CBE Test
MIS300 Information Systems Design and Management
Choose 80 of 120 questions
MO#
|
Module Outcome
|
Question #
|
MIS300MO1-1
|
Compare and contrast how people, information, and information technology combine to create management of information systems within a specific industry.
|
9, 10, 11, 12
|
MIS300MO1-2
|
Analyze each component of Porter’s Five Forces Model as they relate to competition within a specific industry.
|
1, 2, 3, 4, essay 10
|
MIS300MO1-3
|
Compare and contrast strategies and frameworks as approaches to development of business strategies for a specific industry.
|
13, 14, essay 9
|
MIS300MO1-4
|
Design a break-even analysis to assess the financial impact of information technology in a given scenario.
|
5, 6, 7, 8
|
|
|
|
MIS300MO2-1
|
Examine the impact of social media on technology and business culture within a specific organization or industry.
|
18, 19, 20
|
MIS300MO2-2
|
Examine supply chain management systems and discuss their use and effectiveness within a specific organization or industry.
|
15, 16, 17, essay 8
|
MIS300MO2-3
|
Examine enterprise resource planning systems and discuss their use and effectiveness within a specific organization or industry.
|
21, 22, 23, 24, 25
|
MIS300MO2-4
|
Examine customer relationship management systems and discuss their use and effectiveness within a specific organization or industry.
|
123, 124
|
MIS300MO2-5
|
Describe the various components and features of the Internet, including browsers, web sites, domain names, Web 2.0, social networking, RSS feeds, telecommunication software and hardware, and Internet Service Providers.
|
121, 122
|
|
|
|
MIS300MO3-1
|
Differentiate between a relational database, a database management system, and a data warehouse, describing the components and uses of each.
|
30, 31, 32, 33, 34, 35
|
MIS300MO3-2
|
Examine the role of business intelligence and data within an organization or industry.
|
38, 39, 40, essay 7
|
MIS300MO3-3
|
Describe the components of a relational database, including entity class, instance, primary key, foreign key, types of relationships, and database normalization.
|
26, 27, 28, 29
|
MIS300MO3-4
|
Compare and contrast data-mining tools in a data warehouse environment.
|
36, 37
|
|
|
|
MIS300MO4-1
|
Analyze the decision support role of specialized analytics like predictive and text analytics.
|
41, 42, essay 6
|
MIS300MO4-2
|
Examine decision support systems, geographic information systems, and expert systems.
|
43, 44, 45, 46, essay 5
|
MIS300MO4-3
|
Define neural networks, fuzzy logic, and genetic algorithms.
|
47, 48, 49
|
MIS300MO4-4
|
Describe data-mining agents and multi-agent systems as subsets of intelligent agents and agent-based technologies.
|
50, 51, 52, 53
|
|
|
|
MIS300MO5-1
|
Describe the nine major e-commerce business models.
|
59, 60, 61, 62
|
MIS300MO5-2
|
Compare the development of an e-commerce marketing mix for customers in both the B2B and B2C business models.
|
63, 64, 65, 66
|
MIS300MO5-3
|
Discuss three major trends impacting e-commerce and society in general.
|
67, 68, 69, 70
|
MIS300MO5-4
|
Describe the principles of networking, including LANs, WANs, MANs, types of communication media, security, clients, servers, Internet connections, and peer-to-peer networking.
|
54, 55, 56, 57, 58
|
|
|
|
MIS300MO6-1
|
Discuss the seven major phases of the systems development life cycle (SDLC) as they relate to a given organization.
|
71, 72, 73, 74, 75
|
MIS300MO6-2
|
Compare and contrast the systems development life cycle and the self-sourcing process.
|
76, 77, 78, 79, 80
|
MIS300MO6-3
|
Describe various component-based development methodologies.
|
81, 82, 83
|
MIS300MO6-4
|
Describe the process of outsourcing.
|
84, 85, 86, 87, 88
|
|
|
|
MIS300MO7-1
|
Describe the concept of a service-oriented architecture as it relates to IT needs.
|
89, 90, 91, 92, 93, 94, 95, essay 3
|
MIS300MO7-2
|
Compare common metrics used in assessing IT systems and initiatives.
|
96, 97
|
MIS300MO7-3
|
Examine all of the phases of business continuity planning as they relate to a specific organization or industry.
|
98, 99, 100, essay 4
|
|
|
|
MIS300MO8-1
|
Define ethics, intellectual property, copyright, Fair Use Doctrine, and software piracy.
|
101, 102, 103, 104, 105, essay 1
|
MIS300MO8-2
|
Discuss three ways to protect information on a computer or network from security vulnerabilities.
|
106, 107, 108, 109, 110, essay 2
|
MIS300MO8-3
|
Describe the emerging trends in wireless technology, including Bluetooth, WiFi, cell phones, and RFID.
|
116, 117, 118, 119, 120
|
MIS300MO8-4
|
Describe three emerging technologies that will impact the future.
|
111, 112, 113, 114, 115
|
1. Under the RGT framework, which of the following strategies innovates business processes and/or products and services in a completely new way, moving into seemingly different markets?
a. Transcend
b. Run
*c. Transform
d. Grow
2. Your business had two strategic initiatives this year. One initiative focused on improving customer satisfaction. The second focused on providing customers with their purchase history from any Internet site in the world. If you were to allocate 15% of your IT budget to the first initiative and 25% to the second initiative, what type of strategy are you applying?
a. Tactical information planning (TIP)
b. Strategic technology planning (STP)
c. Transforming IS strategy (TISS)
*d. Run-grow-transform (RGT) framework
3. Carrio Arrento, a car rental company, operates in two cities and offers low-rental cars specifically to college students from these areas. This is an example of a(n) _______.
a. overall cost leadership strategy
*b. focus strategy
c. loyalty program
d. entry barrier
4. _____ is defined by Porter as offering the same or better quality product or service at a price that is less than what any of the competition is able to do.
*a. Overall cost leadership
b. Price differentiation
c. Product differentiation
d. Focus
5. Doodle Corp. wants to increase customer loyalty toward its currently one-of-a-kind software, Bonkers EP. It does so by offering additional services like automatic updates and free upgrades. Which of the following forces in Porter's model is Doodle Corp. addressing in this situation?
a. Threat of substitute products or services
*b. Threat of new entrants
c. Buyer power
d. Supplier power
6. Which of the following has the highest threat of substitution?
a. A Patek Philippe watch
b. A YSL perfume
c. Bentley Continental GT
*d. Lifebuoy soap
7. To minimize the threat of substitute products or services, some businesses will create switching costs. What are switching costs?
a. The start-up costs incurred when replacing old technology with new
b. The costs incurred due to the inability to switch back to your first brand after moving to an alternative brand
c. A non-refundable fine levied against the customer for switching to a competitor
*d. The costs that make customers reluctant to another project or service supplier
9. Switching costs are costs that make customers reluctant to switch to another product or service supplier. What you need to realize is that a switching cost does not necessarily have to be an actual monetary cost.
Which of the following includes drivers for your printer and scanner and utility software?
a. Payroll software
b. Collaborative software
*c. System software
d. Application software
10. Which of the following is a telecommunication device?
a. Port
b. Cord
*c. Satellite
d. Bar code scanner
11. Which of the following is true of ethics?
a. Ethics and laws are the same.
b. Laws and ethics clearly require or prohibit an action.
*c. Ethics are more subjective than laws.
d. Laws are more a matter of personal or cultural interpretation, unlike ethics.
12. A technology-literate knowledge worker:
a. is a computer savvy worker
b. knows all computer programming languages
*c. knows how and when to apply technology
d. is knowledgeable about emerging technology
13. Which of the following auto manufacturers use an overall cost leadership strategy?
a. Mercedes Benz
* b. Hyundai
c. Rolls-Royce
d. Aston Martin
14. Companies like Amazon and eBay that only have a presence in the virtual world have significantly lower fixed costs in terms of retail space than companies that have to pay for retail space, like retail stores you would find in a mall. This technological concept is known as:
a. VoIP.
b. telecommuting.
c. cloud computing.
*d. digital storefronts.
15. _____ is the use of a mobile device and its location to check into locations such as businesses and entertainment venues, find friends and their locations, and receive rewards and take advantage of "specials" based on location.
a. MMORPG
*b. Social locationing
c. Mobile locationing
d. Social gaming
16. Which of the following is a popular MMORPG?
a. YouTube
b. Google+
c. Groupon
*d. World of Warcraft
17. The Web 2.0:
*a. is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services.
b. is a computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol.
c. is a reference that points to a whole document or to a specific element within a document.
d. is a computer network consisting of a worldwide network of computer networks that use the
TCP/IP network protocols to facilitate data transmission and exchange.
18. Which of the following ERP software is most suitable for Forca, an aircraft manufacturer with more than 20000 employees?
a. SYSPRO
b. SAP Business One
*c. Oracle ERP
d. Sage MAS 90 ERP
19. Which of the following ERP software is most suitable for Exacto, a precision instrument manufacturer with 400 seats?
*a. Infor ERP Solution
b. Microsoft Dynamics AX
c. SAP Business One
d. Intuit QuickBooks Enterprise
20. The early stage of ERP was carried out in the 1970s through a system called ____.
a. Customer Relationship Management (CRM)
b. Database Management System (DBMS)
* c. Materials Requirement Planning (MRP)
d. Decision Support System (DSS)
21. Which of the following provides you with a multimedia-based collection of information, services, and Web sites?
a. FTP server
b. Wiki
c. Internet
* d. World Wide Web
22. KeepFit is a manufacturer of sports merchandise. You can visit a specific location on the Web and order merchandise from KeepFit. This specific location is KeepFit's ____.
a. Web application
b. Web server
*c. Web site
d. TLD
23. Which of the following identifies a domain name?
a. A specific location on the Web where you visit, gather information, and perhaps even order products
* b. A specific computer on the Web along with the main page of its Web site
c. An Internet service provider
d. The organization that sponsors and manages a Web site for its members
24. Margaret Sullivan is a TLD expert and a domain name consultant. Which of the following domains is she likely to suggest to her clients who want to start Internet companies?
Refer: Figure B.3
a. .aero
*b. .net
c. .pro
d. .edu
25. The _____ is a nonprofit organization charged with numerous Internet-related responsibilities, one of which is the oversight of top-level domains.
*a. ICANN
b. ITU
c. TLD
d. URL
26. Which of the following would be a good primary key for the entity class of students?
a. Course ID
b. Student Course name
*c. Student ID
d. Institute ID
27. What is an instance?
a. It is a key that uniquely identifies a person, place, or thing.
b. It is a group of related information about an entity.
c. It is a record or row in a relation.
*d. It is an occurrence of an entity class that can be identified by a primary key.
28. A supplier is an example of a(n) ____.
a. relational database
* b. entity class
c. foreign key
d. Business rule
29. An organization wishes to store information about its employees in a database. The employees, in this case, constitute a(n) ____.
a. foreign key
b. primary key
*c. entity class
d. data dictionary
30. A data warehouse is:
a. a large hardware environment that supports multiple platforms.
*b. a logical collection of information used to create business intelligence.
c. an operational database system used to manage and analyze transactional data.
d. an accumulation of all operational data stored by large organizations.
31. What does it mean for a data warehouse to be multidimensional?
a. The database stores data, facts, and definitions for all stored information.
b. Data can be linked to other sources of internal and external information.
*c. The files stored in a warehouse contain several layers of columns and rows.
d. Customer information can be related to sales, departmental, and organizational information.
32. Which of the following data administration facilities continually maintain statistics concerning how the DBMS engine physically accesses information?
a. Security management facilities
b. Query optimization facilities
*c. Reorganization facilities
d. Concurrency control facilities
33. _____ ensure the validity of database updates when multiple users attempt to access and change the same information.
a. Backup and recovery facilities
b. Query optimization facilities
c. Change management facilities
*d. Concurrency control facilities
34. Which of the following DBMS components allows you to add, change, and delete information in a relational database?
a. Data definition subsystem
*b. Data manipulation subsystem
c. Data administration subsystem
d. Application generation subsystem
35. What must you define before adding any information to a relational database?
a. The intended audience
b. The physical hardware structure
c. The administrative rights of users
*d. The logical structure of the database
36. What type of software tool is used to query information stored in a data warehouse?
a. OLTP
b. Data dictionary
*c. Data-mining
d. Decision support
37. Data warehouses exist to support:
a. MRP.
*b. OLAP.
c. OLTP.
d. SQL.
38. _____ include(s) tools such as neural networks and fuzzy logic to form the basis of "information discovery."
a. Digital dashboards
b. Multidimensional analysis tools
*c. Artificial intelligence
d. Query-and-reporting tools
39. In a data warehouse, which data-mining tool would you use to quickly build reports without having to write programming code?
a. Application report generator
b. Artificial intelligence
c. Multidimensional analysis tools
*d. Query-and-reporting tools
40. A data warehouse is:
a. a large hardware environment that supports multiple platforms.
*b. a logical collection of information used to create business intelligence.
c. an operational database system used to manage and analyze transactional data.
d. an accumulation of all operational data stored by large organizations.
41. Which of the following data-mining technologies uses historical information to predict future events and outcomes?
a. Artificial intelligence
b. Digital dashboards
c. Multidimensional analysis tools
*d. Predictive analytics
42. _____ is a process of using statistical, artificial intelligence, and linguistic techniques to convert information content in surveys, e-mails, blogs, and social media into structured information.
a. Web analytics
*b. Text analytics
c. Endless analytics
d. Predictive analytics
43. Which of the following artificial intelligence systems is capable of finding and differentiating patterns?
*a. Neural networks
b. Expert systems
c. Geographic information systems
d. Decision support systems
44. Which of the following is an artificial intelligence system that applies reasoning capabilities to reach a conclusion?
a. Database management
b. Geographic information systems
c. Web analytics
*d. Expert system
45. An expert system is usually built for a specific application area called a(n) ____.
a. Web site
b. portal
*c. domain
d. database
46. If you were using your PDA and it was analyzing and reacting to every word you typed on the pad, what type of system would you be using?
a. Handwriting analysis
b. Expert system
*c. Neural network
d. Knowledge management system
47. _____ is a mathematical method of handling imprecise or subjective information.
a. Decision support system
*b. Fuzzy logic
c. Neural network
d. Knowledge management system
48. _____ are a set of steps that relate variables representing inexact information or personal perceptions.
a. Heuristics
*b. Fuzzy logic algorithms
c. Metaphors
d. Domains
49. Which type of artificial intelligent system mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?
a. Fuzzy logic
*b. Genetic algorithm
c. Neural network
d. Expert system
50. A(n) ______ works on multiple distinct computer systems.
a. autonomous agent
*b. distributed agent
c. multi-agent system
d. mobile agent
51. Which of the following software agents can adapt and alter the manner in which it attempts to achieve its assigned task?
a. Mobile agent
b. Distributed agent
c. Intelligent agent
*d. Autonomous agent
52. A(n) _____ is a software agent that can relocate itself onto different computer systems.
*a. mobile agent
b. distributed agent
c. intelligent agent
d. autonomous agent
53. What are the best known information agents?
a. Personal agents
b. User agents
c. Predictive agents
*d. Buyer agents
54. Which network device passes network traffic between smaller subnets of a larger network?
a. A modem
b. WAP
c. A switch
*d. A router
55. Which network device sends information privately over the network?
a. Hub
*b. Switch
c. Router
d. Virtual connector
56. Which of the following is true of home networks and network components?
a. They do not require a switch.
b. They require at least two routers.
*c. They have both a router and a switch.
d. They require a router only if they are wireless.
57. Computers and routers refer to each other using ____.
a. VPN
b. router IDs
c. network sites
*d. IP addresses
58. Which of the following terms refers to the capacity of a communications medium to transfer information in a given amount of time?
*a. Bandwidth
b. Transmission size
c. Routing capacity
d. Communication speed
59. _____ is a formal business plan that maps out your customer base and your strategy for reaching them.
a. E-plan
b. Feasibility plan
c. Customer strategy and outreach plan (CSOP)
*d. Path-to-profitability (P2P)
60. Which type of e-commerce occurs when a business sells products and services to a government entity?
a. B2C
*b. B2G
c. G2B
d. B2B
61. _____ occurs when an individual sells products and services to a government entity.
a. G2B e-commerce
b. B2G e-commerce
*c. C2G e-commerce
d. G2C e-commerce
62. What term depicts a virtual marketplace in which all businesses buy from and sell products and services to each other, and share information?
a. Virtual Markets (VM)
b. E-Markets (EM)
c. Open-source Market
* d. B2B e-marketplace
63. Which of the following types of products purchased on the Internet are typically high priced items because they are purchased infrequently and often require some sort of customization?
a. Convenience
b. Commoditylike
*c. Specialty
d. Digital
64. Which of the following is true of commodity-like business environments?
a. They are similar to specialty items.
b. The buyer power is low.
c. They have high barriers to entry.
*d. They have low barriers to entry.
65. Which of the following types of products purchased on the Internet are typically priced low because they are used more frequently?
a. Speciality
*b. Convenience
c. Niche
d. Luxury
66. What is a "sticky" Web site?
a. A Web site that gains popularity through e-channels.
b. A Web site that is accessed frequently because it is able to reroute potential consumers from other sites to it.
*c. A Web site that attracts consumers and encourages them to return.
d. A Web site that is located by pop-up and pop-under ads.
67. What type of Internet-based company makes it easy for one person to pay another person or organization over the Internet?
*a. Financial cybermediary
b. Electronic bill and payment business
c. E-provider
d. I-banks
68. What mechanism is used for sending money from your checking or savings account to another person or organization?
a. Cyber money
b. Cybermediary
*c. Electronic check
d. E-Payment
69. _____ is a credit-card like device that contains an embedded chip on which digital information can be stored and updated?
*a. Smart card
b. E-credit card
c. E-Information
d. Intelligent spending card (ISC)
70. What is the difference between a smart card and a digital wallet?
a. A smart card is stored on the seller's computer; a digital wallet is stored on the client's computer.
b. A smart card contains both software and information; a digital wallet contains only information.
*c. A smart card is a physical device; a digital wallet is both software and information.
d. A digital wallet contains a smart card; a smart card is part of the digital wallet along with other personal consumer information.
71. Which of the following systems development techniques requires IT specialists that are in-house to develop information systems?
a. Outsourcing
*b. Insourcing
c. In-house specialization
d. Selfsourcing
72. If you were developing marketing strategies and you decided to create a database that tracked the progress of your marketing efforts, what kind of development would you be engaging in?
a. Outsourcing
b. Netsourcing
*c. Selfsourcing
d. Insourcing
73. The systems development life cycle (SDLC) is:
a. a method for testing new IT applications.
*b. a structured approach for developing information systems.
c. the analysis and assessment tasks that need to be completed when designing and developing information systems.
d. a set of guidelines that an end user follows when developing their own business applications.
74. The waterfall methodology is:
*a. a sequential, activity-based process in which one phase of the SDLC is followed by another.
b. an assessment methodology that ensures quality applications.
c. an outsource development methodology to information systems.
d. a process management technique that identifies and includes end users and management in the SDLC.
75. Which of the following is a characteristic of a proposed system that is essential to the success of your organization?
a. Quality and essence metric
b. Vital requirement
*c. Critical success factor
d. Essential design feature
76. _____ is the development and support of IT systems by knowledge workers with little or no help from IT specialists.
*a. End-user involvement
b. Outsourcing
c. Insourcing
d. Requirements definition
77. What group of people knows little about IT but a lot about their own domain?
a. Domain experts
b. Project managers
*c. End users
d. Field professionals
78. Which of the following is not an advantage of selfsourcing?
a. It increases the speed of systems development.
*b. It analyses the various design alternatives which lead to subpar IT systems.
c. It increases end user participation and sense of ownership.
d. It improves requirements determination.
79. What type of selfsourcing development tool is paramount to the success of the proposed software?
*a. Easy to use development tools
b. Evolutionary prototyping tools
c. Extreme programming (XP) tools
d. Video editing tools
80. Which of the following is a potential risk of selfsourcing?
a. Reduced technological know-how for future innovation.
*b. Lack of documentation and external support leads to short-lived systems.
c. Reduced degree of control.
d. Increased dependency on outside organizations.
81. Which of the following is an advantage of prototyping?
a. Encourages active user participation
b. Helps resolve discrepancies among end users
c. Gives users a feel for the final system
*d. All of the above
82. What is the fourth and last step in the prototyping process?
a. Identify basic requirements
b. Develop initial prototype
c. Users reviewing
*d. Revise and enhance the prototype
83. Which of the following is a disadvantage to prototyping?
a. Prototyping does not encourage active user participation.
* b. Prototyping does not give an indication of performance under operational conditions.
c. Prototyping does not help determine technical feasibility.
d. Prototyping does not help resolve discrepancies among users.
84. According to the Outsourcing Research Council, which business function is the top outsourcing area for many contemporary companies?
a. IT
b. Accounting
*c. Human Resources
d. Finance
85. Which SDLC phase is performed with both internal software development and outsourcing?
a. Design
b. Development
c. Maintenance
*d. Analysis
86. If you were constructing a legal document for your software vendor that stipulated needed requirements, schedules, costs, acceptance criteria, and assessment metrics, what would you be creating?
*a. Service level agreement
b. Critical milestones
c. Critical success factors
d. Request for proposal
87. If your U.S.-based company were to hire a vendor located in New York City, you would be using _____ outsourcing.
a. nearshore
b. domestic
*c. onshore
d. interior
88. What is the trend called when a U.S. company outsources IT functions to other countries that are geographically far away?
a. Foreign outsourcing
*b. Offshore outsourcing
c. External outsourcing
d. Outer outsourcing
89. Which of the following is true of service-oriented architecture (SOA)?
a. It is a perspective that focuses on acquiring brand new systems.
b. It builds applications from non-reusable blocks of code.
*c. It focuses on the development, use, and reuse of services.
d. It defines the source code for application programming interfaces.
90. Which of the following is true of an organization with a service-oriented architecture philosophy?
a. Ensures that HR initiatives remain constant regardless of changes in the workforce
b. Takes a prolonged amount of time to implement well thought-out decisions
c. Maintains static work processes and structures
*d. Adapts quickly to new advances in technology
91. Genesis Technologies has adopted an SOA approach to systems development. A new "disruptive" technology, Senstor, has recently been launched in the market which promises to provide significant benefits to software companies that focus on collaborative process. In such a scenario, how is Genesis Technologies most likely to react?
a. It will delay the decision making process with regard to the adoption of the new technology.
b. It will continue to use its existing systems instead of trying out the new technology.
*c. It will use its resources efficiently to adapt itself to the new technology.
d. It will maintain static processes and technologies which have proven to be beneficial in the past.
92. In terms of software development, which of the following would most likely be the focus of a company with a service-oriented architecture philosophy?
*a. New deployments like Web 2.0
b. Integration of different technology platforms
c. Standard information formats
d. Safe and secure telecommunications platforms
93. Which of the following is true about the end user of IT, according to an SOA philosophy?
*a. The end user should be thought of in the same way as an external customer.
b. The end user's needs should be considered secondary to customers' needs.
c. The end user's access to data should be limited to a specific geographic area due to security reasons.
d. Multi-channel service delivery should be available exclusively to end users and not customers.
94. Which of the following is a Web 2.0 application?
a. PowerPoint
*b. Mashups
c. Intranet
d. Extranet
95. Which of the following is a requirement of an SOA approach?
a. Information should be maintained in multiple formats.
*b. Strict and rigorous integrity controls should be in place.
c. Data from different sources should not be coupled together.
d. Duplicate information should be maintained for security reasons.
96. GenTech, a software company, is situated in Tokyo, Japan. Given that the country is prone to several earthquakes, GenTech is keen to build a back-up plan which will guide the company on how to recover should disaster strike. Which of the following will help the company in this regard?
a. Enterprise resource plan
*b. Business continuity plan
c. Operational plan
d. Annual growth plan
97. Morrison and Sons, a financial firm, is developing a business continuity plan. The firm has already compiled a list of the various potential threats to the organization and its assets and is now in the process of identifying the impact each these threats would have on the business's operations, should they come to fruition. The company is in which phase of business continuity planning?
a. Maintenance
*b. Analysis
c. Design
d. Implementation
98. The management at Solitaire Inc. is building a business continuity plan and has identified its core, critical, and noncritical IT applications. Each of these applications have been categorized on the basis of their estimated recovery costs and the affect the loss of these applications will have on the firm's business The company is in which phase of business continuity planning?
a. Testing
b. Design
*c. Analysis
d. Implementation
99. Which of the following refers to an area available to a company that rents space and telecommunications equipment from another company?
*a. Collocation facility
b. Hot site
c. Virtual environment
d. Cold site
100. The _____ phase of the business continuity plan involves using the requirement recovery document to develop a formal, technical, and detailed plan for recovering from a disaster.
a. analysis
b. testing
c. maintenance
*d. design
101. Which of the following is an example of the unethical use of computers?
a. Employees failing to answer a large number of e-mail messages due to network problems.
*b. Employees searching organizational databases for information on celebrities and friends.
c. Employees sending messages without spell checking and proofreading them.
d. Employees updating their passwords at the end of every month.
102. Which of the following is true of an ethical dilemma?
a. It is faced exclusively by unethical, immoral people.
*b. It occurs when one's responsibilities seem to lead in opposite directions.
c. It is the choice of whether or not to act ethically.
d. It involves choosing between compatible good outcomes.
103. ____ can be defined as the principles and standards that guide our behavior toward other people.
*a. Ethics
b. Models
c. Eugenics
d. Aesthetics
104. Which of the following is true of ethics and ethical people?
a. Ethical people do not face ethical dilemmas since they know the difference between right and wrong.
b. Ethical people's values are free from the influence of their history, culture, and religion.
c. Ethical norms change radically because of society's dynamic nature.
*d. Acting ethically means behaving in a principled fashion and treating others with dignity.
105. David works as process supervisor at an industrial plant. In his company, he is known by all his colleagues and superiors as an honest worker whose decisions are always guided by ethical values. Recently, David came to know that due to the irresponsible disposal of company waste, the local groundwater has been contaminated. Because of this, a large number of people living in close proximity to the plant have been suffering from severe ailments. However, in spite of knowing this, David does not take any action. Which of the following, if true, most likely explains David's decision not to act?
a. David's decision was guided by morality and ethical values.
b. David considered the impact of toxins on the environment while making the decision.
*c. David's decision was influenced by the dilemma of losing his job at the plant.
d. David made the decision by considering the well-being of the people living in close proximity to the plant.
106. _____ are types of hackers who break into other people's computer systems and may just look around. They may steal credit card numbers or destroy information, or otherwise do damage.
a. Zombies
b. White-hat hackers
*c. Black-hat hackers
d. Drones
107. _____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest.
a. Zombies
b. White-hat hackers
*c. Hacktivists
d. Screenagers
108. A(n) ______ is hardware and/or software that protects a computer or a network from intruders.
a. Web log
b. worm
*c. firewall
d. public key
109. _____ refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification.
a. Pharming
*b. Biometrics
c. Intellectual property
d. Whaling
110. _____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key.
*a. Encryption
b. Feature creep
c. Biometrics
d. Encapsulation
111. Which of the following is true of personal software-as-a-service (personal SaaS)?
a. It involves the purchase of high quality, productivity software.
b. It is cost effective because it provides discounted rates on personal productivity software.
*c. It involves paying for personal productivity software on a pay-per-use basis.
d. It ensures high levels of security as all data is stored directly on a user's personal computer.
112. Which of the following is a drawback of personal software-as-a-service (personal SaaS)?
a. It provides customers with limited options for purchasing different types of software.
*b. It does not ensure high levels of privacy as data is maintained on a Web-based server.
c. It is an expensive proposition for most customers as software licenses involve high costs.
d. It hosts the software and related data offline and hence, cannot be accessed online.
113. Which of the following is a delivery model that enables a person to rent productivity software such as Microsoft Office?
a. F2b2C
b. Push technology
*c. Personal SaaS
d. VoIP
114. Johanna works for a child rights organization and is required to travel during the first quarter of the year to different underdeveloped countries. Her role is to visit the different country offices to help define project goals, brainstorm fundraising ideas, and realize the scope of projects at the onset of campaigns. For these sessions, she uses a mind mapping software. She prefers to rent the software prior to her travel instead of purchasing it, since she needs it only for a few months of the year. Which of the following is most likely being used by Johanna?
*a. Personal SaaS
b. F2b2C
c. Push technology
d. VoIP
115. Which of the following is an advantage of personal software-as-a-service (personal SaaS)?
*a. It represents a cost effective solution for most users.
b. It offers customers a wide range of options to purchase software.
c. It ensures high levels of information security by storing data on users' personal computers.
d. It guarantees reliability as the risk of network outages is minimal.
116. Which of the following refers to a technology with a three-dimensional computer simulation in which a person actively and physically participates?
a. Wireless fidelity
*b. Virtual reality
c. Augmented reality
d. Agile methodology
117. _____ is the use of physiological characteristics—such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, and even your breath—to provide identification.
*a. Biometrics
b. Bluetooth
c. Feature analysis
d. Holographics
118. Which of the following can perform a variety of physiological functions when inserted into the human body?
*a. RFID chip
b. Rootkit
c. Biochip
d. Implant chip
119. Melissa and her friend, Erica, go on a hike to get away from the hustle bustle of city life. During the hike, Melissa takes several photographs with her cell phone camera and she uses a certain technology to transfer them to Erica. However, when she tries sending them to her friends who lives in the next city, she is unable to transfer the photographs. Which of the following technologies is Melissa using?
a. Wiki
b. WiFi
*c. Bluetooth
d. NFC
120. Which of the following is a standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet?
*a. Bluetooth
b. WiFi
c. NFC
d. Broadband
121. Which of the following is the domain name in the URL, http:// www.usatoday.com?
a. www
*b. usatoday
c. http
d. com
122. Which of the following helps you find Web sites with the information you want?
a. Domain
b. Cookie
c. Wiki
*d. Search engine
123. Which of the following systems uses information about customers to gain insights into their needs, wants, and behaviors in order to serve them better?
a. SCM
b. TPS
c. ERP
*d. CRM
124. Which of the following is a fundamental goal of CRM systems?
a. To produce and deliver a product or service at the time the customer wants it.
b. To lower the costs of maintaining inventory systems.
*c. To manage and track customer interactions.
d. To continuously improve the quality of products and processes.
Share with your friends: |