored in warehouses or on retail store shelves. Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 27 Copyright © 2019 Pearson Education, Ltd. 99) What are wireless sensor networks? How do they work and what are they used for? Answer: Wireless sensor networks (WSNs) are networks of interconnected wireless devices that are embedded into the physical environment to provide measurements of many points over large spaces. These devices have built-in processing, storage, and radio frequency sensors and antennas. They are linked into an interconnected network that routes the data they capture to a computer for analysis. These networks range from hundreds to thousands of nodes. Because wireless sensor devices are placed in the field for years at a time without any maintenance or human intervention, they must have very low power requirements and batteries capable of lasting for years. Wireless sensor networks are valuable in areas such as monitoring environmental changes; monitoring traffic or military activity; protecting property; efficiently operating and managing machinery and vehicles; establishing security perimeters; monitoring supply chain management; or detecting chemical, biological, or radiological material. Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 100) What are some of the standards and networks used in digital cellular service, and where are they in use? Answer: Common cellular system standards include the Global System for Mobile Communications (GSM), which is used in Europe and much of the world outside of the United States. In the U.S., Code Division Multiple Access is used by Verizon and Sprint. It is a more efficient system than GSM. The generations of networks in use today by cellular systems includes 3G and 4G. 4G networks offer higher speeds than 3G. The standards in use by 4G Networks are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMax). Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 7-4: What are the principal technologies and standards for wireless networking, communication, and Internet access? 28 Copyright © 2019 Pearson Education, Ltd. Essentials of MIS, 13GE (Laudon/Laudon) Chapter 8 Securing Information Systems 1) Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? A) Security B) Controls C) Benchmarking D) Algorithms E) Identity management Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 2) Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? A) Legacy systems B) SSID standards C) Vulnerabilities D) Security policy E) Controls Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 3) Most computer viruses deliver a: A) worm. B) Trojan horse. C) driveby download. D) keylogger. E) payload. Answer: E Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 1 Copyright © 2019 Pearson Education, Ltd. 2 Copyright © 2019 Pearson Education, Ltd. 4) Which of the following statements about wireless security is not true? A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs. B) Radio frequency bands are easy to scan. C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network. D) Intruders can force a user's NIC to associate with a rogue access point. E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers. Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 5) All of the following are specific security challenges that threaten the communications lines in a client/server environment except: A) errors. B) tapping. C) theft and fraud. D) radiation. E) sniffing. Answer: A Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 6) All of the following are specific security challenges that threaten corporate servers in a client/server environment except: A) hacking. B) malware. C) denial-of-service attacks. D) sniffing. E) vandalism. Answer: D Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 7) All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A) theft of data. B) copying of data. C) alteration of data. D) radiation. E) hardware failure. Answer: D Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 3 Copyright © 2019 Pearson Education, Ltd. 8) CryptoLocker is an example of which of the following? A) Worm B) SQL injection attack C) Sniffer D) Evil twin E) Ransomware Answer: E Difficulty: 1: Easy AACSB: Analytical Thinking LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 9) Which of the following statements about Internet security is not true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network. E) Smartphones have the same security weaknesses as other Internet devices. Answer: C Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 10) A Trojan horse: A) is software that appears to be benign but does something other than expected. B) is a virus that replicates quickly. C) is malware named for a breed of fast-moving Near-Eastern horses. D) installs spyware on users' computers. E) is a type of sniffer used to infiltrate corporate networks. Answer: A Difficulty: 1: Easy AACSB: Information Technology LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 11) A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of: A) phishing. B) pharming. C) spoofing. D) evil twins. E) click fraud. Answer: E Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 4 Copyright © 2019 Pearson Education, Ltd. 12) Which of the following is a virus that uses flaws in Windows software to take over a computer remotely? A) Sasser B) Zeus C) Cryptolocker D) ILOVEYOU E) Conficker Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 13) ________ is malware that hijacks a user's computer and demands payment in return for giving back access. A) A Trojan horse B) Ransomware C) Spyware D) A virus E) An evil twin Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 14) ________ is spyware that logs and transmits everything a user types. A) Spyware B) A Trojan horse C) A keylogger D) A worm E) A sniffer Answer: C Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 15) Which of the following statements about botnets is not true? A) Eighty percent of the world's malware is delivered by botnets. B) Botnets are often used to perpetrate DDoS attacks. C) Ninety percent of the world's spam is delivered by botnets. D) Botnets are often used for click fraud. E) It is not possible to make a smartphone part of a botnet. Answer: E Difficulty: 3: Challenging AACSB: Information Technology LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 5 Copyright © 2019 Pearson Education, Ltd. 16) Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A) DDoS B) DoS C) SQL injection D) phishing E) botnet Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 17) Which of the following is not an example of a computer used as a target of crime? A) Knowingly accessing a protected computer to commit fraud B) Accessing a computer system without authority C) Illegally accessing stored electronic communication D) Threatening to cause damage to a protected computer E) Breaching the confidentiality of protected computerized data Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 18) An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of: A) click fraud. B) DDOS attack. C) spear phishing. D) pharming. E) identity theft. Answer: C Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 19) Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime? A) Computer Fraud and Abuse Act B) Economic Espionage Act C) Electronic Communications Privacy Act D) Data Security and Breach Notification Act E) National Information Infrastructure Protection Act Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 6 Copyright © 2019 Pearson Education, Ltd. 20) The intentional defacement or destruction of a website is called: A) spoofing. B) cybervandalism. C) cyberwarfare. D) phishing. E) pharming. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 21) Evil twins are: A) Trojan horses that appears to the user to be a legitimate commercial software application. B) email messages that mimic the email messages of a legitimate business. C) fraudulent websites that mimic a legitimate business's website. D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer. E) bogus wireless network access points that look legitimate to users. Answer: E Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 22) Pharming involves: A) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. B) pretending to be a legitimate business's representative in order to garner information about a security system. C) setting up fake website to ask users for confidential information. D) using emails for threats or harassment. E) setting up fake Wi-Fi access points that look as if they are legitimate public networks. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 23) Which of the following is the single greatest cause of network security breaches? A) Viruses B) User lack of knowledge C) Trojan horses D) Cyberwarfare E) Bugs Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 7 Copyright © 2019 Pearson Education, Ltd. 24) When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of: A) sniffing. B) social engineering. C) phishing. D) zero-day vulnerability E) snooping Answer: D Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 25) According to Ponemon Institute's 2016 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for benchmarked companies in six different countries was approximately: A) $900,000. B) $9 million. C) $90 million. D) $9 billion. E) $90 billion. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 26) Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? A) War driving B) Sniffing C) Cybervandalism D) Drive-by tapping E) Snooping Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 8 Copyright © 2019 Pearson Education, Ltd. 27) When hackers gain access to a database containing your personal private information, this is an example of: A) phishing. B) spoofing. C) social engineering. D) identity theft. E) pharming. Answer: D Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 28) ________ identify the access points in a Wi-Fi network. A) NICs B) Mac addresses C) URLs D) UTMs E) SSIDs Answer: E Difficulty: 3: Challenging AACSB: Information Technology LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 29) A foreign country attempting to access government networks in order to disable a national power grid is an example of: A) phishing. B) denial-of-service attacks. C) cyberwarfare. D) cyberterrorism. E) evil twins. Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 30) According to the 2017 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2016? A) $1.6 million B) $16 million C) $160 million D) $1.6 billion E) $16 billion Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 9 Copyright © 2019 Pearson Education, Ltd. 31) All of the following have contributed to an increase in software flaws except: A) the growing complexity of software programs. B) the growing size of software programs. C) demands for timely delivery to markets. D) the inability to fully test programs. E) the increase in malicious intruders seeking system access. Answer: E Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 32) Which of the following is an example of a keylogger? A) Zeus B) Conficker C) Sasser D) ILOVEYOU E) Cryptolocker Answer: A Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 33) As described in the chapter case, which of the following did hackers use to gain access to the DNC network? A) Trojan horse B) Phishing emails C) SQL injection attack D) Computer worm E) Pharming attack Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 34) Smartphones have the same security flaws as other Internet-connected devices. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 35) As described in the chapter case, losing smartphones is a rare cause of data breaches. Answer: FALSE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 10 Copyright © 2019 Pearson Education, Ltd. 36) A computer worm is a program that can copy itself to other computers on the network. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 37) The term cracker is used to identify a hacker with criminal or malicious intent. Answer: TRUE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 38) Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 39) A computer virus replicates more quickly than a computer worm. Answer: FALSE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 40) Phishing is a form of spoofing. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 41) Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 42) DoS attacks are used to destroy information and access restricted areas of a company's information system. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 11 Copyright © 2019 Pearson Education, Ltd. 43) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 44) Most IoT devices support sophisticated security approaches. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 45) Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses. Answer: FALSE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 46) What are the security challenges faced by wireless networks? Answer: Wireless networks are vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. Local area networks (LANs) using the 802.11 standard can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae, and hacking software. Hackers use these tools to detect unprotected networks, monitor network traffic, and, in some cases, gain access to the Internet or to corporate networks. Wi-Fi transmission technology was designed to make it easy for stations to find and hear one another. The service set identifiers (SSIDs) identifying the access points in a Wi-Fi network are broadcast multiple times and can be picked up fairly easily by intruders' sniffer programs. Wireless networks in many locations do not have basic protections against war driving, in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. A hacker can employ an 802.11 analysis tool to identify the SSID. An intruder that has associated with an access point by using the correct SSID is capable of accessing other resources on the network, using the Windows operating system to determine which other users are connected to the network, access their computer hard drives, and open or copy their files. Intruders also use the information they have gleaned to set up rogue access points on a different radio channel in physical locations close to users to force a user's radio NIC to associate with the rogue access point. Once this association occurs, hackers using the rogue access point can capture the names and passwords of unsuspecting users. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 12 Copyright © 2019 Pearson Education, Ltd. 47) Explain how an SQL injection attack works and what types of systems are vulnerable to this type of attack. Answer: SQL injection attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious code into a company's systems and networks. These vulnerabilities occur when a web application fails to properly validate or filter data entered by a user on a web page, which might occur when ordering something online. An attacker uses this input validation error to send a rogue SQL query to the underlying database to access the database, plant malicious code, or access other systems on the network. Large web applications using databases are most vulnerable, as they may have hundreds of places for inputting user data, each of which creates an opportunity for an SQL injection attack. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 48) How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why? Answer: There are various technological essentials to protecting an information system: firewalls, authentication, encryption, antivirus protection etc. Without technology implemented correctly, there is no security. A firm's employees are its greatest threat, in terms of embezzlement and insider fraud, errors, and lax enforcement of security policies. Probably the most important dimension is organization, because this is what determines a firm's business processes and policies. The firm's information policies can most enhance security by stressing intelligent design of security systems, appropriate use of security technology, and the usability of its security processes. Difficulty: 3: Challenging AACSB: Analytical Thinking; Written and Oral Communication LO: 8-1: Why are information systems vulnerable to destruction, error, and abuse? 49) The HIPAA Act of 1996: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities. Answer: D Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-2: What is the business value of security and control? 13 Copyright © 2019 Pearson Education, Ltd. 50) The Gramm-Leach-Bliley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities. Answer: A Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 8-2: What is the business value of security and control? 51) The Sarbanes-Oxley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities. Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-2: What is the business value of security and control? 52) Which of the following is a type of ambient data? A) Computer log containing recent system errors B) A file deleted from a hard disk C) A file that contains an application's user settings D) A set of raw data from an environmental sensor E) Data that has been recorded over Answer: B Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-2: What is the business value of security and control? 53) Computer forensics tasks include all of the following except: A) presenting collected evidence in a court of law. B) securely storing recovered electronic data. C) collecting physical evidence on the computer. D) finding significant information in a large volume of electronic data. E) recovering data from computers while preserving evidential integrity. Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-2: What is the business value of security and control? 14 Copyright © 2019 Pearson Education, Ltd. 54) Blockchain refers to a technology that: A) uses a distributed ledger system of transactions. B) uses a centralized data store in the cloud. C) relies on the Internet to provide secure transactions. D) uses existing banking systems to transfer funds. E) relies on peer-to-peer networks. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-2: What is the business value of security and control? 55) Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why? Answer: Student answers will vary. Example answers are: Disaster might be the most difficult because it is unexpected, broad-based, and frequently life threatening. In addition, the company cannot know if the disaster plan will work until a disaster occurs, and then it's too late to make corrections. Security might be the most difficult because it is an ongoing problem, new viruses are devised constantly, and hackers get smarter every day. Furthermore, damage done by a trusted employee from inside cannot be obviated by system security measures. Human error might be most difficult because it isn't caught until too late, and the consequences may be disastrous. Also, administrative error can occur at any level and through any operation or procedure in the company. Difficulty: 3: Challenging AACSB: Analytical Thinking; Written and Oral Communication LO: 8-2: What is the business value of security and control? 56) Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measures for a firm to take to protect itself from this? Is full protection feasible? Why or why not? Answer: For protection, a company must institute good security measures, which will include firewalls, investigation of personnel to be hired, physical and software security and controls, antivirus software, and internal education measures. These measures are best put in place at the time the system is designed, and careful attention paid to them. A prudent company will engage in disaster protection measures, frequent updating of security software, and frequent auditing of all security measures and of all data upon which the company depends. Full protection may not be feasible in light of the time and expenses involved, but a risk analysis can provide insights into which areas are most important and vulnerable. These are the areas to protect first. Difficulty: 2: Moderate AACSB: Analytical Thinking; Information Technology; Written and Oral Communication LO: 8-2: What is the business value of security and control? 15 Copyright © 2019 Pearson Education, Ltd. 57) Define computer forensics and describe the types of problems it is designed to address. Answer: Computer forensics involves the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law. It deals with the following problems: • Recovering data from computers while preserving evidential integrity • Securely storing and handling recovered electronic data • Finding significant information in a large volume of electronic data • Presenting the information to a court of law Electronic evidence may reside on computer storage media in the form of computer files and as ambient data, which are not visible to the average user. An example might be a file that has been deleted on a PC hard drive. Data that a computer user may have deleted on computer storage media can be recovered through various techniques. Computer forensics experts try to recover such hidden data for presentation as evidence. An awareness of computer forensics should be incorporated into a firm's contingency planning process. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 8-2: What is the business value of security and control? 58) Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure? A) $500 B) $1,000 C) $1,250 D) $1,500 E) $2,500 Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-3: What are the components of an organizational framework for security and control? 59) Implementation controls: A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D) include software controls, computer operations controls, and implementation controls. E) Audit the systems development process at various points to ensure that the process is properly controlled and managed. Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 8-3: What are the components of an organizational framework for security and control? 16 Copyright © 2019 Pearson Education, Ltd. 60) ________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced. A) Software B) Administrative C) Data security D) Implementation E) Input Answer: B Difficulty: 3: Challenging AACSB: Information Technology LO: 8-3: What are the components of an organizational framework for security and control? 61) An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following? A) Security policy B) AUP C) Risk assessment D) Business impact analysis E) Business continuity plan Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-3: What are the components of an organizational framework for security and control? 62) A statement ranking information risks and identifying security goals would be included in which of the following? A) Security policy B) AUP C) Risk assessment D) Business impact analysis E) Business continuity plan Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-3: What are the components of an organizational framework for security and control? 63) Which of the following defines acceptable uses of a firm's information resources and computing equipment? A) An information systems audit policy B) A CA policy C) A MSSP D) A UTM system E) An AUP Answer: E Difficulty: 1: Easy AACSB: Application of Knowledge LO: 8-3: What are the components of an organizational framework for security and control? 17 Copyright © 2019 Pearson Education, Ltd. 64) Which of the following focuses primarily on the technical issues of keeping systems up and running? A) Business continuity planning B) Security policies C) Disaster recovery planning D) An AUP E) An information systems audit Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-3: What are the components of an organizational framework for security and control? 65) An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-3: What are the components of an organizational framework for security and control? 18 Copyright © 2019 Pearson Education, Ltd. 66) How can a firm's security policies contribute and relate to the six main business objectives? Give examples. Answer: A firm's security policies can contribute and relate to the six main business objectives as follows: (1) Operational excellence: Security policies are essential to operational excellence. A firm's daily transactions can be severely disrupted by cybercrime such as hackers. A firm's efficiency relies on accurate data. In addition, information assets have tremendous value, and the repercussions can be devastating if they are lost, destroyed, or placed in the wrong hands. (2) New products, services, business models. Security policies protect a company's ideas for new products and services, which could be stolen by competitors. Additionally, enhanced security could be seen by a customer as a way to differentiate your product. (3) Customer and supplier intimacy: Customers rely on your security if they enter personal data into your information system, for example, credit card information into your e-commerce site. The information you receive from customers and suppliers directly affects how able you are to customize your product, service, or communication with them. (4) Improved decision making: Secure systems make data accuracy a priority, and good decision making relies on accurate and timely data. Lost and inaccurate data would lead to compromised decision making. (5) Competitive advantage: The knowledge that your firm has superior security than another would, on an otherwise level playing field, make your firm more attractive to do business with. Also, improved decision-making, new products and services, which are also affected by security (see above), will contribute to a firm's competitive advantage. Strong security and control also increase employee productivity and lower operational costs. (6) Survival: New laws and regulations make keeping your security system up to date a matter of survival. Inadequate security and control may result in serious legal liability. Firms have been destroyed by errors in security policies. Difficulty: 3: Challenging AACSB: Analytical Thinking; Written and Oral Communication LO: 8-3: What are the components of an organizational framework for security and control? 67) What is the role of an information systems audit? Answer: An information systems audit examines the firm's overall security environment as well as controls governing individual information systems. The auditor should trace the flow of sample transactions through the system and perform tests, using, if appropriate, automated audit software. The information systems audit may also examine data quality. The audit should review technologies, procedures, documentation, training, and personnel. A thorough audit will even simulate an attack or disaster to test the response of the technology, information systems staff, and business employees. The audit lists and ranks all control weaknesses and estimates the probability of their occurrence. It then assesses the financial and organizational impact of each threat. Management is expected to devise a plan for countering significant weaknesses in controls. Difficulty: 2: Moderate AACSB: Application of Knowledge; Written and Oral Communication LO: 8-3: What are the components of an organizational framework for security and control? 19 Copyright © 2019 Pearson Education, Ltd. 68) How does disaster recovery planning differ from business continuity planning? Answer: Disaster recovery planning devises plans for the restoration of disrupted computing and communications services. Disaster recovery plans focus primarily on the technical issues involved in keeping systems up and running, such as which files to back up and the maintenance of backup computer systems or disaster recovery services. Business continuity planning, on the other hand, focuses on how the company can restore business operations after a disaster strikes. The business continuity plan identifies critical business processes and determines action plans for handling mission-critical functions if systems go down. Difficulty: 1: Easy AACSB: Application of Knowledge; Written and Oral Communication LO: 8-3: What are the components of an organizational framework for security and control? 69) WPA2 is a more effective way to secure a wireless network than WEP because it: A) includes an AUP. B) operates on a VPN. C) uses much longer encryption keys. D) uses symmetric encryption methods. E) is part of most vendors UTM products. Answer: C Difficulty: 3: Challenging AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 70) Which of the following statements about passwords is not true? A) Authentication cannot be established by the use of a password. B) Password systems that are too rigorous may hinder employee productivity. C) Passwords can be stolen through social engineering. D) Passwords are often disregarded by employees. E) Passwords can be sniffed when being transmitted over a network. Answer: A Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 71) Two-factor authentication utilizes a(n): A) unique password. B) encrypted connection. C) a multistep process of authentication. D) a firewall. E) a digital certificate. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 20 Copyright © 2019 Pearson Education, Ltd. 72) All of the following are currently being used as traits that can be profiled by biometric authentication except: A) fingerprints. B) facial characteristics. C) body odor. D) retinal images. E) voice. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 73) A firewall allows the organization to: A) enforce a security policy on data exchanged between its network and the Internet. B) check the accuracy of all transactions between its network and the Internet. C) create an enterprise system on the Internet. D) check the content of all incoming and outgoing email messages. E) create access rules for a network. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 74) ________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies E) Firewalls Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 21 Copyright © 2019 Pearson Education, Ltd. 75) Currently, the protocols used for secure information transfer over the Internet are: A) TCP/IP and SSL. B) S-HTTP and CA. C) HTTP and TCP/IP. D) S-HTTP and SHTML. E) SSL, TLS, and S-HTTP. Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 76) In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A) SSL/TLS B) Symmetric key encryption C) Public key encryption D) Private key encryption E) Distributed encryption Answer: B Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 77) A digital certificate system: A) uses third party CAs to validate a user's identity. B) uses digital signatures to validate a user's identity. C) uses tokens to validate a user's identity. D) is used primarily by individuals for personal correspondence. E) protects a user's identity by substituting a certificate in place of identifiable traits. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 22 Copyright © 2019 Pearson Education, Ltd. 78) All of the following are types of information systems general controls except: A) application controls. B) computer operations controls. C) hardware controls. D) software controls. E) administrative controls. Answer: A Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 79) Fault tolerant information systems offer 100 percent availability because they use: A) high-capacity storage. B) a multitier server network. C) redundant hardware, software, and power supplies. D) dedicated phone lines. E) a digital certificate system. Answer: C Difficulty: 1: Easy AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 80) In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. A) high availability computing B) deep packet inspection C) application proxy filtering D) stateful inspection E) unified threat management Answer: B Difficulty: 3: Challenging AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 23 Copyright © 2019 Pearson Education, Ltd. 81) An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: A) smart card authentication. B) biometric authentication. C) two-factor authentication. D) symmetric key authorization. E) token authentication. Answer: C Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 82) Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall? A) NAT B) Packet filtering C) Deep packet inspection D) Stateful inspection E) Application proxy filtering Answer: E Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 83) Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. A) DPI B) MSSP C) NSP D) PKI E) UTM Answer: E Difficulty: 3: Challenging AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 84) Organizations can use existing network security software to secure mobile devices. Answer: FALSE Difficulty: 3: Challenging AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 24 Copyright © 2019 Pearson Education, Ltd. 85) In cloud computing, accountability and responsibility for protection of sensitive data is transferred to the cloud provider. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 86) Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification. Answer: FALSE Difficulty: 1: Easy AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 87) Packet filtering catches most types of network attacks. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 88) Application proxy filtering examines the application content of packets. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 89) SSL is a protocol used to establish a secure connection between two computers. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 90) Symmetric encryption uses two keys. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 25 Copyright © 2019 Pearson Education, Ltd. 91) Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 92) Authentication refers to verifying that a person is who he or she claims to be. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 93) In public key encryption the keys are mathematically related so that data encrypted with one key can be decrypted using only the other key. Answer: TRUE Difficulty: 2: Moderate AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 94) A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Answer: TRUE Difficulty: 1: Easy AACSB: Information Technology LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 95) Is the cloud a safer and more secure computing environment than an in-house network? Why or why not? Answer: Student evaluations will vary, but should include the understanding that using the cloud for computing distributes data to remote services that a company will not have final control of, that a company's cloud data will be stored alongside the data of other companies, and that various safeguards should be in place to protect your data. A sample answer is: The safety of cloud computing as compared to in-house network computing depends on the security implemented both at the corporation and at the service provider. For example, the company will need to ensure secure procedures and make sure that employees have secure passwords and access levels. The cloud service provider should use encryption for all data, at a minimum. Clients should make sure that the service provider complies with local privacy rules, external security audits, and certifications and provides proof of encryption mechanisms. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 26 Copyright © 2019 Pearson Education, Ltd. 96) Why is software quality important to security? What specific steps can an organization take to ensure software quality? Answer: Software errors pose a constant threat to information systems, causing untold losses in productivity. Growing complexity and size of software programs, coupled with demands for timely delivery to markets, have contributed to an increase in software flaws or vulnerabilities. A major problem with software is the presence of hidden bugs or program code defects. Studies have shown that it is virtually impossible to eliminate all bugs from large programs. Flaws in commercial software not only impede performance but also create security vulnerabilities that open networks to intruders. To correct software flaws once they are identified, the software vendor creates small pieces of software called patches to repair the flaws without disturbing the proper operation of the software. Organizations must maintain best efforts to both make sure purchased software is up to date and make sure their own software and programming is as bugfree as possible by employing software metrics and rigorous software testing. Ongoing use of metrics allows the information systems department and end users to jointly measure the performance of the system and identify problems as they occur. Examples of software metrics include the number of transactions that can be processed in a specified unit of time, online response time, the number of payroll checks printed per hour, and the number of known bugs per hundred lines of program code. For metrics to be successful, they must be carefully designed, formal, objective, and used consistently. Early, regular, and thorough testing will contribute significantly to system quality. Good testing begins before a software program is even written by using a walkthrough—a review of a specification or design document by a small group of people carefully selected based on the skills needed for the particular objectives being tested. Once developers start writing software programs, coding walkthroughs also can be used to review program code. However, code must be tested by computer runs. When errors are discovered, the source is found and eliminated through a process called debugging. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 27 Copyright © 2019 Pearson Education, Ltd. 97) You have just been hired as a security consultant by MegaMalls Inc., a chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this. Answer: To ensure that the security of MegaMalls' information systems is up to par, I would take the following steps: (1) Establish what data and processes are important and essential to the company. Determine what external and internal information is essential to the different employee roles in the company. (2) Conduct a security audit and create a risk assessment analysis. (3) Establish what legal/governmental/industry standards need to be adhered to and which international standards are relevant. (4) Conduct a business impact analysis and determine a disaster recovery and business continuity plan. (5) Create a security policy that defines an acceptable use policy, authorization policies and processes. (6) Plan for any change management needed. (7) Determine how the success of your policy will be measured and set up means for measuring this. (8) Implement such policies. (9) Measure and evaluate the effectiveness of the policy and make any additional adjustments. Difficulty: 3: Challenging AACSB: Analytical Thinking; Written and Oral Communication LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 98) What is a digital certificate? How does it work? Answer: Digital certificates are data files used to establish the identity of users and electronic assets for protection of online transactions. A digital certificate system uses a trusted third party, known as a certification authority, to validate a user's identity. The CA verifies a digital certificate user's identity offline. This information is put into a CA server, which generates an encrypted digital certificate containing owner identification information and a copy of the owner's public key. The certificate authenticates that the public key belongs to the designated owner. The CA makes its own public key available publicly either in print or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it was issued by the CA, and then obtains the sender's public key and identification information contained in the certificate. Using this information, the recipient can send an encrypted reply. The digital certificate system would enable, for example, a credit card user and a merchant to validate that their digital certificates were issued by an authorized and trusted third party before they exchange data. Public key infrastructure (PKI), the use of public key cryptography working with a certificate authority, is now widely used in ecommerce. Difficulty: 2: Moderate AACSB: Information Technology; Written and Oral Communication LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 28 Copyright © 2019 Pearson Education, Ltd. 99) Name and describe four firewall screening technologies. Answer: There are a number of firewall screening technologies, including static packet filtering, stateful inspection, Network Address Translation, and application proxy filtering. They are frequently used in combination to provide firewall protection. • Packet filtering examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolation. This filtering technology can miss many types of attacks. • Stateful inspection provides additional security by determining whether packets are part of an ongoing dialogue between a sender and a receiver. It sets up state tables to track information over multiple packets. Packets are accepted or rejected based on whether they are part of an approved conversation or attempting to establish a legitimate connection. • Network Address Translation (NAT) can provide another layer of protection when static packet filtering and stateful inspection are employed. NAT conceals the IP addresses of the organization's internal host computer(s) to prevent sniffer programs outside the firewall from ascertaining them and using that information to penetrate internal systems. • Application proxy filtering examines the application content of packets. A proxy server stops data packets originating outside the organization, inspects them, and passes a proxy to the other side of the firewall. If a user outside the company wants to communicate with a user inside the organization, the outside user first communicates with the proxy application, and the proxy application communicates with the firm's internal computer. Likewise, a computer user inside the organization goes through the proxy to talk with computers on the outside. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 100) Explain how two-factor authentication increases security. Answer: Two-factor authentication increases security by validating users by a multistep process. To be authenticated, a user must provide two means of identification, one of which is typically a physical token, such as a smartcard or chip-enabled bank card, and the other of which is typically data, such as a password or PIN (personal identification number). Biometric data, such as fingerprints, iris prints, or voice prints, can also be used as one of the authenticating mechanisms. A common example of two-factor authentication is a bank card; the card itself is the physical item, and the PIN is the data that go with it. Difficulty: 3: Challenging AACSB: Information Technology; Written and Oral Communication LO: 8-4: What are the most important tools and technologies for safeguarding information resources? 29 Copyright © 2019 Pearson Education, Ltd. Essentials of MIS, 13GE (Laudon/Laudon) Chapter 10 E-Commerce: Digital Markets, Digital Goods 1) What event marked the beginning of e-commerce? A) The first product sold online B) The first domain name registered C) The first e-mail sent D) The first paid advertisements placed on a website E) The first product advertised online Answer: D Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 2) All of the following are examples of "on demand" companies except: A) Uber. B) Airbnb. C) Lyft. D) Sidecar. E) Instagram. Answer: E Difficulty: 1: Easy AACSB: Analytical Thinking LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 3) A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location is called a(n): A) exchange. B) marketspace. C) online marketplace. D) e-hub. E) net marketplace. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 4) When did e-commerce begin? A) 1965 B) 1983 C) 1995 D) 1999 E) 2000 Answer: C Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 1 Copyright © 2019 Pearson Education, Ltd. 5) What standards are referred to when discussing universal standards as a unique feature of ecommerce? A) Internet technology standards B) Common spoken and written languages C) Universal measuring standards D) Universal advertising and media format standards E) EDI standards Answer: A Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 6) All of the following are unique features of e-commerce technology, except: A) personalization/customization. B) interactivity. C) transparency. D) richness. E) global reach. Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 7) Which of the following dimensions of e-commerce technology involves engaging consumers in a dialogue that dynamically adjusts the experience to the individual? A) Ubiquity B) Personalization/customization C) Richness D) Interactivity E) Information density Answer: D Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 2 Copyright © 2019 Pearson Education, Ltd. 8) Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience? A) Ubiquity B) Personalization/customization C) Richness D) Interactivity E) Social technology Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 9) Which of the following dimensions of e-commerce technology has the potential to raise the quality of information? A) Information density B) Richness C) Customization D) Interactivity E) Global reach Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 10) The effort required to locate a suitable product is called: A) price discrimination. B) search costs. C) menu costs. D) shopping costs. E) location costs. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 11) Information density refers to the: A) richness—complexity and content—of a message. B) total amount and quantity of information delivered to consumers by merchants. C) total amount and quantity of information available to all market participants. D) amount of information available to reduce price transparency. E) amount of physical storage space needed to store data about a specific entity, such as a product or consumer. Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 3 Copyright © 2019 Pearson Education, Ltd. 12) Selling the same goods to different targeted groups at different prices is called: A) cost customization. B) cost optimization. C) price gouging. D) cost personalization. E) price discrimination. Answer: E Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 13) Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party. A) transparency B) asymmetry C) complexity D) discrimination E) competition Answer: B Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 14) Changing the prices of products based on the level of demand characteristics of the customer is called ________ pricing. A) menu B) dynamic C) flexible D) asymmetric E) customized Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 15) Removing the business process layers in a distribution channel is called: A) disintermediation. B) BPR. C) market segmentation. D) network effects. E) market transparency. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 4 Copyright © 2019 Pearson Education, Ltd. 16) In digital markets: A) search costs increase. B) menu costs decline. C) switching costs decline. D) network costs decline. E) information asymmetry increases. Answer: B Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 17) Compared to digital markets, traditional markets have: A) lower search costs. B) stronger network effects. C) higher delayed gratification effects. D) reduced asymmetry. E) higher transaction costs. Answer: E Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 18) Compared to traditional goods, digital goods have: A) greater pricing flexibility. B) higher delivery costs. C) lower production costs. D) higher inventory costs. E) higher marginal costs. Answer: A Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 19) Compared to digital goods, traditional goods have: A) higher costs of production. B) lower marginal costs per unit. C) lower copying costs. D) similar marketing costs. E) more variable pricing. Answer: D Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 5 Copyright © 2019 Pearson Education, Ltd. 20) What is the primary benefit to consumers of disintermediation? A) Faster service B) Lower costs C) Higher quality D) Greater choices E) None, because disintermediation primarily benefits manufacturers. Answer: B Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 21) What is the difference between personalization and customization, as applied to e-commerce technologies? A) Customization is any type of adjustment made to a product by the user; personalization refers to a business changing a product or service for the user. B) Personalization is any type of adjustment made to a product by the user; customization refers to a business changing a product or service for the user. C) Customization refers to adjusting marketing messages for a consumer; personalization refers to adjusting a product or service based on a user's preferences. D) Personalization refers to adjusting marketing messages for a consumer; customization refers to adjusting a product or service based on a user's preferences. E) There is no difference. Both terms refer to changing a product or communication for the consumer. Answer: D Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 22) E-commerce refers to the use of the Internet and the web to transact business. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 23) Retail consumer e-commerce is growing at double-digit rates. Answer: TRUE Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 24) The Internet increases information asymmetry. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 6 Copyright © 2019 Pearson Education, Ltd. 25) All previous mass media in modern history, including the printing press, use a broadcast model where content is created in a central location by experts. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 26) Disintermediation provides major benefits to the consumer. Answer: TRUE Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 27) In general, for digital goods, the marginal cost of producing another unit is about zero. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 28) Traditional online marketing, such as display ads, have been replaced by video ads. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 29) Information asymmetry exists when there is more information about one product than there is about a similar product. Answer: FALSE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 30) Cost transparency refers to the ability of consumers to discover what merchants actually pay for products. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 31) Switching costs are the merchants' costs of changing prices. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 7 Copyright © 2019 Pearson Education, Ltd. 32) Web personalization refers to targeting ad messages to a person's clickstream behavior. Answer: TRUE Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 33) What is the most profound way in which e-commerce and the Internet have changed the relationship between companies and their customers? Support your answer. Answer: Student answers will vary. A sample answer is: The most profound way in which ecommerce and the Internet have changed this relationship is in the shrinking of information asymmetry. An information asymmetry exists when one party in a transaction has more information that is important for the transaction than the other party. That information helps determine their relative bargaining power. In digital markets, consumers and suppliers can "see" the prices being charged for goods, and in that sense digital markets are said to be more "transparent" than traditional markets. For example, until auto retailing sites appeared on the web, there was a pronounced information asymmetry between auto dealers and customers. Only the auto dealers knew the manufacturers' prices, and it was difficult for consumers to shop around for the best price. Auto dealers' profit margins depended on this asymmetry of information. Today's consumers have access to a legion of websites providing competitive pricing information, and three-fourths of U.S. auto buyers use the Internet to shop around for the best deal. Thus, the web has reduced the information asymmetry surrounding an auto purchase. The Internet has also helped businesses seeking to purchase from other businesses reduce information asymmetries and locate better prices and terms. Difficulty: 2: Moderate AACSB: Written and Oral Communication LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 34) "Knowledge increases exponentially" is a phrase with which we are all familiar. How does this concept apply to the emergence of the digital firm? Support your contentions. Answer: Student answers will vary. A sample answer is: The exponential increases of knowledge refer to shared information. For example, once the concept of a wheel is established, inheritors of that knowledge do not have to "reinvent the wheel." The Internet is a tool similar to the wheel: it is based on shared standards and universal tools. The Internet and shared networking technologies are allowing new techniques for attracting customers and selling customers to be developed and adapted very quickly. For example, although early Internet retailers had difficulty setting up secure credit card transactions and payment systems, today there are many systems in place as vendors step in to create shared tools for doing this. The Internet is fostering shared knowledge and, as such, propagating ever greater increases in that knowledge. Difficulty: 3: Challenging AACSB: Written and Oral Communication LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 8 Copyright © 2019 Pearson Education, Ltd. 35) What are digital goods, and how does the Internet impact the market for digital goods? Answer: Digital goods are goods that can be delivered over a digital network. Music tracks, video, Hollywood movies, software, newspapers, magazines, and books can all be expressed, stored, delivered, and sold as purely digital products. For the most part, digital goods are intellectual property, which is defined as "works of the mind." Intellectual property is protected from misappropriation by copyright, patent, and trade secret laws. Today, all these products are delivered as digital streams or downloads while their physical counterparts decline in sales. The impact of the Internet on the market for digital goods is nothing short of revolutionary. Businesses dependent on physical products for sales—such as bookstores, music stores, book publishers, music labels, and film studios—face the possibility of declining sales and even destruction of their businesses. In general, for digital goods, the marginal cost of producing another unit is about zero (it costs nothing to make a copy of a digital file such as a music file). However, the cost of producing the original first unit is relatively high—in fact, it is nearly the total cost of the product because there are few other costs of inventory and distribution. Costs of delivery over the Internet are very low, inventory costs are low, marketing costs often remain the same, and pricing can be highly variable. On the Internet, the merchant can change prices as often as desired because of low menu costs. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 36) What is dynamic pricing and how is it used in e-commerce? Answer: In dynamic pricing, the price of a product varies depending on the demand characteristics of the customer or the supply situation of the seller. For instance, online retailers from Amazon to Walmart change prices on many products based on time of day, demand for the product, and users' prior visits to their sites. Using big data analytics, some online firms can adjust prices at the individual level based on behavioral targeting parameters such as whether the consumer is a price haggler (who will receive a lower price offer) versus a person who accepts offered prices and does not search for lower prices. Prices can also vary by zip code, with higher prices set for poor sections of a community. Uber, along with other ride services, uses surge pricing to adjust prices of a ride based on demand (which always rises during storms and major conventions). Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 9 Copyright © 2019 Pearson Education, Ltd. 37) Describe the use of personalization and customization in e-commerce. What business value do these techniques have? Answer: In personalization, merchants can target their marketing messages to specific individuals by adjusting the message to a person's name, interests, and past purchases. For example, Amazon.com greets each logged in user with their user name. With customization, merchants can change the delivered product or service based on a user's preferences or prior behavior. The Wall Street Journal Online allows you to select the type of news stories you want to see first and gives you the opportunity to be alerted when certain events happen. The ability of Internet technology to track customer behavior at websites, along with records of purchases and other behavior, allows merchants to create a detailed profile of a customer. These profiles can be used to create unique personalized web pages that display content or ads for products or services of special interest to each user, improving the customer's experience and creating additional value. The business value of personalization is reduced marketing costs, as you spend only the money to target customers that are more likely to be receptive and are more profitable, and improved sales results, from increased customer response to personalized sites that better serve their own purposes and shopping needs. Personalization can achieve some of the benefits of using individual salespeople for dramatically lower costs. Difficulty: 2: Moderate AACSB: Written and Oral Communication LO: 10-1: What are the unique features of e-commerce, digital markets, and digital goods? 38) Amazon.com is known primarily for its use of which of the following business models? A) Content provider B) Portal C) Market creator D) E-tailer E) Transaction broker Answer: D Difficulty: 1: Easy AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 39) Craigslist is an example of: A) C2C e-commerce. B) B2B e-commerce. C) B2C e-commerce. D) M-commerce. E) P2P-commerce. Answer: A Difficulty: 1: Easy AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 10 Copyright © 2019 Pearson Education, Ltd. 40) Which of the following types of e-commerce involves businesses selling goods and services directly to individuals via the Internet? A) B2C e-commerce B) B2B e-commerce C) C2C e-commerce D) M-commerce E) P2P e-commerce Answer: A Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 41) As described in the opening case, what is the primary business model employed by YouTube? A) Portal B) E-tailer C) Content provider D) Transaction broker E) Market creator Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 42) Transaction brokers: A) generate revenue from advertising or from directing buyers to sellers. B) save users money and time by processing online sales transactions. C) provide a digital environment where buyers and sellers can establish prices for products. D) sell physical products directly to consumers or individual businesses. E) provide online meeting places where people with similar interests can communicate. Answer: B Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 43) Which of the following Internet business models involves a merchant creating an online digital environment that enables people with like interests to share information? A) Community provider B) Service provider C) Market creator D) Transaction broker E) Portal Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 11 Copyright © 2019 Pearson Education, Ltd. 44) Market creators: A) save users money and time by processing online sales transactions. B) provide a digital environment where buyers and sellers can establish prices for products. C) create revenue by providing digital content over the web. D) sell physical products directly to consumers or individual businesses. E) generate revenue from advertising or from directing buyers to sellers. Answer: B Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 45) Which of the following best illustrates the sales revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Yelp receives a fee after steering a customer to a participating website where he or she makes a purchase. C) Pandora provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads. E) Netflix charges customers a monthly fee for access to its library of movies. Answer: D Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 46) As described in the chapter case, Uber uses the ________ revenue model. A) service provider B) market creator C) community provider D) portal E) transaction broker Answer: B Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 47) Which of the following best illustrates the transaction fee revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Yelp receives a fee after steering a customer to a participating website where he or she makes a purchase. C) Pandora provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads. E) Netflix charges customers a monthly fee for access to its library of movies. Answer: A Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 12 Copyright © 2019 Pearson Education, Ltd. 48) In the ________ revenue models, a firm offers some services for free but charges a subscription fee for premium services. A) free/freemium B) subscription C) transaction fee D) affiliate E) sales Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 49) Content providers use ________ systems to process large amounts of very small monetary transactions cost-effectively. A) subscription B) mobile payment C) transaction fee D) micropayment E) affiliate revenue Answer: D Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 50) Which of the following best illustrates the advertising revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Yelp receives a fee after steering a customer to a participating website where he or she makes a purchase. C) Facebook provides a social network for free, but shows sponsored content in users' News Feeds. D) Apple accepts micropayments for single music track downloads. E) Netflix charges customers a monthly fee for access to its library of movies. Answer: C Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 51) Which of the following companies uses the subscription revenue model? A) Expedia B) ETrade C) Facebook D) Netflix E) Dropbox Answer: D Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 13 Copyright © 2019 Pearson Education, Ltd. 52) As described in the opening case, what is YouTube's revenue model? A) Advertising B) Transaction fee C) Subscription D) Freemium E) Affiliate Answer: A Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 53) YouTube uses a form of dynamic pricing. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 54) eBay is an example of the market creator business model. Answer: TRUE Difficulty: 1: Easy AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 55) Yahoo is an example of the portal business model. Answer: TRUE Difficulty: 1: Easy AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 56) Podcasting allows subscribers to listen to live, streaming radio and other audio content. Answer: FALSE Difficulty: 1: Easy AACSB: Analytical Thinking LO: 10-2: What are the principal e-commerce business and revenue models? 57) In the affiliate revenue model, firms derive revenue by selling information or services through partner e-commerce sites. Answer: FALSE Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-2: What are the principal e-commerce business and revenue models? 14 Copyright © 2019 Pearson Education, Ltd. 58) List and describe at least five different Internet business models. Which of these models do you think would be the riskiest for a startup business today? Support your answer. Answer: Internet business models include: e-tailer, transaction broker, market creator, content provider, community provider, portal and service. The choice of riskiest model will depend on the individual student. A sample answer is: Today the riskiest model would be a contentprovider, because most, if not all, of the major offline entertainment and content producers such as television networks and newspapers are online. They would be your competitors, and already have the means for content creation and distribution in place. All of the other business models do not have the risk of creating brand new content. Difficulty: 1: Easy AACSB: Written and Oral Communication LO: 10-2: What are the principal e-commerce business and revenue models? 59) List and describe the three main categories of e-commerce. Which do you think is ultimately the most valuable to the individual consumer? Support your answer. Answer: Business-to-consumer, business-to-business, and consumer-to-consumer. All three are valuable to the consumer, but in the long run, business-to-business may be the most valuable to the individual consumer because it will reduce prices and increase both goods and services. (Other opinions, of course, are supportable.) Difficulty: 2: Moderate AACSB: Written and Oral Communication LO: 10-2: What are the principal e-commerce business and revenue models? 60) What methods could a portal use to generate revenue? Which do you think might be most successful, and why? Answer: Advertising, subscriptions, selling collected marketing information, and directing buyers to sellers could all generate revenue. Student evaluations will vary. A sample answer is: I would think the most successful method would be through collecting marketing information, because as a portal that links to large amounts of external information and attracts repeat customers, the portal would have the opportunity to gather a lot of information about each user. Difficulty: 2: Moderate AACSB: Written and Oral Communication LO: 10-2: What are the principal e-commerce business and revenue models? 61) You are consulting for Lucky's, a chain of gas stations. What types of e-commerce opportunities, if any, are relevant to Lucky's? Could Lucky's make use of any Internet business models for this opportunity? Answer: Student answers will vary. A sample answer is: In terms of B2B e-commerce, Lucky's might be able to procure goods over the Internet, use a private industrial network to coordinate their supply chain with suppliers and manage inventory. Depending on the structure of the gasoline retail business, industry net marketplaces and exchanges might be of use. In terms of B2C e-commerce, there are not many opportunities, as it is inefficient to sell gasoline over the Internet. Lucky's could make sure that its stations are listed in popular location-based mobile services that help drivers find nearby gas stations. Difficulty: 3: Challenging AACSB: Written and Oral Communication LO: 10-2: What are the principal e-commerce business and revenue models? 15 Copyright © 2019 Pearson Education, Ltd. 62) List and describe the top five methods of online marketing and advertising formats, in terms of estimated 2018 revenue. Answer: The top five methods of online advertising are: display ads, which are banner ads with interactive features that increasingly are behaviorally targeted to individual web activity (an estimated $46.1 billion); search engine marketing, which employs text ads targeted at precisely what the customer is looking for at the moment of shopping and purchase (an estimated $42.1 billion); video ads, which are the fastest-growing format, and use engaging, entertaining, interactive video that are also often behaviorally targeted (an estimated $14.4 billion); rich media ads, which use interactive, targeted, entertaining animations, games and/or puzzles (an estimated $11.7 billion); and online classified, such as job, real estate, and services ads (an estimated $2.1 billion). Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 10-2: What are the principal e-commerce business and revenue models? 63) Ikea asked for the help of its customers in designing new furniture. This is an example of: A) prediction markets. B) behavioral targeting. C) long-tail marketing. D) social shopping. E) crowdsourcing. Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 64) Exposing an individual to ads that are chosen based on the choices of their friends is an example of: A) clickstream advertising. B) behavioral targeting. C) online profiling. D) social marketing. E) crowdsourcing. Answer: D Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 16 Copyright © 2019 Pearson Education, Ltd. 65) Which of the following best describes the digital social graph? A) A person's direct and indirect relationships B) All of a person's closest digital relationships C) A collection of millions of personal social graphs D) All of the online and offline relationships a person has E) All of the relationships in an online community Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 66) Which of the following marketing formats is sales-oriented, rather than branding-oriented or a mix? A) Lead generation B) Search engine C) Rich media D) Display ads E) Video Answer: B Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 10-3: How has e-commerce transformed marketing? 67) Facebook's Like button is an example of which of the following? A) Social sign-on B) Collaborative shopping C) Network notification D) Social search E) Newsfeed Answer: C Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 68) An environment where consumers can share their shopping experiences with one another by viewing products, chatting, or texting about brands, products, and services is an example of: A) network notification. B) web personal marketing. C) collaborative shopping. D) social search. E) social sign-on. Answer: C Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 17 Copyright © 2019 Pearson Education, Ltd. 69) ________ involves placing ads in social network newsfeeds or within traditional editorial content, such as a newspaper article. A) Behavioral targeting B) Crowdsourcing C) Native advertising D) Demand prediction software E) Lead generation marketing Answer: C Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 70) Rich media advertisements are used to strengthen brands. Answer: TRUE Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 10-3: How has e-commerce transformed marketing? 71) Behavioral targeting occurs at individual websites and within apps. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 72) Advertising networks track a user's behavior at thousands of websites. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 73) Viral marketing is like traditional word-of-mouth marketing except that it is spread via online communities. Answer: TRUE Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 74) Search engine marketing is the largest form of web marketing. Answer: FALSE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-3: How has e-commerce transformed marketing? 18 Copyright © 2019 Pearson Education, Ltd. 75) You have been hired as a marketing consultant by a law firm in Los Angeles that specializes in juvenile justice. What ways can you use the Internet as a marketing tool and to advertise the firm's services? Answer: Student answers will vary. A sample answer is: For marketing research, you could advertise on search engines. You could pay for marketing research at relevant portals. You could also collect customer information from the company's website. You could monitor relevant blogs to see what issues are of concern in juvenile justice, so as to address these concerns in your advertising campaigns. To advertise, you could advertise on search engine results and at relevant portals or legal information content providers. If it were feasible, you could create a juvenile justice portal and blog for the company in order to attract users from whom you could gather market research as well as promote your services. You might also want to investigate social network marketing—assuming that your clients might be the best leads for other clients. Difficulty: 3: Challenging AACSB: Written and Oral Communication LO: 10-3: How has e-commerce transformed marketing? 76) Website tracking software can log the path a customer took through the website, the time spent on the site, and what geographic area, in general, the customer is from, all of which can help in customer analysis. It can also log the customer's operating system and which browser the customer is using. How could these last two data items be of interest to a company? Give examples. Answer: Student answers will vary, but should include an understanding that customer OS and browser interact technologically with a website and might be relevant in data analysis. An example is: Customer OSs and browsers could help a company determine what technical functionalities could be used in the site. For example, if it found out that a significant percentage of its users are using mobile browsers, they might want to make sure that the website is easily used by various mobile devices. Secondly, this data might be relevant in data mining or other analysis. For example, a retail clothing company might find that a significant portion of their most valued customers use an Apple operating system, and from other data analysis know that Apple users are more likely to purchase cashmere sweaters. Then the company may want to place a greater emphasis on selling the cashmere sweaters. Difficulty: 2: Moderate AACSB: Written and Oral Communication LO: 10-3: How has e-commerce transformed marketing? 77) Which of the following statements about EDI is not true? A) Each major industry in the United States has EDI standards. B) Today, EDI is only used for document automation. C) Many organizations still use private networks for EDI. D) EDI systems are increasingly web-enabled. E) About 80 percent of online B2B e-commerce is still based on EDI. Answer: B Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-4: How has e-commerce affected business-to-business transactions? 19 Copyright © 2019 Pearson Education, Ltd. 78) The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called: A) e-procurement. B) SCM. C) procurement. D) distribution E) production. Answer: C Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-4: How has e-commerce affected business-to-business transactions? 79) A secure website that links a large firm to its suppliers and other key business partners is called a(n): A) e-hub. B) marketspace. C) exchange. D) private industrial network. E) net marketplace. Answer: D Difficulty: 2: Moderate AACSB: Information Technology LO: 10-4: How has e-commerce affected business-to-business transactions? 80) Which of the following statements about Net marketplaces is not true? A) Some Net marketplaces sell direct goods. B) Some Net marketplaces serve vertical markets. C) Some Net marketplaces sell indirect goods. D) Some Net marketplaces support contractual purchases based on long-term relationships. E) Some Net marketplaces are owned by a single firm and used to link solely to the firm's suppliers and key business partners. Answer: E Difficulty: 3: Challenging AACSB: Analytical Thinking LO: 10-4: How has e-commerce affected business-to-business transactions? 81) Which of the following statements about exchanges is not true? A) Exchanges are independently owned third-party Net marketplaces. B) Some exchanges provide vertical markets. C) Exchanges are the most successful form of B2B commerce. D) Some exchanges enable a spot market. E) Go2Paper is an example of an exchange. Answer: C Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-4: How has e-commerce affected business-to-business transactions? 20 Copyright © 2019 Pearson Education, Ltd. 82) Which of the following is an example of a direct good in the automobile industry? A) Computer equipment B) Paper C) Office furniture D) Roofing shingles E) Sheet steel Answer: E Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-4: How has e-commerce affected business-to-business transactions? 83) Which of the following is an example of a private industrial network? A) Exostar B) Go2Paper C) Elemica D) Expedia E) VW Group Supply Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-4: How has e-commerce affected business-to-business transactions? 84) Procurement involves all of the following except: A) negotiating with suppliers. B) paying for goods. C) making delivery arrangements. D) sourcing. E) production scheduling. Answer: E Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-4: How has e-commerce affected business-to-business transactions? 85) EDI standards that take advantage of network communications have yet to be fully implemented at the industry level. Answer: FALSE Difficulty: 2: Moderate AACSB: Information Technology LO: 10-4: How has e-commerce affected business-to-business transactions? 86) Net marketplaces may either support contractual purchasing based on long-term relationships with designated suppliers or short-term spot purchasing. Answer: TRUE Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-4: How has e-commerce affected business-to-business transactions? 21 Copyright © 2019 Pearson Education, Ltd. 87) Exchanges have become one of the most popular types of Net marketplace because they encourage competitive bidding that drives prices down. Answer: FALSE Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-4: How has e-commerce affected business-to-business transactions? 88) Indirect goods are not involved firsthand in the production process. Answer: TRUE Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-4: How has e-commerce affected business-to-business transactions? 89) Which of the following is the largest mobile advertising market? A) Google B) Yahoo C) Facebook D) Microsoft E) Twitter Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-5: What is the role of m-commerce in business, and what are the most important mcommerce applications? 90) A new social mobile app you are developing allows users to find friends who are logged in and within a 10-mile radius. This would be categorized as a ________ service. A) geosocial B) geoinformation C) geoadvertising D) geomapping E) geolocating Answer: B Difficulty: 1: Easy AACSB: Analytical Thinking LO: 10-5: What is the role of m-commerce in business, and what are the most important mcommerce applications? 22 Copyright © 2019 Pearson Education, Ltd. 91) Geoadvertising sends ads to users based on their: A) GPS locations. B) home addresses. C) shopping preferences. D) website behaviors. E) Google Maps settings. Answer: A Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-5: What is the role of m-commerce in business, and what are the most important mcommerce applications? 92) What percent of online retailers now have m-commerce websites? A) 15 percent B) 25 percent C) 55 percent D) 75 percent E) 85 percent Answer: C Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-5: What is the role of m-commerce in business, and what are the most important mcommerce applications? 93) Which of the following is not an example of location-based services? A) Foursquare B) Google Maps C) Waze D) Uber E) Netflix Answer: E Difficulty: 2: Moderate AACSB: Application of Knowledge LO: 10-5: What is the role of m-commerce in business, and what are the most important mcommerce applications? 23 Copyright © 2019 Pearson Education, Ltd. 94) Define location-based services and describe the main categories of these services. Which of the categories do you feel has the most potential in terms of e-commerce revenues, and why? Answer: Location-based services are services that use GPS mapping services available on smartphones to deliver value-added services. They include geosocial services, geoadvertising, and geoinformation services. A geosocial service can tell you where your friends are meeting. Geoadvertising services can tell you where to find the nearest Italian restaurant, and geoinformation services can tell you the price of a house you are looking at, or about special exhibits at a museum you are passing. Student answers as to the most valuable of these services will vary; an example is: I feel that geoadvertising services have the most potential for profit, as it is based on a profit-making mechanism: advertising. Geosocial services and geoinformation services, by themselves, are more content- and communication-oriented. Difficulty: 2: Moderate AACSB: Written and Oral Communication LO: 10-5: What is the role of m-commerce in business, and what are the most important mcommerce applications? 95) What are geosocial services and how are they being used? Answer: Geosocial services help you find friends, or your friends to find you, by checking in to the service, announcing your presence in a restaurant or other place. Your friends are instantly notified. About 20 percent of smartphone owners use geosocial services. One example of a firm using geosocial services is Foursquare. Foursquare provides a location-based social networking service to 50 million registered individual users, who may connect with friends, update their location, and provide reviews and tips for enjoying a location. Points are awarded for checking in at designated venues. Users choose to post their check-ins on their accounts on Twitter, Facebook, or both. Users also earn badges by checking in at locations with certain tags, for check-in frequency, or for the time of check-in. Difficulty: 1: Easy AACSB: Application of Knowledge; Written and Oral Communication LO: 10-5: What is the role of m-commerce in business, and what are the most important mcommerce applications? 96) Which of the following is a milestone for the Phase 1: Planning phase of developing an ecommerce presence? A) Website plan B) Web mission statement C) Functional website D) Social media plan E) Mobile media plan Answer: B Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-6: What issues must be addressed when building an e-commerce presence? 24 Copyright © 2019 Pearson Education, Ltd. 97) Which of the following is a milestone for the website development phase of building an ecommerce presence? A) Web mission statement B) Social media plan C) Website plan D) Web presence map E) Functional website Answer: C Difficulty: 3: Challenging AACSB: Application of Knowledge LO: 10-6: What issues must be addressed when building an e-commerce presence? 98) In planning a robust e-commerce presence, you will want to consider the blog platform as part of your ________ presence. A) social media B) e-mail C) community D) website E) offline media Answer: A Difficulty: 2: Moderate AACSB: Analytical Thinking LO: 10-6: What issues must be addressed when building an e-commerce presence? 99) Which of the following is not one of four types of presence to be considered when building an e-commerce presence? A) Offline media B) Websites C) Social media D) Corporate E) E-mail Answer: D Difficulty: 1: Easy AACSB: Application of Knowledge LO: 10-6: What issues must be addressed when building an e-commerce presence? 25 Copyright © 2019 Pearson Education, Ltd. 100) What are the steps involved in developing an e-commerce presence for a start-up company? Answer: A one-year timeline for developing an e-commerce presence for a start-up company would involve the following: Phase 1: Planning, which involves envisioning the company's web presence and determining personnel, and producing a web mission statement; Phase 2, Website development, which involves acquiring content, developing a website design, arranging for hosting a website, and producing a website plan; Phase 3: Web implementation, which involves developing keywords and metatags, focusing on search engine optimization, identifying potential sponsors, and producing a functional website; Phase 4: Social media plan, which involves identifying appropriate social platforms and content for the company's products and services, and producing a social media plan; Phase 5, Social media implementation, which involves developing Facebook, Twitter and Pinterest presences, and results in a functioning social media presence, and Phase 6: Mobile plan, which involves developing a mobile media plan and considering options for porting the website. Difficulty: 3: Challenging AACSB: Application of Knowledge; Written and Oral Communication LO: 10-6: What issues must be addressed when building an e-commerce presence? 26 Copyright © 2019 Pearson Education, Ltd.