Term
1) Applications running on different computing platforms are not desirable because:
A) they are difficult to integrate.
B) data cannot be readily shared between systems.
C) the same pieces of data may be stored in several versions throughout the organization.
D) All of the above. |
|
Definition
|
|
Term
2) ________ information systems are information systems that allow companies to integrate information across operations on a company-wide basis.
A) Management
B) Executive
C) Enterprise-wide
D) Functional area |
|
Definition
|
|
Term
3) The emergence of the Internet and Web has resulted in ________, opening up new opportunities and methods for conducting business.
A) the globalization of customer and supplier networks
B) the integration of customer and supplier networks
C) delineating the customer and supplier networks
D) the integration of all business processes within an organization |
|
Definition
|
|
Term
4) Enterprise systems can help companies find innovative ways to conduct business, which lead to several advantages. These advantages do NOT include:
A) an increase in the accuracy of on-time shipments.
B) a decrease in the number of anticipated surprises.
C) tremendous inefficiencies within an organization.
D) an increase in customer satisfaction. |
|
Definition
|
|
Term
5) One of the most important factors when deciding to implement enterprise solutions involves:
A) selecting applications that meet the requirements of the business.
B) implementing applications that meet the requirements of the customers and suppliers.
C) selecting and implementing applications that meet the requirements of the business, as well as its customers and suppliers.
D) selecting the customers and suppliers to work with. |
|
Definition
|
|
Term
6) An information system can be used to support a billing process which would lead to:
A) reduced use of paper.
B) less handling of paper.
C) reduced material and labor costs.
D) All of the above. |
|
Definition
|
|
Term
7) At ________ of the business process in an organization, value is added in the form of work performed by people associated with that process and new, useful information is generated.
A) some stages
B) successive stages
C) each stage
D) various stages |
|
Definition
|
|
Term
8) Externally focused systems coordinate business activities with:
A) customers.
B) suppliers.
C) business partners.
D) All of the above. |
|
Definition
|
|
Term
9) The key purpose of a(n) ________ system is to streamline the flow of information from one company's operations to another's.
A) intraorganizational
B) operational
C) management information
D) interorganizational
|
|
Definition
|
|
Term
10) Sharing ________ between organizations helps companies to adapt more quickly to changing market conditions.
A) information
B) operations
C) management
D) packages |
|
Definition
|
|
Term
11) ________ can be accomplished by integrating multiple business processes in ways that enable firms to meet a wide range of unique customer needs.
A) Competitive advantage
B) Economies of scale
C) Process reengineering
D) Strategic information planning |
|
Definition
|
|
Term
12) A ________ refers to the flow of information through a set of business activities, in which information flows through functional areas that facilitate the internal activities of the business.
A) flow diagram
B) data warehouse
C) value chain
D) company's inventory |
|
Definition
|
|
Term
13) ________ activities are functional areas within an organization that process inputs and produce outputs.
A) Core
B) Main
C) Secondary
D) Support |
|
Definition
|
|
Term
14) ________ involves the business activities associated with receiving and stocking raw materials, parts and products.
A) Inbound logistics
B) Operations and manufacturing
C) Outbound logistics
D) Marketing and sales |
|
Definition
|
|
Term
15) Support activities include infrastructure, human resources, ________ and procurement.
A) operations and management
B) marketing and sales
C) customer service
D) technology development |
|
Definition
|
|
Term
16) ________ provides the necessary components to facilitate a business process.
A) Technology development
B) Infrastructure
C) Human resources
D) Procurement |
|
Definition
|
|
Term
17) ________ is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them.
A) Technology development
B) Infrastructure
C) Human resources
D) Procurement |
|
Definition
|
|
Term
18) The ________ business activity can leverage information systems by accumulating purchase orders from the different functional areas within the corporation.
A) technology development
B) procurement
C) operations and manufacturing
D) marketing and sales |
|
Definition
|
|
Term
19) A value system is formed when:
A) a company creates additional value by integrating internal applications with suppliers, business partners and customers.
B) companies connect their internal value chains.
C) information flows from one company's value chain to another company's value chain.
D) All of the above. |
|
Definition
|
|
Term
20) An upstream information flow consists of information that:
A) is produced by a company and sent along to another organization.
B) is received from another organization.
C) is produced by one department and sent along to other departments.
D) is passed on to the company's distributors and customers. |
|
Definition
|
|
Term
21) The ________ information flow consists of information that is received from another organization.
A) upstream
B) downstream
C) value system
D) internally-focused |
|
Definition
|
|
Term
22) ________ systems are highly useful for standardized, repetitive tasks such as making entries in a check register.
A) Packaged
B) Stand-alone
C) Expert
D) Custom |
|
Definition
|
|
Term
23) If packaged applications cannot meet the requirements of the business, the managers must conduct a ________ analysis to ensure that taking the custom application approach will prove worthwhile to the company.
A) what-if
B) cost-benefit
C) earned value
D) None of the above. |
|
Definition
|
|
Term
24) ________ applications are systems that focus on the specific needs of individual departments and are not designed to communicate with other systems of the organization.
A) Packaged
B) Custom
C) Stand-alone
D) Internally-focused |
|
Definition
|
|
Term
25) ________ systems are older systems that are close to or at the end of their useful life.
A) Packaged
B) Legacy
C) Conversion
D) Internally-focused |
|
Definition
|
|
Term
26) In most organizations, each department implements applications to assist it with its daily business activities, and as a result, these applications tend to be:
A) similar in each department.
B) infrastructure-specific.
C) run on the same platforms.
D) externally focused. |
|
Definition
|
|
Term
27) If the inbound logistics and operations use different systems, information cannot readily flow between these two departments. This leads to:
A) a highly inefficient process for operations personnel, who must have access to two systems in order to get both the order entry and inventory information.
B) inaccurate and outdated data since inventory information may be stored in both systems.
C) unnecessary costs associated with entering, storing and updating data redundantly.
D) All of the above. |
|
Definition
|
|
Term
28) The process of conversion transfers information stored on legacy systems to a new, integrated computer platform, which typically comes in the form of:
A) Enterprise Resource Planning.
B) Supply Chain Management.
C) Customer Relationship Management.
D) Total Quality Management. |
|
Definition
|
|
Term
29) Customer Relationship Management applications concentrate on the ________ integrating the value chains of a company and its distributors.
A) upstream information flows
B) legacy systems
C) externally focused systems
D) downstream information flows |
|
Definition
|
|
Term
30) If the vanilla version of an ERP system does not support a certain business process, the software may require ________ to accommodate it.
A) customizations
B) integrations
C) differentiations
D) modifications |
|
Definition
|
|
Term
31) Companies must take special care when dealing with customization issues because:
A) customizations can be costly.
B) maintaining and upgrading customizations can be troublesome.
C) new vanilla versions must be continually upgraded to accommodate the customization.
D) All of the above. |
|
Definition
|
|
Term
32) Industry standard business processes are called:
A) workflow management.
B) functional process improvement.
C) best practices.
D) customer relationship management. |
|
Definition
|
|
Term
33) Altering the way in which business processes are conducted is known as:
A) Business Process Management.
B) Supply Chain Management.
C) Customer Relationship Management.
D) Enterprise Resource Planning. |
|
Definition
|
|
Term
34) A radical redesign of an organization is sometimes necessary to:
A) lower costs and increase quality.
B) develop an organizational vision.
C) create best practices.
D) focus on incremental changes. |
|
Definition
|
|
Term
35) Data warehouses are databases that store information:
A) related to a specific department.
B) required for a specific business activity.
C) related to the various business activities of an organization.
D) that is outdated. |
|
Definition
|
|
Term
36) In contrast to ________, ERP applications make accessing information easier by providing a central information repository.
A) legacy systems
B) custom applications
C) packaged applications
D) data warehouses |
|
Definition
|
|
Term
37) MRP stands for:
A) Most Rapid Performance.
B) Multiple Resource Planning.
C) Material Requirements Planning.
D) Material Resource Planning. |
|
Definition
|
|
Term
38) ERP applications that access the data warehouses are designed to have:
A) a different look and feel, depending of the unique needs of a particular department.
B) the same look and feel, regardless of the unique needs of a particular department.
C) a varying look and feel, depending on the needs of the organization.
D) different user interfaces to access different pieces of information. |
|
Definition
|
|
Term
39) Microsoft Word and Microsoft Excel have similar ________ and simply differ in the features and functionality that each application offers.
A) operations screens
B) user interfaces
C) capabilities
D) None of the above. |
|
Definition
|
|
Term
40) Among the most prevailing issues facing management when selecting an ERP application are:
A) control.
B) business requirements.
C) best practices.
D) All of the above. |
|
Definition
|
|
Term
41) Companies typically either opt for ________ control or allow particular business units to govern themselves.
A) distributed
B) decentralized
C) centralized
D) shared |
|
Definition
|
|
Term
42) One of the areas related to control involves the consistency of:
A) business activities.
B) policies and procedures.
C) transactions involved in each department.
D) legacy systems used in each department. |
|
Definition
|
|
Term
43) ERP core components include all of the following EXCEPT:
A) financial management.
B) operations management.
C) human resources management.
D) supply chain management. |
|
Definition
|
|
Term
44) In today's highly competitive markets, ________ hold the balance of power because, if they become dissatisfied with the levels of service they are receiving, there are many alternatives readily available to them.
A) suppliers
B) customers
C) business partners
D) competitors |
|
Definition
|
|
Term
45) Applications focusing on downstream information flows have two main objectivesto attract potential customers and:
A) create customer loyalty.
B) develop and maintain customer satisfaction.
C) achieve competitive advantage.
D) None of the above. |
|
Definition
|
|
Term
46) ________ is a corporate-level strategy concentrating on the downstream information flows.
A) Business Process Management
B) Supply Chain Management
C) Customer Relationship Management
D) Enterprise Resource Planning |
|
Definition
|
|
Term
47) Companies need to have a(n) ________ system that captures information from retail stores, Web sites, call centers and various other ways that organizations can communicate downstream within their value chain.
A) distributed
B) improved
C) integrated
D) internally-focused |
|
Definition
|
|
Term
48) CRM applications are commonly integrated with ERP to leverage ________ information to serve customers.
A) internal
B) external
C) internal or external
D) internal and external |
|
Definition
|
|
Term
49) The National Quality Research Center estimates that a one percent increase in customer satisfaction can lead to a(n) ________ increase in a company's market capitalization.
A) twofold
B) considerable
C) threefold
D) insignificant |
|
Definition
|
|
Term
50) A successful CRM strategy must include:
A) policy and business process changes.
B) customer service changes.
C) employee training changes.
D) All of the above. |
|
Definition
|
|
Term
51) A comprehensive CRM system includes:
A) operational CRM.
B) analytical CRM.
C) collaborative CRM.
D) All of the above. |
|
Definition
|
|
Term
52) Operational CRM is commonly referred to as ________ system.
A) front-office
B) back-office
C) internal
D) external |
|
Definition
|
|
Term
53) Analytical CRM is commonly referred to as ________ system.
A) front-office
B) back-office
C) internal
D) external |
|
Definition
|
|
Term
54) An operational CRM system includes:
A) SFA.
B) EMM.
C) CSS.
D) All of the above. |
|
Definition
|
|
Term
55) ________ applications provide support for the day-to-day sales activities of an organization.
A) Customer Relationship Management
B) Sales Force Automation
C) Supply Chain Management
D) Enterprise Resource Planning |
|
Definition
|
|
Term
56) Successful CSS systems enable:
A) faster response times.
B) increased first-contact resolution rates.
C) improved productivity for service and support personnel.
D) All of the above. |
|
Definition
|
|
Term
57) An Enterprise Marketing Management system provides a comprehensive view of the:
A) competitors.
B) industry trends.
C) environmental factors.
D) All of the above. |
|
Definition
|
|
Term
58) ________ refers to systems for providing effective and efficient communication with the customer from the entire organization.
A) Operational CRM
B) Analytical CRM
C) Collaborative CRM
D) Executional CRM |
|
Definition
|
|
Term
59) At the heart of the ________ is the CIC.
A) operational CRM
B) analytical CRM
C) collaborative CRM
D) executional CRM |
|
Definition
|
|
Term
60) The term ________ is commonly used to refer to the producers of supplies that a company uses.
A) supply network
B) value system
C) supply chain
D) value chain |
|
Definition
|
|
Term
61) A more descriptive term to describe the flow of materials from suppliers to a company is ________ because multiple suppliers are involved in the process of servicing a single organization.
A) supply network
B) value system
C) supply chain
D) value chain |
|
Definition
|
|
Term
62) Problems such as excessive inventories, inaccurate manufacturing capacity plans and missed production schedules can run rampant when:
A) more and more suppliers are involved in a supply network.
B) there is a one-to-one relationship between the supplier and a company.
C) firms within a supply network do not collaborate effectively.
D) multiple suppliers service a single organization. |
|
Definition
|
|
Term
63) Applications focusing on ________ information flows have two main objectivesto accelerate product development and to reduce costs associated with procuring raw materials, components and services from suppliers.
A) internally-focused
B) downstream
C) upstream
D) integrated |
|
Definition
|
|
Term
64) Like ERP and CRM applications, SCM packages are delivered in the form of ________, which companies select and implement according to their business requirements.
A) components
B) solutions
C) modules
D) systems |
|
Definition
|
|
Term
65) Supply chain planning includes all of the following EXCEPT:
A) demand planning and forecasting.
B) distribution planning.
C) production scheduling.
D) supply chain execution. |
|
Definition
|
|
Term
66) SAP's collaborative fulfillment module does NOT include the following functions:
A) committing to delivery dates in real time.
B) fulfilling orders from channels on time with order management, transportation planning and vehicle scheduling.
C) sharing information and integrating processes up and down the supply chain.
D) supporting the entire logistics process, including picking, packing, shipping and international activities. |
|
Definition
|
|
Term
67) The supply chain ________ module in SCM packages allows a company to monitor every stage of the supply chain process, from price quotation to the moment the customer receives the products and issue alerts when problem arise.
A) collaboration
B) event management
C) exchange
D) performance management |
|
Definition
|
|
Term
68) The supply chain ________ module in SCM packages reports key measurements in the supply chain.
A) collaboration
B) event management
C) exchange
D) performance management |
|
Definition
|
|
Term
69) ________ refers to the movement of goods from the supplier to production.
A) Product flow
B) Information flow
C) Data flow
D) Financial flow |
|
Definition
|
|
Term
70) ________ refers to the movement of information along the supply chain.
A) Product flow
B) Information flow
C) Data flow
D) Financial flow |
|
Definition
|
|
Term
71) Supply chain ________ is the extent to which a company's supply chain is focusing on maximizing customer service.
A) effectiveness
B) efficiency
C) integration
D) None of the above. |
|
Definition
|
|
Term
72) Enterprise portals can be defined as ________ through which a business partner accesses secured, proprietary information from an organization.
A) intranets
B) access points
C) back doors
D) tunnels |
|
Definition
|
|
Term
73) ________ automate the business processes involved in selling or distributing products from a single supplier to multiple buyers.
A) Distribution portals
B) Procurement portals
C) Enterprise portals
D) Resource portals |
|
Definition
|
|
Term
74) ________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a supplier and multiple customers
A) Resource portals
B) Procurement portals
C) Distribution portals
D) Enterprise portals |
|
Definition
|
|
Term
75) ________ are designed to automate the business processes that occur before, during and after sales have been transacted between a buyer and multiple suppliers.
A) Procurement portals
B) Resource portals
C) Enterprise portals
D) Distribution portals |
|
Definition
|
|
Term
76) Another term for an electronic marketplace is:
A) trading exchange.
B) trading floor.
C) electronic exchange.
D) multimedia marketplace. |
|
Definition
|
|
Term
77) ________ are operated by third-party vendors, meaning that they are built and maintained by a particular company.
A) Electronic exchanges
B) Trading exchanges
C) Multimedia marketplaces
D) Resource marketplaces |
|
Definition
|
|
Term
78) ________ allows Web page designers to create customized tags that specify how the document should be formatted.
A) HTML
B) XBRL
C) XML
D) W3C |
|
Definition
|
|
Term
79) ________ is an XML-based specification for publishing financial information.
A) HTML
B) XBRL
C) EDI
D) W3C |
|
Definition
|
|
Term
80) ________ technology uses electromagnetic or electrostatic coupling to transmit signals.
A) RFED
B) XBRF
C) XBRL
D) RFID |
|
Definition
|
|
Term
81) ________ RFID tags are small and relatively inexpensive, and typically have a range up to a few feet.
A) Active
B) Passive
C) Simple
D) Basic |
|
Definition
|
|
Term
82) The implementations of enterprise systems are often ________ originally envisioned.
A) more costly and more time consuming than
B) as costly and time consuming as
C) not as effective as
D) less expensive than |
|
Definition
|
|
Term
83) A recent survey suggested that ________ percent of companies that undertake enterprise system implementations do not fully realize the results they had hoped.
A) 10 to 20
B) 30 to 40
C) 40 to 60
D) 60 to 80 |
|
Definition
|
|
Term
84) One of the recommendations related to enterprise system implementations includes taking a ________ approach to implementations.
A) organizational
B) multidisciplinary
C) internally-focused
D) thorough |
|
Definition
|
|
Term
85) The primary reason that enterprise system implementations fail is believed to be a direct result of lack of ________ management support.
A) top-level
B) managerial level
C) organizational level
D) operational level |
|
Definition
|
|
Term
86) ________ is often the most overlooked, underestimated and poorly budgeted expense involved in planning enterprise system implementations.
A) Customization
B) Training
C) Executive sponsorship
D) Help from outside experts |
|
Definition
|
|
Term
87) Enterprise systems affect the entire organization and, thus, companies should include personnel from ________ in the implementation project.
A) different levels in the same department
B) the same level in different departments
C) the executive level
D) different levels and departments |
|
Definition
|
|
Term
1) IS spending in most organizations is controlled by:
A) specific business functions.
B) marketing.
C) human resources.
D) accounting. |
|
Definition
|
|
Term
2) Systems analysis and design involves:
A) designing.
B) building.
C) maintenance.
D) All of the above. |
|
Definition
|
|
Term
3) Organizations should hire systems analyst who:
A) have technical expertise.
B) have management expertise.
C) have technical and management expertise.
D) have financial expertise. |
|
Definition
|
|
Term
4) The programmers' discipline of common methods and techniques is called:
A) systems analysis.
B) software engineering.
C) transforming information systems.
D) systems development. |
|
Definition
|
|
Term
5) The information systems development approach is:
A) open.
B) structured.
C) not hierarchical.
D) undisciplined. |
|
Definition
|
|
Term
6) Systems analysts must become adept at ________ problems into multiple small programs.
A) coding
B) making
C) decomposing
D) turning |
|
Definition
|
|
Term
7) The key to IT project success is:
A) everyone involved with the project performing their jobs.
B) programmers understanding the requirements.
C) users understanding what they want.
D) a close and mutually respectful working relationship between the users and the analysts. |
|
Definition
|
|
Term
8) SDLC is short for:
A) systems development learning cycle.
B) systems deployment learning cycle.
C) systems development life cycle.
D) systems deployment life cycle. |
|
Definition
|
|
Term
9) The five phases of the SDLC in order from first to last are:
A) planning and selection, analysis, design, implementation and maintenance.
B) analysis, planning and selection, design, implementation and maintenance.
C) planning and selection, design, analysis, implementation and maintenance.
D) analysis, design, planning and selection, implementation and maintenance. |
|
Definition
|
|
Term
10) The first phase of the SDLC includes:
A) identification and analysis.
B) design of system.
C) systems analysis.
D) planning and selection. |
|
Definition
|
|
Term
11) The goal of systems planning and selection is:
A) to identify a project from all possible projects that could be performed.
B) to identify and purchase a project from all possible projects that could be performed.
C) to identify and select a project from all possible projects that could be performed.
D) None of the above. |
|
Definition
|
|
Term
12) Some organizations have a formal ________ process whereby a senior manager, a business group, an IS manager, and other committee members identify and assess all possible systems development projects that an organization could undertake.
A) information systems planning
B) steering committee
C) information systems purchasing
D) implementation committee |
|
Definition
|
|
Term
13) Projects identified by top management tend to have a:
A) strategic organizational focus.
B) financial focus.
C) production focus.
D) diverse focus. |
|
Definition
|
|
Term
14) Projects identified by steering committees tend to have a:
A) financial focus.
B) HR focus.
C) cross-functional focus.
D) narrow focus. |
|
Definition
|
|
Term
15) Projects identified by business units tend to have a:
A) financial focus.
B) tactical focus.
C) production focus.
D) HR focus. |
|
Definition
|
|
Term
16) ________ are criteria used by organizations to evaluate whether to accept or reject a project.
A) Strategic alignments and risks
B) Potential benefits and project size
C) Potential costs and resource availability
D) All of the above. |
|
Definition
|
|
Term
17) The purpose of the analysis phase is for:
A) users to formalize the procedures and methods used in performing tasks.
B) designers to gain a thorough understanding of an organization's current way of doing things.
C) designers to layout design procedures.
D) management to determine which features are desired. |
|
Definition
|
|
Term
18) The collection and structuring of ________ is arguably the most important activity in systems development.
A) system requirements
B) system design
C) system implementation
D) system identification |
|
Definition
|
|
Term
19) ________ is the process of gathering and organizing information form users, managers, business processes, and documents to understand how a proposed information system should function.
A) Design analysis
B) Requirements collection
C) System identification
D) None of the above. |
|
Definition
|
|
Term
20) Systems analysts use ________ for collecting system requirements.
A) only interviews and observations
B) only interviews, questionnaires, and observations
C) only interviews, questionnaires, document analysis, and observations
D) interviews, questionnaires, document analysis, observations, and problem decomposition |
|
Definition
|
|
Term
21) ________ is/are important to discover issues, policies and rules as well as concrete examples of the use of data and information in the organization.
A) Interviews
B) Document analysis
C) Observations
D) Questionnaires |
|
Definition
|
|
Term
22) CSF is short for:
A) Crucial Success Function.
B) Crucial Success Factor.
C) Critical Success Function.
D) Critical Success Factor. |
|
Definition
|
|
Term
23) In determining the CSFs of an organization, the analyst must determine:
A) management's CSFs.
B) organizational and individual CSFs.
C) organizational, departmental and individual CSFs.
D) organizational, managerial and departmental CSFs. |
|
Definition
|
|
Term
24) ________ is a special type of group meeting in which all or most of the users meet with the analyst at the same time.
A) Systems analysis
B) Interviews
C) CSF
D) JAD |
|
Definition
|
|
Term
25) ________ are facts that describe people, objects or events.
A) Logic
B) Nouns
C) Data
D) Salient |
|
Definition
|
|
Term
26) Analysts use ________ to collect and describe the data to users, so as to confirm that all needed data are known and presented to uses as useful information.
A) JAD
B) data modeling tools
C) CSF
D) All of the above. |
|
Definition
|
|
Term
27) A type of data model that shows the relationships between entities is a(n):
A) logical diagram.
B) ERD.
C) data flow diagram.
D) ISD. |
|
Definition
|
|
Term
28) ________ represent(s) the movement of data through an organization or within an information system.
A) Processing logic
B) System design
C) System logic
D) Data flows |
|
Definition
|
|
Term
29) ________ represent(s) the way in which data are transformed.
A) Processing logic
B) System design
C) System logic
D) Data flows |
|
Definition
|
|
Term
30) The steps and procedures which transform raw data inputs into new or modified information are/is the:
A) processing operation.
B) processing and logic operations.
C) database management system.
D) files. |
|
Definition
|
|
Term
31) Analysts must identify the following key elements before they develop designs for an information system:
A) data flows, data, and processing logic.
B) data, data flows, and ERDs.
C) data flows, data, ERDs, and processing logic.
D) data, data flows, requirements, and processing logic. |
|
Definition
|
|
Term
32) During the ________ phase the details of the chosen approach are developed.
A) processing logic
B) system design
C) system logic
D) data flows |
|
Definition
|
|
Term
33) The elements that must be designed when building a system include:
A) forms, reports and databases.
B) interfaces and dialogues.
C) processing and logic.
D) All of the above. |
|
Definition
|
|
Term
34) A ________ is a business document containing some predefined data and often some spaces for additional information.
A) form
B) report
C) dialogue
D) file
|
|
Definition
|
|
Term
35) A ________ is a business document containing only predefined data.
A) form
B) report
C) dialogue
D) file |
|
Definition
|
|
Term
36) Interfaces that enable the user to select pictures, icons, and menus to send instructions to the computer are referred to as:
A) database systems.
B) GUIs.
C) information system software.
D) files. |
|
Definition
|
|
Term
37) After the conceptual model has been completed using an entity-relation diagram, it can be easily translated into a physical data model in a:
A) form.
B) report.
C) database management system.
D) file. |
|
Definition
|
|
Term
38) One way of representing the logic and steps needed to perform calculations is to use:
A) flow charts.
B) hierarchy charts.
C) P-charts.
D) pseudocode. |
|
Definition
|
|
Term
39) Some of the activities which take place during this phase include: system conversion, software programming and testing, documentation, training and support.
A) System implementation
B) System design
C) Programming
D) System logic |
|
Definition
|
|
Term
40) ________ is the processes of transforming the system design into a working computer system.
A) Processing logic
B) System design
C) Programming
D) System logic |
|
Definition
|
|
Term
41) ________ is testing correctness of individual models and the integration of multiple modules.
A) Alpha testing
B) Beta testing
C) Developmental testing
D) Systems testing |
|
Definition
|
|
Term
42) ________ is testing the overall system to see whether it meets design requirements.
A) Alpha testing
B) Beta testing
C) Developmental testing
D) Systems testing |
|
Definition
|
|
Term
43) ________ is testing of the capabilities of the system in the user environment with actual data.
A) Alpha testing
B) Beta testing
C) Developmental testing
D) Systems testing |
|
Definition
|
|
Term
44) In addition to having good communication skills and being good at problem solving, support personnel must also:
A) understand the business processes.
B) have programming skills.
C) be expert users of the system.
D) be a developer. |
|
Definition
|
|
Term
45) The process of decommissioning the current system and installing the new system in the organization is called:
A) systems converting.
B) systems conversion.
C) systems contracting.
D) systems analysis. |
|
Definition
|
|
Term
46) The four types of software conversion strategies include:
A) parallel, direct, phased, and pilot.
B) identification, analysis, implementation, and maintenance.
C) reference, discontinued, installation, single location.
D) reuse, discontinued, implementation, single location. |
|
Definition
|
|
Term
47) After an information system is installed it is in the:
A) analysis phase.
B) development phase.
C) testing phase.
D) maintenance phase. |
|
Definition
|
|
Term
48) Who is usually responsible for collecting maintenance requests from systems users after the new system has been installed?
A) A member of the development team
B) Help desk personnel
C) Information center personnel
D) All of the above. |
|
Definition
|
|
Term
49) It is during the ________ that the largest part of the system development occurs.
A) analysis phase
B) development phase
C) testing phase
D) maintenance phase |
|
Definition
|
|
Term
50) The four types of system maintenance referenced in the book are:
A) developmental, corrective, perfective and preventative.
B) corrective, adaptive, perfective and preventative.
C) developmental, corrective, adaptive and preventative.
D) developmental, adaptive, perfective and preventative. |
|
Definition
|
|
Term
51) ________ maintenance is making changes to an information system to repair flaws in the design, coding or implementation.
A) Corrective
B) Adaptive
C) Perfective
D) Preventative |
|
Definition
|
|
Term
52) ________ maintenance is making changes to an information system to reduce the chance of future system failure.
A) Corrective
B) Adaptive
C) Perfective
D) Preventative |
|
Definition
|
|
Term
53) ________ maintenance is making changes to an information system to evolve its functionality to accommodate changing business needs or to migrate it to a different operating environment.
A) Corrective
B) Adaptive
C) Perfective
D) Preventative |
|
Definition
|
|
Term
54) Making enhancements to improve processing performance or interface usability, or adding desired but not necessarily required systems features is:
A) corrective maintenance.
B) adaptive maintenance.
C) perfective maintenance.
D) preventative maintenance. |
|
Definition
|
|
Term
55) This type of systems development methodology uses a trial and error approach for discovering how a system could operate.
A) Prototyping
B) RAD
C) JAD
D) Object-oriented analysis and design |
|
Definition
|
|
Term
56) Using this type of development methodology the people building the system and the users of the system keep cycling between user design and construction until the system is complete.
A) Prototyping
B) RAD
C) JAD
D) Object-oriented analysis and design |
|
Definition
|
|
Term
57) ________ tools are used to structure and develop prototypes quickly.
A) Prototyping
B) CASE
C) JAD
D) Object-oriented analysis and design |
|
Definition
|
|
Term
58) Using this type of development methodology, analysts identify common modules that combine the data and the operations to be performed.
A) Prototyping
B) RAD
C) JAD
D) Object-oriented analysis and design |
|
Definition
|
|
Term
59) This approach enables the reuse of common modules.
A) Prototyping
B) RAD
C) CASE
D) Object-oriented analysis and design |
|
Definition
|
|
Term
60) A common reason for organizations not building their own IS systems is:
A) limited IS staff.
B) IS staff has limited skills.
C) IS staff is overworked.
D) All of the above. |
|
Definition
|
|
Term
61) A common alternative to in-house systems development is:
A) external acquisition.
B) outsourcing.
C) end-user development.
D) All of the above. |
|
Definition
|
|
Term
62) A common evaluative tool when using ________ is to ask the vendors to set up their system so that you and your colleagues can "test drive" the system.
A) external acquisition
B) outsourcing
C) end-user development
D) All of the above. |
|
Definition
|
|
Term
63) This type of acquisition has been described to be similar to purchasing a car.
A) External acquisition
B) Outsourcing
C) End-user development
D) All of the above. |
|
Definition
|
|
Term
64) A(n) ________ is a report which tells your vendors what your requirements are and to invite them to provide information about how they might be able to meet your requirements.
A) proposition
B) RFP
C) performa
D) purchase order |
|
Definition
|
|
Term
65) This is used when you want to evaluate a proposed system to determine how long it takes to perform a specific task that will be required in your particular application.
A) Performance test
B) Benchmarking program
C) Test drive
D) Evaluation test |
|
Definition
|
|
Term
66) Which of the following is not a commonly used criteria for evaluating software?
A) Memory requirements
B) Training and documentation
C) Access time
D) Maintenance and repair |
|
Definition
|
|
Term
67) ________ is the practice of turning over responsibility of some or all of the organization's information system development and operations to an outside firm.
A) External acquisition
B) Outsourcing
C) End-user development
D) All of the above. |
|
Definition
|
|
Term
68) Organizations may elect to outsource because of:
A) cost and quality concerns.
B) supplier pressures.
C) downsizing.
D) All of the above. |
|
Definition
|
|
Term
69) Organizations may elect to outsource because of:
A) tension between end users and the in-house IS staff.
B) political and/or organizational problems.
C) BPR or simplifying
D) All of the above. |
|
Definition
|
|
Term
70) The single most important factor of an ongoing outsourcing alliance is:
A) ongoing management.
B) costs.
C) personal relationships.
D) organizational culture. |
|
Definition
|
|
Term
71) Most organizations enter outsourcing relationships through:
A) strictly legal contracts.
B) personal relationships
C) mutually beneficial relationships with strategic partners.
D) recommendations from other organizations. |
|
Definition
|
|
Term
72) The types of outsourcing relationships identified are:
A) basic, preferred and strategic.
B) incidental, preferred and strategic.
C) basic, incidental and strategic.
D) basic, preferred and incidental. |
|
Definition
|
|
Term
73) Organizations should try to have a few ________ outsourcing relationships, in which the buyer and the supplier set preferences and prices to the benefit of each other.
A) basic
B) incidental
C) preferred
D) strategic |
|
Definition
|
|
Term
74) In many organizations, the growing number of sophisticated information systems users allows the IS managers the option of allowing:
A) external acquisition.
B) outsourcing.
C) end-user development.
D) All of the above. |
|
Definition
|
|
Term
75) Departments can speed up development of systems by having ________ perform the required development tasks.
A) consultants
B) programmers
C) managers
D) end-users |
|
Definition
|
|
Term
76) Currently, ________ costs constitute the majority of overall systems costs.
A) user
B) hardware
C) software
D) management |
|
Definition
|
|
Term
78) One of the major drawbacks to end-user development is:
A) speed.
B) lack of continuity.
C) quality.
D) end-user tools. |
|
Definition
|
|
Term
79) Which is considered a fourth-generation tool?
A) Personal computer tools
B) Query language generators
C) Graphics generators
D) All of the above. |
|
Definition
|
|
Term
1) Futurist author Alvin Toffler describes three "waves of change." The third, and biggest wave of change to occur is the:
A) Information Age.
B) Industrial Revolution.
C) Agriculture and Handwork Age.
D) Modern Age. |
|
Definition
|
|
Term
2) During the Third Wave, ________ became the common currency.
A) food
B) money
C) the Internet
D) information |
|
Definition
|
|
Term
3) People feeling threatened by and protesting against or destroying technology are called:
A) luddites
B) technophites
C) neophites
D) netophites |
|
Definition
|
|
Term
4) Progress during the ________ brought about change in the mechanized society, educational, business, social, and religious institutions.
A) Industrial Revolution
B) Information Age
C) Agriculture and Handwork Age
D) Space Age |
|
Definition
|
|
Term
5) Knowing how to use a computer can open up myriad sources of information to those who have learned how to use the computer as a device to gather, store, organize, and otherwise process information. This is called:
A) computer literacy.
B) computer competency.
C) computer ability.
D) computer comprehension. |
|
Definition
|
|
Term
6) ________ is an attribute possessed by someone who knows how to use a computer.
A) Computer literacy
B) Computer competency
C) Computer ability
D) Computer comprehension |
|
Definition
|
|
Term
7) ________ is the ability to independently learn new technologies as they emerge and assess their impact on one's work and life.
A) Computer literacy
B) Computer competency
C) Computer ability
D) Computer fluency |
|
Definition
|
|
Term
8) The book describes populations in terms of those people who know how to use a computer and those who do not. The people who do not know how to use a computer are described as the:
A) information haves.
B) information have-nots.
C) information don't haves.
D) information needy. |
|
Definition
|
|
Term
9) The ________ is the biggest wave of change according to Alvin Toffler.
A) Agriculture and Handwork
B) Industrial Revolution
C) Information Age
D) Space Age |
|
Definition
|
|
Term
10) The digital divide is a term that refers to the:
A) gap between those individuals who have access to digital telephone technology and those who do not.
B) gap between those individuals who have access to digital television technology and those who do not.
C) gap between those computer literate individuals who have access to digital information resources (e.g., the Internet) and those who do not.
D) gap between those individuals who have access to information resources and those who do not. |
|
Definition
|
|
Term
11) The digital divide in the United States is:
A) growing rapidly.
B) growing slowly.
C) shrinking slowly.
D) shrinking rapidly. |
|
Definition
|
|
Term
12) Given the strong linkage between access to computers, computer literacy, and a person's ability to compete in the Information Age, ________ is one of the major ethical challenges facing society today.
A) Information Age
B) computer literacy
C) computer fluency
D) the digital divide |
|
Definition
|
|
Term
13) In an attempt to shrink the digital divide, a global project called ________ is attempting to distribute very low-cost laptop computers to children in developing countries around the world.
A) One Laptop Per Child (OLPC)
B) Luddites
C) Low-Cost Laptops (LCLT)
D) Bridging the Digital Divide |
|
Definition
|
|
Term
14) Central to information systems ethics are:
A) information privacy and information property.
B) information accuracy and culture control.
C) information accessibility and culture control.
D) information property and information technology. |
|
Definition
|
|
Term
15) When one describes the issues and standards of conduct associated with the use of information systems, one is discussing:
A) computer ethics.
B) computer crime.
C) computer civility.
D) computer hacking. |
|
Definition
|
|
Term
16) An issue central to the debate on computer ethics is:
A) information privacy.
B) information accuracy.
C) information property.
D) All of the above. |
|
Definition
|
|
Term
17) ________ is concerned with what information an individual should have to reveal to others in the workplace or through other transactions, such as online shopping.
A) Information privacy
B) Information accuracy
C) Information property
D) All of the above. |
|
Definition
|
|
Term
18) Information privacy is a term that describes what ________ an individual should have to reveal to others in the course of conducting transactions or accepting employment.
A) credit records
B) crime records
C) information
D) None of the above. |
|
Definition
|
|
Term
19) ________ is the stealing of another person's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and otherwise run up debts that are never repaid.
A) Information theft
B) Identity theft
C) Computer theft
D) Information resource theft |
|
Definition
|
|
Term
20) One of the fastest growing "information" crimes in recent years has been:
A) information theft.
B) identity theft.
C) computer theft.
D) information resource theft. |
|
Definition
|
|
Term
21) ________ is concerned with what information an individual should have to reveal to employers.
A) Computer ethics
B) Information privacy
C) Identity theft
D) Information theft |
|
Definition
|
|
Term
22) According to the Consumer Protection Working Group of the American Bar Association, a seller's privacy policy should indicate at least the following:
A) what information the seller is gathering from you.
B) how the seller will use this information.
C) whether and how you can "opt out" of these practices.
D) All of the above. |
|
Definition
|
|
Term
23) You can maintain your privacy while shopping online by:
A) choosing monitored Web sites.
B) removing cookies from your computer.
C) visiting sites anonymously.
D) All of the above. |
|
Definition
|
|
Term
24) ________ is concerned with ensuring the authenticity and fidelity of information as well as with identifying who is responsible for informational errors that harm people.
A) Information accessibility
B) Information assurance
C) Information accuracy
D) Information assertiveness |
|
Definition
|
|
Term
25) ________ must be concerned with the integrity of data.
A) Information system designers
B) Information system developers
C) Data entry workers
D) Everyone |
|
Definition
|
|
Term
26) The top ten dot-cons listed by the Federal Trade Commission include:
A) real estate fraud.
B) web domain sales.
C) Internet auctions.
D) information acquisition. |
|
Definition
|
|
Term
27) ________ focuses on who owns information about individuals and how information can be sold and exchanged.
A) Personal data
B) Information sensitivity
C) Information property
D) Information gathering |
|
Definition
|
|
Term
28) ________ is unsolicited e-mail that promotes a product or service.
A) Cookies
B) Spyware
C) Spam
D) None of the above. |
|
Definition
|
|
Term
29) ________ is any software that covertly gathers information about a user though an Internet connection without the user's knowledge.
A) A viruses
B) A worms
C) Spyware
D) Adware |
|
Definition
|
|
Term
30) ________ is electronic junk mail or junk newsgroup postings, usually for the purpose of advertising some product and/or service.
A) Spim
B) Spam
C) Spyware
D) Adware |
|
Definition
|
|
Term
31) A(n) ________ is a message passed to a Web browser on a user's computer by a Web server, that is then stored in a text file by the browser; that message is sent back to the server each time the user's browser requests a page from that server.
A) identifier
B) cookie
C) message
D) text file |
|
Definition
|
|
Term
32) A(n) ________ is used by a Web page to store information about a user on the user's computer, so as to provide the user with personalized information on the next visit.
A) identifier
B) cookie
C) message
D) text file |
|
Definition
|
|
Term
33) ________ is a small text file on your computer that stores information about your Web-browsing activity at a particular site.
A) A cookie
B) Spyware
C) Spam
D) Spim
|
|
Definition
|
|
Term
34) ________ is software that runs on your computer, collecting information which is then transmitted to another party.
A) Cookies
B) Spyware
C) Spam
D) Spim |
|
Definition
|
|
Term
35) ________ is a special type of technology that collects information about a person in order to customize Web browser banner advertisements.
A) Spyware
B) Adware
C) Cookies
D) Spam |
|
Definition
|
|
Term
36) ________ the dubious practice of registering a domain name, then trying to sell the name to the person, company, or organization most likely to want it.
A) Spyware
B) Cybersquatting
C) Phishing
D) Spamming |
|
Definition
|
|
Term
37) ________ is a term that describes what information a person or an organization has the right to obtain about others and how this information can be accessed and used in the future.
A) Information accessibility
B) Information assurance
C) Information retrieval
D) Information acquisition |
|
Definition
|
|
Term
38) ________ is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
A) Digital Rights Management
B) Data assurance
C) Water marking
D) Information securing |
|
Definition
|
|
Term
39) ________ restrictions include which devices will play the media, how many devices the media will play on, and even how many times the media can be played.
A) Digital Rights Management
B) Data assurance
C) Water marking
D) Information securing |
|
Definition
|
|
Term
40) To prevent illegal sharing of DRM-free content, media is often ________ so that any illegal copy can be traced to the original purchaser.
A) Digital Rights Management (DRM)ed
B) data assuranced
C) watermarked
D) information secured |
|
Definition
|
|
Term
41) E-mail privacy is:
A) protected by law.
B) not protected by law.
C) a thing of the past.
D) not something people are concerned with. |
|
Definition
|
|
Term
42) In 2005, the FBI abandoned ________ , which was software that allowed Internet traffic to be monitored.
A) T-Rex
B) Carnivore
C) DRM
D) Blue Steel |
|
Definition
|
|
Term
43) ECPA is an acronym that refers to the:
A) Electronic Controls Privacy Act.
B) Electronic Communications Privacy Act.
C) E-Commerce Customer Protection Association.
D) Electric Computer Protection Agency. |
|
Definition
|
|
Term
44) The ECPA offers stronger support for the privacy of ________ communications than for the privacy of electronic mail communications.
A) paper mail
B) voice mail
C) facsimile
D) None of the above. |
|
Definition
|
|
Term
45) Related to ethical computer use, many behaviors may not be illegal, but nevertheless unethical. Examples of this behavior include all of the following EXCEPT:
A) using computer time at work to read personal e-mail.
B) organizations compiling personal information about shopping habits.
C) the government regulating computer crimes.
D) using technology to rearrange photographs. |
|
Definition
|
|
Term
46) Companies can do many things to more ethically use technologies. All of the following would be good ways to achieve this EXCEPT:
A) devise guidelines for ethical use of technology.
B) be prudent and open about their e-mail monitoring.
C) have written rules regarding any monitoring that they do.
D) compile information on Web preferences of customers for internal use only. |
|
Definition
|
|
Term
47) The Computer Ethics Institute's responsible computer use guidelines prohibit all of the following EXCEPT:
A) using a computer to harm others.
B) snooping in other people's files.
C) providing assistance to others with the use of a computer.
D) appropriating other people's intellectual output. |
|
Definition
|
|
Term
48) ________ is defined as the act of using a computer to commit an illegal act.
A) Computer bad will
B) Computer crime
C) Computer misuse
D) Computer abuse |
|
Definition
|
|
Term
49) The guidelines for ethical use of computers published by the Computer Ethics Institute prohibit:
A) using a computer for shopping at work
B) using a computer to harm others
C) using a computer to view inappropriate websites
D) None of the above. |
|
Definition
|
|
Term
50) Responsible computer use includes:
A) not using a computer to harm others.
B) not snooping in other persons' files.
C) not using a computer to steal.
D) All of the above. |
|
Definition
|
|
Term
51) Responsible computer use includes:
A) thinking about the social consequences of your programs.
B) appropriating other people's intellectual output.
C) interfering with other persons' computer work.
D) None of the above. |
|
Definition
|
|
Term
52) Most organizations ________ report their incidents of computer crimes.
A) under
B) over
C) do not
D) accurately |
|
Definition
|
|
Term
53) Unauthorized access means that the person who has gained entry to a computer system has ________ to use such computer access.
A) authority
B) permission
C) rights
D) no authority |
|
Definition
|
|
Term
54) The global reach of computer networks has raised concerns over:
A) copyrights.
B) privacy.
C) security.
D) All of the above. |
|
Definition
|
|
Term
55) The Electronic Communications Privacy Act of 1986 makes it a crime to ________ any electronic communications service, including telephone services.
A) copy
B) view
C) break into
D) record |
|
Definition
|
|
Term
57) ________ is the use of formal investigative techniques to evaluate digital information for judicial review.
A) DRM
B) Carnivore
C) OLPC
D) Computer forensics |
|
Definition
|
|
Term
58) The term "hacker" was first coined in the 1960s, and it was originally used to describe MIT students who were expert computer users and programmers who roamed freely through computer systems out of:
A) curiosity.
B) malicious intent.
C) boredom.
D) None of the above. |
|
Definition
|
|
Term
59) Examples listed in the book of computer crimes include:
A) using the computer to steal money.
B) using a computer to perpetrate a deception for money.
C) falsely advertising merchandise for sale on a Web site auction.
D) All of the above. |
|
Definition
|
|
Term
60) The majority of unlawful intrusions into computer systems are made by:
A) outside computer hackers.
B) employees.
C) competitors.
D) terrorists. |
|
Definition
|
|
Term
61) Persons who plant destructive programs in computer systems and then threaten to activate them if a ransom is not paid are called:
A) computer hackers.
B) cyberterrorists.
C) cybervandals.
D) predators. |
|
Definition
|
|
Term
62) Persons who plant viruses are called:
A) computer hackers.
B) cyberterrorists.
C) vandals.
D) predators. |
|
Definition
|
|
Term
63) Which of the following is not an example of a computer crime as listed in the textbook?
A) Data diddling
B) Salami slicing
C) Piggybacking
D) Cold calling |
|
Definition
|
|
Term
64) Salami slicing is a special type of:
A) phreaking.
B) spoofing.
C) social networking.
D) data diddling. |
|
Definition
|
|
Term
65) Crimes committed against telephone company computers are an example of:
A) phreaking.
B) spoofing.
C) data diddling.
D) carding. |
|
Definition
|
|
Term
66) ________ requires no technical expertise, but involves looking for papers that contain useful information.
A) Phreaking
B) Dumpster diving
C) Social engineering
D) Data diddling |
|
Definition
|
|
Term
67) Spoofing is a type of computer crime, and it is a scam that is used to steal the ________ of legitimate users' computer accounts.
A) passwords
B) company's names
C) people's names
D) None of the above. |
|
Definition
|
|
Term
68) ________ is the term that describes the legal purchase of one copy of a software application, followed by the illegal copying and distribution of that same software application.
A) Software piracy
B) Software stealing
C) Software borrowing
D) Software use |
|
Definition
|
|
Term
69) The slang term for stolen software is:
A) hackerware.
B) warez.
C) vaporware.
D) discountware. |
|
Definition
|
|
Term
70) Software piracy is a(n):
A) ethical issue.
B) crime.
C) economic problem.
D) All of the above. |
|
Definition
|
|
Term
71) The ________ contained within a Trojan horse are hidden such that the computer appears to function normally.
A) pathogens
B) instructions
C) Trojan horse's author's name
D) guide |
|
Definition
|
|
Term
72) Logic bombs and time bombs are variations of:
A) worms.
B) viruses.
C) Trojan horses.
D) dust bunnies. |
|
Definition
|
|
Term
73) Logic bombs are set off by:
A) specific dates.
B) specific times.
C) specific user operations.
D) None of the above. |
|
Definition
|
|
Term
74) To help protect your valuable computer files, make backups of your files in case you receive a(n) ________ that erases files from your hard drive.
A) virus
B) worm
C) cricket
D) macrophage |
|
Definition
|
|
Term
75) ________ broadly refers to the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress.
A) Cyberbattles
B) Cyberterrorism
C) Social engineering
D) Cyber harassment |
|
Definition
|
|
Term
76) ________ is the term used to describe the attempt by a country's military to disrupt the communications system of another country.
A) Cyberbattles
B) Cyberterrorism
C) Social engineering
D) Cyberwar |
|
Definition
|
|
Term
77) In a cyberwar, technologies might be used to do all of the following EXCEPT:
A) electronically blind the other side.
B) diminish the capability of communications systems.
C) interfere with troop and weapon positioning systems.
D) Technologies may be used for all of the above. |
|
Definition
|
|
Term
78) Cyberterrorism is launched by:
A) governments.
B) individuals.
C) social engineering.
D) computers. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|