You are on page 1of 58

BUS381 Test Questions

Chapter 1
1. You need ___________ to evaluate trends, predict responses, and plan ahead. A. PeopleB. Data C. Programmers D. None of the above

2. Knowledge represents a higher level of understanding, including _________, __________, and ____________ . A. Rules, reports, information C. Rules, patterns, decisions 3. A management information system consists of: A. Hardware, software, telecommunications, data, storage capacity B. Collections of data, storage capacity, software, people, hardware C. Hardware, software, people, procedures, and collections of data D. Software, people, hardware, data, telecommunications 4. Data consists of ____________. A. Factual elementsB. Information C. Knowledge D. None of the above B. Patterns, reports, information D. Decisions, reports, information

5. Information represents data that has been ___________, ______________, and ______________ to provide insight. A. Processed, organized, integrated C. Organized, programmed, evaluated B. Processed, programmed, evaluated D. Integrated, programmed, evaluated

6. Wisdom is where one can put _________, __________, and ________ to work to create new knowledge and adapt to changing situations. A. Data, information, and experience C. Data, knowledge, and information B. Knowledge, experience, and analytical skills D. Experience, data, and information

7. Organizations that use information technology to ___________ costs and provide ___________ service can thrive. A. Reduce and better B. Increase and better C. Reduce and worse D. Increase and worse

8. Information technology is critical to the production improvement process, enabling employees to perform________ tasks, getting work done _________ at ________ cost. A. More, slower, higher B. More, faster, lower C. More, slower, lower D. Less, slower, higher

9. In a teamwork environment, not only do you have to produce your own work, but you also have to __________ closely with the group to see what problems and answers they have encountered and determine how to ___________ all of the pieces. A. Communicate, integrate B. Communicate, disperse C. Write, disperse D. Talk, disperse

10. Beginning in mid-2000, thousands of dot-coms firms failed as most had __________ expenses and _________ losses. A. Enormous, huge B. Less, minimum C. Minimum, huge D. Minimum, minimum

11. Traditional concepts of management focus on: A. Organizing, planning, and control C. Military-based transactional systems B. Manufacturing, span of control, and accounting procedures D. Accuracy, dependability, and loyalty to the firm

12. Mintzbergers three categories of managerial tasks are: A. Managerial, span of responsibility, financial planning C. Interpersonal, informational, and decisional B. Human resource planning, financial planning, resource planning D. Developmental, resource identification, and interpersonal

13. Collecting data, identifying problems, and making choices are, in series, called the: A. Managers role B. Basis of business C. Window of opportunity D. Decision process

14. One important job of management is to examine the need for ___________ and how it can be used to __________ future problems.

A. Information, solve

B. Data, evaluate

C. Collection, analyze

D. Management, decide

15. Middle managers organize and summarize data, and pass it ___________. A. To the lower-level workers B. Up the chain C. To the customers D. To the consultants

16. Information technology offers the ability to alter the way companies are ____________ and ______________. A. Organized, managed B. Analyzed, processed C. Audited, processed D. Processed, organized

17. Each manager is more productive because of the ___________ and the ability to perform many jobs. A. Tools B. Track records C. Reports D. Consultants

18. As area managers are required to understand and use increasingly sophisticated models and tools to analyze events and make decisions, the demand for managers with specific technical skills is ____, while the demand for general business managers is _____. A. Decreasing and increasing C. Decreasing and decreasing B. Increasing and decreasing D. Increasing and increasing

19. Three of the seven fundamental trends that have been driving the economy and changing businesses are: A. The Web, telecommunications, decentralization B. More government intervention, higher taxes on Web-based businesses, computer-literate employees C. Specialization, reliance on temporary workers, the increasing importance of service-oriented businesses D. Better-trained employees, telecommunications advance, less government intervention 20. There is an increasing demand for managers with: A. Terminal degrees B. Specific technical skills C. Communications skills D. Business training

21. The advantage of specialization is that it ___________ management tasks to _________ problems. A. Reduces and smaller B. Increases and larger C. Reduces and larger D. Increases and smaller

22. Management by methodology allows firms to _________ their number of _________ managers. A. Increase and lower-level C. Increase and upper-level B. Reduce and middle-level D. Reduce and upper-level

23. Without communication, firms could not grow beyond a certain size because managers could not monitor and control ___________. A. Lower-level workers B. Customers C. Vendors D. None of the above

24. The goal of _______________ is to push the decisions and the work down to the level that deals with the customer. A. The Web B. Modern accounting procedures C. Information technology D. Decentralization

25. Information systems enable executives to gather and manipulate information themselves or with automated systems; and consequently, there is _______ need for _________ managers to prepare and analyze data. A. Less, middle B. Less, upper C. More, lower D. More, middle

26. To obtain higher-level jobs, one will need to possess more _________ that other potential employees. A. Analytical skills B. Writing skills C. Verbal skills D. None of the above

27. Today, internationalization is a daily fact of life for workers and managers in: A. Internet business C. European economies B. Large multicultural firms D. Almost every company

28. One of the most prominent uses of information technology to support the move to international operations is/are: A. Communications facilities C. More powerful computers B. Language translation programs D. Better educated managers

29. The increased competition created by internationalization and decentralization requires corporations to be more _______. A. Flexible B. Rigid C. Non-cooperative D. None of the above

30. A trend facing industrialized nations is the move toward a(n) ____________ -oriented economy. A. Service B. Manufacturing C. Exporting D. Importing

31. Unable to alter the company fast enough, Compaq was ultimately purchased by ____________. A. AT and T B. Hewlett-Packard C. Raytheon D. Boeing

32. The key to technology is to restructure the operations and management to______ costs and make _________ decisions. A. Increase, better B. Reduce, better C. Increase, worse D. Reduce, worse

33. What level of decision is appropriate for a manufacturing firm if it involves machine settings, worker schedules, and maintenance requirements? A. Tactical B. Operational C. Strategic D. None of the above

34. What is the interactive, computer-based information system that collects data on transactions and operations? A. Transaction processing system C. Executive information system B. Decision support system D. Expert system

35. What is the interactive, computer-based information system that is used to control data and build systems to share data? A. Transaction processing system C. Expert system B. Database management system D. Executive information system

36. What level of decision is appropriate for a manufacturing industry if it involves rearranging the work area, altering production schedules, changing inventory methods, or expanding quality control measures? A. Operational B. Tactical C. Strategic D. None of the above

37. What is the computer-based information system that helps integrate data in a collaborative environment? A. Enterprise resource planning system C. Executive information system B. Decision support system D. Expert system

38. What is the interactive, computer-based information system that provides a flexible tool for analysis and helps managers make business decisions? A. Transaction processing system C. Executive information system B. Decision support system D. Expert system

39. What is the information system that captures and stores the knowledge of human experts and then makes this knowledge more accessible to an organization? A. Transaction processing system C. Executive information system B. Decision support system D. Expert system

40. What type of decision is required to change the overall structure of the firm to give it an advantage over the competition? A. Tactical B. Strategic C. Operational D. None of the above

41. What level of decision is appropriate for a manufacturing industry if it involves building new factories, expanding to new products or industries, or even going out of business? A. Operational B. Tactical C. Strategic D. None of the above

42. What is the highest level of decisions? A. Strategic B. Tactical C. Operational D. None of the above

Chapter 2:

1. Computers are typically discussed in terms of two important classifications: ______ and _________. A. People, Data B. Hardware, software C. People, Software D. Software, Data

2. Recently, computers become _________ enough and ________ enough to handle more complex sound and video data on a regular basis. A. Fast, inexpensive B. Slow, expensive C. Fast, expensive D. Slow, complex

3. The industry often refers to the ________ number of bits that a processor can handle. A. Minimum B. Maximum C. Average D. None of the above

4. Common machines (computer systems) use _____ -bit processors, but the industry is slowly shifting to _________ -bit processors. A. 32, 64 B. 64, 32 C. 16, 32 D. 8, 16

5. In the object oriented programming approach, each object has _________ and ________. A. Values, inputs B. Properties, functions C. Inputs, values D. Functions, inputs

6. Standard methods to manipulate text include_________, _________, and _________. A. Totals, calculations, comparisons C. Recording, playback, compression B. Searching, formatting, spell-checking D. None of the above

7. Standard functions dealing with numbers include _________, _________, and _________. A. Totals, calculations, comparisons C. Recording, playback, compression B. Searching, formatting, spell-checking D. None of the above

8. Existing functions for sound and video are often limited to _________, _________, and _________. A. Totals, calculations, comparisons C. Recording, playback, compression B. Searching, formatting, spell-checking D. None of the above

9. Unicode is a(n) _________ standard that defines character sets for every modern language and even most dead languages. A. International B. National C. European D. None of the above

10. Unicode uses two bytes to count each character or ideogram, enabling it to handle _____________ ideograms in each language. A. 28 B. 216 C. 224 D. None of the above

11. The basic rules of thumb state that most printed text is displayed at______ to ______ points. A. 12, 14 B. 10, 12 C. 14, 16 D. None of the above

12. It is useful to know that letters in a 72-point font are approximately ______ inch(es) tall. A. One B. Two C. One half of an D. None of the above

13. Bitmap pictures are evaluated in terms of the number of ________ and ________ of the picture. A. Colors, resolution B. Dots, resolution C. Colors, dots D. None of the above

14. Two major formats are used for sharing image files are _______ and ________. A. MPG, AVI B. GIF, JPEG C. TIF, WAV D. BMP, MID

15. ________ files combine the advantages of both GIF and JPEG formats. A. PNG B. MPG C. AVI D. TIF

16. Vector images consist of __________ descriptions instead of dots. A. Positional B. Mathematical C. Physical D. None of the above

17. Graphic devicesincluding displays, printers, digital cameras, and scannersare evaluated largely in terms of _________.

A. Bandwidth

B. Resolution

C. Frequency

D. Amplitude

18. ________ storage capacity and __________ costs make it easier for sound to be stored in digital format. A. Decreased, increasing B. Increased, declining C. Increased, increasing D. Decreased, declining

19. Sound consists of two basic components: __________ and __________. A. Amplitude, frequency B. Volume, speed C. Frequency, velocity D. Density, weight

20. If a sound signal is sampled more often, you will receive ________ quality recording, but it can take considerably _______ storage space. A. Lower, less B. Higher, more C. Higher, less D. Lower, more

21. Several recent technological changes are _________ the cost of digitized video, which will ultimately _________ its use in business. A. Raising, increase B. Lowering, decrease C. Lowering, increase D. None of the above

22. Standard movies display _______ frames (images) per second, while U.S. televisions display ________ frames per second. A. 30, 24 B. 24, 30 C. 30, 40 D. 40, 30

23. A typical CD holds _______ megabytes of data, which can store _____ minutes of stereo music. A. 700, 72 B. 200, 60 C. 200, 72 D. None of the above

24. Video generates approximately _____ megabytes of data every second. A. 3 B. 6 C. 9 D. 2

25. _________ compression methods are commonly used to transmit photographs, audio files, and videos. A. Lossy B. Lossless C. Linear D. None of the above

26. The processor carries out instructions written by various programmers and uses ______ to temporarily store instructions and data. A. RAM B. ROM C. Secondary Storage D. None of the above

27. Data and instructions that need to be stored for a longer time are transferred to _______ storage. A. RAM B. ROM C. Secondary Storage D. None of the above

28. Because most disk drives are mechanical, performance time is measured in ________. A. Milliseconds B. Microseconds C. Nanoseconds D. Seconds

29. The exponential increase in performance arises because the industry has been able to follow _________ Law: the number of components placed on a chip doubles every 18 months. A. Moores B. Archimedes C. Einsteins D. Newtons

30. Moores Law states that the number of components placed on a chip ________ every _________ months. A. Triples, 18 B. Doubles, 18 C. Doubles, 24 D. Quadruples, 18

31. Although RAM speeds have remained relatively constant in the last few years, RAM price has ________. A. Risen B. Dropped C. Remained constant D. None of the above

32. The search for extraterrestrial intelligence (SETI) project is the most famous example of using a ________________ approach. A. Grid computing B. Serial computing C. Parallel computing D. Serial-parallel computing

33. Most computers today utilize a separate ________ processor to draw items on the screen. A. Graphics B. Serial C. Parallel D. None of the above

34. The purpose of an input device is to convert data into electronic ________ form. A. Analog B. Binary C. Analog-Binary D. None of the above

35. ___________ is the study of how machines can be made to fit humans better. A. Ergonomics B. Economics C. Logics D. Rhetoric

36. When you are dealing with pictures, it is often helpful to have a scanner convert a paper-based image into _________ form. A. Vector B. Bitmap C. Analog D. None of the above

37. Name the primary input device for pen-based handheld computers. A. Keyboard B. Pen C. Mouse D. Touchpad

38. Sound is initially captured with a microphone that converts sound pressure waves into electrical signals. A _________ then converts these signals into numeric data that can be stored on the computer. A. Speaker B. Amplifier C. Sampler D. Server

39. Sound boards can be purchased for personal computers that contain both the _______ and _________ technology. A. Amplifier, sampler B. Sampler, synthesizer C. Amplifier, synthesizer D. Amplifier, server

40. Name some of the common problems encountered in speech recognition systems. A. Use of homonyms, variations in speech patterns, and the effects of punctuations on meaning B. Volume of the speech, pitch of the speech, and driving voltage of the speech recognition system C. Amplitude of the speech, frequency of the speech, and variations in speech patterns D. None of the above 41. Keyboards do not work well in a wireless environment, as they are too_________ to be portable and ________ to use. A. Small, easy B. Large, hard C. Small, hard D. Large, easy

42. Because computer and television sets are loosely based on (the) ________ technology, it would seem _________ to merge the two. A. Same, easy B. Different, easy C. Different, difficult D. None of the above

43. Computer projection systems for meetings and presentations use _________ light to project an image onto a screen. A. Low-intensity B. Medium-intensity C. High-intensity D. None of the above

44. What are the common resolutions of laser printers? A. 900 dpi and 1500 dpi C. 1200 dpi and 1800 dpi B. 600 dpi and 1200 dpi D. 1800 dpi and 2400 dpi

45. What is the main reason that the standard high-speed RAM cannot store data? A. RAM is dynamic B. RAM is static C. RAM is slow D. RAM is fast

46. What is the most common method of secondary storage? A. High-speed RAM B. Disk drive C. Floppy Disk D. None of the above

47. Today, a fast USB drive can write ___ megabytes per second, while an average disk drive can write ___ megabytes. A. 10, 60 B. 5, 30 C. 20, 120 D. 15, 90

48. In addition to duplication, RAID systems provide ______ access to the data, because each of the drives can be searching through its part of the file at (the) _____ time(s). A. Faster, same B. Slower, same C. Faster, different D. Slower, different

49. Compared to CDs, the strengths of DVDs include: (1) ____________, (2) ___________, and (3) _____________.

A. Increased capacity, significantly faster access speeds, and standards for audio, video and computer data B. Decreased capacity, slower access speeds, and standards for computer data C. Increased capacity, slower access speeds, and standards for video data D. None of the above 50. What is the nominal storage capacity of commercial DVDs for movies? A. 18 GB B. 9 GB C. 27 GB D. 4.77 GB

51. The operating system is _________ that is responsible for communication among the hardware components. A. Software B. Hardware C. Groupware D. NetWare

52. Both Sun (Solaris) and IBM (AIX and Linux) focus on ______ versions for their servers. A. Windows XP B. UNIX C. Windows NT D. Mac OS

53. Establishing an e-business requires that you either run a _______ or pay someone to run it for you, so you should understand some of the main issues in Web _______. A. Server, servers B. Printer, site C. Scanner, servers D. Printers, servers

54. A Web server is essentially a piece of ______ that monitors the full time _____ connection and delivers the required pages. A. Hardware, Internet B. Software, Internet C. Hardware, server D. Software, server

55. To perform e-business tasks, the server needs to evaluate programmed Web _____ and interact with a __________. A. Code, database B. Site, server C. Code, server D. Site, database

56. Early uses of computers focused on improving ________ by automating manual tasks and today, managerial uses often focus on ___________. A. Processing, creativity B. Efficiency, effectiveness C. Processing, effectiveness D. Efficiency, creativity

57. In terms of productivity, a database management system can both make you more ________ and __________ your decisions. A. Efficient, improve B. Inefficient, disprove C. Inefficient, improve D. Efficient, disprove

58. Today, along with numbers and text, database management systems can handle: A. Large text files, pictures, sound, and video B. Target tracking, target classification, a missile system tracking C. Battle management, moving target tracking, and GPS-guided missile tracking D. Traffic control, flight control and GPS-guided missile tracking 59. Spreadsheets perform various __________ and __________ analyses. A. Statistical and mathematical C. Physical and financial B. Graphical and financial D. Physical and mathematical

60. Word processors improve communication by making it easier to _____ text, find writing _______, and produce _______ report. A. Revise, errors, and legible C. Improve, qualities, and analytical B. Read, difficulties, and scientific D. Improve, styles, and official

61. Voice mail systems record messages much like an answering machine, but they store the messages in ________ form on computers. A. Analog B. Digital C. Hybrid D. None of the above

62. With the appropriate mail filters, junk mails can be discarded _______. A. Manually B. Automatically C. Remotely D. Precisely

63. The calendar software searches each personal calendar for the _________ time for the meeting and overrides _______ meeting meetings and places the complete notice on each persons calendar in a matter of seconds. A. Best, lower-priority B. Best, high-priority C. Worst, lower-priority D. Worst, high-priority

64. Conventional monitors operate at: A. 200-dpi resolution B. 100-dpi resolution C. 300-dpi resolution D. 400-dpi resolution

65. Newer technologies will produce _______ resolutions for monitors, which will produce good quality text at traditional book sizes. A. 400-dpi B. 600-dpi C. 100-dpi D. 200-dpi

66. Linux is a(n) ________ software. A. Application B. System C. Open-source D. None of the above

Chapter 3
1. One of the most important reasons for connecting computers is: A. The ability to share printers C. It is easier to control the firewall B. The ability to share data D. E-mail becomes available

2. A local area network (LAN) is used to connect computers and share data within: A. A company B. Larger geographic area C. A city D. A state

3. E-commerce consists of a transaction system with the Internet as the ________ and customer browsers as the __________ computers. A. Network, client B. Link, client C. Link, server D. Network, server

4. If a manager can transfer business data directly from the central database to the personal computer, it becomes ______ and prevents _________. A. Slower, confusions B. Faster, errors C. Faster, confusions D. Slower, errors

5. Without networks and centralized data sharing: A. A company cannot access the Internet B. Managers can hold data hostage C. Many managers experience problems because they different versions of the same data D. In is impossible to obtain a snapshot of the companys financial position 6. E-mail messages are: A. Synchronous B. Asynchronous C. Analog D. None of the above

7. Unless the laws are rewritten, it is ________ for employers to read everyones e-mail messages. A. Legal 8. Web sites are: A. Bulletin boards that are used to make information available to many people over the Internet B. Infamous carriers of viruses C. Subject to FCC rules D. Designed to be copied from server to server to distribute information 9. Intranet sites use Internet technologies but employ security methods to restrict access to ______ users. A. External B. Internal C. All D. None of the above B. Illegal C. Fine D. None of the above

10. Intranets and extranets use the same technologies as the common ________, but are limited to_______ groups of users. A. Internet, special B. Intranet, all C. Extranet, special D. Internet, all

11. A Web log is an interesting variation of a Web site, and it is essentially: A. A diary on any topic posted on a special Web site for everyone to read C. A description of a particular book B. A log of business transactions D. None of the above

12. Managers enter planned meeting times and scheduled events into their personal electronic ___________ file. A. Output B. Calendar C. Data D. None of the above

13. E-mail systems can work as simple ___________ tools by routing copies of files to everyone on the team. A. Case B. Groupware C. NetWare D. Design

14. With a __________ network, the backup process is almost completely automatic. A. Communication B. Serial C. Parallel D. Local

15. An advantage to networks is that they: A. Are easier to make secure than individual computers C. Enable employees to share expensive hardware 16. The ability to share printers through the network: A. Is a way to make sure employers are not printing personal documents B. Allows one printer in a central location to do all the printing for the firm C. Allows encryption of documents on the intranet D. Allows users to select the type of printer best suited to the current document being printed 17. High-speed, high-quality printers are: A. Not practical for small firms C. Outdated B. Useful for users with networks, because they can be shared as needed D. Not necessary for anyone but the military and insurance companies B. Allow continuous backup of all documents D. Are less expensive than T1 lines

18. __________ can be used to share access to supercomputerseven if they are in a different city or different country. A. Networks B. Planning C. Designing D. None of the above

19. Several e-commerce printing companies enable you to send your large print jobs over the ________ and have the boxes of papers shipped to you. A. Internet B. Telephone C. Faxes D. none of the above

20. Grid computing extends the concept of ___________instead of multiple processors in one computer. A. Parallel processing B. Serial processing C. Multiple programming D. None of the above

21. Some experts predict that within a few years, almost all calls will be made over the ___________ instead of traditional phone calls. A. Packet switching B. Cellular network C. Private branch D. Secured network

22. Newer technologies are emphasizing the value of routing all communication over a single Internet-based network, often called: A. Cellular network C. Packet switching network 23. Components of a network include: A. Computers, transmission medium, and connection devices C. Scanners, modems, and computers B. Printers, monitors, and connection devices D. Digital cameras, printers, and modems B. Voice over Internet protocol (VoIP) D. Private branch exchange (PBX)

24. To make the connection, each device connected to a network must have: A. A network card B. A modem C. A monitor D. A printer

25. The _______ is crucial to making a server farm work efficiently. A. Work load level B. Number of hubs C. Operating system D. The number of users

26. One way to handle server scalability is to purchase a _____________ server within the same product family. A. Faster performance B. Slower performance C. Low-cost D. None of the above

27. Another way to handle server scalability is to build a ________ where the workload is automatically distributed across machines and new low-cost servers can be added at any time. A. Server farm B. Network C. Network interface card D. None of the above

28. The thin-client PDAs rely on: A. Their NIC cards B. The server C. The medium used D. The size of their memory units

29. The oldest form of electrical wiring is: A. Copper wire B. Unshielded coaxial cable C. Parallel pairs D. Twisted pair

30. The second wire in coax is: A. Steel C. Fiber optic 31. A fiber-optic cable consists of: A. Steel C. A glass or plastic core that is surrounded by a reflective material 32. The theoretical capacity of a single fiber-optic cable is at least: A. 100 kilobits per second C. 100 gigabits per second 33. Any transmission line longer than 90 meters (295 feet) should use: A. Twisted pair B. Fiber-optic connections C. Coaxial D. None of the above B. 100 megabits per second D. 100 terabits per second B. A metallic foil wrapped around the entire cable D. Non-conductive plastic B. A metallic foil or mesh that is wrapped around the entire cable D. Non-conductive plastic

34. Only a small number of radio frequencies: A. Are still available B. Are microwave frequencies C. Can be used to carry data D. Can cover long distance

35. Shorter wavelengths can carry: A. Less data B. More data C. Any data D. None of the above

36. Although wireless Internet connections are not yet as fast as broadband connections, it is __________ expensive to reach people with wireless connections. A. More B. Less C. Same D. None of the above

37. On a dial-up line, it takes about 8 seconds to download: A. A full-screen graphic in color C. 50K bytes 38. DSL is a system offered by phone companies using: A. The twisted-pair phone line into your house C. Coaxial cable line into your house B. The fiber-optic cable line into your house D. None of the above B. 3 Mb of sound D. A screen change with graphics

39. The DSL line is ____________ between your house and the phone company. A. Not shared B. Shared C. Direct D. None of the above

40. Wireless radio connections always use a: A. Direct medium B. Shared medium C. Microwave guide D. PSTN

41. _________ are crucial to improving efficiency in large networks. A. Routers and switches B. Modems C. Printers D. Servers

42. The performance of the network depends on:

A. The speed of the switch C. The processing speed of the computer

B. The data rate of the modem D. None of the above

43. A network that connects various subnetworks across a firm is called a(n): A. Enterprise network B. Voice network C. PSTN network D. Packet-switched network

44. Without __________, there is no way to connect computers or networks produced by different vendors. A. Modems B. Switches C. Routers D. Standards

45. Corporate telecommunication standards should be reevaluated every year or so to make sure that: A. They are still following the standard C. The security level is still acceptable B. They are fast enough D. They are still the best solution

46. In the TCP/IP reference model, the Internet layer is concerned with: A. Routing messages to the appropriate location C. Checking messages for major viruses 47. The newer IPv6 supports: A. 16-bit addresses 48. A newsgroup is: A. Closed group to which the new user requests admission C. An edited bulletin board managed by a leader 49. Internet 2 calls for: A. Gigabit connection points C. Microsoft operating systems 50. In 1999, there were (an) ________ users of Internet 2. A. More than one million B. 10,000 C. Unknown D. 100 B. A new naming system for users D. Sun technology B. A giant, global bulletin board D. Connected to all the major news organizations globally B. 32-bit addresses C. 64-bit addresses D. 128-bit addresses B. Checking the security level of the messages D. Keeping the entire message together as one packet

51. In 2003, there were (an) ________ users of Internet 2. A. More than one million B. 205 C. Unknown D. 10,000

52. The third generation cell phone is being designed to handle data at speeds from ____ to _______. A. 56 kbps, 2 mbps B. 56 kbps, 100 mbps C. 56 kbps, 1000 mbps D. 56 kbps, 1000 kbps

53. An interesting possibility for m-commerce comes from the ability to use: A. Location to identify possible customers C. Multiple persons on the same connection B. Graphics and video D. A special cash card to initiate transactions

54. Federal government requires that cell phone systems provide caller location within: A. 100 feet B. 200 feet C. 300 feet D. 400 feet

55. In 2003, the United States enacted the CAN-SPAM Act, which makes many types of e-mail: A. Legal B. Illegal C. Permissible D. None of the above

56. Business firms are becoming more dependent on: A. Fiber-optic lines B. Extranets C. Client-based advertising D. International markets

57. Microwave satellite transmission is worth the expense if you: A. Require absolute security for your messages B. Require speed for your messages

C. Have huge amounts of data to transfer 58. Multinational operations generally require: A. A working knowledge of several languages for all employees C. Extensive cultural training for each location

D. Have line-of-sight between sender and receiver

B. The services of a local attorney D. Management by local employees

Chapter 4
1. The purposes of a DBMS are: A. To provide shared access to data, answer questions, and create reports from the data B. To provide data concurrency, provide query options, and automatically create input screens C. To maintain data definitions, input data to master files, allow data to be accessed as needed D. To maintain data files at manageable size, maintain data catalogs, provide query options 2. In the 1960s and 1970s, before the use of DBMSs, a manager who needed a new report: A. Had to combine several others to create the new one C. Had to re-enter much of the data B. Needed a programmer to create new code for it or modify older code D. Had to create a new program with new data

3. An important characteristic of databases is that they are designed to: A. Help users examine the data from a variety of perspectives C. Create new reports from old data 4. In the relational DBMS, data are stored in: A. Tables of columns and rows of data C. Files with non-repeated data 5. Reports are created by: A. The MIS department C. Laying out data, text, and graphics on the screen 6. Relational databases are specifically designed to: A. Create opportunities for managers to gather their own information C. Allow many tables to be created and then combined in interesting ways 7. The Database administrator: A. Asks ad hoc questions of the data C. Generates the data that fills the database 8. The manager: A. Asks ad hoc questions of the data C. Generates the data that fills the database 9. The programmer: A. Asks ad hoc questions of the data C. Generates the data that fills the database 10. The business operator: A. Asks ad hoc questions of the data C. Generates the data that fills the database 11. In the relational DBMS, data are stored in: A. Tables of columns and rows of data C. Files with non-repeated data B. Very large unrelated data files D. A large mainframe computer B. Creates applications and programs that collect data and produce reports D. Defines and maintains the overall structure and data B. Creates applications and programs that collect data and produce reports D. Defines and maintains the overall structure and data B. Creates applications and programs that collect data and produce reports D. Defines and maintains the overall structure and data B. Creates applications and programs that collect data and produce reports D. Defines and maintains the overall structure and data B. Be easily understood by non-programmers D. Normalize automatically B. Associated applications that are purchased separately D. Programmers B. Very large unrelated data files D. A large mainframe computer B. Maintain efficiency D. Maximize management effectiveness

12. The basic choices of types of data in a DBMS include, but are not necessarily limited to:

A. Labels, formulas, and functions C. Text, dates, (and times), numeric, and objects (graphics, video, and sound) 13. Whenever possible, dates should be stored in: A. Label format B. Text format

B. text, data checkers, Boolean functions D. text, numbers, formulas

C. Date format (numeric format)

D. Object format

14. A nice feature of the DBMS is that the underlying tables: A. Can be used separately by different departments B. Can be expanded and new tables can be added without interfering with the existing tables or current programs C. Can be updated by multiple users at once D. Are always consistent 15. Whenever someone needs a computer application, the first step is to: A. Gain management support C. Determine the size of the various data files 16. The goal of the DBMS approach is to: A. Gather only data that will be useful C. Keep data files small enough to be practical B. Collect accurate data, make it available to users, and minimize unnecessary duplication of data D. Maintain an efficient operation B. Make sure the hardware will support the files D. Identify the data that will be needed

17. If one of the most important steps of developing a solution is to break the problem into smaller pieces, it is well to remember that: A. Data files, if kept small, are easier to understand and work with B. The data are a major piece, and a DBMS makes tracking data much easier C. The more data there are available, the easier it is to define the pieces of the problem D. Programmers and MIS personnel are trained to handle such problems 18. When one queries a database using QBE, it is easier to: A. Start with an existing view C. Write the design of the query on paper before beginning 19. When one queries a database using SQL, it is easier to: A. Start with an existing view C. Write the design of the query on paper before beginning B. Choose the tables first D. Choose the output first B. Choose the tables first D. Choose the output first

20. Using QBE, if the conditions are placed on the same row, the interpretation is a(n) _____________ condition. A. LIKE B. OR C. AND D. WHILE

21. Using QBE, if the conditions are placed on different rows, the interpretation is a(n) _____________ condition. A. LIKE B. OR C. AND D. WHILE

22. When using the pattern command LIKE, V?? stands for: A. Any column in the data file that begins with V followed by two numbers B. Any row in the data file that begins with V and contains only letters C. Any two characters including and following the letter V in the subject column D. One single character after the letter V in the subject column 23. If you are looking for entries that are blank in the subject column, the condition to enter is: A. Zero (0) B. BLANK C. One space character ( ) D. NULL

24. SQL has two advantages over QBE: A. It is easier to write, and it is a standardized language B. It is a standard language supported by many different database systems; and it is easier to read C. It becomes as the default query generator on most systems, and it can transfer to the Internet D. It is easier to write, and it can transfer to the Internet 25. The SQL command to retrieve all the data in the Orders file is:

A. SELECT FROM Orders WHERE * C. Orders, ALL 26. A useful feature of both SQL and QBE is the:

B. SELECT * FROM Orders D. Select * WHERE FILE Orders

A. ABSOLUTE function B. Ability to specify up to fifteen decimal intervals C. Ability to define the standard for the Internet use of each one D. Ability to divide the rows into groups and get subtotals or other calculations for each group 27. Both SQL and QBE can: A. Create text documents in WORD C. Use JAVA applets 28. You can achieve answers to many different questions by: A. Careful use of Aristotelian principles C. Treating specific field denominators as groups 29. SQL statements are: A. Often easier to read than QBE statements C. More difficult to read than QBE statements B. Not proprietary statements D. Never automatically generated B. Using the AVG function in connection with the NULL function D. Combining selection clauses with simple calculations B. Perform simple calculations D. Integrate data types within the same column

30. Once tables are joined, the DBMS retrieves and displays the data: A. Sequentially by record number C. With random access 31. The true power of a DBMS lies in the ability to: A. Use any form of query system if the objects are carefully defined B. Create reports easily from one table C. Combine data from multiple tables D. Be understood by general management personnel 32. The advantage of views is that you can: A. Put a password on the view C. See all the data in all the files in one report B. Limit the accessibility to immediate users D. Look at the data in different ways without having to duplicate the data B. As if it were stored in one single table D. For any report required

33. The worst problem with poor DBMS design is that it leads to: A. Excessive reports that are not needed by current management C. Too much data collected inappropriately 34. When designing databases, it is essential to understand: A. DBMS training for management C. The number of columns for each table B. The main format D. The relationships between various entities B. Unnecessary duplication of data with concurrent potential of error D. Poor security

35. When writing table definitions in standard notation, one puts ________ to denote one-to-many or repeating relationships by placing: A. A comma B. Parentheses C. A semicolon D. A square bracket

36. A table that contains repeating sections is not in __________. A. First normal form B. Second normal form C. Third normal form D. Fourth normal form

37. When each non-key column in a table depends on the entire key, the table is in: A. First normal form B. Second normal form C. Third normal form D. Fourth normal form

38. The conditions required for third normal form are: A. One primary key for each table, tables linked by order of primary key, one-to-many relationships are required B. One-to-many, one-to-one, and many-to-many relationships are automatically delineated for each table with respect to all the others C. No repeating groups in the tables, each non-key column depends on the whole key, and nothing but the key

D. Each non-key column depends on the whole key, while many-to-many relationships are not supported because they are not necessary 39. It is wise, and often simpler, when planning an input form, to: A. Look at all the possible views that might be combined to create the form B. Ask your secretary what would be the easiest way to enter the data C. Draw it on paper first to get a feel for what you want it to look like D. Begin with an existing form and modify it 40. Most input forms begin with: A. Blank screen with a menu line C. A view specified in the top area of the screen, with all relationships defined B. A default form containing all the column names D. A template chosen from a menu

41. In the process of increasing the storage space for monster databases, challenges faced by the DBM are: A. Performing sufficient backup of data, ensuring continuous data flow, planning reports as managers request them B. Designing the entire system to handle the increased processing, searching, and sorting demands C. Adapting hardware and software to special needs, installing new software, checking software changes D. Making sure managers have the data they need for their reports, timely backup, adapting software to special needs 42. Typically, several DBAs are used to monitor and control various: A. Databases B. Expenses C. Programs D. Tasks

43. Data administrator (DA) is charged with: A. Overseeing all of the data definitions and data standards for the company B. Performing sufficient backup of data, ensuring continuous data flow, planning reports as managers request them C. Designing the entire system to handle the increased processing, searching, and sorting demands D. Looking at the data in different ways without having to duplicate the data

Chapter 5
1. Since the Internet is a _______ public network, data needs to be _________ in transmission to ensure it is not __________ or altered. A. Shared, protected, and intercepted C. Direct, altered, and intercepted B. Direct, digitized, and reflected D. Shared, digitized, and mutilated

2. For a firm to maintain virtually continuous information system support, these are required: A. Adequate backup copies, careful planning, organization, and enough money B. Adequate backup, trustworthy employees, trained personnel, and a disaster plan C. Trained personnel, a disaster plan, good security procedures, and adequate backup D. Organization, trained personnel, a disaster plan, good security procedures 3. One common level of disaster recovery support, called a hot site, consists of: A. A fully functional computer C. A software system B. A fully configured computer center D. A secured PC

4. Another alternative disaster recovery support, called a cold site, which provides: A. Fully functional computer room space, without the computer equipment C. A software system 5. The difference between a hot site and a cold site is: A. The hot site uses data mirroring techniques, the cold site uses backups B. The hot site has specific computer equipment already installed and ready to go, the cold site provides computer room space C. The hot site is located within a ten mile radius, the cold site can be anywhere in the world D. The hot site has programmers on hand to help; the cold site is staffed by the company involved 6. Companies enforce a separation of duties: A. Among staff programmers and users C. Among customers and managers B. Among customers and marketers D. Among customers and staff B. A fully configured computer center D. A secured PC

7. A danger to security is that programmers might include a(n) _____________ or ___________ allowing them to gain access to the system even if they leave the firm. A. Secret virus, time bomb C. Worm, delete command B. Trapdoor, secret password D. Time bomb, backup erase command

8. The good news is that after December 4, 2004, you will be able to receive ___________. A. A free credit report once a year B. Social security benefits C. Medical benefits D. A free parking space

9. Two little-considered problems with data security could occur when: A. Passwords are written down, or the system administrator leaves the company B. A hacker within the company accesses files not meant for him or her, or when printouts are not carefully shredded C. The virus program is not sufficient, or the system administrator is not competent D. The equipment is sent out for repair, or when old tapes, disks, and hard drives are not destroyed when their use is over. 10. The best way to minimize problems from employees stems from good management techniques: A. Check references as necessary, train employees as needed, accent teamwork, reward good work B. Promote from within, watch password and change them frequently C. Hire workers carefully, treat employees fairly, assure separation of jobs, accent teamwork, and maintain constant checks D. Maintain constant checks on employee e-mail, promote from within, and employee good security procedures 11. The electronic data interchange (EDI) means that business information is processed _________ and with ________ errors. A. Slower and more B. Faster and fewer C. Slower and fewer D. Faster and more

12. One key to protecting your servers is to make sure they: A. Have all current operating system patches C. Dont have too many people with password access to them B. Have good physical security D. Undergo continuous backup

13. Microsoft Office software presents a major point of vulnerability because the tools: A. Support a macro programming language called Visual Basic for Applications C. Supports hypertext markup language B. Support FORTRAN for Applications D. Supports COBOL language for business applications

14. In 1999, software virus costs were estimated to slightly under $ _______ in the United States. A. 5 billion B. 5 million C. 8 billion D. 8 million

15. The best way to stop a virus is: A. Keep your virus software updated daily B. Do not run software downloaded from Internet, and never open script attachments sent through e-mail C. Stay off the Internet D. Accept mail only from persons you know 16. Today, there are: A. Virus kits on the Web that make creating viruses a simple matter C. Secret ways known only to the manufacturer that give virus protection for a fee B. Some development of ethics amongst hackers D. Foolproof virus detection software packages

17. The spyware takes residence inside your computer and captures all of your activities, such as: A. Web sites visited, passwords entered, and credit card numbers C. E-mails forwarded, diskettes used, and printers used B. Floppy diskettes used, printers used, and scanners used D. Scanners used, passwords entered, and printers used

18. The three most difficult problems with protecting transaction and accounting data are: A. Employee mistakes, unauthorized access from outside suppliers, loss of information through insufficient backup B. Employee mistakes, unauthorized modification, insufficient backup C. Unauthorized disclosure of information, unauthorized modification, unauthorized withholding of information D. Unauthorized access from outside suppliers, sequestered information, careless use of password 19. With a formal backup plan, data is transported to a portable format, usually:

A. Tapes or DVD drives C. Duplicate hard drives

B. Broadcast to an Internet data holder D. Tapes and diskettes

20. For securing backup files, smaller businesses can use: A. Their own tape drives C. Hard-copy printouts 21. The biggest difficulty with passwords is that: A. Users try to choose one they will remember which is usually too simple C. They are too easy to guess 22. The common access controls available are: A. Read, write, copy, delete C. Read, write, execute, delete B. Create, modify, save, retrieve D. Format, save, retrieve, send B. The system administrator knows them all D. A hacker can keep trying until he/she gets a hit B. Trade-off backups with non-competitors D. Commercial data storage facilities

23. If multiple people have permission to change a document, it is essential that you: A. Monitor the changes continually C. Get frequent hard-copy printouts B. Set the document to track the changes made by each user D. Set the document to mark changes with slash characters that still allow the material to be read

24. __________ standards exist for collecting, storing, or sharing authentication data. A. Few B. None C. Hundreds of D. Thousands of

25. Audits are used to___________ and ___________. A. Locate mistakes and prevent frauds C. Report IRS and pay taxes B. Determine taxes and save money D. Correct tax returns and save money

26. Audit standards are provided by the _____________ are useful guidelines for combating fraud. A. Internal Revenue Service C. Federal laws and practices B. The CPA Company that conducts the outside audit D. American Institute of Certified Public Accountants

27. The fact that every device connected to the Internet is given a unique number as an address means that: A. Privacy is a dead issue C. Message can be tracked to the server from which they originated B. Every Web site you visit can track that number D. We are soon to run out of usable numbers

28. Employees who work closely together can defuse potential problems by: A. Developing friendship C. Knowing each others abilities 29. The essence of single-key encryption is that: A. Both the person who encrypts the message and the person who decrypts it use the same key B. The message is encrypted twice C. The sender and receiver use different software for encryption and decryption D. Both people do not need to have the same key 30. Data Encryption Standard (DES) system supported keys of: A. 256 bits B. 3 bytes C. 64 bits D. 56 bits B. Monitoring each others work D. Forming team relationships

31. Advanced Encryption Standard (AES) users have a choice of a key length of: A. 8, 16, or 32 bits B. 32, 64, or 128 bits C. 128, 192, or 256 bits D. 64, 150, or 200 bits

32. The essence of PKI is that: A. The system uses two keys: a public key and a private key C. The system uses two public keys 33. The essence of a dual-key system is that: B. The system uses single key D. The system uses two private keys

A. The message is encrypted twice C. If one key doesnt work, the other will

B. It takes both keys to encrypt and decrypt a message D. All keys can be private keys

34. In a dual-key system, whenever someone wants to send a secure message, he or she simply uses ____________ and _____________. A. RSA algorithm and public key C. Private key and private key 35. PKI can be used for: A. Browsing C. A free encryption system, but monitored by the government 36. To make PKI work, it is critical that: A. Both networks use it C. Rules and regulations be developed as soon as possible B. A trusted organization holds the public keys and their identities D. The information not be available on the Internet B. Authentication D. Clipper chip encryption B. Private key and public key D. Public key and public key

37. Verisign issues _____________________ that verify the identity of the person generating the public key. A. Special codes B. Filters C. Special passwords D. Digital certificates

38. In UK, _________ of the nations 140,000 police officers are trained to handle digital evidence, and fewer than __________ police officers have advanced computer forensics skills. A. 10,000 and 2,500 B. 1,000 and 250 C. 5,000 and 4,000 D. 50,000 and 25,000

39. Most Web sites use dual-key encryption through a system known as: A. SSL B. HTML C. FTP D. HTTP

40. A (n) ________________ encrypts all transmissions before they are sent across the Internet. A. Credit certificate B. VPN C. Clipper chip D. CCV

41. Alert customers can spot the fraud immediately, because the_________ in the browser will be wrong. A. DTP B. URL C. PIM D. CAD

42. Crnivore, an FBI-sponsored computer system introduced in 2000, wasa re-named in 2001 to, which fooled nobody: A. Echelon B. Escrow Key System C. USA-4400 D. DCS-10000

43. _______________ is a secret security-key project run internationally by the NSA in cooperation with Canada, the UK, Australia, and New Zealand. A. Echelon B. VPN C. AARD D. Virtuoso

44. The main problem with using a required escrow key is: A. Keeping it secured C. Privacy concerns for US citizens 45. Encryption is particularly useful for: A. Criminals B. Terrorists C. Sending credit card data over the Internet D. Banking houses B. To whom do you give permission to use it? D. Many other nations do not allow encryption

Chapter 6
1. Electronic commerce can be used to: A. Handle consumer and business transactions over the Internet C. Manage information systems overt the Internet 2. Hierarchical structures evolved to: A. Collect data at the tactical level and distribute them among the managers at tactical level B. Handle data over the Internet D. Organize marketing of the products over the Internet

B. Collect data at the point of sale, summarize it, and move it up the chain of command to the CEO C. Collect data at the strategic level and distribute them among the executives D. Collect data from the vendors, summarize it and move it to the operational managers 3. Wal-Mart has succeeded because it uses ______________ to handle transactions and operations at the _______________ cost. A. Information technology and lowest C. Modern transportation technology and lowest B. People and highest D. Optical technology and highest

4. In a retail sale environment during 1970s, cash register was replaced with a ___________ and ________. A. Computer terminal and a bar code C. OCR system and people B. Computer terminal and a RFID D. MICR system and a RFID

5. The exchange of data between manufacturing machines and computers is known as _________. A. Transaction processing C. Data re-set 6. It is critical that transaction data be saved so that: A. The IRS can document the transactions of the company C. Reports will be accurate 7. POS stands for: A. Possibility of success C. Priority over standards B. Post office security D. Point of sale B. Auditing by an outside agency may be validated D. Verification may be made if conflicts arise B. Process control D. Data transfer

8. If there are problems in the data or in providing access to it in timely fashion: A. All decisions made by the firm will suffer C. The books will not balance properly 9. Bar code scanners read the: A. Moores codes 10. RFID stands for: A. Radar frequency identification C. Radio frequency identification B. Radar friendly identification D. Return foe identification B. Run-length code C. Universal product codes D. Lempel-Ziv universal codes B. Eventual collapse of the company will ensue D. Legal risks arise

11. RFIDs are small ___________ about the size of a grain of rice that consist of a (n) _________ and some transistors. A. Chips and antenna B. Transistors and reflector C. Chips and reflector D. Diodes and receiver

12. The capacity and range of RFID chips depend on the: A. Frequency B. Time C. Space D. Time and space

13. The ultra-high frequency RFID chips are typically scanned at less than _______ with a maximum of _________. A. 12 feet, 40 feet B. 25 feet, 50 feet C. 6 feet, 10 feet D. 30 feet, 60 feet

14. The high-frequency RFID chips are typically scanned at less than ______ with a maximum of _______. A. 2 feet, 20 feet B. 1 foot, 10 feet C. 2 feet, 30 feet D. 4 feet, 15 feet

15. The ultra-high frequency RFID chips can hold: A. 12 bytes of data B. 2 bytes of data C. 20 bytes of data D. 32 bytes of data

16. The high-frequency RFID chips can hold: A. 12 to 5,000 bytes of data C. 12 to 10, 0000 bytes of data B. 8 to 10,000 bytes of data D. 100 to 10, 1000 bytes of data

17. With POS data collection, the computer performs all necessary computations: A. Within one hour B. Immediately C. Within two hours D. Within three hours

18. When technology is used to collect data from manufacturing machines: A. Production levels can be monitored constantly C. Breakdowns can be discovered more quickly 19. The two basic difficulties with process control are: A. Computer malfunctions and heat on the production floor B. Shift changes of personnel and the amount of data produced C. Computer malfunctions and establishment of standards for large number of machines D. The amount of data produced and the establishment of standards for large number of machines 20. The major advantages to process control are that it allows: A. Quick changes in production processes and products, better information, mass customization B. Quick product updates, better reports faster, less training for employees C. Better data collection, occasional customization, efficient production of standardized items D. Problems show up faster, product characteristics are more accurately measured, fewer employees are required 21. When many firms need to exchange data with several other firms, it is best if: A. All data are encrypted C. The largest firm sets the EDI format B. The firms operate in an atmosphere of mutual trust D. They can agree to a common EDI transaction format B. Work levels can be monitored D. Fewer employees are required

22. A significant difference between the two primary standards now in existence for EDI messages is: A. One uses IBM formats, the other uses SUN systems B. The numbering system used to represent message types, segments, and data elements C. The data elements are different D. One is faster, though much less secure, than the other 23. Sharing data in EDI requires: A. Computers with the same operating systems, and using a standardized format B. High bandwidth capability for large amounts of data, good security practices C. Communication link and standards that define how the data will be interpreted D. Compatible formatting commands, high bandwidth capability for large amounts of data 24. Data is sent in a standard format that is easy for computers to: A. Parse and read B. Compress and print C. Decompress and output D. Digitize and print

25. Extensible markup language (XML) was developed in the last couple of years to: A. Provide better Internet support for EDI C. Provide better HTML programming support B. Provide better Web design support D. Provide better image compression technique

26. Laws and business procedures are created to _________ risks, so new laws are needed when transaction methods _________. A. Minimize and change C. Minimize and remain unchanged B. Maximize and change D. Maximize and remain unchanged

27. While there are laws against check fraud, the merchant would experience ________ to recover the money. A. High costs B. Low costs C. No costs D. Medium costs

28. Credit card companies accept risks for the _______________ but not for the _________. A. Vendors, consumers C. Creditors, vendors B. Consumers, vendors D. Manufacturers, consumers

29. Congress passed the _______________ Act that requires executives to take responsibility for all financial reports. A. Patriot B. Sarbanes-Oxley C. Immigration D. Uniform Computer Information Transaction

30. In e-commerce environment, both merchant and vendor need to be concerned about the transfer of ________ and ________ products. A. Money and digital B. Data and digital C. Data and analog D. Image data and manufacturing

31. The European Union has privacy rules that are substantially ________ than those of other nations, and it does not want international companies transferring _________data to computers outside of the Union. A. Stricter and personal C. Stricter and business B. More lenient and public D. More lenient and personal

32. Problems occurring with the data quality attribute of volume are/is: A. Too much detail to keep track of, but often difficult or impossible to recover the details later. B. Deadlines, different departments getting data at different times can cause sequencing errors and additional delays C. Cost, difficulty of searching, transmission costs, errors harder to find, system overloaded D. Errors in data entry, missing data, failure to make updates 33. Problems occurring with the data quality attribute of time are/is: A. Too much detail to keep track of, but often difficult or impossible to recover the details later. B. Deadlines, different departments getting data at different times can cause sequencing errors and additional delays C. Cost, difficulty of searching, transmission costs, errors harder to find, system overloaded D. Errors in data entry, missing data, failure to make updates 34. Problems occurring with the data quality attribute of integrity are/is: A. Too much detail to keep track of, but often difficult or impossible to recover the details later. B. Deadlines, different departments getting data at different times can cause sequencing errors and additional delays C. Cost, difficulty of searching, transmission costs, errors harder to find, system overloaded D. Errors in data entry, missing data, failure to make updates 35. Data allowed to be altered at the same time by two different people will cause: A. Incorrect results B. System crash C. Backup difficulties D. Program lockup

36. There are ______________ banks offering Visa cards, used by ___________ customers. A. 18,000, 10 million B. 1,800, 5 million C. 18 million, 20 million D. 36 million, 40 million

37. The MIS department would like to forecast the demands that will be placed on the computers at least _________ in advance. A. A year B. Three years C. Six years D. Five years

38. Higher-level managers in the firm deal with: A. Data that has gone through several types of summarizing at each lower level C. Data that has gone through tactical-level managers B. Data that gone through outside vendors D. Data that has gone through operational-level manager

39. To eliminate parts inventories held by manufacturers, manufacturing firms implement: A. Human resources planning C. JIT inventory control B. Vendor verifications D. Checks and balances on their production systems

40. To reduce costs and deliver exactly the needed products to every store, Wal-Mart uses: A. Vendor verifications C. Checks and balances on their production systems B. Human resources D. Distribution centers (DCs)

Chapter 7
1. One difficulty that arises when you are trying to integrate information is the: A. Diversity in hardware and software C. If programming is done in different languages 2. To evaluate customer service and quality, the store: B. When there are people from many nations D. If various communication software is employed

A. Tracks returned merchandise and produces a daily report by item number B. Takes the complaints from the customers and responds to the customer in 10 days C. Gives the money back to the customers for the price of the returned merchandise D. Issues a store credit voucher that can be used in the store to buy any products 3. Current trend in software is the adoption of enterprise systems that: A. Are easier for untrained mid-level managers to use C. Are produced by large companies like Oracle 4. In the 1960s and 1970s, computer systems were built for: A. The personal computer on the managers desk C. Individual departments and areas within the company B. Computers acting as drones for a centralized system D. Mostly insurance company use B. Hold data in a central database D. Are written in-house

5. With a ____________, the data can be located in different departments throughout the business. A. Network B. Software C. Hardware D. Server

6. With a(n) ________, top managers can use a personal computer to query the database, draw the graphs, and produce the final reports. A. TPS system B. Integrated system C. OAS system D. MIS system

7. One of the key points of ERP systems is that they run on top of a ________. A. Peoplesoft B. DBMS C. SAP D. Oracle

8. The amount of data integration needed in a company often depends on the _________. A. Management structure of the firm C. Operational structure of the firm 9. An oil company is a: A. Hybrid firm C. Vertically integrated firm 10. Wal-Mart is a: A. Hybrid firm C. Vertically integrated firm B. Horizontally integrated firm D. Firm that functions at different levels B. Horizontally integrated firm D. Firm that has retail stores in many different cities B. Financial structure of the firm D. Tactical structure of the firm

11. Manufacturing firms can gain additional benefits from: A. Purging data B. Distributing data C. Centralizing data D. Integrating data

12. A more complex feature for the international environment is the ability to produce reports following the: A. Culture of individual nations C. Rules of individual nations B. Custom of individual nations D. History of individual nations

13. Am important feature of the accounting system is that: A. Standard accounting reports can be generated at specific times for different sections of the company B. Accounting reports can be generated at specific times for different sections of the company C. Accounting reports can be generated at any time for some selected sections of the company D. Standard accounting reports can be generated at any time for any section of the company 14. Logistics consists of the: A. Operations required selling the final products in stores at several locations B. Operations required purchasing materials, delivering them to the warehouses and factories, and selling and distributing products C. Operations required purchasing the raw materials and delivering them to the manufacturing plants for the final products D. Operations required maintaining the integrity of the financial data 15. In todays manufacturing companies, logistics is an important component of: A. Transaction processing system and decision support system B. Executive information system and demand-driven production

C. Office automation system and decision support system

D. Just-in-time inventory and demand-driven production

16. Kent Dolby, the CEO of Elemica, Inc., notes that a key element of their system is the ability: A. To restrict data within departments, who must give permission for other departmental accesses B. To translate data from one clients computer to anothers C. To secure data from all outside access D. To store all data in a single warehouse 17. For service-oriented companies, logistics involves: A. Service management tasks B. Transaction processing tasks C. Executive information tasks D. Decision making tasks

18. Payroll is a complicated function, particularly in a multinational environment involving: A. Different times in different countries C. International travel times B. Different rules and currencies D. Security in foreign countries

19. Todays HRM departments handle such additional tasks as: A. Recruitment, training, travel, and organizational planning C. Analysis of software and hardware requirements 20. ____________ is the most important feature of the ERP systems. A. Sales management B. Integration C. Tracking sales data D. Service management B. Sales and accounts maintaining D. Purchasing and payments

21. Major ERP systems utilize: A. Distributed hardware and software C. Distributed hardware and centralized software 22. ERP integration is characterized by: A. Restricting data within departments C. Providing security 23. Accounting systems provide controls over data to: A. Ensure profits C. Ensure accuracy and prevent fraud 24. The accounting system: A. Facilitate operational mangers to share data and evaluate interrelationships between departments B. Collects data throughout the company and produces consolidated reports that are used for planning and management C. Helps data concurrence to be avoided D. Facilitate management to update data conveniently 25. Journal entries represent: A. Raw data B. Processed data C. Structured data D. Information B. Facilitate marketing and sales D. Help organize employee organizations B. Computers acting as drones for a centralized system D. Changes in one inventory item cause changes in all related databases B. Centralized hardware and software D. Centralized hardware and distributed software

26. For managers to make comparisons between divisions and other firms, accounting systems produce: A. Integrated database B. Standardized reports C. Double-entry system D. Data warehouses

27. With EDI, the ______________________ can monitor current sales and automatically place orders with the supplier. A. Transaction processing system C. Executive information system B. Inventory control system D. Management information system

28. Automated __________________ help identify and prevent theft. A. Transaction processing system C. Executive information system B. Inventory control system D. Management information system

29. Because of the volume of data in the detail, most companies keep only:

A. Current statistics and summary reports on file C. Financial reports 30. An important objective of accounting systems is to: A. Maintain the integrity of the financial data C. Process the sales data

B. Information derived from the data D. Processed data

B. Collect the sales data D. Make a profit in the business

31. Because many transactions involve outside organizations, mistakes can be caught by: A. Comparing summary reports B. Sharing data C. Reading financial reports D. Reading management reports

32. Companies collect hundreds of pieces of data for each employee: A. For making decisions about cafeteria-style benefits C. For making decisions about employee benefits B. Some for management purposes, others because they are required by law D. For making decisions about employee work schedules

33. Most companies use a __________________ HRM department to advertise job openings and to screen the initial applicants, verify credentials, and keep basic employment and hiring data. A. Distributed B. Centralized C. Decentralized D. Hybrid

34. There are various reports required by the ___________________ regarding injuries and exposure to various hazards. A. Department of Education C. Department of Defense B. Occupational Safety and Health Administration (OSHA) D. Department of Energy

35. With a good information system, HRM departments can offer cafeteria-style benefits where: A. Each employee selects a personal combination of benefits C. Benefits are partly selected by the company and partly by the employee 36. One of the largest paychecks printing providers is: A. Automated Data Processing (ADP) C. Application Service Provider (ASP) B. Automated under-reporter (AUR) D. Electronic Data Interchange (EDI) B. Benefits are selected by the company D. None of the above

37. A system created by PRC, Inc., uses ___________ and _________ to enable workers to make changes directly to their base information. A. Cell phones and a fax system C. Personal computer and an optical character recognition system B. Touch-tone phones and a voice-response system D. Scanning system and an optical character recognition system

38. Supply chain management (SCM) concentrates on the production side of ______. A. ERP B. TPS C. DSS D. EIS

39. ______________ means that it is impossible to please all of the consumers-leaving a niche open for your competitors. A. Mass production B. Custom production C. Total quality management D. Hybrid production

40. The customized orders are entered into the system, and the engineering department ________ the order, makes _____________ as needed, and ___________ production. A. Receives, design changes, starts C. Collects, specification changes, and completes B. Evaluates, design changes, and schedules D. Receives, design changes, and refuses

41. ________________ is the process of manufacturing products designed for specific consumers but using mass-production techniques to keep costs low. A. Mass production B. Mass customization C. Customization D. Total quality management

42. The overall goal is to ________________ and to eliminate bottlenecks by _________. A. Reduce production costs and reducing the need for huge inventories B. Keep production costs at a fixed level and increasing the need for huge inventories C. Increase production costs and increasing the need for huge inventories D. Reduce production costs and increasing the need for huge inventories

43. SCM purchasing often requires: A. Interactions with customers C. Interactions with buyers B. Several interaction steps with suppliers-even for existing relationships D. Interactions with managers

44. XML is a tool that was established to help companies: A. Exchange data B. Analyze data C. Process data D. Compress data

45. Software vendors are developing tools that incorporate _______ automatically, and suppliers will be able to purchase the ________ needed to handle the multiple connections to customers. A. DSS, software B. TQM, hardware C. TPS, software D. XML, software

46. ____________ was/were originally developed to help companies share data with their partners, suppliers, and customers. A. EDI standards C. Communications standards B. TCP standards D. ERP standards

47. All of the data within an XML document is in _____________ and tagged so that computer programs can quickly ___________ and identify the data and its purpose. A. A specified program and read the file C. A file and decompress the file B. A file and compress the file D. A specified format and read the file

48. Several industry groups have created ______________ for sharing data specific to their industry. A. EDI standards B. TCP standards C. XML definitions D. ERP standards

49. The primary purpose of CRM systems is to provide individual attention to each customer to improve________. A. Customer relationship B. Sales C. Loss of merchandise D. Marketing

50. ERP systems often have a CRM component that provides a unified view of __________. A. Sales data B. Customer data C. Vendor data D. Management data

51. ERP systems have self-service portals that enable customers to check: A. The status of various items, order new products, and contact the company B. The status of the relationship between managers and workers at the tactical level C. The relationship between the managers and workers at the operational level D. The relationship among the managers at different business levels. 52. Like the gauges on an automobile dashboard, the _____ presents a top-level graphical representation of the status of various elements. A. Hybrid dashboard B. Analog dashboard C. Digital dashboard D. Graphical user interface system

53. If there is a problem or a decision to be made, the executive can: A. Derive appropriate data from a manager at the tactical level B. Drill down to get more detailed data by pointing to another object C. Search for more detailed data by going through a computer journal D. Obtain enough information from a manager at the operational level 54. For an EIS to work, it must be connected to the _____________, since it is the source of the data. A. Transaction-processing system or data warehouse C. Decision support system B. Management information system D. Executive information system

55. Congress passed (the) ____________, which requires top executives of public companies to sign a statement attesting to the validity of the annual financial statements. A. Moores Law B. Murphys Law C. Sarbanes-Oxley Act D. Kennedy-Clinton Act

Chapter 8

1. Petz Enterprises became a leader in providing ___________ to professional accounting firms and storefront tax offices. A. Hardware B. Software C. Data file D. Modem

2. The ________ reports that about two-thirds of new employer firms survive at least two years and fifty percent survive past four years (Bounds 2004). A. IRS B. Dept. of Labor C. SBA D. The U.S. Congress

3. Largely because of the _______________, consumers have been limited to purchasing products through local retail stores. A. Maintenance costs C. Education and training costs B. Transportation costs D. Advertising costs

4. Manufacturers and wholesalers did not want to spend the money to create customer-service departments to: A. Generate a company telephone directory C. Develop mail-order books B. Handle thousands or millions of individual orders, returns, and complaints D. Run an ad in the news paper

5. Cell phones began with poor quality analog signals that were gradually replaced with the ___________________. A. First generation digital phones C. Second generation analog phones B. Second generation digital phones D. Third generation analog phones

6. _______________ can create new opportunities in mobile commerce to improve contact with customers. A. Fixed data access B. Portable data access C. Vendor data access D. Customer data access

7. New web-based businesses are being created to provide: A. Data and Service B. Files C. Advertisements D. Financial support

8. The consumer issues C2B and C2C make up: A. A major portion of e-commerce C. A major aspect of business tactics B. A minor portion of e-commerce D. A minor aspect of business tactics

9. Electronic marketplaces and auctions enable businesses to find: A. New suppliers and obtain supplies on short notice 10. EBay falls under the category of: A. B2B e-commerce B. C2B e-commerce C. C2C e-commerce D. B2C e-commerce B. New customers C. Programmers D. Technicians

11. One of the key aspects in B2C e-commerce is the ability to bypass: A. Entire section of the production chain C. Entire section of the supply chain 12. In the 1960s and 1970s, airlines created: A. Customer service centers for the passengers who would need hotel reservations and car rentals B. Fabulous entertainment clubs at the airports to attract air travelers C. Discount centers for the passengers who made 4 roundtrips within 30 days D. Giant reservation systems to handle flight bookings 13. In connection with the B2B auction sites, instead of searching out buyers or sellers, businesses submit: A. A bid on a Web site that covers the desired product C. A fixed offer for the product 14. Today, companies: A. Are rarely vertically integrated across the production chain B. Do not rely on other firms to handle distribution and retail sales C. Do not choose to outsource distribution and retail sales functions D. Do not care to become more efficient within their niche B. A RFP for the product D. A request for the prices of the products B. Some part of the production chain D. Some part of the supply chain

15. Removing an intermediary: A. Can increase your losses and cannot be used to reduce prices to capture more market share B. Can increase your profits and can be used to reduce prices to capture more market share C. Can decrease your profits and cannot be used to change market share D. Can increase your profits and cannot be used to change market share 16. It is estimated that the credit card companies earn a total of _________ a year from (credit card) transaction fees. A. $500 million 17. Consumers: A. Prefer to see and touch many products before they buy them C. Buy many products without seeing them B. Do not care to see many products before they buy them D. Do not touch many products before they buy them B. $20 million C. $100 billion D. $10 thousand

18. In the 1960s, neighborhood grocery stores were inefficient because: A. They could stock only a limited number of common items; and the delivery and inventory costs were high B. They could stock a large number of necessary items; and the business thrived C. They could stock a large number of necessary items; and the business suffered losses as many of the items perished for lack of refrigeration D. They could stock a large number of uncommon items; and the business suffered losses as the items couldnt be sold 19. In a restaurant business, the Internet can provide: A. Menus and it cannot handle multiple customers at the same time B. Menus and it is better at handling multiple customers at the same time C. Menus and it can handle one customer at a time D. Menus and it cannot handle customers requests at all 20. Most restaurants are small businesses, and they have resisted: A. Catering all sorts of ethnic food items C. Opening the restaurants after midnight every week day B. Building the infrastructure to provide many Internet-based features D. Increasing the price of their food items

21. Real estate commissions are often priced at ____of the sale price, which can be a high value for expensive houses. A. 20 B. 6 C. 1 D. 50

22. Airlines have offended the __________________, but the people who travel the most are willing to _______________ directly to save money and gain control over their choices. A. Homeland security agents, purchase tickets C. Department of transportation agents, purchase flight insurances B. Travel agents (traditional distribution channel), purchase tickets D. Jet fuel agents, purchase upgrades

23. Both GM and Ford have experimented with online sales of new cars, with__________. A. Minimal successB. Great success C. Lots of losses D. Profits

24. Consumers have the choice of paying _______________ (at a traditional store) to obtain an item immediately, or waiting and paying __________________ through EC. A. Higher price, lower price B. Lower price, higher price C. Higher price, higher price D. Lower price, lower price

25. Dell has been successful at selling computers over the Internet by making it: A. Easy to configure and compare prices C. Easy to receive the attention of the customer service agents B. Easy to hold of the computers in a day or two D. Easy to have the computers repaired

26. In late 2000, many consumers found how easy it was to distribute digital music over the Internet using _____________--even though it was illegal. A. HTML files B. XML files C. MP3 files and Napster D. UDDI files

27. Several companies (particularly Microsoft and RealNetworks) are working on: A. Digital rights management systems to prevent unauthorized copying

B. Digital rights management systems to authorize copying C. Analog rights management systems to authorize recoding D. Analog rights management systems to prevent unauthorized recording 28. One difficulty with any protection system like the digital rights management schemes is that _________________________. A. It is easy to stop someone from breaking the system C. It is easy to track someone who is following the system 29. The digital millennium copyright act (DMCA): A. Does not apply to the people outside the United States. C. Does apply to the people world wide B. Does apply to the people outside the United States D. Does not apply to the people within the United States B. It is difficult to stop someone from breaking the system D. It is easy to track someone who is breaking the system

30. M-commerce is a new service that can exist only with ____________________. A. MAN B. The Internet or wireless technologies C. LAN D. WAN

31. The largest impact of Internet price competition will be on the ___________. A. Retail firms B. Wholesale firms C. Consumers D. Vendors

32. By minimizing the aspect of location: A. The existence of local firms is forgotten C. The primary strength of local firms is eroded 33. In traditional stores: A. Customers pay the same price for the same items B. Customers routinely are charged different prices for the same items C. Different customers are charged different prices for the same items D. Customers are forced to pay the highest amount they are willing to pay 34. Business-to-business e-commerce has the potential to be substantially more important than: A. B2C e-commerce B. Traditional businesses C. Auction sites D. Local firms B. Local firms are highly recognized D. The function of local firms is undefined

35. __________ is a more flexible method of sharing data with suppliers and customers. A. VRML B. XML C. HTML D. XGA

36. Eventually, the technology can be married with____________ to provide more automated intelligence to handle ordering basic items and to monitor the progress of standard order. A. Decision support systems B. Management information systems C. Transaction processing systems D. Expert systems

37. To hold down transaction costs, it was simpler to establish: A. Long-term relationships with a large number of companies C. Short-term relationships with a limited number of companies B. Long-term relationships with a limited number of companies D. Short-term relationships with a large number of companies

38. _____________ is (are) useful for specialized products, when it is difficult to determine an asking price. A. B2B B. Auctions C. B2C D. C2B

39. XML is creating opportunities for a new type of _______: Web sites that provide specific services that can be sold to other businesses. A. C2C e-commerce B. C2B e-commerce C. B2B e-commerce D. B2C e-commerce

40. In connection with the increasing sales and reducing costs, one of the most important features is the ability of the Web site to connect to the: A. Vendors database B. Customers database C. Corporate database D. Suppliers database

41. ____________ Web sites supported by ______________ can help customers select options and products or solve problems. A. Library of Congress, decision support systems B. Chatting, transaction processing systems

C. Educational, management information systems

D. Intelligent, expert systems

42. Most people have used _____________ to find information on the Internet. A. Web browsers B. Search engines C. Plug-ins D. GUI

43. To a consumer, ___________________ is an important element of buying products over the Internet. A. High price B. Low price C. Good quality product D. Name recognition of a company

44. As people became disappointed with the advertising response, spending for ads ______ and the chain effect helped drive the ________. A. Went up, EC grow B. Declined, EC crash C. Declined, EC grow D. Went up, EC crash

45. Increasingly, advertisers want to establish a relationship with_____________. A. The potential customers B. The potential vendors C. The suppliers D. The accountants

46. Automobile manufacturers find it worthwhile to advertise on sites dedicated to _______________. A. Electronic games such as yahoo.com C. Automotive topics such as vehix.com, Edmunds, and autobytel.com 47. It is much simpler for both advertisers and publishers if everyone uses: A. A few especial ads B. A few standard types of ads C. A few expensive ads D. A few custom made ads B. Auto travel topics such as mapquest.com, yahoo.com D. Auto repair topic such as autorepair.com

48. Several companies sell software that retrieves ___________, analyzes _________, and creates ___________to help managers understand the traffic. A. The log, the data, and graphs C. The data, the data, and graphs 49. The statistics generated from the Web logs are useful to: A. Identify the most important sections of your server and to spot problems with certain pages. B. Identify a large number of users connected to the network C. Identify a selected number of users connected to the network D. Identify a large number of users connected to the WAN 50. Companies will often start with _____________ and move to ____________ as they expand particularly small firms or start-ups. A. One option and other selections C. Two selections and other options 51. Web pages: A. Cannot interact with your internal databases C. Are coupled with your internal databases B. Can interact with your internal databases D. Are created to hide your internal databases B. Two options and other slections D. Three options and other selections B. The data, the decisions, and texts D. The log, the decisions, and area maps

52. Regions Bank offers a third-party order-processing system called the _____________. A. Transaction processing system B. Buy-Me Button C. Expert system D. Decision support system

53. While it is possible to create the Web sites using a third-party credit-card processor, the method is realistic only if the merchant is ___________________. A. Selling a small number of products C. Selling of a few number of products 54. ______________ auction sites exist on the Internet. A. Several B. Two C. Three D. Five B. Selling a large number of products D. Not selling any products

54. Amazon MarketPlace enables merchants to: A. Sell items by setting dynamic price C. Sell items by setting a variable price B. Sell items by setting a fixed price D. Sell items by setting no price

55. The MarketPlace system has a good search engine and works well for: A. Small retailers who wish to maintain a continued presence on the Web B. Large retailers who wish to maintain a continued presence on the Web C. Large retailers who do not care for continued presence on the Web D. Medium size retailers who not care for continued presence on the Web 56. ASP is a Web-based business that provides: A. A specific service to other businesses C. A specific service to customers B. Multiple services to other businesses D. Multiple services to customers

57. In general, commerce server sites and ASPs are a good way to: A. Get a quick start on a relational database C. Get a slow start on the Internet B. Get a quick start on the Internet D. Get a slow start on a data warehouse

58. The main benefit of using an outside hosting company is that: A. It will handle all of the detailed technical issues automatically B. It will handle some of the technical issues automatically C. It will not handle any of the technical issues D. It will handle some of the technical issues based on certain conditions 59. A catalog management system is designed: A. To help programmers to develop a database of products for sale on Web sites B. To help you maintain a database of products for sale on Web sites C. To help you write codes for developing a database of products D. To help you diagnose a set of codes for developing a database of products 60. A content management system is designed: A. To help programmers to develop a database of products for sale on Web sites B. To help you maintain a database of products for sale on Web sites C. To help you write codes for developing a database of products D. To make it easy for nonprogrammers to update content, maintain a consistent style, and keep track of changes to a Web site 61. Many municipal governments add their own sales taxes to: A. Cover costs of public services C. Cover costs of state government services B. Cover costs of local services D. Cover costs of INS services

62. In 2003, Congress allowed the federal moratorium on: A. Telephone taxes to expire C. Tobacco taxes to expire 63. E-commerce: A. Has the potential to open up the global economy C. Has nothing to do with the global economy B. Does not have the potential to open up the global economy D. Cannot create a global marketplace B. Internet taxes to expire D. Occupancy taxes (staying in hotels) to expire

64. In 2001, France filed suit against Yahoo (a U.S. company) to force Yahoo: A. To stop advertising cigarette selling in France B. To prevent French citizens from buying or selling Nazi-related items on the Internet C. To prevent French citizens from buying U.S. made alcoholic products D. To prevent French citizens from buying U.S. made perfumes 65. Many U.S. Web sites: A. Will accept overseas shipments because there is no any risk in the transaction B. Will not accept overseas shipments because the risk is too great C. Will accept overseas shipments under all conditions D. Will accept overseas shipments for some selected items

66. In 2000, a McKinsy study revealed: A. Only 20 percent of the e-commerce firms were making a profit on sales, and the top firms were actually traditional firms, such as mail-order companies B. 50 percent of the e-commerce firms were making a profit on sales, and the top firms were actually traditional firms, such as mail-order companies C. 30 percent of the e-commerce firms were making a profit on sales, and the top firms were actually non-traditional firms D. 40 percent of the e-commerce firms were making a profit on sales, and the top firms were actually non-traditional firms 67. ___________________ was a dominant factor in the failure of many of the early e-commerce firms. A. Internet sales revenue C. Internet auction sales revenue B. Internet advertising revenue D. Internet-based clothes sales revenue

Chapter 9
1. __________________ provides several tools to integrate communication and document sharing for teams of workers. A. Outlook Express B. Microsoft SharePoint C. CAD program D. MS Word

2. Instead of relying on rigid management hierarchies, __________________________. A. Small teams can be created to solve problems as they arise B. Each employee is empowered to solve problems as they arise C. Employees at the operational level are asked to solve problems as they arise D. Employees at the tactical level are asked to solve problems as they arise 3. Collaboration involves: A. Scheduling tasks and maintaining project schedules C. Programming and managing databases B. Sending e-mails and managing tasks D. Developing expert systems for sales transaction

4. If you need to solve a difficult problem, you could turn to the ______________ to find similar problems or suggestions from workers who faced the same problems. A. Database B. Knowledge base C. Transaction systems D. Management systems

5. Most organizations have a (n) ________ that establishes the priorities for selecting each technology and method to accomplish the goal. A. Bank account B. Culture C. Expert D. Executive

6. In a group context, e-mail is important because is easy to send messages to the ________________. A. A particular group member B. Entire group C. Only the group leader D. Business administrator

7. E-mail systems such as Lotus Notes and Microsoft Exchange were originally advertised as _______________ tools because of the support provided for attachments. A. Firmware B. Database C. Groupware D. Software

8. Instant messaging has become popular in the past few years particularly with _________. A. Executives B. Managers C. Students D. Teachers

9. Most of the initial use of instant messaging has been among: A. Individuals in a social context C. Individuals in a teaching community B. Individuals in a business community D. Individuals in a law and enforcement context

10. If you are busy and receives an IM request, you _____________________. A. Can still choose to ignore it until you have time for a break C. Have to send your response immediately 11. NetMeeting supports: A. Both text and file sharing as long as your computer is connected to a network B. Both voice and video connections as long as you have microphone and webcams C. Both programming and database management B. Cannot wait to respond to the e-mail D. Have to respond to the message within 15 minutes

D. Both e-commerce and m-commerce activities 12. Web pages are a (n) ______________________, where you can provide the same data to many people. A. Object identification technology C. Food processing technology B. Broadcast technology D. Transportation technology

13. ______________________ make (s) the scheduling a meeting or conference a little easier. A. GIS B. GPS C. Electronic calendar tools D. FTP

14. Web logs or blogs were created largely for individuals to use to __________________. A. Create audio and video programs C. Create diaries on the Internet 15. The blog technology was largely developed to: A. Create monthly budget reports C. Overcome the difficulties in creating and updating Web sites B. Develop a database D. Do programming efficiently B. Generate management programs D. Create monthly budget reports

16. _____________________ were created to help manage and control groups of workers on large projects. A. Scheduling tools C. Expert system management tools 17. Videoconference systems require: A. Audio systems, radio systems, and a screen C. Speech recognition systems, microphones, and speakers B. Video cameras, microphones, and television displays D. Transmitters, receivers and speakers B. Project management tools D. Executive information system management tools

18. The primary drawback to the video conference systems is the ______________ required to transmit realistic video data. A. Power B. Gain C. Bandwidth D. Entropy

19. Current video conference systems are useful for meetings with: A. Multiple participants B. Ten or fifteen participants C. Twenty or twenty five participants D. Two or three participants

20. Microsofts Live Meeting is designed to handle as many as _________________. A. A few hundred participants C. Twenty or twenty five participants B. A few thousand participants D. Two or three participants

21. We can use ________________________ to continually e-mail new versions of documents to everyone in the group. A. Netscape Navigator C. IBM/Lotus Notes or Microsoft Exchange B. Expert systems D. Microsoft Outlook Express

22. ______________________ makes it easy to create Web-based projects and folders to hold team documents. A. Firmware B. FTP C. Microsofts SharePoint system D. Microsofts PowerPoint system

23. Ford has a (n) _____________________ to provide real-time information and integration of customer and dealer data. A. DSS B. EIS C. Customer knowledge system (CKS) D. Knowledge-based system (KBS)

24. Daimler-Chrysler expanded its IBM Lotus Notes system into an _____________ project. A. E-commerce B. M-commerce C. E-collaboration D. E-mail

25. Version control is a powerful tool both for teams and for individual documents because it ____________________________. A. Automatically corrects all documents C. E-mails every document 26. Version control systems save: B. Automatically prints every document D. Automatically saves every document

A. Latest copy of every document C. Last two copies of every document 27. Most version control systems work from: A. A database B. PDAs

B. Multiple copies of every document D. Only the first copy of every document

C. Netscape Navigator

D. Cell phones

28. You _____________ a file when you want to change it A. Check out B. Check in C. Open D. Close

29. For IRM, each document is _____________ and the decryption keys are stored on _______________. A. Edited and a clients computer C. Printed and a third partys computer 30. The main drawback to the IRM is that you need: A. A computer to record all user IDs C. A modem to send the e-mails B. A printer to print the documents D. A server to identify the users and provide the decryptions keys B. Encrypted and a special server D. Shredded and vendors computer

31. Microsoft has embedded some workflow features into ________, but more sophisticated controls are available through ___________. A. Outlook Express, IBM B. Office, specialized vendors such as Legato C. Netscape Navigator, HP D. Excel, Raytheon

32. In BPM, a large purchase requires: A. Approval and evaluation by the head of the department C. Approval and evaluation by the CEO 33. Most versions of a GDSS use a special: A. A cubicle, where each participant has a computer B. Meeting room, where each participant is seated at a networked computer C. Studio room, where each participant can use painting software D. A conference room, where each participant can use a computer to deliver PowerPoint slides 34. If designed properly, a GDSS can give each participant: A. Access to the corporate data while he or she is in the meeting C. Access to the company library while he or she is in the office B. Access to the software programs while he or she in the office D. Access to the list of hardware while he or she is traveling B. Approvals and evaluations by several groups D. Approval and evaluation by the CIO

35. With GDSS, your focus is continually drawn to the many different comments and discussions: A. Taking place at different times C. Taking place at different places 36. The use of a GDSS requires: A. A trained facilitator someone who can lead discussions, help users, and control the GDSS software on the network B. A facilitator who can present PowerPoint slides to users C. A trained facilitator who is very knowledgeable about personal computers D. A facilitator who has knowledge about computer software and hardware 37. KM systems are designed to: A. Organize information and to assist people in collaborative projects and research B. Organize research data and assist scientists for making experiments C. Assist employees to determine trip plans D. Assist salespersons to sell certain products 38. One of the biggest challenges with KM systems is creating an organizational environment that: A. Encourages every employee to contribute knowledge into the system B. Encourages managers to participate in developing the system C. Encourages the operational employees to help develop the system D. Encourages decision makers to store their knowledge in the system B. Taking place at the same time D. Taking place at the same place

39. Organizational memory represents the knowledge held: A. Within the company and the processes and procedures used to perform the primary tasks B. Outside the company and the processes and procedures to collect data from a particular source C. Within the company and the processes and procedures used to reinvent new processes D. Outside the company and the processes and procedures used to gather information from outside sources 40. SharePoint is probably the easiest to configure and use since it is_________________. A. Integrated with GDSS system C. Integrated with NetMeeting 41. Most of the SharePoint tools are: A. Standard Web protocols, so authorized users can use them even when they are traveling B. Non-standard protocols, so all users can use them C. Special protocols, so only a few users can use them D. Custom designed protocols, so only a class of users can use them 42. SharePoint will also integrate with: A. Netscape Navigator, so meetings can be scheduled and the reminders will be forwarded for participation B. Microsoft Outlook, so meetings can be scheduled and automatic reminders will be generated for participation C. Microsoft PowerPoint, so slides can be generated for presentation to an audience of computer literates D. Microsoft Excel, so spreadsheets can be drawn for monthly budget maintenance 43. For complete version control including the ability to automatically track changes, you will need: A. Microsoft Outlook Express C. Netscape Navigator B. Visual Source Safe, Microsofts version control software D. Microsoft NetMeeting B. Integrated with the standard Office suite D. Integrated with IBM Lotus Notes system

44. SharePoint provides a couple of tools to help with workflow: A. Tools to do the programming and develop database C. Tools to design expert systems and collect data B. Tools to integrate the features of communications and collaboration D. Tools to develop data warehouse and drill through the data

45. Electronic calendars and project management tools help everyone identify: A. Syntax errors in computer programming C. Bottlenecks and keep projects on schedule B. Loss due to everyday sales D. Stored image data and audio data

46. SharePoint provides several tools to integrate the elements of the: A. E-mail and voice mail tools C. Netscape Navigator as well image processing tools B. Office suite as well as communication and collaboration tools D. Windows XP as well as audio processing tools

Chapter 10
1. EIS systems can: A. Provide detailed data on any aspect of business C. Provide the high level codes of the systems B. Display audio outputs of the systems D. Show charts, summaries, and detailed data

2. ______________ made it easier to analyze data, evaluate models, and create charts. A. Audio and video outputs 2. Data mining systems use: A. Geometrical tools to evaluate data, and searching for important relationships and classifying groups of data B. Statistical tools to semiautomatically evaluate data, searching for important relationships and clustering or classifying groups of data C. Flow diagram to evaluate data and clustering groups of data D. Networking to evaluate data and clustering groups of data 3. The study of human brains yielded clues that led to the development of ____________. A. Wide area networks B. Local area networks C. Neural networks D. Wonderlands B. Text outputs C. Programmers D. Spreadsheets

4. Neural networks dramatically improve the ability of machines to perform _______________. A. Statistical computations tasks C. E-mail forwarding tasks 5. Many problems involve: A. Numerical data and analyses of the data C. Video data B. Nonnumerical data and complex interrelationships among the various factors D. Audio data B. Mathematical computation tasks D. Pattern recognition tasks

6. The research into techniques that might make computers think more like humans is known as_______________. A. Neural network based intelligence C. Human intelligence 7. As a manager, it is your responsibility to: A. Identify decisions that can be handled by machine systems and to recognize when these systems do not work B. Collect and process data C. Analyze the data using various data processing tools D. Build an appropriate decision process 8. Using ______________________, the farmers were able to substantially reduce the production costs. A. Interpolation methods 9. A few companies have established: A. An environment in which employees compete with each other when working on a group project B. A culture that focuses on continual improvement and growth C. An environment in which managers at the tactical level do not have to make any decisions D. An environment in which managers at the operational level do not have to make any decisions 10. When people make decisions with minimal data and no logical analysis, the results are going to be ____________ and ______________. A: Consistent and helpful B. Inconsistent and dangerous C. Dependent and helpful D. Consistent and predictable B. Geometrical methods C. Optimization methods D. Algebraic methods B. Artificial intelligence D. Cognitive intelligence

11. The main point to remember is that making decisions without: A. Assumptions lead to poor decisions C. The knowledge of the daily sales data leads to poor decisions B. A good model and process leads to poor decisions D. Consulting with the operational managers leads to poor decisions

12. _______________ cause people to alter their decisions and decision-making processes. A. Personal pressures B. Tactical managers pressures C. Operational managers pressures D. Social pressures

13. Business models typically use: A. Flow diagrams to represent various aspects of the process and relationships B. Digital logic diagrams to represent the process and various relationships C. Mathematical equations to represent the process and the various relationships D. Venn diagrams to represent the process and the various relationships 14. Models are used to search for the best solution: A. Maximizing costs, improving effectiveness, and increasing sales C. Minimizing costs, improving efficiency, and increasing profits 15. Sample data is used to forecast future changes based on the: A. Sales B. Profits C. Model D. Costs B. Maximizing costs, improving efficiency, and decreasing profits D. Minimizing costs, improving effectiveness, and decreasing profits

16. The first step in prediction requires that you have a model that describes the situation. Then the data is collected and statistical techniques are used to estimate the ________________ of the model for the specific problem. A. Frequency B. Efficiency C. Parameters D. Response time

17. Prediction techniques such as:

A. Extrapolation techniques are used to examine the data, identify trends, and predict possible independent variables B. Fourier series forecasting are used to examine the data, identify trends, and predict possible independent variables C. Regression and time series forecasting are used to examine the data, identify trends, and predict possible independent variables D. Discrete mathematics are used to examine the data, identify trends, and predict possible independent variables 18. Optimization evaluates a model in terms of the: A. Outputs and searches for the most efficient output B. Environmental factors and searches for the best output C. Inputs or control parameters and searches for the best solution D. Ambient pressure and temperature, and searches for the best output 19. Some optimization models have resulted in: A. Increased cost B. Substantial savings in cost or increases in profit C. Increased loss D. Decreased sales

20. Choosing between the two methods, regression and moving averages, requires some expertise in: A. Geometrical analysis B. Statistical analysis C. Numerical analysis D. Vector analysis

21. Engineers can perform experiments on models: A. That would not be safe in real life C. That would result in unrealistic outputs B. That would never yield estimated parameters D. That would never yield optimal solutions

22. In an object-oriented simulation, the simulation system: A. Generates the estimated system parameter values B. Generates orders, makes shipments, and orders inventory according to programmed rules C. Generates profit and loss history of the business D. Generates the predicted values of various aspects of the business 23. Spreadsheets are often used: A. To create graphs and pictures to show interrelationships C. To study large models 24. More sophisticated simulation packages: A. Cannot analyze small models and graph the results B. Cannot support the study of large models C. Support more complex analysis and will automatically create graphs and pictures to show interrelationships D. Cannot display statistics graphically or in tabular reports 25. Transaction systems are designed to: A. Search data C. Store data, not to search and analyze it B. Analyze data D. Store, search and analyze data B. To analyze small models and graph the results D. To support complex analysis

26. A (n) _________________ extracts and stores the data in a clean, easy-to-analyze format. A. Executive information system B. Expert system C. Data mining D. Data warehouse

27. A data warehouse is commonly used as a method to provide data to decision makers without interfering with the _____________. A. Transaction processing operations C. Decision support systems B. Executive information systems D. Expert systems

28. _______________ are basically copies of a small portion of the data warehouse designed to feed a specific application. A. Metadata B. Data marts C. Wal-Mart D. K-Mart

29. _____________ is used to describe the source data, identify the transformation and integration steps, and define the way the data warehouse is organized. A. Data marts B. K-Mart C. Metadata D. Wal-Mart

30. Most OLAP tools depict the data as: A. One-dimensional plot B. Two-dimensional plot C. 3 D cubes D. Multidimensional cubes

31. Managers use specific OLAP tools to examine: A. One section of the data B. Two sections of the data C. Multiple sections of the data D. Three sections of the data

32. Although most DBMS vendors provide OLAP cube browsers, _____________ provides Pivot Table interface that works with almost any DBMS or spreadsheet. A. IBM B. HP C. Oracle D. Microsoft

33. A pivot table is created on the users machine most users will build pivot table inside of ___________________. A. Microsoft PowerPoint B. Microsoft Word C. Microsoft Access D. Microsoft Excel

34. A decision support system consists of three basic components: A. Input data, model parameter estimates, and model outputs B. Data retrieval, model evaluation, and visualization of the results C. Information technology, model optimization, and visualization of the results D. Information systems, model evaluation, and data processing 35. Several different marketing forecast methods can be used, but a straightforward approach is to begin with: A. Customer forecasts B. Marketing forecasts C. Geometrical forecasts D. Statistical forecasts

36. The sales estimate is based on: A. Economics 37. Sales are dependent on: A. Hardware used to make sales C. DBMS used to make sales 38. Typically, each manager is given: A. Unlimited amount of money to allocate among the employees C. A fixed amount of money to allocate among the employees B. $ 20,000.00 to allocate among the employees D. $100,000.00 to allocate among the employees B. Time and consumers income D. Software programs used for making sales B. Political capitals C. Ergonomics D. E-commerce

39. _____________________ can be used to model the effects of various merit pay related policies. A. A computer B. A spreadsheet C. A notebook D. A datasheet

40. To choose the site of retail outlets, you need to know: A. The economic status of the neighboring businesses C. The location and travel patterns of your potential customers 41. Manufacturing can be made more efficient: A. If you know the life style of your potential customers C. If you know the travel patterns of your potential customers 42. GISs have been designed to identify and display: A. Relationships between daily sales and the weather of the day B. Relationships between business data and locations C. Relationships between business profits and retail sales D. Relationships between the customers travel patterns and the daily sales 43. There are two basic ways to create and store the underlying maps: A. As text data or as audio data C. As pictures or as digitized map data B. As video or as numeric data D. As text or an analog map data B. If you know the locations of raw materials, suppliers, and workers D. If you know the financial status of your potential customers B. The profit and loss of the businesses in the neighborhood D. The financial status of your potential customers

44. Each digitized map data is stored by its location as measured by: A. Radius, azimuth, and height in cylindrical coordinates C. x, y, and z in Cartesian coordinates in space B. Latitude, longitude, and sometimes its elevation D. Radius, elevation and azimuth in spherical coordinates

45. The U.S. Department of Defense had digital data available for many areas, including: A. Entire U.S. locations, and often includes azimuth data C. Iraq, Kuwait, Afghanistan, and Pakistan locations B. International locations, and often includes elevation data D. China, North Korea, and Japan locations

46. The U.S. Geological Survey topographical maps are being converted to: A. Digital systems B. Analog systems C. Text data D. Numeric data

47. Digital maps often contain missing, incomplete, or inaccurate data as the United States learned when it accidentally blew up the _________________ in Belgrade because the CIA maps were out of date. A. Sudanese embassy B. Japanese embassy C. Chinese embassy D. Pakistani embassy

48. In GPS, a portable receiver tuned to the satellites will identify your location in: A. x, y, and z in Cartesian coordinates C. Radius, azimuth, and elevation in spherical coordinates B. Latitude, longitude, and elevation D. Radius, azimuth, and height in cylindrical coordinates

49. If you work for the Department of Defense, you can get receivers that will identify your location within a _______________. A. Few feet B. Few centimeters C. Few meters D. Few millimeters

50. Civilian models that combine GPS signals from U.S. and Russian satellites provide________________. A. Worse resolution B. Better resolution C. About the same resolution D. No location information

51. __________________ is (are) a key statistical tool that is leveraged in data mining. A. Estimation B. Mean C. Correlation D. Correlation coefficient

52. ___________________ tries to find groups of items that have similar attribute values. A. Planning B. Clustering C. Averaging D. Extrapolating

53. Business decisions are subject to a wide variety of ____________________. A. Discrimination laws C. Traffic laws 54. In most situations, an inference engine: A. Applies new data to the database and analyzes all the data to reach a conclusion B. Applies new observations to the database and analyzes the observations to reach a conclusion C. Applies new observations to the knowledge base and analyzes the rules to reach a conclusion D. Applies new data to the database and analyzes the latest data to reach a conclusion 55. A knowledge base consists of: A. Data, inference engine, and database C. Input data, database, and inference engine B. Data, rules, logic, and links among data elements D. Output data, inference engine and processing rules B. Nondiscrimination laws D. Security laws

56. Probably the greatest difficulty in creating an expert system is determining the _________ that will lead to the proper conclusions. A. Input data B. Rules or frames C. Inference engine D. Database

57. In general, if there are N cells in a neural network, there are: A. N/2 possible connections C. N (N-1)/2 possible connections 58. In many ways, training a neural network uses: B. N (N-1) possible connections D. N (N+1)/2 possible connections

A. Linear systems theory C. Basic properties of statistics related to data sampling and regression

B. Random processes and estimation theory D. Mathematical statistics related to data processing

59. The challenge was to create an automated vehicle that could drive itself across _____________ miles of desert hitting about ______________ GPS waypoints in about ________ hours. A. 10, 100, and 1 B. 100, 200, and 3 C. 189, 1,000, and 10 D. 150, 500, and 20

60. A (n) ____________________ can analyze past loans and determine the rules that should be used to grant or deny future loans. A. DSS B. ES C. Neural network D. MIS

Chapter 11
1. The discount airlines, led by ________________________, have been profitable over the last few years-because they have found a way to attract customers and hold down costs. A. Northwest and joined by TWA and JetBlue C. US Air and joined by American and AirTrans 2. Starting an e-business adds several steps, including: A. Developing transaction systems and selecting employees B. Managing executive information systems and tactical management systems C. Selecting business partners and developing decision support systems D. Developing software and selecting ISP 3. Information systems designed for competitive advantages are not much different from: A. Human resources management and expert systems C. Transaction-processing and decision support systems B. Executive management systems and business processing systems D. Business processing systems and accounting systems B. American and joined by Delta and Southwest D. Southwest and joined by JetBlue and AirTrans

4. In many cases, advantage over your rivals can result from changes in the: A. Executive management systems and expert systems C. Human resources systems and executive management systems B. Basic transaction-processing systems and business methods D. Basic operation-processing systems and employee management systems

5. A common thread in gaining a competitive advantage is to improve the: A. Ties with employees and inventories B. Relationships among operational managers and tactical managers C. Ties and communication with suppliers and consumers D. Ties and communications with managers and executives 6. Designing ____________________ can be a dangerous task with many opportunities to fail for many businesses. A. Transaction systems B. Operational systems C. Tactical systems D. Strategic systems

7. Federal Express uses _______________ to differentiate its service from its rivals offerings. A. Expert system B. Executive information C. Accounting system D. Tracking information

8. The airlines used their ____________________ to give them a competitive advantage in transportation services. A. Expert systems C. Ticket counting systems B. Executive information systems D. Reservation systems

9. Strategic systems can sometime come close to breaking the ____________. A. Probate laws B. Criminal laws C. Antitrust laws D. Commercial laws

10. As eastern European economies rebuild, as the European Union takes shape, and as Mexican incomes increase, _________________. A. Consumers have to pay more for their products C. Consumers will be able to buy more products B. Consumers cannot buy more products D. Consumers will be able to buy products at lower prices

12. ____________ consist (s) of suppliers, customers, rivals, potential new entrants, substitute products, and sometimes the government. A. Internal agents B. External agents C. European Unions D. Mexican Unions

13. Form a systems perspective, each of the entities in the Porters Five Forces model: A. Has strong relationship with the firm C. Is outside the control of the firm B. Is under the control of the firm D. Can greatly influence the firm

14. It is called ______________ when a company owns several pieces of the production chain. A. Horizontal integration B. Customer integration C. Employee integration D. Vertical integration

15. It is called ______________ when a company expands by building related businesses. A. Horizontal integration 16. A common strategic goal is to: A. Get closer to the employees C. Get closer to the customers 17. Three major issues involving suppliers are: A. Inventories, vendors, and quality C. Price, quality, and delivery B. Quality, sales, and profits D. Price, profits, and operational managers B. Get closer to the managers D. Get closer to the executives B. Customer integration C. Employee integration D. Vertical integration

18. _________________ is more difficult when there are several layers of suppliers. A. Employee management C. Human resources management B. Quality management D. Customers management

19. American Airlines and United Airlines spent millions of dollars to build reservation systems as ______________. A. Operational systems B. Strategic systems C. Executive systems D. Tactical systems

20. GIS helps you analyze and display relationships based on ______________. A. Acceleration B. Speed C. Size D. Location

21. _________________________________ is (are) two leading products for displaying of geographic information. A. MS Excel and Word C. ESRIs ArcInfo and MS MapPoint B. MS Word and PowerPoint D. MS Access and Word

22. The critical feature of a ________ is the ability to display geo-coded data. A. EIS B. MIS C. GIS D. DSS

23. The firm that first implements a new strategy can: A. Gain popularity among other businesses C. Gain popularity but lose market share B. Gain recognition and market share D. Identify the major rivals

24. Merrill Lynch, the stock brokerage firm, introduced a service enabling customers to store their money in a wide variety of financial instruments that paid: A. Significantly higher interest rates than savings accounts C. Significantly lower interest rates than checking accounts B. Significantly higher interest rates than checking accounts D. Significantly lower interest rates than savings accounts

25. In fact, some reports (such as 10K or 10Q financial reports) are required to be filed __________. A. Manually B. Electronically C. By USPS D. By UPS

26. The rapid changes in technology often lead to competitive advantages: A. If your firm is the last to find a creative use for the new technology B. If your firm is the first to find a creative use for the new technology C. If your firm never finds a creative use for the new technology D. If your firm is the second to find a creative use for the new technology 27. A fundamental concept of economics is that in order to make extra profits, you need some mechanism to:

A. Allow other firms to enter the production chain C. Allow other firms to enter the industry

B. Allow other firms to develop a unique strategy D. Prevent other firms from entering the industry

28. Although there is disagreement on the cause of the problems, the ability to control distribution channels can be an effective strategy for: A. Maintaining interrelationships and ties among the employees C. Maintaining market share and deterring rivals 29. In Japan, most new automobiles are sold by salespeople who: A. Call on customers at their offices C. Attend customers at automobile sales offices B. Call on customers at their homes D. Help customers for e-sales B. Maintaining sales and profit levels D. Maintaining good relationships with the competitors

30. ____________ might be used to provide faster responses to retailer and consumer questions. A. Executive information systems C. Expert systems B. Decision support systems D. Geographic information systems

31. The ________ could eventually become the major distribution system for digital data such as books, music, software, and videos. A. Intranet B. Internet C. Extranet D. Fire wall

32. Transaction-processing and accounting systems decrease ______________. A. Inventory ordering and holding costs C. Manufacturing costs B. Administrative costs D. Marketing costs

33. Robots and process-control systems can be used to control ______________. A. Inventory ordering and holding costs B. Administrative costs C. Manufacturing costs D. Marketing costs

34. Inventory systems are used to track parts and reduce _____________________. A. Inventory ordering and holding costs B. Administrative costs C. Manufacturing costs D. Marketing costs

35. Marketing systems might be used to create better target marketing, with the advantages of improved response and lower __________. A. Inventory ordering and holding costs B. Administrative costs C. Manufacturing costs D. Marketing costs

36. A Classic case of using technology to create a new product is portrayed by ___________. A. Microsoft B. Motorola C. JCPenney D. Merrill Lynch

37. A classic case of using information systems to modify a product for competitive advantage came from _________________. A. UPS B. Amtrak C. Federal Express (FedEx) D. Napster

38. UPS takes a slower approach and cycles its technologies: A. Every ten to twelve years, phasing in the new technologies as they become more stable B. Every five to seven years, phasing in the new technologies as they become more stable C. Every two to three years, phasing in the new technologies as they become more stable D. Every fifteen to twenty years, phasing in the new technologies as they become more stable 39. FedEx is now looking for ways to make additional information available to drivers through _________________. A. DNA technology B. Nano technology C. Wireless technology D. VLSI technology

40. Both FedEx and UPS are working at embedding _________ units to reroute delivery trucks if a customer calls with a last-minute pickup request. A. MIS B. EIS C. DSS D. GPS

41. Motorola is one of the leading proponents of _________________. A. Human resources management C. Information systems management B. Total quality management D. Trucking systems management

42. ISO 9000 requires companies to measure quality at________________. A. Early stages of production C. Middle stages of production B. Later stages of production D. All stages of production

43. _________________ can be used to improve quality. A. DSS B. EIS C. GIS D. GPS

44. ___________________ can also be employed to control errors and locate the source of the problems. A. DSS B. Expert systems C. GIS D. GPS

45. Digital used ______________ to improve quality and cut the cost of installing minicomputers. A. DSS B. Expert systems C. GIS D. GPS

46. Production processes are directly supported by: A. Operational managers B. Tactical managers C. Design, engineering, and marketing D. Customers and employees

47. Market measures and firm performance measures are used to: A. Emphasize employee performance C. Detect new entrants 48. Corporate strategies are developed from: A. Employee background C. Purchasing capabilities of the customers B. Process improvements and innovations D. Suppliers attitude B. Highlight problems and opportunities D. Detect barriers to entry

49. Information technology provides many opportunities for: A. Enhancing the interpersonal relationships among the employees C. Finding the customers 50. The design process must: A. Optimize the production line to maximize costs and retain high quality B. Optimize the production line to minimize costs and retain high quality C. Minimize the production line to minimize costs and retain high quality D. Maximize the production line to maximize costs and retain high quality 51. Support for engineering and design takes the form of ______ systems that make it easy to create, modify, store, and share new designs. A. GIS/GPS B. DSS/EIS C. CAD/CAM D. LAN/WAN B. Improving the fundamental business process D. Locating the new entrants

52. Mass customization requires an IT system that: A. Links the production system to the engineering system B. Links the sales system directly to the production line and through to supply. C. Links the supply system directly to the engineering system D. Links the design system to the engineering system 53. _______________ can be used to schedule routine maintenance and spot problems before they cause problems. A. DSS B. Expert systems C. GIS D. GPS

54. Implementation of just-in-time (JIT) inventory systems is largely credited to: A. U.S. manufacturers B. Japanese manufacturers C. European manufacturers D. Mexican manufacturers

55. _______________ is (are) being used by leading firms to identify patterns and possibilities for new sales. A. Expert systems B. Geographic information systems C. Executive information systems D. Decision support systems

56. _______________ is (are) being used by leading firms to develop initial ideas for advertising and promotional campaigns.

A. CAD

B. CAM

C. Multimedia tools

D. HTTP

57. Leading firms are also using _____________ to assist customers in choosing the products and options that best match their needs. A. Expert systems B. Geographic information systems C. Executive information systems D. Decision support systems

58. One of the more dramatic IT support mechanisms for management is an: A. Expert system B. Geographic information system C. Executive information system D. Decision support system

59. Strategic changes often involve: A. Applying for funds from a bank before changes are considered C. Hiring new IS teams before any of your competitors B. Laying off old employees before changes are made D. Implementing new technology before any of your competitors

60. When developing and choosing strategies, you must always remember that: A. Innovations are free from risks and often do not carry high capital costs B. Innovations carry low capital costs and always lead to a successful business C. Innovations can be risky and often carry high capital costs D. Innovations always take away money from other projects 61. Although the competition is good for the customer, the increased expenditures can cause problems for the company: A. If the employees are laid off C. If new employees are hired at high salaries 62. Many potential strategies violate: A. Einsteins law of relativity B. Newtons second law C. Antitrust laws D. Moores law B. If the ideas do not work as well as you expected D. If new managers are hired for the new services

63. Attempts to monopolize a market are forbidden by the: A. Moores law B. Newtons first law C. Sherman Antitrust Act D. Einsteins law of relativity

64. In 1980s, the government was: A. Very strict about antitrust issues, including those regarding information systems B. Relatively lenient about antitrust issues, including those regarding information systems C. Relatively strict about antitrust issues, including those regarding information systems D. Oblivious about antitrust issues, including those regarding information systems 65. Entrepreneurship is built on three broad fundamentals: A. An idea, a business plan, and implementation C. A group of managers, human resources, and CEO B. An economic plan, manpower requirement, and business site D. A CEO, a CIO, and a Treasurer

66. You need to create a complete set of __________ that reflect the anticipated position of the firm for the first few years. A. Technical documents B. Accounting statements C. Travel documents D. Software and hardware systems

67. When searching for ideas, it might be better to partner with a _________________ instead of competing head-on. A. Small firm B. Large firm C. Medium firm D. Distributor

68. You will need to create a sales management plan, where you focus on the __________________. A. Internal structure of the human resources C. Internal structure of the research and development department 69. Companies are incorporated by: A. The commerce department and the commerce department has different requirements and filing fees B. The IRS and the IRS has different requirements and filing fees C. The state and states have different requirements and filing fees D. The state department and the state department has different requirements and filing fees B. Internal structure of the engineering department D. Internal structure of marketing department

70. Companies must obtain: A. Social security number from the IRS C. Tax ID from the town B. Tax ID from the state D. An EIN from the IRS

Chapter 12
1. The ___________ is charged with controlling civilian and military uses of U.S. airspace. A. U.S. Air Force B. U.S. Navy C. U.S. Army D. FAA

2. Three basic development techniques are: A. Preliminary investigation, systems analysis, and systems design B. Systems acquisition, systems implementation, and systems maintenance C. Fact-finding, documentation, and presentation D. Systems development life cycle (SDLC), prototyping, and end-user 3. As a manager, you need to understand the _______________________ issues facing MIS departments. A. Human resources and transportation C. Employment and operational B. Costs and management D. Supply and transaction

4. Instead of programming each line in COBOL, a report can be created in a few minutes using: A. An expert system or a DSS C. A MS Word or an access program B. A database management system or a spreadsheet D. A MS PowerPoint

5. The main objective of prototyping is to create a working version: A. Whenever it possible C. For the use of the managers only B. As quickly as possible D. For the use of the operational employees only

6. The third method of creating software systems, _____________________, relies on users to create their own systems. A. SDLC B. Prototyping C. End-user development D. CASE

7. In the process of systems development, case studies indicate that major problems have arisen during the phase of _______________. A. Do a detailed analysis of the system C. Develop/acquire the system B. Design the system D. Implementation of systems

8. ______________ is the largest worldwide consulting firm in management information systems. A. McKinsey and Co. B. Electronic Data Systems C. Accenture D. Rational Rose

9. ________________, a strategic consulting firm, examines organizations with a copyrighted Seven S model. A. McKinsey and Co. B. Electronic Data Systems C. Accenture D. Rational Rose

10. _______________, started by Ross Perot, purchased by GM, and now independent, is the largest outsourcing company. A. McKinsey and Co. B. Electronic Data Systems C. Accenture D. Rational Rose

11. _________, a tool to support object-oriented development, is a graphical tool designed to show the object details and their relationships. A. McKinsey and Co. B. Electronic Data Systems C. Accenture D. Rational Rose

12. With ___________________, led by Richard Stallman and the GNU project, thousands of programmers around the globe are building complex projects in a loosely knit organization. A. Microsoft B. Proprietary source C. Open source D. Rational Rose

13. The primary advantage of outsourcing is that: A. Saving trouble for your own IS department B. The external company takes responsibility for managing the process and producing the application C. They have more experience with a variety of programming needs

D. They will define for you exactly how the application should work 14. As the number and quality of software packages have increased, it has become easier: A. To build a system from scratch C. To build a system based on COTS 15. The main drawback with purchased components is: A. Reengineering your own applications C. The botheration of paying for upgrades B. They are expensive D. They do not always work together well B. To outsource for building a system D. To reengineer a system

16. Many outsource specialists can build new applications faster with fewer errors because they: A. Are better trained C. Can pull from previous contract applications for new ones B. Have more experience D. Write their collection of components for common use

17. The degree of customization of purchased programming often depend on: A. The need to track specific data C. Users understanding of the new programs 18. The drawback to extensive customization is that it: A. Usually doesnt work correctly C. Often results in unexpected outcomes 19. An important step in managing projects is: A. Know everyone involved C. Find people who can work together compatibly B. Duplicate important sections as a check one on the other D. To identify when the project becomes a runaway project B. Requires specially-trained programmers and delays the project D. Invalidates the warranty on the program B. The specialization of the uses of your firm D. Managements attitude

20. The SDLC approach encompasses ____________ basic stages. A. Six B. Four C. Three D. Five

21. Systems design turns business requirements into a ________________ that is implemented, creating a new system. A. Technical design B. Technical report C. Feasibility study D. Data flow diagram

22. The schedule is an important tool to evaluate the status of the project and the progress of the ____________. A. Programmers B. Employees C. Vendors D. MIS teams

23. Projects are typically evaluated in three areas of feasibility: A. Financial, time involved, and training C. Economical, operational, and technical 24. The feasibility study is used: A. To determine the cost of the project C. As a reference throughout the project to make sure everything stays on track 25. The objective of systems analysis is to: A. Put the system into operation B. Create complete technical specifications for the new system C. Determine how the existing system works and where the problems are located D. Design the new system 26. Without planning and control, any project: A. Gets successfully completed C. Is completed within deadline B. Will become a runaway D. Does not require any technical assistance B. To make sure management understands the project D. To explain the project to the end-users B. Size of the project, testing, and implementation D. Hardware, software, and training

27. Control begins with a detailed plan and performance targets that enable managers to:

A. Explain the project to the end-users C. Evaluate progress and identify problems 28. The objective of systems design is to: A. Put the system into operation C. Design the new system

B. Make sure management understands the project D. Put the system into operation

B. Create complete technical specifications for the new system D. Describe the new system as a collection of modules or subsystems

29. In most large projects, the actual coding takes ____________ percent of the total development time. A. 8 to 10 B. 15 to 30 C. 40 to 50 D. 60 to 75

30. Systems implementation involves: A. Splitting the new system as a collection of modules or subsystems B. Designing the new system C. Generating complete technical specifications for the new system D. Installation and changeover from the previous system to the new one, including training users and making adjustments to the system 31. _________________ is (are) objects or people who cause or facilitate changes. A. Intelligent agents B. External agents C. Change drivers D. Change agents

32. In systems implementation, the goal is to implement systems in a manner that recognizes resistance to change but encourages people to _____________. A. Reject the new system C. Accept the new system 33. The objective of maintenance is to: A. Put the system into operation C. Make modifications to the system as necessary B. Identify the problems and determine how a computer system can solve them D. Create complete technical specifications for the new system B. Design the new system D. Create complete technical specifications for the new systems

34. The job of overseeing and making the modifications necessary for the maintenance of the system is called ________________. A. Putting the system into operation C. Hardware maintenance B. Peripheral systems maintenance D. Software maintenance

35. One difficulty with software maintenance is that every time you change a module, you run the risk of: A. Crashing the system C. Use inconsistent naming conventions 36. Parallel conversion entails: A. Changing to the new system one piece at a time for the entire company C. Running both systems side-by-side for a given period 37. Direct conversion entails: A. Changing to the new system one piece at a time for the entire company C. Running both systems side-by-side for a given period 38. Phased conversion entails: A. Changing to the new system one piece at a time for the entire company C. Running both systems side-by-side for a given period B. Changing everyone in only one unit to the new system D. Choosing a day and going straight to the new system B. Changing everyone in only one unit to the new system D. Choosing a day and going straight to the new system B. Changing everyone in only one unit to the new system D. Choosing a day and going straight to the new system B. Confusing the outcomes D. Adding bugs (defects)

39. An important concept for managers to remember when dealing with new systems is: A. Setting a goal C. Flexibility 40. The new system must: A. Be within budget, on time, and meet all goals C. Be reliable, available, and secure B. Meet all the objectives of the feasibility study D. Be documented before it is released B. Questioning the value of the finished product D. Putting the evaluation method in at the beginning of the project

41. The primary purpose of the SDLC method of designing systems is to: A. Make sure everyone works together C. Save programming time 42. SDLC works best if: A. Managers do not know what the system should do long before the system is created B. Users do not have any idea about the proposed system C. The entire system can be accurately specified in the beginning D. Documentations are not written 43. The SDLC works best for: A. Small, easily updated systems B. Large, complex systems C. Expert systems D. Unstructured systems B. Outline the entire plan for management D. Provide guidance and control over the development process

44. Several researchers at Carnegie Mellon University have created the ______ to help development organizations evaluate their abilities. A. Expert systems C. Capability maturity model integration (CMMI) 45. The two primary drawbacks to SDLC are: A. Cost and the necessity for complex, long-term programming help B. It does not allow for a prototype, and it is very time-consuming C. Getting everyone to agree to the feasibility study, and deciding if the outcomes have met the objectives D. The time it takes and that all of the details must be specified up front 46. One of the main goals of object-oriented programming is: A. To write computer programming codes B. To create relatively independent objects that can be reused for multiple applications C. To facilitate debugging D. To communicate with other computers 47. Prototyping typically involves ____ user and _____ developer. A: Two and three B. One and one C. Three and four D. One and two B. Unstructured systems D. Executive information systems

48. The developer interviews the user and designs an initial system using a (an) _________. A. Expert system B. DBMS C. DSS D. EIS

49. One of the most difficult steps in creating any new system is: A. determining the time line C. Deciding which method to use to create it 50. The biggest drawback to JAD is that: A. It involves paired programming, which is not efficient C. Conflicts are difficult to identify 51. Microsofts Windows XP name is: A. Related to extreme programming C. Related to Windows 98 52. One new aspect to XP is: A. Parallel programming, where many programmers work together B. Paired programming, where two programmers work together constantly C. Parallel programming, where three programmers work together constantly D. Serial programming, where one programmer works constantly 53. Linus Torvalds uses open source development approach to create and distribute the ______________. B. Not related to extreme programming D. Related to WAN B. It requires management to make all user decisions D. It requires getting everyone together at the same time for an extended period of time B. Gaining management acceptance D. Determining the user requirements

A. Windows XP

B. Excel program

C. Linux operating system

D. Windows 98

54. A real problem with end-user development is that: A. Users generally lack the training and experience of MIS analysts and programmers B. End users are too close to the problem to see the solution C. End users have their own agendas and are not always aligned with company needs D. They prefer off-the-shelf software 55. The company needs to consider hiring more MIS personnel if: A. The system repeatedly malfunctions C. End users are spending much time creating their own applications 56. One way to look at systems is to see them as: A. A collection of processes or activities counterparts B. Circles C. Data progressions D. Their biological B. Reports are always late D. Data is inaccurate or unavailable

57. If a system is entirely self-contained and does not respond to changes in the environment, it is called a(n) _______________. A: Open system B. Parallel system C. Hybrid system D. Closed system

58. If a project is split into small parts and the parts given to independent teams: A. The teams can lose sight of the overall goals C. There is too much duplication of effort 59. In a DFD, a closed rectangle represents: A. A process B. An external entity C. A data store D. Feedback and control data B. The parts may not work together correctly D. The result is likely to be efficient and efficacious

60. In a DFD, an open-on-one-side rectangle represents: A. A process B. An external entity C. A data store D. Feedback and control data

61. In a DFD, a rectangle with rounded corners represents: A. A process B. An external entity C. A data store D. Feedback and control data

62. In a DFD, an arrow with a dashed line represents: A. A process B. An external entity C. A data store D. Feedback and control data

63. The first step in creating a DFD is to: A. Determine the goals C. Identify the primary processes 64. The last step in creating a DFD is to: A. Document the design C. Build the control flows B. Look at each process in detail and draw the expanded subsystems D. Interconnect the data B. Determine the main entities D. Identify the environment and the boundaries of the system

65. The goal in object-oriented design is to: A. Describe a system so that if you change a function, you only have to change one object B. Describe the objects in general terms C. Describe the functions in general terms D. Describe the object hierarchy before describing the functions

Chapter 13
1. Making effective use of information systems requires organizing the MIS resources: A. Technical expertise and programming abilities C. Technical expertise, hardware and data B. Hardware, software, data, and personnel D. Hardware, software, and technical expertise

2. In organizing information system resources, the goal is to balance: A. The need to update continuously and the costs of so doing B. The need for central control with the value of decentralized decisions C. Maintaining networks and training for new software D. Maintaining data and purchasing new hardware 3. Because personal computers have a huge price/performance advantage over larger computers, there is a major incentive to: A. Maintain networks and training for new software C. Update hardware and software continuously B. Maintain data and purchase new hardware D. Decentralize the hardware

4. In managing information systems, the goal of management is to find the appropriate balance between: A. The need to update continuously and the costs of so doing C. Maintaining networks and training for new software 5. The primary job of the MIS department is: A. To manage the software and hardware C. Provide timely, accurate, and relevant information B. To maintain the integrity of the companys data D. To support and enhance the business B. Decentralization and costs D. Maintaining data and purchasing new hardware

6. Mobile systems present more problems with in terms of security, beginning with the: A. Training of the users C. Loss of the equipment 7. The objective in scalable systems is to: A. Buy hardware with enough power to allow many software upgrades B. Buy software that does not need to be upgraded when demands increase C. Buy enough hardware and software in the beginning to allow for increased demands D. Purchase only the level of hardware that is needed 8. Commercial software versions change almost every year, requiring more: A. Hardware that is needed B. Training for users C. Software that is needed D. Word-processed documents B. Ability to track the use of the equipment D. Carelessness of the users

9. Besides the possibility of lower costs, it is better for the MIS department to support users directly because: A. Training contracts with software suppliers are very inefficient B. It has a better understanding of the business problems they encounter C. Security becomes critical if users go outside the company for help D. Combining several packages may be required 10. Most companies have ___________ track records in managing software projects. A. Excellent B. Good C. Poor D. Fair

11. Programming major applications requires obtaining information from ______________. A. Consultants and managers B. Suppliers and employees C. Users and managers D. Employees and executives

12. Standards incorporate what is known about a product at the time the: A. Software is sold B. Software is updated C. Technology is developed D. Standard is developed

13. If there were standards that perfectly described a product, there would be only one way to compete: A. Sales B. Price C. Profit D. Feature

14. If you attach a file in Word 2000 format, the recipient needs to have _______________ to read it. A. HTML B. PDF C. RTF D. Word 2000

15. Because todays databases are so crucial to the company, the business needs a (n): A. Excellent MIS department B. Daily backup system

C. Separate storage area for copies of the database 16. Security administration includes:

D. Carefully designed disaster and recovery policy

A. Installing network hardware and software, diagnosing problems, and designing new networks B. Training users, testing system configuration, and monitoring networks for ongoing attacks C. Several levels of analysts and programmers D. Database design and administration 17. CIO searches for and advocates: A. Several levels of analysts and programmers C. Strategic uses of MIS 18. The CIO is responsible for: A. Installing network hardware and software, and diagnosing problems C. Long-run planning in terms of information technology 19. Network management involves: A. Installing network hardware and software, diagnosing problems, and designing new networks B. Database design and administration C. Several levels of analysts and programmers D. Training users, answering questions, and installing software 20. U.S. programmers are paid about ________ times as much as Indian and Russian programmers. A. 100 B. 50 C. 75 D. 20 B. Database design and administration D. Training users, answering questions, and installing software B. Database design and administration D. Training users, answering questions, and installing software

21. Both India and Russia have: A. No educational programs C. Very few programmers 22. Database management focuses on: A. Installing network hardware and software, diagnosing problems, and designing new networks B. Database design and administration C. Several levels of analysts and programmers D. Training users, answering questions, and installing software 23. Programmer/analysts find it easier to get jobs and obtain higher salaries if they: A. Are willing to stay with the same company throughout their career B. Switch jobs frequently C. Work as consultants or contract employees D. Constantly update current skills and experience in new technologies 24. End-user support consists of: A. Installing network hardware and software, diagnosing problems, and designing new networks B. Database design and administration C. Several levels of analysts and programmers D. Training users, answering questions, and installing software 25. In the 1990s, the inability to hire IT workers, the increasing standardization of IT services, the desire to cut costs, and the need to focus on core business management resulted in: A. Larger companies breaking up into smaller ones C. The huge growth in outsourcing B. Smaller companies being overwhelmed D. Increased emphasis in colleges on IT training B. Lots of jobs for local programmers D. Extensive educational programs and few jobs for local programmers

26. Most firms pay outside firms to handle the technical details of Website hosting and development because: A. Webmasters are in short supply B. It is less expensive C. Their situations are unique and require advanced uses of information technology D. Few firms have the expertise to securely configure the networks and servers required for e-businesses

27. One reason to reconsider the use of outsourcing is that: A. It can be difficult to control the decisions of the outsourcing firm B. Employees are better trained than they used to be C. Responsibility for data must be retained within the firm D. Wireless connections may make it unnecessary 28. As reported in CIO Magazine, a study by DiamondCluster in late 2002 revealed that ______ percent of IT executives had to terminate outsourcing contracts early. A. 10 B. 20 C. 50 D. 78

29. An SLA is a (n): A. Expert system used by the managers C. Memorandum of understanding 30. Globalization and new competitors result in: A. The desire to minimize amount of management time devoted to non-revenue generating functions B. The need for responsiveness and flexibility C. Pressure and profits D. The need to focus on increasing revenues and decreasing fixed/semi fixed costs 31. Shorter product life cycles and mass customization result/s in: A. The desire to minimize amount of management time devoted to non-revenue generating functions B. The need for responsiveness and flexibility C. Pressure and profits D. The need to focus on increasing revenues and decreasing fixed/semi fixed costs 32. Rapidly changing markets, flexible manufacturing result in: A. The desire to minimize amount of management time devoted to non-revenue generating functions B. The need for responsiveness and flexibility C. Pressure and profits D. The need to focus on increasing revenues and decreasing fixed/semi fixed costs 33. Cost cutting, staff cuts, loss of middle management result in: A. The desire to minimize amount of management time devoted to non-revenue generating functions B. The need for responsiveness and flexibility C. Pressure and profits D. The need to focus on increasing revenues and decreasing fixed/semi fixed costs 34. The two broad trends creating significant changes in the way we perceive and organize information are: A. The growth of the Web and the sheer amount of information available B. Declining sizes and prices of technology, and expanding access to the Internet C. Declining sizes and prices of technology and the growth of wireless technology D. Computers and the Web 35. The goal of data warehouses is to: A. Allow the company to charge a fee for the use of the data C. Make integrated data available anywhere to authorized users B. Advance internal organization D. Maintain data security B. Defined performance measure that is specified in the contract D. Simulation technique

36. With information systems, four basic areas subject to centralization or decentralization: A. Hardware, software, data, and staffing C. Staffing, security, hardware, and software 37. An advantage to the decentralization of software is: A. Better understanding and communication C. Less chance of total breakdown 38. An advantage to the decentralization of hardware is: B. Only data needing to be shared is available D. Easier access and customization B. Security, software, data, and hardware D. Data, security, staffing, and hardware

A. Better understanding and communication C. Less chance of total breakdown 39. An advantage to the decentralization of data is: A. Better understanding and communication C. Less chance of total breakdown 40. An advantage to the centralization of hardware is: A. Easier to see and control costs

B. Only data needing to be shared is available D. Easier access and customization

B. Only data needing to be shared is available D. Easier access and customization

B. Security control and monitoring

C. Ease of maintenance

D. Efficient use of resources

41. An advantage to the centralization of data is: A. Easier to see and control costs B. Security control and monitoring C. Ease of maintenance D. Efficient use of resources

42. An advantage to the centralization of personnel is: A. Easier to see and control costs B. Security control and monitoring C. Ease of maintenance D. Efficient use of resources

43. An advantage to the centralization of software is: A. Easier to see and control costs 44. A strength of Windows XP is: A. Its compatibility with Apple software C. Is makes automatic backups B. The ability to create individual user profiles on the server D. Each machine can be configured differently from the central server B. Security control and monitoring C. Ease of maintenance D. Efficient use of resources

45. The strongest advantage to decentralizing data is that it: A. Makes it more difficult to hack into B. It replicates data in many locations C. Gives ownership of the data to the group that creates and maintains it D. Does not interfere with other users which many people need access to the data 46. MIS workers generally prefer a ________________ environment. A. Centralized B. Decentralized C. Programming D. Controlled

47. The primary advantage to decentralized MIS staffing is that: A. The support is closer to the users C. The MIS staff on location can maintain hardware 48. A key benefit of the thin-client approach is that: A. It allows for large data transfer C. Clients can be built from relatively simple hardware and software 49. The challenge for the security of data transfer is to: A. Set up user profiles correctly C. Maintain data integrity B. Make it easy for authorized managers but impossible (or exceedingly difficult) for unauthorized users D. Simplify data transfer to intranet servers B. It minimizes data replication D. It does not need a middle-ware component B. It is less expensive D. Networks will fail less frequently

50. One way MIS departments try to reduce costs is to: A. Stop purchasing software C. Build a standardized billing mechanism 51. Outsourcing provides: A. A short-term increase in cash for the company C. Less expensive because fewer in-house MIS personnel will be needed B. Better services than in-house MIS can offer D. Less need to upgrade continually the skills of in-house personnel B. Standardize as much of the technology as possible D. Stop purchasing hardware

Chapter 14

1. Sutter Health is working to implement paperless medical offices and already has ______ member physicians using a completely electronic system including X-rays and prescriptions. A. 9,000 B. 6,000 C. 1,200 D. 400

2. ___________ and ____________ issues become major areas of concern with medical information systems. A. Health care costs and Vioxx C. Celebrex and health care costs B. Security and privacy D. Vioxx and celebrex

3. When you use information technology to help your company, it means you are collecting and analyzing: A. Employee salaries C. Financial status of customers B. Data on customers and employees D. Employee benefits

4. National and international markets developed with every change in: A. The educational systems C. The health care systems B. The communication and transportation systems D. The monetary systems

5. Most authorities think that increases in technology in the past generally led to: A. A decrease in the number of jobs C. An increase in the number of jobs B. The number of jobs at a fixed level D. An increase in unemployment

6. It is possible to collect an amazing amount of data on any person: A. By collating private Website data C. By gaining public access to his or her banking records B. Using individualized data from the U.S. government D. Using publicly available data

7. Combining government statistics and data from market research firms with ______ can provide a precise picture of consumer demands. A. Geographical data B. Sales data C. Analytical data D. Economical data

8. Credit card and credit bureau data are the two detailed sources of ______________. A. Tracking data B. Consumer data C. IFF data D. Geographical data

9. Consumers have ________________ over the collection of personal data. A. Lots of control B. Little control C. Slight control D. Moderate control

10. More than ______ of U.S. households signed up for the national do-not-call list to stop telemarketing calls. A. Sixty percent B. Seventy percent C. Eighty percent D. Fifty percent

11. A Web cookie is a small ________________ that the server asks the browser to store on the users computer. A. Data file B. Text file C. Image file D. Audio file

12. Anytime the user visits a site that deals with Doubleclick, the identifying cookie, date/time, and site visited are stored on ____________. A. Users servers B. Companys servers C. Doubleclicks servers D. Employers servers

13. With the _________ release of Windows, Microsoft is offering another option: the ability to refuse third-party cookies, such as those placed by Doubleclick. A. NT B. 1998 C. 2000 D. XP

14. The federal e-911 law now requires cell phone operators to provide _________ data on cell phones. A. Sales B. Bank C. Weather D. Location

15. Manufacturers have begun embedding _______________ within cell phones. A. IC chips B. GPS locator chips C. Image processing chips D. Signal processing chips

16. ___________ and signal strengths are used as backup methods for determining cell phone locations.

A. Propagation

B. Triangulation

C. Transmission

D. Radiation

17. Employers have the right to impose any controls or monitoring they wish as long as: A. They do not violate other laws, such as the discrimination laws C. They inform the employees of what is being done B. They keep adequate records D. They can substantiate the need

18. C.J. Driscoll & Associates estimates that about ____________ fleet vehicles had GPS trackers installed in 2004. A. Five million B. Two million C. One million D. Three million

18. Concerning the government and privacy issues, collecting data on targeted individuals such as dissidents or minorities can: A. Lead to lawsuits C. Stifle innovation B. Not be done legally D. Be perfectly legal only if the FBI does it

19. In 1991, _____ people were accused of selling Social security information, including six government employees. A. 1800 B. 180 C. 18 D. 8

20. J. Edgar Hoover, longtime head of the FBI, collected thousands of secret files on politicians, journalists, and ___________. A. Musicians B. School teachers C. Software engineers D. Business leaders

21. In 1994, according to the Associated Press, the bureau processed _____ million files, selling _____ million records a day and handling almost _____billion pieces of data every month. A. 900, 3, and 4 B. 450, 1.5, and 2 C. 1350, 4.5, and 6 D. 1800, 6, and 8

22. In 2001, a federal rule took effect that was initiated by President Clinton to provide some control over the use of __________. A. Financial data B. Sales data C. Medical data D. IFF data

23. Using _____________, some firms now offer people the ability to use the Internet without revealing any data about themselves. A. The Privacy Act of 1994 B. Data protection directive C. Privacy Act of 1974 D. Advanced encryption

24. In 2004, _________ percent of hospitals stated that they are either installing electronic medical record systems or planning to do so soon. A. 80 B. 60 C. 40 D. 20

25. The non-for-profit Health Technology Center suggests it will cost _________ over five years in state and federal money to create an integrated nation-wide medical record system. A. $10 billion B. $20 billion C. $5 billion D. $2 billion

26. Norbert Weiner, a computer pioneer in the 1940s, predicted: A. More jobs will be performed from remote locations B. Employees will choose to remain closer to their homes C. A major depression would result from computers replacing workers D. Communications will include video links and faster document transfer 27. Despite Norbert Weiners predictions, during the last 100 years technology _____________________ the number of jobs and raised the standard of living for most workers. A. Has decreased B. Has not changed C. Has increased D. Has exponentially decreased

28. Since the introduction of computers in the 1950s, the worlds economies have __________ and incomes have __________. A. Not grown, decreased B. Grown, increased C. Grown, decreased D. Not grown, increased

29. As opposed to earlier jobs, most new jobs created today by technology: A. Require a college degree C. Are higher paying, physically safer, and less repetitive B. Are simple entry-level positions D. Are in the wealthier countries

30. Two important skills for an MIS employee to learn are: A. Typing and patience C. Predicting the future and evaluating the past B. Spreadsheets and databases D. Identifying trends and choosing between fact and rumor

31. Most Windows-based software contains features to facilitate usage by people with: A. High intelligence C. Various physical challenges 32. ________ percent of U.S. jobs are service-based. A. 90 B. 70 C. 50 D. 30 B. Excellent programming capabilities D. Good technical backgrounds

33. More jobs can be performed from remote locations: A. As employers realize the advantages of maintaining smaller central locations B. As employees choose to remain closer to their homes C. As communication improves to include video links and faster document transfer D. As bandwidth becomes less expensive 34. Two main advantages of having employees work from home are: A. Less time wasted at the water cooler, and no lunch hours to pay for B. Employee work can be evaluated keystroke by keystroke, and they can be paid less C. Fewer fringe benefits and a safer working environment D. Decreased costs through smaller offices and flexibility in hiring contract workers 35. A patent essentially grants a monopoly to an inventor for a period of ______ years. A. 100 B. 50 C. 25 D. 20

36. The goal of patents and copyrights is to: A. Maintain records of new inventions and new intellectual materials C. Encourage creativity by offering rewards to innovators B. Protect the rights of the individuals D. Create barriers to entry until they are no longer profitable

37. The TiVo system was able to report that Janet Jacksons wardrobe malfunction in the _______________ was the most replayed event. A. Red Sox 2004 C. 2003 Superbowl halftime B. 2004 Superbowl halftime D. 2004 Olympic Game in Greece

38. Some industry-sponsored reports indicate that software piracy in Southeast Asia is huge: over ____ percent of software in use is copied. A. 35 B. 50 C. 75 D. 90

39. A key factor of the Internet is that: A. Once created, it is impossible to destroy knowledge C. Encourage creativity by offering rewards to innovators B. It is free D. Create barriers to entry until they are no longer profitable

40. The Internet gives authors and creators of intellectual material the opportunity to: A. Reach much larger audiences immediately C. Bypass the traditional publishing routes B. Be translated into many more languages D. Create without censorship

41. Economics shows that digital product companies make the most money by: A. Reducing the prices to the point where elasticity of demand is equal to 1 B. Having no production costs C. Charging different consumers different prices for the same item, depending on demographics D. Reducing the prices to the point where elasticity of demand is equal to -1 42. Technology has the potential to change education, particularly in terms of: A. Video teaching, lower costs, and computerized classrooms C. Individual attention, course management, and distance B. Individual attention, lower costs, and interactive teaching D. Distance, course management, and lower costs

43. In regard to the use of the new technologies in education, researchers have found that: A. There is little conclusive evidence that they are equal to or superior to existing techniques B. Students learn more quickly with the individualized courses C. Teachers and parents do not like it D. Students learn less than they do in the traditional environments 44. The real key to online education is to use the power of technology in: A. Interactive technologies C. Creative effort and teacher training B. Providing computer access for all students D. Developing entirely new applications

45. Governments are slow to adopt new technologies because: A. They are cumbersome bureaucracies, with older, entrenched leaders in place B. They have highly complicated budgets, and arcane political agendas C. They tend to be highly resistant to change in areas requiring specialized education D. They have limited budgets, long procurement cycles, and requirements for special allocations to acquire new technology 46. Most government agencies are still nervous about electronic commerce, partly because: A. They have entrenched rules based on traditional business methods B. They are unable to positively identify consumers over the Internet C. They have a political constituency to answer to D. The U.S. tax laws do not cover Internet transactions 47. In March 2004, China closed ____________ Internet cafes most of them for illegally admitting juveniles. A. 86,000 B. 80,000 C. 10,000 D. 8,600

48. Several experts have testified before Congress that creating electronic voting systems: A. Is well within the capability of current technology C. Will not be able to prevent fraud by application programmers B. Is not within the capability of current technology D. Will require violation of individual privacies

49. Electronic voting has two main complications over traditional e-commerce, first, that not all voters can be authenticated because they do not have credit cards, and, second: A. The poor do not have access to computers C. Vote selling cannot be prevented B. Votes have to be audible, but anonymous D. It will decrease participation rates

50. Voting from home over the Internet presents two problems: A. Preventing denial-of-service attacks, and protecting the security of home computers B. Handling the issue of multiple voters in the same household, and the ability to encrypt all the votes C. Preventing denial of service attacks, and handling the issue of multiple voters in the same household D. Protecting the security of home computers, and the ability to ensure that all votes are counted 51. Society has an additional critical objective in designing a new voting system: A. The need to make it easier for people to vote for Republican candidates B. The need to make it easier for people to vote for Democratic candidates C. The need to make it easier for people to vote to increase participation rates D. The need to make it easier for people to vote for Independent candidates 52. In a test of electronic voting systems in the Georgia 2001 election, almost all said the system was easy to use and over ______ percent said the entire state should move to the electronic system. A. 99 B. 97 C. 95 D. 94

53. The underlying components of the Internet were not designed with (for): A. Security in mind B. Military goals C. A discernible infrastructure D. Economic issues in mind

54. In 2004, David Blunkett, the home secretary of the UK, proposed a bill that would create a detailed national: A. Ration card program B. Credit card program C. Social security card program D. Identity card program

55. A world-state would be a massively complex system that would be: A. Sustained by the Internet C. Economically shattering to currently wealthy countries B. Politically unstable D. Unfair to developing economies

56. The FBI created the ___________________ system to monitor and record all Internet communications of a targeted person. A. Echelon B. Escrow C. Cell phone D. Carnivore

57. In a survey of 30,000 undergraduates, ________ percent admitted to cut-and-paste plagiarism using the Internet. A. 90 B. 70 C. 37 D. 47

58. Companies have obligations to society, in that: A. A firm must ensure privacy of data C. A firm must obey all relevant laws B. A company must provide training and monitoring to make sure all relevant laws are understood D. A firm must not use data in a manner to injure their partner firms

59. Companies have obligations to their employees, in that: A. The firm must ensure privacy of data C. The firm must obey all relevant laws B. The company must provide training and monitoring to make sure all relevant laws are understood D. The firm must not use data in a manner to injure their partner firms

60. Companies have obligations to customers, in that: A. A firm must ensure privacy of data C. A firm must obey all relevant laws B. A company must provide training and monitoring to make sure all relevant laws are understood D. A firm must not use data in a manner to injure their partner firms

61. Companies have obligations to business partners, in that: A. A firm must ensure privacy of data C. A firm must obey all relevant laws B. A company must provide training and monitoring to make sure all relevant laws are understood D. A firm must not use data in a manner to injure their partner firms

62. Until the 1980s, relatively few laws at any level were specifically directed at: A. Individual hackers B. Corporate misuse of data C. Computer usage D. The use of federal government data

63. The law based on the Computer Fraud and Abuse Act provides fines up to: A. $200,000 and up to 25 years in prison C. $100,000 and up to 20 years in prison B. $150,000 and up to 20 years in prison D. $100,000 and up to 30 years in prison

64. In terms of enforcement, most federal, state, and local agencies: A. Have the expertise to deal with computer crimes C. Have few, if any, officers devoted to the solution of computer crimes 65. The copyrights laws apply to the specific item, such as: A. A unique name (or logo) C. A mechanical device or computer software or mathematical algorithm 66. The patents laws apply to the specific item, such as: A. A unique name (or logo) C. A mechanical device or computer software or mathematical algorithm 67. The trademarks laws apply to the specific item, such as: A. A unique name (or logo) C. A mechanical device or computer software or mathematical algorithm 68. The trade secret laws apply to the specific item, such as: A. A unique name C. A mechanical device or computer software or mathematical algorithm B. A book or song or computer software D. Stealing secret information (for example, data) B. A book or song or computer software D. Stealing secret information (for example, data) B. A book or song or computer software D. Stealing secret information (for example, data) B. A book or song or computer software D. Stealing secret information (for example, data) B. Do not realize the seriousness of computer crimes D. Are putting increased emphasis on computer crimes

69. The Freedom of Information Act generally provides people with the ability to obtain information held by ______________.

A. University registrars

B. Credit card companies

C. Government agencies

D. Professional societies

70. The most important feature of the Family Educational Rights and Privacy Act is that it limits the release of ______________. A. Medical data B. Educational data C. Bank data D. Credit data

71. The primary purpose of the Electronic Communications Privacy Act was to extend traditional wiretap provisions to electronic communication, which includes: A. Personal data and audio data C. Cellular phone and e-mail transmissions B. Credit data and image transmissions D. Medical data and audio data

72. The Fair Credit Reporting Act primarily gives consumers the right to inspect: A. Credit records and it gives them the right to correct errors C. Personal data and image data 73. The Drivers Privacy Act limits the use and release of: A. Personal data B. Medical data C. State motor vehicle data D. State credit union data B. Bank records and medical records D. Medical data and credit data

74. The video Privacy Act was created to limit the release of: A. Personal data B. Rental records from video stores and libraries C. State motor vehicle data D. State credit union data

75. The Privacy Protection Act of 1980 is primarily concerned with: A. Personal data B. Rental records from video stores and libraries C. State motor vehicle data D. Law enforcement investigations

76. The Privacy Act of 1974 deals more directly with: A. The collection and dissemination of information by the federal government C. The collection and dissemination of personal credit data 77. The Communications Assistance for Law Enforcement Act (CALEA) requires: A. Local police agencies to find terrorists and criminals B. Telecommunications firms to pay for wiretap facilities for police to listen to conversations C. School authorities to help the students who fail in English D. Health care agencies to pay for medical tests for the patients 78. The Health Insurance Portability and Accountability Act (HIPAA) is used to limit sharing of ________________. A. Financial information B. Educational information C. Medical information D. Personal information B. Rental records from video stores and libraries D. Law enforcement investigations

79. The Graham-Leach-Bliley Act of 1999 primarily deregulated some _______________. A. Health care services 80. The U.S. Patriot Act effectively: A. Repeals almost all government restraints C. Looks for terrorists in the country 81. The CAN-SPAM Act is a halfhearted attempt to: A. Reduce the freedom of the sender B. Enhance the computer functioning C. Reduce the fraud involved with most unsolicited commercial e-mail (spam) D. Increase the data transmission speed 82. The Digital Millennium Copyright Act (DMCA) of 1998 changed: A. Analog data into Digital data C. Digital data into analog data B. Some copyright provisions to synchronize the U.S. laws with the European laws D. Analog image data into digital data B. Limits privacy of the citizens D. Supports fighting against war and terror B. Financial services C. Educational services D. Transportation services

You might also like