courses/KEY_IDCE_SupportCenter/documents_fall2014c

advertisement
CBE Test
MIS300 Information Systems Design and Management
Choose 80 of 120 questions
MO#
Module Outcome
Question #
MIS300MO1-1
Compare and contrast how people, information, and
information technology combine to create management of
information systems within a specific industry.
Analyze each component of Porter’s Five Forces Model as
they relate to competition within a specific industry.
Compare and contrast strategies and frameworks as
approaches to development of business strategies for a
specific industry.
Design a break-even analysis to assess the financial impact
of information technology in a given scenario.
9, 10, 11, 12
Examine the impact of social media on technology and
business culture within a specific organization or industry.
Examine supply chain management systems and discuss
their use and effectiveness within a specific organization or
industry.
Examine enterprise resource planning systems and discuss
their use and effectiveness within a specific organization or
industry.
Examine customer relationship management systems and
discuss their use and effectiveness within a specific
organization or industry.
Describe the various components and features of the
Internet, including browsers, web sites, domain names,
Web 2.0, social networking, RSS feeds, telecommunication
software and hardware, and Internet Service Providers.
18, 19, 20
Differentiate between a relational database, a database
management system, and a data warehouse, describing the
components and uses of each.
Examine the role of business intelligence and data within an
organization or industry.
Describe the components of a relational database, including
entity class, instance, primary key, foreign key, types of
relationships, and database normalization.
Compare and contrast data-mining tools in a data
warehouse environment.
30, 31, 32, 33,
34, 35
Analyze the decision support role of specialized analytics
41, 42, essay 6
MIS300MO1-2
MIS300MO1-3
MIS300MO1-4
MIS300MO2-1
MIS300MO2-2
MIS300MO2-3
MIS300MO2-4
MIS300MO2-5
MIS300MO3-1
MIS300MO3-2
MIS300MO3-3
MIS300MO3-4
MIS300MO4-1
1, 2, 3, 4, essay
10
13, 14, essay 9
5, 6, 7, 8
15, 16, 17,
essay 8
21, 22, 23, 24,
25
123, 124
121, 122
38, 39, 40,
essay 7
26, 27, 28, 29
36, 37
like predictive and text analytics.
MIS300MO4-2
Examine decision support systems, geographic information
systems, and expert systems.
Define neural networks, fuzzy logic, and genetic algorithms.
43, 44, 45, 46,
essay 5
47, 48, 49
MIS300MO4-4
Describe data-mining agents and multi-agent systems as
subsets of intelligent agents and agent-based technologies.
50, 51, 52, 53
MIS300MO5-1
Describe the nine major e-commerce business models.
59, 60, 61, 62
MIS300MO5-2
Compare the development of an e-commerce marketing
mix for customers in both the B2B and B2C business
models.
Discuss three major trends impacting e-commerce and
society in general.
Describe the principles of networking, including LANs,
WANs, MANs, types of communication media, security,
clients, servers, Internet connections, and peer-to-peer
networking.
63, 64, 65, 66
Discuss the seven major phases of the systems
development life cycle (SDLC) as they relate to a given
organization.
Compare and contrast the systems development life cycle
and the self-sourcing process.
Describe various component-based development
methodologies.
Describe the process of outsourcing.
71, 72, 73, 74,
75
MIS300MO7-1
Describe the concept of a service-oriented architecture as it
relates to IT needs.
MIS300MO7-2
Compare common metrics used in assessing IT systems and
initiatives.
Examine all of the phases of business continuity planning as
they relate to a specific organization or industry.
89, 90, 91, 92,
93, 94, 95,
essay 3
96, 97
MIS300MO4-3
MIS300MO5-3
MIS300MO5-4
MIS300MO6-1
MIS300MO6-2
MIS300MO6-3
MIS300MO6-4
MIS300MO7-3
MIS300MO8-1
Define ethics, intellectual property, copyright, Fair Use
Doctrine, and software piracy.
MIS300MO8-2
Discuss three ways to protect information on a computer or
network from security vulnerabilities.
MIS300MO8-3
Describe the emerging trends in wireless technology,
including Bluetooth, WiFi, cell phones, and RFID.
Describe three emerging technologies that will impact the
MIS300MO8-4
67, 68, 69, 70
54, 55, 56, 57,
58
76, 77, 78, 79,
80
81, 82, 83
84, 85, 86, 87,
88
98, 99, 100,
essay 4
101, 102, 103,
104, 105, essay
1
106, 107, 108,
109, 110, essay
2
116, 117, 118,
119, 120
111, 112, 113,
future.
114, 115
1. Under the RGT framework, which of the following strategies innovates business processes and/or
products and services in a completely new way, moving into seemingly different markets?
a.
b.
*c.
d.
Transcend
Run
Transform
Grow
2. Your business had two strategic initiatives this year. One initiative focused on improving customer
satisfaction. The second focused on providing customers with their purchase history from any Internet
site in the world. If you were to allocate 15% of your IT budget to the first initiative and 25% to the
second initiative, what type of strategy are you applying?
a.
b.
c.
*d.
Tactical information planning (TIP)
Strategic technology planning (STP)
Transforming IS strategy (TISS)
Run-grow-transform (RGT) framework
3. Carrio Arrento, a car rental company, operates in two cities and offers low-rental cars specifically to
college students from these areas. This is an example of a(n) _______.
a.
*b.
c.
d.
overall cost leadership strategy
focus strategy
loyalty program
entry barrier
4. _____ is defined by Porter as offering the same or better quality product or service at a price that is
less than what any of the competition is able to do.
*a.
b.
c.
d.
Overall cost leadership
Price differentiation
Product differentiation
Focus
5. Doodle Corp. wants to increase customer loyalty toward its currently one-of-a-kind software, Bonkers
EP. It does so by offering additional services like automatic updates and free upgrades. Which of the
following forces in Porter's model is Doodle Corp. addressing in this situation?
a.
*b.
c.
d.
Threat of substitute products or services
Threat of new entrants
Buyer power
Supplier power
6. Which of the following has the highest threat of substitution?
a.
b.
c.
*d.
A Patek Philippe watch
A YSL perfume
Bentley Continental GT
Lifebuoy soap
7. To minimize the threat of substitute products or services, some businesses will create switching costs.
What are switching costs?
a.
b.
c.
*d.
The start-up costs incurred when replacing old technology with new
The costs incurred due to the inability to switch back to your first brand after moving to an
alternative brand
A non-refundable fine levied against the customer for switching to a competitor
The costs that make customers reluctant to another project or service supplier
9. Switching costs are costs that make customers reluctant to switch to another product or service
supplier. What you need to realize is that a switching cost does not necessarily have to be an actual
monetary cost.
Which of the following includes drivers for your printer and scanner and utility software?
a.
b.
*c.
d.
Payroll software
Collaborative software
System software
Application software
10. Which of the following is a telecommunication device?
a.
b.
*c.
d.
Port
Cord
Satellite
Bar code scanner
11. Which of the following is true of ethics?
a.
b.
*c.
d.
Ethics and laws are the same.
Laws and ethics clearly require or prohibit an action.
Ethics are more subjective than laws.
Laws are more a matter of personal or cultural interpretation, unlike ethics.
12. A technology-literate knowledge worker:
a.
b.
*c.
d.
is a computer savvy worker
knows all computer programming languages
knows how and when to apply technology
is knowledgeable about emerging technology
13. Which of the following auto manufacturers use an overall cost leadership strategy?
a.
* b.
c.
d.
Mercedes Benz
Hyundai
Rolls-Royce
Aston Martin
14. Companies like Amazon and eBay that only have a presence in the virtual world have significantly
lower fixed costs in terms of retail space than companies that have to pay for retail space, like retail
stores you would find in a mall. This technological concept is known as:
a.
b.
c.
*d.
VoIP.
telecommuting.
cloud computing.
digital storefronts.
15. _____ is the use of a mobile device and its location to check into locations such as businesses and
entertainment venues, find friends and their locations, and receive rewards and take advantage of
"specials" based on location.
a.
*b.
c.
d.
MMORPG
Social locationing
Mobile locationing
Social gaming
16. Which of the following is a popular MMORPG?
a.
b.
c.
*d.
YouTube
Google+
Groupon
World of Warcraft
17. The Web 2.0:
*a.
b.
c.
d.
is a technology that focuses on online collaboration, users as both creators and modifiers of
content, dynamic and customized information feeds, and many other engaging Web-based
services.
is a computer network consisting of a collection of internet sites that offer text and graphics and
sound and animation resources through the hypertext transfer protocol.
is a reference that points to a whole document or to a specific element within a document.
is a computer network consisting of a worldwide network of computer networks that use the
TCP/IP network protocols to facilitate data transmission and exchange.
18. Which of the following ERP software is most suitable for Forca, an aircraft manufacturer with more
than 20000 employees?
a.
b.
*c.
d.
SYSPRO
SAP Business One
Oracle ERP
Sage MAS 90 ERP
19. Which of the following ERP software is most suitable for Exacto, a precision instrument
manufacturer with 400 seats?
*a.
b.
c.
d.
Infor ERP Solution
Microsoft Dynamics AX
SAP Business One
Intuit QuickBooks Enterprise
20. The early stage of ERP was carried out in the 1970s through a system called ____.
a.
b.
* c.
d.
Customer Relationship Management (CRM)
Database Management System (DBMS)
Materials Requirement Planning (MRP)
Decision Support System (DSS)
21. Which of the following provides you with a multimedia-based collection of information, services, and
Web sites?
a.
b.
c.
* d.
FTP server
Wiki
Internet
World Wide Web
22. KeepFit is a manufacturer of sports merchandise. You can visit a specific location on the Web and
order merchandise from KeepFit. This specific location is KeepFit's ____.
a.
b.
*c.
d.
Web application
Web server
Web site
TLD
23. Which of the following identifies a domain name?
a.
* b.
c.
d.
A specific location on the Web where you visit, gather information, and perhaps even order
products
A specific computer on the Web along with the main page of its Web site
An Internet service provider
The organization that sponsors and manages a Web site for its members
24. Margaret Sullivan is a TLD expert and a domain name consultant. Which of the following domains is
she likely to suggest to her clients who want to start Internet companies?
Refer: Figure B.3
a.
*b.
c.
d.
.aero
.net
.pro
.edu
25. The _____ is a nonprofit organization charged with numerous Internet-related responsibilities, one
of which is the oversight of top-level domains.
*a.
b.
c.
d.
ICANN
ITU
TLD
URL
26. Which of the following would be a good primary key for the entity class of students?
a.
b.
*c.
d.
Course ID
Student Course name
Student ID
Institute ID
27. What is an instance?
a.
b.
c.
*d.
It is a key that uniquely identifies a person, place, or thing.
It is a group of related information about an entity.
It is a record or row in a relation.
It is an occurrence of an entity class that can be identified by a primary key.
28. A supplier is an example of a(n) ____.
a.
* b.
c.
d.
relational database
entity class
foreign key
Business rule
29. An organization wishes to store information about its employees in a database. The employees, in
this case, constitute a(n) ____.
a.
b.
*c.
d.
foreign key
primary key
entity class
data dictionary
30. A data warehouse is:
a.
*b.
c.
d.
a large hardware environment that supports multiple platforms.
a logical collection of information used to create business intelligence.
an operational database system used to manage and analyze transactional data.
an accumulation of all operational data stored by large organizations.
31. What does it mean for a data warehouse to be multidimensional?
a.
b.
*c.
d.
The database stores data, facts, and definitions for all stored information.
Data can be linked to other sources of internal and external information.
The files stored in a warehouse contain several layers of columns and rows.
Customer information can be related to sales, departmental, and organizational information.
32. Which of the following data administration facilities continually maintain statistics concerning how
the DBMS engine physically accesses information?
a.
b.
*c.
d.
Security management facilities
Query optimization facilities
Reorganization facilities
Concurrency control facilities
33. _____ ensure the validity of database updates when multiple users attempt to access and change
the same information.
a.
b.
c.
*d.
Backup and recovery facilities
Query optimization facilities
Change management facilities
Concurrency control facilities
34. Which of the following DBMS components allows you to add, change, and delete information in a
relational database?
a.
*b.
c.
d.
Data definition subsystem
Data manipulation subsystem
Data administration subsystem
Application generation subsystem
35. What must you define before adding any information to a relational database?
a.
b.
c.
*d.
The intended audience
The physical hardware structure
The administrative rights of users
The logical structure of the database
36. What type of software tool is used to query information stored in a data warehouse?
a.
b.
*c.
d.
OLTP
Data dictionary
Data-mining
Decision support
37. Data warehouses exist to support:
a.
*b.
c.
d.
MRP.
OLAP.
OLTP.
SQL.
38. _____ include(s) tools such as neural networks and fuzzy logic to form the basis of "information
discovery."
a.
b.
*c.
d.
Digital dashboards
Multidimensional analysis tools
Artificial intelligence
Query-and-reporting tools
39. In a data warehouse, which data-mining tool would you use to quickly build reports without having
to write programming code?
a.
b.
c.
*d.
Application report generator
Artificial intelligence
Multidimensional analysis tools
Query-and-reporting tools
40. A data warehouse is:
a.
*b.
c.
d.
a large hardware environment that supports multiple platforms.
a logical collection of information used to create business intelligence.
an operational database system used to manage and analyze transactional data.
an accumulation of all operational data stored by large organizations.
41. Which of the following data-mining technologies uses historical information to predict future events
and outcomes?
a.
b.
c.
*d.
Artificial intelligence
Digital dashboards
Multidimensional analysis tools
Predictive analytics
42. _____ is a process of using statistical, artificial intelligence, and linguistic techniques to convert
information content in surveys, e-mails, blogs, and social media into structured information.
a.
*b.
c.
d.
Web analytics
Text analytics
Endless analytics
Predictive analytics
43. Which of the following artificial intelligence systems is capable of finding and differentiating
patterns?
*a.
b.
c.
d.
Neural networks
Expert systems
Geographic information systems
Decision support systems
44. Which of the following is an artificial intelligence system that applies reasoning capabilities to reach
a conclusion?
a.
b.
c.
*d.
Database management
Geographic information systems
Web analytics
Expert system
45. An expert system is usually built for a specific application area called a(n) ____.
a.
b.
*c.
Web site
portal
domain
d.
database
46. If you were using your PDA and it was analyzing and reacting to every word you typed on the pad,
what type of system would you be using?
a.
b.
*c.
d.
Handwriting analysis
Expert system
Neural network
Knowledge management system
47. _____ is a mathematical method of handling imprecise or subjective information.
a.
*b.
c.
d.
Decision support system
Fuzzy logic
Neural network
Knowledge management system
48. _____ are a set of steps that relate variables representing inexact information or personal
perceptions.
a.
*b.
c.
d.
Heuristics
Fuzzy logic algorithms
Metaphors
Domains
49. Which type of artificial intelligent system mimics the evolutionary, survival-of-the-fittest process to
generate increasingly better solutions to a problem?
a.
*b.
c.
d.
Fuzzy logic
Genetic algorithm
Neural network
Expert system
50. A(n) ______ works on multiple distinct computer systems.
a.
autonomous agent
*b.
c.
d.
distributed agent
multi-agent system
mobile agent
51. Which of the following software agents can adapt and alter the manner in which it attempts to
achieve its assigned task?
a.
b.
c.
*d.
Mobile agent
Distributed agent
Intelligent agent
Autonomous agent
52. A(n) _____ is a software agent that can relocate itself onto different computer systems.
*a.
b.
c.
d.
mobile agent
distributed agent
intelligent agent
autonomous agent
53. What are the best known information agents?
a.
b.
c.
*d.
Personal agents
User agents
Predictive agents
Buyer agents
54. Which network device passes network traffic between smaller subnets of a larger network?
a.
b.
c.
*d.
A modem
WAP
A switch
A router
55. Which network device sends information privately over the network?
a.
*b.
c.
d.
Hub
Switch
Router
Virtual connector
56. Which of the following is true of home networks and network components?
a.
b.
*c.
d.
They do not require a switch.
They require at least two routers.
They have both a router and a switch.
They require a router only if they are wireless.
57. Computers and routers refer to each other using ____.
a.
b.
c.
*d.
VPN
router IDs
network sites
IP addresses
58. Which of the following terms refers to the capacity of a communications medium to transfer
information in a given amount of time?
*a.
b.
c.
d.
Bandwidth
Transmission size
Routing capacity
Communication speed
59. _____ is a formal business plan that maps out your customer base and your strategy for reaching
them.
a.
b.
c.
*d.
E-plan
Feasibility plan
Customer strategy and outreach plan (CSOP)
Path-to-profitability (P2P)
60. Which type of e-commerce occurs when a business sells products and services to a government
entity?
a.
*b.
c.
d.
B2C
B2G
G2B
B2B
61. _____ occurs when an individual sells products and services to a government entity.
a.
b.
*c.
d.
G2B e-commerce
B2G e-commerce
C2G e-commerce
G2C e-commerce
62. What term depicts a virtual marketplace in which all businesses buy from and sell products and
services to each other, and share information?
a.
b.
c.
* d.
Virtual Markets (VM)
E-Markets (EM)
Open-source Market
B2B e-marketplace
63. Which of the following types of products purchased on the Internet are typically high priced items
because they are purchased infrequently and often require some sort of customization?
a.
b.
*c.
d.
Convenience
Commoditylike
Specialty
Digital
64. Which of the following is true of commodity-like business environments?
a.
They are similar to specialty items.
b.
c.
*d.
The buyer power is low.
They have high barriers to entry.
They have low barriers to entry.
65. Which of the following types of products purchased on the Internet are typically priced low because
they are used more frequently?
a.
*b.
c.
d.
Speciality
Convenience
Niche
Luxury
66. What is a "sticky" Web site?
a.
b.
*c.
d.
A Web site that gains popularity through e-channels.
A Web site that is accessed frequently because it is able to reroute potential consumers from
other sites to it.
A Web site that attracts consumers and encourages them to return.
A Web site that is located by pop-up and pop-under ads.
67. What type of Internet-based company makes it easy for one person to pay another person or
organization over the Internet?
*a.
b.
c.
d.
Financial cybermediary
Electronic bill and payment business
E-provider
I-banks
68. What mechanism is used for sending money from your checking or savings account to another
person or organization?
a.
b.
*c.
d.
Cyber money
Cybermediary
Electronic check
E-Payment
69. _____ is a credit-card like device that contains an embedded chip on which digital information can
be stored and updated?
*a.
b.
c.
d.
Smart card
E-credit card
E-Information
Intelligent spending card (ISC)
70. What is the difference between a smart card and a digital wallet?
a.
b.
*c.
d.
A smart card is stored on the seller's computer; a digital wallet is stored on the client's
computer.
A smart card contains both software and information; a digital wallet contains only information.
A smart card is a physical device; a digital wallet is both software and information.
A digital wallet contains a smart card; a smart card is part of the digital wallet along with other
personal consumer information.
71. Which of the following systems development techniques requires IT specialists that are in-house to
develop information systems?
a.
*b.
c.
d.
Outsourcing
Insourcing
In-house specialization
Selfsourcing
72. If you were developing marketing strategies and you decided to create a database that tracked the
progress of your marketing efforts, what kind of development would you be engaging in?
a.
b.
*c.
d.
Outsourcing
Netsourcing
Selfsourcing
Insourcing
73. The systems development life cycle (SDLC) is:
a.
*b.
c.
d.
a method for testing new IT applications.
a structured approach for developing information systems.
the analysis and assessment tasks that need to be completed when designing and developing
information systems.
a set of guidelines that an end user follows when developing their own business applications.
74. The waterfall methodology is:
*a.
b.
c.
d.
a sequential, activity-based process in which one phase of the SDLC is followed by another.
an assessment methodology that ensures quality applications.
an outsource development methodology to information systems.
a process management technique that identifies and includes end users and management in the
SDLC.
75.
Which of the following is a characteristic of a proposed system that is essential to the success of
your organization?
a.
b.
*c.
d.
Quality and essence metric
Vital requirement
Critical success factor
Essential design feature
76. _____ is the development and support of IT systems by knowledge workers with little or no help
from IT specialists.
*a.
b.
c.
d.
End-user involvement
Outsourcing
Insourcing
Requirements definition
77. What group of people knows little about IT but a lot about their own domain?
a.
b.
*c.
d.
Domain experts
Project managers
End users
Field professionals
78. Which of the following is not an advantage of selfsourcing?
a.
*b.
c.
d.
It increases the speed of systems development.
It analyses the various design alternatives which lead to subpar IT systems.
It increases end user participation and sense of ownership.
It improves requirements determination.
79. What type of selfsourcing development tool is paramount to the success of the proposed software?
*a.
b.
c.
d.
Easy to use development tools
Evolutionary prototyping tools
Extreme programming (XP) tools
Video editing tools
80. Which of the following is a potential risk of selfsourcing?
a.
*b.
c.
d.
Reduced technological know-how for future innovation.
Lack of documentation and external support leads to short-lived systems.
Reduced degree of control.
Increased dependency on outside organizations.
81. Which of the following is an advantage of prototyping?
a.
b.
c.
*d.
Encourages active user participation
Helps resolve discrepancies among end users
Gives users a feel for the final system
All of the above
82. What is the fourth and last step in the prototyping process?
a.
b.
c.
Identify basic requirements
Develop initial prototype
Users reviewing
*d.
Revise and enhance the prototype
83. Which of the following is a disadvantage to prototyping?
a.
* b.
c.
d.
Prototyping does not encourage active user participation.
Prototyping does not give an indication of performance under operational conditions.
Prototyping does not help determine technical feasibility.
Prototyping does not help resolve discrepancies among users.
84. According to the Outsourcing Research Council, which business function is the top outsourcing area
for many contemporary companies?
a.
b.
*c.
d.
IT
Accounting
Human Resources
Finance
85. Which SDLC phase is performed with both internal software development and outsourcing?
a.
b.
c.
*d.
Design
Development
Maintenance
Analysis
86. If you were constructing a legal document for your software vendor that stipulated needed
requirements, schedules, costs, acceptance criteria, and assessment metrics, what would you be
creating?
*a.
b.
c.
d.
Service level agreement
Critical milestones
Critical success factors
Request for proposal
87. If your U.S.-based company were to hire a vendor located in New York City, you would be using
_____ outsourcing.
a.
b.
*c.
d.
nearshore
domestic
onshore
interior
88. What is the trend called when a U.S. company outsources IT functions to other countries that are
geographically far away?
a.
*b.
c.
d.
Foreign outsourcing
Offshore outsourcing
External outsourcing
Outer outsourcing
89. Which of the following is true of service-oriented architecture (SOA)?
a.
b.
*c.
d.
It is a perspective that focuses on acquiring brand new systems.
It builds applications from non-reusable blocks of code.
It focuses on the development, use, and reuse of services.
It defines the source code for application programming interfaces.
90. Which of the following is true of an organization with a service-oriented architecture philosophy?
a.
b.
c.
*d.
Ensures that HR initiatives remain constant regardless of changes in the workforce
Takes a prolonged amount of time to implement well thought-out decisions
Maintains static work processes and structures
Adapts quickly to new advances in technology
91. Genesis Technologies has adopted an SOA approach to systems development. A new "disruptive"
technology, Senstor, has recently been launched in the market which promises to provide significant
benefits to software companies that focus on collaborative process. In such a scenario, how is Genesis
Technologies most likely to react?
a.
b.
It will delay the decision making process with regard to the adoption of the new technology.
It will continue to use its existing systems instead of trying out the new technology.
*c.
d.
It will use its resources efficiently to adapt itself to the new technology.
It will maintain static processes and technologies which have proven to be beneficial in the past.
92. In terms of software development, which of the following would most likely be the focus of a
company with a service-oriented architecture philosophy?
*a.
b.
c.
d.
New deployments like Web 2.0
Integration of different technology platforms
Standard information formats
Safe and secure telecommunications platforms
93. Which of the following is true about the end user of IT, according to an SOA philosophy?
*a.
b.
c.
d.
The end user should be thought of in the same way as an external customer.
The end user's needs should be considered secondary to customers' needs.
The end user's access to data should be limited to a specific geographic area due to security
reasons.
Multi-channel service delivery should be available exclusively to end users and not customers.
94. Which of the following is a Web 2.0 application?
a.
*b.
c.
d.
PowerPoint
Mashups
Intranet
Extranet
95. Which of the following is a requirement of an SOA approach?
a.
*b.
c.
d.
Information should be maintained in multiple formats.
Strict and rigorous integrity controls should be in place.
Data from different sources should not be coupled together.
Duplicate information should be maintained for security reasons.
96. GenTech, a software company, is situated in Tokyo, Japan. Given that the country is prone to several
earthquakes, GenTech is keen to build a back-up plan which will guide the company on how to recover
should disaster strike. Which of the following will help the company in this regard?
a.
*b.
c.
d.
Enterprise resource plan
Business continuity plan
Operational plan
Annual growth plan
97. Morrison and Sons, a financial firm, is developing a business continuity plan. The firm has already
compiled a list of the various potential threats to the organization and its assets and is now in the
process of identifying the impact each these threats would have on the business's operations, should
they come to fruition. The company is in which phase of business continuity planning?
a.
*b.
c.
d.
Maintenance
Analysis
Design
Implementation
98. The management at Solitaire Inc. is building a business continuity plan and has identified its core,
critical, and noncritical IT applications. Each of these applications have been categorized on the basis of
their estimated recovery costs and the affect the loss of these applications will have on the firm's
business The company is in which phase of business continuity planning?
a.
b.
*c.
d.
Testing
Design
Analysis
Implementation
99. Which of the following refers to an area available to a company that rents space and
telecommunications equipment from another company?
*a.
b.
c.
d.
Collocation facility
Hot site
Virtual environment
Cold site
100. The _____ phase of the business continuity plan involves using the requirement recovery
document to develop a formal, technical, and detailed plan for recovering from a disaster.
a.
b.
c.
*d.
analysis
testing
maintenance
design
101. Which of the following is an example of the unethical use of computers?
a.
*b.
c.
d.
Employees failing to answer a large number of e-mail messages due to network problems.
Employees searching organizational databases for information on celebrities and friends.
Employees sending messages without spell checking and proofreading them.
Employees updating their passwords at the end of every month.
102. Which of the following is true of an ethical dilemma?
a.
*b.
c.
d.
It is faced exclusively by unethical, immoral people.
It occurs when one's responsibilities seem to lead in opposite directions.
It is the choice of whether or not to act ethically.
It involves choosing between compatible good outcomes.
103. ____ can be defined as the principles and standards that guide our behavior toward other people.
*a.
b.
c.
d.
Ethics
Models
Eugenics
Aesthetics
104. Which of the following is true of ethics and ethical people?
a.
b.
c.
Ethical people do not face ethical dilemmas since they know the difference between right and
wrong.
Ethical people's values are free from the influence of their history, culture, and religion.
Ethical norms change radically because of society's dynamic nature.
*d.
Acting ethically means behaving in a principled fashion and treating others with dignity.
105. David works as process supervisor at an industrial plant. In his company, he is known by all his
colleagues and superiors as an honest worker whose decisions are always guided by ethical values.
Recently, David came to know that due to the irresponsible disposal of company waste, the local
groundwater has been contaminated. Because of this, a large number of people living in close proximity
to the plant have been suffering from severe ailments. However, in spite of knowing this, David does not
take any action. Which of the following, if true, most likely explains David's decision not to act?
a.
b.
*c.
d.
David's decision was guided by morality and ethical values.
David considered the impact of toxins on the environment while making the decision.
David's decision was influenced by the dilemma of losing his job at the plant.
David made the decision by considering the well-being of the people living in close proximity to
the plant.
106. _____ are types of hackers who break into other people's computer systems and may just look
around. They may steal credit card numbers or destroy information, or otherwise do damage.
a.
b.
*c.
d.
Zombies
White-hat hackers
Black-hat hackers
Drones
107. _____ have philosophical and political reasons for breaking into systems and often deface Web
sites as a sign of protest.
a.
b.
*c.
d.
Zombies
White-hat hackers
Hacktivists
Screenagers
108. A(n) ______ is hardware and/or software that protects a computer or a network from intruders.
a.
b.
*c.
Web log
worm
firewall
d.
public key
109. _____ refers to the use of physiological characteristics such as fingerprints, the blood vessels in the
iris of the eye, and the sound of one's voice to provide identification.
a.
*b.
c.
d.
Pharming
Biometrics
Intellectual property
Whaling
110. _____ is a way of protecting messages and files by scrambling the contents of a file so that one
cannot read it without having the right key.
*a.
b.
c.
d.
Encryption
Feature creep
Biometrics
Encapsulation
111. Which of the following is true of personal software-as-a-service (personal SaaS)?
a.
b.
*c.
d.
It involves the purchase of high quality, productivity software.
It is cost effective because it provides discounted rates on personal productivity software.
It involves paying for personal productivity software on a pay-per-use basis.
It ensures high levels of security as all data is stored directly on a user's personal computer.
112. Which of the following is a drawback of personal software-as-a-service (personal SaaS)?
a.
*b.
c.
d.
It provides customers with limited options for purchasing different types of software.
It does not ensure high levels of privacy as data is maintained on a Web-based server.
It is an expensive proposition for most customers as software licenses involve high costs.
It hosts the software and related data offline and hence, cannot be accessed online.
113. Which of the following is a delivery model that enables a person to rent productivity software such
as Microsoft Office?
a.
b.
*c.
d.
F2b2C
Push technology
Personal SaaS
VoIP
114. Johanna works for a child rights organization and is required to travel during the first quarter of the
year to different underdeveloped countries. Her role is to visit the different country offices to help
define project goals, brainstorm fundraising ideas, and realize the scope of projects at the onset of
campaigns. For these sessions, she uses a mind mapping software. She prefers to rent the software prior
to her travel instead of purchasing it, since she needs it only for a few months of the year. Which of the
following is most likely being used by Johanna?
*a.
b.
c.
d.
Personal SaaS
F2b2C
Push technology
VoIP
115. Which of the following is an advantage of personal software-as-a-service (personal SaaS)?
*a.
b.
c.
d.
It represents a cost effective solution for most users.
It offers customers a wide range of options to purchase software.
It ensures high levels of information security by storing data on users' personal computers.
It guarantees reliability as the risk of network outages is minimal.
116. Which of the following refers to a technology with a three-dimensional computer simulation in
which a person actively and physically participates?
a.
*b.
c.
d.
Wireless fidelity
Virtual reality
Augmented reality
Agile methodology
117. _____ is the use of physiological characteristics—such as your fingerprint, the blood vessels in the
iris of your eye, the sound of your voice, and even your breath—to provide identification.
*a.
b.
Biometrics
Bluetooth
c.
d.
Feature analysis
Holographics
118. Which of the following can perform a variety of physiological functions when inserted into the
human body?
*a.
b.
c.
d.
RFID chip
Rootkit
Biochip
Implant chip
119. Melissa and her friend, Erica, go on a hike to get away from the hustle bustle of city life. During the
hike, Melissa takes several photographs with her cell phone camera and she uses a certain technology to
transfer them to Erica. However, when she tries sending them to her friends who lives in the next city,
she is unable to transfer the photographs. Which of the following technologies is Melissa using?
a.
b.
*c.
d.
Wiki
WiFi
Bluetooth
NFC
120. Which of the following is a standard for transmitting information in the form of short-range radio
waves over distances of up to 30 feet?
*a.
b.
c.
d.
Bluetooth
WiFi
NFC
Broadband
121. Which of the following is the domain name in the URL, http:// www.usatoday.com?
a.
*b.
c.
d.
www
usatoday
http
com
122. Which of the following helps you find Web sites with the information you want?
a.
b.
c.
*d.
Domain
Cookie
Wiki
Search engine
123. Which of the following systems uses information about customers to gain insights into their needs,
wants, and behaviors in order to serve them better?
a.
b.
c.
*d.
SCM
TPS
ERP
CRM
124. Which of the following is a fundamental goal of CRM systems?
a.
b.
*c.
d.
To produce and deliver a product or service at the time the customer wants it.
To lower the costs of maintaining inventory systems.
To manage and track customer interactions.
To continuously improve the quality of products and processes.
Essay Questions
1. What are ethics and how do ethics apply to business?
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Student will explain that ethics are the principles and standards that guide our
behavior toward other people. Ethics are indispensable to anyone who wants to have a good career.
Business involves commercial interaction between people and so, naturally, how people treat each
other is important in business
Example: Ethics are the principles and standards that guide human behavior. Without ethics it is
unlikely that anyone will be successful in business.
2. What is a denial of service attack? What can be done to protect against a denial of service attack?
(Ch. 8)
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Student defines denial-of-service (DoS) attack floods a network or server with so
many requests for service that it slows down or crashes and provides an example. Example: A denial
of service attack is when a network or server keeps getting hit with requests or it eventually slows
down or stops working. The first line of defense in protecting against DoS attacks is to have a plan in
place already—if you have to create one on the fly you are more than likely going to have your
website brought to your knees. One of the first things the plan should include is to investigate the
characteristics of where the attack is coming from rather than focusing on the impact. If you can
figure out where its coming from its much easier to lock down the system and block against future
attacks.
3. How can a service-oriented architecture (SoA) be used to guide the organization of the future?
Give an example (ch. 7).
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Student should provide a definition of what SoA is and how it can be used to
guide an organization. An example must also be provided. Example: A service-oriented architecture
(SoA) can guide the organization of the future by enabling it to respond more adeptly to customers,
end users, software development, information needs, and hardware requirements. An example of
an SOA is WSDL (Web service definition language). This allows organizations that might store and
send information in a different way to use a WSDL to share that information.
4. Why is interoperability important? Provide an example.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Student should describe what interoperability is and why it is important. They
also need to include an example. (ch. 7)
Example: Interoperability provides the capability for two or more computing components to share
information and other resources, even if they are made by different manufacturers. For example,
cell phones are interoperable. It doesn’t matter what kind of phone it is (iPhone, Android etc) and
what service provider it is, (ATT, Verizon etc), every phone works with every other phone over any
type of network.
5. How do the four implementation methods differ?
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Student should explain all four implementation types: parallel, plunge, pilot and
phrased.
Example: Parallel implementation uses both the old and new systems until the new system is
verified. Plunge implementation immediately ceases using the old system and begins using the new
system. Pilot implementation converts only a group of users until the new system is verified. Phased
implementation converts only a portion of the system until it can be verified.
6. What are the four decision types you make on a project? Give an example of each.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Student points out all four types of decisions: ad hoc (aka: non recurring),
merger, recurring, and non-structured. Student should also provide an example of each.
Example: Nonrecurring, or ad hoc, decision is one that you make infrequently (perhaps only once)
and you may even have different criteria for determining the best solution each time. A merger with
another company is an example. Recurring decisions are decisions that you have to make repeatedly
and often periodically, whether weekly, monthly, quarterly, or yearly. An example would be which
route to take to go to work. Non-structured decision is a decision for which there may be several
“right” answers and there is no precise way to get a right answer. An example would be whether to
change a company’s strategy. Structured decision is a decision where processing a certain kind of
information in a specified way so that you will always get the right answer. An example would be
deciding how much to pay employees.
7. What is business intelligence? Why it is more than just information? (ch. 3)
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Student should explain that business intelligence is more than just information
– it’s about knowledge and using that information to make predictions and business decisions.
Example: Business intelligence is knowledge – knowledge about your customers, your competitors,
your partners, your competitive environment, and your own internal operations. It is more than just
information because it combines various types of information to allow you to make better decisions
and operate more productively.
8. Why is the traditional buy-hold-sell inventory model an expensive and potentially risky one?
(ch. 2)
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Students should explain that a traditional inventory model includes creating an
inventory without knowing the demand, keeping a lot of inventory in case you need it, and you sell
off whatever is left over or obsolete at a discounted price.
Example: The traditional inventory model requires that (1) you create inventory without a known
demand, (2) you keep a lot of inventory throughout the supply chain, and (3) you sell off obsolete
inventory at a very low price.
9. What is an enterprise resource planning (ERP) system? Give an example. (ch. 1)
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Student describes what an ERP system is and provides an example.
Example: An ERP system is a collection of integrated software for business management,
accounting, finance, HR, project and inventory management, supply chain, customer relationship
management, e-collaboration, etc. The integrated software allows an enterprise to manage the
varying aspects of its business. For example, a trucking company may have a CRM to keep track of
its clients, an inventory program to keep track of its fleet etc.
10. What are the three generic strategies according to Michael Porter? Give an example of each.
(ch. 1)
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
*Instructor Response
Meets expectation: Student should outline each of the three generic strategies (overall cost of
leadership, differentiation and focus) and provide an example of each.
Example: The three generic strategies according to Michael Porter are: overall cost leadership,
differentiation, and focus. Is the clearest of the three generic strategies. Is when a firm is set out to
be the lowest-cost producer in its industry. According to Porter the sources of cost advantage are
varied and depend on the structure of the industry. Cost leadership is when a company sets out to
be the lowest-cost producer within a particular industry. A differentiation strategy is where a
company seeks to be unique in a particular industry. CSU Global for example seeks to be the highest
quality online provider by providing outstanding customer service. Focus is when a company focuses
on a very small specific segment of the market.
Download