81
BUS381 Test Questions Chapter 1 1. You need ___________ to evaluate trends, predict responses, and plan ahead. A. People B. Data C. Programmers D. None of the above 2. Knowledge represents a higher level of understanding, including _________, __________, and ____________ . A. Rules, reports, information B. Patterns, reports, information C. Rules, patterns, decisions D. Decisions, reports, information 3. A management information system consists of: A. Hardware, software, telecommunications, data, storage capacity B. Collections of data, storage capacity, software, people, hardware C. Hardware, software, people, procedures, and collections of data D. Software, people, hardware, data, telecommunications 4. Data consists of ____________. A. Factual elements B. Information C. Knowledge D. None of the above 5. Information represents data that has been ___________, ______________, and ______________ to provide insight. A. Processed, organized, integrated B. Processed, programmed, evaluated C. Organized, programmed, evaluated D. Integrated, programmed, evaluated 6. Wisdom is where one can put _________, __________, and ________ to work to create new knowledge and adapt to changing situations. A. Data, information, and experience B. Knowledge, experience, and analytical skills C. Data, knowledge, and information D. Experience, data, and information 7. Organizations that use information technology to ___________ costs and provide ___________ service can thrive. A. Reduce and better B. Increase and better C. Reduce and worse D. Increase and worse 8. Information technology is critical to the production improvement process, enabling employees to perform________ tasks, getting work done _________ at ________ cost. A. More, slower, higher B. More, faster, lower C. More, slower, lower D. Less, slower, higher 9. In a teamwork environment, not only do you have to produce your own work, but you also have to __________ closely with the group to see what problems and answers they have encountered and determine how to ___________ all of the pieces. A. Communicate, integrate B. Communicate, disperse C. Write, disperse D. Talk, disperse

testreview (1)

Embed Size (px)

Citation preview

Page 1: testreview (1)

BUS381 Test Questions

Chapter 1

1. You need ___________ to evaluate trends, predict responses, and plan ahead.

A. PeopleB. Data C. Programmers D. None of the above

2. Knowledge represents a higher level of understanding, including _________, __________, and ____________ .

A. Rules, reports, information B. Patterns, reports, informationC. Rules, patterns, decisions D. Decisions, reports, information

3. A management information system consists of:

A. Hardware, software, telecommunications, data, storage capacityB. Collections of data, storage capacity, software, people, hardwareC. Hardware, software, people, procedures, and collections of dataD. Software, people, hardware, data, telecommunications

4. Data consists of ____________.

A. Factual elementsB. Information C. Knowledge D. None of the above

5. Information represents data that has been ___________, ______________, and ______________ to provide insight.

A. Processed, organized, integrated B. Processed, programmed, evaluatedC. Organized, programmed, evaluated D. Integrated, programmed, evaluated

6. Wisdom is where one can put _________, __________, and ________ to work to create new knowledge and adapt to changing situations.

A. Data, information, and experience B. Knowledge, experience, and analytical skillsC. Data, knowledge, and information D. Experience, data, and information

7. Organizations that use information technology to ___________ costs and provide ___________ service can thrive.

A. Reduce and better B. Increase and better C. Reduce and worse D. Increase and worse

8. Information technology is critical to the production improvement process, enabling employees to perform________ tasks, getting work done _________ at ________ cost.

A. More, slower, higher B. More, faster, lower C. More, slower, lower D. Less, slower, higher

9. In a teamwork environment, not only do you have to produce your own work, but you also have to __________ closely with the group to see what problems and answers they have encountered and determine how to ___________ all of the pieces.

A. Communicate, integrate B. Communicate, disperse C. Write, disperse D. Talk, disperse

10. Beginning in mid-2000, thousands of dot-coms firms failed as most had __________ expenses and _________ losses.

A. Enormous, huge B. Less, minimum C. Minimum, huge D. Minimum, minimum

11. Traditional concepts of management focus on:

A. Organizing, planning, and control B. Manufacturing, span of control, and accounting proceduresC. Military-based transactional systems D. Accuracy, dependability, and loyalty to the firm

12. Mintzberger’s three categories of managerial tasks are:

A. Managerial, span of responsibility, financial planning B. Human resource planning, financial planning, resource planningC. Interpersonal, informational, and decisional D. Developmental, resource identification, and interpersonal

13. Collecting data, identifying problems, and making choices are, in series, called the:

A. Manager’s role B. Basis of business C. Window of opportunity D. Decision process

14. One important job of management is to examine the need for ___________ and how it can be used to __________ future problems.

Page 2: testreview (1)

A. Information, solve B. Data, evaluate C. Collection, analyze D. Management, decide

15. Middle managers organize and summarize data, and pass it ___________.

A. To the lower-level workers B. Up the chain C. To the customers D. To the consultants

16. Information technology offers the ability to alter the way companies are ____________ and ______________.

A. Organized, managed B. Analyzed, processed C. Audited, processed D. Processed, organized

17. Each manager is more productive because of the ___________ and the ability to perform many jobs.

A. Tools B. Track records C. Reports D. Consultants

18. As area managers are required to understand and use increasingly sophisticated models and tools to analyze events and make decisions, the demand for managers with specific technical skills is ____, while the demand for general business managers is _____.

A. Decreasing and increasing B. Increasing and decreasingC. Decreasing and decreasing D. Increasing and increasing

19. Three of the seven fundamental trends that have been driving the economy and changing businesses are:

A. The Web, telecommunications, decentralizationB. More government intervention, higher taxes on Web-based businesses, computer-literate employeesC. Specialization, reliance on temporary workers, the increasing importance of service-oriented businessesD. Better-trained employees, telecommunications advance, less government intervention

20. There is an increasing demand for managers with:

A. Terminal degrees B. Specific technical skills C. Communications skills D. Business training

21. The advantage of specialization is that it ___________ management tasks to _________ problems.

A. Reduces and smaller B. Increases and larger C. Reduces and larger D. Increases and smaller

22. Management by methodology allows firms to _________ their number of _________ managers.

A. Increase and lower-level B. Reduce and middle-levelC. Increase and upper-level D. Reduce and upper-level

23. Without communication, firms could not grow beyond a certain size because managers could not monitor and control ___________.

A. Lower-level workers B. Customers C. Vendors D. None of the above

24. The goal of _______________ is to push the decisions and the work down to the level that deals with the customer.

A. The Web B. Modern accounting procedures C. Information technology D. Decentralization

25. Information systems enable executives to gather and manipulate information themselves or with automated systems; and consequently, there is _______ need for _________ managers to prepare and analyze data.

A. Less, middle B. Less, upper C. More, lower D. More, middle

26. To obtain higher-level jobs, one will need to possess more _________ that other potential employees.

A. Analytical skills B. Writing skills C. Verbal skills D. None of the above

27. Today, internationalization is a daily fact of life for workers and managers in:

A. Internet business B. Large multicultural firmsC. European economies D. Almost every company

28. One of the most prominent uses of information technology to support the move to international operations is/are:

A. Communications facilities B. Language translation programsC. More powerful computers D. Better educated managers

Page 3: testreview (1)

29. The increased competition created by internationalization and decentralization requires corporations to be more _______.

A. Flexible B. Rigid C. Non-cooperative D. None of the above

30. A trend facing industrialized nations is the move toward a(n) ____________ -oriented economy.

A. Service B. Manufacturing C. Exporting D. Importing

31. Unable to alter the company fast enough, Compaq was ultimately purchased by ____________.

A. AT and T B. Hewlett-Packard C. Raytheon D. Boeing

32. The key to technology is to restructure the operations and management to______ costs and make _________ decisions.

A. Increase, better B. Reduce, better C. Increase, worse D. Reduce, worse

33. What level of decision is appropriate for a manufacturing firm if it involves machine settings, worker schedules, and maintenance requirements?

A. Tactical B. Operational C. Strategic D. None of the above

34. What is the interactive, computer-based information system that collects data on transactions and operations?

A. Transaction processing system B. Decision support systemC. Executive information system D. Expert system

35. What is the interactive, computer-based information system that is used to control data and build systems to share data?

A. Transaction processing system B. Database management systemC. Expert system D. Executive information system

36. What level of decision is appropriate for a manufacturing industry if it involves rearranging the work area, altering production schedules, changing inventory methods, or expanding quality control measures?

A. Operational B. Tactical C. Strategic D. None of the above

37. What is the computer-based information system that helps integrate data in a collaborative environment?

A. Enterprise resource planning system B. Decision support systemC. Executive information system D. Expert system

38. What is the interactive, computer-based information system that provides a flexible tool for analysis and helps managers make business decisions?

A. Transaction processing system B. Decision support systemC. Executive information system D. Expert system

39. What is the information system that captures and stores the knowledge of human experts and then makes this knowledge more accessible to an organization?

A. Transaction processing system B. Decision support systemC. Executive information system D. Expert system

40. What type of decision is required to change the overall structure of the firm to give it an advantage over the competition?

A. Tactical B. Strategic C. Operational D. None of the above

41. What level of decision is appropriate for a manufacturing industry if it involves building new factories, expanding to new products or industries, or even going out of business?

A. Operational B. Tactical C. Strategic D. None of the above

42. What is the highest level of decisions?

A. Strategic B. Tactical C. Operational D. None of the above

Chapter 2:

Page 4: testreview (1)

1. Computers are typically discussed in terms of two important classifications: ______ and _________.

A. People, Data B. Hardware, software C. People, Software D. Software, Data

2. Recently, computers become _________ enough and ________ enough to handle more complex sound and video data on a regular basis.

A. Fast, inexpensive B. Slow, expensive C. Fast, expensive D. Slow, complex

3. The industry often refers to the ________ number of bits that a processor can handle.

A. Minimum B. Maximum C. Average D. None of the above

4. Common machines (computer systems) use _____ -bit processors, but the industry is slowly shifting to _________ -bit processors.

A. 32, 64 B. 64, 32 C. 16, 32 D. 8, 16

5. In the object oriented programming approach, each object has _________ and ________.

A. Values, inputs B. Properties, functions C. Inputs, values D. Functions, inputs

6. Standard methods to manipulate text include_________, _________, and _________.

A. Totals, calculations, comparisons B. Searching, formatting, spell-checkingC. Recording, playback, compression D. None of the above

7. Standard functions dealing with numbers include _________, _________, and _________.

A. Totals, calculations, comparisons B. Searching, formatting, spell-checkingC. Recording, playback, compression D. None of the above

8. Existing functions for sound and video are often limited to _________, _________, and _________.

A. Totals, calculations, comparisons B. Searching, formatting, spell-checkingC. Recording, playback, compression D. None of the above

9. Unicode is a(n) _________ standard that defines character sets for every modern language and even most dead languages.

A. International B. National C. European D. None of the above

10. Unicode uses two bytes to count each character or ideogram, enabling it to handle _____________ ideograms in each language.

A. 28 B. 216 C. 224 D. None of the above

11. The basic rules of thumb state that most printed text is displayed at______ to ______ points.

A. 12, 14 B. 10, 12 C. 14, 16 D. None of the above

12. It is useful to know that letters in a 72-point font are approximately ______ inch(es) tall.

A. One B. Two C. One half of an D. None of the above

13. Bitmap pictures are evaluated in terms of the number of ________ and ________ of the picture.

A. Colors, resolution B. Dots, resolution C. Colors, dots D. None of the above

14. Two major formats are used for sharing image files are _______ and ________.

A. MPG, AVI B. GIF, JPEG C. TIF, WAV D. BMP, MID

15. ________ files combine the advantages of both GIF and JPEG formats.

A. PNG B. MPG C. AVI D. TIF

16. Vector images consist of __________ descriptions instead of dots.

A. Positional B. Mathematical C. Physical D. None of the above

17. Graphic devices—including displays, printers, digital cameras, and scanners—are evaluated largely in terms of _________.

Page 5: testreview (1)

A. Bandwidth B. Resolution C. Frequency D. Amplitude

18. ________ storage capacity and __________ costs make it easier for sound to be stored in digital format.

A. Decreased, increasing B. Increased, declining C. Increased, increasing D. Decreased, declining

19. Sound consists of two basic components: __________ and __________.

A. Amplitude, frequency B. Volume, speed C. Frequency, velocity D. Density, weight

20. If a sound signal is sampled more often, you will receive ________ quality recording, but it can take considerably _______ storage space.

A. Lower, less B. Higher, more C. Higher, less D. Lower, more

21. Several recent technological changes are _________ the cost of digitized video, which will ultimately _________ its use in business.

A. Raising, increase B. Lowering, decrease C. Lowering, increase D. None of the above

22. Standard movies display _______ frames (images) per second, while U.S. televisions display ________ frames per second.

A. 30, 24 B. 24, 30 C. 30, 40 D. 40, 30

23. A typical CD holds _______ megabytes of data, which can store _____ minutes of stereo music.

A. 700, 72 B. 200, 60 C. 200, 72 D. None of the above

24. Video generates approximately _____ megabytes of data every second.

A. 3 B. 6 C. 9 D. 2

25. _________ compression methods are commonly used to transmit photographs, audio files, and videos.

A. Lossy B. Lossless C. Linear D. None of the above

26. The processor carries out instructions written by various programmers and uses ______ to temporarily store instructions and data.

A. RAM B. ROM C. Secondary Storage D. None of the above

27. Data and instructions that need to be stored for a longer time are transferred to _______ storage.

A. RAM B. ROM C. Secondary Storage D. None of the above

28. Because most disk drives are mechanical, performance time is measured in ________.

A. Milliseconds B. Microseconds C. Nanoseconds D. Seconds

29. The exponential increase in performance arises because the industry has been able to follow _________ Law: the number of components placed on a chip doubles every 18 months.

A. Moore’s B. Archimedes’ C. Einstein’s D. Newton’s

30. Moore’s Law states that the number of components placed on a chip ________ every _________ months.

A. Triples, 18 B. Doubles, 18 C. Doubles, 24 D. Quadruples, 18

31. Although RAM speeds have remained relatively constant in the last few years, RAM price has ________.

A. Risen B. Dropped C. Remained constant D. None of the above

32. The search for extraterrestrial intelligence (SETI) project is the most famous example of using a ________________ approach.

A. Grid computing B. Serial computing C. Parallel computing D. Serial-parallel computing

33. Most computers today utilize a separate ________ processor to draw items on the screen.

A. Graphics B. Serial C. Parallel D. None of the above

Page 6: testreview (1)

34. The purpose of an input device is to convert data into electronic ________ form.

A. Analog B. Binary C. Analog-Binary D. None of the above

35. ___________ is the study of how machines can be made to fit humans better.

A. Ergonomics B. Economics C. Logics D. Rhetoric

36. When you are dealing with pictures, it is often helpful to have a scanner convert a paper-based image into _________ form.

A. Vector B. Bitmap C. Analog D. None of the above

37. Name the primary input device for pen-based handheld computers.

A. Keyboard B. Pen C. Mouse D. Touchpad

38. Sound is initially captured with a microphone that converts sound pressure waves into electrical signals. A _________ then converts these signals into numeric data that can be stored on the computer.

A. Speaker B. Amplifier C. Sampler D. Server

39. Sound boards can be purchased for personal computers that contain both the _______ and _________ technology.

A. Amplifier, sampler B. Sampler, synthesizer C. Amplifier, synthesizer D. Amplifier, server

40. Name some of the common problems encountered in speech recognition systems.

A. Use of homonyms, variations in speech patterns, and the effects of punctuations on meaningB. Volume of the speech, pitch of the speech, and driving voltage of the speech recognition systemC. Amplitude of the speech, frequency of the speech, and variations in speech patternsD. None of the above

41. Keyboards do not work well in a wireless environment, as they are too_________ to be portable and ________ to use.

A. Small, easy B. Large, hard C. Small, hard D. Large, easy

42. Because computer and television sets are loosely based on (the) ________ technology, it would seem _________ to merge the two.

A. Same, easy B. Different, easy C. Different, difficult D. None of the above

43. Computer projection systems for meetings and presentations use _________ light to project an image onto a screen.

A. Low-intensity B. Medium-intensity C. High-intensity D. None of the above

44. What are the common resolutions of laser printers?

A. 900 dpi and 1500 dpi B. 600 dpi and 1200 dpiC. 1200 dpi and 1800 dpi D. 1800 dpi and 2400 dpi

45. What is the main reason that the standard high-speed RAM cannot store data?

A. RAM is dynamic B. RAM is static C. RAM is slow D. RAM is fast

46. What is the most common method of secondary storage?

A. High-speed RAM B. Disk drive C. Floppy Disk D. None of the above

47. Today, a fast USB drive can write ___ megabytes per second, while an average disk drive can write ___ megabytes.

A. 10, 60 B. 5, 30 C. 20, 120 D. 15, 90

48. In addition to duplication, RAID systems provide ______ access to the data, because each of the drives can be searching through its part of the file at (the) _____ time(s).

A. Faster, same B. Slower, same C. Faster, different D. Slower, different

49. Compared to CDs, the strengths of DVDs include: (1) ____________, (2) ___________, and (3) _____________.

Page 7: testreview (1)

A. Increased capacity, significantly faster access speeds, and standards for audio, video and computer dataB. Decreased capacity, slower access speeds, and standards for computer dataC. Increased capacity, slower access speeds, and standards for video dataD. None of the above

50. What is the nominal storage capacity of commercial DVDs for movies?

A. 18 GB B. 9 GB C. 27 GB D. 4.77 GB

51. The operating system is _________ that is responsible for communication among the hardware components.

A. Software B. Hardware C. Groupware D. NetWare

52. Both Sun (Solaris) and IBM (AIX and Linux) focus on ______ versions for their servers.

A. Windows XP B. UNIX C. Windows NT D. Mac OS

53. Establishing an e-business requires that you either run a _______ or pay someone to run it for you, so you should understand some of the main issues in Web _______.

A. Server, servers B. Printer, site C. Scanner, servers D. Printers, servers

54. A Web server is essentially a piece of ______ that monitors the full time _____ connection and delivers the required pages.

A. Hardware, Internet B. Software, Internet C. Hardware, server D. Software, server

55. To perform e-business tasks, the server needs to evaluate programmed Web _____ and interact with a __________.

A. Code, database B. Site, server C. Code, server D. Site, database

56. Early uses of computers focused on improving ________ by automating manual tasks and today, managerial uses often focus on ___________.

A. Processing, creativity B. Efficiency, effectiveness C. Processing, effectiveness D. Efficiency, creativity

57. In terms of productivity, a database management system can both make you more ________ and __________ your decisions.

A. Efficient, improve B. Inefficient, disprove C. Inefficient, improve D. Efficient, disprove

58. Today, along with numbers and text, database management systems can handle:

A. Large text files, pictures, sound, and videoB. Target tracking, target classification, a missile system trackingC. Battle management, moving target tracking, and GPS-guided missile trackingD. Traffic control, flight control and GPS-guided missile tracking

59. Spreadsheets perform various __________ and __________ analyses.

A. Statistical and mathematical B. Graphical and financialC. Physical and financial D. Physical and mathematical

60. Word processors improve communication by making it easier to _____ text, find writing _______, and produce _______ report.

A. Revise, errors, and legible B. Read, difficulties, and scientificC. Improve, qualities, and analytical D. Improve, styles, and official

61. Voice mail systems record messages much like an answering machine, but they store the messages in ________ form on computers.

A. Analog B. Digital C. Hybrid D. None of the above

62. With the appropriate mail filters, junk mails can be discarded _______.

A. Manually B. Automatically C. Remotely D. Precisely

63. The calendar software searches each personal calendar for the _________ time for the meeting and overrides _______ meeting meetings and places the complete notice on each person’s calendar in a matter of seconds.

A. Best, lower-priority B. Best, high-priority C. Worst, lower-priority D. Worst, high-priority

Page 8: testreview (1)

64. Conventional monitors operate at:

A. 200-dpi resolution B. 100-dpi resolution C. 300-dpi resolution D. 400-dpi resolution

65. Newer technologies will produce _______ resolutions for monitors, which will produce good quality text at traditional book sizes.

A. 400-dpi B. 600-dpi C. 100-dpi D. 200-dpi

66. Linux is a(n) ________ software.

A. Application B. System C. Open-source D. None of the above

Chapter 3

1. One of the most important reasons for connecting computers is:

A. The ability to share printers B. The ability to share dataC. It is easier to control the firewall D. E-mail becomes available

2. A local area network (LAN) is used to connect computers and share data within:

A. A company B. Larger geographic area C. A city D. A state

3. E-commerce consists of a transaction system with the Internet as the ________ and customer browsers as the __________ computers.

A. Network, client B. Link, client C. Link, server D. Network, server

4. If a manager can transfer business data directly from the central database to the personal computer, it becomes ______ and prevents _________.

A. Slower, confusions B. Faster, errors C. Faster, confusions D. Slower, errors

5. Without networks and centralized data sharing:

A. A company cannot access the InternetB. Managers can hold data hostageC. Many managers experience problems because they different versions of the same dataD. In is impossible to obtain a “snapshot” of the company’s financial position

6. E-mail messages are:

A. Synchronous B. Asynchronous C. Analog D. None of the above

7. Unless the laws are rewritten, it is ________ for employers to read everyone’s e-mail messages.

A. Legal B. Illegal C. Fine D. None of the above

8. Web sites are:

A. Bulletin boards that are used to make information available to many people over the InternetB. Infamous carriers of virusesC. Subject to FCC rulesD. Designed to be copied from server to server to distribute information

9. Intranet sites use Internet technologies but employ security methods to restrict access to ______ users.

A. External B. Internal C. All D. None of the above

10. Intranets and extranets use the same technologies as the common ________, but are limited to_______ groups of users.

A. Internet, special B. Intranet, all C. Extranet, special D. Internet, all

11. A Web log is an interesting variation of a Web site, and it is essentially:

A. A diary on any topic posted on a special Web site for everyone to read B. A log of business transactionsC. A description of a particular book D. None of the above

Page 9: testreview (1)

12. Managers enter planned meeting times and scheduled events into their personal electronic ___________ file.

A. Output B. Calendar C. Data D. None of the above

13. E-mail systems can work as simple ___________ tools by routing copies of files to everyone on the team.

A. Case B. Groupware C. NetWare D. Design

14. With a __________ network, the backup process is almost completely automatic.

A. Communication B. Serial C. Parallel D. Local

15. An advantage to networks is that they:

A. Are easier to make secure than individual computers B. Allow continuous backup of all documentsC. Enable employees to share expensive hardware D. Are less expensive than T1 lines

16. The ability to share printers through the network:

A. Is a way to make sure employers are not printing personal documentsB. Allows one printer in a central location to do all the printing for the firmC. Allows encryption of documents on the intranetD. Allows users to select the type of printer best suited to the current document being printed

17. High-speed, high-quality printers are:

A. Not practical for small firms B. Useful for users with networks, because they can be shared as neededC. Outdated D. Not necessary for anyone but the military and insurance companies

18. __________ can be used to share access to supercomputers—even if they are in a different city or different country.

A. Networks B. Planning C. Designing D. None of the above

19. Several e-commerce printing companies enable you to send your large print jobs over the ________ and have the boxes of papers shipped to you.

A. Internet B. Telephone C. Faxes D. none of the above

20. Grid computing extends the concept of ___________—instead of multiple processors in one computer.

A. Parallel processing B. Serial processing C. Multiple programming D. None of the above

21. Some experts predict that within a few years, almost all calls will be made over the ___________ instead of traditional phone calls.

A. Packet switching B. Cellular network C. Private branch D. Secured network

22. Newer technologies are emphasizing the value of routing all communication over a single Internet-based network, often called:

A. Cellular network B. Voice over Internet protocol (VoIP)C. Packet switching network D. Private branch exchange (PBX)

23. Components of a network include:

A. Computers, transmission medium, and connection devices B. Printers, monitors, and connection devicesC. Scanners, modems, and computers D. Digital cameras, printers, and modems

24. To make the connection, each device connected to a network must have:

A. A network card B. A modem C. A monitor D. A printer

25. The _______ is crucial to making a server farm work efficiently.

A. Work load level B. Number of hubs C. Operating system D. The number of users

26. One way to handle server scalability is to purchase a _____________ server within the same product family.

A. Faster performance B. Slower performance C. Low-cost D. None of the above

Page 10: testreview (1)

27. Another way to handle server scalability is to build a ________ where the workload is automatically distributed across machines and new low-cost servers can be added at any time.

A. Server farm B. Network C. Network interface card D. None of the above

28. The thin-client PDAs rely on:

A. Their NIC cards B. The server C. The medium used D. The size of their memory units

29. The oldest form of electrical wiring is:

A. Copper wire B. Unshielded coaxial cable C. Parallel pairs D. Twisted pair

30. The second wire in coax is:

A. Steel B. A metallic foil or mesh that is wrapped around the entire cableC. Fiber optic D. Non-conductive plastic

31. A fiber-optic cable consists of:

A. Steel B. A metallic foil wrapped around the entire cableC. A glass or plastic core that is surrounded by a reflective material D. Non-conductive plastic

32. The theoretical capacity of a single fiber-optic cable is at least:

A. 100 kilobits per second B. 100 megabits per secondC. 100 gigabits per second D. 100 terabits per second

33. Any transmission line longer than 90 meters (295 feet) should use:

A. Twisted pair B. Fiber-optic connections C. Coaxial D. None of the above

34. Only a small number of radio frequencies:

A. Are still available B. Are microwave frequencies C. Can be used to carry data D. Can cover long distance

35. Shorter wavelengths can carry:

A. Less data B. More data C. Any data D. None of the above

36. Although wireless Internet connections are not yet as fast as broadband connections, it is __________ expensive to reach people with wireless connections.

A. More B. Less C. Same D. None of the above

37. On a dial-up line, it takes about 8 seconds to download:

A. A full-screen graphic in color B. 3 Mb of soundC. 50K bytes D. A screen change with graphics

38. DSL is a system offered by phone companies using:

A. The twisted-pair phone line into your house B. The fiber-optic cable line into your houseC. Coaxial cable line into your house D. None of the above

39. The DSL line is ____________ between your house and the phone company.

A. Not shared B. Shared C. Direct D. None of the above

40. Wireless radio connections always use a:

A. Direct medium B. Shared medium C. Microwave guide D. PSTN

41. _________ are crucial to improving efficiency in large networks.

A. Routers and switches B. Modems C. Printers D. Servers

42. The performance of the network depends on:

Page 11: testreview (1)

A. The speed of the switch B. The data rate of the modemC. The processing speed of the computer D. None of the above

43. A network that connects various subnetworks across a firm is called a(n):

A. Enterprise network B. Voice network C. PSTN network D. Packet-switched network

44. Without __________, there is no way to connect computers or networks produced by different vendors.

A. Modems B. Switches C. Routers D. Standards

45. Corporate telecommunication standards should be reevaluated every year or so to make sure that:

A. They are still following the standard B. They are fast enoughC. The security level is still acceptable D. They are still the best solution

46. In the TCP/IP reference model, the Internet layer is concerned with:

A. Routing messages to the appropriate location B. Checking the security level of the messagesC. Checking messages for major viruses D. Keeping the entire message together as one packet

47. The newer IPv6 supports:

A. 16-bit addresses B. 32-bit addresses C. 64-bit addresses D. 128-bit addresses

48. A newsgroup is:

A. Closed group to which the new user requests admission B. A giant, global bulletin boardC. An edited bulletin board managed by a leader D. Connected to all the major news organizations globally

49. Internet 2 calls for:

A. Gigabit connection points B. A new naming system for usersC. Microsoft operating systems D. Sun technology

50. In 1999, there were (an) ________ users of Internet 2.

A. More than one million B. 10,000 C. Unknown D. 100

51. In 2003, there were (an) ________ users of Internet 2.

A. More than one million B. 205 C. Unknown D. 10,000

52. The third generation cell phone is being designed to handle data at speeds from ____ to _______.

A. 56 kbps, 2 mbps B. 56 kbps, 100 mbps C. 56 kbps, 1000 mbps D. 56 kbps, 1000 kbps

53. An interesting possibility for m-commerce comes from the ability to use:

A. Location to identify possible customers B. Graphics and videoC. Multiple persons on the same connection D. A special cash card to initiate transactions

54. Federal government requires that cell phone systems provide caller location within:

A. 100 feet B. 200 feet C. 300 feet D. 400 feet

55. In 2003, the United States enacted the CAN-SPAM Act, which makes many types of e-mail:

A. Legal B. Illegal C. Permissible D. None of the above

56. Business firms are becoming more dependent on:

A. Fiber-optic lines B. Extranets C. Client-based advertising D. International markets

57. Microwave satellite transmission is worth the expense if you:

A. Require absolute security for your messages B. Require speed for your messages

Page 12: testreview (1)

C. Have huge amounts of data to transfer D. Have line-of-sight between sender and receiver

58. Multinational operations generally require:

A. A working knowledge of several languages for all employees B. The services of a local attorneyC. Extensive cultural training for each location D. Management by local employees

Chapter 4

1. The purposes of a DBMS are:

A. To provide shared access to data, answer questions, and create reports from the dataB. To provide data concurrency, provide query options, and automatically create input screensC. To maintain data definitions, input data to master files, allow data to be accessed as neededD. To maintain data files at manageable size, maintain data catalogs, provide query options

2. In the 1960s and 1970s, before the use of DBMSs, a manager who needed a new report:

A. Had to combine several others to create the new one B. Needed a programmer to create new code for it or modify older codeC. Had to re-enter much of the data D. Had to create a new program with new data

3. An important characteristic of databases is that they are designed to:

A. Help users examine the data from a variety of perspectives B. Maintain efficiencyC. Create new reports from old data D. Maximize management effectiveness

4. In the relational DBMS, data are stored in:

A. Tables of columns and rows of data B. Very large unrelated data filesC. Files with non-repeated data D. A large mainframe computer

5. Reports are created by:

A. The MIS department B. Associated applications that are purchased separatelyC. Laying out data, text, and graphics on the screen D. Programmers

6. Relational databases are specifically designed to:

A. Create opportunities for managers to gather their own information B. Be easily understood by non-programmersC. Allow many tables to be created and then combined in interesting ways D. Normalize automatically

7. The Database administrator:

A. Asks ad hoc questions of the data B. Creates applications and programs that collect data and produce reportsC. Generates the data that fills the database D. Defines and maintains the overall structure and data

8. The manager:

A. Asks ad hoc questions of the data B. Creates applications and programs that collect data and produce reportsC. Generates the data that fills the database D. Defines and maintains the overall structure and data

9. The programmer:

A. Asks ad hoc questions of the data B. Creates applications and programs that collect data and produce reportsC. Generates the data that fills the database D. Defines and maintains the overall structure and data

10. The business operator:

A. Asks ad hoc questions of the data B. Creates applications and programs that collect data and produce reportsC. Generates the data that fills the database D. Defines and maintains the overall structure and data

11. In the relational DBMS, data are stored in:

A. Tables of columns and rows of data B. Very large unrelated data filesC. Files with non-repeated data D. A large mainframe computer

12. The basic choices of types of data in a DBMS include, but are not necessarily limited to:

Page 13: testreview (1)

A. Labels, formulas, and functions B. text, data checkers, Boolean functionsC. Text, dates, (and times), numeric, and objects (graphics, video, and sound) D. text, numbers, formulas

13. Whenever possible, dates should be stored in:

A. Label format B. Text format C. Date format (numeric format) D. Object format

14. A nice feature of the DBMS is that the underlying tables:

A. Can be used separately by different departmentsB. Can be expanded and new tables can be added without interfering with the existing tables or current programsC. Can be updated by multiple users at onceD. Are always consistent

15. Whenever someone needs a computer application, the first step is to:

A. Gain management support B. Make sure the hardware will support the filesC. Determine the size of the various data files D. Identify the data that will be needed

16. The goal of the DBMS approach is to:

A. Gather only data that will be useful B. Collect accurate data, make it available to users, and minimize unnecessary duplication of dataC. Keep data files small enough to be practical D. Maintain an efficient operation

17. If one of the most important steps of developing a solution is to break the problem into smaller pieces, it is well to remember that:

A. Data files, if kept small, are easier to understand and work withB. The data are a major piece, and a DBMS makes tracking data much easierC. The more data there are available, the easier it is to define the pieces of the problemD. Programmers and MIS personnel are trained to handle such problems

18. When one queries a database using QBE, it is easier to:

A. Start with an existing view B. Choose the tables firstC. Write the design of the query on paper before beginning D. Choose the output first

19. When one queries a database using SQL, it is easier to:

A. Start with an existing view B. Choose the tables firstC. Write the design of the query on paper before beginning D. Choose the output first

20. Using QBE, if the conditions are placed on the same row, the interpretation is a(n) _____________ condition.

A. LIKE B. OR C. AND D. WHILE

21. Using QBE, if the conditions are placed on different rows, the interpretation is a(n) _____________ condition.

A. LIKE B. OR C. AND D. WHILE

22. When using the pattern command LIKE, V?? stands for:

A. Any column in the data file that begins with V followed by two numbersB. Any row in the data file that begins with V and contains only lettersC. Any two characters including and following the letter V in the subject columnD. One single character after the letter V in the subject column

23. If you are looking for entries that are blank in the subject column, the condition to enter is:

A. Zero (0) B. BLANK C. One space character ( ) D. NULL

24. SQL has two advantages over QBE:

A. It is easier to write, and it is a standardized languageB. It is a standard language supported by many different database systems; and it is easier to readC. It becomes as the default query generator on most systems, and it can transfer to the InternetD. It is easier to write, and it can transfer to the Internet

25. The SQL command to retrieve all the data in the Orders file is:

Page 14: testreview (1)

A. SELECT FROM Orders WHERE * B. SELECT * FROM OrdersC. Orders, ALL D. Select * WHERE FILE Orders

26. A useful feature of both SQL and QBE is the:

A. ABSOLUTE functionB. Ability to specify up to fifteen decimal intervalsC. Ability to define the standard for the Internet use of each oneD. Ability to divide the rows into groups and get subtotals or other calculations for each group

27. Both SQL and QBE can:

A. Create text documents in WORD B. Perform simple calculationsC. Use JAVA applets D. Integrate data types within the same column

28. You can achieve answers to many different questions by:

A. Careful use of Aristotelian principles B. Using the AVG function in connection with the NULL functionC. Treating specific field denominators as groups D. Combining selection clauses with simple calculations

29. SQL statements are:

A. Often easier to read than QBE statements B. Not proprietary statementsC. More difficult to read than QBE statements D. Never automatically generated

30. Once tables are joined, the DBMS retrieves and displays the data:

A. Sequentially by record number B. As if it were stored in one single tableC. With random access D. For any report required

31. The true power of a DBMS lies in the ability to:

A. Use any form of query system if the objects are carefully defined B. Create reports easily from one tableC. Combine data from multiple tables D. Be understood by general management personnel

32. The advantage of views is that you can:

A. Put a password on the view B. Limit the accessibility to immediate usersC. See all the data in all the files in one report D. Look at the data in different ways without having to duplicate the data

33. The worst problem with poor DBMS design is that it leads to:

A. Excessive reports that are not needed by current management B. Unnecessary duplication of data with concurrent potential of errorC. Too much data collected inappropriately D. Poor security

34. When designing databases, it is essential to understand:

A. DBMS training for management B. The main formatC. The number of columns for each table D. The relationships between various entities

35. When writing table definitions in standard notation, one puts ________ to denote one-to-many or repeating relationships by placing:

A. A comma B. Parentheses C. A semicolon D. A square bracket

36. A table that contains repeating sections is not in __________.

A. First normal form B. Second normal form C. Third normal form D. Fourth normal form

37. When each non-key column in a table depends on the entire key, the table is in:

A. First normal form B. Second normal form C. Third normal form D. Fourth normal form

38. The conditions required for third normal form are:

A. One primary key for each table, tables linked by order of primary key, one-to-many relationships are requiredB. One-to-many, one-to-one, and many-to-many relationships are automatically delineated for each table with respect to all the othersC. No repeating groups in the tables, each non-key column depends on the whole key, and nothing but the key

Page 15: testreview (1)

D. Each non-key column depends on the whole key, while many-to-many relationships are not supported because they are not necessary

39. It is wise, and often simpler, when planning an input form, to:

A. Look at all the possible views that might be combined to create the formB. Ask your secretary what would be the easiest way to enter the dataC. Draw it on paper first to get a feel for what you want it to look likeD. Begin with an existing form and modify it

40. Most input forms begin with:

A. Blank screen with a menu line B. A default form containing all the column namesC. A view specified in the top area of the screen, with all relationships defined D. A template chosen from a menu

41. In the process of increasing the storage space for monster databases, challenges faced by the DBM are:

A. Performing sufficient backup of data, ensuring continuous data flow, planning reports as managers request themB. Designing the entire system to handle the increased processing, searching, and sorting demandsC. Adapting hardware and software to special needs, installing new software, checking software changesD. Making sure managers have the data they need for their reports, timely backup, adapting software to special needs

42. Typically, several DBAs are used to monitor and control various:

A. Databases B. Expenses C. Programs D. Tasks

43. Data administrator (DA) is charged with:

A. Overseeing all of the data definitions and data standards for the companyB. Performing sufficient backup of data, ensuring continuous data flow, planning reports as managers request themC. Designing the entire system to handle the increased processing, searching, and sorting demandsD. Looking at the data in different ways without having to duplicate the data

Chapter 5

1. Since the Internet is a _______ public network, data needs to be _________ in transmission to ensure it is not __________ or altered.

A. Shared, protected, and intercepted B. Direct, digitized, and reflectedC. Direct, altered, and intercepted D. Shared, digitized, and mutilated

2. For a firm to maintain virtually continuous information system support, these are required:

A. Adequate backup copies, careful planning, organization, and enough moneyB. Adequate backup, trustworthy employees, trained personnel, and a disaster planC. Trained personnel, a disaster plan, good security procedures, and adequate backupD. Organization, trained personnel, a disaster plan, good security procedures

3. One common level of disaster recovery support, called a hot site, consists of:

A. A fully functional computer B. A fully configured computer centerC. A software system D. A secured PC

4. Another alternative disaster recovery support, called a cold site, which provides:

A. Fully functional computer room space, without the computer equipment B. A fully configured computer centerC. A software system D. A secured PC

5. The difference between a hot site and a cold site is:

A. The hot site uses data mirroring techniques, the cold site uses backupsB. The hot site has specific computer equipment already installed and ready to go, the cold site provides computer room spaceC. The hot site is located within a ten mile radius, the cold site can be anywhere in the worldD. The hot site has programmers on hand to help; the cold site is staffed by the company involved

6. Companies enforce a separation of duties:

A. Among staff programmers and users B. Among customers and marketersC. Among customers and managers D. Among customers and staff

Page 16: testreview (1)

7. A danger to security is that programmers might include a(n) _____________ or ___________ allowing them to gain access to the system even if they leave the firm.

A. Secret virus, time bomb B. Trapdoor, secret passwordC. Worm, delete command D. Time bomb, backup erase command

8. The good news is that after December 4, 2004, you will be able to receive ___________.

A. A free credit report once a year B. Social security benefits C. Medical benefits D. A free parking space

9. Two little-considered problems with data security could occur when:

A. Passwords are written down, or the system administrator leaves the companyB. A hacker within the company accesses files not meant for him or her, or when printouts are not carefully shreddedC. The virus program is not sufficient, or the system administrator is not competentD. The equipment is sent out for repair, or when old tapes, disks, and hard drives are not destroyed when their use is over.

10. The best way to minimize problems from employees stems from good management techniques:

A. Check references as necessary, train employees as needed, accent teamwork, reward good workB. Promote from within, watch password and change them frequentlyC. Hire workers carefully, treat employees fairly, assure separation of jobs, accent teamwork, and maintain constant checksD. Maintain constant checks on employee e-mail, promote from within, and employee good security procedures

11. The electronic data interchange (EDI) means that business information is processed _________ and with ________ errors.

A. Slower and more B. Faster and fewer C. Slower and fewer D. Faster and more

12. One key to protecting your servers is to make sure they:

A. Have all current operating system patches B. Have good physical securityC. Don’t have too many people with password access to them D. Undergo continuous backup

13. Microsoft Office software presents a major point of vulnerability because the tools:

A. Support a macro programming language called Visual Basic for Applications B. Support FORTRAN for ApplicationsC. Supports hypertext markup language D. Supports COBOL language for business applications

14. In 1999, software virus costs were estimated to slightly under $ _______ in the United States.

A. 5 billion B. 5 million C. 8 billion D. 8 million

15. The best way to stop a virus is:

A. Keep your virus software updated dailyB. Do not run software downloaded from Internet, and never open script attachments sent through e-mailC. Stay off the InternetD. Accept mail only from persons you know

16. Today, there are:

A. Virus kits on the Web that make creating viruses a simple matter B. Some development of ethics amongst hackersC. Secret ways known only to the manufacturer that give virus protection for a fee D. Foolproof virus detection software packages

17. The spyware takes residence inside your computer and captures all of your activities, such as:

A. Web sites visited, passwords entered, and credit card numbers B. Floppy diskettes used, printers used, and scanners usedC. E-mails forwarded, diskettes used, and printers used D. Scanners used, passwords entered, and printers used

18. The three most difficult problems with protecting transaction and accounting data are:

A. Employee mistakes, unauthorized access from outside suppliers, loss of information through insufficient backupB. Employee mistakes, unauthorized modification, insufficient backupC. Unauthorized disclosure of information, unauthorized modification, unauthorized withholding of informationD. Unauthorized access from outside suppliers, sequestered information, careless use of password

19. With a formal backup plan, data is transported to a portable format, usually:

Page 17: testreview (1)

A. Tapes or DVD drives B. Broadcast to an Internet data holderC. Duplicate hard drives D. Tapes and diskettes

20. For securing backup files, smaller businesses can use:

A. Their own tape drives B. Trade-off backups with non-competitorsC. Hard-copy printouts D. Commercial data storage facilities

21. The biggest difficulty with passwords is that:

A. Users try to choose one they will remember – which is usually too simple B. The system administrator knows them allC. They are too easy to guess D. A hacker can keep trying until he/she gets a hit

22. The common access controls available are:

A. Read, write, copy, delete B. Create, modify, save, retrieveC. Read, write, execute, delete D. Format, save, retrieve, send

23. If multiple people have permission to change a document, it is essential that you:

A. Monitor the changes continually B. Set the document to track the changes made by each userC. Get frequent hard-copy printouts D. Set the document to mark changes with slash characters that still allow the material to be read

24. __________ standards exist for collecting, storing, or sharing authentication data.

A. Few B. None C. Hundreds of D. Thousands of

25. Audits are used to___________ and ___________.

A. Locate mistakes and prevent frauds B. Determine taxes and save moneyC. Report IRS and pay taxes D. Correct tax returns and save money

26. Audit standards are provided by the _____________ are useful guidelines for combating fraud.

A. Internal Revenue Service B. The CPA Company that conducts the outside auditC. Federal laws and practices D. American Institute of Certified Public Accountants

27. The fact that every device connected to the Internet is given a unique number as an address means that:

A. Privacy is a dead issue B. Every Web site you visit can track that numberC. Message can be tracked to the server from which they originated D. We are soon to run out of usable numbers

28. Employees who work closely together can defuse potential problems by:

A. Developing friendship B. Monitoring each other’s workC. Knowing each other’s abilities D. Forming team relationships

29. The essence of single-key encryption is that:

A. Both the person who encrypts the message and the person who decrypts it use the same keyB. The message is encrypted twiceC. The sender and receiver use different software for encryption and decryptionD. Both people do not need to have the same key

30. Data Encryption Standard (DES) system supported keys of:

A. 256 bits B. 3 bytes C. 64 bits D. 56 bits

31. Advanced Encryption Standard (AES) users have a choice of a key length of:

A. 8, 16, or 32 bits B. 32, 64, or 128 bits C. 128, 192, or 256 bits D. 64, 150, or 200 bits

32. The essence of PKI is that:

A. The system uses two keys: a public key and a private key B. The system uses single keyC. The system uses two public keys D. The system uses two private keys

33. The essence of a dual-key system is that:

Page 18: testreview (1)

A. The message is encrypted twice B. It takes both keys to encrypt and decrypt a messageC. If one key doesn’t work, the other will D. All keys can be private keys

34. In a dual-key system, whenever someone wants to send a secure message, he or she simply uses ____________ and _____________.

A. RSA algorithm and public key B. Private key and public keyC. Private key and private key D. Public key and public key

35. PKI can be used for:

A. Browsing B. AuthenticationC. A free encryption system, but monitored by the government D. Clipper chip encryption

36. To make PKI work, it is critical that:

A. Both networks use it B. A trusted organization holds the public keys and their identitiesC. Rules and regulations be developed as soon as possible D. The information not be available on the Internet

37. Verisign issues _____________________ that verify the identity of the person generating the public key.

A. Special codes B. Filters C. Special passwords D. Digital certificates

38. In UK, _________ of the nation’s 140,000 police officers are trained to handle digital evidence, and fewer than __________ police officers have advanced computer forensics skills.

A. 10,000 and 2,500 B. 1,000 and 250 C. 5,000 and 4,000 D. 50,000 and 25,000

39. Most Web sites use dual-key encryption through a system known as:

A. SSL B. HTML C. FTP D. HTTP

40. A (n) ________________ encrypts all transmissions before they are sent across the Internet.

A. Credit certificate B. VPN C. Clipper chip D. CCV

41. Alert customers can spot the fraud immediately, because the_________ in the browser will be wrong.

A. DTP B. URL C. PIM D. CAD

42. Crnivore, an FBI-sponsored computer system introduced in 2000, wasa re-named in 2001 to, which fooled nobody:

A. Echelon B. Escrow Key System C. USA-4400 D. DCS-10000

43. _______________ is a secret security-key project run internationally by the NSA in cooperation with Canada, the UK, Australia, and New Zealand.

A. Echelon B. VPN C. AARD D. Virtuoso

44. The main problem with using a required escrow key is:

A. Keeping it secured B. To whom do you give permission to use it?C. Privacy concerns for US citizens D. Many other nations do not allow encryption

45. Encryption is particularly useful for:

A. Criminals B. Terrorists C. Sending credit card data over the Internet D. Banking houses

Chapter 6

1. Electronic commerce can be used to:

A. Handle consumer and business transactions over the Internet B. Handle data over the InternetC. Manage information systems overt the Internet D. Organize marketing of the products over the Internet

2. Hierarchical structures evolved to:

A. Collect data at the tactical level and distribute them among the managers at tactical level

Page 19: testreview (1)

B. Collect data at the point of sale, summarize it, and move it up the chain of command to the CEOC. Collect data at the strategic level and distribute them among the executivesD. Collect data from the vendors, summarize it and move it to the operational managers

3. Wal-Mart has succeeded because it uses ______________ to handle transactions and operations at the _______________ cost.

A. Information technology and lowest B. People and highestC. Modern transportation technology and lowest D. Optical technology and highest

4. In a retail sale environment during 1970s, cash register was replaced with a ___________ and ________.

A. Computer terminal and a bar code B. Computer terminal and a RFIDC. OCR system and people D. MICR system and a RFID

5. The exchange of data between manufacturing machines and computers is known as _________.

A. Transaction processing B. Process controlC. Data re-set D. Data transfer

6. It is critical that transaction data be saved so that:

A. The IRS can document the transactions of the company B. Auditing by an outside agency may be validatedC. Reports will be accurate D. Verification may be made if conflicts arise

7. POS stands for:

A. Possibility of success B. Post office securityC. Priority over standards D. Point of sale

8. If there are problems in the data or in providing access to it in timely fashion:

A. All decisions made by the firm will suffer B. Eventual collapse of the company will ensueC. The books will not balance properly D. Legal risks arise

9. Bar code scanners read the:

A. Moore’s codes B. Run-length code C. Universal product codes D. Lempel-Ziv universal codes

10. RFID stands for:

A. Radar frequency identification B. Radar friendly identificationC. Radio frequency identification D. Return foe identification

11. RFIDs are small ___________ about the size of a grain of rice that consist of a (n) _________ and some transistors.

A. Chips and antenna B. Transistors and reflector C. Chips and reflector D. Diodes and receiver

12. The capacity and range of RFID chips depend on the:

A. Frequency B. Time C. Space D. Time and space

13. The ultra-high frequency RFID chips are typically scanned at less than _______ with a maximum of _________.

A. 12 feet, 40 feet B. 25 feet, 50 feet C. 6 feet, 10 feet D. 30 feet, 60 feet

14. The high-frequency RFID chips are typically scanned at less than ______ with a maximum of _______.

A. 2 feet, 20 feet B. 1 foot, 10 feet C. 2 feet, 30 feet D. 4 feet, 15 feet

15. The ultra-high frequency RFID chips can hold:

A. 12 bytes of data B. 2 bytes of data C. 20 bytes of data D. 32 bytes of data

16. The high-frequency RFID chips can hold:

A. 12 to 5,000 bytes of data B. 8 to 10,000 bytes of dataC. 12 to 10, 0000 bytes of data D. 100 to 10, 1000 bytes of data

Page 20: testreview (1)

17. With POS data collection, the computer performs all necessary computations:

A. Within one hour B. Immediately C. Within two hours D. Within three hours

18. When technology is used to collect data from manufacturing machines:

A. Production levels can be monitored constantly B. Work levels can be monitoredC. Breakdowns can be discovered more quickly D. Fewer employees are required

19. The two basic difficulties with process control are:

A. Computer malfunctions and heat on the production floorB. Shift changes of personnel and the amount of data producedC. Computer malfunctions and establishment of standards for large number of machinesD. The amount of data produced and the establishment of standards for large number of machines

20. The major advantages to process control are that it allows:

A. Quick changes in production processes and products, better information, mass customizationB. Quick product updates, better reports faster, less training for employeesC. Better data collection, occasional customization, efficient production of standardized itemsD. Problems show up faster, product characteristics are more accurately measured, fewer employees are required

21. When many firms need to exchange data with several other firms, it is best if:

A. All data are encrypted B. The firms operate in an atmosphere of mutual trustC. The largest firm sets the EDI format D. They can agree to a common EDI transaction format

22. A significant difference between the two primary standards now in existence for EDI messages is:

A. One uses IBM formats, the other uses SUN systemsB. The numbering system used to represent message types, segments, and data elementsC. The data elements are differentD. One is faster, though much less secure, than the other

23. Sharing data in EDI requires:

A. Computers with the same operating systems, and using a standardized formatB. High bandwidth capability for large amounts of data, good security practicesC. Communication link and standards that define how the data will be interpretedD. Compatible formatting commands, high bandwidth capability for large amounts of data

24. Data is sent in a standard format that is easy for computers to:

A. Parse and read B. Compress and print C. Decompress and output D. Digitize and print

25. Extensible markup language (XML) was developed in the last couple of years to:

A. Provide better Internet support for EDI B. Provide better Web design supportC. Provide better HTML programming support D. Provide better image compression technique

26. Laws and business procedures are created to _________ risks, so new laws are needed when transaction methods _________.

A. Minimize and change B. Maximize and changeC. Minimize and remain unchanged D. Maximize and remain unchanged

27. While there are laws against check fraud, the merchant would experience ________ to recover the money.

A. High costs B. Low costs C. No costs D. Medium costs

28. Credit card companies accept risks for the _______________ but not for the _________.

A. Vendors, consumers B. Consumers, vendorsC. Creditors, vendors D. Manufacturers, consumers

29. Congress passed the _______________ Act that requires executives to take responsibility for all financial reports.

A. Patriot B. Sarbanes-Oxley C. Immigration D. Uniform Computer Information Transaction

Page 21: testreview (1)

30. In e-commerce environment, both merchant and vendor need to be concerned about the transfer of ________ and ________ products.

A. Money and digital B. Data and digital C. Data and analog D. Image data and manufacturing

31. The European Union has privacy rules that are substantially ________ than those of other nations, and it does not want international companies transferring _________data to computers outside of the Union.

A. Stricter and personal B. More lenient and publicC. Stricter and business D. More lenient and personal

32. Problems occurring with the data quality attribute of volume are/is:

A. Too much detail to keep track of, but often difficult or impossible to recover the details later.B. Deadlines, different departments getting data at different times can cause sequencing errors and additional delaysC. Cost, difficulty of searching, transmission costs, errors harder to find, system overloadedD. Errors in data entry, missing data, failure to make updates

33. Problems occurring with the data quality attribute of time are/is:

A. Too much detail to keep track of, but often difficult or impossible to recover the details later.B. Deadlines, different departments getting data at different times can cause sequencing errors and additional delaysC. Cost, difficulty of searching, transmission costs, errors harder to find, system overloadedD. Errors in data entry, missing data, failure to make updates

34. Problems occurring with the data quality attribute of integrity are/is:

A. Too much detail to keep track of, but often difficult or impossible to recover the details later.B. Deadlines, different departments getting data at different times can cause sequencing errors and additional delaysC. Cost, difficulty of searching, transmission costs, errors harder to find, system overloadedD. Errors in data entry, missing data, failure to make updates

35. Data allowed to be altered at the same time by two different people will cause:

A. Incorrect results B. System crash C. Backup difficulties D. Program lockup

36. There are ______________ banks offering Visa cards, used by ___________ customers.

A. 18,000, 10 million B. 1,800, 5 million C. 18 million, 20 million D. 36 million, 40 million

37. The MIS department would like to forecast the demands that will be placed on the computers at least _________ in advance.

A. A year B. Three years C. Six years D. Five years

38. Higher-level managers in the firm deal with:

A. Data that has gone through several types of summarizing at each lower level B. Data that gone through outside vendorsC. Data that has gone through tactical-level managers D. Data that has gone through operational-level manager

39. To eliminate parts inventories held by manufacturers, manufacturing firms implement:

A. Human resources planning B. Vendor verificationsC. JIT inventory control D. Checks and balances on their production systems

40. To reduce costs and deliver exactly the needed products to every store, Wal-Mart uses:

A. Vendor verifications B. Human resourcesC. Checks and balances on their production systems D. Distribution centers (DCs)

Chapter 7

1. One difficulty that arises when you are trying to integrate information is the:

A. Diversity in hardware and software B. When there are people from many nationsC. If programming is done in different languages D. If various communication software is employed

2. To evaluate customer service and quality, the store:

Page 22: testreview (1)

A. Tracks returned merchandise and produces a daily report by item numberB. Takes the complaints from the customers and responds to the customer in 10 daysC. Gives the money back to the customers for the price of the returned merchandiseD. Issues a store credit voucher that can be used in the store to buy any products

3. Current trend in software is the adoption of enterprise systems that:

A. Are easier for untrained mid-level managers to use B. Hold data in a central databaseC. Are produced by large companies like Oracle D. Are written in-house

4. In the 1960s and 1970s, computer systems were built for:

A. The personal computer on the manager’s desk B. Computers acting as drones for a centralized systemC. Individual departments and areas within the company D. Mostly insurance company use

5. With a ____________, the data can be located in different departments throughout the business.

A. Network B. Software C. Hardware D. Server

6. With a(n) ________, top managers can use a personal computer to query the database, draw the graphs, and produce the final reports.

A. TPS system B. Integrated system C. OAS system D. MIS system

7. One of the key points of ERP systems is that they run on top of a ________.

A. Peoplesoft B. DBMS C. SAP D. Oracle

8. The amount of data integration needed in a company often depends on the _________.

A. Management structure of the firm B. Financial structure of the firmC. Operational structure of the firm D. Tactical structure of the firm

9. An oil company is a:

A. Hybrid firm B. Horizontally integrated firmC. Vertically integrated firm D. Firm that has retail stores in many different cities

10. Wal-Mart is a:

A. Hybrid firm B. Horizontally integrated firmC. Vertically integrated firm D. Firm that functions at different levels

11. Manufacturing firms can gain additional benefits from:

A. Purging data B. Distributing data C. Centralizing data D. Integrating data

12. A more complex feature for the international environment is the ability to produce reports following the:

A. Culture of individual nations B. Custom of individual nationsC. Rules of individual nations D. History of individual nations

13. Am important feature of the accounting system is that:

A. Standard accounting reports can be generated at specific times for different sections of the companyB. Accounting reports can be generated at specific times for different sections of the companyC. Accounting reports can be generated at any time for some selected sections of the companyD. Standard accounting reports can be generated at any time for any section of the company

14. Logistics consists of the:

A. Operations required selling the final products in stores at several locationsB. Operations required purchasing materials, delivering them to the warehouses and factories, and selling and distributing products C. Operations required purchasing the raw materials and delivering them to the manufacturing plants for the final productsD. Operations required maintaining the integrity of the financial data

15. In today’s manufacturing companies, logistics is an important component of:

A. Transaction processing system and decision support system B. Executive information system and demand-driven production

Page 23: testreview (1)

C. Office automation system and decision support system D. Just-in-time inventory and demand-driven production

16. Kent Dolby, the CEO of Elemica, Inc., notes that a key element of their system is the ability:

A. To restrict data within departments, who must give permission for other departmental accessesB. To translate data from one client’s computer to another’sC. To secure data from all outside accessD. To store all data in a single warehouse

17. For service-oriented companies, logistics involves:

A. Service management tasks B. Transaction processing tasks C. Executive information tasks D. Decision making tasks

18. Payroll is a complicated function, particularly in a multinational environment involving:

A. Different times in different countries B. Different rules and currenciesC. International travel times D. Security in foreign countries

19. Today’s HRM departments handle such additional tasks as:

A. Recruitment, training, travel, and organizational planning B. Sales and accounts maintainingC. Analysis of software and hardware requirements D. Purchasing and payments

20. ____________ is the most important feature of the ERP systems.

A. Sales management B. Integration C. Tracking sales data D. Service management

21. Major ERP systems utilize:

A. Distributed hardware and software B. Centralized hardware and softwareC. Distributed hardware and centralized software D. Centralized hardware and distributed software

22. ERP integration is characterized by:

A. Restricting data within departments B. Computers acting as drones for a centralized systemC. Providing security D. Changes in one inventory item cause changes in all related databases

23. Accounting systems provide controls over data to:

A. Ensure profits B. Facilitate marketing and salesC. Ensure accuracy and prevent fraud D. Help organize employee organizations

24. The accounting system:

A. Facilitate operational mangers to share data and evaluate interrelationships between departmentsB. Collects data throughout the company and produces consolidated reports that are used for planning and managementC. Helps data concurrence to be avoidedD. Facilitate management to update data conveniently

25. Journal entries represent:

A. Raw data B. Processed data C. Structured data D. Information

26. For managers to make comparisons between divisions and other firms, accounting systems produce:

A. Integrated database B. Standardized reports C. Double-entry system D. Data warehouses

27. With EDI, the ______________________ can monitor current sales and automatically place orders with the supplier.

A. Transaction processing system B. Inventory control systemC. Executive information system D. Management information system

28. Automated __________________ help identify and prevent theft.

A. Transaction processing system B. Inventory control systemC. Executive information system D. Management information system

29. Because of the volume of data in the detail, most companies keep only:

Page 24: testreview (1)

A. Current statistics and summary reports on file B. Information derived from the dataC. Financial reports D. Processed data

30. An important objective of accounting systems is to:

A. Maintain the integrity of the financial data B. Collect the sales dataC. Process the sales data D. Make a profit in the business

31. Because many transactions involve outside organizations, mistakes can be caught by:

A. Comparing summary reports B. Sharing data C. Reading financial reports D. Reading management reports

32. Companies collect hundreds of pieces of data for each employee:

A. For making decisions about cafeteria-style benefits B. Some for management purposes, others because they are required by lawC. For making decisions about employee benefits D. For making decisions about employee work schedules

33. Most companies use a __________________ HRM department to advertise job openings and to screen the initial applicants, verify credentials, and keep basic employment and hiring data.

A. Distributed B. Centralized C. Decentralized D. Hybrid

34. There are various reports required by the ___________________ regarding injuries and exposure to various hazards.

A. Department of Education B. Occupational Safety and Health Administration (OSHA)C. Department of Defense D. Department of Energy

35. With a good information system, HRM departments can offer cafeteria-style benefits where:

A. Each employee selects a personal combination of benefits B. Benefits are selected by the companyC. Benefits are partly selected by the company and partly by the employee D. None of the above

36. One of the largest paychecks printing providers is:

A. Automated Data Processing (ADP) B. Automated under-reporter (AUR)C. Application Service Provider (ASP) D. Electronic Data Interchange (EDI)

37. A system created by PRC, Inc., uses ___________ and _________ to enable workers to make changes directly to their base information.

A. Cell phones and a fax system B. Touch-tone phones and a voice-response systemC. Personal computer and an optical character recognition system D. Scanning system and an optical character recognition system

38. Supply chain management (SCM) concentrates on the production side of ______.

A. ERP B. TPS C. DSS D. EIS

39. ______________ means that it is impossible to please all of the consumers-leaving a niche open for your competitors.

A. Mass production B. Custom production C. Total quality management D. Hybrid production

40. The customized orders are entered into the system, and the engineering department ________ the order, makes _____________ as needed, and ___________ production.

A. Receives, design changes, starts B. Evaluates, design changes, and schedulesC. Collects, specification changes, and completes D. Receives, design changes, and refuses

41. ________________ is the process of manufacturing products designed for specific consumers but using mass-production techniques to keep costs low.

A. Mass production B. Mass customization C. Customization D. Total quality management

42. The overall goal is to ________________ and to eliminate bottlenecks by _________.

A. Reduce production costs and reducing the need for huge inventoriesB. Keep production costs at a fixed level and increasing the need for huge inventoriesC. Increase production costs and increasing the need for huge inventoriesD. Reduce production costs and increasing the need for huge inventories

Page 25: testreview (1)

43. SCM purchasing often requires:

A. Interactions with customers B. Several interaction steps with suppliers-even for existing relationshipsC. Interactions with buyers D. Interactions with managers

44. XML is a tool that was established to help companies:

A. Exchange data B. Analyze data C. Process data D. Compress data

45. Software vendors are developing tools that incorporate _______ automatically, and suppliers will be able to purchase the ________ needed to handle the multiple connections to customers.

A. DSS, software B. TQM, hardware C. TPS, software D. XML, software

46. ____________ was/were originally developed to help companies share data with their partners, suppliers, and customers.

A. EDI standards B. TCP standardsC. Communications standards D. ERP standards

47. All of the data within an XML document is in _____________ and tagged so that computer programs can quickly ___________ and identify the data and its purpose.

A. A specified program and read the file B. A file and compress the fileC. A file and decompress the file D. A specified format and read the file

48. Several industry groups have created ______________ for sharing data specific to their industry.

A. EDI standards B. TCP standards C. XML definitions D. ERP standards

49. The primary purpose of CRM systems is to provide individual attention to each customer to improve________.

A. Customer relationship B. Sales C. Loss of merchandise D. Marketing

50. ERP systems often have a CRM component that provides a unified view of __________.

A. Sales data B. Customer data C. Vendor data D. Management data

51. ERP systems have self-service portals that enable customers to check:

A. The status of various items, order new products, and contact the companyB. The status of the relationship between managers and workers at the tactical levelC. The relationship between the managers and workers at the operational levelD. The relationship among the managers at different business levels.

52. Like the gauges on an automobile dashboard, the _____ presents a top-level graphical representation of the status of various elements.

A. Hybrid dashboard B. Analog dashboard C. Digital dashboard D. Graphical user interface system

53. If there is a problem or a decision to be made, the executive can:

A. Derive appropriate data from a manager at the tactical levelB. Drill down to get more detailed data by pointing to another objectC. Search for more detailed data by going through a computer journalD. Obtain enough information from a manager at the operational level

54. For an EIS to work, it must be connected to the _____________, since it is the source of the data.

A. Transaction-processing system or data warehouse B. Management information systemC. Decision support system D. Executive information system

55. Congress passed (the) ____________, which requires top executives of public companies to sign a statement attesting to the validity of the annual financial statements.

A. Moore’s Law B. Murphy’s Law C. Sarbanes-Oxley Act D. Kennedy-Clinton Act

Chapter 8

Page 26: testreview (1)

1. Petz Enterprises became a leader in providing ___________ to professional accounting firms and storefront tax offices.

A. Hardware B. Software C. Data file D. Modem

2. The ________ reports that about two-thirds of new employer firms survive at least two years and fifty percent survive past four years (Bounds 2004).

A. IRS B. Dept. of Labor C. SBA D. The U.S. Congress

3. Largely because of the _______________, consumers have been limited to purchasing products through local retail stores.

A. Maintenance costs B. Transportation costsC. Education and training costs D. Advertising costs

4. Manufacturers and wholesalers did not want to spend the money to create customer-service departments to:

A. Generate a company telephone directory B. Handle thousands or millions of individual orders, returns, and complaintsC. Develop mail-order books D. Run an ad in the news paper

5. Cell phones began with poor quality analog signals that were gradually replaced with the ___________________.

A. First generation digital phones B. Second generation digital phonesC. Second generation analog phones D. Third generation analog phones

6. _______________ can create new opportunities in mobile commerce to improve contact with customers.

A. Fixed data access B. Portable data access C. Vendor data access D. Customer data access

7. New web-based businesses are being created to provide:

A. Data and Service B. Files C. Advertisements D. Financial support

8. The consumer issues C2B and C2C make up:

A. A major portion of e-commerce B. A minor portion of e-commerceC. A major aspect of business tactics D. A minor aspect of business tactics

9. Electronic marketplaces and auctions enable businesses to find:

A. New suppliers and obtain supplies on short notice B. New customers C. Programmers D. Technicians

10. EBay falls under the category of:

A. B2B e-commerce B. C2B e-commerce C. C2C e-commerce D. B2C e-commerce

11. One of the key aspects in B2C e-commerce is the ability to bypass:

A. Entire section of the production chain B. Some part of the production chainC. Entire section of the supply chain D. Some part of the supply chain

12. In the 1960s and 1970s, airlines created:

A. Customer service centers for the passengers who would need hotel reservations and car rentalsB. Fabulous entertainment clubs at the airports to attract air travelersC. Discount centers for the passengers who made 4 roundtrips within 30 daysD. Giant reservation systems to handle flight bookings

13. In connection with the B2B auction sites, instead of searching out buyers or sellers, businesses submit:

A. A bid on a Web site that covers the desired product B. A RFP for the productC. A fixed offer for the product D. A request for the prices of the products

14. Today, companies:

A. Are rarely vertically integrated across the production chainB. Do not rely on other firms to handle distribution and retail salesC. Do not choose to outsource distribution and retail sales functionsD. Do not care to become more efficient within their niche

Page 27: testreview (1)

15. Removing an intermediary:

A. Can increase your losses and cannot be used to reduce prices to capture more market shareB. Can increase your profits and can be used to reduce prices to capture more market shareC. Can decrease your profits and cannot be used to change market shareD. Can increase your profits and cannot be used to change market share

16. It is estimated that the credit card companies earn a total of _________ a year from (credit card) transaction fees.

A. $500 million B. $20 million C. $100 billion D. $10 thousand

17. Consumers:

A. Prefer to see and touch many products before they buy them B. Do not care to see many products before they buy themC. Buy many products without seeing them D. Do not touch many products before they buy them

18. In the 1960s, neighborhood grocery stores were inefficient because:

A. They could stock only a limited number of common items; and the delivery and inventory costs were highB. They could stock a large number of necessary items; and the business thrivedC. They could stock a large number of necessary items; and the business suffered losses as many of the items perished for lack of refrigerationD. They could stock a large number of uncommon items; and the business suffered losses as the items couldn’t be sold

19. In a restaurant business, the Internet can provide:

A. Menus and it cannot handle multiple customers at the same timeB. Menus and it is better at handling multiple customers at the same timeC. Menus and it can handle one customer at a timeD. Menus and it cannot handle customers’ requests at all

20. Most restaurants are small businesses, and they have resisted:

A. Catering all sorts of ethnic food items B. Building the infrastructure to provide many Internet-based featuresC. Opening the restaurants after midnight every week day D. Increasing the price of their food items

21. Real estate commissions are often priced at ____of the sale price, which can be a high value for expensive houses.

A. 20 B. 6 C. 1 D. 50

22. Airlines have offended the __________________, but the people who travel the most are willing to _______________ directly to save money and gain control over their choices.

A. Homeland security agents, purchase tickets B. Travel agents (traditional distribution channel), purchase ticketsC. Department of transportation agents, purchase flight insurances D. Jet fuel agents, purchase upgrades

23. Both GM and Ford have experimented with online sales of new cars, with__________.

A. Minimal successB. Great success C. Lots of losses D. Profits

24. Consumers have the choice of paying _______________ (at a traditional store) to obtain an item immediately, or waiting and paying __________________ through EC.

A. Higher price, lower price B. Lower price, higher price C. Higher price, higher price D. Lower price, lower price

25. Dell has been successful at selling computers over the Internet by making it:

A. Easy to configure and compare prices B. Easy to hold of the computers in a day or twoC. Easy to receive the attention of the customer service agents D. Easy to have the computers repaired

26. In late 2000, many consumers found how easy it was to distribute digital music over the Internet using _____________--even though it was illegal.

A. HTML files B. XML files C. MP3 files and Napster D. UDDI files

27. Several companies (particularly Microsoft and RealNetworks) are working on:

A. Digital rights management systems to prevent unauthorized copying

Page 28: testreview (1)

B. Digital rights management systems to authorize copyingC. Analog rights management systems to authorize recodingD. Analog rights management systems to prevent unauthorized recording

28. One difficulty with any protection system like the digital rights management schemes is that _________________________.

A. It is easy to stop someone from breaking the system B. It is difficult to stop someone from breaking the systemC. It is easy to track someone who is following the system D. It is easy to track someone who is breaking the system

29. The digital millennium copyright act (DMCA):

A. Does not apply to the people outside the United States. B. Does apply to the people outside the United StatesC. Does apply to the people world wide D. Does not apply to the people within the United States

30. M-commerce is a new service that can exist only with ____________________.

A. MAN B. The Internet or wireless technologies C. LAN D. WAN

31. The largest impact of Internet price competition will be on the ___________.

A. Retail firms B. Wholesale firms C. Consumers D. Vendors

32. By minimizing the aspect of location:

A. The existence of local firms is forgotten B. Local firms are highly recognizedC. The primary strength of local firms is eroded D. The function of local firms is undefined

33. In traditional stores:

A. Customers pay the same price for the same itemsB. Customers routinely are charged different prices for the same itemsC. Different customers are charged different prices for the same itemsD. Customers are forced to pay the highest amount they are willing to pay

34. Business-to-business e-commerce has the potential to be substantially more important than:

A. B2C e-commerce B. Traditional businesses C. Auction sites D. Local firms

35. __________ is a more flexible method of sharing data with suppliers and customers.

A. VRML B. XML C. HTML D. XGA

36. Eventually, the technology can be married with____________ to provide more automated intelligence to handle ordering basic items and to monitor the progress of standard order.

A. Decision support systems B. Management information systems C. Transaction processing systems D. Expert systems

37. To hold down transaction costs, it was simpler to establish:

A. Long-term relationships with a large number of companies B. Long-term relationships with a limited number of companiesC. Short-term relationships with a limited number of companies D. Short-term relationships with a large number of companies

38. _____________ is (are) useful for specialized products, when it is difficult to determine an asking price.

A. B2B B. Auctions C. B2C D. C2B

39. XML is creating opportunities for a new type of _______: Web sites that provide specific services that can be sold to other businesses.

A. C2C e-commerce B. C2B e-commerce C. B2B e-commerce D. B2C e-commerce

40. In connection with the increasing sales and reducing costs, one of the most important features is the ability of the Web site to connect to the:

A. Vendor’s database B. Customer’s database C. Corporate database D. Supplier’s database

41. ____________ Web sites supported by ______________ can help customers select options and products or solve problems.

A. Library of Congress, decision support systems B. Chatting, transaction processing systems

Page 29: testreview (1)

C. Educational, management information systems D. Intelligent, expert systems

42. Most people have used _____________ to find information on the Internet.

A. Web browsers B. Search engines C. Plug-ins D. GUI

43. To a consumer, ___________________ is an important element of buying products over the Internet.

A. High price B. Low price C. Good quality product D. Name recognition of a company

44. As people became disappointed with the advertising response, spending for ads ______ and the chain effect helped drive the ________.

A. Went up, EC grow B. Declined, EC crash C. Declined, EC grow D. Went up, EC crash

45. Increasingly, advertisers want to establish a relationship with_____________.

A. The potential customers B. The potential vendors C. The suppliers D. The accountants

46. Automobile manufacturers find it worthwhile to advertise on sites dedicated to _______________.

A. Electronic games such as yahoo.com B. Auto travel topics such as mapquest.com, yahoo.comC. Automotive topics such as vehix.com, Edmunds, and autobytel.com D. Auto repair topic such as autorepair.com

47. It is much simpler for both advertisers and publishers if everyone uses:

A. A few especial ads B. A few standard types of ads C. A few expensive ads D. A few custom made ads

48. Several companies sell software that retrieves ___________, analyzes _________, and creates ___________to help managers understand the traffic.

A. The log, the data, and graphs B. The data, the decisions, and textsC. The data, the data, and graphs D. The log, the decisions, and area maps

49. The statistics generated from the Web logs are useful to:

A. Identify the most important sections of your server and to spot problems with certain pages.B. Identify a large number of users connected to the networkC. Identify a selected number of users connected to the networkD. Identify a large number of users connected to the WAN

50. Companies will often start with _____________ and move to ____________ as they expand – particularly small firms or start-ups.

A. One option and other selections B. Two options and other slectionsC. Two selections and other options D. Three options and other selections

51. Web pages:

A. Cannot interact with your internal databases B. Can interact with your internal databasesC. Are coupled with your internal databases D. Are created to hide your internal databases

52. Regions Bank offers a third-party order-processing system called the _____________.

A. Transaction processing system B. Buy-Me Button C. Expert system D. Decision support system

53. While it is possible to create the Web sites using a third-party credit-card processor, the method is realistic only if the merchant is ___________________.

A. Selling a small number of products B. Selling a large number of productsC. Selling of a few number of products D. Not selling any products

54. ______________ auction sites exist on the Internet.

A. Several B. Two C. Three D. Five

54. Amazon MarketPlace enables merchants to:

A. Sell items by setting dynamic price B. Sell items by setting a fixed priceC. Sell items by setting a variable price D. Sell items by setting no price

Page 30: testreview (1)

55. The MarketPlace system has a good search engine and works well for:

A. Small retailers who wish to maintain a continued presence on the WebB. Large retailers who wish to maintain a continued presence on the WebC. Large retailers who do not care for continued presence on the WebD. Medium size retailers who not care for continued presence on the Web

56. ASP is a Web-based business that provides:

A. A specific service to other businesses B. Multiple services to other businessesC. A specific service to customers D. Multiple services to customers

57. In general, commerce server sites and ASPs are a good way to:

A. Get a quick start on a relational database B. Get a quick start on the InternetC. Get a slow start on the Internet D. Get a slow start on a data warehouse

58. The main benefit of using an outside hosting company is that:

A. It will handle all of the detailed technical issues automaticallyB. It will handle some of the technical issues automaticallyC. It will not handle any of the technical issuesD. It will handle some of the technical issues based on certain conditions

59. A catalog management system is designed:

A. To help programmers to develop a database of products for sale on Web sitesB. To help you maintain a database of products for sale on Web sitesC. To help you write codes for developing a database of productsD. To help you diagnose a set of codes for developing a database of products

60. A content management system is designed:

A. To help programmers to develop a database of products for sale on Web sitesB. To help you maintain a database of products for sale on Web sitesC. To help you write codes for developing a database of productsD. To make it easy for nonprogrammers to update content, maintain a consistent style, and keep track of changes to a Web site

61. Many municipal governments add their own sales taxes to:

A. Cover costs of public services B. Cover costs of local servicesC. Cover costs of state government services D. Cover costs of INS services

62. In 2003, Congress allowed the federal moratorium on:

A. Telephone taxes to expire B. Internet taxes to expireC. Tobacco taxes to expire D. Occupancy taxes (staying in hotels) to expire

63. E-commerce:

A. Has the potential to open up the global economy B. Does not have the potential to open up the global economyC. Has nothing to do with the global economy D. Cannot create a global marketplace

64. In 2001, France filed suit against Yahoo (a U.S. company) to force Yahoo:

A. To stop advertising cigarette selling in FranceB. To prevent French citizens from buying or selling Nazi-related items on the InternetC. To prevent French citizens from buying U.S. made alcoholic productsD. To prevent French citizens from buying U.S. made perfumes

65. Many U.S. Web sites:

A. Will accept overseas shipments because there is no any risk in the transactionB. Will not accept overseas shipments because the risk is too greatC. Will accept overseas shipments under all conditionsD. Will accept overseas shipments for some selected items

Page 31: testreview (1)

66. In 2000, a McKinsy study revealed:

A. Only 20 percent of the e-commerce firms were making a profit on sales, and the top firms were actually traditional firms, such as mail-order companiesB. 50 percent of the e-commerce firms were making a profit on sales, and the top firms were actually traditional firms, such as mail-order companiesC. 30 percent of the e-commerce firms were making a profit on sales, and the top firms were actually non-traditional firmsD. 40 percent of the e-commerce firms were making a profit on sales, and the top firms were actually non-traditional firms

67. ___________________ was a dominant factor in the failure of many of the early e-commerce firms.

A. Internet sales revenue B. Internet advertising revenueC. Internet auction sales revenue D. Internet-based clothes sales revenue

Chapter 9

1. __________________ provides several tools to integrate communication and document sharing for teams of workers.

A. Outlook Express B. Microsoft SharePoint C. CAD program D. MS Word

2. Instead of relying on rigid management hierarchies, __________________________.

A. Small teams can be created to solve problems as they ariseB. Each employee is empowered to solve problems as they ariseC. Employees at the operational level are asked to solve problems as they ariseD. Employees at the tactical level are asked to solve problems as they arise

3. Collaboration involves:

A. Scheduling tasks and maintaining project schedules B. Sending e-mails and managing tasksC. Programming and managing databases D. Developing expert systems for sales transaction

4. If you need to solve a difficult problem, you could turn to the ______________ to find similar problems or suggestions from workers who faced the same problems.

A. Database B. Knowledge base C. Transaction systems D. Management systems

5. Most organizations have a (n) ________ that establishes the priorities for selecting each technology and method to accomplish the goal.

A. Bank account B. Culture C. Expert D. Executive

6. In a group context, e-mail is important because is easy to send messages to the ________________.

A. A particular group member B. Entire group C. Only the group leader D. Business administrator

7. E-mail systems such as Lotus Notes and Microsoft Exchange were originally advertised as _______________ tools because of the support provided for attachments.

A. Firmware B. Database C. Groupware D. Software

8. Instant messaging has become popular in the past few years – particularly with _________.

A. Executives B. Managers C. Students D. Teachers

9. Most of the initial use of instant messaging has been among:

A. Individuals in a social context B. Individuals in a business communityC. Individuals in a teaching community D. Individuals in a law and enforcement context

10. If you are busy and receives an IM request, you _____________________.

A. Can still choose to ignore it until you have time for a break B. Cannot wait to respond to the e-mailC. Have to send your response immediately D. Have to respond to the message within 15 minutes

11. NetMeeting supports:

A. Both text and file sharing as long as your computer is connected to a networkB. Both voice and video connections as long as you have microphone and webcamsC. Both programming and database management

Page 32: testreview (1)

D. Both e-commerce and m-commerce activities

12. Web pages are a (n) ______________________, where you can provide the same data to many people.

A. Object identification technology B. Broadcast technologyC. Food processing technology D. Transportation technology

13. ______________________ make (s) the scheduling a meeting or conference a little easier.

A. GIS B. GPS C. Electronic calendar tools D. FTP

14. Web logs or blogs were created largely for individuals to use to __________________.

A. Create audio and video programs B. Generate management programsC. Create diaries on the Internet D. Create monthly budget reports

15. The blog technology was largely developed to:

A. Create monthly budget reports B. Develop a databaseC. Overcome the difficulties in creating and updating Web sites D. Do programming efficiently

16. _____________________ were created to help manage and control groups of workers on large projects.

A. Scheduling tools B. Project management toolsC. Expert system management tools D. Executive information system management tools

17. Videoconference systems require:

A. Audio systems, radio systems, and a screen B. Video cameras, microphones, and television displaysC. Speech recognition systems, microphones, and speakers D. Transmitters, receivers and speakers

18. The primary drawback to the video conference systems is the ______________ required to transmit realistic video data.

A. Power B. Gain C. Bandwidth D. Entropy

19. Current video conference systems are useful for meetings with:

A. Multiple participants B. Ten or fifteen participants C. Twenty or twenty five participants D. Two or three participants

20. Microsoft’s Live Meeting is designed to handle as many as _________________.

A. A few hundred participants B. A few thousand participantsC. Twenty or twenty five participants D. Two or three participants

21. We can use ________________________ to continually e-mail new versions of documents to everyone in the group.

A. Netscape Navigator B. Expert systemsC. IBM/Lotus Notes or Microsoft Exchange D. Microsoft Outlook Express

22. ______________________ makes it easy to create Web-based projects and folders to hold team documents.

A. Firmware B. FTP C. Microsoft’s SharePoint system D. Microsoft’s PowerPoint system

23. Ford has a (n) _____________________ to provide real-time information and integration of customer and dealer data.

A. DSS B. EIS C. Customer knowledge system (CKS) D. Knowledge-based system (KBS)

24. Daimler-Chrysler expanded its IBM Lotus Notes system into an _____________ project.

A. E-commerce B. M-commerce C. E-collaboration D. E-mail

25. Version control is a powerful tool both for teams and for individual documents because it ____________________________.

A. Automatically corrects all documents B. Automatically prints every documentC. E-mails every document D. Automatically saves every document

26. Version control systems save:

Page 33: testreview (1)

A. Latest copy of every document B. Multiple copies of every documentC. Last two copies of every document D. Only the first copy of every document

27. Most version control systems work from:

A. A database B. PDAs C. Netscape Navigator D. Cell phones

28. You _____________ a file when you want to change it

A. Check out B. Check in C. Open D. Close

29. For IRM, each document is _____________ and the decryption keys are stored on _______________.

A. Edited and a client’s computer B. Encrypted and a special serverC. Printed and a third party’s computer D. Shredded and vendor’s computer

30. The main drawback to the IRM is that you need:

A. A computer to record all user IDs B. A printer to print the documentsC. A modem to send the e-mails D. A server to identify the users and provide the decryptions keys

31. Microsoft has embedded some workflow features into ________, but more sophisticated controls are available through ___________.

A. Outlook Express, IBM B. Office, specialized vendors such as Legato C. Netscape Navigator, HP D. Excel, Raytheon

32. In BPM, a large purchase requires:

A. Approval and evaluation by the head of the department B. Approvals and evaluations by several groupsC. Approval and evaluation by the CEO D. Approval and evaluation by the CIO

33. Most versions of a GDSS use a special:

A. A cubicle, where each participant has a computerB. Meeting room, where each participant is seated at a networked computerC. Studio room, where each participant can use painting softwareD. A conference room, where each participant can use a computer to deliver PowerPoint slides

34. If designed properly, a GDSS can give each participant:

A. Access to the corporate data while he or she is in the meeting B. Access to the software programs while he or she in the officeC. Access to the company library while he or she is in the office D. Access to the list of hardware while he or she is traveling

35. With GDSS, your focus is continually drawn to the many different comments and discussions:

A. Taking place at different times B. Taking place at the same timeC. Taking place at different places D. Taking place at the same place

36. The use of a GDSS requires:

A. A trained facilitator – someone who can lead discussions, help users, and control the GDSS software on the networkB. A facilitator who can present PowerPoint slides to usersC. A trained facilitator who is very knowledgeable about personal computersD. A facilitator who has knowledge about computer software and hardware

37. KM systems are designed to:

A. Organize information and to assist people in collaborative projects and researchB. Organize research data and assist scientists for making experimentsC. Assist employees to determine trip plansD. Assist salespersons to sell certain products

38. One of the biggest challenges with KM systems is creating an organizational environment that:

A. Encourages every employee to contribute knowledge into the systemB. Encourages managers to participate in developing the systemC. Encourages the operational employees to help develop the systemD. Encourages decision makers to store their knowledge in the system

Page 34: testreview (1)

39. Organizational memory represents the knowledge held:

A. Within the company and the processes and procedures used to perform the primary tasksB. Outside the company and the processes and procedures to collect data from a particular sourceC. Within the company and the processes and procedures used to reinvent new processesD. Outside the company and the processes and procedures used to gather information from outside sources

40. SharePoint is probably the easiest to configure and use since it is_________________.

A. Integrated with GDSS system B. Integrated with the standard Office suiteC. Integrated with NetMeeting D. Integrated with IBM Lotus Notes system

41. Most of the SharePoint tools are:

A. Standard Web protocols, so authorized users can use them even when they are travelingB. Non-standard protocols, so all users can use themC. Special protocols, so only a few users can use themD. Custom designed protocols, so only a class of users can use them

42. SharePoint will also integrate with:

A. Netscape Navigator, so meetings can be scheduled and the reminders will be forwarded for participationB. Microsoft Outlook, so meetings can be scheduled and automatic reminders will be generated for participationC. Microsoft PowerPoint, so slides can be generated for presentation to an audience of computer literatesD. Microsoft Excel, so spreadsheets can be drawn for monthly budget maintenance

43. For complete version control including the ability to automatically track changes, you will need:

A. Microsoft Outlook Express B. Visual Source Safe, Microsoft’s version control softwareC. Netscape Navigator D. Microsoft NetMeeting

44. SharePoint provides a couple of tools to help with workflow:

A. Tools to do the programming and develop database B. Tools to integrate the features of communications and collaborationC. Tools to design expert systems and collect data D. Tools to develop data warehouse and drill through the data

45. Electronic calendars and project management tools help everyone identify:

A. Syntax errors in computer programming B. Loss due to everyday salesC. Bottlenecks and keep projects on schedule D. Stored image data and audio data

46. SharePoint provides several tools to integrate the elements of the:

A. E-mail and voice mail tools B. Office suite as well as communication and collaboration toolsC. Netscape Navigator as well image processing tools D. Windows XP as well as audio processing tools

Chapter 10

1. EIS systems can:

A. Provide detailed data on any aspect of business B. Display audio outputs of the systemsC. Provide the high level codes of the systems D. Show charts, summaries, and detailed data

2. ______________ made it easier to analyze data, evaluate models, and create charts.

A. Audio and video outputs B. Text outputs C. Programmers D. Spreadsheets

2. Data mining systems use:

A. Geometrical tools to evaluate data, and searching for important relationships and classifying groups of dataB. Statistical tools to semiautomatically evaluate data, searching for important relationships and clustering or classifying groups of dataC. Flow diagram to evaluate data and clustering groups of dataD. Networking to evaluate data and clustering groups of data

3. The study of human brains yielded clues that led to the development of ____________.

A. Wide area networks B. Local area networks C. Neural networks D. Wonderlands

Page 35: testreview (1)

4. Neural networks dramatically improve the ability of machines to perform _______________.

A. Statistical computations tasks B. Mathematical computation tasksC. E-mail forwarding tasks D. Pattern recognition tasks

5. Many problems involve:

A. Numerical data and analyses of the data B. Nonnumerical data and complex interrelationships among the various factorsC. Video data D. Audio data

6. The research into techniques that might make computers “think” more like humans is known as_______________.

A. Neural network based intelligence B. Artificial intelligenceC. Human intelligence D. Cognitive intelligence

7. As a manager, it is your responsibility to:

A. Identify decisions that can be handled by machine systems and to recognize when these systems do not workB. Collect and process dataC. Analyze the data using various data processing toolsD. Build an appropriate decision process

8. Using ______________________, the farmers were able to substantially reduce the production costs.

A. Interpolation methods B. Geometrical methods C. Optimization methods D. Algebraic methods

9. A few companies have established:

A. An environment in which employees compete with each other when working on a group projectB. A culture that focuses on continual improvement and growthC. An environment in which managers at the tactical level do not have to make any decisionsD. An environment in which managers at the operational level do not have to make any decisions

10. When people make decisions with minimal data and no logical analysis, the results are going to be ____________ and ______________.

A: Consistent and helpful B. Inconsistent and dangerous C. Dependent and helpful D. Consistent and predictable

11. The main point to remember is that making decisions without:

A. Assumptions lead to poor decisions B. A good model and process leads to poor decisionsC. The knowledge of the daily sales data leads to poor decisions D. Consulting with the operational managers leads to poor decisions

12. _______________ cause people to alter their decisions and decision-making processes.

A. Personal pressures B. Tactical manager’s pressures C. Operational manager’s pressures D. Social pressures

13. Business models typically use:

A. Flow diagrams to represent various aspects of the process and relationshipsB. Digital logic diagrams to represent the process and various relationshipsC. Mathematical equations to represent the process and the various relationshipsD. Venn diagrams to represent the process and the various relationships

14. Models are used to search for the best solution:

A. Maximizing costs, improving effectiveness, and increasing sales B. Maximizing costs, improving efficiency, and decreasing profitsC. Minimizing costs, improving efficiency, and increasing profits D. Minimizing costs, improving effectiveness, and decreasing profits

15. Sample data is used to forecast future changes based on the:

A. Sales B. Profits C. Model D. Costs

16. The first step in prediction requires that you have a model that describes the situation. Then the data is collected and statistical techniques are used to estimate the ________________ of the model for the specific problem.

A. Frequency B. Efficiency C. Parameters D. Response time

17. Prediction techniques such as:

Page 36: testreview (1)

A. Extrapolation techniques are used to examine the data, identify trends, and predict possible independent variablesB. Fourier series forecasting are used to examine the data, identify trends, and predict possible independent variablesC. Regression and time series forecasting are used to examine the data, identify trends, and predict possible independent variablesD. Discrete mathematics are used to examine the data, identify trends, and predict possible independent variables

18. Optimization evaluates a model in terms of the:

A. Outputs and searches for the most efficient outputB. Environmental factors and searches for the best outputC. Inputs or control parameters and searches for the best solutionD. Ambient pressure and temperature, and searches for the best output

19. Some optimization models have resulted in:

A. Increased cost B. Substantial savings in cost or increases in profit C. Increased loss D. Decreased sales

20. Choosing between the two methods, regression and moving averages, requires some expertise in:

A. Geometrical analysis B. Statistical analysis C. Numerical analysis D. Vector analysis

21. Engineers can perform experiments on models:

A. That would not be safe in real life B. That would never yield estimated parametersC. That would result in unrealistic outputs D. That would never yield optimal solutions

22. In an object-oriented simulation, the simulation system:

A. Generates the estimated system parameter valuesB. Generates orders, makes shipments, and orders inventory according to programmed rulesC. Generates profit and loss history of the businessD. Generates the predicted values of various aspects of the business

23. Spreadsheets are often used:

A. To create graphs and pictures to show interrelationships B. To analyze small models and graph the resultsC. To study large models D. To support complex analysis

24. More sophisticated simulation packages:

A. Cannot analyze small models and graph the resultsB. Cannot support the study of large modelsC. Support more complex analysis and will automatically create graphs and pictures to show interrelationshipsD. Cannot display statistics graphically or in tabular reports

25. Transaction systems are designed to:

A. Search data B. Analyze dataC. Store data, not to search and analyze it D. Store, search and analyze data

26. A (n) _________________ extracts and stores the data in a clean, easy-to-analyze format.

A. Executive information system B. Expert system C. Data mining D. Data warehouse

27. A data warehouse is commonly used as a method to provide data to decision makers without interfering with the _____________.

A. Transaction processing operations B. Executive information systemsC. Decision support systems D. Expert systems

28. _______________ are basically copies of a small portion of the data warehouse designed to feed a specific application.

A. Metadata B. Data marts C. Wal-Mart D. K-Mart

29. _____________ is used to describe the source data, identify the transformation and integration steps, and define the way the data warehouse is organized.

A. Data marts B. K-Mart C. Metadata D. Wal-Mart

Page 37: testreview (1)

30. Most OLAP tools depict the data as:

A. One-dimensional plot B. Two-dimensional plot C. 3 D cubes D. Multidimensional cubes

31. Managers use specific OLAP tools to examine:

A. One section of the data B. Two sections of the data C. Multiple sections of the data D. Three sections of the data

32. Although most DBMS vendors provide OLAP cube browsers, _____________ provides Pivot Table interface that works with almost any DBMS or spreadsheet.

A. IBM B. HP C. Oracle D. Microsoft

33. A pivot table is created on the user’s machine – most users will build pivot table inside of ___________________.

A. Microsoft PowerPoint B. Microsoft Word C. Microsoft Access D. Microsoft Excel

34. A decision support system consists of three basic components:

A. Input data, model parameter estimates, and model outputsB. Data retrieval, model evaluation, and visualization of the resultsC. Information technology, model optimization, and visualization of the resultsD. Information systems, model evaluation, and data processing

35. Several different marketing forecast methods can be used, but a straightforward approach is to begin with:

A. Customer forecasts B. Marketing forecasts C. Geometrical forecasts D. Statistical forecasts

36. The sales estimate is based on:

A. Economics B. Political capitals C. Ergonomics D. E-commerce

37. Sales are dependent on:

A. Hardware used to make sales B. Time and consumers’ incomeC. DBMS used to make sales D. Software programs used for making sales

38. Typically, each manager is given:

A. Unlimited amount of money to allocate among the employees B. $ 20,000.00 to allocate among the employeesC. A fixed amount of money to allocate among the employees D. $100,000.00 to allocate among the employees

39. _____________________ can be used to model the effects of various merit pay related policies.

A. A computer B. A spreadsheet C. A notebook D. A datasheet

40. To choose the site of retail outlets, you need to know:

A. The economic status of the neighboring businesses B. The profit and loss of the businesses in the neighborhoodC. The location and travel patterns of your potential customers D. The financial status of your potential customers

41. Manufacturing can be made more efficient:

A. If you know the life style of your potential customers B. If you know the locations of raw materials, suppliers, and workersC. If you know the travel patterns of your potential customers D. If you know the financial status of your potential customers

42. GISs have been designed to identify and display:

A. Relationships between daily sales and the weather of the dayB. Relationships between business data and locationsC. Relationships between business profits and retail salesD. Relationships between the customers’ travel patterns and the daily sales

43. There are two basic ways to create and store the underlying maps:

A. As text data or as audio data B. As video or as numeric dataC. As pictures or as digitized map data D. As text or an analog map data

Page 38: testreview (1)

44. Each digitized map data is stored by its location as measured by:

A. Radius, azimuth, and height in cylindrical coordinates B. Latitude, longitude, and sometimes its elevationC. x, y, and z in Cartesian coordinates in space D. Radius, elevation and azimuth in spherical coordinates

45. The U.S. Department of Defense had digital data available for many areas, including:

A. Entire U.S. locations, and often includes azimuth data B. International locations, and often includes elevation dataC. Iraq, Kuwait, Afghanistan, and Pakistan locations D. China, North Korea, and Japan locations

46. The U.S. Geological Survey topographical maps are being converted to:

A. Digital systems B. Analog systems C. Text data D. Numeric data

47. Digital maps often contain missing, incomplete, or inaccurate data – as the United States learned when it accidentally blew up the _________________ in Belgrade because the CIA maps were out of date.

A. Sudanese embassy B. Japanese embassy C. Chinese embassy D. Pakistani embassy

48. In GPS, a portable receiver tuned to the satellites will identify your location in:

A. x, y, and z in Cartesian coordinates B. Latitude, longitude, and elevationC. Radius, azimuth, and elevation in spherical coordinates D. Radius, azimuth, and height in cylindrical coordinates

49. If you work for the Department of Defense, you can get receivers that will identify your location within a _______________.

A. Few feet B. Few centimeters C. Few meters D. Few millimeters

50. Civilian models that combine GPS signals from U.S. and Russian satellites provide________________.

A. Worse resolution B. Better resolution C. About the same resolution D. No location information

51. __________________ is (are) a key statistical tool that is leveraged in data mining.

A. Estimation B. Mean C. Correlation D. Correlation coefficient

52. ___________________ tries to find groups of items that have similar attribute values.

A. Planning B. Clustering C. Averaging D. Extrapolating

53. Business decisions are subject to a wide variety of ____________________.

A. Discrimination laws B. Nondiscrimination lawsC. Traffic laws D. Security laws

54. In most situations, an inference engine:

A. Applies new data to the database and analyzes all the data to reach a conclusionB. Applies new observations to the database and analyzes the observations to reach a conclusionC. Applies new observations to the knowledge base and analyzes the rules to reach a conclusionD. Applies new data to the database and analyzes the latest data to reach a conclusion

55. A knowledge base consists of:

A. Data, inference engine, and database B. Data, rules, logic, and links among data elementsC. Input data, database, and inference engine D. Output data, inference engine and processing rules

56. Probably the greatest difficulty in creating an expert system is determining the _________ that will lead to the proper conclusions.

A. Input data B. Rules or frames C. Inference engine D. Database

57. In general, if there are N cells in a neural network, there are:

A. N/2 possible connections B. N (N-1) possible connectionsC. N (N-1)/2 possible connections D. N (N+1)/2 possible connections

58. In many ways, training a neural network uses:

Page 39: testreview (1)

A. Linear systems theory B. Random processes and estimation theoryC. Basic properties of statistics related to data sampling and regression D. Mathematical statistics related to data processing

59. The challenge was to create an automated vehicle that could drive itself across _____________ miles of desert hitting about ______________ GPS waypoints in about ________ hours.

A. 10, 100, and 1 B. 100, 200, and 3 C. 189, 1,000, and 10 D. 150, 500, and 20

60. A (n) ____________________ can analyze past loans and determine the rules that should be used to grant or deny future loans.

A. DSS B. ES C. Neural network D. MIS

Chapter 11

1. The discount airlines, led by ________________________, have been profitable over the last few years-because they have found a way to attract customers and hold down costs.

A. Northwest and joined by TWA and JetBlue B. American and joined by Delta and SouthwestC. US Air and joined by American and AirTrans D. Southwest and joined by JetBlue and AirTrans

2. Starting an e-business adds several steps, including:

A. Developing transaction systems and selecting employeesB. Managing executive information systems and tactical management systemsC. Selecting business partners and developing decision support systemsD. Developing software and selecting ISP

3. Information systems designed for competitive advantages are not much different from:

A. Human resources management and expert systems B. Executive management systems and business processing systemsC. Transaction-processing and decision support systems D. Business processing systems and accounting systems

4. In many cases, advantage over your rivals can result from changes in the:

A. Executive management systems and expert systems B. Basic transaction-processing systems and business methodsC. Human resources systems and executive management systems D. Basic operation-processing systems and employee management systems

5. A common thread in gaining a competitive advantage is to improve the:

A. Ties with employees and inventories B. Relationships among operational managers and tactical managersC. Ties and communication with suppliers and consumers D. Ties and communications with managers and executives

6. Designing ____________________ can be a dangerous task with many opportunities to fail for many businesses.

A. Transaction systems B. Operational systems C. Tactical systems D. Strategic systems

7. Federal Express uses _______________ to differentiate its service from its rivals’ offerings.

A. Expert system B. Executive information C. Accounting system D. Tracking information

8. The airlines used their ____________________ to give them a competitive advantage in transportation services.

A. Expert systems B. Executive information systemsC. Ticket counting systems D. Reservation systems

9. Strategic systems can sometime come close to breaking the ____________.

A. Probate laws B. Criminal laws C. Antitrust laws D. Commercial laws

10. As eastern European economies rebuild, as the European Union takes shape, and as Mexican incomes increase, _________________.

A. Consumers have to pay more for their products B. Consumers cannot buy more productsC. Consumers will be able to buy more products D. Consumers will be able to buy products at lower prices

12. ____________ consist (s) of suppliers, customers, rivals, potential new entrants, substitute products, and sometimes the government.

A. Internal agents B. External agents C. European Unions D. Mexican Unions

Page 40: testreview (1)

13. Form a systems perspective, each of the entities in the Porter’s Five Forces model:

A. Has strong relationship with the firm B. Is under the control of the firmC. Is outside the control of the firm D. Can greatly influence the firm

14. It is called ______________ when a company owns several pieces of the production chain.

A. Horizontal integration B. Customer integration C. Employee integration D. Vertical integration

15. It is called ______________ when a company expands by building related businesses.

A. Horizontal integration B. Customer integration C. Employee integration D. Vertical integration

16. A common strategic goal is to:

A. Get closer to the employees B. Get closer to the managersC. Get closer to the customers D. Get closer to the executives

17. Three major issues involving suppliers are:

A. Inventories, vendors, and quality B. Quality, sales, and profitsC. Price, quality, and delivery D. Price, profits, and operational managers

18. _________________ is more difficult when there are several layers of suppliers.

A. Employee management B. Quality managementC. Human resources management D. Customers management

19. American Airlines and United Airlines spent millions of dollars to build reservation systems as ______________.

A. Operational systems B. Strategic systems C. Executive systems D. Tactical systems

20. GIS helps you analyze and display relationships based on ______________.

A. Acceleration B. Speed C. Size D. Location

21. _________________________________ is (are) two leading products for displaying of geographic information.

A. MS Excel and Word B. MS Word and PowerPointC. ESRI’s ArcInfo and MS MapPoint D. MS Access and Word

22. The critical feature of a ________ is the ability to display geo-coded data.

A. EIS B. MIS C. GIS D. DSS

23. The firm that first implements a new strategy can:

A. Gain popularity among other businesses B. Gain recognition and market shareC. Gain popularity but lose market share D. Identify the major rivals

24. Merrill Lynch, the stock brokerage firm, introduced a service enabling customers to store their money in a wide variety of financial instruments that paid:

A. Significantly higher interest rates than savings accounts B. Significantly higher interest rates than checking accountsC. Significantly lower interest rates than checking accounts D. Significantly lower interest rates than savings accounts

25. In fact, some reports (such as 10K or 10Q financial reports) are required to be filed __________.

A. Manually B. Electronically C. By USPS D. By UPS

26. The rapid changes in technology often lead to competitive advantages:

A. If your firm is the last to find a creative use for the new technologyB. If your firm is the first to find a creative use for the new technologyC. If your firm never finds a creative use for the new technologyD. If your firm is the second to find a creative use for the new technology

27. A fundamental concept of economics is that in order to make extra profits, you need some mechanism to:

Page 41: testreview (1)

A. Allow other firms to enter the production chain B. Allow other firms to develop a unique strategyC. Allow other firms to enter the industry D. Prevent other firms from entering the industry

28. Although there is disagreement on the cause of the problems, the ability to control distribution channels can be an effective strategy for:

A. Maintaining interrelationships and ties among the employees B. Maintaining sales and profit levelsC. Maintaining market share and deterring rivals D. Maintaining good relationships with the competitors

29. In Japan, most new automobiles are sold by salespeople who:

A. Call on customers at their offices B. Call on customers at their homesC. Attend customers at automobile sales offices D. Help customers for e-sales

30. ____________ might be used to provide faster responses to retailer and consumer questions.

A. Executive information systems B. Decision support systemsC. Expert systems D. Geographic information systems

31. The ________ could eventually become the major distribution system for digital data such as books, music, software, and videos.

A. Intranet B. Internet C. Extranet D. Fire wall

32. Transaction-processing and accounting systems decrease ______________.

A. Inventory ordering and holding costs B. Administrative costsC. Manufacturing costs D. Marketing costs

33. Robots and process-control systems can be used to control ______________.

A. Inventory ordering and holding costs B. Administrative costs C. Manufacturing costs D. Marketing costs

34. Inventory systems are used to track parts and reduce _____________________.

A. Inventory ordering and holding costs B. Administrative costs C. Manufacturing costs D. Marketing costs

35. Marketing systems might be used to create better target marketing, with the advantages of improved response and lower __________.

A. Inventory ordering and holding costs B. Administrative costs C. Manufacturing costs D. Marketing costs

36. A Classic case of using technology to create a new product is portrayed by ___________.

A. Microsoft B. Motorola C. JCPenney D. Merrill Lynch

37. A classic case of using information systems to modify a product for competitive advantage came from _________________.

A. UPS B. Amtrak C. Federal Express (FedEx) D. Napster

38. UPS takes a slower approach and cycles its technologies:

A. Every ten to twelve years, phasing in the new technologies as they become more stableB. Every five to seven years, phasing in the new technologies as they become more stableC. Every two to three years, phasing in the new technologies as they become more stableD. Every fifteen to twenty years, phasing in the new technologies as they become more stable

39. FedEx is now looking for ways to make additional information available to drivers through _________________.

A. DNA technology B. Nano technology C. Wireless technology D. VLSI technology

40. Both FedEx and UPS are working at embedding _________ units to reroute delivery trucks if a customer calls with a last-minute pickup request.

A. MIS B. EIS C. DSS D. GPS

41. Motorola is one of the leading proponents of _________________.

A. Human resources management B. Total quality managementC. Information systems management D. Trucking systems management

Page 42: testreview (1)

42. ISO 9000 requires companies to measure quality at________________.

A. Early stages of production B. Later stages of productionC. Middle stages of production D. All stages of production

43. _________________ can be used to improve quality.

A. DSS B. EIS C. GIS D. GPS

44. ___________________ can also be employed to control errors and locate the source of the problems.

A. DSS B. Expert systems C. GIS D. GPS

45. Digital used ______________ to improve quality and cut the cost of installing minicomputers.

A. DSS B. Expert systems C. GIS D. GPS

46. Production processes are directly supported by:

A. Operational managers B. Tactical managers C. Design, engineering, and marketing D. Customers and employees

47. Market measures and firm performance measures are used to:

A. Emphasize employee performance B. Highlight problems and opportunitiesC. Detect new entrants D. Detect barriers to entry

48. Corporate strategies are developed from:

A. Employee background B. Process improvements and innovationsC. Purchasing capabilities of the customers D. Suppliers’ attitude

49. Information technology provides many opportunities for:

A. Enhancing the interpersonal relationships among the employees B. Improving the fundamental business processC. Finding the customers D. Locating the new entrants

50. The design process must:

A. Optimize the production line to maximize costs and retain high qualityB. Optimize the production line to minimize costs and retain high qualityC. Minimize the production line to minimize costs and retain high qualityD. Maximize the production line to maximize costs and retain high quality

51. Support for engineering and design takes the form of ______ systems that make it easy to create, modify, store, and share new designs.

A. GIS/GPS B. DSS/EIS C. CAD/CAM D. LAN/WAN

52. Mass customization requires an IT system that:

A. Links the production system to the engineering systemB. Links the sales system directly to the production line and through to supply.C. Links the supply system directly to the engineering systemD. Links the design system to the engineering system

53. _______________ can be used to schedule routine maintenance and spot problems before they cause problems.

A. DSS B. Expert systems C. GIS D. GPS

54. Implementation of just-in-time (JIT) inventory systems is largely credited to:

A. U.S. manufacturers B. Japanese manufacturers C. European manufacturers D. Mexican manufacturers

55. _______________ is (are) being used by leading firms to identify patterns and possibilities for new sales.

A. Expert systems B. Geographic information systems C. Executive information systems D. Decision support systems

56. _______________ is (are) being used by leading firms to develop initial ideas for advertising and promotional campaigns.

Page 43: testreview (1)

A. CAD B. CAM C. Multimedia tools D. HTTP

57. Leading firms are also using _____________ to assist customers in choosing the products and options that best match their needs.

A. Expert systems B. Geographic information systems C. Executive information systems D. Decision support systems

58. One of the more dramatic IT support mechanisms for management is an:

A. Expert system B. Geographic information system C. Executive information system D. Decision support system

59. Strategic changes often involve:

A. Applying for funds from a bank before changes are considered B. Laying off old employees before changes are madeC. Hiring new IS teams before any of your competitors D. Implementing new technology before any of your competitors

60. When developing and choosing strategies, you must always remember that:

A. Innovations are free from risks and often do not carry high capital costsB. Innovations carry low capital costs and always lead to a successful businessC. Innovations can be risky and often carry high capital costsD. Innovations always take away money from other projects

61. Although the competition is good for the customer, the increased expenditures can cause problems for the company:

A. If the employees are laid off B. If the ideas do not work as well as you expectedC. If new employees are hired at high salaries D. If new managers are hired for the new services

62. Many potential strategies violate:

A. Einstein’s law of relativity B. Newton’s second law C. Antitrust laws D. Moore’s law

63. Attempts to monopolize a market are forbidden by the:

A. Moore’s law B. Newton’s first law C. Sherman Antitrust Act D. Einstein’s law of relativity

64. In 1980s, the government was:

A. Very strict about antitrust issues, including those regarding information systemsB. Relatively lenient about antitrust issues, including those regarding information systemsC. Relatively strict about antitrust issues, including those regarding information systemsD. Oblivious about antitrust issues, including those regarding information systems

65. Entrepreneurship is built on three broad fundamentals:

A. An idea, a business plan, and implementation B. An economic plan, manpower requirement, and business siteC. A group of managers, human resources, and CEO D. A CEO, a CIO, and a Treasurer

66. You need to create a complete set of __________ that reflect the anticipated position of the firm for the first few years.

A. Technical documents B. Accounting statements C. Travel documents D. Software and hardware systems

67. When searching for ideas, it might be better to partner with a _________________ instead of competing head-on.

A. Small firm B. Large firm C. Medium firm D. Distributor

68. You will need to create a sales management plan, where you focus on the __________________.

A. Internal structure of the human resources B. Internal structure of the engineering departmentC. Internal structure of the research and development department D. Internal structure of marketing department

69. Companies are incorporated by:

A. The commerce department and the commerce department has different requirements and filing feesB. The IRS and the IRS has different requirements and filing feesC. The state and states have different requirements and filing feesD. The state department and the state department has different requirements and filing fees

Page 44: testreview (1)

70. Companies must obtain:

A. Social security number from the IRS B. Tax ID from the stateC. Tax ID from the town D. An EIN from the IRS

Chapter 12

1. The ___________ is charged with controlling civilian and military uses of U.S. airspace.

A. U.S. Air Force B. U.S. Navy C. U.S. Army D. FAA

2. Three basic development techniques are:

A. Preliminary investigation, systems analysis, and systems designB. Systems acquisition, systems implementation, and systems maintenanceC. Fact-finding, documentation, and presentationD. Systems development life cycle (SDLC), prototyping, and end-user

3. As a manager, you need to understand the _______________________ issues facing MIS departments.

A. Human resources and transportation B. Costs and managementC. Employment and operational D. Supply and transaction

4. Instead of programming each line in COBOL, a report can be created in a few minutes using:

A. An expert system or a DSS B. A database management system or a spreadsheetC. A MS Word or an access program D. A MS PowerPoint

5. The main objective of prototyping is to create a working version:

A. Whenever it possible B. As quickly as possibleC. For the use of the managers only D. For the use of the operational employees only

6. The third method of creating software systems, _____________________, relies on users to create their own systems.

A. SDLC B. Prototyping C. End-user development D. CASE

7. In the process of systems development, case studies indicate that major problems have arisen during the phase of _______________.

A. Do a detailed analysis of the system B. Design the systemC. Develop/acquire the system D. Implementation of systems

8. ______________ is the largest worldwide consulting firm in management information systems.

A. McKinsey and Co. B. Electronic Data Systems C. Accenture D. Rational Rose

9. ________________, a strategic consulting firm, examines organizations with a copyrighted “Seven S” model.

A. McKinsey and Co. B. Electronic Data Systems C. Accenture D. Rational Rose

10. _______________, started by Ross Perot, purchased by GM, and now independent, is the largest outsourcing company.

A. McKinsey and Co. B. Electronic Data Systems C. Accenture D. Rational Rose

11. _________, a tool to support object-oriented development, is a graphical tool designed to show the object details and their relationships.

A. McKinsey and Co. B. Electronic Data Systems C. Accenture D. Rational Rose

12. With ___________________, led by Richard Stallman and the GNU project, thousands of programmers around the globe are building complex projects in a loosely knit organization.

A. Microsoft B. Proprietary source C. Open source D. Rational Rose

13. The primary advantage of outsourcing is that:

A. Saving trouble for your own IS departmentB. The external company takes responsibility for managing the process and producing the applicationC. They have more experience with a variety of programming needs

Page 45: testreview (1)

D. They will define for you exactly how the application should work

14. As the number and quality of software packages have increased, it has become easier:

A. To build a system from scratch B. To outsource for building a systemC. To build a system based on COTS D. To reengineer a system

15. The main drawback with purchased components is:

A. Reengineering your own applications B. They are expensiveC. The botheration of paying for upgrades D. They do not always work together well

16. Many outsource specialists can build new applications faster with fewer errors because they:

A. Are better trained B. Have more experienceC. Can pull from previous contract applications for new ones D. Write their collection of components for common use

17. The degree of customization of purchased programming often depend on:

A. The need to track specific data B. The specialization of the uses of your firmC. Users’ understanding of the new programs D. Management’s attitude

18. The drawback to extensive customization is that it:

A. Usually doesn’t work correctly B. Requires specially-trained programmers and delays the projectC. Often results in unexpected outcomes D. Invalidates the warranty on the program

19. An important step in managing projects is:

A. Know everyone involved B. Duplicate important sections as a check one on the otherC. Find people who can work together compatibly D. To identify when the project becomes a runaway project

20. The SDLC approach encompasses ____________ basic stages.

A. Six B. Four C. Three D. Five

21. Systems design turns business requirements into a ________________ that is implemented, creating a new system.

A. Technical design B. Technical report C. Feasibility study D. Data flow diagram

22. The schedule is an important tool to evaluate the status of the project and the progress of the ____________.

A. Programmers B. Employees C. Vendors D. MIS teams

23. Projects are typically evaluated in three areas of feasibility:

A. Financial, time involved, and training B. Size of the project, testing, and implementationC. Economical, operational, and technical D. Hardware, software, and training

24. The feasibility study is used:

A. To determine the cost of the project B. To make sure management understands the projectC. As a reference throughout the project to make sure everything stays on track D. To explain the project to the end-users

25. The objective of systems analysis is to:

A. Put the system into operationB. Create complete technical specifications for the new systemC. Determine how the existing system works and where the problems are locatedD. Design the new system

26. Without planning and control, any project:

A. Gets successfully completed B. Will become a runawayC. Is completed within deadline D. Does not require any technical assistance

27. Control begins with a detailed plan and performance targets that enable managers to:

Page 46: testreview (1)

A. Explain the project to the end-users B. Make sure management understands the projectC. Evaluate progress and identify problems D. Put the system into operation

28. The objective of systems design is to:

A. Put the system into operation B. Create complete technical specifications for the new systemC. Design the new system D. Describe the new system as a collection of modules or subsystems

29. In most large projects, the actual coding takes ____________ percent of the total development time.

A. 8 to 10 B. 15 to 30 C. 40 to 50 D. 60 to 75

30. Systems implementation involves:

A. Splitting the new system as a collection of modules or subsystems B. Designing the new systemC. Generating complete technical specifications for the new systemD. Installation and changeover from the previous system to the new one, including training users and making adjustments to the system

31. _________________ is (are) objects or people who cause or facilitate changes.

A. Intelligent agents B. External agents C. Change drivers D. Change agents

32. In systems implementation, the goal is to implement systems in a manner that recognizes resistance to change but encourages people to _____________.

A. Reject the new system B. Design the new systemC. Accept the new system D. Create complete technical specifications for the new systems

33. The objective of maintenance is to:

A. Put the system into operation B. Identify the problems and determine how a computer system can solve themC. Make modifications to the system as necessary D. Create complete technical specifications for the new system

34. The job of overseeing and making the modifications necessary for the maintenance of the system is called ________________.

A. Putting the system into operation B. Peripheral systems maintenance C. Hardware maintenance D. Software maintenance

35. One difficulty with software maintenance is that every time you change a module, you run the risk of:

A. Crashing the system B. Confusing the outcomesC. Use inconsistent naming conventions D. Adding bugs (defects)

36. Parallel conversion entails:

A. Changing to the new system one piece at a time for the entire company B. Changing everyone in only one unit to the new systemC. Running both systems side-by-side for a given period D. Choosing a day and going straight to the new system

37. Direct conversion entails:

A. Changing to the new system one piece at a time for the entire company B. Changing everyone in only one unit to the new systemC. Running both systems side-by-side for a given period D. Choosing a day and going straight to the new system

38. Phased conversion entails:

A. Changing to the new system one piece at a time for the entire company B. Changing everyone in only one unit to the new systemC. Running both systems side-by-side for a given period D. Choosing a day and going straight to the new system

39. An important concept for managers to remember when dealing with new systems is:

A. Setting a goal B. Questioning the value of the finished productC. Flexibility D. Putting the evaluation method in at the beginning of the project

40. The new system must:

A. Be within budget, on time, and meet all goals B. Meet all the objectives of the feasibility studyC. Be reliable, available, and secure D. Be documented before it is released

Page 47: testreview (1)

41. The primary purpose of the SDLC method of designing systems is to:

A. Make sure everyone works together B. Outline the entire plan for managementC. Save programming time D. Provide guidance and control over the development process

42. SDLC works best if:

A. Managers do not know what the system should do long before the system is createdB. Users do not have any idea about the proposed systemC. The entire system can be accurately specified in the beginningD. Documentations are not written

43. The SDLC works best for:

A. Small, easily updated systems B. Large, complex systems C. Expert systems D. Unstructured systems

44. Several researchers at Carnegie Mellon University have created the ______ to help development organizations evaluate their abilities.

A. Expert systems B. Unstructured systemsC. Capability maturity model integration (CMMI) D. Executive information systems

45. The two primary drawbacks to SDLC are:

A. Cost and the necessity for complex, long-term programming helpB. It does not allow for a prototype, and it is very time-consumingC. Getting everyone to agree to the feasibility study, and deciding if the outcomes have met the objectivesD. The time it takes and that all of the details must be specified up front

46. One of the main goals of object-oriented programming is:

A. To write computer programming codesB. To create relatively independent objects that can be reused for multiple applicationsC. To facilitate debuggingD. To communicate with other computers

47. Prototyping typically involves ____ user and _____ developer.

A: Two and three B. One and one C. Three and four D. One and two

48. The developer interviews the user and designs an initial system using a (an) _________.

A. Expert system B. DBMS C. DSS D. EIS

49. One of the most difficult steps in creating any new system is:

A. determining the time line B. Gaining management acceptanceC. Deciding which method to use to create it D. Determining the user requirements

50. The biggest drawback to JAD is that:

A. It involves paired programming, which is not efficient B. It requires management to make all user decisionsC. Conflicts are difficult to identify D. It requires getting everyone together at the same time for an extended period of time

51. Microsoft’s Windows XP name is:

A. Related to extreme programming B. Not related to extreme programmingC. Related to Windows 98 D. Related to WAN

52. One new aspect to XP is:

A. Parallel programming, where many programmers work togetherB. Paired programming, where two programmers work together constantlyC. Parallel programming, where three programmers work together constantlyD. Serial programming, where one programmer works constantly

53. Linus Torvalds uses open source development approach to create and distribute the ______________.

Page 48: testreview (1)

A. Windows XP B. Excel program C. Linux operating system D. Windows 98

54. A real problem with end-user development is that:

A. Users generally lack the training and experience of MIS analysts and programmersB. End users are too close to the problem to see the solutionC. End users have their own agendas and are not always aligned with company needsD. They prefer off-the-shelf software

55. The company needs to consider hiring more MIS personnel if:

A. The system repeatedly malfunctions B. Reports are always lateC. End users are spending much time creating their own applications D. Data is inaccurate or unavailable

56. One way to look at systems is to see them as:

A. A collection of processes or activities B. Circles C. Data progressions D. Their biological counterparts

57. If a system is entirely self-contained and does not respond to changes in the environment, it is called a(n) _______________.

A: Open system B. Parallel system C. Hybrid system D. Closed system

58. If a project is split into small parts and the parts given to independent teams:

A. The teams can lose sight of the overall goals B. The parts may not work together correctlyC. There is too much duplication of effort D. The result is likely to be efficient and efficacious

59. In a DFD, a closed rectangle represents:

A. A process B. An external entity C. A data store D. Feedback and control data

60. In a DFD, an open-on-one-side rectangle represents:

A. A process B. An external entity C. A data store D. Feedback and control data

61. In a DFD, a rectangle with rounded corners represents:

A. A process B. An external entity C. A data store D. Feedback and control data

62. In a DFD, an arrow with a dashed line represents:

A. A process B. An external entity C. A data store D. Feedback and control data

63. The first step in creating a DFD is to:

A. Determine the goals B. Determine the main entitiesC. Identify the primary processes D. Identify the environment and the boundaries of the system

64. The last step in creating a DFD is to:

A. Document the design B. Look at each process in detail and draw the expanded subsystemsC. Build the control flows D. Interconnect the data

65. The goal in object-oriented design is to:

A. Describe a system so that if you change a function, you only have to change one objectB. Describe the objects in general termsC. Describe the functions in general termsD. Describe the object hierarchy before describing the functions

Chapter 13

1. Making effective use of information systems requires organizing the MIS resources:

A. Technical expertise and programming abilities B. Hardware, software, data, and personnelC. Technical expertise, hardware and data D. Hardware, software, and technical expertise

Page 49: testreview (1)

2. In organizing information system resources, the goal is to balance:

A. The need to update continuously and the costs of so doingB. The need for central control with the value of decentralized decisionsC. Maintaining networks and training for new softwareD. Maintaining data and purchasing new hardware

3. Because personal computers have a huge price/performance advantage over larger computers, there is a major incentive to:

A. Maintain networks and training for new software B. Maintain data and purchase new hardwareC. Update hardware and software continuously D. Decentralize the hardware

4. In managing information systems, the goal of management is to find the appropriate balance between:

A. The need to update continuously and the costs of so doing B. Decentralization and costsC. Maintaining networks and training for new software D. Maintaining data and purchasing new hardware

5. The primary job of the MIS department is:

A. To manage the software and hardware B. To maintain the integrity of the company’s dataC. Provide timely, accurate, and relevant information D. To support and enhance the business

6. Mobile systems present more problems with in terms of security, beginning with the:

A. Training of the users B. Ability to track the use of the equipmentC. Loss of the equipment D. Carelessness of the users

7. The objective in scalable systems is to:

A. Buy hardware with enough power to allow many software upgradesB. Buy software that does not need to be upgraded when demands increaseC. Buy enough hardware and software in the beginning to allow for increased demandsD. Purchase only the level of hardware that is needed

8. Commercial software versions change almost every year, requiring more:

A. Hardware that is needed B. Training for users C. Software that is needed D. Word-processed documents

9. Besides the possibility of lower costs, it is better for the MIS department to support users directly because:

A. Training contracts with software suppliers are very inefficientB. It has a better understanding of the business problems they encounterC. Security becomes critical if users go outside the company for helpD. Combining several packages may be required

10. Most companies have ___________ track records in managing software projects.

A. Excellent B. Good C. Poor D. Fair

11. Programming major applications requires obtaining information from ______________.

A. Consultants and managers B. Suppliers and employees C. Users and managers D. Employees and executives

12. Standards incorporate what is known about a product at the time the:

A. Software is sold B. Software is updated C. Technology is developed D. Standard is developed

13. If there were standards that perfectly described a product, there would be only one way to compete:

A. Sales B. Price C. Profit D. Feature

14. If you attach a file in Word 2000 format, the recipient needs to have _______________ to read it.

A. HTML B. PDF C. RTF D. Word 2000

15. Because today’s databases are so crucial to the company, the business needs a (n):

A. Excellent MIS department B. Daily backup system

Page 50: testreview (1)

C. Separate storage area for copies of the database D. Carefully designed disaster and recovery policy

16. Security administration includes:

A. Installing network hardware and software, diagnosing problems, and designing new networksB. Training users, testing system configuration, and monitoring networks for ongoing attacksC. Several levels of analysts and programmersD. Database design and administration

17. CIO searches for and advocates:

A. Several levels of analysts and programmers B. Database design and administrationC. Strategic uses of MIS D. Training users, answering questions, and installing software

18. The CIO is responsible for:

A. Installing network hardware and software, and diagnosing problems B. Database design and administrationC. Long-run planning in terms of information technology D. Training users, answering questions, and installing software

19. Network management involves:

A. Installing network hardware and software, diagnosing problems, and designing new networksB. Database design and administrationC. Several levels of analysts and programmersD. Training users, answering questions, and installing software

20. U.S. programmers are paid about ________ times as much as Indian and Russian programmers.

A. 100 B. 50 C. 75 D. 20

21. Both India and Russia have:

A. No educational programs B. Lots of jobs for local programmersC. Very few programmers D. Extensive educational programs and few jobs for local programmers

22. Database management focuses on:

A. Installing network hardware and software, diagnosing problems, and designing new networksB. Database design and administrationC. Several levels of analysts and programmersD. Training users, answering questions, and installing software

23. Programmer/analysts find it easier to get jobs and obtain higher salaries if they:

A. Are willing to stay with the same company throughout their careerB. Switch jobs frequentlyC. Work as consultants or contract employeesD. Constantly update current skills and experience in new technologies

24. End-user support consists of:

A. Installing network hardware and software, diagnosing problems, and designing new networksB. Database design and administrationC. Several levels of analysts and programmersD. Training users, answering questions, and installing software

25. In the 1990s, the inability to hire IT workers, the increasing standardization of IT services, the desire to cut costs, and the need to focus on core business management resulted in:

A. Larger companies breaking up into smaller ones B. Smaller companies being overwhelmedC. The huge growth in outsourcing D. Increased emphasis in colleges on IT training

26. Most firms pay outside firms to handle the technical details of Website hosting and development because:

A. Webmasters are in short supplyB. It is less expensiveC. Their situations are unique and require advanced uses of information technologyD. Few firms have the expertise to securely configure the networks and servers required for e-businesses

Page 51: testreview (1)

27. One reason to reconsider the use of outsourcing is that:

A. It can be difficult to control the decisions of the outsourcing firm B. Employees are better trained than they used to beC. Responsibility for data must be retained within the firm D. Wireless connections may make it unnecessary

28. As reported in CIO Magazine, a study by DiamondCluster in late 2002 revealed that ______ percent of IT executives had to terminate outsourcing contracts early.

A. 10 B. 20 C. 50 D. 78

29. An SLA is a (n):

A. Expert system used by the managers B. Defined performance measure that is specified in the contractC. Memorandum of understanding D. Simulation technique

30. Globalization and new competitors result in:

A. The desire to minimize amount of management time devoted to non-revenue generating functionsB. The need for responsiveness and flexibilityC. Pressure and profitsD. The need to focus on increasing revenues and decreasing fixed/semi fixed costs

31. Shorter product life cycles and mass customization result/s in:

A. The desire to minimize amount of management time devoted to non-revenue generating functionsB. The need for responsiveness and flexibilityC. Pressure and profitsD. The need to focus on increasing revenues and decreasing fixed/semi fixed costs

32. Rapidly changing markets, flexible manufacturing result in:

A. The desire to minimize amount of management time devoted to non-revenue generating functionsB. The need for responsiveness and flexibilityC. Pressure and profitsD. The need to focus on increasing revenues and decreasing fixed/semi fixed costs

33. Cost cutting, staff cuts, loss of middle management result in:

A. The desire to minimize amount of management time devoted to non-revenue generating functionsB. The need for responsiveness and flexibilityC. Pressure and profitsD. The need to focus on increasing revenues and decreasing fixed/semi fixed costs

34. The two broad trends creating significant changes in the way we perceive and organize information are:

A. The growth of the Web and the sheer amount of information availableB. Declining sizes and prices of technology, and expanding access to the InternetC. Declining sizes and prices of technology and the growth of wireless technologyD. Computers and the Web

35. The goal of data warehouses is to:

A. Allow the company to charge a fee for the use of the data B. Advance internal organizationC. Make integrated data available anywhere to authorized users D. Maintain data security

36. With information systems, four basic areas subject to centralization or decentralization:

A. Hardware, software, data, and staffing B. Security, software, data, and hardwareC. Staffing, security, hardware, and software D. Data, security, staffing, and hardware

37. An advantage to the decentralization of software is:

A. Better understanding and communication B. Only data needing to be shared is availableC. Less chance of total breakdown D. Easier access and customization

38. An advantage to the decentralization of hardware is:

Page 52: testreview (1)

A. Better understanding and communication B. Only data needing to be shared is availableC. Less chance of total breakdown D. Easier access and customization

39. An advantage to the decentralization of data is:

A. Better understanding and communication B. Only data needing to be shared is availableC. Less chance of total breakdown D. Easier access and customization

40. An advantage to the centralization of hardware is:

A. Easier to see and control costs B. Security control and monitoring C. Ease of maintenance D. Efficient use of resources

41. An advantage to the centralization of data is:

A. Easier to see and control costs B. Security control and monitoring C. Ease of maintenance D. Efficient use of resources

42. An advantage to the centralization of personnel is:

A. Easier to see and control costs B. Security control and monitoring C. Ease of maintenance D. Efficient use of resources

43. An advantage to the centralization of software is:

A. Easier to see and control costs B. Security control and monitoring C. Ease of maintenance D. Efficient use of resources

44. A strength of Windows XP is:

A. Its compatibility with Apple software B. The ability to create individual user profiles on the serverC. Is makes automatic backups D. Each machine can be configured differently from the central server

45. The strongest advantage to decentralizing data is that it:

A. Makes it more difficult to hack intoB. It replicates data in many locationsC. Gives ownership of the data to the group that creates and maintains itD. Does not interfere with other users which many people need access to the data

46. MIS workers generally prefer a ________________ environment.

A. Centralized B. Decentralized C. Programming D. Controlled

47. The primary advantage to decentralized MIS staffing is that:

A. The support is closer to the users B. It is less expensiveC. The MIS staff on location can maintain hardware D. Networks will fail less frequently

48. A key benefit of the thin-client approach is that:

A. It allows for large data transfer B. It minimizes data replicationC. Clients can be built from relatively simple hardware and software D. It does not need a middle-ware component

49. The challenge for the security of data transfer is to:

A. Set up user profiles correctly B. Make it easy for authorized managers but impossible (or exceedingly difficult) for unauthorized usersC. Maintain data integrity D. Simplify data transfer to intranet servers

50. One way MIS departments try to reduce costs is to:

A. Stop purchasing software B. Standardize as much of the technology as possibleC. Build a standardized billing mechanism D. Stop purchasing hardware

51. Outsourcing provides:

A. A short-term increase in cash for the company B. Better services than in-house MIS can offerC. Less expensive because fewer in-house MIS personnel will be needed D. Less need to upgrade continually the skills of in-house personnel

Chapter 14

Page 53: testreview (1)

1. Sutter Health is working to implement paperless medical offices and already has ______ member physicians using a completely electronic system – including X-rays and prescriptions.

A. 9,000 B. 6,000 C. 1,200 D. 400

2. ___________ and ____________ issues become major areas of concern with medical information systems.

A. Health care costs and Vioxx B. Security and privacyC. Celebrex and health care costs D. Vioxx and celebrex

3. When you use information technology to help your company, it means you are collecting and analyzing:

A. Employee salaries B. Data on customers and employeesC. Financial status of customers D. Employee benefits

4. National and international markets developed with every change in:

A. The educational systems B. The communication and transportation systemsC. The health care systems D. The monetary systems

5. Most authorities think that increases in technology in the past generally led to:

A. A decrease in the number of jobs B. The number of jobs at a fixed levelC. An increase in the number of jobs D. An increase in unemployment

6. It is possible to collect an amazing amount of data on any person:

A. By collating private Website data B. Using individualized data from the U.S. governmentC. By gaining public access to his or her banking records D. Using publicly available data

7. Combining government statistics and data from market research firms with ______ can provide a precise picture of consumer demands.

A. Geographical data B. Sales data C. Analytical data D. Economical data

8. Credit card and credit bureau data are the two detailed sources of ______________.

A. Tracking data B. Consumer data C. IFF data D. Geographical data

9. Consumers have ________________ over the collection of personal data.

A. Lots of control B. Little control C. Slight control D. Moderate control

10. More than ______ of U.S. households signed up for the national do-not-call list to stop telemarketing calls.

A. Sixty percent B. Seventy percent C. Eighty percent D. Fifty percent

11. A Web cookie is a small ________________ that the server asks the browser to store on the user’s computer.

A. Data file B. Text file C. Image file D. Audio file

12. Anytime the user visits a site that deals with Doubleclick, the identifying cookie, date/time, and site visited are stored on ____________.

A. User’s servers B. Company’s servers C. Doubleclick’s servers D. Employer’s servers

13. With the _________ release of Windows, Microsoft is offering another option: the ability to refuse third-party cookies, such as those placed by Doubleclick.

A. NT B. 1998 C. 2000 D. XP

14. The federal e-911 law now requires cell phone operators to provide _________ data on cell phones.

A. Sales B. Bank C. Weather D. Location

15. Manufacturers have begun embedding _______________ within cell phones.

A. IC chips B. GPS locator chips C. Image processing chips D. Signal processing chips

16. ___________ and signal strengths are used as backup methods for determining cell phone locations.

Page 54: testreview (1)

A. Propagation B. Triangulation C. Transmission D. Radiation

17. Employers have the right to impose any controls or monitoring they wish as long as:

A. They do not violate other laws, such as the discrimination laws B. They keep adequate recordsC. They inform the employees of what is being done D. They can substantiate the need

18. C.J. Driscoll & Associates estimates that about ____________ fleet vehicles had GPS trackers installed in 2004.

A. Five million B. Two million C. One million D. Three million

18. Concerning the government and privacy issues, collecting data on targeted individuals such as dissidents or minorities can:

A. Lead to lawsuits B. Not be done legallyC. Stifle innovation D. Be perfectly legal only if the FBI does it

19. In 1991, _____ people were accused of selling Social security information, including six government employees.

A. 1800 B. 180 C. 18 D. 8

20. J. Edgar Hoover, longtime head of the FBI, collected thousands of secret files on politicians, journalists, and ___________.

A. Musicians B. School teachers C. Software engineers D. Business leaders

21. In 1994, according to the Associated Press, the bureau processed _____ million files, selling _____ million records a day and handling almost _____billion pieces of data every month.

A. 900, 3, and 4 B. 450, 1.5, and 2 C. 1350, 4.5, and 6 D. 1800, 6, and 8

22. In 2001, a federal rule took effect that was initiated by President Clinton to provide some control over the use of __________.

A. Financial data B. Sales data C. Medical data D. IFF data

23. Using _____________, some firms now offer people the ability to use the Internet without revealing any data about themselves.

A. The Privacy Act of 1994 B. Data protection directive C. Privacy Act of 1974 D. Advanced encryption

24. In 2004, _________ percent of hospitals stated that they are either installing electronic medical record systems or planning to do so soon.

A. 80 B. 60 C. 40 D. 20

25. The non-for-profit Health Technology Center suggests it will cost _________ over five years in state and federal money to create an integrated nation-wide medical record system.

A. $10 billion B. $20 billion C. $5 billion D. $2 billion

26. Norbert Weiner, a computer pioneer in the 1940s, predicted:

A. More jobs will be performed from remote locationsB. Employees will choose to remain closer to their homesC. A major depression would result from computers replacing workersD. Communications will include video links and faster document transfer

27. Despite Norbert Weiner’s predictions, during the last 100 years technology _____________________ the number of jobs and raised the standard of living for most workers.

A. Has decreased B. Has not changed C. Has increased D. Has exponentially decreased

28. Since the introduction of computers in the 1950s, the world’s economies have __________ and incomes have __________.

A. Not grown, decreased B. Grown, increased C. Grown, decreased D. Not grown, increased

29. As opposed to earlier jobs, most new jobs created today by technology:

A. Require a college degree B. Are simple entry-level positionsC. Are higher paying, physically safer, and less repetitive D. Are in the wealthier countries

Page 55: testreview (1)

30. Two important skills for an MIS employee to learn are:

A. Typing and patience B. Spreadsheets and databasesC. Predicting the future and evaluating the past D. Identifying trends and choosing between fact and rumor

31. Most Windows-based software contains features to facilitate usage by people with:

A. High intelligence B. Excellent programming capabilitiesC. Various physical challenges D. Good technical backgrounds

32. ________ percent of U.S. jobs are service-based.

A. 90 B. 70 C. 50 D. 30

33. More jobs can be performed from remote locations:

A. As employers realize the advantages of maintaining smaller central locationsB. As employees choose to remain closer to their homesC. As communication improves to include video links and faster document transferD. As bandwidth becomes less expensive

34. Two main advantages of having employees work from home are:

A. Less time wasted at the water cooler, and no lunch hours to pay forB. Employee work can be evaluated keystroke by keystroke, and they can be paid lessC. Fewer fringe benefits and a safer working environmentD. Decreased costs through smaller offices and flexibility in hiring contract workers

35. A patent essentially grants a monopoly to an inventor for a period of ______ years.

A. 100 B. 50 C. 25 D. 20

36. The goal of patents and copyrights is to:

A. Maintain records of new inventions and new intellectual materials B. Protect the rights of the individualsC. Encourage creativity by offering rewards to innovators D. Create barriers to entry until they are no longer profitable

37. The TiVo system was able to report that Janet Jackson’s “wardrobe malfunction” in the _______________ was the most replayed event.

A. Red Sox 2004 B. 2004 Superbowl halftimeC. 2003 Superbowl halftime D. 2004 Olympic Game in Greece

38. Some industry-sponsored reports indicate that software piracy in Southeast Asia is huge: over ____ percent of software in use is copied.

A. 35 B. 50 C. 75 D. 90

39. A key factor of the Internet is that:

A. Once created, it is impossible to destroy knowledge B. It is freeC. Encourage creativity by offering rewards to innovators D. Create barriers to entry until they are no longer profitable

40. The Internet gives authors and creators of intellectual material the opportunity to:

A. Reach much larger audiences immediately B. Be translated into many more languagesC. Bypass the traditional publishing routes D. Create without censorship

41. Economics shows that digital product companies make the most money by:

A. Reducing the prices to the point where elasticity of demand is equal to 1B. Having no production costsC. Charging different consumers different prices for the same item, depending on demographicsD. Reducing the prices to the point where elasticity of demand is equal to -1

42. Technology has the potential to change education, particularly in terms of:

A. Video teaching, lower costs, and computerized classrooms B. Individual attention, lower costs, and interactive teachingC. Individual attention, course management, and distance D. Distance, course management, and lower costs

Page 56: testreview (1)

43. In regard to the use of the new technologies in education, researchers have found that:

A. There is little conclusive evidence that they are equal to or superior to existing techniquesB. Students learn more quickly with the individualized coursesC. Teachers and parents do not like itD. Students learn less than they do in the traditional environments

44. The real key to online education is to use the power of technology in:

A. Interactive technologies B. Providing computer access for all studentsC. Creative effort and teacher training D. Developing entirely new applications

45. Governments are slow to adopt new technologies because:

A. They are cumbersome bureaucracies, with older, entrenched leaders in placeB. They have highly complicated budgets, and arcane political agendasC. They tend to be highly resistant to change in areas requiring specialized educationD. They have limited budgets, long procurement cycles, and requirements for special allocations to acquire new technology

46. Most government agencies are still nervous about electronic commerce, partly because:

A. They have entrenched rules based on traditional business methodsB. They are unable to positively identify consumers over the InternetC. They have a political constituency to answer toD. The U.S. tax laws do not cover Internet transactions

47. In March 2004, China closed ____________ Internet cafes – most of them for illegally admitting juveniles.

A. 86,000 B. 80,000 C. 10,000 D. 8,600

48. Several experts have testified before Congress that creating electronic voting systems:

A. Is well within the capability of current technology B. Is not within the capability of current technologyC. Will not be able to prevent fraud by application programmers D. Will require violation of individual privacies

49. Electronic voting has two main complications over traditional e-commerce, first, that not all voters can be authenticated because they do not have credit cards, and, second:

A. The poor do not have access to computers B. Votes have to be audible, but anonymous C. Vote selling cannot be prevented D. It will decrease participation rates

50. Voting from home over the Internet presents two problems:

A. Preventing denial-of-service attacks, and protecting the security of home computersB. Handling the issue of multiple voters in the same household, and the ability to encrypt all the votesC. Preventing denial of service attacks, and handling the issue of multiple voters in the same householdD. Protecting the security of home computers, and the ability to ensure that all votes are counted

51. Society has an additional critical objective in designing a new voting system:

A. The need to make it easier for people to vote for Republican candidatesB. The need to make it easier for people to vote for Democratic candidatesC. The need to make it easier for people to vote to increase participation ratesD. The need to make it easier for people to vote for Independent candidates

52. In a test of electronic voting systems in the Georgia 2001 election, almost all said the system was easy to use and over ______ percent said the entire state should move to the electronic system.

A. 99 B. 97 C. 95 D. 94

53. The underlying components of the Internet were not designed with (for):

A. Security in mind B. Military goals C. A discernible infrastructure D. Economic issues in mind

54. In 2004, David Blunkett, the home secretary of the UK, proposed a bill that would create a detailed national:

A. Ration card program B. Credit card program C. Social security card program D. Identity card program

Page 57: testreview (1)

55. A world-state would be a massively complex system that would be:

A. Sustained by the Internet B. Politically unstableC. Economically shattering to currently wealthy countries D. Unfair to developing economies

56. The FBI created the ___________________ system to monitor and record all Internet communications of a targeted person.

A. Echelon B. Escrow C. Cell phone D. Carnivore

57. In a survey of 30,000 undergraduates, ________ percent admitted to cut-and-paste plagiarism using the Internet.

A. 90 B. 70 C. 37 D. 47

58. Companies have obligations to society, in that:

A. A firm must ensure privacy of data B. A company must provide training and monitoring to make sure all relevant laws are understoodC. A firm must obey all relevant laws D. A firm must not use data in a manner to injure their partner firms

59. Companies have obligations to their employees, in that:

A. The firm must ensure privacy of data B. The company must provide training and monitoring to make sure all relevant laws are understoodC. The firm must obey all relevant laws D. The firm must not use data in a manner to injure their partner firms

60. Companies have obligations to customers, in that:

A. A firm must ensure privacy of data B. A company must provide training and monitoring to make sure all relevant laws are understoodC. A firm must obey all relevant laws D. A firm must not use data in a manner to injure their partner firms

61. Companies have obligations to business partners, in that:

A. A firm must ensure privacy of data B. A company must provide training and monitoring to make sure all relevant laws are understoodC. A firm must obey all relevant laws D. A firm must not use data in a manner to injure their partner firms

62. Until the 1980s, relatively few laws at any level were specifically directed at:

A. Individual hackers B. Corporate misuse of data C. Computer usage D. The use of federal government data

63. The law based on the Computer Fraud and Abuse Act provides fines up to:

A. $200,000 and up to 25 years in prison B. $150,000 and up to 20 years in prisonC. $100,000 and up to 20 years in prison D. $100,000 and up to 30 years in prison

64. In terms of enforcement, most federal, state, and local agencies:

A. Have the expertise to deal with computer crimes B. Do not realize the seriousness of computer crimesC. Have few, if any, officers devoted to the solution of computer crimes D. Are putting increased emphasis on computer crimes

65. The copyrights laws apply to the specific item, such as:

A. A unique name (or logo) B. A book or song or computer softwareC. A mechanical device or computer software or mathematical algorithm D. Stealing secret information (for example, data)

66. The patents laws apply to the specific item, such as:

A. A unique name (or logo) B. A book or song or computer softwareC. A mechanical device or computer software or mathematical algorithm D. Stealing secret information (for example, data)

67. The trademarks laws apply to the specific item, such as:

A. A unique name (or logo) B. A book or song or computer softwareC. A mechanical device or computer software or mathematical algorithm D. Stealing secret information (for example, data)

68. The trade secret laws apply to the specific item, such as:

A. A unique name B. A book or song or computer softwareC. A mechanical device or computer software or mathematical algorithm D. Stealing secret information (for example, data)

69. The Freedom of Information Act generally provides people with the ability to obtain information held by ______________.

Page 58: testreview (1)

A. University registrars B. Credit card companies C. Government agencies D. Professional societies

70. The most important feature of the Family Educational Rights and Privacy Act is that it limits the release of ______________.

A. Medical data B. Educational data C. Bank data D. Credit data

71. The primary purpose of the Electronic Communications Privacy Act was to extend traditional wiretap provisions to “electronic communication,” which includes:

A. Personal data and audio data B. Credit data and image transmissionsC. Cellular phone and e-mail transmissions D. Medical data and audio data

72. The Fair Credit Reporting Act primarily gives consumers the right to inspect:

A. Credit records – and it gives them the right to correct errors B. Bank records and medical recordsC. Personal data and image data D. Medical data and credit data

73. The Driver’s Privacy Act limits the use and release of:

A. Personal data B. Medical data C. State motor vehicle data D. State credit union data

74. The video Privacy Act was created to limit the release of:

A. Personal data B. Rental records from video stores and libraries C. State motor vehicle data D. State credit union data

75. The Privacy Protection Act of 1980 is primarily concerned with:

A. Personal data B. Rental records from video stores and libraries C. State motor vehicle data D. Law enforcement investigations

76. The Privacy Act of 1974 deals more directly with:

A. The collection and dissemination of information by the federal government B. Rental records from video stores and librariesC. The collection and dissemination of personal credit data D. Law enforcement investigations

77. The Communications Assistance for Law Enforcement Act (CALEA) requires:

A. Local police agencies to find terrorists and criminalsB. Telecommunications firms to pay for wiretap facilities for police to listen to conversationsC. School authorities to help the students who fail in EnglishD. Health care agencies to pay for medical tests for the patients

78. The Health Insurance Portability and Accountability Act (HIPAA) is used to limit sharing of ________________.

A. Financial information B. Educational information C. Medical information D. Personal information

79. The Graham-Leach-Bliley Act of 1999 primarily deregulated some _______________.

A. Health care services B. Financial services C. Educational services D. Transportation services

80. The U.S. Patriot Act effectively:

A. Repeals almost all government restraints B. Limits privacy of the citizensC. Looks for terrorists in the country D. Supports fighting against war and terror

81. The CAN-SPAM Act is a halfhearted attempt to:

A. Reduce the freedom of the sender B. Enhance the computer functioningC. Reduce the fraud involved with most unsolicited commercial e-mail (spam) D. Increase the data transmission speed

82. The Digital Millennium Copyright Act (DMCA) of 1998 changed:

A. Analog data into Digital data B. Some copyright provisions to synchronize the U.S. laws with the European lawsC. Digital data into analog data D. Analog image data into digital data