Vous êtes sur la page 1sur 140

QUIZ 2

Question 1
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not a disadvantage of telecommuting for employees?
Select one:
a. Lower pay (in some cases)
b. Slower promotions
c. Possible loss of fringe benefits
d. Fewer opportunities for homebound or disabled people
e. No workplace visibility
Question 2
Not yet answered
Marked out of 1.00

Flag question
Question text
Portal Web page offers a variety of Internet services from a single, convenient
location
Select one:
True
False
Question 3
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following are advantages of computer networks?
Select one:
a. They enable geographically dispersed employees to work together
b. They enable organizations to be more flexible
c. They enable companies to share hardware, computer applications, and data
d. All of the above
Question 4
Not yet answered
Marked out of 1.00

Flag question
Question text
Unlike a data mart, deals with multiple subject areas and is typically implemented
and controlled by a central organizational unit such as the corporate Information
Technology (IT) group.
Data Warehouse
Answer:
Question 5
Not yet answered
Marked out of 1.00

Flag question
Question text
Network interface cards are special adapters that link an individual device to the
communications medium on a local area network.
Select one:
a. False
b. True
Question 6
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not a characteristic of twisted-pair wire?
Select one:
a. Easy to work with
b. Subject to interference from other electrical source
c. Inexpensive
d. Secure transmissions
e. None of these
Question 7
Not yet answered
Marked out of 1.00

Flag question
Question text
A(n) _____ connects two or more devices in a limited geographical area.
Select one:
a. Enterprise network
b. Local area network
c. Wide-area network
d. Value added network
e. Personal area network
Question 8
Not yet answered
Marked out of 1.00

Flag question
Question text
It refers to a multi-disciplined approach to achieving organizational objectives by
making the best use of knowledge.
Know ledge management
Answer:
Question 9
Not yet answered
Marked out of 1.00

Flag question
Question text

A search engine is a software program you can use to find Web sites, Web
pages, and Internet files
Select one:
a. False
b. True
Question 10
Not yet answered
Marked out of 1.00

Flag question
Question text
Unified Communication is a method of trying to integrate all forms of electronic
communication under one standardized platform or method
Select one:
True
False
QUIZ 3
Question 1
Not yet answered
Marked out of 1.00

Flag question
Question text
At the end of a semester, a student knows that she must achieve a
grade of 81 or higher on her final exam to get an A in the course. She
has just performed what kind of analysis
Select one:
a. What-if
b. Simulation
c. Sensitivity
d. Qualitative
e. Goal-seeking
Question 2
Not yet answered
Marked out of 1.00

Flag question
Question text
Has a way of fouling up people's lives, especially when the party with
the inaccurate information has an advantage in power and authority.
Misinformation
Answer:
-Misinformation
Question 3
Not yet answered
Marked out of 1.00

Flag question
Question text
Can be defined as an individual condition of life characterized by
exclusion from publicity.

Answer:
- Privacy
Question 4
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: Information forms the intellectual capital from which
human beings craft their lives and secure dignity.

Answer:
- True
Question 5
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is NOT a reason that managers need IT
support?
Select one:
a. the need to access remote information sources
b. decisions must typically be made under time pressure
c. decisions are becoming more complex
d. the need to access remote information sources
e. number of alternatives is decreasing
Question 6
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: Responsibility is accepting any consequences of
decisions and/or actions.

Answer:
- True
Question 7
Not yet answered
Marked out of 1.00

Flag question
Question text
This category of privacy concerns all forms of personal communication
which a person wishes to keep private.
Private communications
Answer:
- Private communications
Question 8
Not yet answered
Marked out of 1.00

Flag question
Question text
A (n) ________ provides rapid access to timely information and direct
access to management reports.
Select one:
a. data warehouse
b. digital dashboard
c. neural network
d. expert system
e. decision support system
Question 9
Not yet answered
Marked out of 1.00

Flag question
Question text
Decision support systems support only lower and middle level
managers.
Select one:
False
True
Question 10
Not yet answered
Marked out of 1.00

Flag question
Question text
Digital dashboards-evolved from executive information systems, which
were information systems designed specifically for the information
needs of top executives.
Select one:
False
True
QUIZ 4
Question 1
Not yet answered
Marked out of 1.00

Flag question
Question text
Biometrics are an example of:
Select one:
a. something the user wants.
b. something the user knows.
c. something the user does.
d. something the user has.
Question 2
Not yet answered
Marked out of 1.00

Flag question
Question text
A wiki is a collection of blogs.
Select one:
a. True
b. False
Question 3
Not yet answered
Marked out of 1.00

Flag question
Question text
In _________ , the organization purchases insurance as a means to
compensate for any loss.
Select one:
a. risk acceptance
b. risk analysis
c. risk transference
d. risk management
Question 4
Not yet answered
Marked out of 1.00

Flag question
Question text
If you are an worker managing your fringe benefits over your
company's intranet, you are engaging in _______ e-commerce.
Select one:
a. business-to-employee
b. consumer-to-consumer
c. e-government
d. business-to-business
e. business-to-consumer
Question 5
Not yet answered
Marked out of 1.00

Flag question
Question text
In a process called _________, a company allows nothing to run
unless it is approved, whereas in a process called _________, the
company allows everything to run unless it is not approved.
Select one:
a. whitelisting, blacklisting
b. encryption, blacklisting
c. whitelisting, encryption
d. encryption, whitelisting
e. blacklisting, whitelisting
Question 6
Not yet answered
Marked out of 1.00

Flag question
Question text
Channel conflict occurs when click-and-mortar companies have
problems with their regular distributors when they sell directly to
customers online.
Select one:
a. True
b. False
Question 7
Not yet answered
Marked out of 1.00

Flag question
Question text
IT security is the responsibility of everyone in the organization.
Select one:
a. False
b. True
Question 8
Not yet answered
Marked out of 1.00

Flag question
Question text
____________ restrict unauthorized individuals from using information
resources and are concerned with user identification.
Select one:
a. Access controls
b. Administrative controls
c. Physical controls
d. Communication controls
Question 9
Not yet answered
Marked out of 1.00

Flag question
Question text
E-commerce affects only businesses that sell products online.
Select one:
a. False
b. True
Question 10
Not yet answered
Marked out of 1.00

Flag question
Question text
Unintentional threats to information systems include all of the following
except:
Select one:
a. malicious software
b. power outage
c. tornados
d. lack of user experience
QUIZ 5

Question 1
Not yet answered
Marked out of 1.00

Flag question
Question text
_______ communicate(s) via radio waves using radio antennas
placed within adjacent geographic areas.
Select one:
a. cell phones
b. bluetooth
c. a satellite
d. near field communications
Question 2
Not yet answered
Marked out of 1.00

Flag question
Question text
The data processed by transaction processing systems provide the
inputs for other organizational information systems.
Select one:
a. True
b. False
Question 3
Not yet answered
Marked out of 1.00

Flag question
Question text
WiFi provides excellent security.
Select one:
a. True
b. False
Question 4
Not yet answered
Marked out of 1.00

Flag question
Question text
Information silos were particularly efficient when business processes
crossed functional boundaries in an organization.
Select one:
a. True
b. False
Question 5
Not yet answered
Marked out of 1.00

Flag question
Question text
________ reports are produced at scheduled intervals.
Select one:
a. routine
b. detailed
c. exception
d. ad hoc
Question 6
Not yet answered
Marked out of 1.00

Flag question
Question text
The most common wireless technology for TV and DVD remote
control devices is:
Select one:
a. Infrared
b. WiFi
c. Bluetooth
d. Wi-Max
Question 7
Not yet answered
Marked out of 1.00

Flag question
Question text
Enterprise resource planning systems take a (n) ________ view of the
overall organization.
Select one:
a. business process
b. user's
c. management
d. functional
Question 8
Not yet answered
Marked out of 1.00

Flag question
Question text
GEO satellites are used to comprise the GPS network.
Select one:
a. False
b. True
Question 9
Not yet answered
Marked out of 1.00

Flag question
Question text
Microwave transmissions are affected by environmental conditions
such as storms.
Select one:
a. True
b. False
Question 10
Not yet answered
Marked out of 1.00

Flag question
Question text
________ integrate the planning, management, and use of all of an
organization's resources, and are designed to tightly integrate the
functional areas of the organization.
Select one:
a. Supply chain management systems
b. Transaction processing systems
c. Functional area information systems
d. Enterprise resource planning systems
MIDTERM EXAM
Question 1
Not yet answered
Marked out of 2.00

Flag question
Question text
Data mining refers to the process of searching valuable business
information in a large database, data warehouse or data mart.
Select one:
a. False
b. True
Question 2
Not yet answered
Marked out of 1.00

Flag question
Question text
_____ auctions are the most common auction model for large
purchases.
Select one:
a. None of the above
b. Static
c. Forward
d. Reverse
Question 3
Not yet answered
Marked out of 1.00

Flag question
Question text
IT security is the responsibility of everyone in the organization.
Select one:
a. True
b. False
Question 4
Not yet answered
Marked out of 1.00

Flag question
Question text
E-commerce affects only businesses that sell products online.
Select one:
a. True
b. False
Question 5
Not yet answered
Marked out of 1.00

Flag question
Question text
Unintentional threats to information systems include all of the following
except:
Select one:
a. malicious software
b. tornados
c. power outage
d. lack of user experience
Question 6
Not yet answered
Marked out of 1.00

Flag question
Question text
The ratio between organizational inputs and outputs is an indication of
the organization's productivity.
Select one:
True
False
Question 7
Not yet answered
Marked out of 1.00

Flag question
Question text
You can always trust the content of Web 2.0 sites.
Select one:
a. False
b. True
Question 8
Not yet answered
Marked out of 1.00

Flag question
Question text
____________ restrict unauthorized individuals from using information
resources and are concerned with user identification.
Select one:
a. Physical controls
b. Administrative controls
c. Access controls
d. Communication controls
Question 9
Not yet answered
Marked out of 1.00

Flag question
Question text
In this type of e-commerce, the sellers and buyers are organizations.
Select one:
a. business to business
b. consumer to consumer
c. consumer to business
d. business to consumer
Question 10
Not yet answered
Marked out of 1.00

Flag question
Question text
In _________ , the organization purchases insurance as a means to
compensate for any loss.
Select one:
a. risk management
b. risk transference
c. risk acceptance
d. risk analysis
Question 11
Not yet answered
Marked out of 2.00

Flag question
Question text
Has a way of fouling up people's lives, especially when the party with
the inaccurate information has an advantage in power and authority.

Answer:
- Misinformation
Question 12
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: Information is the means through which the minds
expands and increases its capacity to achieve its goals, often as the
result of an input from another mind.

Answer:
- Information Definition
Question 13
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: The growth of information technology, with its
enhanced capacity for surveillance, communication, computation,
storage, and retrieval.

Answer:
- True
Question 14
Not yet answered
Marked out of 2.00

Flag question
Question text
Biometrics are an example of:
Select one:
a. something the user does.
b. something the user wants.
c. something the user has.
d. something the user knows.
Question 15
Not yet answered
Marked out of 1.00

Flag question
Question text
This information is closely related to property right.

Answer:
- Property
Question 16
Not yet answered
Marked out of 1.00

Flag question
Question text
Having one backup of your business data is sufficient for security
purposes.
Select one:
a. True
b. False
Question 17
Not yet answered
Marked out of 1.00

Flag question
Question text
At the end of a semester, a student knows that she must achieve a
grade of 81 or higher on her final exam to get an A in the course. She
has just performed what kind of analysis
Select one:
a. Simulation
b. Goal-seeking
c. What-if
d. Qualitative
e. Sensitivity
Question 18
Not yet answered
Marked out of 2.00

Flag question
Question text
Decision support systems support only lower and middle level
managers.
Select one:
True
False
Question 19
Not yet answered
Marked out of 1.00

Flag question
Question text
In a process called _________, a company allows nothing to run
unless it is approved, whereas in a process called _________, the
company allows everything to run unless it is not approved.
Select one:
a. blacklisting, whitelisting
b. encryption, blacklisting
c. whitelisting, blacklisting
d. whitelisting, encryption
e. encryption, whitelisting
Question 20
Not yet answered
Marked out of 1.00

Flag question
Question text
Being a figurehead and leader is part of the ________ managerial
role.
Select one:
a. informational
b. entrepreneurial
c. confrontational
d. interpersonal
e. decisional
Question 21
Not yet answered
Marked out of 2.00

Flag question
Question text
True or False: Liability means that individuals have the right to recover
the damages done to them by other individuals, organizations, or
systems.

Answer:
- True
Question 22
Not yet answered
Marked out of 1.00

Flag question
Question text
Electronic commerce provides opportunities for companies to do all of
the following except:
Select one:
a. put rich information on their Web sites
b. increase market share
c. expand at relatively high cost
d. expand their reach
Question 23
Not yet answered
Marked out of 1.00

Flag question
Question text
_____ refers to the practice of registering or using domain names for
the purpose of profiting from the goodwill or trademark belonging to
someone else.
Select one:
a. Domain fraud
b. None of the above
c. Cybersquatting
d. Domain spoofing
Question 24
Not yet answered
Marked out of 1.00

Flag question
Question text
________ is the process whereby a fully automated electronic
commerce transaction eliminates middlemen.
Select one:
a. Disintermediation
b. Disintegration
c. Supply chain integration
d. Value-added services
e. Direct sales
Question 25
Not yet answered
Marked out of 2.00

Flag question
Question text
Can be defined as an individual condition of life characterized by
exclusion from publicity.

Answer:
- Privacy
Question 26
Not yet answered
Marked out of 1.00

Flag question
Question text
A wiki is a collection of blogs.
Select one:
a. True
b. False
Question 27
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following statements concerning Web 2.0 sites is false?
Select one:
a. They encourage user participation.
b. They harness collective intelligence.
c. They feature remixable applications and data.
d. They cannot be used to start a business.
e. They deliver functionality as services.
Question 28
Not yet answered
Marked out of 1.00

Flag question
Question text
Searching for valuable business information in a database, data
warehouse, or data mart is referred to as ________.
Select one:
a. data mining
b. structured queries
c. expert system queries
d. query by example
e. database queries
Question 29
Not yet answered
Marked out of 2.00

Flag question
Question text
Channel conflict occurs when click-and-mortar companies have
problems with their regular distributors when they sell directly to
customers online.
Select one:
a. False
b. True
Question 30
Not yet answered
Marked out of 1.00

Flag question
Question text
Is the increased value of information in decision-making.

Answer:
- Privacy
Question 31
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is NOT a reason that managers need IT
support?
Select one:
a. number of alternatives is decreasing
b. the need to access remote information sources
c. the need to access remote information sources
d. decisions must typically be made under time pressure
e. decisions are becoming more complex
Question 32
Not yet answered
Marked out of 2.00

Flag question
Question text
This category of privacy concerns all forms of personal communication
which a person wishes to keep private.

Answer:
- Private communications
Question 33
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: Responsibility is accepting any consequences of
decisions and/or actions.
True
Answer:
- True
Question 34
Not yet answered
Marked out of 1.00

Flag question
Question text
_________ involves building an inappropriate trust relationship with
employees for the purpose of gaining sensitive information or
unauthorized access privileges.
Select one:
a. Phishing
b. Social engineering
c. Tailgating
d. Hacking
e. Spamming
Question 35
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not a strategy for mitigating the risk of threats
against information?
Select one:
a. Implement controls that minimize the impact of the threat
b. Install controls that block the risk
c. Continue operating with no controls and absorb any damages that
occur
d. All of the above are strategies for mitigating risk
e. Transfer the risk by purchasing insurance
Question 36
Not yet answered
Marked out of 1.00

Flag question
Question text
LinkedIn is a _____________social networking site that makes money
from advertising and services.
Select one:
a. Business-oriented
b. Video-upload
c. College
d. Blogging
e. Training
Question 37
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: Information forms the intellectual capital from which
human beings craft their lives and secure dignity.

Answer:
- True
Question 38
Not yet answered
Marked out of 2.00

Flag question
Question text
A ___________ refers to a choice among two or more alternatives
that individuals and groups make. Decisions are diverse and are made
continuously.
Select one:
a. What if analysis
b. none of the above
c. Management
d. Decision
e. productivity
Question 39
Not yet answered
Marked out of 2.00

Flag question
Question text
Which of the following is not an example of Web 2.0 applications?
Select one:
a. Wikis
b. Social Networks
c. Crowd sourcing
d. Blogs
Question 40
Not yet answered
Marked out of 1.00

Flag question
Question text
In the _____ marketplace model, EC technology is used to streamline
the purchasing process in order to reduce the cost of items
purchased, the administrative cost of procurement, and the
purchasing cycle time.
Select one:
a. electronic exchange
b. group purchasing
c. auctions
d. buy-side
e. sell-side
QUIZ 6

Question 1
Not yet answered
Marked out of 1.00

Flag question
Question text
A firm implements a new information system in one of its plants,
assesses the new system's performance, and then implements the
new system in its other plants. This is an example of ___________
conversion.
Select one:

a. Timely

b. Parallel

c. Direct

d. Phased

e. Pilot
Question 2
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not a goal of supply chain management?
Select one:

a. to decrease inventory levels

b. to reduce uncertainty along the supply chain

c. to improve customer service

d. to increase cycle time


Question 3
Not yet answered
Marked out of 1.00

Flag question
Question text
CRM systems are designed to achieve customer intimacy.
Select one:

a. True

b. False
Question 4
Not yet answered
Marked out of 1.00

Flag question
Question text
The pull model is make-to-stock.
Select one:

a. True

b. False
Question 5
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following best describes CRM?
Select one:

a. an information system

b. a process

c. a set of technologies

d. a way of thinking and acting


Question 6
Not yet answered
Marked out of 1.00

Flag question
Question text
When users ask for added functionality during a systems development
project, this is called:
Select one:

a. runaway project

b. scope creep

c. bloatware

d. user-defined software
Question 7
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not a problem along the supply chain
Select one:

a. decreased cycle times

b. poor customer service

c. loss of revenues

d. high inventory costs


Question 8
Not yet answered
Marked out of 1.00

Flag question
Question text
The deliverable of the systems design stage is:
Select one:

a. the prototype

b. user requirements

c. technical system specifications

d. the source code


Question 9
Not yet answered
Marked out of 1.00

Flag question
Question text
_________ is a method of delivering software, in which a vendor hosts
the applications, and customers access these applications over the
Internet.
Select one:

a. The off-the-shelf approach

b. Developing in house

c. Using an Application Service Provider

d. Software-as-a-Service
Question 10
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not a part of systems analysis phase of the
SDLC?
Select one:

a. identification of the causes of, and solution to, the business


problem

b. definition of the business problem

c. identification of the technical specifications of the solution

d. identification of the information requirements that the solution must


satisfy
FINALS

Question 1
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not an example of Web 2.0 applications?
Select one:

a. Crowd sourcing

b. Blogs

c. Social Networks

d. Wikis
Question 2
Not yet answered
Marked out of 1.00

Flag question
Question text
Information-based industries face a great threat from substitute
products.
Select one:

True

False
Question 3
Not yet answered
Marked out of 1.00

Flag question
Question text
Data warehouse deals with multiple subject areas and is typically
implemented and controlled by a central organizational unit such as
the corporate Information Technology (IT) group.
Select one:

a. False

b. True
Question 4
Not yet answered
Marked out of 1.00

Flag question
Question text
_____ reports are produced at scheduled intervals.
Select one:

a. exception

b. detailed

c. routine

d. ad hoc
Question 5
Not yet answered
Marked out of 1.00

Flag question
Question text
An Internet service provider (ISP) provides temporary Internet
connections to individuals and companies.

Answer:
- ISP
Question 6
Not yet answered
Marked out of 1.00

Flag question
Question text
Evaluating the benefits of IT projects is more complex than evaluating
their costs for all of the following reasons except:
Select one:

a. IT can be used for several different purposes

b. benefits are harder to quantify

c. benefits are often tangible

d. probability of obtaining a return from an IT investment is based on


the probability of implementation success
Question 7
Not yet answered
Marked out of 1.00

Flag question
Question text
In order to be considered successful, a firm must produce returns
greater than alternative investments.
Select one:

a. false

b. true
Question 8
Not yet answered
Marked out of 1.00

Flag question
Question text
CRM systems are designed to achieve customer intimacy.
Select one:

a. True

b. False
Question 9
Not yet answered
Marked out of 1.00

Flag question
Question text
________ reports are produced at scheduled intervals.
Select one:

a. exception

b. routine

c. detailed

d. ad hoc
Question 10
Not yet answered
Marked out of 1.00

Flag question
Question text
________ integrate the planning, management, and use of all of an
organization's resources, and are designed to tightly integrate the
functional areas of the organization.
Select one:

a. Enterprise resource planning systems

b. Supply chain management systems

c. Transaction processing systems

d. Functional area information systems


Question 11
Not yet answered
Marked out of 1.00

Flag question
Question text
The ratio between organizational inputs and outputs is an indication of
the organization's productivity.
Select one:

True

False
Question 12
Not yet answered
Marked out of 1.00

Flag question
Question text
_______ is business management software-typically a suite of
integrated applications-that a company can use to collect, store,
manage and interpret data from many business activities.
Select one:

a. Batch Processing

b. Enterprise Resource Planning

c. Online Transaction Processing

d. Transaction processing systems

e. None of the Above


Question 13
Not yet answered
Marked out of 1.00

Flag question
Question text
The computing skills necessary to be a hacker are increasing.
Select one:

a. False

b. True
Question 14
Not yet answered
Marked out of 1.00

Flag question
Question text
Process and procedures are important but not critical to the effective
use of computer based information systems.
Select one:

a. false

b. true
Question 15
Not yet answered
Marked out of 1.00

Flag question
Question text
The most common solution to supply chain problems is building
inventories.
Select one:

a. True

b. False
Question 16
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following statements is false?
Select one:

a. IT decreases the number of promotional opportunities.

b. IT reduces stress by giving managers more time to make decisions.

c. IT makes managers more productive.

d. IT increases the number of employees who can report to a single


manager.

e. IT ultimately decreases the number of managers and experts.


Question 17
Not yet answered
Marked out of 1.00

Flag question
Question text
This category of privacy concerns all forms of personal communication
which a person wishes to keep private.

Answer:
- Private Communications
Question 18
Not yet answered
Marked out of 1.00

Flag question
Question text
Is a communication standard that enables business partners to
exchange routine documents, such as purchase orders,electronically.
Select one:

a. None of the above

b. Electronic Data Interchange

c. Extranets

d. Inter-organizational Information System


Question 19
Not yet answered
Marked out of 1.00

Flag question
Question text
The Internet increases traditional barriers to entry into a market.
Select one:

a. False

b. True
Question 20
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: Information forms the intellectual capital from which
human beings craft their lives and secure dignity.

Answer:
- True
Question 21
Not yet answered
Marked out of 1.00

Flag question
Question text
Office automation systems
Select one:

a. Are a type of inter-organizational system

b. Include report generators.

c. are comprised of software that is used to develop documents and


spreadsheets

d. Are usually developed in-house.

e. Support only the clerical staff.


Question 22
Not yet answered
Marked out of 1.00

Flag question
Question text
If Amazon uses a list of all your purchases (books bought, price paid,
dates) to recommend other books to you, then it is applying its
__________.
Select one:

a. knowledge

b. data

c. information

d. experience

e. wisdom
Question 23
Not yet answered
Marked out of 1.00

Flag question
Question text
Can be defined as an individual condition of life characterized by
exclusion from publicity.

Answer:
- Privacy
Question 24
Not yet answered
Marked out of 1.00

Flag question
Question text
The most common solution to supply chain problems is building
inventories.
Select one:

a. True

b. False
Question 25
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not an example of Web 2.0 applications?
Select one:

a. Wikis

b. Crowd sourcing

c. Social Networks

d. Blogs
Question 26
Not yet answered
Marked out of 1.00

Flag question
Question text
End-user computer refers to a group of end users working together to
manage their interactions with a computer.
Select one:

a. true

b. false
Question 27
Not yet answered
Marked out of 1.00

Flag question
Question text
You can always trust the content of Web 2.0 sites.
Select one:

a. False

b. True
Question 28
Not yet answered
Marked out of 1.00

Flag question
Question text
__________ consist of data that are related to demand, shipments,
orders, returns, and schedules.
Select one:

a. material flows

b. reverse logistics

c. reverse flows

d. information flows
Question 29
Not yet answered
Marked out of 1.00

Flag question
Question text
A wiki is a collection of blogs.
Select one:

a. True

b. False
Question 30
Not yet answered
Marked out of 1.00

Flag question
Question text
LinkedIn is a _______ social networking site that makes money from
advertising and services.
Select one:

a. Business-oriented

b. Blogging

c. College

d. Training

e. Video-upload
Question 31
Not yet answered
Marked out of 1.00

Flag question
Question text
The greatest problem with GEO satellites is which of the following?
Select one:

a. orbital life

b. size of footprint

c. availability

d. propagation delay
Question 32
Not yet answered
Marked out of 1.00

Flag question
Question text
A ___________ refers to a choice among two or more alternatives
that individuals and groups make. Decisions are diverse and are made
continuously.
Select one:

a. none of the above

b. What if analysis

c. productivity

d. Management

e. Decision
Question 33
Not yet answered
Marked out of 1.00

Flag question
Question text
Approach that defines an initial list of user requirements builds a
prototype system and then improves the system in several iterations
based on users' feedback.
Select one:

a. prototyping

b. Software engineering

c. End User Development

d. Rapid User Development


Question 34
Not yet answered
Marked out of 1.00

Flag question
Question text
IT security is the responsibility of everyone in the organization.
Select one:

a. True

b. False
Question 35
Not yet answered
Marked out of 1.00

Flag question
Question text
In the _________ marketplace model, EC technology is used to
streamline the purchasing process in order to reduce the cost of items
purchased, the administrative cost of procurement, and the
purchasing cycle time.
Select one:

a. sell-side

b. auctions

c. buy-side

d. electronic exchange

e. group purchasing
Question 36
Not yet answered
Marked out of 1.00

Flag question
Question text
An information system that uses computer technology to perform
some or all of its intended tasks.
Select one:

a. Computer Based Information System

b. Information Systems

c. Operating systems

d. Information Technology
Question 37
Not yet answered
Marked out of 1.00

Flag question
Question text
Microwave transmissions are affected by environmental conditions
such as storms.
Select one:

a. False

b. True
Question 38
Not yet answered
Marked out of 1.00

Flag question
Question text
A wiki is a collection of blogs.
Select one:

a. False

b. True
Question 39
Not yet answered
Marked out of 1.00

Flag question
Question text
Refers to those categories of information which refer to only that
specific person, for example bibliographic (name, address) and
financial information. This type of information is of relevance to all
categories of information professionals.
Select one:

a. personal information

b. privacy of the body

c. privacy of one's possessions

d. private communication
Question 40
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not a characteristic of twisted-pair wire?
Select one:

a. Subject to interference from other electrical source

b. Easy to work with

c. Inexpensive

d. Secure transmissions

e. None of these
Question 41
Not yet answered
Marked out of 1.00

Flag question
Question text
Data can be gathered and analyzed from customers using what are
known as
Select one:

a. Customer Satisfaction

b. Customer facing Applications

c. Customer Service

d. Customer touch points


Question 42
Not yet answered
Marked out of 1.00

Flag question
Question text
The advantages of electronic commerce for consumers include all of
the following except:
Select one:

a. You can buy from home 24 hours per day, 7 days per week.

b. You can easily compare prices and features.

c. You have a wider variety of products to choose from.

d. You can find unique items.

e. You typically cannot access additional information, so you do not


have information overload.
Question 43
Not yet answered
Marked out of 1.00

Flag question
Question text
__________ refers to the practice of registering or using domain
names for the purpose of profiting from the goodwill or trademark
belonging to someone else.
Select one:

a. Domain fraud

b. Domain spoofing

c. Cyber squatting

d. None of the above


Question 44
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following statements concerning Web 2.0 sites is false?
Select one:

a. They deliver functionality as services.

b. They harness collective intelligence.

c. They encourage user participation.

d. They feature remixable applications and data.

e. They cannot be used to start a business.


Question 45
Not yet answered
Marked out of 1.00

Flag question
Question text
A list of football scores with the names of the teams that played the
games would be considered information
Select one:

a. false

b. true
Question 46
Not yet answered
Marked out of 1.00

Flag question
Question text
Biometrics are an example of:
Select one:

a. something the user does.

b. something the user knows.

c. something the user wants.

d. something the user has.


Question 47
Not yet answered
Marked out of 1.00

Flag question
Question text
Competitive advantage for an organization manifests itself as all of the
following except:
Select one:

a. Increased time to market

b. Lower costs

c. Higher quality

d. Increased speed

e. Increased profits
Question 48
Not yet answered
Marked out of 1.00

Flag question
Question text
Channel conflict occurs when click-and-mortar companies have
problems with their regular distributors when they sell directly to
customers online.
Select one:

a. True

b. False
Question 49
Not yet answered
Marked out of 1.00

Flag question
Question text
_________ is a method of delivering software, in which a vendor hosts
the applications, and customers access these applications over the
Internet.
Select one:

a. Software-as-a-Service

b. The off-the-shelf approach

c. Using an Application Service Provider

d. Developing in house
Question 50
Not yet answered
Marked out of 1.00

Flag question
Question text
Electronic commerce provides opportunities for companies to do all of
the following except:
Select one:

a. expand their reach

b. increase market share

c. expand at relatively high cost

d. put rich information on their Web sites

Vous aimerez peut-être aussi