Shared Flashcard Set

Details

INFO 210 Final Review
Choobs Info 210 Review
247
Business
Undergraduate 1
05/07/2011

Additional Business Flashcards

 


 

Cards

Term

1) Applications running on different computing platforms are not desirable because:

A) they are difficult to integrate.

B) data cannot be readily shared between systems.

C) the same pieces of data may be stored in several versions throughout the organization.

D) All of the above.

Definition

D

360

Term

2) ________ information systems are information systems that allow companies to integrate information across operations on a company-wide basis.

A) Management 

B) Executive

C) Enterprise-wide

D) Functional area

Definition

C

361

Term

3) The emergence of the Internet and Web has resulted in ________, opening up new opportunities and methods for conducting business.

A) the globalization of customer and supplier networks

B) the integration of customer and supplier networks

C) delineating the customer and supplier networks

D) the integration of all business processes within an organization 

Definition

A

361

Term

4) Enterprise systems can help companies find innovative ways to conduct business, which lead to several advantages. These advantages do NOT include:

A) an increase in the accuracy of on-time shipments.

B) a decrease in the number of anticipated surprises.

C) tremendous inefficiencies within an organization.

D) an increase in customer satisfaction.

Definition
C 361
Term

5) One of the most important factors when deciding to implement enterprise solutions involves:

A) selecting applications that meet the requirements of the business.

B) implementing applications that meet the requirements of the customers and suppliers.

C) selecting and implementing applications that meet the requirements of the business, as well as its customers and suppliers.

D) selecting the customers and suppliers to work with.

Definition

C

362

Term

6) An information system can be used to support a billing process which would lead to:

A) reduced use of paper.

B) less handling of paper.

C) reduced material and labor costs.

D) All of the above.

Definition

D

362

Term

7) At ________ of the business process in an organization, value is added in the form of work performed by people associated with that process and new, useful information is generated.

A) some stages

B) successive stages

C) each stage

D) various stages

Definition

C

362

Term

8) Externally focused systems coordinate business activities with:

A) customers.

B) suppliers.

C) business partners.

D) All of the above.

Definition

D

362

Term

9) The key purpose of a(n) ________ system is to streamline the flow of information from one company's operations to another's.

A) intraorganizational

B) operational

C) management information 

D) interorganizational 

 

Definition

D

363

Term

10) Sharing ________ between organizations helps companies to adapt more quickly to changing market conditions.

A) information

B) operations

C) management 

D) packages 

Definition

A

363

Term

11) ________ can be accomplished by integrating multiple business processes in ways that enable firms to meet a wide range of unique customer needs.

A) Competitive advantage

B) Economies of scale

C) Process reengineering

D) Strategic information planning

Definition

A

363

Term

12) A ________ refers to the flow of information through a set of business activities, in which information flows through functional areas that facilitate the internal activities of the business.

A) flow diagram

B) data warehouse

C) value chain

D) company's inventory

Definition

C

364

Term

13) ________ activities are functional areas within an organization that process inputs and produce outputs.

A) Core

B) Main

C) Secondary

D) Support

Definition

A

364

Term

14) ________ involves the business activities associated with receiving and stocking raw materials, parts and products.

A) Inbound logistics

B) Operations and manufacturing

C) Outbound logistics

D) Marketing and sales

Definition

A

365

Term

15) Support activities include infrastructure, human resources, ________ and procurement.

A) operations and management

B) marketing and sales

C) customer service

D) technology development

Definition
D 364
Term

16) ________ provides the necessary components to facilitate a business process.

A) Technology development

B) Infrastructure

C) Human resources

D) Procurement 

Definition

B

366

Term

17) ________ is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them.

A) Technology development

B) Infrastructure

C) Human resources

D) Procurement 

Definition

C

366

Term

18) The ________ business activity can leverage information systems by accumulating purchase orders from the different functional areas within the corporation.

A) technology development

B) procurement

C) operations and manufacturing

D) marketing and sales

Definition

B

366

Term

19) A value system is formed when:

A) a company creates additional value by integrating internal applications with suppliers, business partners and customers.

B) companies connect their internal value chains.

C) information flows from one company's value chain to another company's value chain.

D) All of the above.

Definition

D

367

Term

20) An upstream information flow consists of information that:

A) is produced by a company and sent along to another organization.

B) is received from another organization.

C) is produced by one department and sent along to other departments.

D) is passed on to the company's distributors and customers.

Definition

B

367

Term

21) The ________ information flow consists of information that is received from another organization.

A) upstream

B) downstream

C) value system

D) internally-focused

Definition

 A

367

*

Term

22) ________ systems are highly useful for standardized, repetitive tasks such as making entries in a check register.

A) Packaged

B) Stand-alone

C) Expert

D) Custom 

Definition

A

369

Term

23) If packaged applications cannot meet the requirements of the business, the managers must conduct a ________ analysis to ensure that taking the custom application approach will prove worthwhile to the company.

A) what-if

B) cost-benefit

C) earned value

D) None of the above.

Definition

B

369

Term

24) ________ applications are systems that focus on the specific needs of individual departments and are not designed to communicate with other systems of the organization.

A) Packaged

B) Custom

C) Stand-alone

D) Internally-focused

Definition

C

369

Term

25) ________ systems are older systems that are close to or at the end of their useful life.

A) Packaged

B) Legacy

C) Conversion

D) Internally-focused

Definition

B

369

Term

26) In most organizations, each department implements applications to assist it with its daily business activities, and as a result, these applications tend to be:

A) similar in each department.

B) infrastructure-specific.

C) run on the same platforms.

D) externally focused.

Definition

B

370

Term

27) If the inbound logistics and operations use different systems, information cannot readily flow between these two departments. This leads to:

A) a highly inefficient process for operations personnel, who must have access to two systems in order to get both the order entry and inventory information.

B) inaccurate and outdated data since inventory information may be stored in both systems.

C) unnecessary costs associated with entering, storing and updating data redundantly.

D) All of the above.

Definition

D

372

Term

28) The process of conversion transfers information stored on legacy systems to a new, integrated computer platform, which typically comes in the form of:

A) Enterprise Resource Planning.

B) Supply Chain Management. 

C) Customer Relationship Management.

D) Total Quality Management. 

Definition

A

370

Term

29) Customer Relationship Management applications concentrate on the ________ integrating the value chains of a company and its distributors.

A) upstream information flows

B) legacy systems

C) externally focused systems

D) downstream information flows

Definition

D

371

Term

30) If the vanilla version of an ERP system does not support a certain business process, the software may require ________ to accommodate it.

A) customizations

B) integrations

C) differentiations

D) modifications

Definition

A

372

Term

31) Companies must take special care when dealing with customization issues because:

A) customizations can be costly.

B) maintaining and upgrading customizations can be troublesome.

C) new vanilla versions must be continually upgraded to accommodate the customization.

D) All of the above.

Definition

D

372

Term

32) Industry standard business processes are called:

A) workflow management.

B) functional process improvement.

C) best practices.

D) customer relationship management.

Definition

C

372

Term

33) Altering the way in which business processes are conducted is known as:

A) Business Process Management.

B) Supply Chain Management.

C) Customer Relationship Management.

D) Enterprise Resource Planning.

Definition

A

372

Term

34) A radical redesign of an organization is sometimes necessary to:

A) lower costs and increase quality.

B) develop an organizational vision.

C) create best practices.

D) focus on incremental changes.

Definition

A

373

Term

35) Data warehouses are databases that store information:

A) related to a specific department.

B) required for a specific business activity.

C) related to the various business activities of an organization.

D) that is outdated.

Definition

C

375

Term

36) In contrast to ________, ERP applications make accessing information easier by providing a central information repository.

A) legacy systems

B) custom applications

C) packaged applications

D) data warehouses

Definition

A

375

Term

37) MRP stands for:

A) Most Rapid Performance.

B) Multiple Resource Planning.

C) Material Requirements Planning.

D) Material Resource Planning.

Definition

C

375

Term

38) ERP applications that access the data warehouses are designed to have:

A) a different look and feel, depending of the unique needs of a particular department.

B) the same look and feel, regardless of the unique needs of a particular department.

C) a varying look and feel, depending on the needs of the organization.

D) different user interfaces to access different pieces of information. 

Definition

B

376

Term

39) Microsoft Word and Microsoft Excel have similar ________ and simply differ in the features and functionality that each application offers.

A) operations screens

B) user interfaces

C) capabilities

D) None of the above.

Definition

B

376

Term

40) Among the most prevailing issues facing management when selecting an ERP application are:

A) control.

B) business requirements.

C) best practices.

D) All of the above.

Definition

D

376

Term

41) Companies typically either opt for ________ control or allow particular business units to govern themselves.

A) distributed

B) decentralized

C) centralized

D) shared

Definition

C

376

Term

42) One of the areas related to control involves the consistency of:

A) business activities.

B) policies and procedures.

C) transactions involved in each department.

D) legacy systems used in each department.

Definition

B

376

Term

43) ERP core components include all of the following EXCEPT:

A) financial management.

B) operations management.

C) human resources management.

D) supply chain management.

Definition

D

376

Term

44) In today's highly competitive markets, ________ hold the balance of power because, if they become dissatisfied with the levels of service they are receiving, there are many alternatives readily available to them.

A) suppliers

B) customers

C) business partners

D) competitors

Definition

B

378

Term

45) Applications focusing on downstream information flows have two main objectivesto attract potential customers and:

A) create customer loyalty.

B) develop and maintain customer satisfaction.

C) achieve competitive advantage.

D) None of the above.

Definition

A

379

Term

46) ________ is a corporate-level strategy concentrating on the downstream information flows.

A) Business Process Management

B) Supply Chain Management

C) Customer Relationship Management

D) Enterprise Resource Planning

Definition

C

378

Term

47) Companies need to have a(n) ________ system that captures information from retail stores, Web sites, call centers and various other ways that organizations can communicate downstream within their value chain.

A) distributed

B) improved

C) integrated

D) internally-focused

Definition

C

379

Term

48) CRM applications are commonly integrated with ERP to leverage ________ information to serve customers.

A) internal

B) external

C) internal or external

D) internal and external

Definition

D

379

Term

49) The National Quality Research Center estimates that a one percent increase in customer satisfaction can lead to a(n) ________ increase in a company's market capitalization.

A) twofold

B) considerable

C) threefold

D) insignificant

Definition

C

380

Term

50) A successful CRM strategy must include:

A) policy and business process changes.

B) customer service changes.

C) employee training changes.

D) All of the above.

Definition

D

380

Term

51) A comprehensive CRM system includes:

A) operational CRM.

B) analytical CRM.

C) collaborative CRM.

D) All of the above.

Definition

D

381

Term

52) Operational CRM is commonly referred to as ________ system.

A) front-office

B) back-office

C) internal

D) external

Definition
A 381
Term

53) Analytical CRM is commonly referred to as ________ system.

A) front-office

B) back-office

C) internal

D) external

Definition

B

381

Term

54) An operational CRM system includes:

A) SFA.

B) EMM.

C) CSS.

D) All of the above.

Definition

D

381

Term

55) ________ applications provide support for the day-to-day sales activities of an organization.

A) Customer Relationship Management

B) Sales Force Automation

C) Supply Chain Management

D) Enterprise Resource Planning 

Definition

B

382

Term

56) Successful CSS systems enable:

A) faster response times.

B) increased first-contact resolution rates.

C) improved productivity for service and support personnel.

D) All of the above.

Definition

D

383

Term

57) An Enterprise Marketing Management system provides a comprehensive view of the:

A) competitors.

B) industry trends.

C) environmental factors.

D) All of the above.

Definition

D

384

Term

58) ________ refers to systems for providing effective and efficient communication with the customer from the entire organization.

A) Operational CRM

B) Analytical CRM

C) Collaborative CRM

D) Executional CRM

Definition

C

385

Term

59) At the heart of the ________ is the CIC.

A) operational CRM

B) analytical CRM

C) collaborative CRM

D) executional CRM

Definition
A 382 ?
Term

60) The term ________ is commonly used to refer to the producers of supplies that a company uses.

A) supply network

B) value system

C) supply chain

D) value chain

Definition

C

387

Term

61) A more descriptive term to describe the flow of materials from suppliers to a company is ________ because multiple suppliers are involved in the process of servicing a single organization.

A) supply network

B) value system

C) supply chain

D) value chain

Definition

A

387

Term

62) Problems such as excessive inventories, inaccurate manufacturing capacity plans and missed production schedules can run rampant when:

A) more and more suppliers are involved in a supply network.

B) there is a one-to-one relationship between the supplier and a company.

C) firms within a supply network do not collaborate effectively.

D) multiple suppliers service a single organization.

Definition

C

388

Term

63) Applications focusing on ________ information flows have two main objectivesto accelerate product development and to reduce costs associated with procuring raw materials, components and services from suppliers.

A) internally-focused

B) downstream

C) upstream

D) integrated 

Definition

C

388

Term

64) Like ERP and CRM applications, SCM packages are delivered in the form of ________, which companies select and implement according to their business requirements.

A) components

B) solutions

C) modules

D) systems

Definition

C

388

Term

65) Supply chain planning includes all of the following EXCEPT:

A) demand planning and forecasting.

B) distribution planning.

C) production scheduling.

D) supply chain execution.

Definition

D

389

Term

66) SAP's collaborative fulfillment module does NOT include the following functions:

A) committing to delivery dates in real time.

B) fulfilling orders from channels on time with order management, transportation planning and vehicle scheduling.

C) sharing information and integrating processes up and down the supply chain.

D) supporting the entire logistics process, including picking, packing, shipping and international activities.

Definition

C

388

9.7

Term

67) The supply chain ________ module in SCM packages allows a company to monitor every stage of the supply chain process, from price quotation to the moment the customer receives the products and issue alerts when problem arise.

A) collaboration

B) event management 

C) exchange

D) performance management 

Definition

B

388

9.7

Term

68) The supply chain ________ module in SCM packages reports key measurements in the supply chain.

A) collaboration

B) event management 

C) exchange

D) performance management 

Definition

D

388

9.7

Term

69) ________ refers to the movement of goods from the supplier to production.

A) Product flow

B) Information flow

C) Data flow

D) Financial flow 

Definition

A

390

Term

70) ________ refers to the movement of information along the supply chain.

A) Product flow

B) Information flow

C) Data flow

D) Financial flow 

Definition

B

390

Term

71) Supply chain ________ is the extent to which a company's supply chain is focusing on maximizing customer service.

A) effectiveness

B) efficiency

C) integration

D) None of the above.

Definition

A

390

Term

72) Enterprise portals can be defined as ________ through which a business partner accesses secured, proprietary information from an organization.

A) intranets

B) access points

C) back doors

D) tunnels

Definition

B

391

Term

73) ________ automate the business processes involved in selling or distributing products from a single supplier to multiple buyers.

A) Distribution portals

B) Procurement portals

C) Enterprise portals

D) Resource portals

Definition

A

391

Term

74) ________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a supplier and multiple customers

A) Resource portals

B) Procurement portals

C) Distribution portals

D) Enterprise portals

Definition

C

392

*

Term

75) ________ are designed to automate the business processes that occur before, during and after sales have been transacted between a buyer and multiple suppliers.

A) Procurement portals

B) Resource portals

C) Enterprise portals

D) Distribution portals

Definition

A

391

Term

76) Another term for an electronic marketplace is:

A) trading exchange.

B) trading floor.

C) electronic exchange.

D) multimedia marketplace.

Definition

A

392

Term

77) ________ are operated by third-party vendors, meaning that they are built and maintained by a particular company.

A) Electronic exchanges

B) Trading exchanges

C) Multimedia marketplaces

D) Resource marketplaces

Definition

B

392

Term

78) ________ allows Web page designers to create customized tags that specify how the document should be formatted.

A) HTML

B) XBRL

C) XML

D) W3C

Definition

C

393

Term

79) ________ is an XML-based specification for publishing financial information.

A) HTML

B) XBRL

C) EDI

D) W3C

Definition

B

393

Term

80) ________ technology uses electromagnetic or electrostatic coupling to transmit signals.

A) RFED

B) XBRF

C) XBRL

D) RFID

Definition

D

393

Term

 

81) ________ RFID tags are small and relatively inexpensive, and typically have a range up to a few feet.

A) Active

B) Passive

C) Simple

D) Basic 

Definition

B

394

Term

82) The implementations of enterprise systems are often ________ originally envisioned.

A) more costly and more time consuming than

B) as costly and time consuming as

C) not as effective as

D) less expensive than

Definition

A

396

Term

83) A recent survey suggested that ________ percent of companies that undertake enterprise system implementations do not fully realize the results they had hoped.

A) 10 to 20

B) 30 to 40

C) 40 to 60

D) 60 to 80

Definition

C

396

Term

84) One of the recommendations related to enterprise system implementations includes taking a ________ approach to implementations.

A) organizational 

B) multidisciplinary

C) internally-focused

D) thorough

Definition

B

396

Term

85) The primary reason that enterprise system implementations fail is believed to be a direct result of lack of ________ management support.

A) top-level

B) managerial level

C) organizational level

D) operational level

Definition

A

396

Term

86) ________ is often the most overlooked, underestimated and poorly budgeted expense involved in planning enterprise system implementations.

A) Customization

B) Training

C) Executive sponsorship

D) Help from outside experts

Definition

B

397

Term

87) Enterprise systems affect the entire organization and, thus, companies should include personnel from ________ in the implementation project.

A) different levels in the same department

B) the same level in different departments

C) the executive level

D) different levels and departments

Definition

D

397

Term

1) IS spending in most organizations is controlled by:

A) specific business functions.

B) marketing.

C) human resources.

D) accounting.

Definition

A

406

Term

2) Systems analysis and design involves:

A) designing.

B) building.

C) maintenance.

D) All of the above.

Definition

D

411

Term

3) Organizations should hire systems analyst who:

A) have technical expertise.

B) have management expertise.

C) have technical and management expertise.

D) have financial expertise.

Definition

C

411

Term

4) The programmers' discipline of common methods and techniques is called:

A) systems analysis.

B) software engineering.

C) transforming information systems.

D) systems development.

Definition

B

411

Term

5) The information systems development approach is:

A) open.

B) structured.

C) not hierarchical.

D) undisciplined.

Definition

B

411

Term

6) Systems analysts must become adept at ________ problems into multiple small programs.

A) coding

B) making

C) decomposing

D) turning

Definition

C

412

Term

7) The key to IT project success is:

A) everyone involved with the project performing their jobs.

B) programmers understanding the requirements.

C) users understanding what they want.

D) a close and mutually respectful working relationship between the users and the analysts.

Definition

D

412

Term

8) SDLC is short for:

A) systems development learning cycle.

B) systems deployment learning cycle.

C) systems development life cycle.

D) systems deployment life cycle.

Definition

C

412

Term

9) The five phases of the SDLC in order from first to last are:

A) planning and selection, analysis, design, implementation and maintenance.

B) analysis, planning and selection, design, implementation and maintenance.

C) planning and selection, design, analysis, implementation and maintenance.

D) analysis, design, planning and selection, implementation and maintenance.

Definition

A

412

Term

10) The first phase of the SDLC includes:

A) identification and analysis.

B) design of system.

C) systems analysis.

D) planning and selection.

Definition

D

412

Term

11) The goal of systems planning and selection is:

A) to identify a project from all possible projects that could be performed.

B) to identify and purchase a project from all possible projects that could be performed.

C) to identify and select a project from all possible projects that could be performed.

D) None of the above.

Definition

C

414

Term

12) Some organizations have a formal ________ process whereby a senior manager, a business group, an IS manager, and other committee members identify and assess all possible systems development projects that an organization could undertake.

A) information systems planning

B) steering committee

C) information systems purchasing

D) implementation committee

Definition

A

414

Term

13) Projects identified by top management tend to have a:

A) strategic organizational focus.

B) financial focus.

C) production focus.

D) diverse focus.

Definition

A

414

Term

14) Projects identified by steering committees tend to have a:

A) financial focus.

B) HR focus.

C) cross-functional focus.

D) narrow focus.

Definition

C

414

Term

15) Projects identified by business units tend to have a:

A) financial focus.

B) tactical focus.

C) production focus.

D) HR focus.

Definition

B

415

Term

16) ________ are criteria used by organizations to evaluate whether to accept or reject a project.

A) Strategic alignments and risks

B) Potential benefits and project size

C) Potential costs and resource availability

D) All of the above.

Definition

D

415

10.4

Term

17)  The purpose of the analysis phase is for:

A) users to formalize the procedures and methods used in performing tasks.

B) designers to gain a thorough understanding of an organization's current way of doing things.

C) designers to layout design procedures.

D) management to determine which features are desired.

Definition

B

415

Term

18) The collection and structuring of ________ is arguably the most important activity in systems development.

A) system requirements

B) system design

C) system implementation

D) system identification

Definition

A

416

Term

19) ________ is the process of gathering and organizing information form users, managers, business processes, and documents to understand how a proposed information system should function.

A) Design analysis

B) Requirements collection

C) System identification

D) None of the above.

Definition

B

416

Term

20) Systems analysts use ________ for collecting system requirements.

A) only interviews and observations

B) only interviews, questionnaires, and observations

C) only interviews, questionnaires, document analysis, and observations

D) interviews, questionnaires, document analysis, observations, and problem decomposition

Definition

C

416

Term

21) ________ is/are important to discover issues, policies and rules as well as concrete examples of the use of data and information in the organization.

A) Interviews

B) Document analysis

C) Observations

D) Questionnaires

Definition

B

416

Term

22)  CSF is short for:

A) Crucial Success Function.

B) Crucial Success Factor.

C) Critical Success Function.

D) Critical Success Factor.

Definition

D

416

Term

23) In determining the CSFs of an organization, the analyst must determine:

A) management's CSFs.

B) organizational and individual CSFs.

C) organizational, departmental and individual CSFs.

D) organizational, managerial and departmental CSFs.

Definition

C

417

Term

24) ________ is a special type of group meeting in which all or most of the users meet with the analyst at the same time.

A) Systems analysis

B) Interviews

C) CSF

D) JAD

Definition

D

416

Term

25) ________ are facts that describe people, objects or events.

A) Logic

B) Nouns

C) Data

D) Salient

Definition

C

418

Term

26) Analysts use ________ to collect and describe the data to users, so as to confirm that all needed data are known and presented to uses as useful information.

A) JAD

B) data modeling tools

C) CSF

D) All of the above.

Definition

B or D

418

Term

27) A type of data model that shows the relationships between entities is a(n):

A) logical diagram.

B) ERD.

C) data flow diagram.

D) ISD.

Definition

B

418

Term

28) ________ represent(s) the movement of data through an organization or within an information system.

A) Processing logic

B) System design

C) System logic

D) Data flows

Definition

D

418

Term

29) ________ represent(s) the way in which data are transformed.

A) Processing logic

B) System design

C) System logic

D) Data flows

Definition
A 419
Term

30) The steps and procedures which transform raw data inputs into new or modified information are/is the:

A) processing operation.

B) processing and logic operations.

C) database management system.

D) files.

Definition

B

419

Term

31) Analysts must identify the following key elements before they develop designs for an information system:

A) data flows, data, and processing logic.

B) data, data flows, and ERDs.

C) data flows, data, ERDs, and processing logic.

D) data, data flows, requirements, and processing logic.

Definition

D

419

Term

32) During the ________ phase the details of the chosen approach are developed.

A) processing logic

B) system design

C) system logic

D) data flows

Definition

B

421

Term

33) The elements that must be designed when building a system include:

A) forms, reports and databases.

B) interfaces and dialogues.

C) processing and logic.

D) All of the above.

Definition

D

421

Term

34) A ________ is a business document containing some predefined data and often some spaces for additional information.

A) form

B) report

C) dialogue

D) file

Definition

A

422

Term

35) A ________ is a business document containing only predefined data.

A) form

B) report

C) dialogue

D) file

Definition

B

422

Term

36) Interfaces that enable the user to select pictures, icons, and menus to send instructions to the computer are referred to as:

A) database systems.

B) GUIs.

C) information system software.

D) files.

Definition

B

422

Term

37) After the conceptual model has been completed using an entity-relation diagram, it can be easily translated into a physical data model in a:

A) form.

B) report.

C) database management system.

D) file.

Definition

C

422

Term

38) One way of representing the logic and steps needed to perform calculations is to use:

A) flow charts.

B) hierarchy charts.

C) P-charts.

D) pseudocode.

Definition

D

422

Term

39) Some of the activities which take place during this phase include: system conversion, software programming and testing, documentation, training and support.

A) System implementation

B) System design

C) Programming

D) System logic

Definition

A

423

Term

40) ________ is the processes of transforming the system design into a working computer system.

A) Processing logic

B) System design

C) Programming

D) System logic

Definition

C

424

Term

41) ________ is testing correctness of individual models and the integration of multiple modules.

A) Alpha testing

B) Beta testing

C) Developmental testing

D) Systems testing

Definition

C

424

10.7

Term

42) ________ is testing the overall system to see whether it meets design requirements.

A) Alpha testing

B) Beta testing

C) Developmental testing

D) Systems testing

Definition

A

424

10.7

Term

43) ________ is testing of the capabilities of the system in the user environment with actual data.

A) Alpha testing

B) Beta testing

C) Developmental testing

D) Systems testing

Definition

B

10.7

424

Term

44) In addition to having good communication skills and being good at problem solving, support personnel must also:

A) understand the business processes.

B) have programming skills.

C) be expert users of the system.

D) be a developer.

Definition

C

425

Term

45) The process of decommissioning the current system and installing the new system in the organization is called:

A) systems converting.

B) systems conversion.

C) systems contracting.

D) systems analysis.

Definition

B

424

Term

46) The four types of software conversion strategies include:

A) parallel, direct, phased, and pilot.

B) identification, analysis, implementation, and maintenance.

C) reference, discontinued, installation, single location.

D) reuse, discontinued, implementation, single location.

Definition

A

425

Term

47) After an information system is installed it is in the:

A) analysis phase.

B) development phase.

C) testing phase.

D) maintenance phase.

Definition

D

425

Term

48) Who is usually responsible for collecting maintenance requests from systems users after the new system has been installed?

A) A member of the development team

B) Help desk personnel

C) Information center personnel

D) All of the above.

Definition

A

425

Term

49) It is during the ________ that the largest part of the system development occurs.

A) analysis phase

B) development phase

C) testing phase

D) maintenance phase

Definition

D

425

Term

50) The four types of system maintenance referenced in the book are:

A) developmental, corrective, perfective and preventative.

B) corrective, adaptive, perfective and preventative.

C) developmental, corrective, adaptive and preventative.

D) developmental, adaptive, perfective and preventative.

Definition

B

426

10.9

Term

51) ________ maintenance is making changes to an information system to repair flaws in the design, coding or implementation.

A) Corrective

B) Adaptive

C) Perfective

D) Preventative

Definition

A

426

Term

52) ________ maintenance is making changes to an information system to reduce the chance of future system failure.

A) Corrective

B) Adaptive

C) Perfective

D) Preventative

Definition

D

426

Term

53) ________ maintenance is making changes to an information system to evolve its functionality to accommodate changing business needs or to migrate it to a different operating environment.

A) Corrective

B) Adaptive

C) Perfective

D) Preventative

Definition

B

426

Term

54) Making enhancements to improve processing performance or interface usability, or adding desired but not necessarily required systems features is:

A) corrective maintenance.

B) adaptive maintenance.

C) perfective maintenance.

D) preventative maintenance.

Definition

C

426

Term

55) This type of systems development methodology uses a trial and error approach for discovering how a system could operate.

A) Prototyping

B) RAD

C) JAD

D) Object-oriented analysis and design

Definition

A

428

Term

56) Using this type of development methodology the people building the system and the users of the system keep cycling between user design and construction until the system is complete.

A) Prototyping

B) RAD

C) JAD

D) Object-oriented analysis and design

Definition

B

429

Term

57) ________ tools are used to structure and develop prototypes quickly.

A) Prototyping

B) CASE

C) JAD

D) Object-oriented analysis and design

Definition

B

429

Term

58) Using this type of development methodology, analysts identify common modules that combine the data and the operations to be performed.

A) Prototyping

B) RAD

C) JAD

D) Object-oriented analysis and design

Definition

D

430

Term

59) This approach enables the reuse of common modules.

A) Prototyping

B) RAD

C) CASE

D) Object-oriented analysis and design

Definition

D

???????

Term

60) A common reason for organizations not building their own IS systems is:

A) limited IS staff.

B) IS staff has limited skills.

C) IS staff is overworked.

D) All of the above.

Definition

D

431

Term

61) A common alternative to in-house systems development is:

A) external acquisition.

B) outsourcing.

C) end-user development.

D) All of the above.

Definition

D

432

Term

62) A common evaluative tool when using ________ is to ask the vendors to set up their system so that you and your colleagues can "test drive" the system.

A) external acquisition

B) outsourcing

C) end-user development

D) All of the above.

Definition

A

433

Term

63) This type of acquisition has been described to be similar to purchasing a car.

A) External acquisition

B) Outsourcing

C) End-user development

D) All of the above.

Definition

A

433

Term

64) A(n) ________ is a report which tells your vendors what your requirements are and to invite them to provide information about how they might be able to meet your requirements.

A) proposition

B) RFP

C) performa

D) purchase order

Definition

B

434

Term

65) This is used when you want to evaluate a proposed system to determine how long it takes to perform a specific task that will be required in your particular application.

A) Performance test

B) Benchmarking program

C) Test drive

D) Evaluation test

Definition

B

435

Term

66) Which of the following is not a commonly used criteria for evaluating software?

A) Memory requirements

B) Training and documentation

C) Access time

D) Maintenance and repair

Definition

C

435

Term

67) ________ is the practice of turning over responsibility of some or all of the organization's information system development and operations to an outside firm.

A) External acquisition

B) Outsourcing

C) End-user development

D) All of the above.

Definition

B

437

Term

68) Organizations may elect to outsource because of:

A) cost and quality concerns.

B) supplier pressures.

C) downsizing.

D) All of the above.

Definition

D

438

Term

69) Organizations may elect to outsource because of:

A) tension between end users and the in-house IS staff.

B) political and/or organizational problems.

C) BPR or simplifying

D) All of the above.

Definition

D

438

Term

70) The single most important factor of an ongoing outsourcing alliance is:

A) ongoing management.

B) costs.

C) personal relationships.

D) organizational culture.

Definition

A

440

Term

71) Most organizations enter outsourcing relationships through:

A) strictly legal contracts.

B) personal relationships

C) mutually beneficial relationships with strategic partners.

D) recommendations from other organizations.

Definition

C

440

Term

72) The types of outsourcing relationships identified are:

A) basic, preferred and strategic.

B) incidental, preferred and strategic.

C) basic, incidental and strategic.

D) basic, preferred and incidental.

Definition

A

440

Term

73) Organizations should try to have a few ________ outsourcing relationships, in which the buyer and the supplier set preferences and prices to the benefit of each other.

A) basic

B) incidental

C) preferred

D) strategic

Definition

C

440

Term

74) In many organizations, the growing number of sophisticated information systems users allows the IS managers the option of allowing:

A) external acquisition.

B) outsourcing.

C) end-user development.

D) All of the above.

Definition

C

440

Term

75) Departments can speed up development of systems by having ________ perform the required development tasks.

A) consultants

B) programmers

C) managers

D) end-users

Definition

D

440

Term

76) Currently, ________ costs constitute the majority of overall systems costs.

A) user

B) hardware

C) software

D) management

Definition

C

441

Term

78) One of the major drawbacks to end-user development is:

A) speed.

B) lack of continuity.

C) quality.

D) end-user tools.

Definition

B

443

Term

79) Which is considered a fourth-generation tool?

A) Personal computer tools

B) Query language generators

C) Graphics generators

D) All of the above.

Definition

D

443

Term

1) Futurist author Alvin Toffler describes three "waves of change." The third, and biggest wave of change to occur is the:

A) Information Age.

B) Industrial Revolution.

C) Agriculture and Handwork Age.

D) Modern Age.

Definition

A

455

Term

2) During the Third Wave, ________ became the common currency.

A) food

B) money

C) the Internet

D) information

Definition

D

455

Term

3) People feeling threatened by and protesting against or destroying technology are called:

A) luddites

B) technophites

C) neophites

D) netophites

Definition

A

455

Term

4) Progress during the ________ brought about change in the mechanized society, educational, business, social, and religious institutions.

A) Industrial Revolution

B) Information Age

C) Agriculture and Handwork Age

D) Space Age

Definition

A

455

Term

5) Knowing how to use a computer can open up myriad sources of information to those who have learned how to use the computer as a device to gather, store, organize, and otherwise process information. This is called:

A) computer literacy.

B) computer competency.

C) computer ability.

D) computer comprehension.

Definition

A

455

Term

6) ________ is an attribute possessed by someone who knows how to use a computer.

A) Computer literacy

B) Computer competency

C) Computer ability

D) Computer comprehension

Definition

A

455

Term

7) ________ is the ability to independently learn new technologies as they emerge and assess their impact on one's work and life.

A) Computer literacy

B) Computer competency

C) Computer ability

D) Computer fluency

Definition

D

457

Term

8) The book describes populations in terms of those people who know how to use a computer and those who do not. The people who do not know how to use a computer are described as the:

A) information haves.

B) information have-nots.

C) information don't haves.

D) information needy.

Definition

B

455

Term

9) The ________ is the biggest wave of change according to Alvin Toffler.

A) Agriculture and Handwork

B) Industrial Revolution

C) Information Age

D) Space Age

Definition

C

455

Term

10) The digital divide is a term that refers to the:

A) gap between those individuals who have access to digital telephone technology and those who do not.

B) gap between those individuals who have access to digital television technology and those who do not.

C) gap between those computer literate individuals who have access to digital information resources (e.g., the Internet) and those who do not.

D) gap between those individuals who have access to information resources and those who do not.

Definition

C

457

Term

11) The digital divide in the United States is:

A) growing rapidly.

B) growing slowly.

C) shrinking slowly.

D) shrinking rapidly.

Definition

D

457

Term

12) Given the strong linkage between access to computers, computer literacy, and a person's ability to compete in the Information Age, ________ is one of the major ethical challenges facing society today.

A) Information Age

B) computer literacy

C) computer fluency

D) the digital divide

Definition

D

457

Term

13) In an attempt to shrink the digital divide, a global project called ________ is attempting to distribute very low-cost laptop computers to children in developing countries around the world.

A) One Laptop Per Child (OLPC)

B) Luddites

C) Low-Cost Laptops (LCLT)

D) Bridging the Digital Divide

Definition

A

457

Term

14) Central to information systems ethics are:

A) information privacy and information property.

B) information accuracy and culture control.

C) information accessibility and culture control.

D) information property and information technology.

Definition

A

458

11.7

Term

15) When one describes the issues and standards of conduct associated with the use of information systems, one is discussing:

A) computer ethics.

B) computer crime.

C) computer civility.

D) computer hacking.

Definition

A

458

Term

16) An issue central to the debate on computer ethics is:

A) information privacy.

B) information accuracy.

C) information property.

D) All of the above.

Definition

D

458

Term

17) ________ is concerned with what information an individual should have to reveal to others in the workplace or through other transactions, such as online shopping.

A) Information privacy

B) Information accuracy

C) Information property

D) All of the above.

Definition

A

459

Term

18) Information privacy is a term that describes what ________ an individual should have to reveal to others in the course of conducting transactions or accepting employment.

A) credit records

B) crime records

C) information

D) None of the above.

Definition

C

459

Term

19) ________ is the stealing of another person's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and otherwise run up debts that are never repaid.

A) Information theft

B) Identity theft

C) Computer theft

D) Information resource theft

Definition

B

459

Term

20) One of the fastest growing "information" crimes in recent years has been:

A) information theft.

B) identity theft.

C) computer theft.

D) information resource theft.

Definition

B

459

Term

21) ________ is concerned with what information an individual should have to reveal to employers.

A) Computer ethics

B) Information privacy

C) Identity theft

D) Information theft

Definition

B

459

Term

22) According to the Consumer Protection Working Group of the American Bar Association, a seller's privacy policy should indicate at least the following:

A) what information the seller is gathering from you.

B) how the seller will use this information.

C) whether and how you can "opt out" of these practices.

D) All of the above.

Definition

D

460

Term

23) You can maintain your privacy while shopping online by:

A) choosing monitored Web sites.

B) removing cookies from your computer.

C) visiting sites anonymously.

D) All of the above.

Definition

D

461

Term

24) ________ is concerned with ensuring the authenticity and fidelity of information as well as with identifying who is responsible for informational errors that harm people.

A) Information accessibility

B) Information assurance

C) Information accuracy

D) Information assertiveness

Definition

C

461

Term

25) ________ must be concerned with the integrity of data.

A) Information system designers

B) Information system developers

C) Data entry workers

D) Everyone

Definition

D

461

Term

26) The top ten dot-cons listed by the Federal Trade Commission include:

A) real estate fraud.

B) web domain sales.

C) Internet auctions.

D) information acquisition.

Definition

C

462

11.1

Term

27) ________ focuses on who owns information about individuals and how information can be sold and exchanged.

A) Personal data

B) Information sensitivity

C) Information property

D) Information gathering

Definition

C

463

Term

28) ________ is unsolicited e-mail that promotes a product or service.

A) Cookies

B) Spyware

C) Spam

D) None of the above.

Definition

C

464

Term

29) ________ is any software that covertly gathers information about a user though an Internet connection without the user's knowledge.

A) A viruses

B) A worms

C) Spyware

D) Adware

Definition

C

464

Term

30) ________ is electronic junk mail or junk newsgroup postings, usually for the purpose of advertising some product and/or service.

A) Spim

B) Spam

C) Spyware

D) Adware

Definition

B

464

Term

31) A(n) ________ is a message passed to a Web browser on a user's computer by a Web server, that is then stored in a text file by the browser; that message is sent back to the server each time the user's browser requests a page from that server.

A) identifier

B) cookie

C) message

D) text file

Definition

B

464

Term

32) A(n) ________ is used by a Web page to store information about a user on the user's computer, so as to provide the user with personalized information on the next visit.

A) identifier

B) cookie

C) message

D) text file

Definition

B

464

Term

33) ________ is a small text file on your computer that stores information about your Web-browsing activity at a particular site.

A) A cookie

B) Spyware

C) Spam

D) Spim

 

Definition

A

464

Term

34) ________ is software that runs on your computer, collecting information which is then transmitted to another party.

A) Cookies

B) Spyware

C) Spam

D) Spim

Definition

B

464

Term

35) ________ is a special type of technology that collects information about a person in order to customize Web browser banner advertisements.

A) Spyware

B) Adware

C) Cookies

D) Spam

Definition

B

464?

Term

36) ________ the dubious practice of registering a domain name, then trying to sell the name to the person, company, or organization most likely to want it.

A) Spyware

B) Cybersquatting

C) Phishing

D) Spamming

Definition

B

464

Term

37) ________ is a term that describes what information a person or an organization has the right to obtain about others and how this information can be accessed and used in the future.

A) Information accessibility

B) Information assurance

C) Information retrieval

D) Information acquisition

Definition

A

466

Term

38) ________ is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

A) Digital Rights Management

B) Data assurance

C) Water marking

D) Information securing

Definition

A

465

Term

39) ________ restrictions include which devices will play the media, how many devices the media will play on, and even how many times the media can be played.

A) Digital Rights Management

B) Data assurance

C) Water marking

D) Information securing

Definition

A

465

Term

40) To prevent illegal sharing of DRM-free content, media is often ________ so that any illegal copy can be traced to the original purchaser.

A) Digital Rights Management (DRM)ed

B) data assuranced

C) watermarked

D) information secured

Definition

C

466

Term

41) E-mail privacy is:

A) protected by law.

B) not protected by law.

C) a thing of the past.

D) not something people are concerned with.

Definition

B

????????

Term

42) In 2005, the FBI abandoned ________ , which was software that allowed Internet traffic to be monitored.

A) T-Rex

B) Carnivore

C) DRM

D) Blue Steel

Definition

B

467

Term

43) ECPA is an acronym that refers to the:

A) Electronic Controls Privacy Act.

B) Electronic Communications Privacy Act.

C) E-Commerce Customer Protection Association.

D) Electric Computer Protection Agency.

Definition

B

467

Term

44) The ECPA offers stronger support for the privacy of ________ communications than for the privacy of electronic mail communications.

A) paper mail

B) voice mail

C) facsimile

D) None of the above.

Definition

B

467

Term

 45) Related to ethical computer use, many behaviors may not be illegal, but nevertheless unethical. Examples of this behavior include all of the following EXCEPT:

A) using computer time at work to read personal e-mail.

B) organizations compiling personal information about shopping habits.

C) the government regulating computer crimes.

D) using technology to rearrange photographs.

Definition

C

468

Term

46) Companies can do many things to more ethically use technologies. All of the following would be good ways to achieve this EXCEPT:

A) devise guidelines for ethical use of technology.

B) be prudent and open about their e-mail monitoring.

C) have written rules regarding any monitoring that they do.

D) compile information on Web preferences of customers for internal use only.

Definition

D

468

Term

47) The Computer Ethics Institute's responsible computer use guidelines prohibit all of the following EXCEPT:

A) using a computer to harm others.

B) snooping in other people's files.

C) providing assistance to others with the use of a computer.

D) appropriating other people's intellectual output.

Definition

C

469

Term

48) ________ is defined as the act of using a computer to commit an illegal act.

A) Computer bad will

B) Computer crime

C) Computer misuse

D) Computer abuse

Definition

B

470

Term

49) The guidelines for ethical use of computers published by the Computer Ethics Institute prohibit:

A) using a computer for shopping at work

B) using a computer to harm others

C) using a computer to view inappropriate websites

D) None of the above.

Definition

B

469

Term

50) Responsible computer use includes:

A) not using a computer to harm others.

B) not snooping in other persons' files.

C) not using a computer to steal.

D) All of the above.

Definition

D

469

Term

51) Responsible computer use includes:

A) thinking about the social consequences of your programs.

B) appropriating other people's intellectual output.

C) interfering with other persons' computer work.

D) None of the above.

Definition

A

469

Term

52) Most organizations ________ report their incidents of computer crimes.

A) under

B) over

C) do not

D) accurately

Definition

C

470

Term

53) Unauthorized access means that the person who has gained entry to a computer system has ________ to use such computer access.

A) authority

B) permission

C) rights

D) no authority

Definition

D

471

Term

54) The global reach of computer networks has raised concerns over:

A) copyrights.

B) privacy.

C) security.

D) All of the above.

Definition

D

?

Term

55) The Electronic Communications Privacy Act of 1986 makes it a crime to ________ any electronic communications service, including telephone services.

A) copy

B) view

C) break into

D) record

Definition

C

472

Term

 

57) ________ is the use of formal investigative techniques to evaluate digital information for judicial review.

A) DRM

B) Carnivore

C) OLPC

D) Computer forensics

Definition

D

473

Term

58) The term "hacker" was first coined in the 1960s, and it was originally used to describe MIT students who were expert computer users and programmers who roamed freely through computer systems out of:

A) curiosity.

B) malicious intent.

C) boredom.

D) None of the above.

Definition

A

474

Term

59) Examples listed in the book of computer crimes include:

A) using the computer to steal money.

B) using a computer to perpetrate a deception for money.

C) falsely advertising merchandise for sale on a Web site auction.

D) All of the above.

Definition

D

474

Term

60) The majority of unlawful intrusions into computer systems are made by:

A) outside computer hackers.

B) employees.

C) competitors.

D) terrorists.

Definition

B

476

Term

61) Persons who plant destructive programs in computer systems and then threaten to activate them if a ransom is not paid are called:

A) computer hackers.

B) cyberterrorists.

C) cybervandals.

D) predators.

Definition

B

475

Term

62) Persons who plant viruses are called:

A) computer hackers.

B) cyberterrorists.

C) vandals.

D) predators.

Definition

A

480

Term

63) Which of the following is not an example of a computer crime as listed in the textbook?

A) Data diddling

B) Salami slicing

C) Piggybacking

D) Cold calling

Definition

D

477

Term

64) Salami slicing is a special type of:

A) phreaking.

B) spoofing.

C) social networking.

D) data diddling.

Definition

A

?????

Term

65) Crimes committed against telephone company computers are an example of:

A) phreaking.

B) spoofing.

C) data diddling.

D) carding.

Definition

A

477

Term

66) ________ requires no technical expertise, but involves looking for papers that contain useful information.

A) Phreaking

B) Dumpster diving

C) Social engineering

D) Data diddling

Definition

B

477

Term

67) Spoofing is a type of computer crime, and it is a scam that is used to steal the ________ of legitimate users' computer accounts.

A) passwords

B) company's names

C) people's names

D) None of the above.

Definition

A

477

Term

68) ________ is the term that describes the legal purchase of one copy of a software application, followed by the illegal copying and distribution of that same software application.

A) Software piracy

B) Software stealing

C) Software borrowing

D) Software use

Definition

A

477

Term

69) The slang term for stolen software is:

A) hackerware.

B) warez.

C) vaporware.

D) discountware.

Definition

B

478

Term

70) Software piracy is a(n):

A) ethical issue.

B) crime.

C) economic problem.

D) All of the above.

Definition

D

477

Term

71) The ________ contained within a Trojan horse are hidden such that the computer appears to function normally.

A) pathogens

B) instructions

C) Trojan horse's author's name

D) guide

Definition

B

481

Term

72) Logic bombs and time bombs are variations of:

A) worms.

B) viruses.

C) Trojan horses.

D) dust bunnies.

Definition

C

481

Term

73) Logic bombs are set off by:

A) specific dates.

B) specific times.

C) specific user operations.

D) None of the above.

Definition

C

481

Term

74) To help protect your valuable computer files, make backups of your files in case you receive a(n) ________ that erases files from your hard drive.

A) virus

B) worm

C) cricket

D) macrophage

Definition

A

???

Common Sense

Term

75) ________ broadly refers to the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress.

A) Cyberbattles

B) Cyberterrorism

C) Social engineering

D) Cyber harassment

Definition

D

???

Common Sense

Term

76) ________ is the term used to describe the attempt by a country's military to disrupt the communications system of another country.

A) Cyberbattles

B) Cyberterrorism

C) Social engineering

D) Cyberwar

Definition

D

484

Term

77) In a cyberwar, technologies might be used to do all of the following EXCEPT:

A) electronically blind the other side.

B) diminish the capability of communications systems.

C) interfere with troop and weapon positioning systems.

D) Technologies may be used for all of the above.

Definition

D

484

Term

78) Cyberterrorism is launched by:

A) governments.

B) individuals.

C) social engineering.

D) computers.

Definition

B

486

Term
DONT FORGET ABOUT ACCESS
Definition
Term
DONT FORGET ABOUT ACCESS
Definition
Term
DONT FORGET ABOUT ACCESS
Definition
Term
DONT FORGET ABOUT ACCESS
Definition
Term
DONT FORGET ABOUT ACCESS
Definition
Supporting users have an ad free experience!