logo image

DAC1 WGU Business Driven Technology Study Guide with Chapter and Practice Tests

Which of the below represents information?

-Data converted into a meaningful and useful context
-Data characteristic that stands for a value that changes or varies over time
-Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making
-Skills, experience, and expertise, coupled with information and intelligence that creates a person’s intellectual resources

Data converted into a meaningful and useful context
(Information is data converted into a meaningful and useful context.)
Which of the below represents a variable?

-Data converted into a meaningful and useful context
-Data characteristic that stands for a value that changes or varies over time
-Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making
-Skills, experience, and expertise, coupled with information and intelligence that creates a person’s intellectual resources

Data characteristic that stands for a value that changes or varies over time
(A variable is a data characteristic that stands for a value that changes or varies over time.)
Which of the following represents business intelligence?

-Data converted into a meaningful and useful context
-Data characteristic that stands for a value that changes or varies over time
-Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making
-Skills, experience, and expertise, coupled with information and intelligence that creates a person’s intellectual resources

Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making
(Business intelligence is information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making.)
Which of the following represents knowledge?

-Data converted into a meaningful and useful context
-Data characteristic that stands for a value that changes or varies over time
-Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making
-Skills, experience, and expertise, coupled with information and intelligence that creates a person’s intellectual resources

Skills, experience, and expertise, coupled with information and intelligence, that creates a person’s intellectual resources
(Knowledge includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person’s intellectual resources.)
Successful companies operate ______________, integrating the operations of all departments.

-independently
-cross-functionally
-departmentally
-dependently

Cross-functionally
(Successful companies operate cross-functionally, integrating the operations of all departments.)
Operating cross-functionally means integrating the operations of all ________.

-knowledge workers
-managers
-computers
-departments

Departments
Knowledge __________ are individuals valued for their ability to interpret and analyze information.
Workers
Management __________ systems is a business function, like accounting or human resources, that moves information about people, products, and processes across the company to facilitate decision making and problem solving.
Information
What is a competitive advantage?

-A service that an organization’s customers value more highly than similar offerings from a supplier
-A product or service that an organization’s customers value more highly than similar offerings from a competitor
-A product that an organization’s customers value the same as an identical offer from a competitor
-A product or service that an organization’s customers value more highly than similar offerings from a supplier

A product or service that an organization’s customers value more highly than similar offerings from a competitor
(This is the definition of competitive advantage.)
Which of the below is not one of Porter’s Five Forces?

-Buyer power
-Supplier power
-Threat of substitute products or service
-Threat of managers

Threat of managers
(Threat of managers is not one of Porter’s Five Forces.)
Which of the following is not one of Porter’s Five Forces?

-Manager power
-Supplier power
-Threat of substitute products or services
-Threat of new entrants

Manager power
(Manager power is not one of Porter’s Five Forces.)
Which of the following is one of Porter’s three generic strategies?

-Supplier power
-Focused strategy
-Value chain analysis
-Business process

Focused strategy
(Focused strategy is one of Porter’s three generic strategies.)
Which of the following forces is commonly reduced through the use of a loyalty program?

-Threat of new entrants
-Rivalry among existing competitors
-Supplier power
-Buyer power

Buyer power
(To reduce buyer power, an organization must make it more attractive for customers to buy from them than from their competition. One of the best IT-based examples is the loyalty program that many organizations offer.)
Which of the following is one of Porter’s three generic strategies?

-Buyer power
-Broad cost leadership
-Value chain analysis
-All of these are correct

Broad cost leadership
(Cost leadership is one of Porter’s three generic strategies.)
Which part of the value chain acquires raw materials and manufactures, delivers, markets, sells, and provides after-sales services?

-Primary value activities
-Secondary value activities
-Support value activities
-None of these are correct.

Primary value activities
(This is the definition of primary value activities.)
Product __________________ occurs when a company develops unique differences in its products with the intent to influence demand.
Differentiation
__________________ value activities acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services.
Primary
Value __________________ analysis is a highly useful tool in that it provides hard-and-fast numbers for evaluating the activities that add value to products and services.
Chain
__________________ value activities include firm infrastructure, human resource management, technology development, and procurement.
Support
Which of the following is a characteristic of information?

-Type
-Quality
-Timeliness
-All of these

All of these: (Type, Quality, Timeliness)
(All of these are characteristics of information.)
What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks?

-Transactional information
-Quality
-Analytical information
-Timeliness

Analytical information
(This is the definition of analytical information.)
What is one of the biggest pitfalls associated with real-time information?

-It continually changes.
-It is only available to high-level executives due to the -expense.
-It is only available in aggregate levels of granularity.
-All of these are correct.

It continually changes.
(Information continually changes, and this can cause issues with real-time information.)
Which of the following implies that aggregate or summary information is in agreement with detailed information?

-Consistency
-Accuracy
-Uniqueness
-Completeness

Consistency
(This is the definition of consistency.)
Organizational information comes in different levels, ___________, and granularities.
Formats
Analytical ____________ encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks.
Information
The ________characteristic of high-quality information ensures that all the values are correct.
Accuracy
What is the primary purpose of business process reengineering?

-To maximize the total supply chain effectiveness and profitability
-To increase customer loyalty and retention
-To integrate all departments and functions to enable decision making
-To make all business processes best-in-class

To make all business processes best-in-class
(The primary purpose of business process reengineering is to make all business processes the best-in-class.)
Which of the following is the key element supply chain management manages?

-Products
-Information
-Competitors
-Suppliers

Information
(The key element supply chain management systems manage is information flows between and among stages in a supply chain.)
Which of the following is an organizational result from an effective and efficient supply chain management system?

-Decrease the power of its buyers
-Create entry barriers, thereby reducing the threat of new entrants
-Increase efficiencies while seeking a competitive advantage through cost leadership
-All of these are correct.

All of these are correct: (Decrease the power of its buyers, Create entry barriers, thereby reducing the threat of new entrants, Increase efficiencies while seeking a competitive advantage through cost leadership.)
(All of these are results from an effective and efficient SCM system.)
Customer relationship management involves managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention. How does CRM ultimately impact an organization?

-Changes the manufacturing process
-Improves employee satisfaction
-Increases profitability
-Improves the supply chain

Increases profitability
(Customer relationship management involves managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization’s profitability.)
Which of the following can a CRM system collect information from?

-Accounting system
-Order fulfillment system
-Inventory system
-All of these are correct.

All of these are correct: (Accounting system, Order fulfillment system, Inventory system)
(A CRM system can collect information from accounting, order fulfillment, and inventory systems.)
What does enterprise resource planning integrate?

-All departments and functions throughout an organization
-All customers with product development
-All suppliers with manufacturers
-All business processes with external manufactures

All departments and functions throughout an organization
(Enterprise resource planning integrates all departments and functions throughout an organization into a single IT system.)
A business __________ is a standardized set of activities that accomplish a specific task.
Process
Business process reengineering is the analysis and redesign of __________ within and between enterprises.
Workflow
Supply chain ____________ involves managing information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability.
Management
___________ resource planning systems integrate all departments and functions throughout an organization into a single IT system.
Enterprise
Which of the following is not one of the four primary information technology areas where businesses are focusing in the 21st century?

-IT infrastructures
-Security
-DBMS
-Ebusiness

DBMS
(DBMS is not the primary focus for IT in the 21st century.)
Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?

-Only authorized individuals can access applications for which they are entitled.
-Only authorized individuals can gain access to the network.
-Individuals cannot understand or alter information while it is in transit.
-All of these are correct.

All of these are correct: (Only authorized individuals can access applications for which they are entitled, Only authorized individuals can gain access to the network, Individuals cannot understand or alter information while it is in transit.)
(All of these are reasons why businesses want to have the appropriate levels of authentication, access control, and encryption.)
What is the ability to purchase goods and services through a wireless Internet-enabled device?

-Telematics
-Electronic tagging
-Mobile commerce
-None of these are correct.

Mobile commerce
(This is the definition of mobile commerce.)
What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?

-Telematics
-Electronic tagging
-Mobile commerce
-None of these are correct.

Electronic tagging
(This is the definition of electronic tagging.)
________ infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals.
IT
RFID uses active or ________ tags in the form of chips or smart labels.
Passive
Which of the following does a database maintain information on?

-Inventory
-Transactions
-Employees
-All of these are correct.

All of these are correct: (Inventory, Transactions, Employees)
(A database maintains information on inventory, transactions, and employees.)
Which database model is a type of database that stores information in the form of logically related two-dimensional tables?

-Network database model
-Relational database model
-Hierarchical database model
-All of these are correct.

Relational database model
(The relational database model is a type of database that stores information in the form of logically related two-dimensional tables.)
What in the relational database model is a person, place, thing, transaction, or event about which information is stored?

-Attribute
-Attribute class
-Entity
-Entity class

Entity
(This is the definition of entity.)
Why do relational databases use primary keys and foreign keys?

-To create logical relationships
-To create a database
-All of these are correct.
-None of these are correct.

To create logical relationships
(Keys are used to create logical relationships.)
All of the following are advantages of database-stored information, except:

-Increased information redundancy
-Increased scalability and performance
-Increased information integrity
-Increased flexibility

Increased information redundancy
(Database-stored information reduces information redundancy.)
What measures how quickly a system performs a certain process or transaction?

-Redundancy
-Information integrity
-Scalability
-Performance

Performance
(This is the definition of performance.)
What are the rules that enforce basic and fundamental information-based constraints?

-Data redundancy
-Information integrity
-Scalability
-Relational integrity constraints

Relational integrity constraints
(This is the definition of relational integrity constraints.)
What is an interactive website that is kept constantly updated and relevant to the needs of its customers using a database?

-Data-driven website
-Data warehouse
-Data mart
-Data cube

Data-driven website
(This is the definition of data-driven website.)
What allows separate systems to communicate directly with each other?

-Relational database model
-Data-driven website
-DBMS
-Integration

Integration
(Integration allows separate systems to communicate directly with each other.)
A foreign key in the relational database model is a ___________ key of one table that appears as an attribute in another table.
Primary
Information ___________ is the duplication of information or storage of the same information in multiple places.
Redundancy
Which of the following describes ETL?

-A process that transforms information using a common set of enterprise definitions
-A process that loads information into a data warehouse
-A process that extracts information from internal and external databases
-All of these are correct.

All of these are correct: (A process that transforms information using a common set of enterprise definitions, A process that loads information into a data warehouse, A process that extracts information from internal and external databases.)
(All of the above describe ETL.)
What is data mining?

-A particular attribute of information
-The common term for the representation of multidimensional information
-The process of analyzing data to extract information not offered by the raw data alone
-Uses a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that
predict future behavior and guide decision making

The process of analyzing data to extract information not offered by the raw data alone
(Data mining is the process of analyzing data to extract information not offered by the raw data alone.)
Which of the below represents a challenge facing many businesses?

-Collecting information
-Discerning patterns and meaning in the information
-Responding to the resultant information
-All of these are correct.

All of these are correct: (Collecting information, Discerning patterns and meaning in the information, Responding to the resultant information.)
(All of the above are challenges facing businesses today.)
A ________ is the common term for the representation of multidimensional information.
Cube
Information _____________ or scrubbing is the process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information.
Cleansing
Information _____________ activities include removing redundant records, fixing erroneous relationships, and fixing inaccurate data.
Cleansing
One hundred percent complete and accurate information is _____________.
Impossible
What means a technology can travel with the user?

-Mobile technologies
-Wireless technologies
-WiMax technologies
-wLAN technologies

Mobile technologies
(Mobile technologies can travel with the user, but it is not necessarily in real time.)
What is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants can be easily interconnected using a short-range wireless connection?

-WiMAX
-Bluetooth
-GIS
-GPS

Bluetooth
(This is the definition of Bluetooth.)
What is wireless fidelity?

-Commonly used to transmit network signals over great distances
-An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz
frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled
together
-A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay
this information to electronic readers
-A means of linking computers using infrared or radio signals

A means of linking computers using infrared or radio signals
(This is the definition of wireless fidelity.)
What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?

-WiMAX wireless broadband
-Satellite television
-Wireless local area network
-Cellular phones and pagers

WiMAX wireless broadband
(WiMAX wireless broadband enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable.)
Which of the following is the correct definition of RFID?

-Radio frequency internal diagnostics
-Radio frequency identification
-Radio fast internal diagnostics
-Radio frequency interoperability device

Radio frequency identification
What is a geographic information system (GIS)?

-A device that determines current latitude, longitude, speed, and direction of movement
-Contains a microchip and an antenna, and typically works by transmitting a serial number via radio waves to an electronic
reader, which confirms the identity of a person or object bearing the tag
-Designed to work with information that can be shown on a map
-Commonly used to transmit network signals over great distances

Designed to work with information that can be shown on a map
(This is the definition of GIS.)
Which of the following is a common use for GIS?

-Finding what is nearby
-Routing information
-Information alerts
-All of these are correct.

All of these are correct: (Finding what is nearby, Routing information, Information alerts)
(All of the above are common uses for GIS.)
The terms ____________ and wireless are often used synonymously but actually denote two different technologies.
Mobile
____________ refers to any type of operation accomplished without the use of a hard-wired connection.
Wireless
A __________ area network provides communication over a short distance that is intended for use with devices that are owned and operated by a single user.
Personal
A global ____________ system is a device that determines current latitude and longitude, speed, and direction of movement.
Positioning
Which of the follow represents a trait of disruptive technology?

-Enters the marketplace at the low end
-Is a new way of doing things that initially doesn’t meet the needs of existing customers
-Tends to open new markets and destroy old ones
-All of these are correct.

All of these are correct: (Enters the marketplace at the low end, Is a new way of doing things that initially doesn’t meet the needs of existing customers, Tends to open new markets and destroy old ones.)
(Disruptive technology (1) is a new way of doing things that initially doesn’t meet the needs of existing customers, (2) tends to open new markets and destroy old ones, (3) enters the marketplace at the low end and eventually evolves to displace high-end competitors and their reigning technologies.)
What is the innovator’s dilemma?

-A new way of doing things that initially does not meet the needs of existing customers
-Produces an improved product that customers are eager to buy, such as a faster car or larger hard drive
-Implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are
doomed to extinction
-Discusses how established companies can take advantage of disruptive technologies without hindering existing relationships
with customers, partners, and stakeholders

Discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders
(This is the definition of innovator’s dilemma.)
What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called —-HTML?

-WWW
-URL
-Ebusiness
-Ecommerce

WWW
(This is the definition of WWW.)
What is the buying and selling of goods and services over the Internet?

-Emarket
-Emall
-Ebusiness
-Ecommerce

Ecommerce
(This is the definition of ecommerce.)
Which of the following refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information?

-Information richness
-Information reach
-Information system
-Personalization

Information richness
(Information richness refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.)
What measures the number of people a firm can communicate with all over the world?

-Mass customization
-Personalization
-Information reach
-Information richness

Information reach
(This is the definition of information reach.)
A disruptive ___________ is a new way of doing things that initially does not meet the needs of existing customers.
Technology
A(n) ___________ technology produces an improved product customers are eager to buy.
Sustaining
According to Christensen, companies may have placed too great an emphasis on satisfying customers’ current ___________, while forgetting to adopt new disruptive technology that will meet customers’ future needs.
Needs
Information __________ refers to the number of people a business can communicate with, on a global basis.
Reach
___________ occurs when a company knows enough about a customer’s likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.
Personalization
What applies to any business that sells its products or services to consumers over the Internet?

-C2B
-C2C
-B2B
-B2C

B2C
(This is the definition of B2C.)
What applies to businesses buying from and selling to each other over the Internet?

-C2B
-C2C
-B2B
-B2C

B2B
(This is the definition of B2B.)
Which of the following companies is an example of a pure-play or virtual business?

-Barnes & Noble
-Google
-T. J. Maxx
-All of these are correct.

Google
(Google is an example of a pure-play business.)
Which of the following is one of the six ebusiness tools for connecting and communicating?

-Email
-Disintermediation
-Universal resource locator
-Web personalization

Email
(Email is one of the six ebusiness tools for connecting and communicating.)
Which of the following are the primary challenges to the ebusiness models?

-Protecting customers
-Adhering to taxation rules
-Providing security
-All of these are correct.

All of these are correct: (Protecting customers, Adhering to taxation rules, Providing security.)
(All of the above are challenges to the ebusiness models.)
An ebusiness __________ is an approach to conducting electronic business by which a company can become a profitable business on the Internet.
Model
The next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free—is known as ________.
-Web 1.0
-Web 2.0
-Web 3.0
Web 2.0
(This is the definition of Web 2.0.)
What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

-Management system
-Reputation system
-Knowledge system
-Open system

Open system
(This is the definition of an open system.)
What refers to any source code made available freely for any third party to review or modify?

-Open system
-Open source
-User-contributed content
-Collaboration software

Open source
(Open source software refers to any source code made available freely for any third party to review or modify.)
What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS department?

-Tacit knowledge
-Explicit knowledge
-Pure knowledge
-Virtual knowledge

Explicit knowledge
(This is the definition of explicit knowledge.)
Which of the following is not an example of explicit knowledge?

-Patent
-Trademark
-Employee opinion
-Marketing research

Employee opinion
(Examples of explicit knowledge include patents, trademarks, business plans, marketing research, and customer lists.)
What are specific key words or phrases incorporated into website content for means of classification or taxonomy?

-Social media
-Social networking analysis
-Tags
-All of these are correct.

Tags
(Tags are specific key words or phrases incorporated into website content for means of classification or taxonomy.)
What is an online journal that allows users to post their comments, graphics, and video?

-Microwiki
-Wiki
-Blog
-Mashup

Blog
(A blog is an online journal that allows users to post their comments, graphics, and video.)
Which of the following is a key challenge associated with Business 2.0?

-Technology independence
-Information vandalism
-Copyright independence
-All of these are correct.

Information vandalism
(Information vandalism, technology dependence, and violations of copyright are key challenges associated with Business 2.0.)
What is the ability to purchase goods and service through a wireless Internet-enabled device?

-Semantic Web
-WWW
-Egovernment
-Mobile business

Mobile business
(Mobile business is the ability to purchase goods and service through a wireless Internet-enabled device.)
Social __________ describes the collaborative activity of marking shared online content with key words or tags as a way to organize it for future navigation, filtering, or search.
Tagging
_____________ bookmarking allows users to share, organize, search, and manage bookmarks.
Social
A _____________is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.
Wiki
A(n) _____________ is another term for an online journal that allows users to post their own comments, graphics, and video.
Blog
Which of the following is an example of a semistructured decision?

-Who are our best customers by region?
-Who are our best customers by sales representative?
-Who are our best customers by product?
-All of these are correct.

All of these are correct: (Who are our best customers by region? Who are our best customers by sales representative? Who are our best customers by product?)
(All of the above are examples of semistructured decisions.)
Which of the following is a common DSS analysis technique?

-What-if analysis
-Sensitivity analysis
-Optimization analysis
-All of these are correct.

All of these are correct: (What-if analysis, Sensitivity analysis, Optimization analysis)
(All of the above are DSS analysis techniques.)
What is the study of the impact that changes in one (or more) part of the model have on other parts of the model?

-Sensitivity analysis
-Drill-down
-What-if analysis
-Goal-seeking analysis

Sensitivity analysis
(This is the definition of sensitivity analysis.)
What checks the impact of a change in a variable or assumption on the model?

-Sensitivity analysis
-Drill-down
-What-if analysis
-Goal-seeking analysis

What-if analysis
(What-if analysis checks the impact of a change in a variable or assumption on the model.)
What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs?

-What-if analysis
-Sensitivity analysis
-Digital dashboard
-Drill-down dashboard

Digital dashboard
(This is the definition of digital dashboard.)
What is consolidation?

-Enables users to view details, and details of details, of information.
-Finds the inputs necessary to achieve a goal such as a desired level of output.
-The aggregation of data from simple roll-ups to complex groupings of interrelated information.
-The ability to look at information from different perspectives.

The aggregation of data from simple roll-ups to complex groupings of interrelated information.
(This is the definition of consolidation.)
What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users?

-Artificial intelligence
-Intelligent systems
-Intelligent agent
-Neural network

Intelligent agent
(This is the definition of intelligent agent.)
_____________ analysis checks the impact of a change in a variable or assumption on the model.
What-if
__________ refers to the level of detail in the model or the decision-making process.
Granularity
What is the systems development life cycle?

-The overall process for developing information systems, from planning and analysis through implementation and maintenance
-Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system
-Involves establishing a high-level plan of the intended project and determining project goals
-Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation

The overall process for developing information systems, from planning and analysis through implementation and maintenance
(The SDLC is the overall process for developing information systems, from planning and analysis through implementation and maintenance.)
Which of the following is not a phase in the systems development life cycle?

-Analysis phase
-Prediction phase
-Planning phase
-Testing phase

Prediction phase
(The prediction phase does not exist in the SDLC.)
Which of the following is a phase in the SDLC?

-RUP
-Agile
-Analysis
-RAD

Analysis
(Analysis is a phase in the SDLC.)
What is the implementation phase in the SDLC?

-Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation
-Involves placing the system into production so users can begin to perform actual business operations with the system
-Involves establishing a high-level plan of the intended project and determining project goals
-Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the
intended system

Involves placing the system into production so users can begin to perform actual business operations with the system
(This is the definition of the implementation phase.)
The _________ phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.
Analysis
The _________ phase involves placing the system into production so users can begin to perform actual business operations with the system.
Implementation
The ___________ phase involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.
Maintenance
Which of the following is a fundamental of the RAD methodology?

-Focus initially on creating a prototype that looks and acts like the desired system.
-Accelerate collecting the business requirements through an interactive and iterative construction approach.
-Actively involve system users in the analysis, design, and development phases.
-All of these are correct.

All of these are correct: (Focus initially on creating a prototype that looks and acts like the desired system, Accelerate collecting the business requirements through an interactive and iterative construction approach, Actively involve system users in the analysis, design, and development phases.)
(All of these are fundamentals of the RAD methodology.)
What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete?

-RAD methodology
-Agile methodology
-Waterfall methodology
-Extreme programming

Extreme programming
(This is the definition of extreme programming.)
A(n) _____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
Methodology
Which of the following measures the impact IT has on business processes and activities including customer satisfaction, conversion rates,and sell-through increases?

-Benchmarks
-Efficiency IT metrics
-Effectiveness IT metrics
-Key performance indicators

Effectiveness IT metrics
(Effectiveness IT metrics measure the impact IT has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases.)
What is the ease with which people perform transactions and/or find information?

-Financial
-Conversion rates
-Usability
-None of these are correct.

Usability
(This is the definition of usability.)
In the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate?

-Upper left-hand corner
-Lower right-hand corner
-Upper right-hand corner
-Lower right-hand corner

Upper right-hand corner
(The upper right-hand corner is the ideal place for an organization to operate.)
Which website metric measures the count of the number of people who visit a site, click on an ad, and are taken to the site of the advertiser?

-Conversion rate
-Unique visitors
-Click-through
-Page exposures

Click-through
(This is the definition of the click-through metric.)
Which of the following is a management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action?

-Benchmarks
-Efficiency IT metrics
-Effectiveness IT metrics
-Balanced scorecard

Balanced scorecard
(The balanced scorecard is a management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action.)
_________ focuses on the extent to which an organization is using its resources in an optimal way.
Efficiency
__________ are baseline values the system seeks to attain.
Benchmarks
A(n) __________ is a standard measure to assess performance in a particular area.
Metric
What is the science of making intelligent trade-offs between time, cost, and scope?

-Project deliverable
-Project management
-Project
-PMO

Project management
(This is the definition of project management.)
Which of the below represents the three elements in the triple constraints of project management?

-Plan, analysis, design
-Deliverables, milestones, scope
-Development, testing, implementation
-Time, resources, scope

Time, resources, scope
(Time, resources, and scope are the three elements in the triple constraint.)
What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?

-Project management
-Insourcing
-Outsourcing
-None of these are correct.

Outsourcing
(This is the definition of outsourcing.)
What is it called when you engage another company within the same country for services?

-Outsourcing
-Business process outsourcing
-Insourcing
-Onshore outsourcing

Onshore outsourcing
(This is the definition of onshore outsourcing.)
What is using organizations from developing countries to write code and develop systems?

-Outsourcing
-Business process outsourcing
-Insourcing
-Offshore outsourcing

Offshore outsourcing
(This is the definition of offshore outsourcing.)
Which of the following is not a form of outsourcing?

-Onshore outsourcing
-Offshore outsourcing
-Nearshore outsourcing
-Inshore outsourcing

Inshore outsourcing
(Inshore outsourcing does not exist.)
What is the outsourcing option that includes the closest location and direct customer control?

-Offshore outsourcing
-Nearshore outsourcing
-Onshore outsourcing
-None of these are correct.

Onshore outsourcing
(Onshore outsourcing offers the closest location and direct customer control.)
Which of the following is a benefit an organization can receive from outsourcing?

-Increase technical abilities
-Financial savings
-Market agility
-All of these are correct.

All of these are correct: (Increase technical abilities, Financial savings, Market agility)
(All of these are benefits an organization can receive from outsourcing.)
Which of the following is a challenge of outsourcing?

-Length of contract
-Threat to competitive advantage
-Loss of confidentiality
-All of these are correct.

All of these are correct: (Length of contract, Threat to competitive advantage, Loss of confidentiality)
(All of the above are challenges of outsourcing.)
A project ___________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.
Manager
Project ___________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
Deliverables
___________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
Outsourcing
A system is a collection of parts that link to achieve a common purpose. Systems thinking is a way of monitoring ________________.

-the entire system
-a division within the sales role
-the executive team
-the company’s competitors

The entire system
(A system is a collection of parts that link to achieve a common purpose. Systems thinking is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.)
Some industries’ competition is much more intense than others. Retail grocery stores, such as Kroger, Safeway, and Albertson’s in the United States, experience fierce competition and offer similar marketing campaigns to compete. What is this an example of in terms of Porter’s Five Forces?

-Rivalry among new entrants.
-Rivalry among existing competitors.
-Threat of substitute products or services.
-Buyer power.

Rivalry among existing competitors.
(Some industries’ competition is much more intense than others. Retail grocery stores, such as Kroger, Safeway, Albertson’s, and Ralph’s in the United States, have fierce competition and similar programs to compete with each other.)
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter’s Five Forces Model. Which of the following represents the threat of substitute products or services in the music industry?

-Established record labels like EMI, Sony, and Universal.
-Independent record labels.
-Game systems like Wii and social networks like Facebook.
-Taylor Swift, Beyonce, The Beatles, and The Rolling Stones.

Game systems like Wii and social networks like Facebook.
(Game systems like Wii and social networks offer alternatives or substitute products to purchasing music for a consumer.)
All of the following are characteristics of information except:

-Transactional
-Analytical
-Timeliness
-Quantity

Quantity
(Quality is the characteristic of information, not quantity.)
Which of the following is a business-facing process?

-Marketing process
-Sales process
-Billing process
-Budget forecasting

Budget forecasting
(Budget forecasting is a business-facing process.)
Which of the following is one of the new series of business success factors and challenges that are helping to determine marketplace winners and losers?

-Organization agility
-A focus on core competencies and processes
-Instantaneous business response
-All of these

All of these: (Organization agility, A focus on core competencies and processes, Instantaneous business response)
(All of these are part of the new series of business success factors.)
An output _________ is equipment used to see, hear, or otherwise accept the results of information processing requests.
Device
What is roughly 1 million bytes?

-Megabyte
-Terabyte
-Kilobyte
-Gigabyte

Megabyte
(This is the definition of a megabyte.)
What is equipment used to capture information and commands?

-Output device
-Input device
-Storage device
-Telecommunications device

Input device
(This is the definition of input device.)
Which computer offers both a horizontal and vertical system box and is usually placed on a desk or on the floor within a work area?

-Minicomputer
-Mainframe computer
-Desktop computer
-None of the above

Desktop computer
(This is explained in the desktop computer category.)
Which of the following is incorrect in reference to a database?

-Can be relational or network.
-Information is accessed by logical structure.
-Information is accessed by physical structure.
-Users can access different views of information.

Information is accessed by physical structure.
(A database accesses information by logical structure and stores information by physical structure.)
Which of the following is true in regard to eliminating redundant information?

-Uses additional hard disk space.
-Makes performing information updates harder.
-Improves information quality.
-All of these.

Improves information quality.
(Eliminating redundant information improves the quality of the information, uses less hard disk space, and makes performing updates easier.)
Which of the following statements is true?

-The more complete an organization wants to get its information, the less it costs.
-The more accurate an organization wants to get its information, the less it costs.
-The less accurate an organization wants to get its information, the more it costs.
-The more complete and accurate an organization wants to get its information, the more it costs.

The more complete and accurate an organization wants to get its information, the more it costs.
(The more complete and accurate an organization wants to get its information, the more it costs.)
A relational database contains information in a series of two-dimensional tables. How is data contained in a data warehouse and data mart?

-Information is multidimensional, meaning it contains a single layer of data in a table format.
-Information is two-dimensional, meaning it contains a single layer of data in a table format.
-Information is two-dimensional, meaning it contains layers of columns and rows.
-Information is multidimensional, meaning it contains layers of columns and rows.

Information is multidimensional, meaning it contains layers of columns and rows.
(Information in a data warehouse is multidimensional, meaning it contains layers of columns and rows.)
What is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home?

-MAN
-WAN
-LAN
-All of these are correct.

LAN
(This is the definition of LAN.)
What allows web browsers and servers to send and receive web pages?

-File transfer protocol (FTP)
-Simple mail transfer protocol (SMTP)
-Hypertext transfer protocol (HTTP)
-Simple network management protocol (SNMP)

Hypertext transfer protocol (HTTP)
(This is HTTP.)
A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness?

-Creating an online travel reservation.
-Ordering a product online.
-Researching products to find the lowest price and visiting the store to purchase the item.
-All of these.

Researching products to find the lowest price and visiting the store to purchase the item.
(These are some examples that demonstrate how a company can reduce costs by changing some of their business processes and utilizing ebusiness: (1) air travel reservations done online instead of over the phone and (2) the online ordering process of a product. Researching cost savings online does not help the company; it only helps the customer.)
When evaluating the business value of disintermediation, the more ____________ that are cut from the distribution chain, the lower the product price.

-technologies
-customers
-data streams
-intermediaries

Intermediaries
(When evaluating the business value of disintermediation, the more intermediaries that are cut from the distribution chain, the lower the product price.)
Which of the following is the example of consumer-to-government (C2G) highlighted in the figure Extended Ebusiness Models?

-egov.com
-conisint.com
-Google.org
-export.gov

egov.com
(The example of consumer-to-government highlighted in the figure Extended Ebusiness Models is egov.com.)
What kind of society is being created by the growth in information industries?

-Knowledge-independent local society
-Knowledge-independent global society
-Knowledge-dependent local society
-Knowledge-dependent global society

Knowledge-dependent global society
(The growth in information industries is creating a knowledge-dependent global society.)
What uses the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways?

-Content providers
-Intermediaries
-Reintermediation
-Cybermediation

Reintermediation
(This is the definition of reintermediation.)
Which of the following is an example of a clickstream data metric?

-Dates and times of visits
-Number of customers with shopping carts
-The number of page views
-All of these

All of these: (Dates and times of visits, Number of customers with shopping carts, The number of page views)
(Examples of clickstream data metrics include (1) number of page views, (2) pattern of websites visited, including most frequent exit page and prior website, (3) length of stay on the website, (4) dates and times of visits, (5) number of registrations filled out per 100 visitors, (6) number of abandoned registrations, (7) demographics of registered visitors, (8) number of customers with shopping carts, and (9) number of abandoned shopping carts.)
As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals?

-IMing
-Webinar
-Blog
-Email

Webinar
(Web conferencing blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants.)
Ben Schultz decides to purchase an iPad on eBay. After the transaction completes and the money is withdrawn from Ben’s PayPal account, the iPad never shows up and the email address of the seller bounces. What issue has Ben encountered?

-The physical separation of buyer and seller
-Adhering to taxation rules
-Identifying limited market segments
-All of these

The physical separation of buyer and seller
(The physical separation of buyer and seller and the merchandise is always a risk that is taken into account when trying to improve the managing consumer trust ebusiness challenge.)
An API is a set of routines, protocols, and tools for ______________.

-building software applications
-providing a visual interface for a web mashup
-describing how products in a network work
-writing and editing HTML

Building software applications
(This is the definition of an API, or application programming interface.)
What is drill-down capability?

-Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
-The ability to look at information from different perspectives.
-Enables users to get details, and details of details, of information.
-Finds the inputs necessary to achieve a goal, such as a desired level of output.

Enables users to get details, and details of details, of information.
(This is the definition of drill-down.)
Which of the following is the most commonly used form of AI in the business arena?

-Intelligent system
-Artificial intelligence
-Expert system
-Neural network

Expert system
(Expert systems are the most common.)
What finds the inputs necessary to achieve a goal, such as a desired level of output?

-Drill-down
-Sensitivity analysis
-What-if analysis
-Goal-seeking analysis

Goal-seeking analysis
(This is the definition of goal-seeking analysis.)
Which of the following is a type of transaction processing system?

-Order processing
-Sales
-Manufacturing
-Transportation

Order processing
(Order processing is a transaction processing system.)
What are various commercial applications of artificial intelligence called?

-Drill-down
-Sensitivity analysis
-Digital dashboard
-Intelligent systems

Intelligent systems
(This is the definition of intelligent systems.)
What is the design phase in the SDLC?

-Involves establishing a high-level plan of the intended project and determining project goals.
-Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.
-Involves describing the desired features and operations of the system.
-Involves placing the system into production so users can begin to perform actual business operations with the system.

Involves describing the desired features and operations of the system.
(This is the definition of the design phase.)
What is a project?

-A temporary endeavor undertaken to create a unique product, service, or result.
-The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project.
-Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
-Key dates when a certain group of activities must be performed.

A temporary endeavor undertaken to create a unique product, service, or result.
(This is the definition of a project.)
Which phase of the SDLC gathers business requirements?

-Plan
-Analysis
-Test
-Design

Analysis
(Analysis phase gathers business requirements.)
Which of the following is a business-related consequence of successful software?

-Increased revenues
-Damage to brand reputation
-Incurred liabilities
-All of these

Increased revenues
(Increased revenues is a consequence of software success.)
Which of the following is not one of the four gates in the RUP methodology?

-Inception
-Collaboration
-Construction
-Transition

Collaboration
(Elaboration is the other gate in RUP, not collaboration.)
Which of the following is a fundamental of the RAD methodology?

-Focus initially on creating a prototype that looks and acts like the desired system.
-Actively involve system users in the analysis, design, and development phases.
-Accelerate collecting the business requirements through an interactive and iterative construction approach.
-All of these.

All of these: (Focus initially on creating a prototype that looks and acts like the desired system, Actively involve system users in the analysis, design, and development phases, Accelerate collecting the business requirements through an interactive and iterative construction approach.)
(All of these are fundamentals of the RAD methodology.)
What is a project milestone?

-Measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
-A key date by which a certain group of activities must be performed.
-An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.
-An internal department that oversees all organizational projects.

A key date by which a certain group of activities must be performed.
(This is the definition of a project milestone.)
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets?

-Enterprise architect
-Information architecture
-Infrastructure architecture
-None of these are correct.

None of these are correct: (Enterprise architect, Information architecture, Infrastructure architecture)
(This is the definition of MIS architecture.)
An SOA __________ is a business task.
Service
(Service-oriented architecture (SOA) is an approach used to create an architecture based upon the use of services.)
Which of the following is a type of SCM metric?

-Customer order promised cycle time
-Customer order actual cycle time
-Inventory replenishment cycle time
-All of these

All of these: (Customer order promised cycle time, Customer order actual cycle time, Inventory replenishment cycle time)
(All of these are SCM metrics.)
What type of metrics includes number of prospective customers, number of new customers, and number of retained customers?

-CRM metrics
-SCM metrics
-BPR metrics
-ERP metrics

CRM metrics
(CRM metrics or sales metrics include number of prospective customers, number of new customers, and number of retained customers.)
Which of the following is a benefit an organization can receive from outsourcing?

-Financial savings
-Increased technical abilities
-Market agility
-All of these

All of these: (Financial savings, Increased technical abilities, Market agility)
(All of these are benefits an organization can receive from outsourcing.)
What is a method or system of government for management or control?

-Governance
-Geopolitical
-Compliance
-HIPPA

Governance
(This is the definition of governance.)
_________ engineering is using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker.
Social
What is a method for confirming users’ identities?

-Response
-Prevention
-Detection
-Authentication

Authentication
(This is the definition of authentication.)
Which of the following is not one of the three primary information security areas?

-Authentication and authorization
-Prevention and response
-Detection and response
-None of these are correct.

Prevention and response
(Prevention and resistance is one of the three primary information security areas, not prevention and response.)
What floods a website with so many requests for service that it slows down or crashes the site?

-Denial-of-service attack
-Spoofing
-Sniffer
-Trojan-horse virus

Denial-of-service attack
(This is the definition of denial-of-service attack.)
Which of the following represents the classic example of unintentional information reuse?

-Phone number
-Driver’s license number
-Social Security number
-None of these are correct.

Social Security number
(The Social Security number is the classic example of unintentional information reuse.)
Which of the following is an example of acting unethically?

-Individuals copy, use, and distribute software.
-Employees search organizational databases for sensitive corporate and personal information.
-Individuals hack into computer systems to steal proprietary information.
-All of these are correct.

All of these are correct: (Individuals copy, use, and distribute software, Employees search organizational databases for sensitive corporate and personal information, Individuals hack into computer systems to steal proprietary information.)
(All of the above are examples of acting unethically.)
Which act allows any person to examine government records unless it would cause an invasion of privacy?

-Freedom of Information Act
-Bork Bill
-Privacy Act
-USA Patriot Act

Freedom of Information Act
(The Freedom of Information Act allows any person to examine government records unless it causes an invasion of privacy.)
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

-Ethics
-Intellectual property
-Copyright
-Pirated software

Pirated software
(This is the definition of pirated software.)
Which of the following is considered an epolicy?

-Acceptable use policy
-Internet use policy
-Ethical computer use policy
-All of these are epolicies.

All of these are epolicies: (Acceptable use policy, Internet use policy, Ethical computer use policy)
(All of the above are epolicies.)
The __________ Communications Privacy Act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies’ computers.
Electronic
Which of the following provides an example of data?

-Who are my best customers?
-What is my best-selling product?
-What is my worst-selling product?
-Who is customer number 12345XX?

Who is customer number 12345XX?
(Who is customer number 12345XX is an example of data.)
Kevin Campbell is an incoming freshman at your college. Kevin is frustrated by the cost of books, tuition, and expenses, and he also needs to purchase a rather expensive laptop. In an effort to save money, Kevin begins a Facebook group finding other college students who need to purchase laptops. Soon, Kevin’s Facebook group has close to 100,000 students. Kevin decides to collectively approach different computer companies to see if his group qualifies for a special discount. What business strategy is Kevin using to purchase laptops?

-Collecting business intelligence.
-Decreasing entry barriers.
-Purchasing a substitute product.
-Increasing buyer power.

Increasing buyer power.
(Buyer power is one of Porter’s Five Forces, which measures the ability of buyers to affect the price they must pay for an item. Kevin’s group is attempting to increase their buyer power.)
Which of the following represents the different information granularities?

-Detail, summary, aggregate
-Document, presentation, spreadsheet, database
-Individual, department, enterprise
-None of these

Detail, summary, aggregate
(The different information granularities include detail, summary, and aggregate.)
Which of the following is not one of the questions asked during the reporting phase of CRM?

-What is the total revenue by customer?
-How many units did we manufacture?
-Where did we sell the most products?
-Who are our customers?

Who are our customers?
(“Who are our customers?” is a question asked during the analyzing phase.)
What is the point at which revenues equal costs?

-Break-even point
-Cash flow analysis
-ROI
-IRR

Break-even point
(This is the definition of break-even point.)
___________ software provides additional functionality to an operating system.
Utility
What part of the CPU performs all arithmetic operations and all logic operations?

-Control unit
-RAM
-Speed
-None of the above

None of the above: (Control unit, RAM, Speed)
(The control unit executes all instructions, whereas the ALU performs all mathematical and logical operations.)
What is the primary problem with redundant information?

-It is difficult to determine which values are the most current.
-It is often inconsistent.
-It is difficult to determine which values are the most accurate.
-All of these.

All of these: (It is difficult to determine which values are the most current, It is often inconsistent, It is difficult to determine which values are the most accurate.)
(All of these are problems with redundant information.)
What type of website is best to build for a general informational website with static information?

-Data-driven website
-Static website
-Relational website
-All of these

Static website
(For a general informational website with static information, it is best to build a “static” website, one that a developer can update on an as-needed basis, perhaps a few times a year.)
What types of BI decisions include predicting sales, determining correct inventory levels, and distribution schedules among outlets, and loss prevention?

-Retail and sales BI decisions
-Banking BI decisions
-Operations management BI decisions
-Insurance BI decisions

Retail and sales BI decisions
(These are all types of retail and sales BI decisions.)
Achieving perfect information is almost impossible. The more complete and accurate an organization wants its information to be, the more it costs. Which two variables are used to determine the trade-off for perfect information?

-Accuracy versus completeness.
-Accessibility versus completeness.
-Accuracy versus complexity.
-Accessibility versus complexity.

Accuracy versus completeness.
(Accuracy versus completeness determines the trade-off for perfect information.)
What refers to the technology associated with the transmission of information as light impulses along a glass wire or fiber?

-Twisted pair
-Coaxial cable
-Fiber optic
-All of these are correct.

Fiber optic
(This is the definition of fiber optic.)
LAN, MAN, and _____ are the three types of networks.
WAN
Which company is expected to gain the majority of its returns on existing investments?

-Dell
-Johnson & Johnson
-Procter & Gamble
-Phillips Petroleum

Phillips Petroleum
(According to the disruptive versus sustaining technologies figure, Phillips Petroleum is expected to gain returns on existing investments equal to 97 percent of its total.)
At a local marketing firm, Steve is the lead web developer and is responsible for working with customers on their web designs, development, and graphics. Which of the following would be a critical skill Steve must have to be able to perform his job?

-Understanding that he must create a unique domain name for each client.
-Being able to work with HTML.
-Understanding the World Wide Web and how hyperlinks work.
-All of these.

All of these: (Understanding that he must create a unique domain name for each client, Being able to work with HTML, Understanding the World Wide Web and how hyperlinks work.)
(At a local marketing firm, Steve is the lead web developer. Among his responsibilities are working with customers, web design and development, and graphic design techniques. More than likely, he will be required to utilize URLs, domain names, HTML, World Wide Web knowledge, web browsers, and HTTP.)
What is Mozilla Firefox?

-A competitor to Microsoft Word.
-A competitor to Microsoft Excel.
-A competitor to Adobe Photoshop.
-A competitor to Internet Explorer.

A competitor to Internet Explorer.
(Mozilla Firefox is a web browser and is a competitor to Internet Explorer.)
What refers to any type of electrical or electronic operation that is accomplished without the use of a “hard-wired” connection?

-Wireless
-Mobile
-GPS
-RFID

Wireless
(This is the definition of wireless.)
Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?

-Digital bookmark
-Internet bookmark
-Universal resource locator
-Web browser

Universal resource locator
(Many social media sites today allow you to customize your web address, for example, www.facebook.com/Womenwithdrive. This address is also called a universal resource locator (URL).)
Which of the following represents a form of disruptive technology?

-Enters the marketplace at the low end.
-Is a new way of doing things that initially does not meet the needs of existing customers.
-Tends to open new markets and destroy old ones.
-All of these are included.

All of these are included: (Enters the marketplace at the low end, Is a new way of doing things that initially does not meet the needs of existing customers, Tends to open new markets and destroy old ones.)
(Disruptive technology (1) is a new way of doing things that initially doesn’t meet the needs of existing customers, (2) tends to open new markets and destroy old ones, and (3) enters the marketplace at the low end and eventually evolves to displace high-end competitors and their reigning technologies.)
For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate franchises. To increase business Perry spends a great deal of money marketing and advertising his businesses online. Perry decides he would like to move beyond just marketing and create an actual ebusiness that acts like a search engine but focuses on only the real estate industry. The main revenue source for Perry’s ebusiness will be a charge of $50 a month for each property that is listed on the website. What is the primary revenue model for Perry’s new business?

-License fees
-Advertising fees
-Subscription fees
-All of these

Subscription fees
(This is an example of using the subscription fees ebusiness revenue model.)
Susan teaches many individuals and business professionals how and why to use social media, and the benefits and challenges to using social media. Of the four ebusiness challenges, which of the following is the most crucial challenge to consider before engaging in social media?

-Adhering to taxation rules
-Ensuring consumer protection
-Identifying limited market segments
-Managing consumer relationships

Ensuring consumer protection
(Of the four ebusiness challenges, ensuring consumer protection is the most crucial challenge to consider before engaging in social media sites.)
One of the most famous examples of wiki vandalism occurred when a false biography entry stated which of the following?

-Michael Jackson and Madonna were siblings.
-JFK and Robert Kennedy were the same person.
-John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy’s assassination as well as JFK’s.
-Madonna and Britney Spears are sisters.

John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy’s assassination as well as JFK’s.
(One of the most famous examples of wiki vandalism occurred when a false biography entry read that John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy’s assassination as well as JFK’s. Seigenthaler was an assistant to Robert, but was not involved in either of the assassinations.)
Which of the following is a quantitative model typically used by a DSS?

-Sensitivity analysis
-What-if analysis
-Goal-seeking analysis
-All of these

All of these: (Sensitivity analysis, What-if analysis, Goal-seeking analysis)
(A DSS can perform all of these.)
What is a special-purpose, knowledge-based information system that accomplishes specific tasks on behalf of its users?

-Intelligent system
-Artificial intelligence
-Neural network
-Intelligent agent

Intelligent agent
(This is the definition of intelligent agent.)
What is the overall process for developing information systems from planning and analysis through implementation and maintenance?

-Systems development life cycle
-Project management
-Systems management
-Project development life cycle

Systems development life cycle
(This is the definition of SDLC.)
Which of the following is not one of the tenets in the Agile Alliance’s manifesto?

-Satisfy the customer through early and continuous delivery of valuable software.
-Do not allow changing requirements, especially late in development.
-Business people and developers must work together daily throughout the project.
-All of these.

Do not allow changing requirements, especially late in development
(The manifesto states that projects should welcome changing requirements, even late in development.)
Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.

-Inception
-Elaboration
-Construction
-Transition

Elaboration
(Elaboration provides a rough order of magnitude.)
What is the number one reason that IT projects fall behind schedule or fail?

-Change in business goals during the project.
-Lack of support from business management.
-Poor planning or poor project management.
-Change in technology during the project.

Poor planning or poor project management.
(Poor planning or poor project management is the number one reason why IT projects fall behind schedule or fail.)
What is a backup?

-Restoring the information backup
-The ability to get a system up and running in the event of a system crash or failure
-An exact copy of a system’s information
-All of the above

An exact copy of a system’s information.
(This is the definition of backup.)
__________ computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Cloud
The balanced scorecard views the organization from four perspectives, and users should develop metrics, collect data, and analyze their business relative to each of these perspectives. Which of the following is not one of the four perspectives in the balanced scorecard?

-The leading perspective
-The internal business process perspective
-The customer perspective
-The financial perspective

The leading perspective
(The learning and growth perspective is missing, and the leading perspective is not valid.)
Which of the following is a type of metric based on website data?

-Number of visits to a website
-Number of abandoned registrations
-Number of abandoned shopping carts
-All of these

All of these: (Number of visits to a website, Number of abandoned registrations, Number of abandoned shopping carts)
(All of these are website data metrics.)
Which of the following is a program or device that can monitor data traveling over a network?

-Denial-of-service attack
-Spoofing
-Sniffer
-Trojan-horse virus

Sniffer
(This is the definition of denial-of-service attack.)
Which policy contains general principles regarding information privacy?

-Acceptable use policy
-Information privacy policy
-Internet use policy
-None of these are correct.

Information privacy policy
(This is the definition of information privacy policy.)
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter’s Five Forces Model. Which of the following represents supplier power in the music industry?

-Established record labels like EMI, Sony, and Universal.
-Walmart, Target, iTunes.
-Game systems like Wii and social networks like Facebook.
-Taylor Swift, Beyonce, The Beatles, and The Rolling Stones.

Established record labels like EMI, Sony, and Universal
(An example of supplier power in the music industry includes established record labels like EMI, Sony, and Universal.)
Encryption:
Scrambles information into an alternative form that requires a key or password to decrypt.
Decryption:
Information is to decode it and is the opposite of encrypt.
Time bombs:
Computer viruses that wait for a specific date before executing their instructions.
Cryptography:
The science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
Public key encryption:
Uses two keys: a public key that everyone can have and a private key for only the recipient.
Certificate authority:
A trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
Digital certificate:
A data file that identifies individuals or organizations online and is comparable to a digital signature.
Nonrepudiation:
A contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions.
Internet use policy:
Contains general principles to guide the proper use of the Internet.
Cybervandalism:
The electronic defacing of an existing website.
Typosquatting:
A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Website name stealing:
The theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner.
Internet censorship:
Government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens.
Phishing expedition:
A masquerading attack that combines spam with spoofing.
Spear phishing:
A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Vishing:
A phone scam that attempts to defraud people by asking them to call a bogus telephone number to “confirm” their account information.
Pharming:
Reroutes requests for legitimate websites to false websites.
Zombie:
A program that secretly takes over another computer for the purpose of launching attacks on other computers.
Zombie farm:
A group of computers on which a hacker has planted zombie programs.
Pharming attack:
Uses a zombie farm, often by an organized crime association, to launch a massive phishing attack.
Information management:
Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
Information governance:
A method or system of government for information management or control.
Information compliance:
The act of conforming, acquiescing, or yielding information.
Information property:
An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
eDiscovery:
Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
Web log:
Consists of one line of information for every visitor to a website and is usually stored on a web server.
Adware software:
Generates ads that install themselves on a computer when a person downloads some other program from the Internet.
Cookie:
A small file deposited on a hard drive by a website containing information about customers and their web activities.
Key logger, or key trapper, software:
A program that records every keystroke and mouse click.
Hardware key logger:
A hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
Clickstream:
Records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased.
Spyware (sneakware or stealthware):
Software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer’s CPU and storage for some task the user knows nothing about.
Data is useful for understanding individual sales, but to gain deeper insight into a business, data needs to be turned into information. Which of the following offers an example of turning data into information?

-Who are my best customers?
-What is my best-selling product?
-What is my worst-selling product?
-All of these

All of these: (Who are my best customers, What is my best-selling product, What is my worst-selling product)
(Questions outlined in the book include: Who are my best customers? Who are my least-profitable customers? What is my best-selling product? What is my slowest-selling product? Who is my strongest sales representative? Who is my weakest sales representative?)
Which of the following is similar to focused strategy versus broad strategy?

-Large market versus leadership.
-Large market versus uniqueness.
-Niche market versus large market.
-Niche market versus generic.

Niche market versus large market.
(Focused strategies versus broad strategies is synonymous to niche market versus large market.)
Your boss, Tom Repicci, has asked you to analyze the airline industry using Porter’s three generic strategies. Which of the following companies are using a differentiation strategy?

-Southwest, Horizon, Frontier, and JetBlue.
-British Airways, Singapore Airlines, and Virgin Atlantic.
-Sky Taxi, a rent-by-the-hour personal plane service.
-All of these.

British Airways, Singapore Airlines, and Virgin Atlantic.
(British Airways, Singapore Airlines, and Virgin Atlantic all compete using differentiation strategies.)
Walmart and Procter & Gamble implemented a tremendously successful SCM system. The system linked Walmart’s _____________ centers directly to Procter & Gamble’s _____________ centers.

-manufacturing; distribution
-distribution; manufacturing
-stores; distribution
-distribution; retail

Distribution; manufacturing
(Walmart’s distribution centers are linked directly to Procter & Gamble’s manufacturing centers.)
Which of the following is a benefit a business can receive by deploying the latest in security technology?

-Fewer disruptions to organizational systems
-Increased productivity of employees
-Greater advances in administration
-All of these

All of these: (Fewer disruptions to organizational systems, Increased productivity of employees, Greater advances in administration)
(All of these are benefits from security.)
Which type of software supports the application software and manages how the hardware devices work together?

-System software
-Utility software
-Application software
-Operating system software

Operating system software
(This is the definition of operating system software.)
The __________ is the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together.
CPU
What is information redundancy?

-Duplication of information.
-Storing the same information in multiple places.
-Storing duplicate information in multiple places.
-All of these.

All of these: Duplication of information, Storing the same information in multiple places, Storing duplicate information in multiple places.)
(Redundancy is all of these.)
What is the primary purpose of a data warehouse?

-To aggregate information throughout an organization into multiple repositories in such a way that employees can make decisions and undertake business analysis activities.
-To disaggregate information throughout an organization into multiple repositories in such a way that employees can make decisions and undertake business analysis activities.
-To aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.
-To disaggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.

To aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.
(The purpose of a data warehouse is to aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.)
Many industries have been forced to change due to technology advances. Which of the below industries has felt the lowest amount of economic impact from ebusiness?

-Auto industry
-Retail industry
-Travel industry
-Waste or recycling industry

Waste or recycling industry
(Industries that have been revamped by the disruption of ebusiness include (1) auto, (2) publishing, (3) education and training, (4) entertainment, (5) financial services, (6) retail, and (7) travel.)
Which company is expected to gain the majority of its returns on new investments?

-General Motors
-Sears Roebuck
-Dell
-Phillips Petroleum

Dell
(According to the disruptive versus sustaining technologies figure, Dell is expected to gain the majority of its returns from new investments.)
Which of the below is not a characteristic associated with Mozilla’s Firefox?

-Mozilla’s Firefox holds over 20 percent of the web browser market.
-Mozilla’s Firefox offers a free email service called Thunderbird.
-Mozilla’s Firefox is a prime example of open source software.
-Mozilla’s Firefox is a prime example of a reputation system.

Mozilla’s Firefox is a prime example of a reputation system.
(The web browser Mozilla Firefox now holds over 20 percent of the web browser market, offers a free email service called Thunderbird, and is open source software.)
What company monitors the operation of its vending machines via wireless technology?

-United Parcel Service
-Amazon
-FedEx
-Dr Pepper/Seven Up Inc.

Dr Pepper/Seven Up Inc.
(Dr Pepper/Seven Up Inc. monitors the operation of its antenna-equipped vending machines via wireless technology.)
Which trend has the following potential business impact? Demand for personnel in distant countries will increase the need for foreign language training, employee incentives suited to other cultures, and many other aspects of performing business globally.

-The growth in information industries is creating a knowledge-dependent global society.
-The global economy is becoming more integrated.
-Pace of technological innovation is increasing.
-The economy and society are dominated by technology.

The global economy is becoming more integrated.
(That the global economy is becoming more integrated is the trend.)
Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would you classify Nike’s ebusiness strategy?

-Information richness
-Mass customization
-Personalization
-Interactivity

Mass customization
(Nike’s customized shoes are an example of mass customization.)
John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on Priceline, where they are allowed to set their own price they are willing to pay for the airline tickets. What form of ebusiness model are John and Jenny using?

-C2C
-B2B
-C2B
-B2C

C2B
(C2B applies to any consumer who sells a product or service to a business on the Internet.)
What website was the primary catalyst for growing electronic government and is the official U.S. gateway to all government information?

-Government.gov
-TheUnitedStatesofAmerica.org
-TheWhiteHouse.com
-FirstGov.gov

FirstGov.gov
(The website that was the primary catalyst for growing electronic government and is the official U.S. gateway to all government information is FirstGov.gov.)
What is a category of AI that attempts to emulate the way the human brain works?

-Intelligent system
-Artificial intelligence
-Expert systems
-Neural network

Neural network
(This is the definition of neural network.)
Which of the following is a type of decision support system?

-Order processing
-Inventory tracking
-Manufacturing
-All of these

Manufacturing
(Manufacturing is a type of decision support system.)
What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?

-Project management
-Project management software
-Scope
-None of these

Project management
(This is the definition of project management.)
What is the analysis phase in the SDLC?

-Involves establishing a high-level plan of the intended project and determining project goals.
-Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.
-Involves describing the desired features and operations of the system.
-Involves placing the system into production so users can begin to perform actual business operations with the system.

Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.
(This is the definition of the analysis phase.)
What is a project manager?

-The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project.
-Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
-Represents key dates when certain groups of activities must be performed.
-An individual who is an expert in project planning and management.

An individual who is an expert in project planning and management.
(A project manager is an individual who is an expert in project planning and management.)
Which gate in the RUP methodology includes building and developing the product?

-Inception
-Elaboration
-Construction
-Transition

Construction
(Construction includes building and developing the product.)
Which of the following is the least common function outsourced?

-IT
-HR
-Finance
-Marketing/sales

Marketing/sales
What refers to the effects of geography on the economic realities of international business activities?

-Geoeconomic
-Geopolitical
-Virtual
-All of the above

Geoeconomic
(This is the definition of geoeconomic.)
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

-Biometrics
-Encryption
-Firewalls
-Content filtering

Content filtering
(This is the definition of content filtering.)
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

-Hactivists
-Social engineering
-Viruses
-Insiders

Insiders
(This is the definition of insiders.)
Dumpster ___________ is a form of social engineering when a hacker looks through people’s trash to find personal information.
Diving
Email privacy policy:
Details the extent to which email messages may be read by others.
Opt-out:
Choosing to deny permission to incoming emails.
Anti-spam policy:
Simply states that email users will not send unsolicited emails (or spam).
Spam:
Unsolicited email.
Teergrubing:
An anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
Cheryl Steffan is the operations manager for Nature’s Bread Company, which specializes in providing natural products for health-conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company’s profitability and forecast production for the next day. Which of the following is an example of a piece of data Cheryl would be using to successfully perform her job?

-Craig Newmark customer number is 15467.
-Compare the costs of supplies, including energy, over the last five years to determine the best-selling product by month.
-Best-selling product by day.
-Best-selling product changes when Tony, the best baker, is working.

Craig Newmark customer number is 15467.
(Data are raw facts that describe the characteristics of an event or object. Data for Cheryl would include ‘Craig Newmark customer number is 15467’.)
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents buyer power in the soft drink industry?

-Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases.
-Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store.
-Zevia Natural Diet Soda begins selling directly over the Internet.
-Vitamin water, fruit juice, and coffee.

Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store.
(Buyer power in the soft drink industry is represented by Walmart.)
Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called The Edgewater Café. Each time a customer purchases their 100th cup of coffee at The Edgewater Café, they receive a free pound of coffee of their choice. What is Callie attempting to create with her unique “Free Pound of Coffee” marketing program?

-Reducing buyer power with a loyalty program.
-Increasing buyer power with a loyalty program.
-Decreasing supplier power with a differentiated product.
-Creating a substitute product.

Reducing buyer power with a loyalty program.
(One way to reduce buyer power is with a loyalty program, which is a program to reward customers based on their spending.)
Which of the following represents the different information formats?

-Detail, summary, aggregate
-Document, presentation, spreadsheet, database
-Individual, department, enterprise
-None of these

Document, presentation, spreadsheet, database
(The different information formats include document, presentation, spreadsheet, and database.)
What can effective and efficient supply chain management systems enable an organization to accomplish?

-Increase the power of its buyers.
-Increase its supplier power.
-Increase switching costs to increase the threat of substitute products or services.
-All of these.

Increase its supplier power.
(Answer A should state “decrease” the power of its buyers, and answer C should state “reduce” the threat of substitute products or services.)
Where is the position of IT infrastructure within the organization?

-Top
-Middle
-Bottom
-Depends on the company as to the position of the IT infrastructure

Bottom
(The IT infrastructure is on the bottom as displayed in the figure: the position of infrastructure within the organization.)
What type of website is best to build for a continually changing information, including press releases, new product information, and updated pricing?

-Data-driven website
-Static website
-Relational website
-All of these

Data-driven website
(For a website with continually changing information, such as press releases, new product information, and updated pricing, it is best to build a data-driven or dynamic website.)
Why is Noodles & Company using business intelligence?

-To improve financial analysis.
-To improve corporate processes.
-To track store quality.
-To change the corporate culture.

To improve financial analysis.
(The closing case discusses how Noodles & Company is using BI to improve its financial analysis.)
Which of the following is not a reason for the explosive growth of the WWW?

-Basic web pages are easy to create and extremely flexible.
-The microcomputer revolution made it possible for an average person to own a computer.
-Digital Darwinism.
-The speed, convenience, and low cost of email.

Digital Darwinism
(Following are some of the reasons for the growth of the World Wide Web. (1) The microcomputer revolution made it possible for an average person to own a computer. (2) Advancements in networking, hardware, software, and media made it possible for business computers to be connected to larger networks at a minimal cost. (3) Browser software gave computer users an easy-to-use interface to download, find, and display web pages. (4) Email is fast, convenient, and cheap. (5) Basic web pages are easy to create and extremely flexible. **Digital Darwinism implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.)
Which statement below is incorrect?

-The semantic web captures, organizes, and disseminates knowledge (i.e., know-how) throughout an organization.
-The semantic web describes the relationships between things.
-The semantic web describes the properties of things.
-The semantic web is not about links between web pages.

The semantic web captures, organizes, and disseminates knowledge (i.e., know-how) throughout an organization.
(To understand the semantic web, you need to understand that it is not about links between web pages. Rather, it describes the relationships between things, such as A is a part of B, and Y is a member of Z and the properties of things, such as size, weight, age, and price.)
Which of the following is a potential business impact from the world’s population doubling in the next 40 years?

-Developed nations will begin to increase immigration limits.
-Developed nations will find that retirees will have to remain on the job to remain competitive.
-Global agriculture will be required to supply as much food as has been produced during all of human history.
-All of these are correct.

All of these are correct: (Developed nations will begin to increase immigration limits, Developed nations will find that retirees will have to remain on the job to remain competitive, Global agriculture will be required to supply as much food as has been produced during all of human history.)
(All of the above are potential business impacts resulting from the world’s population growth.)
Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon’s ebusiness strategy?

-Information richness
-Mass customization
-Personalization
-Interactivity

Personalization
(Amazon uses personalization to create unique recommendations for each customer.)
Which of the following is not a topic or feature that is included in Web 3.0?

-A worldwide database
-Intelligent applications
-Social networking
-Integration of legacy devices

Social networking
(Topics or features that are sure to be included in Web 3.0 include (1) integration of legacy devices, (2) intelligent applications, (3) open ID, (4) open technologies, and (5) a worldwide database.)
Which of the following is an incorrect enterprise view of information technology?

-Processes are analytical for executives and transactional for analysts.
-Granularity is coarse for executives and fine for analysts.
-Processing is OLTP for executives and OLAP for analysts.
-None of these.

Processing is OLTP for executives and OLAP for analysts.
(Processing is OLAP for executives and OLTP for analysts.)
What integrates information from multiple components and tailors the information to individual preferences?

-Drill-down
-Sensitivity analysis
-What-if analysis
-Digital dashboard

Digital dashboard
(This is the definition of digital dashboards.)
Which of the following is a business-related consequence of software failure?

-Decreased productivity
-Damage to brand reputation
-Incurred liabilities
-All of these

All of these: (Decreased productivity, Damage to brand reputation, Incurred liabilities)
(All of these are consequences of software failure.)
Which methodology ends each day or begins with a stand-up meeting to monitor and control the development effort?

-Scrum
-XP
-RUP
-RAD

Scrum
(Scrum methodology ends each day or begins with a stand-up meeting to monitor and control the development effort.)
Which of the following is an issue related to the waterfall methodology?

-Flaws in accurately defining and articulating the business problem.
-Managing costs, resources, and time constraints.
-Assumes users can specify all business requirements in advance.
-All of these.

All of these: (Flaws in accurately defining and articulating the business problem, Managing costs, resources, and time constraints, Assumes users can specify all business requirements in advance.)
(All of these are issues related to the waterfall methodology, according to the related figure in the text.)
Service-oriented __________ supports organizational computing needs with utility-based computing concepts.
Architecture
What is the act of conforming, acquiescing, or yielding?

-Governance
-Geopolitical
-Compliance
-HIPPA

Compliance
(This is the definition of compliance.)
Which is a virus that opens a way into the network for future attacks?

-Distributed denial-of-service attack
-Worm
-Denial-of-service attack
-Backdoor programs

Backdoor programs
(This is the definition of backdoor programs.)
Nonrepudiation is a contractual stipulation to ensure that ebusiness participants do not deny their ___________ actions.
Online
___________ are the principles and standards that guide our behavior toward other people.
Ethics
Which act protects investors by improving the accuracy and reliability of corporate disclosures?

-Bork Bill
-Identity Theft and Assumption Deterrence Act
-CAN-Spam Act
-Sarbanes-Oxley Act

Sarbanes-Oxley Act
(Sarbanes-Oxley Act protects investors by improving the accuracy and reliability of corporate disclosures.)
MIS can be an important enabler of business success and innovation. Which of the below statements is accurate when referring to MIS?

-MIS equals business success and innovation.
-MIS represents business success and innovation.
-MIS is not a valuable tool that leverages talent.
-MIS is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.

MIS is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.
(MIS does not equal or represent business success and innovation. It is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.)
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents rivalry in the soft drink industry?

-Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases.
-Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store.
-Zevia Natural Diet Soda begins selling directly over the Internet.
-Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale of their products during games.

Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale of their products during games.
(The rivalry between Coke and Pepsi is famous in the soft drink industry.)
Which of the following is not one of the five characteristics common to high-quality information?

-Accuracy
-Completeness
-Quantity
-Consistency

Quantity
(Accuracy, completeness, consistency, uniqueness, and timeliness are the characteristics of high-quality information.)
What is an asset?

-A distribution of earnings to shareholders
-Refers to the amount earned resulting from the delivery or manufacture of a product or from the rendering of a service
-Refers to the costs incurred in operating and maintaining a business
-Anything owned that has value or earning power

Anything owned that has value or earning power
(This is the definition of asset.)
Which of the following is not an advantage of building a data-driven website?

-Minimizes human error.
-Cuts production and update costs.
-Improves or maximizes stability.
-Minimizes or reduces efficiency.

Minimizes or reduces efficiency.
(A data-driven website adds more efficiency; it does not minimize or decrease efficiency.)
Which of the following does not draw a parallel between the challenges in business and the challenges of war?

-Collecting information.
-Discerning patterns and meaning in the information.
-Accurate and complete information.
-Responding to the resultant information.

Accurate and complete information.
(Accurate and complete information is not one of the parallels between the challenges in business and those of war.)
Why would a business use a data warehouse that offers strategic level, external, integrated, and historical information?

-Identify trends.
-Make projections.
-Decide key business issues.
-All of these.

All of these: (Identify trends, Make projections, Decide key business issues.)
(Businesses use data warehouses for all of these.)
Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique websites. Many of his daily tasks are heavily technical in nature and require a high level of computer programming and Internet knowledge. Which of the below would Erik primarily use when performing his daily tasks?

-Source code
-Brick-and-mortar
-Information reach
-Explicit knowledge

Source code
(Source code contains instructions written by a programmer specifying the actions to be performed by computer software. This is his main role or responsibility.)
All of the following are scientific methods organizations use to anticipate, forecast, and assess the future, except:

-computer simulation.
-historical simulation.
-trend analysis.
-historical analysis.

Historical simulation.
(Trend analysis, trend monitoring, trend projection, computer simulation, and historical analysis are the scientific methods organizations use to anticipate,
forecast, and assess the future.)
What category of website metrics does stickiness, or visit duration time, belong to?

-Service metric
-Exposure metric
-Visit metric
-Hit metric

Visit metric
(Stickiness is a visit metric according to the website metrics figure.)
M&M’s offers people the opportunity to order the candy in special colors or with customized sayings. How would you classify M&M’s ebusiness strategy?

-Information richness
-Mass customization
-Personalization
-Interactivity

Mass customization
(M&M’s offers people the opportunity to order the candy in special colors or with customized sayings, which is an example of mass customization.)
Which of the following are challenges of Business 2.0?

-Information vandalism
-Technology dependence
-Violations of copyright and plagiarism
-All of these

All of these: (Information vandalism, Technology dependence, Violations of copyright and plagiarism)
(The challenges of Business 2.0 are (1) technology dependence, (2) information vandalism, and (3) violations of copyright and plagiarism.)
Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems?

-TPS, DSS, EIS
-DSS, TPS, EIS
-EIS, DSS, TPS
-None of these. It varies from organization to organization.

EIS, DSS, TPS
(Executive information systems, decision support systems, and transaction processing systems are the top-down organizational levels of information technology systems.)
Which system differentiates an executive information system from a decision support system and a transaction processing system?

-Order processing system
-Manufacturing system
-Stock market information system
-Transportation system

Stock market information system
(A stock market information system is found only in an executive information system, since it is an external source of information. The rest are internal sources of information.)
What is slice-and-dice capability?

-Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
-The ability to look at information from different perspectives.
-Enables users to get details, and details of details, of information.
-Finds the inputs necessary to achieve a goal, such as a desired level of output.

The ability to look at information from different perspectives.
(This is the definition of slice-and-dice.)
What is virtualization?

-The creation of multiple “virtual” machines on a single computing device
-The delivery of electricity using two-way digital technology
-A collection of computers, often geographically dispersed, that are coordinated to solve a common problem
-None of these are correct.

The creation of multiple “virtual” machines on a single computing device
(This is the definition of interoperability,)
Which of the following is not a typical CRM metric?

-Sales metrics
-Service metrics
-Marketing metrics
-Inventory metrics

Inventory metrics
(CRM metrics measure sales, services, and marketing metrics.)
What is it called when a company uses organizations from developing countries to write code and develop systems?

-Insourcing
-Outsourcing
-Business process outsourcing
-Offshore outsourcing

Offshore outsourcing
(This is the definition of offshore outsourcing.)
Information security __________ identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.
Policies
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter’s Five Forces Model. Which of the following represents buyer power in the music industry?

-Established record labels like EMI, Sony, and Universal.
-Walmart, Target, and iTunes.
-Independent record labels.
-Game systems like Wii and social networks like Facebook.

Walmart, Target, and iTunes.
(Buyer power in the music industry includes Walmart, Target, and iTunes, which purchase music from record labels to sell online and in their stores.)
If a supplier has high power, what can it do to influence its industry?

-Charge higher prices.
-Shift costs to industry participants.
-Limit quality or services.
-All of these.

All of these: (Charge higher prices, Shift costs to industry participants, Limit quality or services.)
(If the supplier power is high, the supplier can influence the industry by (1) charging higher prices, (2) limiting quality or services, or (3) shifting costs to industry participants.)
Which of the following represents the different information levels?

-Detail, summary, aggregate
-Document, presentation, spreadsheet, database
-Individual, department, enterprise
-None of these

Individual, department, enterprise
(The different information levels include individual, department, and enterprise.)
Which of the following is not one of the questions asked during the analyzing phase of CRM?

-What customers are at risk of leaving?
-Why was customer revenue so high?
-Why did sales not meet forecasts?
-Who are our customers?

What customers are at risk of leaving?
(“What customers are at risk of leaving?” is a question asked during the predicting phase.)
Which of the following was the original design for the Internet?

-Email
-Document exchange
-Display of static content
-All of these

All of these: (Email, Document exchange, Display of static content)
(All of these were the original design for the Internet.)
Why is Ben & Jerry’s using business intelligence?

-To improve quality.
-To create new flavors of ice cream.
-To improve financials.
-To manage distribution.

To improve quality.
(The closing case discusses how Ben & Jerry’s uses BI to track quality control.)
The Innovator’s Dilemma suggests that established companies can take advantage of ___________ without hindering existing relationships with customers, partners, and stakeholders.

-sustaining technologies
-existing investments
-collective intelligence
-disruptive technologies

Disruptive technologies
(The book “The Innovator’s Dilemma” discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders.)
Copyright laws protect collaborative websites like blogs and wikis, allowing users to reuse material freely and easily.

-True
-False

False
(Copyright infringement is a challenge of the online world, and business 2.0 is seeing more cases and problems with it online.)
What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?

-Intelligent system
-Artificial intelligence
-Neural network
-Genetic algorithm

Genetic algorithm
(This is the definition of genetic algorithm.)
What is the study of the effect that changes in one (or more) part of the model has on other parts of the model?

-Drill-down
-Sensitivity analysis
-Statistical analysis
-Goal-seeking analysis

Sensitivity analysis
(This is the definition of sensitivity analysis.)
What is a project deliverable?

-A temporary endeavor undertaken to create a unique product or service.
-The application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project.
-Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
-Represents key dates when a certain group of activities must be performed.

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
(This is the definition of project deliverables.)
Insiders:
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
Social engineering:
Hackers use their social skills to trick people into revealing access credentials or other valuable information.
Dumpster diving:
Looking through people’s trash is another way hackers obtain information.
Information security policies:
Identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.
Information security plan:
Details how an organization will implement the information security policies.
Which of the following is typically performed by the sales or marketing department?

-Manage enterprise-wide processes.
-Maintain employment policies.
-Manage cross-enterprise processes.
-Maintain transactional data.

Maintain transactional data.
(Sales and marketing departments focus on moving goods or services into the hands of the consumers and maintain transactional data.)
Which of the following offers an example where Porter’s five forces are mostly strong and competition is high?

-A dog walking business.
-A ski resort.
-A professional hockey team.
-All of these.

A dog walking business.
(With Porter’s Five Forces Model, the following are all examples of situations with strong forces and, therefore, increased competition: (1) a single consumer purchasing milk, (2) a company that makes pencils, (3) coffee from McDonalds, (4) a dog-walking business, and (5) a coffee shop.)
In the bookstore industry, some of today’s businesses compete with different business strategies and cost strategies. Which of the following is using a broad market competitive scope along with a low cost strategy?

-Amazon.com.
-Any local independent bookstore that specializes in antique books.
-Barnes & Noble.
-Borders Books.

Amazon.com
(Amazon.com competes by offering a broad range of differentiated products at low prices.)
Which of the following is a customer-facing process?

-Strategic planning
-Order shipping
-Training
-Tactical planning

Order shipping
(Order shipping is a customer-facing process.)
What is the primary problem most organizations face today concerning information?

-Business intelligence rich, information rich
-Data poor, information rich
-Business intelligence poor, information rich
-Data rich, information poor

Data rich, information poor
(Data rich, information poor is the primary problem most organizations face today concerning information.)
A(n) ____________ is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together.
Network
A social bookmarking site is dedicated to providing all of the following except ________.

-to reconnect with colleagues for business progress
-to share favorites
-to store and categorize favorite sites
-to annotate

To reconnect with colleagues for business progress
(Social bookmarking sites provide users with a place to store, categorize, annotate, and share favorites. LinkedIn is primarily used to reconnect with colleagues for business progress.)
What technology uses radio waves rather than wires to transmit information across a local area network?

-WiMAX wireless broadband
-Satellite television
-Wireless local area network
-Cellular phones and pagers

Wireless local area network
(Wireless local area network technology uses radio waves rather than wires to transmit information across a local area network.)
What statement below describes Web 3.0’s feature that ensures the “integration of legacy devices”?

-The ability to use current devices such as iPhones and laptops as credit cards or tickets.
-The design of websites and other software so they can be easily integrated and work together.
-The ability for software to be distributed and accessed from anywhere.
-The design of software to be easily integrated and work together.

The ability to use current devices such as iPhones and laptops as credit cards or tickets.
(Web 3.0’s feature “integration of legacy devices” means, or includes, the ability to use current devices such as iPhones, laptops, and so on, as credit cards, tickets, and reservation tools.)
What can a model accomplish?

-Calculate risks
-Understand uncertainty
-Manipulate time
-All of these

All of these: (Calculate risks, Understand uncertainty, Manipulate time)
(A model can do all of these.)
(Porter’s Five Forces Analysis) Supplier Power:
How much power a business’s supplier has and how much control it has over the potential to raise its prices.
(Porter’s Five Forces Analysis) Buyer Power:
The power of the consumer to affect pricing and quality.
(Porter’s Five Forces Analysis) Competitive Rivalry:
How intense the competition currently is in the marketplace.
(Porter’s Five Forces Analysis) Threat of Substitutes:
How easy it is for consumers to switch from a business’s product or service to that of a competitor.
(Porter’s Five Forces Analysis) Threat of New Entrants:
How easy or difficult it is for competitors to join the marketplace in a given industry.
(Porter’s Generic Strategies for Competitive Advantage) Cost Leadership (Broad scope):
No frills, offering the lowest cost of operation in the industry.
(Porter’s Generic Strategies for Competitive Advantage) Differentiation (Broad scope):
Creating uniquely desirable products and services.
(Porter’s Generic Strategies for Competitive Advantage) Focus (Narrow scope):
Offering a specialized service in a niche market. This area of narrow scope also includes Cost Focus, which means emphasizing cost-minimization within a focused market, and Differentiation Focus, which means pursuing strategic differentiation within a focused market.
The Long Tail:
Products that are in low demand or have a low sales volume can collectively make up a market share that rivals or exceeds the relatively few current bestsellers if the distribution channel is large enough.
Hot Sites (Disaster recovery):
A “proactive” hot site allows a business to keep servers and a live backup site up and running in the event of a disaster. The production environment is replicated in a data center, allowing for immediate access in the event of a disaster at the primary site.
Warm Sites (Disaster recovery):
A “preventative” warm site allows a business to pre-install hardware and pre-configure their bandwidth needs. In the event of a disaster, the business can then load their software and restore their business systems.
Cold Sites (Disaster recovery):
A “recovery” cold site is essentially data center space, with power, and network connectivity that is available when needed. In the event of a disaster, teams can move and install a business’s hardware at the cold site in order to get the systems back up and running.
Which of the following decisions does a firm need to make as soon as it has identified the activities from the value chain that are bringing the highest added value to their customers?

-Target high value-adding activities to further enhance their value.
-Target low value-adding activities to increase their value.
-Perform some combination of the two.
-All of these.

All of these: (Target high value-adding activities to further enhance their value, Target low value-adding activities to increase their value, Perform some combination of the two.)
(After a firm has identified the activities from the value chain that are bringing the highest added value to their customers, they need to make decisions regarding the competitive advantage by determining whether to (1) target high value-adding activities to further enhance their value, (2) target low value-adding activities to increase their value, or (3) perform some combination of the two.)
Which of the following is not a valid way that a CRM system can collect information?

-Accounting system.
-Order fulfillment system.
-Inventory system.
-Customer’s personal computer.

Customer’s personal computer.
(A CRM system cannot collect information from a customer’s personal computer.)
What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time) as a partnership?

-Limited partnership
-Limited liability corporation
-Limited proprietorship
-Limited shareholder

Limited liability corporation
(This is the definition of an LLC.)
What is information that people use to support their decision-making efforts?

-Information cleansing and scrubbing
-Data-mining tools
-Data mining
-Business intelligence

Business intelligence
(Business intelligence can provide managers with the ability to make better decisions.)
What is one of the primary reasons for the increase in Internet use?

-Reorganization
-Reorganization restructuring
-Organizational restructuring
-Connectivity technology

Connectivity technology
(One of the primary reasons for the increase in Internet uses is the increase in connectivity technology.)
Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message’s visibility and effect?

-Cookies
-Click-through
-Viral marketing
-Pop-up ad

Viral marketing
(Viral marketing is a marketing technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message’s visibility and effect.)
Which of the following terms could you use synonymously when referring to the web?

-Network, paradigm shift
-URL, domain name
-HTML, Internet
-Web browser, blog

URL, domain name
(When referring to the web, a URL or Universal Resource Locator and a domain name mean the same thing or are the most interchangeable.)
Which of the following identifies Business 2.0 communication and collaboration tools?

-Microblogs, Tweets, RSS
-API, RSS, tacit knowledge
-Blogs, wikis, mashups
-Tags, web logs, RSS

Blogs, wikis, mashups
(Business 2.0 communication and collaboration tools include blogs, wikis, and mashups.)
All of the following are challenges of outsourcing except:

-Contract length.
-Competitive edge.
-Confidentiality.
-Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market.

Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market.
(Reduced frustration is not a challenge of outsourcing. It is a benefit.)
Goal-seeking analysis:
Searches what components are needed in order to meet specific goals.
Sensitivity analysis:
A technique used to determine how different values of an independent variable will impact a particular dependent variable under a given set of assumptions.
Explicit knowledge:
Is knowledge that can be readily searched, articulated, codified, accessed and verbalized.
Tacit Knowledge:
It is sometimes referred to as know-how or the knowledge found in people’s heads and refers to intuitive, hard to define knowledge that is largely experience based.
KPI:
A key performance indicator (KPI) is a business metric used to evaluate factors that are crucial to the success of an organization. KPI’s must be well-defined and quantifiable, be thoroughly communicated throughout an organization, be crucial to achieving a goal, and be applicable to the line of business.

Here are a few KPI examples:
•Number Of Customers
•Percentage Of Product Defects
•Sales By Region

CSF:
A critical success factor is a management term for an element that is necessary for an organization or project to achieve its mission. It is a critical factor or activity required for ensuring the success of a company or an organization. CSF’s must be vital to the organization’s success, must benefit the company or department as a whole, be synonymous with a high-level goal, and must link directly to the organizational strategy.

Critical success factors are best stated as action phrases and may include the means and/or desired results, as well as the action. Here are a few critical success factor examples:
•Increase Market Share Through Current Customers
•Be Service-Oriented
•Achieve Order Fulfillment Excellence Through On-Line Process Improvement
•Align Incentives & Rewards With Employee Roles For Increased Employee Satisfaction

Greg works for Geneva Steel Corporation. Greg’s duties include managing the overall processes for the company and transforming the steel resources into goods. Which department would Greg most likely work in?

-Accounting Manager.
-Operations Manager.
-Marketing Manager.
-CIO.

Operations Manager.
(Operations management manages the process of converting or transforming resources into goods or services.)
Steve Jobs and Apple created a big advantage in the technology industry with the introduction of the iPod, iPhone, and iPad. What are these all examples of?

-Competitive advantage
-Competitive intelligence
-First-mover advantage
-All of these

All of these: (Competitive advantage, Competitive intelligence, First-mover advantage)
(Steve Jobs and Apple created a big advantage in the technology industry with their products the iPod, iPhone, and iPad. These are examples of competitive advantage, competitive intelligence, and first-mover advantage.)
What is a real-time system?

-Provides immediate, up-to-date real-time information.
-Provides real-time information in response to requests.
-Encompasses all organization information, and its primary purpose is to support the performance of managerial analysis tasks.
-Encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational tasks.

Provides real-time information in response to requests.
(This is the definition of a real-time system.)
Core business relationships and models are dramatically changing, including shifts from which of the following?

-Customer-centricity to product-centricity
-Mass customization to mass production
-The value in material things to the value of knowledge and intelligence
-All of these

The value in material things to the value of knowledge and intelligence.
(The value in material things to the value of knowledge and intelligence is one of the shifts. Customer-centricity to product-centricity and mass customization to mass production must be reversed to be shifts.)
Which of the below is not a characteristic of Business 2.0?

-Encourages user participation.
-Technical skills are required.
-Eliminates entry barriers to publishing on the web.
-Provides an exciting and vibrant virtual environment.

Technical skills are required.
(Business 2.0 (Web 2.0) encourages user participation and the formation of communities to contribute to the content. Technical skills are no longer required to use and publish information to the web, and new web technologies eliminate entry barriers for online business. Web 2.0 technologies also provide a virtual environment that is vibrant and important to many.)
OLTP (On-line Transaction Processing):
OLTP databases are used to perform many small transactions.
OLAP (On-line Analytical Processing):
OLAP databases are suited for analytics and data mining (data warehouses).
The balanced scorecard suggests that we view an organization from four perspectives, and to develop metrics, collect data and analyze it relative to each of these perspectives:
The Learning & Growth Perspective, The Business Process Perspective, The Customer Perspective, The Financial Perspective
Which of the following provides an example of information?

-Who is customer number 12345XX?
-What is product number 12345XX?
-What customer number is Bob Smith?
-What is my worst-selling product?

What is my worst-selling product?
(What is my worst-selling product is an example of taking data and turning it into information.)
The Victory Wireless store in Denver is currently offering a fabulous marketing strategy for potential new iPhone customers. Victory Wireless offers customers who purchase an iPhone with a two-year subscription a free OtterBox phone case, car charger, ear phones, and speakers. In terms of Porter’s Five Forces, what is Victory Wireless attempting to achieve with this marketing strategy?

-Increase buyer power.
-Increase substitute products.
-Decrease supplier power.
-Decrease buyer power.

Decrease buyer power.
(Victory Wireless is attempting to decrease buyer power by offering products at a lower price or competing on price.)
What is it called when each transaction, entity, and event is represented only once in the information?

-Uniqueness
-Accuracy
-Consistency
-Timeliness

Uniqueness
(This is the definition of uniqueness.)
Which of the following is not one of the questions asked during the predicting phase of CRM?

-What is the total revenue by customer?
-What products will the customer buy?
-Who are the best candidates for a mailing?
-What is the lifetime profitability of a customer?

What is the total revenue by customer?
(“What is the total revenue by customer?” is a question asked during the reporting phase.)
Which of the following occurs during data cleansing?

-Clean missing records.
-Clean redundant records.
-Clean inaccurate data.
-All of these.

All of these: Clean missing records, Clean redundant records, Clean inaccurate data.)
(The figure on information cleansing activities highlights the steps that occur during information cleansing.)
What do data warehouses support?

-OLAP
-Analytical processing
-OLTP
-OLAP and analytical processing

OLAP and analytical processing
(Data warehouses support analytical processing and OLAP is a type of analytical processing.)
Which topology has all devices connected to one another in the shape of a closed loop?

-Ring topology
-Bus topology
-Star topology
-None of these are correct.

Ring topology
(This is the definition of ring topology.)
Which of the below would not be considered a company operating in the long tail of a typical sales curve?

-Walmart
-Netflix
-iTunes
-Zappos

Walmart
(Niche markets that are excellent examples of long tail sales include Netflix, Amazon, Zappos, and iTunes.)
What are the two basic functions that social networking sites provide?

-The ability to create and publish your own software.
-The ability to create and maintain a profile that is your online identity and create connections between other people within the network.
-The ability to capture and create URLs and RSSs.
-The ability to create URLs and edit RSS software.

The ability to create and maintain a profile that is your online identity and create connections between other people within the network.
(The two basic functions that social networking sites provide are the ability to create and maintain a profile that is your online identity and the ability to create connections between other people within the network.)
Which of the following represents the phases in the SDLC?

-Plan, analyze, design, test, maintain, develop, implement
-Analyze, plan, design, test, develop, maintain, implement
-Plan, analyze, design, develop, test, implement, maintain
-Analyze, plan, develop, design, test, implement, maintain

Plan, analyze, design, develop, test, implement, maintain
(Plan, analyze, design, develop, test, implement, maintain is the SDLC order.)
What is the primary difference between the different types of backup/recovery media?

-Cost
-Speed
-Expense
-All of these are correct.

All of these are correct: (Cost, Speed, Expense)
(All of the above are the differences between the different types of media.)
Coarse granularity:
The large or broad details, the big picture.
Fine granularity:
The small or very precise details which the larger details are comprised of.
Point-to-point network topology:
The simplest topology with a dedicated link between two endpoints.
Bus network topology:
In local area networks where bus topology is used, each node is connected to a single cable, by the help of interface connectors. This central cable is the backbone of the network and is known as the bus.
Star network topology:
In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.
Ring network topology:
A network topology is set up in a circular fashion in such a way that they make a closed loop.
Mesh network topology:
A mesh network topology is a decentralized design in which each node on the network connects to at least two other nodes.
Tree network topology:
A tree topology is essentially a combination of bus topology and star topology.
Hybrid network topology:
Hybrid networks use a combination of any two or more topologies, in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).
Daisy chain network topology:
Except for star-based networks, the easiest way to add more computers into a network is by daisy-chaining, or connecting each computer in series to the next.
Node:
In communication networks, a node is either a connection point, a redistribution point, or a communication endpoint (e.g. data terminal equipment).
Hub:
Is a component of a network, a high- degree node. It refers to a node that has significantly bigger number of links in comparison with other nodes in the network.
Worm:
Is a standalone malware computer program that replicates itself in order to spread to other computers.
Trojan horse:
Is any malicious computer program which misrepresents itself as useful, routine, or interesting in order to persuade a victim to install it.
DDoS:
A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.
Waterfall:
Sequential design process where progress can be seen as flowing steadily downward through the SDLC.
Prototyping:
The process of building a model that demonstrates the features of a proposed product, service or system which allows end users to see, work with and evaluate a model and suggest changes to increase likelihood of success.
RAD:
Rapid application development emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.
XP:
Extreme programming breaks a project into tiny phases and develops cannot continue on to the next phase until the current phase is complete. XP divides its phases into a set of instructions that are to be repeated.
Agile methodology:
Is a form of XP which aims for customer satisfaction through early and continuous delivery of useful software components.
RUP:
Rational unified process is an iterative software development process which establishes four phases of development, each of which is organized into a number of separate iterations that must satisfy defined criteria before the next phase is undertaken: in the inception phase, developers define the scope of the project and its business case; in the elaboration phase, developers analyze the project’s needs in greater detail and define its architectural foundation; in the construction phase, developers create the application design and source code; and in the transition phase, developers deliver the system to users.
Parallel implementation:
Using both the old and new system simultaneously.
Plunge implementation:
The use of the legacy system is discontinued for that of the new system.
Pilot implementation:
Begins with the small pilot groups of user on the new system.
Phased implementation:
Implements the new system in phases.
Object-oriented database management system:
Is a database management system in which information is represented in the form of objects as used in object-oriented programming. Object databases are different from relational databases which are table-oriented.
Relational database:
This model organizes data into one or more tables (or “relations”) of columns and rows, with a unique key identifying each row. Rows are also called records. Generally, each table/relation represents one “entity type” (such as customer or product). The rows represent instances of that type of entity (such as “Lee” or “iPhone”) and the columns representing values attributed to that instance (such as address or price).
DSS:
A decision support system (DSS) is a computer program application that analyzes business data and presents it so users can make business decisions more easily.
TPS:
A transaction processing system is a type of information system that collects, stores, modifies and retrieves the data transactions of an enterprise.
EIS:
Supports the executive level of management, often used to formulate high level strategic or unstructured decisions impacting on the direction of the organization.
MIS:
Management information systems focus on the management of information systems to provide efficiency and effectiveness of strategic decision making.
Business process reengineering:
(BRP) is the analysis and redesign of workflow within and between enterprises.
Enterprise architecture:
(EA) is a conceptual blueprint that defines the structure and operation of an organization. The intent of an enterprise architecture is to determine how an organization can most effectively achieve its current and future objectives.
Information architecture:
(IA) focuses on organizing, structuring, and labeling content in an effective and sustainable way.
Infrastructure architecture:
Is a structured approach of shaping infrastructure to optimally support an organization.
Extranet:
Is a website which allows controlled access to partners, vendors and suppliers or to an authorized set of customers, normally to a subset of the information accessible from an organization’s intranet.
Teleliving:
Refers to using information devices and the Internet to conduct all aspects of life seamlessly, which can include shopping, working, learning, or playing.
Telecommunications device:
Is an electronic device used for communication via a telecommunications network, such as: cell phones, TVs, radios or computers.
AI:
Artificial intelligence is the intelligence exhibited by machines or software. It is also the study of how to create computers and computer software that are capable of intelligent behavior.
Intelligent systems:
Are a machines with an embedded, Internet-connected computer that has the capacity to gather and analyze data and communicate with other systems. Some examples of intelligent systems are digital signs, traffic signals and point of sale terminals.
Neural networks:
Are designed to imitate the physical thought process of the biological brain. Applications of neural networks can be found in medicine, science, and business. These networks help address problems with pattern classification, prediction and financial analysis, and control and optimization.
Fuzzy logic:
Is able to create rules by inferring knowledge from imprecise, uncertain, or unreliable information and consist of a series of if-then rules. An application of fuzzy logic would to develop a system to detect possible fraud in medical claims submitted by healthcare providers.
Genetic Algorithms:
Are programs designed for problem solving based off the evolution (survival of the fittest) process. An application of genetic algorithms would be to design the best jet turbine aircraft engine, where the process involves changing and reorganizing component parts of the engine in a computer simulation, after parts are changed or reorganized, the computer would measure which design yielded the best engine, then, the new design will repeat this evolution process again, continually, until the computers designs don’t yield better results.
Intelligent agents:
Are applications that perform repetitive tasks without being managed by a human, and can also referred to as robots, bots, or crawlers. Examples of intelligent agents can include email filters or automated online assistants.
Expert system:
These systems are the most commonly used form of AI, and are computer applications which performs tasks that would otherwise be performed by human experts. For example, there are expert systems that can diagnose human illnesses, make financial forecasts, and schedule routes for delivery vehicles. Some expert systems are designed to take the place of human experts, while others are designed to aid them.
Virtual reality:
Can also be known as a virtual environment, and is essentially a three-dimensional computer generated environment which can be explored and interacted with by a person. A business application of virtual reality could include simulating business environments for training and orientation.
GPS:
Global Positioning Systems use satellites that orbit the Earth to collect and send information to GPS receivers on the ground. The information helps others to determine their location.
GIS:
Geographical Information Systems are software programs that use the mapped information collected from the GPS satellites and can capture, store, manipulate, analyze, manage, and present all types of spatial or geographical data.
Input device:
An input device is any hardware device that sends data to a computer, allowing one to interact with and control the computer, such as a keyboard or mouse.
Output device:
Is any peripheral that receives data from a computer, usually for display, projection, or physical reproduction, such as a monitor or printer.
Primary activities (value chain):
The goal of primary activities is to create value that exceeds the cost of providing the product or service, thereby generating a profit margin. (Inbound logistics, Operations, Outbound logistics, Sales & Marketing, Service)
Support activities (value chain):
The “overhead” activities that the organization performs to assist the primary activities to gain the competitive advantage. (Procurement, Technology Management, HR Management, Infrastructure.)
MIS can add value to both primary activities and support activities in the value chain. Which of the following is not an example of a company adding value by using MIS in a primary activity?

-Scottrade Corp. creating an online system for employees to track paychecks, benefits, the wellness-rewards program, and other employee benefit items.
-A system for the sales and marketing departments to track specific sales targets and follow-up processes.
-An easy electronic survey to be sent to the customer right after a service is completed.
-Royal Crest Dairy placing their order and delivery system on an easily accessible Web portal so customers can track delivery status.

Scottrade Corp. creating an online system for employees to track paychecks, benefits, the wellness-rewards program, and other employee benefit items.
(MIS can add value to both primary and support activities within a business. All are primary activities except Scottrade Corp. creating an online system for employees to track paychecks, benefits, their wellness-rewards program, and other employee benefit items. This is a support value activity.)
What types of BI decisions include forecasting levels of bad loans and fraudulent credit card use, credit card spending by new customers, and which kinds of customers will best respond to new loan offers?

-Retail and sales BI decisions
-Banking BI decisions
-Operations management BI decisions
-Insurance BI decisions

Banking BI decisions
(These are all types of banking BI decisions.)
Which social media site works by allowing content to find the users, instead of the users having to search for the content?

-MySpace
-Facebook
-Google
-StumbleUpon

StumbleUpon
(StumbleUpon represents a new social media networking model in which content finds the user instead of the other way around.)
What is the difference between ecommerce and ebusiness?

-Ecommerce includes Internet network effects. Ebusiness includes ecommerce and all activities related to internal and external business operations.
-Ecommerce is buying and selling of goods or service online. Ebusiness includes ecommerce and all activities related to internal and external business operations.
-Ecommerce includes ecommerce and all activities related to internal and external business operations. Ebusiness includes all of the of knowledge management systems.
-Ebusiness is buying and selling of goods or service online. Ecommerce includes ecommerce and all activities related to internal and external business operations.

Ecommerce is buying and selling of goods or service online. Ebusiness includes ecommerce and all activities related to internal and external business operations.
(Ecommerce is the buying and selling of goods and services over the Internet and refers only to online transactions. Ebusiness includes ecommerce along with all activities related to internal and external business operations, such as servicing customer accounts, collaborating with partners, and exchanging real-time information.)
Which of the following is one of the largest wikis on the web and one of the 10 most popular web destinations?

-Google
-eBay
-Wikipedia
-Yahoo

Wikipedia
(Wikipedia is one of the largest wikis on the web and one of the 10 most popular web destinations.)
Which of the following is a question a company should ask when creating a global website?

-Which country will the server be located in to support local user needs?
-Will the site require new navigational logic to accommodate cultural preferences?
-Will content be translated?
-All of these are correct.

All of these: (Which country will the server be located in to support local user needs, Will the site require new navigational logic to accommodate cultural preferences, Will content be translated?)
(All of the above are questions companies should ask when creating global websites.)
Information technology can enable departments to more efficiently and effectively perform their core _____________.

-facts
-feedback mechanisms
-business operations
-media issues

Business operations
(Information technology can enable departments to more efficiently and effectively perform their business operations.)
Imagine you are creating a new product to sell in an up and coming market. Which of the following statements indicates that it would be difficult for you to enter this new market?

-The threat-of-new-entrants is high in the up and coming market.
-The threat-of-new-entrants is low in the up and coming market.
-The threat-of-new-entrants is high during the summer months in the up-and-coming market.
-All of these, depending on the time of year.

The threat-of-new-entrants is low in the up and coming market.
(The threat of new entrants is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market.)
Which of the following is a business-critical integrity constraint?

-The system will not allow an entry for an order for a nonexistent customer.
-The system will not allow returns of fresh produce after 15 days past delivery.
-The system will not allow shipping a product to a customer who does not have a valid address.
-The system will not allow shipping a nonexistent product to a customer.

The system will not allow returns of fresh produce after 15 days past delivery.
(Not allowing fresh produce to be returned after 15 days would be a business-critical integrity constraint. The other options represent relational integrity constraints.)
What is the best way to measure a company’s ebusiness success?

-Effective MIS metrics
-Interactivity
-Clickstream data
-All of these

All of these: (Effective MIS metrics, Interactivity, Clickstream data)
(The best way to measure a company’s ebusiness success is by using different effective MIS metrics, such as interactivity and clickstream data.)
Web 3.0 refers to static text-based information websites.

-True
-False

False
(Web 1.0 refers to static text-based information websites, Web 2.0 is about user-contributed content, and Web 3.0 is based on “intelligent” web applications using natural language processing, machine-based learning and reasoning, and intelligent applications.)
Throughput:
Is the amount of material or items passing through a system or process.
Bandwidth:
Is commonly measured in bits/second is the maximum rate that information can be transferred.
Error rate:
The number of corrupted bits expressed as a percentage or fraction of the total bits sent.
Jitter:
Is a variation in packet transit delay caused by queuing, contention and serialization effects on the path through the network. In general, higher levels of jitter are more likely to occur on either slow or heavily congested links, and are often referenced in relation to a clock source.
Latency:
Is the delay from input into a system to desired outcome.
Data mart:
Is the access layer of the data warehouse environment that is used to get data out to the users. The data mart is a subset of the data warehouse that is usually oriented to a specific business line or team. Data marts are small slices of the data warehouse.
Paula Logston is the owner and operator of a high-end online custom clothing company. Paula has never heard of Porter’s Five Forces Model, and she wants to understand why she should perform an analysis using it. If you were tasked with explaining Porter’s Five Forces Model to Paula, what would be the primary reason she would want to use this type of analysis?

-To help Paula choose a clothing business focus.
-To help Paula evaluate the attractiveness of the clothing industry.
-To help Paula evaluate and execute business goals.
-All of these.

To help Paula evaluate the attractiveness of the clothing industry.
(One of the three tools company executives often use when analyzing competitive intelligence is the Five Forces Model. This is used to evaluate industry attractiveness.)
Lands’ End created an organization-wide data warehouse so all its employees could access organizational information. Lands’ End soon found out that there could be “too much of a good thing.” Many of its employees would not use the data warehouse, because it was simply too big, too complicated, and had too much irrelevant information. Lands’ End knew there was valuable information in its data warehouse, and it had to find a way for its employees to easily access the information. What was Lands’ End’s solution?

-Build a better, more efficient data warehouse.
-Build a better, more efficient transactional database.
-Build a data mart.
-Build a data-driven website.

Build a data mart.
(Lands’ End chose to build data marts to fix its problem with too much information.)
Both individuals and organizations have embraced ebusiness to do which of the following?

-Enhance productivity.
-Maximize convenience.
-Improve communications.
-All of these.

All of these: (Enhance productivity, Maximize convenience, Improve communications.)
(Both individuals and organizations have embraced ebusiness to enhance productivity, maximize convenience, and improve communications.)
Which of the following is not a reason for the growth of decision-making information systems?

-People need to analyze large amounts of information.
-People must make decisions quickly.
-People must apply sophisticated analysis techniques to make good decisions.
-People no longer have to worry about protecting the corporate asset of organizational information.

People no longer have to worry about protecting the corporate asset of organizational information.
(People must protect the corporate asset of organizational information; it is one of their competitive advantages.)
Which of the following are the influential driver(s) affecting the growth of outsourcing markets?

-Core competencies
-Rapid growth
-Industry changes
-All of these

All of these: (Core competencies, Rapid growth, Industry changes)
(All of these are the influential drivers affecting the growth of outsourcing.)
Relational integrity constraints:
Rules that enforce basic and fundamental information-based constraints, such as: users cannot create an order for a nonexistent customer or an order cannot be shipped without an address.
Business-critical integrity constraints:
Rules that enforce business rules vital to an organization’s success and often require more insight and knowledge than relational integrity constraints, such as: product returns are not accepted for fresh product 15 days after purchase or a discount maximum of 20 percent.
Primary key:
Uniquely identifies a record in the table.
Foreign key:
A foreign key in one table points to a primary key in another table.
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents supplier power in the soft drink industry?

-Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases.
-Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store.
-Zevia Natural Diet Soda begins selling directly over the Internet.
-Vitamin water, fruit juice, and coffee.

Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases.
(Supplier power in the soft drink industry is represented by Pepsi.)
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents a threat of a new entrant in the soft drink industry?

-Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases.
-Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store.
-Zevia Natural Diet Soda begins selling directly over the Internet.
-Vitamin water, fruit juice, and coffee.

Zevia Natural Diet Soda begins selling directly over the internet.
(A threat of new entrants in the soft drink industry is represented by Zevia Natural Diet Soda.)
Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter’s Five Forces Model. Which of the following represents a substitute product in the soft drink industry?

-Pepsi requires stores that carry Pepsi products to commit to minimum orders of 1,000 cases.
-Walmart negotiates a lower cost per bottle from Coke in exchange for premium shelf space in every Walmart store.
-Zevia Natural Diet Soda begins selling directly over the Internet.
-Vitamin water, fruit juice, and coffee.

Vitamin water, fruit juice, and coffee
(A threat of substitute products in the soft drink industry is represented by Vitamin water, fruit juice, and coffee.)
Which company was the victim of a distributed denial-of-service (DDoS) attack that forced the company to close operations and to eventually transfer over 2,500 customers to a rival organization?

-Marks & Spencer
-Public Broadcasting Service
-CloudNine Communications
-The Gap

CloudNine Communications
(CloudNine Communications was the victim of a DDoS.)
Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix’s ebusiness strategy?

-Information richness
-Mass customization
-Personalization
-Interactivity

Personalization
(Netflix uses personalization to create unique recommendations for each customer.)
Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, Washington area. Bonnie is highly technical and uses many online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using?

-A cookie
-A banner ad
-A pop-up ad
-A click-through ad

A banner ad
(A banner ad is a box running across a website that advertises the products and services of another business, usually another ebusiness. The banner often contains a link to the advertiser’s website.)
The three Business 2.0 communication and collaboration tools a business can use to harness the power of people include blogs, wikis, and mashups.

-True
-False

True
(Blogs, wikis, and mashups are the three primary Business 2.0 communication and collaboration tools.)
Which of the following is the most common function outsourced?

-MIS
-HR
-Finance
-Marketing/sales

MIS
(MIS is the most common function outsourced.)
According to Porter’s three generic strategies for entering a market, if you have a focused strategy what market should you target?

-A niche market.
-A broad market.
-Neither niche or broad markets.
-Both niche and broad markets.

A niche market.
(According to Porter’s three generic strategies for entering a market, if you have a focused strategy you should target a narrow market, niche market, or a unique market.)
Which of the following is an example of transactional information?

-Trends
-Sales projections
-Purchasing stocks
-All of these

Purchasing stocks
(Purchasing stocks is an example of transactional information.)
A data warehouse is a _________ collection of information – gathered from many different ___________ databases – that supports business-analysis activities and decision-making tasks.

-physical; transactional
-physical; operational
-logical; transactional
-logical; operational

logical; operational
(This is the definition of data warehouse.)
Which of the following is an ebusiness marketing technique?

-Cookies
-Pop-up ad
-Banner ad
-All of these

All of these: (Cookies, Pop-up ad, Banner ad)
(Ways of marketing through ebusiness include (1) associate programs, (2) banner ads, (3) click-through, (4) cookies, (5) pop-up ads, and (6) viral marketing.)
Which of the below is not a characteristic of Business 2.0?

-Knowledge management
-Collaboration system
-Web browser
-Explicit knowledge

Web browser
(Characteristics of Business 2.0 collaboration inside the organization include (1) a collaboration system, (2) collective intelligence, (3) knowledge management, (4) a knowledge management system, (5) explicit knowledge, and (6) tacit knowledge. A web browser is part of Business 1.0.)
Which of the following is an outsourcing challenge caused by contract length?

-Difficulties in getting out of a contract
-Problems in foreseeing future issues
-Problems in reforming an internal IT department
-All of these

All of these: (Difficulties in getting out of a contract, Problems in foreseeing future issues, Problems in reforming an internal IT department)
(All of these are challenges associated with contract length.)

Need essay sample on "DAC1 WGU Business Driven Technology Study Guide with Chapter and Practice Tests"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy