COMP111 Quizes
COMP111 Quizes
Data mining refers to the process of searching valuable business information in a large
database, data warehouse or data mart.
Select one:
a. True
b. False
2. A ___________ refers to a choice among two or more alternatives that individuals and
groups make. Decisions are diverse and are made continuously.
Select one:
a. none of the above
b. What if analysis
c. productivity
d. Management
e. Decision
3. Decision support systems support only lower and middle level managers.
Select one:
False
True
4. The ratio between organizational inputs and outputs is an indication of the organization's
productivity.
Select one:
False
True
Check
Select one:
a. False
b. True
Check
6. Searching for valuable business information in a database, data warehouse, or data mart is
referred to as ________.
Select one:
a. database queries
b. query by example
c. expert system queries
d. data mining
e. structured queries
7. At the end of a semester, a student knows that she must achieve a grade of 81 or higher on
her final exam to get an A in the course. She has just performed what kind of analysis
Select one:
a. Simulation
b. What-if
c. Qualitative
d. Sensitivity
e. Goal-seeking
8. Which of the following is NOT a reason that managers need IT support?
Select one:
a. decisions are becoming more complex
b. decisions must typically be made under time pressure
c. the need to access remote information sources
d. number of alternatives is decreasing
Select one:
a. confrontational
b. decisional
c. entrepreneurial
d. interpersonal
e. informational
Check
10. A (n) ________ provides rapid access to timely information and direct access to
management reports.
Select one:
a. digital dashboard
b. expert system
c. data warehouse
d. neural network
11. This category of privacy concerns all forms of personal communication which a person
wishes to keep private.
13. Has a way of fouling up people's lives, especially when the party with the inaccurate
information has an advantage in power and authority.
Misinformation
Answer:
Check
14. True or False: The growth of information technology, with its enhanced capacity for
surveillance, communication, computation, storage, and retrieval.
TRUE
Answer:
Check
16. Can be defined as an individual condition of life characterized by exclusion from publicity.
Privacy
Answer:
Check
17. True or False: Information forms the intellectual capital from which human beings craft their
lives and secure dignity.
TRUE
Answer:
Check
18. True or False: Liability means that individuals have the right to recover the damages done to
them by other individuals, organizations, or systems.
TRUE
Answer:
Check
19. True or False: Information is the means through which the minds expands and increases its
capacity to achieve its goals, often as the result of an input from another mind.
TRUE
Answer:
Check
20. True or False: Responsibility is accepting any consequences of decisions and/or actions.
TRUE
Answer:
Check
Select one:
a. something the user does.
b. something the user wants.
c. something the user knows.
Select one:
False
True
23. Which of the following is not a strategy for mitigating the risk of threats against information?
Select one:
a. Transfer the risk by purchasing insurance
b. Install controls that block the risk
c. Continue operating with no controls and absorb any damages that occur
d. All of the above are strategies for mitigating risk
24. ____________ restrict unauthorized individuals from using information resources and are
concerned with user identification.
Select one:
a. Physical controls
b. Communication controls
c. Access controls
d. Administrative controls
25. In _________ , the organization purchases insurance as a means to compensate for any
loss.
Select one:
a. risk analysis
b. risk management
c. risk transference
d. risk acceptance
26. In a process called _________, a company allows nothing to run unless it is approved,
whereas in a process called _________, the company allows everything to run unless it is
not approved.
Select one:
a. encryption, whitelisting
b. whitelisting, encryption
c. encryption, blacklisting
d. whitelisting, blacklisting
e. blacklisting, whitelisting
Check
Select one:
False
True
28. Having one backup of your business data is sufficient for security purposes.
Select one:
False
True
29. _________ involves building an inappropriate trust relationship with employees for the
purpose of gaining sensitive information or unauthorized access privileges.
Select one:
a. Phishing
b. Social engineering
c. Spamming
d. Hacking
e. Tailgating
30. Unintentional threats to information systems include all of the following except:
Select one:
a. tornados
b. lack of user experience
c. malicious software
d. power outage
31. You can always trust the content of Web 2.0 sites.
Select one:
True
False
32. LinkedIn is a _____________social networking site that makes money from advertising and
services.
Select one:
a. College
b. Training
c. Business-oriented
d. Video-upload
e. Blogging
33. In this type of e-commerce, the sellers and buyers are organizations.
Select one:
a. consumer to consumer
b. consumer to business
c. business to consumer
d. business to business
Check
Select one:
a. Blogs
b. Wikis
c. Social Networks
d. Crowd sourcing
35. _____ refers to the practice of registering or using domain names for the purpose of profiting
from the goodwill or trademark belonging to someone else.
Select one:
a. Cybersquatting
b. None of the choices
c. Domain spoofing
d. Domain fraud
36. E-commerce affects only businesses that sell products online.
Select one:
False
True
37. Electronic commerce provides opportunities for companies to do all of the following except:
Select one:
a. expand their reach
b. increase market share
c. put rich information on their Web sites
Select one:
True
False
Check
39. ________ is the process whereby a fully automated electronic commerce transaction
eliminates middlemen.
Select one:
a. Direct sales
b. Supply chain integration
c. Disintermediation
d. Disintegration
e. Value-added services
40. Channel conflict occurs when click-and-mortar companies have problems with their regular
distributors when they sell directly to customers online.
Select one:
True
False
Select one:
a. They harness Mive intelligence.
b. They cannot be used to start a business.
c. They deliver functionality as services.
d. They feature remixable applications and data.
The advantages of electronic commerce for consumers include all of the following except:
Select one:
a. You can easily compare prices and features.
b. You can find unique items.
c. You have a wider variety of products to choose from.
d. You typically cannot access additional information, so you do not have information overload.
e. You can buy from home 24 hours per day, 7 days per week.
_______ refers to efforts by unauthorized users to access data traveling over wireless networks.
Select one:
a. Eavesdropping
b. RF jamming
c. Installing rogue access devices
Check
A hotspot is a small geographical perimeter within which a wireless access point provides service to
a number of users.
Select one:
a. True
b. False
The greatest problem with GEO satellites is which of the following?
Select one:
a. propagation delay
b. size of footprint
c. orbital life
d. availability
WiFi provides excellent security.
Select one:
a. True
b. False
_______ communicate(s) via radio waves using radio antennas placed within adjacent geographic
areas.
Select one:
a. near field communications
b. cell phones
c. bluetooth
d. a satellite
_______ is a wireless standard that enables temporary, short-range connection between mobile
devices.
Select one:
a. cell phones
b. WiFi
c. bluetooth
d. a satellite
The most common wireless technology for TV and DVD remote control devices is:
Select one:
a. WiFi
b. Wi-Max
c. Bluetooth
d. Infrared
Check
Select one:
a. True
b. False
GEO satellites are used to comprise the GPS network.
Select one:
a. True
b. False
Check
With regard to mobile computing, _______ means that knowing where a user is physically located is
a key to offering relevant products and services.
Select one:
a. Localization
b. Instant connectivity
c. Ubiquity
d. Convenience
e. Personalization
Information silos were particularly efficient when business processes crossed functional boundaries
in an organization.
Select one:
a. False
b. True
Which of the following is not a characteristic of a transaction processing system?
Select one:
a. low computation complexity
b. high level of accuracy, data integrity, and security
c. sources of data are mainly internal
Enterprise resource planning systems take a (n) ________ view of the overall organization.
Select one:
a. business process
b. management
c. functional
d. user's
When interest is credited to your savings account at your bank, it is called a
Select one:
a. transaction
b. process
c. calculation
d. function
The data processed by transaction processing systems provide the inputs for other organizational
information systems.
Select one:
True
False
Which of the following best describes CRM?
Select one:
a. an information system
b. a way of thinking and acting
c. a process
d. a set of technologies
Check
Is a communication standard that enables business partners to exchange routine documents, such
as purchase orders,electronically.
Select one:
a. None of the above
b. Extranets
c. Inter-organizational Information System
Select one:
a. consumers became mobile
b. customer relationship management systems were developed
c. people move from farms to cities
Select one:
a. to decrease inventory levels
b. to increase cycle time
c. to reduce uncertainty along the supply chain
Select one:
a. Operational CRM Systems
b. None of the Above
c. Analytical CRM Systems
__________ consist of data that are related to demand, shipments, orders, returns, and schedules.
Select one:
a. information flows
b. material flows
c. reverse logistics
d. reverse flows
Customer-facing applications is an organization's sales, field service, and customer interaction
center representatives interact directly with customers.
Select one:
True
False
Check
Data can be gathered and analyzed from customers using what are known as
Select one:
a. Customer touch points
b. Customer Service
c. Customer facing Applications
d. Customer Satisfaction
Check
Select one:
a. True
b. False
CRM systems are designed to achieve customer intimacy.
Select one:
True
False
The deliverable of the systems design stage is:
Select one:
a. the prototype
b. user requirements
c. technical system specifications
Select one:
a. Parallel
b. Pilot
c. Phased
d. Timely
e. Direct
Check
Select one:
a. True
b. False
_________ is a method of delivering software, in which a vendor hosts the applications, and
customers access these applications over the Internet.
Select one:
a. Developing in house
b. The off-the-shelf approach
c. Using an Application Service Provider
d. Software-as-a-Service
Which of the following is not a part of the typical IS operational plan?
Select one:
a. The IT architecture
b. The mission of the IS function
c. The organizational mission
d. The application portfolio
Which of the following is not a part of systems analysis phase of the SDLC?
Select one:
a. identification of the technical specifications of the solution
b. identification of the information requirements that the solution must satisfy
c. identification of the causes of, and solution to, the business problem
Select one:
a. False
b. True
Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the
following reasons except:
Select one:
a. benefits are harder to quantify
b. probability of obtaining a return from an IT investment is based on the probability of
implementation success
c. benefits are often tangible
Select one:
a. bloatware
b. scope creep
c. runaway project
d. user-defined software
Prototyping allows the users to clarify their information requirements as they use the prototype.
Select one:
a. False
b. True
Check
1. Network interface cards are special adapters that link an individual device to the
communications medium on a local area network.
Select one:
a. False
b. True
2. Which of the following is not a disadvantage of telecommuting for employees?
Select one:
a. Lower pay (in some cases)
b. Slower promotions
c. No workplace visibility
d. Possible loss of fringe benefits
3. Competitive advantage for an organization manifests itself as all of the following except:
Select one:
a. Increased speed
b. Lower costs
c. Higher quality
d. Increased profits
Select one:
a. True
b. False
5. Data marts are often built and controlled by a single department within an organization
Select one:
a. True
b. False
6. Unified Communication is a method of trying to integrate all forms of electronic
communication under one standardized platform or method
Select one:
a. False
b. True
7. Which of these consists of raw facts, such as an employee's name?
Select one:
a. Process
b. Knowledge
c. Information
d. Data
8. The Internet increases traditional barriers to entry into a market.
Select one:
a. True
b. False
b. False
10. Unlike a data mart, deals with multiple subject areas and is typically implemented and
controlled by a central organizational unit such as the corporate Information Technology (IT)
group.
data w arehouse
Answer:
Check
Select one:
a. automate semiautomatic business processes
b. store large amounts of information in a very large space
c. increase the effectiveness and efficiency of people working in groups
d. provide fast, accurate communications among organizations
12. Improving the manner in which internal business processes are executed is which strategy
for competitive advantage?
Select one:
a. Operational effectiveness
b. Innovation
c. Cost leadership
d. Differentiation
e. Customer orientation
13. The introduction of ATM machines by Citibank was a classic example of which strategy for
competitive advantage?
Select one:
a. Customer orientation
b. Differentiation
c. Operational effectiveness
d. Innovation
e. Cost leadership
Check
14. Information-based industries face a great threat from substitute products.
Select one:
a. False
b. True
Check
15. When Amazon welcomes you by name back to its Web site on your second visit, this is an
example of which strategy for competitive advantage?
Select one:
a. Innovation
b. Cost leadership
c. Customer orientation
d. Differentiation
e. Operational effectiveness
A software program used to access and view Web pages.
BROWSER
Answer:
Check