; practice2
Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out
Your Federal Quarterly Tax Payments are due April 15th Get Help Now >>

practice2

VIEWS: 30 PAGES: 34

  • pg 1
									Exam
Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
     1. A characteristic or quality describing an entity is called a(n):                            1. _______
          A) attribute.
          B) key field.
          C) tuple.
          D) field.
        Answer: A
         Diff: 1      Page Ref: 230



       2. The data hierarchy goes from bits and bytes to:                                                      2. _______
            A) fields, records, files, and databases.
            B) entities, attributes, fields, and records.
            C) records, entities, fields, and databases.
            D) fields, attributes, entities, and records.
          Answer: A
         Diff: 1      Page Ref: 230



       3. In a ________ database, parts of the database are stored and maintained physically in one            3. _______
          location and other parts are stored and maintained in other locations.
             A) fragmented
             B) contiguous
             C) split
             D) partitioned
          Answer: D
         Diff: 1      Page Ref: 242



       4. The type of logical database model that treats data as if they were stored in two-dimensional        4. _______
          tables is the:
            A) network DBMS.
             B) hybrid DBMS.
             C) relational DBMS.
            D) hierarchical DBMS.
          Answer: C
         Diff: 1      Page Ref: 236



       5. Activities for detecting and correcting data in a database or file that are incorrect, incomplete,   5. _______
          improperly formatted, or redundant are called:
            A) data cleansing.
            B) data auditing.
            C) data fragmentating.
            D) data verifying.
          Answer: A
         Diff: 1      Page Ref: 244



       6. The popular specification for transferring information between a Web server and a program            de signed
to accept 6.                                                                                                   __
and                                                                                                            __
return                                                                                                         __
data is:                                                                                                       _
            A) Java.
            B) CGI.
            C) SQL.
            D) HTML.
          Answer: B
          Diff: 1     Page Ref: 249



       7. The main technique for multidimensional reporting is:                                                7. _______
            A) multiple relationships in large quantities of data.
            B) OLAP.
            C) SQL.
            D) data mining.
          Answer: B
          Diff: 1     Page Ref: 245



       8. AOLbyPhone is an example of a(n):                                                                    8. _______
            A) voice portal.
            B) wireless portal.
            C) m-commerce portal.
            D) e-commerce portal.
          Answer: A
          Diff: 1     Page Ref: 321



       9. Cellular phones work by using ________ to communicate.                                               9. _______
            A) infrared
            B) microbrowsers
            C) fiber optics
            D) radio waves
          Answer: D
          Diff: 1     Page Ref: 308



      10. One or more access points positioned on a ceiling, wall, or other strategic spot in a public place   10. ______
          to provide maximum wireless coverage for a specific area are referred to as:
             A) casting spots.
             B) laser spots.
             C) infrared spots.
             D) hotspots.
          Answer: D
          Diff: 1     Page Ref: 314



      11. WAP uses Wireless Markup Language (WML), which is based on ________ and is optimized for             11. ______
          tiny displays.
             A) artificial intelligence
             B) fuzzy logic
     C) Extensible Markup Language
     D) Java applets
   Answer: C
   Diff: 1     Page Ref: 310



12. Second-generation (2G) wireless cellular would be best described as a(n):                        12. ______
      A) analog circuit-switched network for voice communication.
       B) interim step toward 3G in the United States.
      C) high-speed, mobile, supports video and other rich media.
      D) digital wireless network, primarily for voice communication.
    Answer: D
   Diff: 1     Page Ref: 310



13. These systems beep when the user receives a short alphanumeric message, and are often used       13. ______
    for communicating with mobile workers:
      A) microbrowser.
       B) low-earth orbit.
       C) paging.
      D) RFID.
    Answer: C
   Diff: 1     Page Ref: 308



14. Automated toll-collection systems use these types of RFID tags:                                  14. ______
      A) passive.
      B) reactive.
      C) receptive.
      D) active.
    Answer: D
   Diff: 1     Page Ref: 325



15. A ________ connects two LANS based on different technologies.                                    15. ______
      A) hub
      B) router
      C) bridge
      D) hotspot
    Answer: C
   Diff: 1     Page Ref: 313



16. EV-DO provides wireless access to the Internet over a cellular network at an average speed of:   16. ______
      A) 300 - 500 Kbps.
      B) 10 - 19 Kbps.
      C) 54 - 144 Kbps.
      D) 144 Kbps - 2+ Mbps.
    Answer: A
   Diff: 1     Page Ref: 317



17. The main security problem on the Internet is:                                                    17. ______
     A) Microsoft.
     B) wireless transmission.
     C) hackers.
     D) inadequate bandwidth.
   Answer: C
   Diff: 1      Page Ref: 346



18. All of the methods, policies, and organizational procedures that ensure the safety of the            18. ______
    organization's assets, the accuracy and reliability of its accounting records, and operational
    adherence to management standards refers to:
      A) legacy systems.
       B) controls.
      C) SSID standards.
      D) vulnerabilities.
    Answer: B
   Diff: 1      Page Ref: 342



19. Software controls:                                                                                   19. ______
      A) ensure that computer hardware is physically secure and check for equipment malfunction.
      B) ensure that valuable business data files on either disk or tape are not subject to
         unauthorized access, change, or destruction while they are in use or in storage.
      C) audit the systems development process at various points to ensure that the processes are
         properly controlled and managed.
      D) monitor the use of systems software and prevent unauthorized access to software
         programs, systems software and computer programs.
    Answer: D
   Diff: 1      Page Ref: 356



20. ________ use scanning software to look for known problems such as bad passwords, the                 20. ______
    removal of important files, security attacks in progress, and system administration errors.
      A) Stateful inspections
      B) Proxies
      C) Encryption programs
      D) Intrusion detection systems
    Answer: D
   Diff: 1      Page Ref: 364



21. General controls:                                                                                    21. ______
      A) ensure that data files on either disk or tape are not subject to unauthorized access, change,
         or destruction.
      B) establish a framework for controlling the design, security, and use of computer programs
         throughout the organization.
      C) are unique to each computer program.
      D) audit the systems development process.
    Answer: B
   Diff: 1      Page Ref: 355



22. Reporting distribution logs use ________ controls.                                                   22. ______
     A) administrative
     B) processing and output
     C) input
     D) output
   Answer: D
   Diff: 1      Page Ref: 356



23. Software controls:                                                                                   23. ______
      A) ensure that computer hardware is physically secure.
      B) ensure that programmed procedures are consistently and correctly applied to the storage
         and processing of data.
      C) perform overall control functions for the programs that directly process data and data files.
      D) ensure that data files are not subject to unauthorized access, change, or destruction while
         they are in use or in storage.
    Answer: C
   Diff: 1      Page Ref: 356



24. Hardware controls:                                                                                   24. ______
      A) audit the systems development process at various points to ensure that the processes are
         properly controlled and managed.
      B) oversee the work of the computer department to ensure that programmed procedures are
         consistently and correctly applied to the storage and processing of data.
      C) monitor the use of systems software and prevent unauthorized access to software
         programs, systems software and computer programs.
      D) ensure that computer hardware is physically secure and check for equipment malfunction.
    Answer: D
   Diff: 1      Page Ref: 356



25. The Internet poses specific security problems because:                                               25. ______
      A) it was designed to be easily accessible.
      B) it changes so rapidly.
      C) everyone uses it.
      D) no one owns it.
    Answer: A
   Diff: 1      Page Ref: 342



26. Large amounts of data stored in electronic form are ________ than the same data in manual            26. ______
    form.
      A) more critical to most businesses
       B) more secure
       C) vulnerable to many more kinds of threats
      D) less vulnerable to damage
    Answer: C
   Diff: 1      Page Ref: 342



27. Which of the following deals with employee issues that are closely related to CRM, such as           27. ______
    setting objectives, employee performance management, performance-based compensation, and
    employee training?
     A) customer relationship management software
     B) enterprise systems software
     C) employee relationship management software
     D) supply chain management software
   Answer: C
   Diff: 1      Page Ref: 394



28. Cross-selling in which a combination of products is sold as a bundle at a price lower than the     28. ______
    total cost of the individual products best describes:
       A) collaborative marketing.
       B) discount selling.
       C) up-selling.
       D) bundling.
    Answer: D
   Diff: 1      Page Ref: 395



29. This company is the market-leading vendor of customer relationship management software:            29. ______
      A) IBM.
      B) J. D. Edwards.
      C) Microsoft.
      D) Siebel Systems.
    Answer: D
   Diff: 1      Page Ref: 395



30. The marketing of elevated-value products or services to new or existing customers is referred to   30. ______
    as:
       A) up-selling.
        B) discount selling.
       C) bundling.
       D) cross over selling.
    Answer: A
   Diff: 1      Page Ref: 395



31. One of the largest players specializing in the development of semistructured knowledge systems     31. ______
    is a Canadian software company known as:
       A) Purple Martin.
        B) Hummingbird.
       C) Blue Bird.
       D) Red Robin.
    Answer: B
   Diff: 1      Page Ref: 425



32. Investment workstations:                                                                           32. ______
      A) provide engineers, designers, and factory managers with precise control over industrial
          design and manufacturing.
       B) allow groups to work together on documents.
      C) provide an important source of expertise for organizations.
      D) are high-end PCs used in the financial sector to analyze trading situations instantaneously
and facilitate portfolio management.
           Answer: D
         Diff: 1      Page Ref: 435



      33. External industry standards, standards set by other companies, and/or internally developed high   33. ______
          standards are used to set up:
             A) six sigma installation.
             B) workflow management.
             C) total quality management.
             D) benchmarking procedures.
          Answer: D
         Diff: 1      Page Ref: 506



      34. Object-oriented development could potentially reduce the time and cost of writing software        34. ______
          because:
            A) iterative prototyping is not required.
            B) a graphical interface is automatic.
            C) object-oriented programming requires less training.
            D) objects are reusable.
          Answer: D
         Diff: 1      Page Ref: 514



      35. In the traditional systems life cycle, end users:                                                 35. ______
             A) are important and ongoing members of the team from the original analysis phase through
                maintenance.
             B) have no input.
             C) are important only in the testing phases.
             D) are limited to providing information requirements and reviewing the technical staff's
                work.
          Answer: D
         Diff: 1      Page Ref: 517-518



      36. In the direct cutover conversion strategy, the new system:                                        36. ______
             A) replaces the old one at an appointed time.
             B) is tested by an outsourced company.
             C) and the old are run together.
             D) is introduced to a limited area until it is proven to work properly.
          Answer: A
         Diff: 1      Page Ref: 510



      37. In the parallel conversion strategy, the new system:                                              37. ______
             A) and the old are run together.
             B) is introduced to a limited area until it is proven to work properly.
             C) is tested by an outsourced company.
             D) replaces the old one at an appointed time.
          Answer: A
         Diff: 1      Page Ref: 510
38. The primary tool for representing a system's component processes and the flow of data between       38. ______
    them is the:
      A) data flow diagram.
       B) data dictionary.
       C) user documentation.
      D) knowledge base.
    Answer: A
   Diff: 1     Page Ref: 512



39. When systems are created rapidly, without a formal development methodology:                         39. ______
      A) hardware, software, and quality standards are less important.
      B) testing and documentation may be inadequate.
      C) end users can take over the work of IT specialists.
      D) the organization quickly outgrows the new system.
    Answer: B
   Diff: 1     Page Ref: 519



40. Web services use:                                                                                   40. ______
      A) a proprietary architecture.
      B) joint application development.
      C) a "plug and play" architecture.
      D) rapid application development.
    Answer: C
   Diff: 1     Page Ref: 528



41. "Hidden costs" such as ________ can easily undercut anticipated benefits from outsourcing.          41. ______
      A) identifying and evaluating vendors of information technology services
      B) transitioning to a new vendor
      C) monitoring vendors to make sure they often are fulfilling their contractual obligations
      D) A, B, and C
    Answer: D
   Diff: 1     Page Ref: 522



42. A road map indicating the direction of systems development, the rationale, the current situation,   42. ______
    new developments to consider, the management strategy, the implementation plan, and the
    budget is called a:
      A) project plan.
       B) information systems plan.
      C) mission statement.
      D) request for proposal.
    Answer: B
   Diff: 1     Page Ref: 496



43. Microsoft SQL Server is a(n):                                                                       43. ______
     A) DBMS for midrange computers.
      B) DBMS for small handheld computing devices.
      C) Internet DBMS.
     D) mainframe relational DBMS.
   Answer: A
   Diff: 2      Page Ref: 239



44. For storing data types such as complex information or recursive data, ________ are useful.    44. ______
      A) hierarchical DBMS
      B) OODBMS
      C) network DBMS
      D) relational DBMS
    Answer: B
   Diff: 2      Page Ref: 240



45. The fundamental principle of data administration is that all data:                            45. ______
      A) are recursive.
      B) be normalized.
      C) belongs to the company as a whole.
      D) be owned by individual departments.
    Answer: C
   Diff: 2      Page Ref: 251



46. Amoco uses ________ for real-time data transfer of oil field exploration data gathered from   46. ______
    searches of the ocean floor.
      A) Wi-Fi technology
       B) Bluetooth technology
      C) fiber optics
      D) satellites
    Answer: D
   Diff: 2      Page Ref: 308



47. Third-generation (3G) cellular networks are based on ________ technology to achieve greater   47. ______
    efficiencies and higher transmission speeds.
       A) digital
       B) vacuum tubes
       C) packet-switched
       D) analog
    Answer: C
   Diff: 2      Page Ref: 310



48. A Wi-Fi system can operate in two different modes. Ad-hoc mode is also known as:              48. ______
      A) peer-to-peer mode.
      B) local area network mode.
      C) metropolitan area network mode.
      D) wide area network mode.
    Answer: A
   Diff: 2      Page Ref: 313



49. The world's largest cell phone market is:                                                     49. ______
     A) Russia.
     B) the United States.
     C) Hong Kong.
     D) China.
   Answer: D
   Diff: 2     Page Ref: 309



50. Someone must be able to verify that the digital signature actually belongs to whoever sent the    50. ______
    data and that the data were not altered after being "signed" in order for/to:
      A) the signature to be legally binding.
      B) the public key encryption to be transferred to the private key.
      C) make sure the correct private key is used.
      D) the private key to be transferred to the sender.
    Answer: A
   Diff: 2     Page Ref: 366



51. Sobig-F and Netsky.P are:                                                                         51. ______
      A) "multipartite" viruses that can infect files as well as the boot sector of the hard drive.
      B) viruses written in script programming languages that use Microsoft Outlook to spread to
         other systems.
      C) viruses that make a clicking sound with each keystroke on the 18 th day of the month.
     D) "worm" type viruses that arrive attached to e-mail and spread from computer to computer.
   Answer: D
   Diff: 2     Page Ref: 345



52. High-availability computing:                                                                      52. ______
      A) promises continuous availability.
      B) helps firms recover quickly from a crash.
      C) promises the elimination of recovery time.
      D) uses online transaction and backup systems.
    Answer: B
   Diff: 2     Page Ref: 359



53. Online transaction processing requires:                                                           53. ______
      A) a large server network.
      B) fault-tolerant computer systems.
      C) a dedicated phone line.
      D) more processing time.
    Answer: B
   Diff: 2     Page Ref: 359



54. Internet security challenges for the server during communication include:                         54. ______
      A) copying of data, alteration of data, loss of machine.
       B) tapping, sniffing, message alteration.
       C) computer viruses, line taps, hacking.
       D) theft and fraud.
    Answer: D
   Diff: 2     Page Ref: 343
55. Mirroring:                                                                                          55. ______
      A) uses a backup server that duplicates all the processes and transactions of the primary
         server.
      B) links two computers together so the second can be a backup to the first.
      C) distributes large numbers of access requests across multiple servers.
      D) Both A and C
    Answer: A
   Diff: 2     Page Ref: 360



56. A standard measurement of performance best describes:                                               56. ______
      A) metric.
      B) component cycle.
      C) cycle.
      D) MIPS.
    Answer: A
   Diff: 2     Page Ref: 389



57. This type of software enables data to be used by multiple functions and business processes for      57. ______
    precise organization coordination and control:
      A) collaboration software.
       B) groupware.
      C) application software.
      D) enterprise software.
    Answer: D
   Diff: 2     Page Ref: 380



58. According to SCOR, the source process:                                                              58. ______
      A) consists of processes that provide finished goods and services to meet actual or planned
         demand, including order management, transportation management, and distribution
         management.
      B) consists of processes associated with returning products or receiving returned products,
         including postdelivery customer support.
      C) consists of processes that transform a product into a finished state to meet planned or
         actual demand.
      D) consists of processes that procure goods and services needed to create a specific product or
         service.
    Answer: D
   Diff: 2     Page Ref: 386



59. Analyzing sales representative and customer service representative productivity is an example       59. ______
    of:
       A) bundling.
        B) cross-selling.
        C) analytical CRM.
       D) operational CRM.
    Answer: C
   Diff: 2     Page Ref: 398
60. When tailoring a particular aspect of a system to the way a company does business, enterprise     60. ______
    software can provide the company with:
      A) data dictionaries.
       B) configuration tables.
       C) project workbooks.
      D) state transition diagrams.
    Answer: B
   Diff: 2      Page Ref: 381



61. A method of firm interaction with a customer, such as telephone, e-mail, customer service desk,   61. ______
    conventional mail, or point of purchase best describes:
      A) touch point.
      B) point of presence.
      C) channel point.
      D) market entry.
    Answer: A
   Diff: 2      Page Ref: 394



62. A methodology for dealing with the organization's need to change its business processes           62. ______
    continually to remain competitive is called:
      A) business process refinement.
      B) business process sourcing.
      C) business process management.
      D) business process investigation.
    Answer: C
   Diff: 2      Page Ref: 401



63. Virtual reality applications for the Web use a standard called:                                   63. ______
      A) TCP/IP.
       B) KWSVR.
      C) VRML.
      D) CADDIS.
    Answer: C
   Diff: 2      Page Ref: 434



64. The AI shell is:                                                                                  64. ______
      A) a strategy for searching the rule base in an expert system that begins with a hypothesis.
      B) the programming environment of an expert system.
      C) a strategy for searching the rule base in an expert system that begins with information
         entered by the user.
      D) a method of organizing expert system knowledge into chunks.
    Answer: B
   Diff: 2      Page Ref: 436



65. Expert systems are expensive and time-consuming to maintain:                                      65. ______
      A) because they rely on equipment that becomes outdated.
     B) because only the person who created the system knows exactly how it works, and may not
        be available when changes are needed.
     C) because their rules must be reprogrammed every time there is a change in the
        environment, which in turn may change the applicable rules
     D) because their rule base is so complex.
   Answer: C
   Diff: 2     Page Ref: 439



66. CAD/CAM workstations:                                                                              66. ______
      A) are high-end PCs used in the financial sector to analyze trading situations instantaneously
         and facilitate portfolio management.
      B) provide an important source of expertise for organizations.
      C) allow groups to work together on documents.
      D) provide engineers, designers, and factory managers with precise control over industrial
         design and manufacturing.
    Answer: D
   Diff: 2     Page Ref: 435



67. Genetic algorithms:                                                                                67. ______
      A) are based on logic.
      B) do not work for most problems.
      C) develop solutions to particular problems using fitness, crossover, and mutation.
      D) represent knowledge as groups of characteristics.
    Answer: C
   Diff: 2     Page Ref: 442



68. Expertise and experience of organizational members that has not been formally documented           68. ______
    best describes:
      A) data.
       B) information.
      C) wisdom.
      D) tacit knowledge.
    Answer: D
   Diff: 2     Page Ref: 416



69. A system for organizing structured knowledge in a repository where it can be accessed              69. ______
    throughout the organization best describes:
      A) database management system.
       B) structured knowledge system.
       C) expert system.
      D) neural network.
    Answer: B
   Diff: 2     Page Ref: 422



70. Expert systems:                                                                                    70. ______
      A) work in very limited domains.
      B) solve problems too difficult for human experts.
      C) are based on DO WHILE rules.
     D) share characteristics with mainframe computing.
   Answer: A
   Diff: 2     Page Ref: 436



71. Hardware and software that attempts to emulate the processing patterns of the biological brain    71. ______
    best describes:
      A) fuzzy logic.
       B) expert system.
      C) case-based reasoning.
      D) neural network.
    Answer: D
   Diff: 2     Page Ref: 441



72. Systems whose architecture is based on the human brain's mesh-like neuron structure are called:   72. ______
      A) neural networks.
      B) fuzzy logic systems.
      C) knowledge-based systems.
      D) expert system.
    Answer: A
   Diff: 2     Page Ref: 441



73. Which of the following is used for knowledge discovery?                                           73. ______
      A) data mining
      B) expert systems
      C) case-based reasoning
      D) transaction processing systems
    Answer: A
   Diff: 2     Page Ref: 436



74. An inference engine is:                                                                           74. ______
      A) the programming environment of an expert system.
      B) a strategy used to search through the rule base in an expert system in one of two ways.
      C) a method of organizing expert system knowledge into chunks.
      D) a strategy for searching the rule base in an expert system that begins with information
         entered by the user.
    Answer: B
   Diff: 2     Page Ref: 436



75. In object-oriented software development, relationship between objects would be described          75. ______
    using:
       A) object diagrams.
       B) structural diagrams.
       C) use case diagrams.
       D) behavioral diagrams.
    Answer: B
   Diff: 2     Page Ref: 515
76. TQM focuses on:                                                                                     76. ______
      A) mid-level management.
      B) a few large-scale improvements.
      C) eliminating design errors.
      D) a series of continuous improvements.
    Answer: D
   Diff: 2     Page Ref: 505



77. The tool that enables users to view the same data in different ways using multiple dimensions is:   77. ______
      A) OLAP.
      B) object-oriented processing.
      C) a data warehouse.
      D) a relational database.
    Answer: A
   Diff: 3     Page Ref: 244



78. Microwave signals:                                                                                  78. ______
      A) are lower in frequency than cell phones.
      B) are lower in frequency than short-wave radio.
      C) are lower in frequency than fiber optics.
      D) are lower in frequency than paging devices.
    Answer: C
   Diff: 3     Page Ref: 307



79. Supply chain planning systems:                                                                      79. ______
      A) identify the transportation mode to use for product delivery.
      B) track the status of orders
      C) track the financial information involving all parties.
      D) track the physical status of goods.
    Answer: A
   Diff: 3     Page Ref: 389



80. The Supply Chain Council developed a cross-industry process reference model for supply chain        80. ______
    management called:
      A) TCP/IP.
      B) SCCM.
      C) SCOR.
      D) MRP.
    Answer: C
   Diff: 3     Page Ref: 386



81. Which of the following would NOT be classified as a form of intelligent technique?                  81. ______
      A) neural networks
      B) case based reasoning
      C) data mining
      D) virtual reality
    Answer: D
   Diff: 3     Page Ref: 421
      82. Which of the following are types of intelligent techniques?                                        82. ______
            A) knowledge networks
            B) computer-aided design
            C) virtual reality
            D) case based reasoning
          Answer: D
          Diff: 3     Page Ref: 421



TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.
     83. Data mining can be a challenge to individual privacy.                                               83. ______
         Answer:    True        False
          Diff: 1     Page Ref: 246



      84. A data warehouse is a small data mart.                                                             84. ______
          Answer:    True        False
          Diff: 1     Page Ref: 245



      85. A database requires organizational and conceptual change.                                          85. ______
          Answer:    True        False
          Diff: 1     Page Ref: 250



      86. Middleware is used to transfer information from the organization's internal database back to the   86. ______
          Web server for delivering the form of a Web page to the inquirer.
          Answer:    True        False
          Diff: 1     Page Ref: 248



      87. NTT DoCoMo cell phone customers can use special cell phones equipped with a smart card             87. ______
          computer chip that can store electronic cash.
          Answer:   True         False
          Diff: 1     Page Ref: 322



      88. Global positioning system is a worldwide satellite navigational system.                            88. ______
          Answer:     True       False
          Diff: 1     Page Ref: 306



      89. Computers using a DSL line use a fixed Internet address.                                           89. ______
          Answer:   True       False
          Diff: 1     Page Ref: 343



      90. Input controls ensure that the data are accurate and complete when they enter the system.          90. ______
          Answer:    True         False
          Diff: 1     Page Ref: 356
 91. Biometrics is the use of physical characteristics such as the blood vessels in the retina of your eye   91. ______
     to provide identification.
     Answer:     True         False
    Diff: 1      Page Ref: 363



 92. A worm is a computer virus that replicates and spreads itself, not only from file to file, but also     92. ______
     from computer to computer via e-mail and other Internet traffic.
     Answer:    True      False
    Diff: 1      Page Ref: 344



 93. Advances in telecommunications and computer software have magnified the vulnerabilities of              93. ______
     computerized information systems.
     Answer:    True       False
    Diff: 1      Page Ref: 342



 94. Viruses cannot be spread through e-mail.                                                                94. ______
     Answer:    True        False
    Diff: 1      Page Ref: 343



 95. Siebel Systems is the market-leading vendor of customer relationship management software.               95. ______
     Answer:     True       False
    Diff: 1      Page Ref: 395



 96. Enterprise systems can improve management reporting and decision making.                                96. ______
     Answer:     True       False
    Diff: 1      Page Ref: 384



 97. Major CRM application software vendors include Siebel Systems, Clarify, and Salesforce.com.             97. ______
     Answer:  True        False
    Diff: 1      Page Ref: 394



 98. User interfaces are unimportant to the success of knowledge worker systems.                             98. ______
     Answer:     True        False
    Diff: 1      Page Ref: 433



 99. A series of IF-THEN rules can be used to form a knowledge-base.                                         99. ______
     Answer:      True      False
    Diff: 1      Page Ref: 436



100. Case-based reasoning cannot be used in diagnostic systems in medicine.                                  100. ______
     Answer:    True       False
    Diff: 1      Page Ref: 439
101. Structured knowledge is explicit knowledge that exists in informal documents.                     101. ______
     Answer:     True      False
    Diff: 1      Page Ref: 423



102. Structural diagrams are used to describe the relationships between classes of objects.            102. ______
     Answer:     True       False
    Diff: 1      Page Ref: 515



103. Faulty requirements analysis is a leading cause of systems failure and high systems               103. ______
     development costs.
     Answer:    True       False
    Diff: 1      Page Ref: 507



104. An advantage of fourth-generation tools is that they can easily handle processing large numbers   104. ______
     of transactions or applications with extensive procedural logic and updating requirements.
     Answer:      True        False
    Diff: 1      Page Ref: 519



105. In the digital firm environment, organizations must be able to add, change, and retire            105. ______
     technology capabilities much more rapidly than traditional development methods will allow.
     Answer:      True        False
    Diff: 1      Page Ref: 525



106. Information technology can create new design options for various processes.                       106. ______
     Answer:    True       False
    Diff: 1      Page Ref: 504



107. TQM derives from concepts developed by American quality experts, but was popularized in           107. ______
     Japan.
     Answer:   True       False
    Diff: 1      Page Ref: 505



108. A problem with prototyping is that the systems constructed thereby may not be able to handle      108. ______
     large quantities of data in a production environment.
     Answer:     True         False
    Diff: 1      Page Ref: 518



109. If organizations wait to apply computing power until after they rethink and redesign their        109. ______
     business processes, they may obtain large payoffs.
     Answer:     True         False
    Diff: 1      Page Ref: 501



110. OODBMS cannot work with applets.                                                                  110. ______
    Answer:      True        False
    Diff: 2      Page Ref: 240



111. Hierarchical structures support many-to-many relationships among entities.                        111. ______
     Answer:    True         False
    Diff: 2      Page Ref: 239



112. Today, what has been immediately available at most firms is historical data only.                 112. ______
     Answer:   True        False
    Diff: 2      Page Ref: 244



113. The top-level segment in each record of a hierarchical database is called the root.               113. ______
     Answer:    True        False
    Diff: 2      Page Ref: 239



114. OODBMS are slower than relational DBMS.                                                           114. ______
     Answer: True        False
    Diff: 2      Page Ref: 240



115. DBMS separate the logical and physical views of the data.                                         115. ______
     Answer:  True         False
    Diff: 2      Page Ref: 233



116. In an entity-relationship diagram, a line connecting two entities that ends in two short marks    116. ______
     designates a many-to-many relationship.
     Answer:      True        False
    Diff: 2      Page Ref: 242



117. A traditional system serves a wider community of users than a database because less training is   117. ______
     involved.
     Answer:     True        False
    Diff: 2      Page Ref: 252



118. WiMax has a wireless access range of up to 30 feet.                                               118. ______
     Answer:   True        False
    Diff: 2      Page Ref: 317



119. M-commerce represents a substantial percentage of the total e-commerce transactions taking        119. ______
     place over the Internet.
     Answer:     True         False
    Diff: 2      Page Ref: 318



120. Wireless Application Protocol (WAP) is a system of protocols and technologies that lets cell      phones and
other     120.                                                                                            ____
wireless                                                                                                  __
devices
with tiny
displays,
low-band
width
connectio
ns, and
minimal
memory
access
Web-bas
ed
informati
on and
services.
          Answer:     True        False
         Diff: 2      Page Ref: 310



     121. Low-orbit satellites consume less power and cost less to launch than conventional satellites.   121. ______
          Answer:    True         False
         Diff: 2      Page Ref: 308



     122. The data transfer speeds on second-generation cellular networks are very fast compared to       122. ______
          dial-up connections to the Internet.
          Answer:     True        False
         Diff: 2      Page Ref: 322



     123. A number of studies have shown that wireless networking actually decreases worker               123. ______
          productivity and output.
          Answer:    True       False
         Diff: 2      Page Ref: 305



     124. Wireless Markup Language (WML) does not support most wireless network standards and             124. ______
          operating systems for handheld computing devices.
          Answer:     True       False
         Diff: 2      Page Ref: 310



     125. Clustering is more expensive than server mirroring.                                             125. ______
          Answer:     True       False
         Diff: 2      Page Ref: 360



     126. Server mirroring is a less expensive security option than clustering.                           126. ______
          Answer:    True          False
         Diff: 2      Page Ref: 360
127. High-availability computing is another name for fault tolerance.                                    127. ______
     Answer:    True       False
    Diff: 2      Page Ref: 359



128. SCOR identifies five major supply chain processes: organize, research, plan, deliver, and return.   128. ______
     Answer:   True         False
    Diff: 2      Page Ref: 386



129. Primary advantages of enterprise systems include their ease of implementation and flexibility.      129. ______
     Answer:   True        False
    Diff: 2      Page Ref: 405



130. Single-channel customers are known to have a higher lifetime value than multichannel                130. ______
     customers.
     Answer:    True       False
    Diff: 2      Page Ref: 397



131. Enterprise systems require changes in business processes, organizational structure, and             131. ______
     organizational culture.
     Answer:     True        False
    Diff: 2      Page Ref: 406



132. In a push-based model, actual customer orders or purchases trigger events in the supply chain.      132. ______
     Answer:    True       False
    Diff: 2      Page Ref: 391



133. Neural networks "learn" patterns from large quantities of data by sifting through data, searching   133. ______
     for relationships, building models, and correcting over and over again the model's own
     mistakes.
     Answer:      True        False
    Diff: 2      Page Ref: 441



134. Shopping bots are a form of intelligent agent.                                                      134. ______
     Answer:   True         False
    Diff: 2      Page Ref: 444



135. Knowledge residing in the minds of employees that has not been documented is called explicit        135. ______
     knowledge.
     Answer:    True       False
    Diff: 2      Page Ref: 416



136. Fuzzy logic can be used to express relationships very generally and compactly, requiring fewer      136. ______
     IF-THEN rules than traditional software programs.
    Answer:      True        False
    Diff: 2      Page Ref: 442



137. Genetic algorithms are conceptually based on the process of evolution.                            137. ______
     Answer:     True       False
    Diff: 2      Page Ref: 442



138. The strength of the CSF method is that it produces a smaller data set to analyze than the         138. ______
     enterprise analysis method.
     Answer:     True       False
    Diff: 2      Page Ref: 499



139. Rationalization of procedures often follows quickly from early automation.                        139. ______
     Answer:     True        False
    Diff: 2      Page Ref: 500



140. A traditional file system normally does not have difficulty with ad hoc reports if there is a     140. ______
     programmer available who can write the data query.
     Answer:     True         False
    Diff: 3      Page Ref: 233



141. The data definition language defines each data element as it appears in the database after that   141. ______
     data element is translated into the forms required by application programs.
     Answer:    True         False
    Diff: 3      Page Ref: 234



142. In the United States, Global System for Mobile Communications (GSM) is the standard used in       142. ______
     digital cellular services.
     Answer:      True          False
    Diff: 3      Page Ref: 309



143. Worldwide Interoperability for Microwave Access (WiMax) is a popular term for IEEE Standard       143. ______
     802.16, known as the "Air Interface for Fixed Broadband Wireless Access Systems."
     Answer:    True        False
    Diff: 3      Page Ref: 317



144. Customer relationship management can help organizations identify customers who cost a lot to      144. ______
     attract and to keep.
     Answer:      True     False
    Diff: 3      Page Ref: 393



145. SAP's version of cross-application services is called XRP.                                        145. ______
     Answer:     True        False
    Diff: 3      Page Ref: 401
146. Companies can use state transition diagrams provided by the enterprise software to tailor a     146. ______
     particular aspect of the system to the way it does business.
     Answer:     True         False
    Diff: 3     Page Ref: 381



147. Supply chain execution systems enable the firm to generate demand forecasts for a product and   147. ______
     to develop sourcing and manufacturing plans for that product.
     Answer:     True       False
    Diff: 3     Page Ref: 388



148. Businesses are using component-based development to create their e-commerce applications.       148. ______
     Answer:     True       False
    Diff: 3     Page Ref: 526



149. The principle method used in CSF analysis is JAD.                                               149. ______
     Answer:    True       False
    Diff: 3     Page Ref: 499



150. The overall business plan of the organization should support the information systems plan.      150. ______
     Answer:     True        False
    Diff: 3     Page Ref: 496
 1. A
   ID: mis9l 7-41
   Diff: 1       Page Ref: 230

 2. A
   ID: mis9l 7-42
   Diff: 1       Page Ref: 230

 3. D
   ID: mis9l 7-72
   Diff: 1       Page Ref: 242

 4. C
   ID: mis9l 7-53
   Diff: 1       Page Ref: 236

 5. A
   ID: mis9l 7-73
   Diff: 1       Page Ref: 244

 6. B
   ID: mis9l 7-79
   Diff: 1       Page Ref: 249

 7. B
   ID: mis9l 7-76
   Diff: 1       Page Ref: 245

 8. A
   ID: mis9l 9-72
   Diff: 1       Page Ref: 321

 9. D
   ID: mis9l 9-47
   Diff: 1       Page Ref: 308

10. D
   ID: mis9l 9-67
   Diff: 1       Page Ref: 314

11. C
   ID: mis9l 9-55
   Diff: 1       Page Ref: 310

12. D
   ID: mis9l 9-54
   Diff: 1       Page Ref: 310

13. C
   ID: mis9l 9-45
   Diff: 1       Page Ref: 308

14. D
   ID: mis9l 9-76
   Diff: 1       Page Ref: 325
15. C
   ID: mis9l 9-65
   Diff: 1       Page Ref: 313

16. A
   ID: mis9l 9-69
   Diff: 1       Page Ref: 317

17. C
   ID: mis9l 10-51
   Diff: 1       Page Ref: 346

18. B
   ID: mis9l 10-43
   Diff: 1       Page Ref: 342

19. D
   ID: mis9l 10-58
   Diff: 1       Page Ref: 356

20. D
   ID: mis9l 10-77
   Diff: 1       Page Ref: 364

21. B
   ID: mis9l 10-55
   Diff: 1       Page Ref: 355

22. D
   ID: mis9l 10-68
   Diff: 1       Page Ref: 356

23. C
   ID: mis9l 10-57
   Diff: 1       Page Ref: 356

24. D
   ID: mis9l 10-59
   Diff: 1       Page Ref: 356

25. A
   ID: mis9l 10-41
   Diff: 1       Page Ref: 342

26. C
   ID: mis9l 10-45
   Diff: 1       Page Ref: 342

27. C
   ID: mis9l 11-68
   Diff: 1       Page Ref: 394

28. D
   ID: mis9l 11-69
   Diff: 1       Page Ref: 395

29. D
   ID: mis9l 11-71
   Diff: 1       Page Ref: 395

30. A
   ID: mis9l 11-70
   Diff: 1       Page Ref: 395

31. B
   ID: mis9l 12-53
   Diff: 1       Page Ref: 425

32. D
   ID: mis9l 12-62
   Diff: 1       Page Ref: 435

33. D
   ID: mis9l 14-53
   Diff: 1       Page Ref: 506

34. D
   ID: mis9l 14-69
   Diff: 1       Page Ref: 514

35. D
   ID: mis9l 14-73
   Diff: 1       Page Ref: 517-518

36. A
   ID: mis9l 14-61
   Diff: 1       Page Ref: 510

37. A
   ID: mis9l 14-60
   Diff: 1       Page Ref: 510

38. A
   ID: mis9l 14-65
   Diff: 1       Page Ref: 512

39. B
   ID: mis9l 14-75
   Diff: 1       Page Ref: 519

40. C
   ID: mis9l 14-80
   Diff: 1       Page Ref: 528

41. D
   ID: mis9l 14-78
   Diff: 1       Page Ref: 522

42. B
   ID: mis9l 14-41
   Diff: 1       Page Ref: 496

43. A
   ID: mis9l 7-63
   Diff: 2      Page Ref: 239

44. B
   ID: mis9l 7-68
   Diff: 2       Page Ref: 240

45. C
   ID: mis9l 7-80
   Diff: 2       Page Ref: 251

46. D
   ID: mis9l 9-44
   Diff: 2       Page Ref: 308

47. C
   ID: mis9l 9-52
   Diff: 2       Page Ref: 310

48. A
   ID: mis9l 9-64
   Diff: 2       Page Ref: 313

49. D
   ID: mis9l 9-50
   Diff: 2       Page Ref: 309

50. A
   ID: mis9l 10-79
   Diff: 2       Page Ref: 366

51. D
   ID: mis9l 10-50
   Diff: 2       Page Ref: 345

52. B
   ID: mis9l 10-72
   Diff: 2       Page Ref: 359

53. B
   ID: mis9l 10-71
   Diff: 2       Page Ref: 359

54. D
   ID: mis9l 10-48
   Diff: 2       Page Ref: 343

55. A
   ID: mis9l 10-73
   Diff: 2       Page Ref: 360

56. A
   ID: mis9l 11-60
   Diff: 2       Page Ref: 389

57. D
   ID: mis9l 11-42
   Diff: 2       Page Ref: 380
58. D
   ID: mis9l 11-50
   Diff: 2       Page Ref: 386

59. C
   ID: mis9l 11-75
   Diff: 2       Page Ref: 398

60. B
   ID: mis9l 11-46
   Diff: 2       Page Ref: 381

61. A
   ID: mis9l 11-67
   Diff: 2       Page Ref: 394

62. C
   ID: mis9l 11-79
   Diff: 2       Page Ref: 401

63. C
   ID: mis9l 12-61
   Diff: 2       Page Ref: 434

64. B
   ID: mis9l 12-69
   Diff: 2       Page Ref: 436

65. C
   ID: mis9l 12-75
   Diff: 2       Page Ref: 439

66. D
   ID: mis9l 12-64
   Diff: 2       Page Ref: 435

67. C
   ID: mis9l 12-79
   Diff: 2       Page Ref: 442

68. D
   ID: mis9l 12-42
   Diff: 2       Page Ref: 416

69. B
   ID: mis9l 12-51
   Diff: 2       Page Ref: 422

70. A
   ID: mis9l 12-67
   Diff: 2       Page Ref: 436

71. D
   ID: mis9l 12-78
   Diff: 2       Page Ref: 441
72. A
   ID: mis9l 12-77
   Diff: 2       Page Ref: 441

73. A
   ID: mis9l 12-65
   Diff: 2       Page Ref: 436

74. B
   ID: mis9l 12-70
   Diff: 2       Page Ref: 436

75. B
   ID: mis9l 14-67
   Diff: 2       Page Ref: 515

76. D
   ID: mis9l 14-51
   Diff: 2       Page Ref: 505

77. A
   ID: mis9l 7-74
   Diff: 3       Page Ref: 244

78. C
   ID: mis9l 9-43
   Diff: 3       Page Ref: 307

79. A
   ID: mis9l 11-55
   Diff: 3       Page Ref: 389

80. C
   ID: mis9l 11-49
   Diff: 3       Page Ref: 386

81. D
   ID: mis9l 12-50
   Diff: 3       Page Ref: 421

82. D
   ID: mis9l 12-48
   Diff: 3       Page Ref: 421

83. TRUE
   ID: mis9l 7-33
   Diff: 1       Page Ref: 246

84. FALSE
   ID: mis9l 7-32
   Diff: 1       Page Ref: 245

85. TRUE
   ID: mis9l 7-37
   Diff: 1       Page Ref: 250

86. TRUE
    ID: mis9l 7-34
    Diff: 1       Page Ref: 248

87. TRUE
    ID: mis9l 9-33
    Diff: 1       Page Ref: 322

88. TRUE
    ID: mis9l 9-4
    Diff: 1       Page Ref: 306

89. TRUE
    ID: mis9l 10-3
    Diff: 1       Page Ref: 343

90. TRUE
    ID: mis9l 10-25
    Diff: 1       Page Ref: 356

91. TRUE
    ID: mis9l 10-34
    Diff: 1       Page Ref: 363

92. TRUE
    ID: mis9l 10-8
    Diff: 1       Page Ref: 344

93. TRUE
    ID: mis9l 10-1
    Diff: 1       Page Ref: 342

94. FALSE
    ID: mis9l 10-4
    Diff: 1       Page Ref: 343

95. TRUE
    ID: mis9l 11-29
    Diff: 1       Page Ref: 395

96. TRUE
    ID: mis9l 11-6
    Diff: 1       Page Ref: 384

97. TRUE
    ID: mis9l 11-27
    Diff: 1       Page Ref: 394

98. FALSE
    ID: mis9l 12-16
    Diff: 1       Page Ref: 433

99. TRUE
    ID: mis9l 12-28
    Diff: 1       Page Ref: 436

100. FALSE
    ID: mis9l 12-32
    Diff: 1      Page Ref: 439

101. FALSE
    ID: mis9l 12-9
    Diff: 1       Page Ref: 423

102. TRUE
    ID: mis9l 14-30
    Diff: 1       Page Ref: 515

103. TRUE
    ID: mis9l 14-17
    Diff: 1       Page Ref: 507

104. FALSE
    ID: mis9l 14-36
    Diff: 1       Page Ref: 519

105. TRUE
    ID: mis9l 14-39
    Diff: 1       Page Ref: 525

106. TRUE
    ID: mis9l 14-13
    Diff: 1       Page Ref: 504

107. TRUE
    ID: mis9l 14-15
    Diff: 1       Page Ref: 505

108. TRUE
    ID: mis9l 14-34
    Diff: 1       Page Ref: 518

109. TRUE
    ID: mis9l 14-11
    Diff: 1       Page Ref: 501

110. FALSE
    ID: mis9l 7-20
    Diff: 2       Page Ref: 240

111. FALSE
    ID: mis9l 7-12
    Diff: 2       Page Ref: 239

112. FALSE
    ID: mis9l 7-29
    Diff: 2       Page Ref: 244

113. TRUE
    ID: mis9l 7-16
    Diff: 2       Page Ref: 239

114. TRUE
    ID: mis9l 7-22
    Diff: 2       Page Ref: 240
115. TRUE
    ID: mis9l 7-9
    Diff: 2       Page Ref: 233

116. FALSE
    ID: mis9l 7-24
    Diff: 2       Page Ref: 242

117. FALSE
    ID: mis9l 7-40
    Diff: 2       Page Ref: 252

118. FALSE
    ID: mis9l 9-27
    Diff: 2       Page Ref: 317

119. FALSE
    ID: mis9l 9-29
    Diff: 2       Page Ref: 318

120. TRUE
    ID: mis9l 9-15
    Diff: 2       Page Ref: 310

121. TRUE
    ID: mis9l 9-9
    Diff: 2       Page Ref: 308

122. FALSE
    ID: mis9l 9-36
    Diff: 2       Page Ref: 322

123. FALSE
    ID: mis9l 9-3
    Diff: 2       Page Ref: 305

124. FALSE
    ID: mis9l 9-17
    Diff: 2       Page Ref: 310

125. FALSE
    ID: mis9l 10-30
    Diff: 2       Page Ref: 360

126. FALSE
    ID: mis9l 10-31
    Diff: 2       Page Ref: 360

127. FALSE
    ID: mis9l 10-29
    Diff: 2       Page Ref: 359

128. FALSE
    ID: mis9l 11-10
    Diff: 2       Page Ref: 386
129. FALSE
    ID: mis9l 11-38
    Diff: 2       Page Ref: 405

130. FALSE
    ID: mis9l 11-30
    Diff: 2       Page Ref: 397

131. TRUE
    ID: mis9l 11-39
    Diff: 2       Page Ref: 406

132. FALSE
    ID: mis9l 11-21
    Diff: 2       Page Ref: 391

133. TRUE
    ID: mis9l 12-36
    Diff: 2       Page Ref: 441

134. TRUE
    ID: mis9l 12-40
    Diff: 2       Page Ref: 444

135. FALSE
    ID: mis9l 12-1
    Diff: 2       Page Ref: 416

136. TRUE
    ID: mis9l 12-34
    Diff: 2       Page Ref: 442

137. TRUE
    ID: mis9l 12-38
    Diff: 2       Page Ref: 442

138. TRUE
    ID: mis9l 14-7
    Diff: 2       Page Ref: 499

139. TRUE
    ID: mis9l 14-9
    Diff: 2       Page Ref: 500

140. FALSE
    ID: mis9l 7-8
    Diff: 3       Page Ref: 233

141. FALSE
    ID: mis9l 7-10
    Diff: 3       Page Ref: 234

142. FALSE
    ID: mis9l 9-13
    Diff: 3       Page Ref: 309

143. TRUE
    ID: mis9l 9-26
    Diff: 3       Page Ref: 317

144. TRUE
    ID: mis9l 11-25
    Diff: 3       Page Ref: 393

145. FALSE
    ID: mis9l 11-35
    Diff: 3       Page Ref: 401

146. FALSE
    ID: mis9l 11-2
    Diff: 3       Page Ref: 381

147. FALSE
    ID: mis9l 11-15
    Diff: 3       Page Ref: 388

148. TRUE
    ID: mis9l 14-40
    Diff: 3       Page Ref: 526

149. FALSE
    ID: mis9l 14-6
    Diff: 3       Page Ref: 499

150. FALSE
    ID: mis9l 14-1
    Diff: 3       Page Ref: 496

								
To top