CBE Test MIS300 Information Systems Design and Management Choose 80 of 120 questions MO# Module Outcome Question # MIS300MO1-1 Compare and contrast how people, information, and information technology combine to create management of information systems within a specific industry. Analyze each component of Porter’s Five Forces Model as they relate to competition within a specific industry. Compare and contrast strategies and frameworks as approaches to development of business strategies for a specific industry. Design a break-even analysis to assess the financial impact of information technology in a given scenario. 9, 10, 11, 12 Examine the impact of social media on technology and business culture within a specific organization or industry. Examine supply chain management systems and discuss their use and effectiveness within a specific organization or industry. Examine enterprise resource planning systems and discuss their use and effectiveness within a specific organization or industry. Examine customer relationship management systems and discuss their use and effectiveness within a specific organization or industry. Describe the various components and features of the Internet, including browsers, web sites, domain names, Web 2.0, social networking, RSS feeds, telecommunication software and hardware, and Internet Service Providers. 18, 19, 20 Differentiate between a relational database, a database management system, and a data warehouse, describing the components and uses of each. Examine the role of business intelligence and data within an organization or industry. Describe the components of a relational database, including entity class, instance, primary key, foreign key, types of relationships, and database normalization. Compare and contrast data-mining tools in a data warehouse environment. 30, 31, 32, 33, 34, 35 Analyze the decision support role of specialized analytics 41, 42, essay 6 MIS300MO1-2 MIS300MO1-3 MIS300MO1-4 MIS300MO2-1 MIS300MO2-2 MIS300MO2-3 MIS300MO2-4 MIS300MO2-5 MIS300MO3-1 MIS300MO3-2 MIS300MO3-3 MIS300MO3-4 MIS300MO4-1 1, 2, 3, 4, essay 10 13, 14, essay 9 5, 6, 7, 8 15, 16, 17, essay 8 21, 22, 23, 24, 25 123, 124 121, 122 38, 39, 40, essay 7 26, 27, 28, 29 36, 37 like predictive and text analytics. MIS300MO4-2 Examine decision support systems, geographic information systems, and expert systems. Define neural networks, fuzzy logic, and genetic algorithms. 43, 44, 45, 46, essay 5 47, 48, 49 MIS300MO4-4 Describe data-mining agents and multi-agent systems as subsets of intelligent agents and agent-based technologies. 50, 51, 52, 53 MIS300MO5-1 Describe the nine major e-commerce business models. 59, 60, 61, 62 MIS300MO5-2 Compare the development of an e-commerce marketing mix for customers in both the B2B and B2C business models. Discuss three major trends impacting e-commerce and society in general. Describe the principles of networking, including LANs, WANs, MANs, types of communication media, security, clients, servers, Internet connections, and peer-to-peer networking. 63, 64, 65, 66 Discuss the seven major phases of the systems development life cycle (SDLC) as they relate to a given organization. Compare and contrast the systems development life cycle and the self-sourcing process. Describe various component-based development methodologies. Describe the process of outsourcing. 71, 72, 73, 74, 75 MIS300MO7-1 Describe the concept of a service-oriented architecture as it relates to IT needs. MIS300MO7-2 Compare common metrics used in assessing IT systems and initiatives. Examine all of the phases of business continuity planning as they relate to a specific organization or industry. 89, 90, 91, 92, 93, 94, 95, essay 3 96, 97 MIS300MO4-3 MIS300MO5-3 MIS300MO5-4 MIS300MO6-1 MIS300MO6-2 MIS300MO6-3 MIS300MO6-4 MIS300MO7-3 MIS300MO8-1 Define ethics, intellectual property, copyright, Fair Use Doctrine, and software piracy. MIS300MO8-2 Discuss three ways to protect information on a computer or network from security vulnerabilities. MIS300MO8-3 Describe the emerging trends in wireless technology, including Bluetooth, WiFi, cell phones, and RFID. Describe three emerging technologies that will impact the MIS300MO8-4 67, 68, 69, 70 54, 55, 56, 57, 58 76, 77, 78, 79, 80 81, 82, 83 84, 85, 86, 87, 88 98, 99, 100, essay 4 101, 102, 103, 104, 105, essay 1 106, 107, 108, 109, 110, essay 2 116, 117, 118, 119, 120 111, 112, 113, future. 114, 115 1. Under the RGT framework, which of the following strategies innovates business processes and/or products and services in a completely new way, moving into seemingly different markets? a. b. *c. d. Transcend Run Transform Grow 2. Your business had two strategic initiatives this year. One initiative focused on improving customer satisfaction. The second focused on providing customers with their purchase history from any Internet site in the world. If you were to allocate 15% of your IT budget to the first initiative and 25% to the second initiative, what type of strategy are you applying? a. b. c. *d. Tactical information planning (TIP) Strategic technology planning (STP) Transforming IS strategy (TISS) Run-grow-transform (RGT) framework 3. Carrio Arrento, a car rental company, operates in two cities and offers low-rental cars specifically to college students from these areas. This is an example of a(n) _______. a. *b. c. d. overall cost leadership strategy focus strategy loyalty program entry barrier 4. _____ is defined by Porter as offering the same or better quality product or service at a price that is less than what any of the competition is able to do. *a. b. c. d. Overall cost leadership Price differentiation Product differentiation Focus 5. Doodle Corp. wants to increase customer loyalty toward its currently one-of-a-kind software, Bonkers EP. It does so by offering additional services like automatic updates and free upgrades. Which of the following forces in Porter's model is Doodle Corp. addressing in this situation? a. *b. c. d. Threat of substitute products or services Threat of new entrants Buyer power Supplier power 6. Which of the following has the highest threat of substitution? a. b. c. *d. A Patek Philippe watch A YSL perfume Bentley Continental GT Lifebuoy soap 7. To minimize the threat of substitute products or services, some businesses will create switching costs. What are switching costs? a. b. c. *d. The start-up costs incurred when replacing old technology with new The costs incurred due to the inability to switch back to your first brand after moving to an alternative brand A non-refundable fine levied against the customer for switching to a competitor The costs that make customers reluctant to another project or service supplier 9. Switching costs are costs that make customers reluctant to switch to another product or service supplier. What you need to realize is that a switching cost does not necessarily have to be an actual monetary cost. Which of the following includes drivers for your printer and scanner and utility software? a. b. *c. d. Payroll software Collaborative software System software Application software 10. Which of the following is a telecommunication device? a. b. *c. d. Port Cord Satellite Bar code scanner 11. Which of the following is true of ethics? a. b. *c. d. Ethics and laws are the same. Laws and ethics clearly require or prohibit an action. Ethics are more subjective than laws. Laws are more a matter of personal or cultural interpretation, unlike ethics. 12. A technology-literate knowledge worker: a. b. *c. d. is a computer savvy worker knows all computer programming languages knows how and when to apply technology is knowledgeable about emerging technology 13. Which of the following auto manufacturers use an overall cost leadership strategy? a. * b. c. d. Mercedes Benz Hyundai Rolls-Royce Aston Martin 14. Companies like Amazon and eBay that only have a presence in the virtual world have significantly lower fixed costs in terms of retail space than companies that have to pay for retail space, like retail stores you would find in a mall. This technological concept is known as: a. b. c. *d. VoIP. telecommuting. cloud computing. digital storefronts. 15. _____ is the use of a mobile device and its location to check into locations such as businesses and entertainment venues, find friends and their locations, and receive rewards and take advantage of "specials" based on location. a. *b. c. d. MMORPG Social locationing Mobile locationing Social gaming 16. Which of the following is a popular MMORPG? a. b. c. *d. YouTube Google+ Groupon World of Warcraft 17. The Web 2.0: *a. b. c. d. is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services. is a computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol. is a reference that points to a whole document or to a specific element within a document. is a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange. 18. Which of the following ERP software is most suitable for Forca, an aircraft manufacturer with more than 20000 employees? a. b. *c. d. SYSPRO SAP Business One Oracle ERP Sage MAS 90 ERP 19. Which of the following ERP software is most suitable for Exacto, a precision instrument manufacturer with 400 seats? *a. b. c. d. Infor ERP Solution Microsoft Dynamics AX SAP Business One Intuit QuickBooks Enterprise 20. The early stage of ERP was carried out in the 1970s through a system called ____. a. b. * c. d. Customer Relationship Management (CRM) Database Management System (DBMS) Materials Requirement Planning (MRP) Decision Support System (DSS) 21. Which of the following provides you with a multimedia-based collection of information, services, and Web sites? a. b. c. * d. FTP server Wiki Internet World Wide Web 22. KeepFit is a manufacturer of sports merchandise. You can visit a specific location on the Web and order merchandise from KeepFit. This specific location is KeepFit's ____. a. b. *c. d. Web application Web server Web site TLD 23. Which of the following identifies a domain name? a. * b. c. d. A specific location on the Web where you visit, gather information, and perhaps even order products A specific computer on the Web along with the main page of its Web site An Internet service provider The organization that sponsors and manages a Web site for its members 24. Margaret Sullivan is a TLD expert and a domain name consultant. Which of the following domains is she likely to suggest to her clients who want to start Internet companies? Refer: Figure B.3 a. *b. c. d. .aero .net .pro .edu 25. The _____ is a nonprofit organization charged with numerous Internet-related responsibilities, one of which is the oversight of top-level domains. *a. b. c. d. ICANN ITU TLD URL 26. Which of the following would be a good primary key for the entity class of students? a. b. *c. d. Course ID Student Course name Student ID Institute ID 27. What is an instance? a. b. c. *d. It is a key that uniquely identifies a person, place, or thing. It is a group of related information about an entity. It is a record or row in a relation. It is an occurrence of an entity class that can be identified by a primary key. 28. A supplier is an example of a(n) ____. a. * b. c. d. relational database entity class foreign key Business rule 29. An organization wishes to store information about its employees in a database. The employees, in this case, constitute a(n) ____. a. b. *c. d. foreign key primary key entity class data dictionary 30. A data warehouse is: a. *b. c. d. a large hardware environment that supports multiple platforms. a logical collection of information used to create business intelligence. an operational database system used to manage and analyze transactional data. an accumulation of all operational data stored by large organizations. 31. What does it mean for a data warehouse to be multidimensional? a. b. *c. d. The database stores data, facts, and definitions for all stored information. Data can be linked to other sources of internal and external information. The files stored in a warehouse contain several layers of columns and rows. Customer information can be related to sales, departmental, and organizational information. 32. Which of the following data administration facilities continually maintain statistics concerning how the DBMS engine physically accesses information? a. b. *c. d. Security management facilities Query optimization facilities Reorganization facilities Concurrency control facilities 33. _____ ensure the validity of database updates when multiple users attempt to access and change the same information. a. b. c. *d. Backup and recovery facilities Query optimization facilities Change management facilities Concurrency control facilities 34. Which of the following DBMS components allows you to add, change, and delete information in a relational database? a. *b. c. d. Data definition subsystem Data manipulation subsystem Data administration subsystem Application generation subsystem 35. What must you define before adding any information to a relational database? a. b. c. *d. The intended audience The physical hardware structure The administrative rights of users The logical structure of the database 36. What type of software tool is used to query information stored in a data warehouse? a. b. *c. d. OLTP Data dictionary Data-mining Decision support 37. Data warehouses exist to support: a. *b. c. d. MRP. OLAP. OLTP. SQL. 38. _____ include(s) tools such as neural networks and fuzzy logic to form the basis of "information discovery." a. b. *c. d. Digital dashboards Multidimensional analysis tools Artificial intelligence Query-and-reporting tools 39. In a data warehouse, which data-mining tool would you use to quickly build reports without having to write programming code? a. b. c. *d. Application report generator Artificial intelligence Multidimensional analysis tools Query-and-reporting tools 40. A data warehouse is: a. *b. c. d. a large hardware environment that supports multiple platforms. a logical collection of information used to create business intelligence. an operational database system used to manage and analyze transactional data. an accumulation of all operational data stored by large organizations. 41. Which of the following data-mining technologies uses historical information to predict future events and outcomes? a. b. c. *d. Artificial intelligence Digital dashboards Multidimensional analysis tools Predictive analytics 42. _____ is a process of using statistical, artificial intelligence, and linguistic techniques to convert information content in surveys, e-mails, blogs, and social media into structured information. a. *b. c. d. Web analytics Text analytics Endless analytics Predictive analytics 43. Which of the following artificial intelligence systems is capable of finding and differentiating patterns? *a. b. c. d. Neural networks Expert systems Geographic information systems Decision support systems 44. Which of the following is an artificial intelligence system that applies reasoning capabilities to reach a conclusion? a. b. c. *d. Database management Geographic information systems Web analytics Expert system 45. An expert system is usually built for a specific application area called a(n) ____. a. b. *c. Web site portal domain d. database 46. If you were using your PDA and it was analyzing and reacting to every word you typed on the pad, what type of system would you be using? a. b. *c. d. Handwriting analysis Expert system Neural network Knowledge management system 47. _____ is a mathematical method of handling imprecise or subjective information. a. *b. c. d. Decision support system Fuzzy logic Neural network Knowledge management system 48. _____ are a set of steps that relate variables representing inexact information or personal perceptions. a. *b. c. d. Heuristics Fuzzy logic algorithms Metaphors Domains 49. Which type of artificial intelligent system mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem? a. *b. c. d. Fuzzy logic Genetic algorithm Neural network Expert system 50. A(n) ______ works on multiple distinct computer systems. a. autonomous agent *b. c. d. distributed agent multi-agent system mobile agent 51. Which of the following software agents can adapt and alter the manner in which it attempts to achieve its assigned task? a. b. c. *d. Mobile agent Distributed agent Intelligent agent Autonomous agent 52. A(n) _____ is a software agent that can relocate itself onto different computer systems. *a. b. c. d. mobile agent distributed agent intelligent agent autonomous agent 53. What are the best known information agents? a. b. c. *d. Personal agents User agents Predictive agents Buyer agents 54. Which network device passes network traffic between smaller subnets of a larger network? a. b. c. *d. A modem WAP A switch A router 55. Which network device sends information privately over the network? a. *b. c. d. Hub Switch Router Virtual connector 56. Which of the following is true of home networks and network components? a. b. *c. d. They do not require a switch. They require at least two routers. They have both a router and a switch. They require a router only if they are wireless. 57. Computers and routers refer to each other using ____. a. b. c. *d. VPN router IDs network sites IP addresses 58. Which of the following terms refers to the capacity of a communications medium to transfer information in a given amount of time? *a. b. c. d. Bandwidth Transmission size Routing capacity Communication speed 59. _____ is a formal business plan that maps out your customer base and your strategy for reaching them. a. b. c. *d. E-plan Feasibility plan Customer strategy and outreach plan (CSOP) Path-to-profitability (P2P) 60. Which type of e-commerce occurs when a business sells products and services to a government entity? a. *b. c. d. B2C B2G G2B B2B 61. _____ occurs when an individual sells products and services to a government entity. a. b. *c. d. G2B e-commerce B2G e-commerce C2G e-commerce G2C e-commerce 62. What term depicts a virtual marketplace in which all businesses buy from and sell products and services to each other, and share information? a. b. c. * d. Virtual Markets (VM) E-Markets (EM) Open-source Market B2B e-marketplace 63. Which of the following types of products purchased on the Internet are typically high priced items because they are purchased infrequently and often require some sort of customization? a. b. *c. d. Convenience Commoditylike Specialty Digital 64. Which of the following is true of commodity-like business environments? a. They are similar to specialty items. b. c. *d. The buyer power is low. They have high barriers to entry. They have low barriers to entry. 65. Which of the following types of products purchased on the Internet are typically priced low because they are used more frequently? a. *b. c. d. Speciality Convenience Niche Luxury 66. What is a "sticky" Web site? a. b. *c. d. A Web site that gains popularity through e-channels. A Web site that is accessed frequently because it is able to reroute potential consumers from other sites to it. A Web site that attracts consumers and encourages them to return. A Web site that is located by pop-up and pop-under ads. 67. What type of Internet-based company makes it easy for one person to pay another person or organization over the Internet? *a. b. c. d. Financial cybermediary Electronic bill and payment business E-provider I-banks 68. What mechanism is used for sending money from your checking or savings account to another person or organization? a. b. *c. d. Cyber money Cybermediary Electronic check E-Payment 69. _____ is a credit-card like device that contains an embedded chip on which digital information can be stored and updated? *a. b. c. d. Smart card E-credit card E-Information Intelligent spending card (ISC) 70. What is the difference between a smart card and a digital wallet? a. b. *c. d. A smart card is stored on the seller's computer; a digital wallet is stored on the client's computer. A smart card contains both software and information; a digital wallet contains only information. A smart card is a physical device; a digital wallet is both software and information. A digital wallet contains a smart card; a smart card is part of the digital wallet along with other personal consumer information. 71. Which of the following systems development techniques requires IT specialists that are in-house to develop information systems? a. *b. c. d. Outsourcing Insourcing In-house specialization Selfsourcing 72. If you were developing marketing strategies and you decided to create a database that tracked the progress of your marketing efforts, what kind of development would you be engaging in? a. b. *c. d. Outsourcing Netsourcing Selfsourcing Insourcing 73. The systems development life cycle (SDLC) is: a. *b. c. d. a method for testing new IT applications. a structured approach for developing information systems. the analysis and assessment tasks that need to be completed when designing and developing information systems. a set of guidelines that an end user follows when developing their own business applications. 74. The waterfall methodology is: *a. b. c. d. a sequential, activity-based process in which one phase of the SDLC is followed by another. an assessment methodology that ensures quality applications. an outsource development methodology to information systems. a process management technique that identifies and includes end users and management in the SDLC. 75. Which of the following is a characteristic of a proposed system that is essential to the success of your organization? a. b. *c. d. Quality and essence metric Vital requirement Critical success factor Essential design feature 76. _____ is the development and support of IT systems by knowledge workers with little or no help from IT specialists. *a. b. c. d. End-user involvement Outsourcing Insourcing Requirements definition 77. What group of people knows little about IT but a lot about their own domain? a. b. *c. d. Domain experts Project managers End users Field professionals 78. Which of the following is not an advantage of selfsourcing? a. *b. c. d. It increases the speed of systems development. It analyses the various design alternatives which lead to subpar IT systems. It increases end user participation and sense of ownership. It improves requirements determination. 79. What type of selfsourcing development tool is paramount to the success of the proposed software? *a. b. c. d. Easy to use development tools Evolutionary prototyping tools Extreme programming (XP) tools Video editing tools 80. Which of the following is a potential risk of selfsourcing? a. *b. c. d. Reduced technological know-how for future innovation. Lack of documentation and external support leads to short-lived systems. Reduced degree of control. Increased dependency on outside organizations. 81. Which of the following is an advantage of prototyping? a. b. c. *d. Encourages active user participation Helps resolve discrepancies among end users Gives users a feel for the final system All of the above 82. What is the fourth and last step in the prototyping process? a. b. c. Identify basic requirements Develop initial prototype Users reviewing *d. Revise and enhance the prototype 83. Which of the following is a disadvantage to prototyping? a. * b. c. d. Prototyping does not encourage active user participation. Prototyping does not give an indication of performance under operational conditions. Prototyping does not help determine technical feasibility. Prototyping does not help resolve discrepancies among users. 84. According to the Outsourcing Research Council, which business function is the top outsourcing area for many contemporary companies? a. b. *c. d. IT Accounting Human Resources Finance 85. Which SDLC phase is performed with both internal software development and outsourcing? a. b. c. *d. Design Development Maintenance Analysis 86. If you were constructing a legal document for your software vendor that stipulated needed requirements, schedules, costs, acceptance criteria, and assessment metrics, what would you be creating? *a. b. c. d. Service level agreement Critical milestones Critical success factors Request for proposal 87. If your U.S.-based company were to hire a vendor located in New York City, you would be using _____ outsourcing. a. b. *c. d. nearshore domestic onshore interior 88. What is the trend called when a U.S. company outsources IT functions to other countries that are geographically far away? a. *b. c. d. Foreign outsourcing Offshore outsourcing External outsourcing Outer outsourcing 89. Which of the following is true of service-oriented architecture (SOA)? a. b. *c. d. It is a perspective that focuses on acquiring brand new systems. It builds applications from non-reusable blocks of code. It focuses on the development, use, and reuse of services. It defines the source code for application programming interfaces. 90. Which of the following is true of an organization with a service-oriented architecture philosophy? a. b. c. *d. Ensures that HR initiatives remain constant regardless of changes in the workforce Takes a prolonged amount of time to implement well thought-out decisions Maintains static work processes and structures Adapts quickly to new advances in technology 91. Genesis Technologies has adopted an SOA approach to systems development. A new "disruptive" technology, Senstor, has recently been launched in the market which promises to provide significant benefits to software companies that focus on collaborative process. In such a scenario, how is Genesis Technologies most likely to react? a. b. It will delay the decision making process with regard to the adoption of the new technology. It will continue to use its existing systems instead of trying out the new technology. *c. d. It will use its resources efficiently to adapt itself to the new technology. It will maintain static processes and technologies which have proven to be beneficial in the past. 92. In terms of software development, which of the following would most likely be the focus of a company with a service-oriented architecture philosophy? *a. b. c. d. New deployments like Web 2.0 Integration of different technology platforms Standard information formats Safe and secure telecommunications platforms 93. Which of the following is true about the end user of IT, according to an SOA philosophy? *a. b. c. d. The end user should be thought of in the same way as an external customer. The end user's needs should be considered secondary to customers' needs. The end user's access to data should be limited to a specific geographic area due to security reasons. Multi-channel service delivery should be available exclusively to end users and not customers. 94. Which of the following is a Web 2.0 application? a. *b. c. d. PowerPoint Mashups Intranet Extranet 95. Which of the following is a requirement of an SOA approach? a. *b. c. d. Information should be maintained in multiple formats. Strict and rigorous integrity controls should be in place. Data from different sources should not be coupled together. Duplicate information should be maintained for security reasons. 96. GenTech, a software company, is situated in Tokyo, Japan. Given that the country is prone to several earthquakes, GenTech is keen to build a back-up plan which will guide the company on how to recover should disaster strike. Which of the following will help the company in this regard? a. *b. c. d. Enterprise resource plan Business continuity plan Operational plan Annual growth plan 97. Morrison and Sons, a financial firm, is developing a business continuity plan. The firm has already compiled a list of the various potential threats to the organization and its assets and is now in the process of identifying the impact each these threats would have on the business's operations, should they come to fruition. The company is in which phase of business continuity planning? a. *b. c. d. Maintenance Analysis Design Implementation 98. The management at Solitaire Inc. is building a business continuity plan and has identified its core, critical, and noncritical IT applications. Each of these applications have been categorized on the basis of their estimated recovery costs and the affect the loss of these applications will have on the firm's business The company is in which phase of business continuity planning? a. b. *c. d. Testing Design Analysis Implementation 99. Which of the following refers to an area available to a company that rents space and telecommunications equipment from another company? *a. b. c. d. Collocation facility Hot site Virtual environment Cold site 100. The _____ phase of the business continuity plan involves using the requirement recovery document to develop a formal, technical, and detailed plan for recovering from a disaster. a. b. c. *d. analysis testing maintenance design 101. Which of the following is an example of the unethical use of computers? a. *b. c. d. Employees failing to answer a large number of e-mail messages due to network problems. Employees searching organizational databases for information on celebrities and friends. Employees sending messages without spell checking and proofreading them. Employees updating their passwords at the end of every month. 102. Which of the following is true of an ethical dilemma? a. *b. c. d. It is faced exclusively by unethical, immoral people. It occurs when one's responsibilities seem to lead in opposite directions. It is the choice of whether or not to act ethically. It involves choosing between compatible good outcomes. 103. ____ can be defined as the principles and standards that guide our behavior toward other people. *a. b. c. d. Ethics Models Eugenics Aesthetics 104. Which of the following is true of ethics and ethical people? a. b. c. Ethical people do not face ethical dilemmas since they know the difference between right and wrong. Ethical people's values are free from the influence of their history, culture, and religion. Ethical norms change radically because of society's dynamic nature. *d. Acting ethically means behaving in a principled fashion and treating others with dignity. 105. David works as process supervisor at an industrial plant. In his company, he is known by all his colleagues and superiors as an honest worker whose decisions are always guided by ethical values. Recently, David came to know that due to the irresponsible disposal of company waste, the local groundwater has been contaminated. Because of this, a large number of people living in close proximity to the plant have been suffering from severe ailments. However, in spite of knowing this, David does not take any action. Which of the following, if true, most likely explains David's decision not to act? a. b. *c. d. David's decision was guided by morality and ethical values. David considered the impact of toxins on the environment while making the decision. David's decision was influenced by the dilemma of losing his job at the plant. David made the decision by considering the well-being of the people living in close proximity to the plant. 106. _____ are types of hackers who break into other people's computer systems and may just look around. They may steal credit card numbers or destroy information, or otherwise do damage. a. b. *c. d. Zombies White-hat hackers Black-hat hackers Drones 107. _____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest. a. b. *c. d. Zombies White-hat hackers Hacktivists Screenagers 108. A(n) ______ is hardware and/or software that protects a computer or a network from intruders. a. b. *c. Web log worm firewall d. public key 109. _____ refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification. a. *b. c. d. Pharming Biometrics Intellectual property Whaling 110. _____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key. *a. b. c. d. Encryption Feature creep Biometrics Encapsulation 111. Which of the following is true of personal software-as-a-service (personal SaaS)? a. b. *c. d. It involves the purchase of high quality, productivity software. It is cost effective because it provides discounted rates on personal productivity software. It involves paying for personal productivity software on a pay-per-use basis. It ensures high levels of security as all data is stored directly on a user's personal computer. 112. Which of the following is a drawback of personal software-as-a-service (personal SaaS)? a. *b. c. d. It provides customers with limited options for purchasing different types of software. It does not ensure high levels of privacy as data is maintained on a Web-based server. It is an expensive proposition for most customers as software licenses involve high costs. It hosts the software and related data offline and hence, cannot be accessed online. 113. Which of the following is a delivery model that enables a person to rent productivity software such as Microsoft Office? a. b. *c. d. F2b2C Push technology Personal SaaS VoIP 114. Johanna works for a child rights organization and is required to travel during the first quarter of the year to different underdeveloped countries. Her role is to visit the different country offices to help define project goals, brainstorm fundraising ideas, and realize the scope of projects at the onset of campaigns. For these sessions, she uses a mind mapping software. She prefers to rent the software prior to her travel instead of purchasing it, since she needs it only for a few months of the year. Which of the following is most likely being used by Johanna? *a. b. c. d. Personal SaaS F2b2C Push technology VoIP 115. Which of the following is an advantage of personal software-as-a-service (personal SaaS)? *a. b. c. d. It represents a cost effective solution for most users. It offers customers a wide range of options to purchase software. It ensures high levels of information security by storing data on users' personal computers. It guarantees reliability as the risk of network outages is minimal. 116. Which of the following refers to a technology with a three-dimensional computer simulation in which a person actively and physically participates? a. *b. c. d. Wireless fidelity Virtual reality Augmented reality Agile methodology 117. _____ is the use of physiological characteristics—such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, and even your breath—to provide identification. *a. b. Biometrics Bluetooth c. d. Feature analysis Holographics 118. Which of the following can perform a variety of physiological functions when inserted into the human body? *a. b. c. d. RFID chip Rootkit Biochip Implant chip 119. Melissa and her friend, Erica, go on a hike to get away from the hustle bustle of city life. During the hike, Melissa takes several photographs with her cell phone camera and she uses a certain technology to transfer them to Erica. However, when she tries sending them to her friends who lives in the next city, she is unable to transfer the photographs. Which of the following technologies is Melissa using? a. b. *c. d. Wiki WiFi Bluetooth NFC 120. Which of the following is a standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet? *a. b. c. d. Bluetooth WiFi NFC Broadband 121. Which of the following is the domain name in the URL, http:// www.usatoday.com? a. *b. c. d. www usatoday http com 122. Which of the following helps you find Web sites with the information you want? a. b. c. *d. Domain Cookie Wiki Search engine 123. Which of the following systems uses information about customers to gain insights into their needs, wants, and behaviors in order to serve them better? a. b. c. *d. SCM TPS ERP CRM 124. Which of the following is a fundamental goal of CRM systems? a. b. *c. d. To produce and deliver a product or service at the time the customer wants it. To lower the costs of maintaining inventory systems. To manage and track customer interactions. To continuously improve the quality of products and processes. Essay Questions 1. What are ethics and how do ethics apply to business? __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Student will explain that ethics are the principles and standards that guide our behavior toward other people. Ethics are indispensable to anyone who wants to have a good career. Business involves commercial interaction between people and so, naturally, how people treat each other is important in business Example: Ethics are the principles and standards that guide human behavior. Without ethics it is unlikely that anyone will be successful in business. 2. What is a denial of service attack? What can be done to protect against a denial of service attack? (Ch. 8) __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Student defines denial-of-service (DoS) attack floods a network or server with so many requests for service that it slows down or crashes and provides an example. Example: A denial of service attack is when a network or server keeps getting hit with requests or it eventually slows down or stops working. The first line of defense in protecting against DoS attacks is to have a plan in place already—if you have to create one on the fly you are more than likely going to have your website brought to your knees. One of the first things the plan should include is to investigate the characteristics of where the attack is coming from rather than focusing on the impact. If you can figure out where its coming from its much easier to lock down the system and block against future attacks. 3. How can a service-oriented architecture (SoA) be used to guide the organization of the future? Give an example (ch. 7). __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Student should provide a definition of what SoA is and how it can be used to guide an organization. An example must also be provided. Example: A service-oriented architecture (SoA) can guide the organization of the future by enabling it to respond more adeptly to customers, end users, software development, information needs, and hardware requirements. An example of an SOA is WSDL (Web service definition language). This allows organizations that might store and send information in a different way to use a WSDL to share that information. 4. Why is interoperability important? Provide an example. __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Student should describe what interoperability is and why it is important. They also need to include an example. (ch. 7) Example: Interoperability provides the capability for two or more computing components to share information and other resources, even if they are made by different manufacturers. For example, cell phones are interoperable. It doesn’t matter what kind of phone it is (iPhone, Android etc) and what service provider it is, (ATT, Verizon etc), every phone works with every other phone over any type of network. 5. How do the four implementation methods differ? __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Student should explain all four implementation types: parallel, plunge, pilot and phrased. Example: Parallel implementation uses both the old and new systems until the new system is verified. Plunge implementation immediately ceases using the old system and begins using the new system. Pilot implementation converts only a group of users until the new system is verified. Phased implementation converts only a portion of the system until it can be verified. 6. What are the four decision types you make on a project? Give an example of each. __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Student points out all four types of decisions: ad hoc (aka: non recurring), merger, recurring, and non-structured. Student should also provide an example of each. Example: Nonrecurring, or ad hoc, decision is one that you make infrequently (perhaps only once) and you may even have different criteria for determining the best solution each time. A merger with another company is an example. Recurring decisions are decisions that you have to make repeatedly and often periodically, whether weekly, monthly, quarterly, or yearly. An example would be which route to take to go to work. Non-structured decision is a decision for which there may be several “right” answers and there is no precise way to get a right answer. An example would be whether to change a company’s strategy. Structured decision is a decision where processing a certain kind of information in a specified way so that you will always get the right answer. An example would be deciding how much to pay employees. 7. What is business intelligence? Why it is more than just information? (ch. 3) __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Student should explain that business intelligence is more than just information – it’s about knowledge and using that information to make predictions and business decisions. Example: Business intelligence is knowledge – knowledge about your customers, your competitors, your partners, your competitive environment, and your own internal operations. It is more than just information because it combines various types of information to allow you to make better decisions and operate more productively. 8. Why is the traditional buy-hold-sell inventory model an expensive and potentially risky one? (ch. 2) __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Students should explain that a traditional inventory model includes creating an inventory without knowing the demand, keeping a lot of inventory in case you need it, and you sell off whatever is left over or obsolete at a discounted price. Example: The traditional inventory model requires that (1) you create inventory without a known demand, (2) you keep a lot of inventory throughout the supply chain, and (3) you sell off obsolete inventory at a very low price. 9. What is an enterprise resource planning (ERP) system? Give an example. (ch. 1) __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Student describes what an ERP system is and provides an example. Example: An ERP system is a collection of integrated software for business management, accounting, finance, HR, project and inventory management, supply chain, customer relationship management, e-collaboration, etc. The integrated software allows an enterprise to manage the varying aspects of its business. For example, a trucking company may have a CRM to keep track of its clients, an inventory program to keep track of its fleet etc. 10. What are the three generic strategies according to Michael Porter? Give an example of each. (ch. 1) __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ *Instructor Response Meets expectation: Student should outline each of the three generic strategies (overall cost of leadership, differentiation and focus) and provide an example of each. Example: The three generic strategies according to Michael Porter are: overall cost leadership, differentiation, and focus. Is the clearest of the three generic strategies. Is when a firm is set out to be the lowest-cost producer in its industry. According to Porter the sources of cost advantage are varied and depend on the structure of the industry. Cost leadership is when a company sets out to be the lowest-cost producer within a particular industry. A differentiation strategy is where a company seeks to be unique in a particular industry. CSU Global for example seeks to be the highest quality online provider by providing outstanding customer service. Focus is when a company focuses on a very small specific segment of the market.