True / False Questions
True / False Questions
1. Having a basic understanding of information systems is good, but not nearly as important as
(p. 4)
understanding other functional business areas. FALSE
2. Information technology can help all kinds of businesses improve the efficiency and
(p. 4)
effectiveness of their business processes and managerial decision making. TRUE
3. Maintenance is one of the key activities in the development and management of a business
(p. 18)
information system. TRUE
4. One system can be made up of other systems or can be a part of a bigger system. TRUE
(p. 4)
5. Smoke signals and library card catalogs are examples of an information system. TRUE
(p. 4)
6. The term "information technology" refers to all of the components and resources necessary to
(p. 7)
deliver the information and functions of a system to an organization. FALSE
The term "information technology" refers to the various hardware, software, networking, and
data management components necessary for the system to operate. "Information system"
describes all of the components and resources necessary to deliver its information and
7. An information system can use hardware as simple as a pencil and paper to capture and store
(p. 7)
its data. TRUE
10. Most retail stores now use computer-based information systems to keep track of inventory, but
(p. 8)
few use them to evaluate sales trends. FALSE
Most retail store now use computer-based information systems to both keep track of inventory
11. Decision support systems (DSS) provide managerial end users with ad hoc and interactive
(p. 10)
support of their decision-making processes. TRUE
12. Expert systems can serve as consultants to users by providing expert advice in limited subject
(p. 11)
areas. TRUE
13. An extranet is an Internet-like network inside the enterprise; an intranet is between the
(p. 12)
enterprise and its trading partners. FALSE
14. Enterprise collaboration systems involve the use of software tools to support e-commerce
(p. 13)
functions with customers and suppliers. FALSE
Enterprise collaboration systems involve the use of software tools to support communication,
coordination, and collaboration among the members of networked teams and workgroups.
TRUE
15. A process control system is an example of an operation support system that records and
(p. 14)
processes data resulting from business transactions. FALSE
16. In real-time processing, data are processed immediately after a transaction occurs. TRUE
(p. 14)
17. Management information systems (MIS) provide information in the form of reports and
(p. 14)
displays. TRUE
19. Information systems that focus on operational and managerial applications in support of basic
(p. 15)
business functions, such as accounting, are known as strategic information systems. FALSE
Information systems that focus on operational and managerial applications in support of basic
20. An expert system can provide advice for operational chores, such as equipment diagnostics or
(p. 15)
loan portfolio management. TRUE
22. A large-scale movement to outsource basic software programming functions to India, the
(p. 20)
Middle East, and Asia-Pacific countries has resulted because U.S. programmers have been
23. Falling prices of computer hardware and software should continue to induce more businesses
(p. 23)
to expand their computerized operations.
TRUE
24. Increased importance placed on cyber-security will reduce the need for workers skilled in
(p. 23-
information security. FALSE
24)
Increased importance placed on cyber-security will result in an increased need for workers
25. The human body and an oil refinery can both be classified as systems. TRUE
(p. 26)
Many examples of systems can be found in the physical and biological sciences, technology,
28. A sales manager exercises control when reassigning salespersons to new territories after
(p. 29)
evaluating feedback about their sales performance. TRUE
29. An organization is considered an open system when it interfaces and interacts with other
(p. 29)
systems in its environment. TRUE
30. Multiple systems never share an environment; each has its own. FALSE
(p. 29)
31. Information systems are just like any other system, but their value to the modern organization
(p. 31)
is unlike any other system ever created. TRUE
32. Anyone who uses an information system or the information it produces can be referred to as
(p. 32)
an end user. TRUE
33. Most end users in business are referred to as knowledge workers, people who spend most of
(p. 32)
their time communicating, collaborating, and creating, using, and distributing information.
TRUE
34. Optical disks and plastic cards are examples of hardware resources, but paper forms are not.
(p. 32-
FALSE
33)
Optical disks, plastic cards, and paper forms are all examples of hardware resources. TRUE
35. In the context of the information systems model, computer peripherals typically consist of
(p. 33)
hardware devices, such as keyboards, and productivity tools, such as word processing
software. FALSE
Computer peripherals typically consist of hardware devices that allow the input, output, or
37. In the context of the information systems model, information is subjected to a "value-added"
(p. 34)
process that converts it to data that meet the needs of end users. FALSE
In the context of the information systems model, data is subjected to a value-added process
that converts it to information that meets the needs of end users TRUE.
38. Data can be thought of as context independent. This means that a list of numbers or name by
(p. 34)
themselves do not provide an understanding of the context in which they were recorded.
TRUE
39. Data are raw facts or observations, typically about physical phenomena or business
(p. 34)
transactions. TRUE
40. In information systems activities, the processing of data resources typically takes the form of
(p. 35)
data entry activities. FALSE
The input of data resources typically takes the form of data entry activities. TRUE
41. In information systems activities, a user interface commonly refers to a more convenient and
(p. 35)
efficient method of end-user input and output with a computer system. TRUE
42. Calculating employees' pay, federal taxes, and other payroll deductions is a business example
(p. 35)
of a computerized processing activity. TRUE
43. After data has been entered into a computerized information system, it is usually not
(p. 35)
necessary to correct or update it. That is the benefit of a computerized system—once entered,
The quality of any data stored in an information system must be maintained by a continual
45. In its simplest form, a system consists of all the following except:
(p. 4)
A. A group of cooperative users
46. According to the Real World case, eCourier embraced technology by:
(p. 5)
A. Doing the same things that all their competitors were doing successfully.
D. Giving all their couriers handheld GPS units for tracking and communication.
Lufthansa plans to phase out the desktop computers that it had previously deployed in
48. According to the Real World Case, the goal of Bryan Cave is:
(p. 6)
A. To have the best value for their customers.
49. According to the Real World Case, the Bryan Cave law firm had difficulty billing its real estate
(p. 6)
customers because:
50. According to the Real World Case, the big problem facing the Bryan Cave law firm in 2002
(p. 6)
was:
D. Making the highest profits from their resources while delivering the highest customer value.
51. All the following are examples of an information system, except:
(p. 7)
A. A day planner
B. A cash register
52. According to the text, most retail stores today use computer-based information systems to
(p. 8)
support business processes and operations. This support falls broadly into the categories of:
54. All of the following are fundamental reasons for business applications of information
(p. 8)
technology except:
56. According to the textbook case, the Oco BI software used by Welch's:
(p. 9)
A. increases the number of deliveries made on Fridays.
D. helps them even out the number of delivery trucks used each day of the week.
57. The expanding role of information systems from the 1950s to the present, in sequential order,
(p. 10)
are:
B. Data processing, management reporting, strategic and end user support, electronic
C. Data processing, management reporting, decision support, strategic and end user support,
D. Electronic business and commerce, management reporting, data processing, strategic and
58. The rapid development of microcomputer processing power, application software packages,
(p. 10)
and telecommunications networks gave birth to the phenomenon of _______________.
B. MIS departments
D. electronic monitoring
59. Which of the following is a false statement?
(p. 11)
A. Today's information systems are doing the same basic things that they did over 40 years
ago.
60. Companies generally rely on e-business applications to do all of the following except:
(p. 12)
A. Re-engineer internal business processes
B. electronic commerce
B. uses the Internet, intranets, and extranets to support every step of the commercial process,
C. involves Internet security and payment mechanisms that ensure completion of delivery and
payment processes
64. The text classifies information systems as either operations or management support
(p. 13)
information systems. Which one of the following would not be classified as an operations
support system?
65. Electronic commerce systems generally include all of the following except:
(p. 13)
A. Internet websites for online sales
B. transactional
C. inter-departmental
D. mechanical
67. A nuclear power plant uses electronic sensors linked to computers to continually monitor
(p. 14)
processes and make instant (real-time) adjustments that control the power generation
68. When employees in a project team use email to send and receive messages and use video
(p. 14)
conferences to hold electronic meetings and coordinate their activities, they are using
_______________.
69. A database of customer purchases that provides end-user managers with interactive and ad
(p. 15)
hoc decision-making support is referred to as _______________.
availability of the raw materials necessary to manufacture the product. What type of system
71. When information system applications focus on providing information and support for effective
(p. 15)
decision making by managers, they are called _______________ support systems.
A. decision
B. management
C. collaboration
D. process
72. An information system that supports the business functions of accounting, finance, human
(p. 16)
resource management, marketing, or operations would be classified as a(n) _______________
system.
A. functional business
B. executive information
C. management information
D. decision support
73. Information systems that focus on operational and managerial applications in support of basic
(p. 16)
business functions, such as accounting or marketing, are known as _______________.
B. handle record-keeping
75. Executive information systems (EIS) are tailored to meet the strategic information needs of
(p. 15)
which of the following management levels?
76. Business applications of information systems are typically combinations of several types of
(p. 15)
information systems. This integration is referred to as _______________ systems.
A. information reporting
B. decision support
C. cross-functional informational
requirements of _______________.
A. customers
B. suppliers
C. business partners
78. A functional business system supports all of the following types of applications except:
(p. 16)
A. Accounting
C. Marketing
B. Integrated information
C. Executive information
D. Expert
80. According to the textbook case on responsibility and accountability, even if a project is not an
(p. 17-
IT project, who is held responsible for optimizing returns on IT-related investments?
18)
A. CEO
B. CFO
C. COO
D. CIO
81. According to the textbook case on responsibility and accountability:
(p. 17-
A. IT is always 100% responsible for any large project involving information technology.
18)
B. IT is never 100% responsible for any large project involving information technology.
C. IT is sometimes 100% responsible for any large project involving information technology.
82. Developing an information system solution involves all of the following steps except:
(p. 18)
A. Investigation
B. Implementation
C. Redesign
D. Maintenance
83. Computer-based information systems are usually conceived, designed, and implemented
(p. 18)
using some form of systematic development process. The investigation stage includes
_______________.
B. computer programmers
C. systems analysts
86. According to the text, the steps of developing an information system, in their proper order,
(p. 19)
are:
87. In the lawsuit filed against Hannaford Brothers, which of the following was not alleged as a
(p. 20-
reason for filing the suit?
21)
A. Hannaford has installed inadequate security measures.
B. Hannaford did not disclose the security breach to the public quickly enough.
88. The information systems function is equally as important to business success as the function
(p. 24)
of _______________.
A. accounting
B. operations management
ultimate destination
D. Monitoring and evaluating feedback to determine whether a system is moving toward the
90. According to the Real World case about the New York Times, the newspaper industry is in
(p. 27)
very deep trouble. What has become most important to them?
A. Business model innovation
B. Internet connectivity
C. Technological innovation
D. Communication initiatives
A. environment
B. feedback loop
C. subsystem
D. interface
92. A system that can change itself or its environment in order to survive is _______________
(p. 29)
system.
A. a control
B. a self-monitoring
C. an environmental
D. an adaptive
93. Organizations are examples of _______________ systems because they interface and interact
(p. 29)
with other systems in their environment.
A. linked
B. open
C. dependent
D. parallel
B. closed
C. open adaptive
D. closed adaptive
B. Software
C. People
D. Time
B. A keyboard
97. All of the following would be considered a software resource in an information system except:
(p. 31)
A. A computer operating system
C. A telecommunication network
C. It consists of operating instructions for people who will use an information system
99. In an information system, alphanumeric data normally takes the form of _______________.
(p. 33)
A. numbers and alphabetical characters
100. In an information system, image data normally takes the form of _______________.
(p. 33)
A. numbers and alphabetical characters
B. communications processors
software
103. All of the following normally happens to data during a value-added process except:
(p. 34)
A. Their useful life is determined
104. All of the following are considered computer hardware technology except:
(p. 32-
A. Operating system software
33)
B. Microcomputers
C. Keyboards
D. Printers
C. Subtotals do not add up to total sales; IT staff investigates whether data entry or processing
is the problem
B. Paper form
C. Transaction document
D. Source document
information in an organization.
information
109. With a strategic information system (SIS), information technology becomes an integral part of
(p. 11)
business processes, products, and _______________.
services
110. _______________ is defined as the use of Internet technologies to work and empower business
(p. 12)
processes, electronic commerce, and enterprise collaboration within a company and with its
E-business
111. Enterprise collaboration systems use software tools to support _______________ among the
(p. 12)
members of networked teams and workgroups.
112. During the 1980s and 1990s, information technology helped companies gain a competitive
(p. 11)
advantage in the global marketplace. This is referred to as the _______________ information
systems concept.
strategic
113. A _______________ team uses a corporate intranet and the Internet for electronic mail,
(p. 13)
videoconferencing, electronic discussion groups, and Web pages of work-in-progress
virtual
114. Electronic _______________ is the buying, selling, marketing, and servicing of products,
(p. 13)
services, and information over a variety of computer networks.
commerce
115. Types of information systems are generally classified as either operations information systems
(p. 13)
or _______________ information systems.
management
116. Marketing and selling books to consumers over the Internet is an example of _______________
(p. 13)
commerce.
117. A system that controls the industrial processes of an organization would be classified as a(n)
(p. 13)
_______________ support system.
operations
118. Transaction processing systems process transactions in two basic ways, _______________
(p. 14)
processing or real-time.
batch
119. When a manager uses an interactive, computer-based information system to assist in his/her
(p. 15)
decision making, the manager is using a _______________ support system.
decision
120. A system that provides pre-specified reports for the managers of an organization would be
(p. 15)
classified as a _______________ system.
management
121. Enterprise collaboration systems enhance team and workgroup communication and
(p. 14)
productivity, and include applications that are sometimes called office _______________
systems.
automation
122. The goal of knowledge management systems (KMS) is to help knowledge workers create,
(p. 15)
organize, and _______________ important business knowledge wherever and whenever it is
needed.
share
123. The success of an information system should be measured by both its efficiency and its
(p. 17)
_______________.
effectiveness
analysis
125. As a manager, you must be aware of what uses of information technology might be
(p. 20)
considered improper, irresponsible, or harmful to individuals or to society. This dimension of
responsibility.
ethical
126. A manufacturing system accepts raw materials as input and produces finished goods as
(p. 26)
output. An information system accepts data as input and processes them into
_______________ as output.
information
127. A system with feedback and _______________ functions is sometimes called a cybernetic
(p. 29)
system.
control
128. The _______________ component in a cybernetic system refers to the data about the
(p. 29)
performance of the system.
feedback
130. _______________ involves monitoring and evaluating feedback to determine whether a system
(p. 29)
is moving toward the achievement of its goal.
Control
131. People, hardware, software, __________, and networks are the five basic resources of
(p. 31)
information systems.
data
132. Information processing consists of the system activities of input, processing, output,
(p. 32)
_______________, and control.
storage
133. In the context of the information system model, software resources include the sets of
(p. 33)
operating instructions called _______________, which direct and control computer hardware.
programs
134. In the context of the information systems model, _______________ are the operating
(p. 33)
instructions for the people who will use an information system. Examples are instructions for
procedures
135. Information in various forms is transmitted to end users and made available to them in the
(p. 35)
_______________ activity.
output
137. _______________ is the information systems activity in which data and information are retained
(p. 36)
in an organized manner for later use.
Storage
138. In an information system, the _______________ activity would be considered the component
(p. 36)
that evaluates feedback in order to determine whether the system is moving toward the
control
Chapter 02 Competing with Information Technology Answer Key
(p. 46) capabilities in order to gain a strategic advantage over competitive forces in the global
marketplace, it is using information systems in a strategic role.
TRUE
FALSE
3. Most products and services have some sort of substitute available to the consumer.
(p. 49)
TRUE
4. In the Internet world, a firm's biggest competitor may be one that is not yet in the marketplace
TRUE
5. The threat of new entrants is often at its strongest during periods of rising costs or inflation.
The threat of substitutes is often at its strongest during periods of rising costs or inflation.
6. If a key supplier's bargaining power gets too strong, it can force the price of goods and services
TRUE
7. An innovation strategy may allow a firm to focus its products or services and gain an advantage
FALSE
A differentiation strategy may allow a firm to focus its products or services and gain an
8. When a firm develops ways to differentiate its products from a competitor's, it is pursuing a cost
FALSE
When a firm develops ways to differentiate its products from a competitor's, it is pursuing a
differentiation strategy.
9. When a firm uses IT to create virtual organizations of business partners, it is pursuing a growth
FALSE
When a firm uses IT to create virtual organization of business partners, it is pursuing an
alliance strategy.
10. A given activity can fall into one or more of the categories of competitive strategy.
(p. 50)
TRUE
11. If an organization offers its online package tracking system in a manner that allows its
(p. 50) customers to access shipment information not only via a computer, but via a mobile phone as
well, then such an action could fall into both the differentiation and innovation strategy
categories.
TRUE
12. When a firm makes such radical changes to its business processes for producing products and
(p. 50) services that it alters the fundamental structure of an industry, it is pursuing an innovation
strategy.
TRUE
13. Not everything innovative will serve to differentiate one organization from another.
(p. 50)
TRUE
14. Investments in information technology can allow a business to lock in customers and suppliers,
(p. 50) and lock out competitors, by building valuable new relationships with them.
TRUE
15. Companies like Wal-Mart use information technology to implement competitive strategies for
TRUE
16. When a business effectively builds in switching costs, its customers and/or suppliers become
TRUE
(p. 52) system specialists, hardware, software, databases, and networks from operational uses into
strategic applications.
TRUE
18. A company that places a strategic focus on customer value recognizes that quality, rather than
(p. 54) price, has become a primary determinant in a customer's perception of value.
TRUE
19. Companies that consistently offer the best value from the customer's perspective must provide
(p. 54) two key services: keeping track of their individual customers' preferences and selling products
or services at lowest price.
FALSE
Companies that consistently offer the best value from the customer's perspective (a) keep track
of their customers' individual preferences, (b) keep up with market trends, (c) supply products,
services, and information anytime, anywhere, and (d) provide customer services tailored to
individual needs.
20. Internet technologies can make customers the focal point of customer relationship
TRUE
21. The value chain framework can be used to view a firm as a series, a chain, or a network of
(p. 56) basic activities that add value to its products and services, and thus add a margin of value to
the firm.
TRUE
22. According to the value chain concept, primary processes include such things as the
(p. 56) procurement of resources and human resource management that are directly related to the
manufacturing of products or delivery of services to the customer.
FALSE
23. When using the value chain concept, managers should seek to develop strategic information
(p. 56) systems for those activities that they view as the "weakest link" in the value chain.
FALSE
Managers should try focus on the basic processes that add the most value to a company's
products or services.
24. The value chain concept can help managers decide where and how to apply the strategic
(p. 58)
FALSE
26. Although the potential payback of reengineering is high, so is the risk of failure and level of
TRUE
27. Business process reengineering (BPR) combines a strategy of promoting business innovation
(p. 58) with a strategy of making major improvements to business operations so that a company can
become a much stronger and more successful competitor in the marketplace.
TRUE
28. Many companies have found that organizational redesign approaches are an important enabler
TRUE
29. All the employees within a marketing department, from clerical staff to top managers, form a
FALSE
TRUE
31. Becoming an agile company depends on customer perceptions of products and services, as
TRUE
(p. 63)
TRUE
33. By nurturing an entrepreneurial spirit, an agile company provides powerful incentives for
TRUE
34. Information technology can enable a company to develop relationships with its customers in
TRUE
35. Yahoo! transformed its service from a search engine into a portal by dedicating one branch of
(p. 63) its business to providing content and other media-related services.
FALSE
Yahoo! transformed its service from a search engine into a portal by initiating numerous
partnerships to provide content and other media-related services from its website.
36. One of the reasons people form virtual companies is to keep new entrants out of a market.
(p. 65)
FALSE
The basic strategies of virtual companies include (a) share information and risk with alliance
partners, (b) link complementary core competencies, (c) reduce concept-to-cash time, (d)
increase facilities and market coverage, (e) gain access to new markets and share market or
customer loyalty, and (f) migrate from selling products to selling solutions.
37. Knowledge-creating companies constantly create new business knowledge and then
(p. 66) disseminate it throughout the company in order to quickly build the new knowledge into their
products and services.
TRUE
38. Explicit knowledge involves the "how-to" knowledge that resides in workers.
(p. 66)
FALSE
39. Successful knowledge management creates techniques, technologies, and rewards for getting
(p. 66) employees to share what they know and to make better use of accumulated workplace
knowledge.
TRUE
40. As an organization's learning process continues and its knowledge base expands, the
(p. 67) knowledge creating company works to integrate its knowledge into its business processes,
products, and services.
TRUE
Multiple choice Questions
41. A strategic information system can be any kind of information system that uses information
42. A firm can survive and succeed in the long run if it successfully develops strategies to confront
(p. 46) the _______________ that shape the structure of competition in its industry.
A. technological innovations
C. competitive forces
D. competitive strategies
43. A(n) _______________ strategy is a competitive strategy by which a firm seeks to become a
A. cost leadership
B. differentiation
C. innovation
D. alliance
44. A(n) _______________ strategy is a competitive strategy by which a firm develops ways to
(p. 49) differentiate its products and services from those of its competitors.
B. innovation
C. differentiation
D. growth
45. A(n) _______________ strategy is a competitive strategy by which a firm develops unique
(p. 49) products or services from those of its competitors, or makes radical business changes that may
alter the fundamental nature of the industry.
A. alliance
B. growth
C. differentiation
D. innovation
46. A(n) _______________ strategy is a competitive strategy by which a firm significantly expands
(p. 49) its capacity to produce goods and services, expanding and diversifying in the market.
A. alliance
B. growth
C. differentiation
D. innovation
47. A(n) _______________ strategy is a competitive strategy by which a firm establishes new
(p. 49) business linkages with customers, suppliers, competitors, and other companies.
A. growth
C. differentiation
D. alliance
49. According to the text, in the world of the Internet, a firm's biggest competitor:
(p. 49)
A. Usually exists and is close in the physical world
B. Usually does not exist but will emerge close in the physical world
(p. 49)
A. Has limited competition world-wide
B. Has created many ways to enter the market quickly, with relatively low cost
(p. 49)
A. New entries into the market
B. Innovation
C. Bargaining power
D. Substitutes
(p. 49)
A. New entries into the market
B. Innovation
C. Cost leadership
D. Alliances
53. All of the following can be used to counter competitive forces in the marketplace except:
(p. 49)
A. Alliances
B. Growth
C. Innovation
D. Bargaining
54. All of the following are competitive forces in the marketplace except:
(p. 49)
A. Alliances
B. Competition
C. Substitutes
D. Bargaining
(p. 49)
A. Cost leadership
B. Competition
C. Differentiation
D. Alliances
56. Developing a relationship with a customer such that the customer cannot afford to switch
A. Monopolistic enterprise
C. Growth strategies
B. Growth strategies
C. Differentiation
58. Becoming a low-cost producer of products and services in an industry is an example of a(n):
B. Differentiation strategy
C. Innovation strategy
D. Growth strategy
59. All of the following are basic competitive forces discussed in the text except:
(p. 49)
A. Rivalry of competitors
B. Threat of substitutes
60. All of the following are basic competitive strategies discussed in the text except:
(p. 49)
A. Cost leadership
B. Innovation
C. Product differentiation
D. Strategic dominance
61. Expanding a company's product offering into global markets is an example of a(n)
A. cost leadership
B. differentiation
C. growth
D. alliance
62. Investments in information technology that build valuable new relationships allow a firm to:
(p. 50)
A. Lock in the supplier
63. In addition to the five basic competitive strategies, the text describes several key strategies
(p. 52) implemented with information technology. Which of the following is not one of those
strategies?
A. Locking in customers
C. Creating alliances
C. Creating alliances
65. When a firm develops ways to differentiate their products and services from their competitors',
B. alliance
C. innovation
D. marketing
66. A sales company such as eBay would be most likely to use information technology to promote
C. online auctions
67. When a firm strives to find ways to help its suppliers and customers reduce their costs or to
(p. 51) increase the costs of their competitors, it is pursuing a strategy of _______________.
A. innovation
B. alliance
C. cost leadership
D. growth
(p. 52) systems, they become reluctant to switch to a company's competitors because they would
incur all following costs except:
A. Time
B. Money
C. Innovation
D. Effort
69. Companies like Wal-Mart extend their networks to their customers and suppliers in order to
(p. 52) build innovative continuous inventory replenishment systems that would lock in their business.
This creates a(n) _______________ information system.
A. leveraged
B. inter-enterprise
C. intra-enterprise
D. locked-in
(p. 53)
A. It normally doesn't last very long and it isn't sustainable over the long term
B. Competitors figure out how it was done and do the same thing
71. A company that places a strategic focus on customer value recognizes that __________, rather
(p. 54) than __________, has become a primary determinant in a customer's perception of value.
A. service, price
B. price, quality
C. quality, service
D. quality, price.
72. Companies that consistently offer the best value from the customer's perspective do all the
73. A customer-focused business can build customer value and loyalty by:
(p. 55)
A. Making a loyal customer feel special with website personalization
B. Letting customers place orders directly, or through distribution partners
(p. 55)
A. Linking employees and distribution partners to customers
75. According to the textbook case, innovation in information systems at Universal Orlando comes
B. Competitor
C. Employee
D. IT specialist
76. The value chain framework can be used to view a firm as a series, a chain, or a network of
A. Add value to its products and services, and thus add a margin of value to the firm.
D. Create a smooth-flowing chain of events between the supplier and the customer.
(p. 57)
A. Collaborative workflow intranet
B. Targeted marketing
C. Technology development
D. Procurement of resources
(p. 57)
A. Customer relationship management
B. Targeted marketing
C. Technology development
D. Just-in-time warehousing
(p. 57)
A. Collaborative workflow intranet
B. Targeted marketing
D. Just-in-time warehousing
B. Procurement of resources
C. Technology development
(p. 58)
A. A key technology to reduce customer late payments
or service
(p. 58)
A. Streamlining
B. Reengineering
C. Quickening
83. Business process reengineering (BPR) incorporates all the following strategies, except:
(p. 61)
A. Top-down participation
(p. 61)
A. Bottom-up participation
(p. 61)
A. Bottom-up participation
(p. 61)
A. Top-down participation
88. Organizations are changing from a competitive environment in which mass-market products
(p. 62) and services were standardized, long-lived, information-poor, and exchanged in one-time
transactions to an environment in which companies compete globally with niche-market
A. individualized
B. short-lived
(p. 62)
A. Short-lived products and services
90. _______________ agility is the ability to co-opt customers in the exploitation of innovation
B. Partnering
C. Operational
D. Technological
91. _______________ agility is the ability to leverage assets, knowledge, and competencies in the
A. Customer
B. Partnerin
C. Operational
D. Technological
92. _______________ agility is the ability to accomplish speed, accuracy, and cost economy in the
A. Customer
B. Partnering
C. Operational
D. Technological
(p. 65)
A. Share infrastructure and risk with alliance partners
(p. 66)
A. Data, documents, and things written down or stored on computers.
(p. 66) A. Data, documents, and things written down or stored on computers.
96. Accessing and retrieving documents that have been stored online is a function of
B. enterprise intelligence
B. enterprise intelligence
98. Performance support, building expert networks, and leveraging organizational know-how are a
B. enterprise intelligence
99. The goal of knowledge management systems (KMS) is to help knowledge workers
B. organize
C. distribute
100. According to the textbook case, the Matter Page System at Goodwin Proctor increases
B. Enabling the attorneys to launch more than one application at a time to find information
users
101. A firm can survive and succeed in the long run if it successfully develops strategies to confront
(p. 46) the five _______________ forces that shape the structure of competition in its industry.
competitive
102. When an organization uses information technology to develop products, services and
(p. 46) capabilities in order to gain a strategic advantage over competitive forces in the global
marketplace, it is using information systems in a _______________ role.
strategic
103. The competitive threat of _______________ is often at its strongest during periods of rising costs
substitutes
104. A _______________ strategy is a competitive strategy by which a firm seeks to become a low-
cost leadership
105. When using a(n) _______________ strategy, a firm seeks to find new ways of producing or
(p. 50) distributing its products and services that are so different from the way business has been
conducted that they may alter the fundamental structure of the industry.
innovation
106. _______________ are the costs in time, money, effort, and inconvenience that it would take a
Switching costs
107. If a company has successfully increased the amount of investment or the complexity of the
(p. 53) technology required to compete in an industry or a market segment, it has raised
_______________ that would discourage or delay other companies from entering the market.
barriers to entry
108. Although large investments in technology can create entry barriers for present or prospective
(p. 53) players in an industry, the barriers can evaporate over time as competitors employ the new
technologies. This is an example of IT becoming a competitive _______________.
necessity
109. When a strategy or action becomes a(n) _______________, it means that instead of creating an
(p. 53) advantage, the strategy or action becomes necessary simply to compete and do business in
the industry.
competitive necessity
110. A customer-focused business has a strategic focus on customer _______________, which
(p. 54) recognizes that quality rather than price has become the primary determinant in a customer's
perception of value.
value
111. In the _______________ concept, some business activities are primary processes while others
value chain
112. According to the value chain concept, _______________ processes within the organization
(p. 57) would include human resources management and technology development.
support
(p. 58) fundamental rethinking and radical redesign to achieve improvements in costs, quality, speed,
and service.
Reengineering
114. Many companies have found that organizational _______________ approaches are an important
redesign
115. A(n) _______________ company can make a profit in markets with broad product ranges and
(p. 63) short model lifetimes, and it can produce orders individually and in arbitrary lot sizes.
Agile
116. A _______________ company can be defined as an organization that uses telecommunications
(p. 64) networks and other information technology to link people, assets, and ideas.
virtual
117. Virtual companies develop alliances and extranet links that form _______________ information
inter-enterprise
118. People and corporations are forming virtual companies as the best way to implement key
(p. 64) business strategies and alliances that promise to ensure success in today's turbulent
_______________ climate.
business
119. The concept of _______________-management refers to organizing and sharing the diverse
(p. 66) forms of business information created within an organization. This includes managing project
and enterprise document libraries, discussion databases, hypermedia web site databases, and
knowledge
120. _______________ knowledge deals with "how-to" knowledge, which resides in workers.
(p. 66)
Tacit
121. _______________ knowledge is made up of data, documents, and things written down.
(p. 66)
Explicit
122. Enterprise Intelligence, Information Creation, Sharing, and Management, and Document
(p. 66) Management are the three levels of _______________.
knowledge management
(p. 66) databases, and building expert networks are part of the _______________ level of knowledge
management.
enterprise intelligence
124. Capturing and distributing expert stories, real-time information management, communication
(p. 66) and collaboration, and new content creation are part of the _______________ level of knowledge
management.
125. Accessing and retrieving documents stored online are part of the _______________ level of
document management
Chapter 03 Computer Hardware Answer Key
1. All computers are systems of input, processing, output, storage, and distribution
(p. 78)components.
FALSE
All computers are systems of input, processing, output, storage, and control
components.
(p. 81)
FALSE
The first electronic digital computer was completed in 1946 at the Moore School of
Electrical Engineering.
3. Personal computers, networkservers, and technicalworkstations are terms used to
(p. 83)highlight major uses of particular types of computers.
TRUE
(p. 83)example, many midrange and mainframe systems have been made obsolete by the
power and versatility of client/server networks composed of microcomputers and
servers.
TRUE
5. Network servers are the most important category of computer systems for both
(p. 83)businesspeople and individual consumers.
FALSE
Microcomputers are the most important category of computer systems for both
businesspeople and individual consumers.
TRUE
7. Some microcomputers are powerful enough to support applications with heavy
TRUE
8. Network servers are some of the less powerful microcomputers; they are used to
(p. 83)coordinate telecommunications and resource sharing in small LANs and in Internet
and intranet websites.
FALSE
9. The top criteria for corporate PC ownership are operating systemready, connectivity,
(p. 85)solidperformance, and globalcompatibility.
FALSE
The top criteria for corporate PC ownership are operating system ready, connectivity,
solid performance, and security equipped.
10. Today's corporate buyers seek networked PCs equipped with reliable wireless
(p. 84)capabilities.
TRUE
11. Web-enabled personal digital assistants use touch screens, pen-based handwriting
(p. 86)recognition, or keyboards, so mobile workers can send and receive e-mail, access the
Web, and exchange information with their desktop PCs or Web servers.
TRUE
12. Midrange computers are often used as network servers in order to help manage large
(p. 87-Internet websites, corporate intranets and extranets, and client/server networks.
88)
TRUE
13. Microcomputers can act as powerful workstations for computer-aided design and other
TRUE
14. A RIM Blackberry combines a mobile phone, a music and video player, and an
(p. 90)Internet communications device.
FALSE
FALSE
The function of an input device is to convert data into electronic form for entry into a
computer system.
16. The central processing unit (CPU) is the main processing component of a computer
(p. 93)system.
TRUE
17. The output devices of a computer system can include videodisplayunits, scanners,
(p. 93)and printers.
FALSE
18. The control unit of the CPU interprets instructions and directs processing.
(p. 93)
TRUE
19. The clock speed of a microprocessor today is commonly expressed in teraflops; earlier
(p. 94)microcomputer speeds were reported in gigahertz.
FALSE
20. Moore's Law refers to the exponential growth in the number of transistors per
(p. 94)integrated circuit, which quadruples computer power every six months.
FALSE
Moore's Law refers to the exponential growth in the number of transistors per
21. When discussing the concept of a computer system, peripherals is the generic name
(p. 97)given to all input, output, and secondary storage devices that are part of a computer
system.
TRUE
TRUE
23. Offline devices are separate from, but can be electronically connected to and
(p. 97)controlled by, a CPU.
FALSE
24. A pointing stick is the most popular pointing device used today.
(p. 97)
FALSE
25. A trackball is a type of pointing device that converts drawings and other graphic
(p. 97)images into digital data in order to enter it into a computer system.
FALSE
26. Some touch screens emit a grid of infrared beams or soundwaves that is broken
(p. 100)when the screen is touched.
TRUE
27. Pen-based computing technologies are being used in many hand-held computers
(p. 101)and personal digital assistants.
TRUE
28. Speech recognition systems typically require training the computer to recognize your
(p. 101)voice and its unique sound patterns in order to achieve a high degree of accuracy.
TRUE
TRUE
30. Optical scanning enables the direct entry of data from source documents into a
(p. 103)computer system.
TRUE
31. OCR technology is used to read codes on merchandise tags, product labels, credit
(p. 103)card receipts, and other documents.
TRUE
32. The dark, magnetic stripe on the back of credit cards can hold about 200 gigabytes of
(p. 105)information.
FALSE
The dark, magnetic stripe on the back of credit cards can hold about 200 bytes of
information.
33. Smart cards, a form of input technology that contains an embedded microprocessor
(p. 105)chip, are becoming popular in the United States for use in debit and credit cards.
TRUE
34. Digital cameras and digital video cameras enable users to shoot, store, and
(p. 105)download still photos or full-motion video and audio onto their PCs.
TRUE
35. Video displays and printed documents have been, and still are, the most common
TRUE
(p. 106)capabilities, have improved the color, but not the clarity, of LCD displays.
FALSE
Advances in video monitor technology have improved both the color and the clarity of
LCD displays.
37. Printing information on paper is the most common form of information output.
(p. 106)
FALSE
38. One of the major trends in secondary storage has been toward massive capacities
(p. 107-using magnetic and optical media.
108)
TRUE
39. High speed storage media cost less per byte and provide higher capacities than
High-speed storage media cost more per byte and provide lower capacities.
40. Data are processed and stored in a computer system through the presence or
(p. 108)absence or electronic or magnetic signals to the computer. This is called a "bi-state"
representation of data, because the computer and the media can exhibit only two
states or conditions.
FALSE
41. A byte typically consists of ten bits and represents one character of data in most
FALSE
42. Magnetic tape devices are frequently called direct access storage devices (DASDs),
FALSE
Magnetic tape devices are sequential access devices; magnetic disks are DASDs.
43. The terms directaccess and randomaccess describe the same concept.
(p. 109)
TRUE
44. The primary storage (main memory) of a computer consists of microelectronic
(p. 110)semiconductor memory chips.
TRUE
(p. 110)
FALSE
RAM is volatile.
46. ROM chips are widely used as a primary storage medium because they can be
(p. 101)erased and overwritten.
FALSE
47. Magnetic disks are common forms of secondary storage because they provide fast
(p. 112)access and high storage capacity at a reasonable cost.
TRUE
48. RAID disk units provide fault tolerant storage capacity because data can be
(p. 113)recovered from backup copies stored on other disks should one disk fail.
TRUE
49. Magnetic tapes are no longer used by businesses today because the cost of storage
(p. 113)on tape is very expensive compared to other types of storage media.
FALSE
50. Most CD-ROM disks can hold more than 600 megabytes of information.
(p. 114)
TRUE
51. The main advantage of CD-R (compact disk-recordable) disks is that they enable
(p. 114)recorded data to be erased many times.
FALSE
The major limitation of CD-R disks is that recorded data cannot be erased.
52. DVD+RW+R with CD-RW provides an all-in-one drive for burning DVD-RW or DVD-
(p. 114)R disks, burning CDs, and reading DVDs and CDs.
TRUE
53. Active RFID chips are self-powered and must be close to the reader to transmit their
(p. 115)signal.
FALSE
Active RFID chips do not need to be close to the reader to transmit their signal.
54. RFID chips may be attached to objects, but cannot be injected into them because it
(p. 115)interferes with radio signal transmission.
FALSE
RFID chips can be attached to objects, but they can also be injected into them. A
recent use for RFID chips is the identification of pets, who have a chip imbedded
55. The use of RFID technology poses concerns for privacy issues.
(p. 117)
TRUE
56. It is predicted that in the future we will be able to back up our biological memories.
(p. 118)
TRUE
Multiple Choice Questions
57. Computer systems rely on all the following components except _______________.
(p. 78)
A. input
B. internet
C. processing
D. storage
58. Computer systems rely on which of the following components?
(p. 78)
A. Blaise Pascal
B. Joseph Jacquard
C. Herman Hollerith
D. Keith Glennan
A. miniaturized circuits
B. transistors
C. vacuum tubes
D. punch cards
A. miniaturized circuits
B. transistors
C. vacuum tubes
D. punch cards
62. In the 1950s, _______________ were invented and quickly replaced the thousands of
(p. 81)vacuum tubes used in electronic computers.
A. microchips
B. resistors
C. transistors
D. miniaturized circuits
B. transistors
C. vacuum tubes
D. punch cards
64. The first electronic digital computer was completed in the _______________.
(p. 81)
A. 1870s
B. 1940s
C. 1950s
D. 1960s
A. second
B. third
C. fourth
D. fifth
66. _______________ are the most important category of computer systems for both
A. Microcomputers
B. Supercomputers
C. Network Servers
D. Mainframes
67. According to the text, which of the following is considered by millions of computer
(p. 83)users to be the primary function of the desktop PC?
(p. 83)
69. __________ are some of the more powerful microcomputers; they are used to
(p. 83)coordinate telecommunications and resource sharing in small LANs and in Internet
and intranet websites.
A. Mainframes
B. Supercomputers
C. Network Servers
71. An intelligent terminal that can perform data entry and some information processing
(p. 86)tasks independently is called a _______________ terminal.
A. transaction
B. dumb
C. Windows
D. remote
72. Which of the following does not apply to a personal digital assistant (PDA)?
(p. 86)
B. Touchscreens
C. Pen-based handwriting recognition
D. Web access
73. Personal digital assistants most commonly use which of these technologies?
(p. 86)
A. Pen-based computing
B. Optical scanning
C. Jump drives
D. Back-lit keyboards
74. What sets the RIM BlackBerry apart from other wireless PDA solutions?
(p. 86)
A. Lower price
76. _______________ are high-end network servers that handle large-scale processing of
(p. 88)business applications.
A. Midrange computers
B. Mainframes
C. Supercomputers
77. _______________ are popular as powerful network servers to help manage large
A. Workstations
B. Minicomputers
C. Supercomputers
D. Mainframes
78. Which of the following is a common application for a midrange computer?
(p. 88)
A. Internet functions.
C. Financial applications.
79. According to the text, which of the following is not true of Mainframes?
(p. 89)
(p. 93)
C. to convert data into electronic form for entry into a computer system
(p. 93)
85. Which of the following would perform the required mathematical and logic operations
A. Control unit
B. Arithmetic-logic unit
C. RAID unit
A. Convert data into an electronic machine-readable form for direct entry into a
computer system
(p. 93)
A. Primary memory
C. Magnetic disk
D. The CPU
(p. 94)
A. computing power
B. computer prices
C. computer storage capacity
89. Which of the following would not fit the typical classification of a computer peripheral?
(p. 97)
(p. 97)
91. The most popular pointing device used today is the _______________.
(p. 97)
A. pointing stick
B. light pen
C. trackball
D. electronic mouse
A. input devices
B. output devices
C. CPU devices
93. One device used as an input device in a computer system is a pointing stick, which is
B. A stationary device containing a roller ball whose top is exposed outside its case
B. Stationary device containing a roller ball whose top is exposed outside its case
D. Device rolled along the desktop in order to move the cursor on the screen
(p. 101)
B. Allow a computer to understand a few words from a voice it has never heard
before
96. Speech recognition devices in work situations allow operators to perform all the
(p. 101)following except:
(p. 102)
B. Allow a computer to understand a few words from a voice it has never heard
before
C. Converts reflected light patterns into electronic impulses, which are accepted as
input into the computer system
100. The dark, magnetic stripe on the back of credit cards can hold about
A. 200 gigabytes
B. 200 kilobytes
C. 200 bytes
A. Allows debit cards to store a cash balance on a card and electronically transfer
A. voice response
C. laser printer
D. optical scanner
(p. 106)
B. audio responses
C. voice responses
D. video displays
B. Optical disks
C. Magnetic tape
105. High speed storage media _______________ than lower-speed storage media.
(p. 107-
108)
A. cost less per byte and provide higher capacities
106. _______________ bytes of storage are needed to represent the name "Sarah."
(p. 108)
A. Two
B. Three
C. Five
D. Ten
107. Data are processed and stored in a computer system through the presence or
A. Ternary
B. Trinary
C. Binary
D. Bipolar
108. Data are processed and stored in a computer system through the presence or
(p. 108)absence of electronic or magnetic signals to the computer. This is called a "binary"
representation of data, because the computer and the media can exhibit only
_______________ states or conditions.
A. two
B. three
C. five
D. ten
109. A bit, the smallest element of data, can have values of:
(p. 108)
A. 0 or 1
B. 0, 1, or 8
C. 0 through 7
D. 0 through 8
110. A gigabyte (GB) is used to express which of the following approximate measures?
(p. 108)
(p. 110)
A. ROM
B. RAID
C. RAM
(p. 110)
A. RAM
B. ROM
C. PROM
114. Which of the following applies best to CD-RW optical disk technology?
(p. 114)
(p. 114)
116. According to the text, what are the current types of RFID chips?
(p. 115-
117)
A. Electrical and magnetic
(p. 81)computer.
first
119. The principal drawback of the Electronic Numerical Integrator and Computer (ENIAC)
(p. 81)was its __________ and processing ability.
size
120. In the 1950s, _______________ replaced the vacuum tubes used in electronic
(p. 81)computers.
transistors
121. Industry experts predict that the emergence of network computers and
(p. 83)_______________ appliances for applications on the Internet and corporate intranets
will replace many personal computers.
information
122. _______________ are the most important category of computer systems for both
(p. 83)business people and individual consumers.
Microcomputers
(p. 83)telecommunications and resource sharing in small local area networks (LANs) and
Internet and intranet web sites.
network
124. The _______________ is a recent entrant into PDA technology that enables the user to
(p. 86)manage information, such as appointments, to-do lists, and sales contracts. It also
allows them to receive E-mail, access the Web, and exchange such information with a
BlackBerry
125. The most recent entries to the information appliance and PDA market, from Apple, are
(p. 86)________________________________.
126. _______________ systems include high-end network servers that handle large-scale
(p. 87-processing of many business applications.
88)
Midrange
127. A special type of parallel computing that relies on complete computers connected to a
(p. 89)major corporations and governmental agencies with high transaction processing
volumes or complex computational problems.
Mainframe
supercomputer
input
132. The _______________ devices of a computer system include video display units,
(p. 93)printers, audio response units, and so on.
output
system
134. The central processing unit (CPU) of a computer system is divided into two major
(p. 93)subunits: the arithmetic-logic unit and the _______________ unit.
control
135. Computers today operate in the nanosecond range, which is one _______________ of
(p. 94)a second.
billionth
136. Most computers today can process program instructions in MIPS, which is
(p. 94)____________________.
millions of instructions per second
137. Moore's Law states that the number of transistors on an integrated circuit will
(p. 94)__________ every _______________.
138. A _______________ user interface presents a user with icons, bars, buttons, boxes,
(p. 97)and other images to initiate computer-based tasks.
graphical
139. An electronic _______________ is a pointing device that is used to move the cursor on
(p. 97)the screen, as well as to issue commands and make icon and menu selections. It is
the most popular pointing device used today.
mouse
140. A _______________ is a stationary pointing device. You turn a roller with only its top
(p. 97)exposed outside its case to move the cursor on the screen.
trackball
141. According to the text, the __________ is one of several commercial devices that takes
(p. 126)the human-computer interface to a new level.
iPhone
142. A _______________ allows users to use a computer by touching the surface of its
touch screen
pen
continuous
145. Optical _______________ devices read text or graphics and then convert them into
(p. 103)digital input for your computer.
scanning
Magnetic stripe
148. _______________ cards are a form of input technology. These cards have an
(p. 105)embedded microprocessor chip and several kilobytes of memory.
Smart
149. _______________ ink allows the computer systems of the banking industry to read
(p. 105)checks and deposit slips.
Magnetic
150. Use of _______________ panel video monitors for desktop systems has become more
(p. 106)common as their cost has become more affordable.
flat
byte
152. The storage capacities in computer systems are frequently measured in kilobytes
gigabytes
153. There are two basic types of semiconductor memory: Read Only Memory (ROM) and
(p. 110-_______________.
111)
Random Access Memory (RAM)
(p. 111)semiconductor memory and transistors that can be programmed to store data for
virtually unlimited periods without power.
flash or jump
155. Floppy disks consists of a polyester film disk covered with an _______________
(p. 112)compound.
iron oxide
156. The primary advantage of CD-RW disks over CD-ROM and CD-R disks is that they
(p. 114)can be recorded and _______________ many times.
erased
(p. 115)
radio frequency identification
Chapter 04 Computer Software Answer Key
1. Software is considered the variable part of the computer, whereas the hardware is considered the
(p. 130)
invariable part.
TRUE
2. Unlike hardware, which has several categories, software has only one category—computer
(p. 130)
applications.
FALSE
There are two general types of software; application software and system software.
3. General purpose application programs perform common information processing jobs for end users.
(p. 130)
TRUE
4. COTS software is custom, off-the-shelf software that is purchased and then modified to meet the
(p. 130)
needs of the customer.
FALSE
TRUE
6. System software are programs that manage and support the operation of computer systems and
(p. 133)
networks.
TRUE
TRUE
8. According to the text, operating systems are a type of general purpose application program.
(p. 133)
FALSE
9. One of the biggest advantages offered by software suites is that all the programs within the suite use
(p. 135)
a similar graphical user interface (GUI). This gives them the same look and feel, and makes them
easier to learn and use.
TRUE
10. Although Microsoft Office has a large share of the software suite market, Lotus, Corel, and Sun all
(p. 135)
offer competing productivity suites.
TRUE
11. Web browsers are the key software interface used to point and click through the hyperlinked
(p. 136)
resources of the Internet, as well as corporate intranets and extranets.
TRUE
12. Web browsers are becoming the universal software platform from which end users launch into
(p. 136)
information searches, multimedia file transfer, discussion groups, and many other Internet, intranet,
and extranet applications.
TRUE
13. Instant messaging is quite popular in today's society, outside of the workplace. It is not yet being
(p. 137)
used in the business environment.
FALSE
Instant messaging is also being used by business professionals, who use it to communicate and
collaborate in real time.
14. A weblog is a website on which a company advertises its products in a very brief, yet commercial
(p. 137)
way.
FALSE
15. Blogs are online diaries from a particular point of view. They are personal in origin, not commercial.
(p. 137-
138)
FALSE
16. Some powerful word processing packages have built-in capabilities that end users can use to
(p. 138)
convert documents to HTML format for publication as web pages.
TRUE
17. When a spreadsheet is used to answer "what if" questions, the user must reenter the values and
(p. 139-
formulas into the cells in order to see the impact of the changes.
140)
FALSE
To answer "what if" questions, one must only change a selected variable to see the impact of the
changes. It is not necessary to reenter all the data.
18. Presentation graphics packages help end users design and manage computer-generated slide
(p. 140)
shows that can contain text, graphics, and multimedia displays.
TRUE
19. Presentation graphics packages have gotten more powerful in recent years, but not even the top-
(p. 140)
end packages enable end users to publish to the World Wide Web.
FALSE
20. A personal information manager helps users store, organize, and retrieve information about
(p. 141)
customers and prospects, and schedule and manage appointments.
TRUE
21. Web sites built with collaborative development tools can integrate a wide variety of individual
(p. 143)
applications in order to increase team productivity. However, they do little to improve individual
productivity.
FALSE
Websites built with collaborative development tools can help increase both individual and team
productivity.
22. A number of large and fast-growing companies are turning to application service providers instead of
(p. 143)
developing or purchasing the application software they need to run their businesses.
TRUE
23. Application service providers rely on the Internet to provide their services to customers.
(p. 143)
TRUE
24. A company without enterprise resource planning expertise can call upon an application service
(p. 143)
provider to deliver, support, and maintain an ERP for a fixed monthly fee.
TRUE
25. One key disadvantage of an application service provider is that a "pay as you go" structure is often
(p. 143)
more expensive than what a company would pay if it had purchased the software outright.
FALSE
Companies can save millions of dollars by using a "pay as you go" structure because they do not
have to purchase the platform infrastructure and upgrade hardware before rolling out software.
26. Regardless of whether a software application is purchased off the shelf or is accessed via an ASP, it
(p. 145)
must be licensed for use.
TRUE
27. Software licensing is a complex topic that involves considerations of the special characteristics of
(p. 145-
software in the context of the underlying intellectual property, including copyright, trademark, and
146)
trade secrets.
TRUE
28. Contrary to what many believe, when an individual or a company buys a software application, they
(p. 146)
have actually purchased the rights of ownership.
FALSE
When an individual or company buys a software application, they have not purchased the rights of
ownership.
29. As a software purchaser, the license you agree to typically prohibits reverse engineering or
(p. 146)
modifying the software.
TRUE
FALSE
The computer must contain an operating system in order to execute application software packages.
31. Linux is considered an opensource operating system because it offers unrestricted access to its
(p. 153)
source code.
TRUE
32. An advantage of open source software is that programmers can read and modify the source code,
(p. 153)
so they can improve it, adapt it, and fix bugs.
TRUE
33. Utility programs are used to perform miscellaneous housekeeping and file conversion functions,
(p. 156)
including data backup, data recovery, virus protection, data compression, and file defragmentation.
TRUE
34. Performance monitor programs are designed to monitor the performance and usage of computer
(p. 157)
systems in order to achieve system and data security.
FALSE
Performance monitor programs are designed to monitor the performance and usage of computer
systems in order to achieve maximum efficiency.
35. Performance monitor programs are designed to monitor and control the use of computer systems,
(p. 157)
provide warning messages, and record evidence of unauthorized use of computer resources.
FALSE
Security monitor programs monitor and control the use of computer systems, provide warning
messages, and record evidence of unauthorized use of computer resources.
36. Machine languages are high-level languages whose instructions closely resemble human language
(p. 157-
or the standard notation of mathematics.
158)
FALSE
Machine languages are low level languages that use binary code instructions.
37. When high-level programming languages are used, programmers must learn a different language for
(p. 158)
each type of computer that uses the program.
FALSE
38. Most fourth-generation programming languages encourage programmers and users to specify the
(p. 159)
results they want, while the computer determines the sequence of instructions that will accomplish
those results.
TRUE
39. A key characteristic of object-oriented programming languages is that they separate the data
(p. 160)
elements from the procedures or actions that will be performed upon that data.
FALSE
Although most other programming languages separate data elements from the procedures or
actions that will be performed upon them, object-oriented languages tie them together into objects.
40. When programming in an object-oriented language, an example of an object would be a set of data
(p. 160)
about a customer's account and the operations that are performed on the data.
TRUE
41. Of the different programming languages, third-generation COBOL is the most widely used today.
(p. 161)
FALSE
Object-oriented languages are the most widely used programming languages because they are
efficient and easier to use.
42. HTML, XML, and COBOL are all popular programming languages for building multimedia web
(p. 161)
pages, websites, and web-based applications.
FALSE
COBOL is not used for building multimedia web pages, websites, or web-based applications.
43. Extensible Markup Language (XML) classifies data in such a way that it makes website information
(p. 162)
easier to search, sort, and analyze.
TRUE
44. XML-enabled search software can easily find the exact product you specify if the product data at a
(p. 162)
website is labeled with identifying HTML tags.
FALSE
XML-enabled search software can easily find the exact product you specify if the product data at a
website is labeled with identifying XML tags.
45. The ease of creating Java applets and distributing them from network servers to client PCs and
(p. 164)
network computers is one of the major reasons for Java's popularity.
TRUE
46. Microsoft's .NET is a relatively new collection of programming support for what are known as Web
(p. 164)
services, the ability to use the Web without limit.
FALSE
Microsoft's .NET is a relatively new collection of programming support for what are known as Web
services, the ability to use the Web rather than your own computer for various services.
47. Web services can link key business functions for the exchange of data in real time within the Web-
(p. 165)
based applications a business might share with its customers, suppliers, and other business
partners.
TRUE
48. A language compiler translates computer programs written in another programming language into
(p. 167)
the computer's own machine language instruction codes.
FALSE
A language translator translates computer programs written in another programming language into
49. In programming packages, a compiler is used to translate high-level language statements into
(p. 167)
machine language instructions.
TRUE
50. Software developers can use CASE tools at different stages of the software development
(p. 168)
processes.
TRUE
51. Open source software is typically not encumbered by licensing restrictions.
(p. 153)
FALSE
52. Whatever a person builds using open-source software, he or she must provide the same capabilities
(p. 154)
to anyone else under the same open-source license terms.
TRUE
Multiple Choice Questions
B. The company buying the software has no control over the specifications, schedule, or evolution of
the software
C. The company that develops the software is not the intended audience
54. Software is considered the _______________ part of the computer, whereas the hardware is
(p. 130)
considered the _______________ part.
A. expensive, inexpensive
B. inexpensive, expensive
C. variable, invariable
D. invariable, variable
A. Systems
B. CASE
C. Commercial
D. General purpose
57. _______________ software are programs that manage and support the operation of computer
(p. 133)
systems and networks.
A. System
B. CASE
C. Commercial
D. General purpose
A. System
B. CASE
C. Application-specific
D. General purpose
59. According to the text, operating systems are a type of _______________ program.
(p. 133)
A. CASE
B. System management
C. Application-specific
D. General purpose
A. Two
B. One
C. Ten
D. Nobody is certain
63. According to the Real World Case, GE spends $150 million each year to purchase all of its desktop
(p. 131)
and laptop computers from which vendor?
A. Dell
B. Hewlett-Packard
C. Gateway
64. According to the Real World Case, GE's Global Supplier Library lacked which of the following?
(p. 131)
A. A central repository
B. Multi-language capabilities
C. Self-management of data
C. GE does not own the software, it's on lease. If the vendor goes bankrupt, everything shuts down.
B. Operating systems
C. System utilities
67. Which of the following are considered general purpose application software packages?
(p. 133)
B. Electronic mail
C. System utilities
D. Programming languages
68. Which of the following are considered application specific software packages?
(p. 133)
B. Electronic mail
C. System utilities
D. Programming languages
69. Which of the following is not considered a system management software packages?
(p. 133)
A. Database management
B. CASE tools
C. System utilities
D. Application servers
70. According to the text, which of the following describes system software?
(p. 133)
A. All the programs within the suite use a similar graphical user interface (GUI)
C. There is a custom graphical user interface for each application in the suite
D. They cost more than the total cost of buying the individual packages separately
A. They contain software tools that can help increase productivity, collaborate with colleagues, and
C. There is a custom graphical user interface for each application in the suite
D. They cost less than the total cost of buying the individual packages separately
74. Which of the following software suites is an open-source product?
(p. 135)
A. Microsoft Office
B. Lotus Smartsuite
C. WordPerfect Office
D. OpenOffice
76. Which of the following, according to the text, are the basic components found in a comprehensive
(p. 135)
software suite?
C. web browser
78. According to the text, Web browsers are sometimes called the _______________.
(p. 136)
A. HTML client
C. universal client
79. According to the text, which of the following is true of integrated packages?
(p. 136)
81. According to the text, experts predict the Web browser will be the model for:
(p. 137)
D. Cloud computing
B. Each blog is a developing commentary on a particular theme that uses a dated log format.
84. All of the following are considered characteristics of a word processing package except:
(p. 138-
139)
C. Instant messaging
85. All of the following are considered characteristics of a desktop publishing package except:
(p. 139)
87. When using a spreadsheet package to answer "what if" questions, the user must change:
(p. 139)
88. Which one of the following would typically not be accomplished with presentation graphics
(p. 140)
software?
D. Prepare graphics and presentations for transfer to Web sites in HTML format
B. application specific
C. system management
D. system development
92. Cloud computing is best described as:
(p. 145)
A. Grid computing
B. A style of computing where applications are provided by unknown sources "hidden in the clouds"
C. A style of computing where resources are provided as a service over the Internet
A. Grid computing
B. A style of computing users need not have knowledge, expertise, or control over the technological
infrastructure
C. A style of computing where resources are provided as a service over the Internet
B. Purchased a license to use the software under the terms of the agreement
A. Manage the hardware, software, networking, and data resources of computer systems during the
execution of information processing jobs
B. Manage e-mail and CASE tools for both end users and developers
96. Which of the following is a basic function that an operating system performs in the operation of a
(p. 147)
computer system?
A. Allows end users to communicate with it so they can load programs, access files, and accomplish
other tasks
C. Controls the creation, deletion, and access of files of data and programs
A. Graphical
B. Command-driven
C. Menu-driven
D. Voice
C. It is more reliable than traditional software because it is subject to more rigorous code review
A. The license must not discriminate against any person or group of persons
B. The license must not contaminate other software by placing restrictions on any software
C. The license must allow modifications and derived works, and must allow them to be distributed
under the same terms as the license of the original software
103. The text outlines four levels of languages that allow a programmer to develop the sets of instructions
(p. 157-
that constitute a computer program. Which of the following is not one of those languages?
159)
A. Machine languages
B. Graphical languages
C. Assembler languages
D. High-level languages
104. Which of the following characteristics does a high-level language possess?
(p. 158)
A. BASIC
B. COBOL
C. FORTRAN
D. Ruby on Rails
106. Fifth generation languages, which are designed to be as much as possible like spoken languages,
(p. 159)
are referred to as _______________ languages.
A. natural
B. macro
C. generator
D. syntax
107. Object-oriented programming languages:
(p. 160)
B. Separate data elements from the procedures that will be performed on them
D. Are useful for numerical processing, but not for graphics-oriented applications
A. Reusability of objects
B. Conformity of objects
109. All of the following are popular programming languages for developing multimedia web pages,
(p. 161)
websites, and web-based applications except:
A. XML
B. HTML
C. Java
D. COBOL
110. The acronym HTML stands for:
(p. 161)
111. Which of the following statements is applicable to the Java programming language?
(p. 164)
B. It inserts control codes within a document that create links to other parts of the document or to
other documents anywhere on the World Wide Web
C. It embeds control codes in the ASCII text of a document, which designates titles, headings,
D. It consists of small application programs called applets that can be executed by any computer
112. Linux, an open source product, is a _______________-like operating system that is rapidly gaining
(p. 153)
market share as a high-performance operating system for network and Web servers.
A. Unix
B. BASIC
C. COBOL
D. Windows
113. Program editors, debuggers, and code analyzers are types of _______________.
(p. 173)
A. Unix tools
B. Programming languages
C. CASE tools
D. Operating Systems
114. Those CASE tools that support activities early in the life cycle of a software project (e.g.,
(p. 173)
requirements, design support tools) are sometimes called _______________.
A. Pre-CASE tools
B. Post-CASE tools
115. Those CASE tools that are used later in the life cycle (e.g., compilers, test support tools) are
(p. 173)
sometimes called _______________.
A. Pre-CASE tools
B. Post-CASE tools
116. Because general purpose application programs, such as those for word processing and database
(p. 130)
management, significantly increase the productivity of end users, they are sometimes known as
_______________ packages.
productivity
commercial
118. Microsoft Office and Corel WordPerfect Office are examples of a combination of individual software
(p. 135)
packages that share a common graphical user interface and are designed for easy transfer of data
suite
119. Because of limited functionality, _______________ packages require less disk space than software
(p. 136)
suites, even though they also offer word processing, spreadsheet, and other general-purpose
applications.
integrated
120. Browsers are sometimes called the _______________ client. That is, the software component
(p. 136)
installed on all of the networked computing and communications devices of the clients (users)
throughout an enterprise.
universal
121. _______________ allows groups of business professionals to send and receive electronic messages
(p. 137)
instantly. Thus, they can communicate and collaborate in real time in a near conversational mode.
Instant messaging or IM
122. _______________ packages have computerized the creation, editing, and printing of documents by
(p. 138)
electronically processing text data.
123. End users and organizations can use _______________ software to produce their own printed
(p. 139)
materials that look professionally published.
spreadsheet
125. Presentation graphics packages help users convert _______________ data into graphics displays,
(p. 140)
such as line charts, bar charts, pie charts, and other types of graphics that can help users prepare
multimedia presentations.
numeric
126. _______________ software helps end users store, organize, and retrieve information about
(p. 141)
customers, clients, and prospects. It also helps them schedule and manage appointments, meetings,
and tasks, thus enhancing productivity and collaboration.
127. _______________ is software used to support and enhance communication, coordination, and
(p. 141)
collaboration among networked teams and workgroups. It generally includes software tools for
Groupware
128. The primary purpose of an operating system is to maximize the _______________ of a computer
(p. 147)
system by operating it in the most efficient manner.
productivity
129. _______________ software consists of programs that manage and support a computer system and its
(p. 147)
information processing activities.
System
130. An _______________ system is an integrated set of programs that supervise the processing
(p. 147)
operations of the CPU, control the input/output functions of the computer system, and provide
various support services.
operating
131. The trend in user interfaces is toward an easy-to-use, _______________ user interface, which uses
(p. 147)
icons, bars, buttons, boxes, and other images.
graphical
132. Three main types of user interfaces are __________-driven, menu-driven, and graphical.
(p. 147)
command
133. A computer equipped with _______________ memory capability can process larger programs and
(p. 150)
greater amounts of data than the capacity of its memory circuits would normally allow.
virtual
134. The component of the operating system that keeps track of the physical location of files on magnetic
(p. 150)
disks and other secondary storage devices and controls the creation, deletion, and access of files is
file management
135. An example of _______________ is a computer that appears to perform several computing tasks in a
(p. 151)
seemingly simultaneous fashion.
multitasking
136. To be considered open-source software, the program must allow distribution in source code as well
(p. 153-
as in ____________ form.
154)
compiled
137. _______________ is software that helps diverse software applications and networked computer
(p. 157)
systems exchange data and work together more efficiently.
Middleware
138. _______________ language is considered the most basic level of programming languages and
(p. 157)
involves the difficult task of writing instructions in the form of strings of binary digits.
Machine
139. _______________ is a page description language that creates hypertext or hypermedia documents.
(p. 161)
The language is an important tool for developing multimedia web pages, websites, and web-based
applications.
Java
141. The term _______________ is commonly used to describe the Web-based business and computing
(p. 165)
functions or services accomplished by Web services software technologies and standards.
Web services
142. The __________ language is one of the key technologies that enable Web services to make
(p. 165-
applications work between different computing platforms.
166)
XML
143. UDDI, an acronym for a Web-based technical standard, stands for ____________________.
(p. 166)
applications
145. Most software development programs now include powerful graphics-oriented programming editors
(p. 167)
and _______________.
debuggers
146. At the simplest level, open source refer to software that is delivered with unrestricted access to its
(p. 153)
_______________.
source code
Chapter 05 Data Resource Management Answer Key
1. Variable-length records contain a variable number of fields with fixed field lengths.
(p. 181)
FALSE
Variable-length records contain both a variable number of fields and variable field lengths.
2. When independent of any other files related to it, a single table is referred to as a compressed file.
(p. 181)
FALSE
When independent of any other files related to it, a single table is referred to as a flatfile.
3. Files are frequently classified by the application for which they are primarily used, such as a payroll
(p. 181)
file or an inventory file.
TRUE
FALSE
TRUE
6. Database management packages based on the relational model can link data elements from various
(p. 184)
tables to provide information to users.
TRUE
7. The project operation is used to create a subset of the columns contained in the temporary tables
(p. 185)
created by the select and join operations.
TRUE
8. A major benefit of multidimensional databases is that they are a compact and easy-to-understand
(p. 185)
way to visualize and manipulate data elements that have many interrelationships.
TRUE
9. Multidimensional databases have become the least popular structure for analytical databases that
(p. 185)
support online analytical process (OLAP) applications, in which fast answers to complex queries are
expected.
FALSE
Multidimensional databases are the most popular database structure for OLAP applications.
10. The multidimensional database structure is considered one of the key technologies of a new
(p. 185)
generation of Web-based applications.
FALSE
The object-oriented model is one of the key technologies of a new generation of Web-based
applications.
11. A database with a network data structure can easily handle a many-to-many data relationship,
(p. 187)
whereas a hierarchical model cannot.
TRUE
12. The network model can easily handle ad hoc requests for information, whereas the hierarchical
(p. 187)
model cannot.
FALSE
Because its relationships must be specified in advance, the network model is unable to handle ad
hoc requests for information.
13. All of the relationships between the data elements in a relationally organized database need to be
(p. 187)
specified when the database is created.
FALSE
Not all of the relationships between data elements need to be specified when the database is
created. Database management software can create new tables of data relationships by using parts
14. Relational databases are more difficult for programmers to work with and more difficult to maintain
(p. 187)
than the hierarchical and network models.
FALSE
Because database management software can create new tables of data relationships from existing
tables, relational databases are easier for programmers to work with and maintain than the
15. Large organizations usually place control of enterprise-wide database development in the hands of
(p. 188)
database administrators (DBAs) and other database specialists.
TRUE
16. An active data dictionary will prevent a data entry program from using a nonstandard definition of a
(p. 189)
customer record.
TRUE
17. A data model serves as a logical framework on which to base the physical design of a database.
(p. 190)
TRUE
18. Distributed databases can reside on network servers on the World Wide Web, on corporate
(p. 193)
intranets, or on corporate extranets.
TRUE
19. A large database system is often distributed into smaller databases based on some logical
(p. 196)
relationship between the data and the location of the databases.
TRUE
20. In a distributed database system, each location gains control of its local data, but loses access to
(p. 197)
data in other locations.
FALSE
Each location has control of its local data, but all locations can access any other database in the
company.
21. One drawback to the database duplication process is that no changes can ever be made to any
(p. 197)
database other than the master. Otherwise, local changes will be overwritten during the duplication
process.
TRUE
22. Distributed databases require fewer resources when it comes to computing power and bandwidth.
(p. 197)
FALSE
Distributed databases require extra computing power and bandwidth to access multiple databases in
multiple locations.
23. In a traditional file processing approach, each business application is designed to use one or more
(p. 202)
specialized data files containing only specific types of data records.
TRUE
24. Having data in independent files makes it easier to provide end users with information for ad hoc
(p. 203)
requests.
FALSE
Having data in independent files makes it difficult to provide end users with information for ad hoc
requests.
25. In file processing systems, application programs typically contain references to the specific format of
(p. 203)
the stored data.
TRUE
26. In file processing systems, it was easy for data elements, such as stock numbers and customer
(p. 203)
addresses, to be defined differently by different end users and applications.
TRUE
27. Boolean logic was developed during the latter part of the 1900s.
(p. 207)
FALSE
28. The Internet is nothing more than the world's largest database.
(p. 207)
TRUE
TRUE
Multiple Choice Questions
30. In all information systems, data resources must be organized and structured in some logical manner,
(p. 178)
so that they can be:
A. Easily accessed
B. Processed efficiently
C. Retrieved quickly
31. From a logical point of view, a(n) _______________ is the smallest data element that can be observed
(p. 178)
and manipulated.
A. character
B. bit
C. attribute
D. byte
A. characters
B. fields
C. files
D. attributes
33. All the fields used to describe the attributes of an entity are grouped to form a(n) _______________.
(p. 178)
A. field
B. record
C. file
D. database
A. field
B. record
C. table
D. database
37. When independent of any other files related to it, a single table is referred to as a(n):
(p. 181)
A. Independent file
B. Flat file
C. Hierarchical file
D. Non-variable file
A. master file
B. program base
C. database
D. integrated file
39. Databases contain data elements that describe both entities and the _______________ among
(p. 182)
entities.
A. relationships
B. disparities
C. subsets
D. applications
40. Database management packages based on the _______________ model can link data elements from
(p. 184)
various tables to provide information to users.
A. object-oriented
B. relational
C. network
D. hierarchical
41. Early mainframe DBMS packages used the _______________ structure, in which all records are
(p. 184)
dependent and arranged in multilevel structures, consisting of one root record and any number of
subordinate levels.
A. network
B. relational
C. hierarchical
D. object-oriented
42. In a(n) _______________ database structure, all of the relationships among records are one-to-many,
(p. 184)
because each data element is related to only one element above it.
A. hierarchical
B. relational
C. network
D. object-oriented
43. Which database model allows many-to-many relationships among records so that a data element
(p. 184)
can be accessed by following one of several paths?
A. Hierarchical
B. Network
C. Object-oriented
D. Relational
44. The _______________ model is the most widely used database structure today.
(p. 184)
A. network
B. object-oriented
C. relational
D. hierarchical
45. In the relational database model, all data elements within the database are viewed as being stored in
(p. 184)
the form of simple two-dimensional tables, sometimes referred to as _______________.
A. records
B. rows
C. columns
D. relations
46. The tables in a relational database are flat files which have rows and columns. Each row represents
(p. 184)
a _______________ in the file.
A. field
B. record
C. file
D. relation
47. The tables in a relational database are flat files which have rows and columns. Each column
(p. 184)
represents a _______________ in the file.
A. field
B. record
C. file
D. relation
48. The _______________ operation is used to create a subset of the columns contained in the temporary
(p. 185)
tables created by the select and join operations.
A. link
B. relate
C. project
D. merge
49. Using a relational database, a user can temporarily combine two or more tables so that he/she can
(p. 185)
see relevant data in a form that looks like it is in one big table. This is the _______________
operation.
A. join
B. link
C. merge
D. select
50. _______________ is the most commonly used database application for the PC.
(p. 185)
A. Oracle 10g
B. Microsoft Access
C. DB2
D. SQL Server
51. _______________ databases have become the most popular structure for analytical databases that
(p. 185)
support online analytical process (OLAP) applications, in which fast answers to complex queries are
expected.
A. Relational
B. Object-oriented
C. Inter-relational
D. Multidimensional
52. The _______________ database structure is considered one of the key technologies of a new
(p. 185)
generation of Web-based applications.
A. hierarchical
B. relational
C. object-oriented
D. multidimensional
53. The object-oriented database model supports _______________. That is, new objects can be
(p. 185)
automatically created by replicating some or all of the characteristics of one or more parent objects.
A. inheritance
B. morphing
C. duplication
D. cloning
54. Object technology allows designers to do all of the following except:
(p. 185)
B. Replicate product designs and then modify them to create new product designs
55. Which database structure works effectively with complex data types, such as video clips, audio
(p. 187)
segments, and other subsets of Web pages, and is considered one of the key technologies of Web-
based applications?
A. Hierarchical
B. Network
C. Object-oriented
D. Relational
56. A database with a(n) _______________ data structure can easily handle a many-to-many data
(p. 187)
relationship.
A. hierarchical
B. network
C. relational
D. object-oriented
57. A database with a(n) _______________ data structure can easily handle ad hoc requests for
(p. 187)
information.
A. hierarchical
B. network
C. relational
D. object-oriented
58. According to one database pioneer, the future development of databases and data warehouses will
(p. 188)
depend on _______________.
A. rows
B. columns
C. transaction
59. Large organizations usually place control of enterprise-wide database development in the hands of
(p. 188)
_______________.
C. End users
A. 20 times faster
B. 50 times faster
C. 50 times slower
61. Database administrators and database design analysts work with end users and systems analysts to
(p. 189)
do all of the following except:
C. Determine what structure or relationships should exist among the data elements
D. Enter live data into the system until it has proven to be reliable
62. _______________ are used to model the relationships among the many entities involved in business
(p. 189)
processes.
A. Entity-relationship diagrams
B. Data-flow diagrams
C. Schema diagrams
D. Subschema diagrams
63. The physical design stage of database development:
(p. 190)
64. The _______________ stage of database development translates the conceptual models into the data
(p. 190)
model of a DBMS.
A. data planning
B. requirements specification
C. conceptual design
D. logical design
65. A _______________ is an overall logical view of the relationships among the data elements in a
(p. 190)
database.
A. schema
B. subschema
D. conceptual design
66. A _______________ is an overall logical view of the relationships needed to support specific end-user
(p. 191)
application programs that will access the database.
A. schema
B. subschema
D. conceptual design
67. According to the textbook case, the innovation of the open-source product Hadoop is
(p. 192)
_______________.
68. According to the textbook case, file processing in Hadoop is not halted by hardware failures because
(p. 192)
_______________.
B. Transaction databases
C. Production databases
A. Data accuracy
C. Storage costs
D. Data security
71. Which of the following statements concerning the replication and duplication process for updating
(p. 197)
distributed databases is correct?
A. The two terms are interchangeable because the processes work the same way
B. Duplication is the more complicated process because it has to identify one database as a master
and prevent changes being made to any database other than the master
C. Replication is the more complicated process because it must find changes in each distributed
database and make appropriate changes to make each database identical
A. Common databases
B. Distributed databases
C. External databases
D. Local databases
73. A central source of data that have been cleaned, transformed, and cataloged so that they can be
(p. 199)
used for business analysis, market research, and decision support is called a _______________.
A. data mart
B. data warehouse
D. data repository
74. A data warehouse contains data that have been processed in all the following ways except:
(p. 199)
A. Separated
B. Cleaned
C. Transformed
D. Cataloged
75. Which of the following is true of data marts?
(p. 199)
B. Profiling customers
A. Data redundancy
C. Data independence
79. Database management involves the use of database management software to control how
(p. 204)
databases are _______________.
A. created
B. interrogated
C. maintained
80. In mainframe and server computer systems, the database management system controls the
(p. 204)
_______________ of the databases of computer-using organizations.
A. maintenance
B. development
C. use
D. Using the databases of an organization to provide the information needed by its end users
82. Database development involves defining and organizing the _______________ of the data needed to
(p. 206)
build a database.
A. structure
B. content
C. relationships
B. Transaction processing systems and other end user applications, with the support of the DBMS
A. SELECT … AND … OR
D. AND … OR … NOT …
A. speech recognition
B. command line
C. GUI
88. All of the fields used to describe the attributes of an entity are grouped to form a _______________.
(p. 178)
record
89. _______________ contain both a variable number of fields and variable field lengths.
(p. 181)
Variable-length records
90. _______________ contain both a fixed number of fields and fixed field lengths.
(p. 181)
Fixed-length records
table
database
93. Databases contain data elements that describe both entities and the _______________ among
(p. 182)
entities.
relationships
94. In the relational database model, all data elements within the database are viewed as being stored in
(p. 184)
the form of simple, two-dimensional tables, sometimes referred to as _______________.
relations
95. The tables in a relational database are flat files, which have rows and columns. Each row presents a
(p. 184)
single _______________ in the file.
record
96. The tables in a relational database are flat files, which have rows and columns. Each column
(p. 184)
represents a _______________.
field
97. The _______________ operation is used to create a subset of the columns contained in the temporary
(p. 185)
tables created by the select and join operations.
project
98. An _______________ consists of data values describing the attributes of an entity, plus the operations
(p. 185)
that can be performed upon the data.
object
99. A weakness in the hierarchical model is that it cannot handle _______________ data relationships.
(p. 187)
many-to-many
100. A weakness in the network model is that it cannot handle _______________ for information.
(p. 187)
ad hoc requests
data dictionary
102. Database administrators and designers work with corporate and end user management to develop
(p. 189)
an _______________ model that defines the basic business process of the enterprise.
enterprise
103. _______________ relationship diagrams are used to model the relationships among the many entities
(p. 189)
involved in business processes.
Entity
104. A _______________ is an overall logical view of the relationships among the data elements in a
(p. 190)
database.
schema
105. _______________ database design takes a physical view of the data that describes how data are to
(p. 191)
be physically stored and accessed on the storage devices of a computer system.
Physical
106. Data models represent _______________ views of the data and relationships of the database.
(p. 190)
logical
107. Entity Relationship Diagrams are _______________ of the various files and their relationships within a
(p. 189)
database system.
graphical models
108. A website stores hyperlinked pages of multimedia (text, graphics, photographs, video, and audio) in
(p. 197)
a _______________ database.
hypermedia
109. The duplication process basically identifies one database as a _______________ and then duplicates
(p. 197)
that database at a prescribed time so that each distributed location has the same data.
master
110. Data warehouses may be subdivided into _______________, which hold subsets of data from the
(p. 199)
warehouse that focus on specific aspects of a company, such as a department or a business
process.
data marts
111. _______________, data that define the data in the data warehouse, are stored in a metadata
(p. 199)
repository and cataloged by a metadata directory.
Metadata
112. In _______________, the data in a data warehouse are analyzed to reveal hidden patterns and trends
(p. 200)
in historical business activity.
data mining
113. To solve the problems encountered with the file processing approach, the _______________
(p. 203)
management approach was conceived. It is the foundation of modern methods of managing
organizational data.
database
114. Database _______________ involves using transaction processing systems and other tools to add,
(p. 208)
delete, update, and correct the data in a database.
maintenance
115. SQL is an acronym for _______________. It is an international standard query language found in
(p. 206-
many DBMS packages.
207)
WHERE
117. Boolean logic consists of three logical operators: AND, OR, and _______________.
(p. 207)
NOT
Chapter 06 Telecommunications and Networks Answer Key
1. A change in technology often induces social, political, and economic system changes
(p. 221)
long before a critical mass of users is reached.
FALSE
Until a critical mass of users is reached, a change in technology only affects the
technology.
FALSE
The opposite is true; the telecommunications industry has gone from government-
FALSE
TRUE
5. The Internet has a central computer system that is the most powerful in the world.
(p. 225)
FALSE
6. The Internet provides electronic discussion forums and bulletin board systems that are
(p. 226)
formed and managed by special-interest newsgroups.
TRUE
7. Booking a reservation over the Internet costs an airline about 50 percent less than
(p. 228)
booking the same reservation over the telephone.
FALSE
Booking a reservation over the Internet costs an airline about 90 percent less than
TRUE
FALSE
enterprise.
10. Software that is installed on intranet Web servers can be accessed by employees within
(p. 231)
the company or by external business partners who are using Web browsers, if access is
TRUE
11. If access to data is not restricted with passwords and other security mechanisms, the
(p. 231)
integrity of the data can be easily compromised.
TRUE
12. An extranet is a network inside a company that uses Internet technologies to provide a
(p. 232)
private Internet-like network environment to the firm.
FALSE
13. Web browser technology makes customer and supplier access of intranet resources a
(p. 232)
lot easier and faster than with previous business methods.
TRUE
14. A client/server network of several interconnected local area networks can replace a
(p. 242)
large mainframe-based network with many end user terminals.
TRUE
15. The network-centric concept views the PC as the central computing resource of any
(p. 242)
computing environment.
FALSE
The network-centric concept views networks as the central computing resource of any
computing environment.
16. In the central server architecture of P2P networking, the P2P software connects your
(p. 243)
PC to a central server with the directory of all users of the network.
TRUE
17. In the pure peer-to-peer architecture of P2P networking, the P2P software connects
(p. 243)
your PC to a central server with the directory of all users of the network.
FALSE
In the central server architecture of P2P networking, the P2P software connects your
18. The Internet, as originally conceived in the late 1960s, was a pure peer-to-peer
(p. 244)
system.8
FALSE
19. The unique achievement of Napster was the empowerment of the peers, in association
(p. 244)
with a central index, to quickly and efficiently locate available content.
TRUE
20. Output from analog devices must be converted into digital form in order to input it into a
(p. 245)
computer.
TRUE
21. Today, ordinary telephone wire is the least used medium for telecommunications.
(p. 246)
FALSE
Ordinary telephone wire is still the most widely used medium for telecommunication.
22. Newly developed optical routers will be able to send optical signals up to 2,500 miles
(p. 246)
without regeneration.
TRUE
TRUE
24. PCS phone systems cost substantially more to operate and use than cellular systems,
(p. 248)
but have lower power consumption requirements.
FALSE
PCS phone systems cost substantially less to operate and use than cellular system, and
25. Wi-Fi is faster and less expensive than Standard Ethernet and other common wire-
(p. 299)
based LAN technologies.
TRUE
26. A Bluetooth chip is designed to replace cables; it takes the information normally carried
(p. 249)
by a cable and transmits it to a receiver Bluetooth chip.
TRUE
27. In frequency division multiplexing (FDM), a multiplexer effectively divides one high-
(p. 252)
speed channel into multiple high-speed channels.
FALSE
28. Multiplexers work to increase the number of transmissions possible, while also
(p. 253)
increasing the number of physical data channels.
FALSE
TRUE
30. Mainframe-based wide area networks frequently use telecommunications monitors or
(p. 253)
teleprocessing monitors.
TRUE
31. The Open System Interconnection (OSI) model was officially adapted as an
(p. 255)
international standard by the International Organization of Standards (ISO).
TRUE
32. The Internet uses a system of telecommunications protocols that have become so
(p. 257)
widely used that they are now accepted as a network architecture.
TRUE
TRUE
34. IP addressing can identify a particular PC connected to the Internet, but not the network
(p. 257)
to which it is attached.
FALSE
IP addressing can identify a specific network because the IP space is divided into three
address classes, A, B, and C. The Class B portion of the address identifies networks.
35. Skype software allows telephone conversations through a PC and over the Internet
(p. 258)
instead of a separate phone connection.
TRUE
36. Each IP address is divided into three address classes, which are A, B, and C. Class C
(p. 257)
addresses are normally owned by large Internet service providers or major
corporations.
FALSE
Class A addresses are normally owned by large Internet service providers or major
corporations.
37. New technologies are extending IP addresses beyond computers to TVs, toasters, and
(p. 257)
coffeemakers.
TRUE
38. Developed to work Internet2, IPv6 increases the IP address size from 32 bits to 256 bits
(p. 258)
to support more levels of the address hierarchy.
FALSE
TRUE
40. Voice over IP is a technology that allows a remote worker to function as if he or she
(p. 258)
were directly connected to a regular telephone network, even while at home or in a
remote office.
TRUE
41. Skype users can call to any non-computer-based landline or mobile telephone in the
(p. 258-
world for just pennies a minute.
259)
FALSE
Calls made to non-computer-based landlines or mobile telephones via Skype are free.
FALSE
43. Narrow-band channels typically use microwave, fiber optics, or satellite transmission.
(p. 260)
FALSE
Narrow-band channels are usually unshielded twisted-pair lines used for telephone and
modem communications.
44. Frame relay technology is slower than X.25 and not as well suited to handle the heavy
(p. 260-
communications traffic of interconnected local area networks.
261)
FALSE
45. Although we tend to think of the FCC as the oversight body for radio and television, it is
(p. 261)
equally involved in all aspects of data and voice communications.
TRUE
46. Regular telephone service relies on Packet Switching, while the Internet relies on Circuit
(p. 260)
Switching.
FALSE
Regular telephone service relies on Circuit Switching, while the Internet relies on Packet
Switching.
47. Packet Switching involves dividing a message into multiple packets which are
(p. 260)
transmitted over a network to the receiver.
TRUE
FALSE
51. A network with 100 nodes has 9,900 possible connections. A network with 1,000 nodes
(p. 218)
has _______________ possible connections.
A. 9,900,000
B. 999,000
C. 99,000
A. The usefulness or utility of a network equals the square of the number of users
D. The usefulness or utility of a network equals the number of users times the number of
nodes
53. A change in technology induces social, political, and economic system changes
(p. 221)
_______________.
B. Create a computing environment that is easily accessed by end users and their
A. front-line software
B. software handshaking
C. middleware
D. back-line software
57. Local and global telecommunications networks are rapidly converting to digital
(p. 223)
transmission technologies. Digital technology provides all of the following benefits over
D. Greater economy
58. Telecommunications networks now play vital and pervasive roles in Web-enabled
(p. 223)
_______________.
A. e-business processes
B. electronic commerce
C. enterprise collaboration
B. Internet2 uses the same infrastructure as the current Internet, so it will be easy to
learn
C. The purpose of Internet2 is to build a roadmap that can be followed during the next
A. Abilene
B. Phoenix
C. Enterprise
D. Indiana
61. Traveling salespeople and those at regional sales offices can use the Internet,
(p. 225)
extranets, and other networks to transmit customer orders from their laptop or desktop
A. physical
B. competition
C. structural
D. geographic
62. Telecommunications-based business applications can help a company overcome all of
(p. 224)
the following barriers to business success except:
A. Time barriers
B. Geographic barriers
D. Cost barriers
63. All of the following statements about the Internet revolution are true except:
(p. 225)
A. The Internet has become the largest and most important network today, and has
B. The central computer system of the Internet is the most powerful communications
C. The Internet is constantly expanding, as more and more businesses and other
A. ISPs provide individuals and organizations with access to the Internet for a fee
D. ISPs provide a direct connection between a company's networks and the Internet
A. touch points
B. portals
C. access points
D. hubs
A. develop
B. operate
C. maintain
68. Most companies are building e-business and e-commerce websites to achieve all of the
(p. 229)
following goals except:
D. Increase the loyalty of existing customers via Web customer service and support
69. An _______________ is a network inside an organization that uses Internet technologies
(p. 229)
to provide an Internet-like environment within the enterprise.
A. extranet
B. omninet
C. intranet
70. An _______________ is a network link that uses Internet technologies to interconnect the
(p. 229)
intranet of a business with the intranets of its customers, suppliers, or other business
partners.
A. extranet
B. omninet
C. intranet
72. All of the following would typically be supported by an organization's intranet information
(p. 230-
portal except:
231)
C. Web publishing
D. Recruitment
73. The comparative _______________ of publishing and accessing multimedia business
(p. 230)
information internally via intranet websites has been one of the primary reasons for the
A. attractiveness
B. lower cost
C. ease
74. Based on the information presented in the text, telecommunications terminals are best
(p. 235)
described as:
B. Devices that support data transmission and reception between terminals and
computers
telecommunications networks
75. The text lists five basic categories of components in a telecommunications network. One
(p. 235)
of these categories includes telecommunications processors, which:
A. client/server
B. local area
C. small area
D. wide area
B. A network that connects computers within a limited physical area, such as inside a
single building
B. modem
C. router
80. All of the following statements about a virtual private network are correct except:
(p. 239)
links between a company and its customers, suppliers, and business partners
secure network
81. All the following describe a VPN except:
(p. 239)
B. A VPN relies on network firewalls, encryption, and other Internet and intranet security
features.
C. A VPN uses the Internet to establish secure intranets between its distant offices and
locations.
A. historical
B. standard
C. legacy
D. application
83. Most Linux distributions are released via BitTorrent to help with _______________
(p. 244)
needs.
A. security
B. bandwidth
C. user registration
D. file compression
84. The Internet, as originally conceived in the late 1960's was a _______________ system.
(p. 244)
A. client-server
B. central server
C. pure peer-to-peer
D. peer-to-peer
A. coaxial
B. fiber optic
C. twisted-pair
D. packet-transmission
B. Are virtually the same as coaxial cable in speed and service provided
88. Fiber optics uses cables consisting of one or more hair-thin filaments of __________ fiber
(p. 246)
wrapped in a protective jacket.
A. glass
B. plastic
C. ceramic
D. nylon
89. Fiber optics are regarded as the communications media of the future, primarily due to its
(p. 246)
_______________.
A. availability
90. As it relates to telecommunications media, the problem of the last mile is:
(p. 246-
247)
91. Which of the following technologies transmits data at the fastest rate?
(p. 252)
A. Modem
B. Cable modem
C. ISDN
D. Home satellite
92. An internetworking unit that connects networks based on different protocols is a
(p. 252)
_______________.
A. bridge
B. router
C. gateway
D. hub
transmissions
C. Include bridges, routers, hubs, and gateways, which interconnect a local area
96. Network management package functions include all of the following except:
(p. 253-
254)
B. Providing security
A. Authentication
B. Encryption
C. Firewalls
D. Central processing
98. A network configuration that consists of a central computer system with a number of
(p. 254)
smaller computers tied directly to it, but not to each other, is a _______________
network.
A. bus
B. ring
C. central processing
D. star
99. Which of the following best describes how star, ring, and bus networks differ?
(p. 255)
100. A(n) _______________ is a standard set of rules and procedures for the control of
(p. 255)
communication in a network.
A. amplification
B. algorithm
C. protocols
D. transponders
101. Which one of the following statements regarding a telecommunications network is
(p. 255)
false?
communications in a network
102. The _______________ layer in an OSI model provides communications services for end
(p. 256)
users.
A. application
B. data link
C. network
D. transport
103. In an OSI model, the _______________ layer does the routing and forwarding.
(p. 256)
A. physical
B. data link
C. network
D. application
104. When IP was first standardized, the specification required that each system attached to
(p. 257)
the Internet be assigned a unique, _______________ Internet address value.
A. 4-bit
B. 8-bit
C. 16-bit
D. 32-bit
105. All of the following statements regarding Internet telephony are correct except:
(p. 258)
A. broadband
B. narrow-band
C. wireless
D. voice-band
A. node
B. packet
C. cell
D. network
108. VoIP works by digitizing a voice signal, chopping it into __________, and then sending
(p. 258)
them over a company's computer network or the Internet, much like data or email.
A. bits
B. packets
C. characters
D. waves
109. IPv4, the current Internet addressing protocol, can accommodate about
(p. 257)
_______________ addresses.
A. 4 trillion
B. 4 billion
C. 4 million
110. _______________ systems are information systems that use common standards for
(p. 222)
hardware, software, applications, and networking.
Open
111. Open systems provide greater _______________. That is, the ability of networked
(p. 222)
computers and other devices to easily access and communicate with each other and
share information.
connectivity
bandwidth
Internet
114. Companies can create private secure Internet links between themselves, called
(p. 232)
_______________ private networks.
virtual
channel
116. Devices such as modems, switches, and routers, which support data transmission and
(p. 235)
reception between terminals and computers, are known as telecommunications
_______________.
processors
117. Thin clients provide a browser-based user interface for processing small application
(p. 242)
programs called _______________.
applets
118. Network computing is sometimes called a _______________ client/server model,
(p. 243)
because it consists of thin clients, application servers, and database servers.
three-tier
119. The terms analog and _______________ refer to the methods used to convert
(p. 244)
information into an electrical signal so that it can be transmitted or processed.
digital
121. Dense wave division multiplexing (DWDM) can split a strand of glass fiber into _____
(p. 246)
channels, which enables each strand to carry 5 million calls.
40
122. Terrestrial microwave involves earthbound microwave systems that transmit high-speed
(p. 247)
_______________ signals in a line-of-sight path between relay stations spaced
radio
123. All cellular and PCS telephone systems divide a geographic area into small areas, or
(p. 248)
__________, typically from one to several square miles in area.
cells
124. Smart telephones, pagers, PDAs, and other portable communications devices have
(p. 249)
become very thin clients in _______________ networks.
wireless
125. The WAP standard specifies how Web pages in HTML and XML are translated into a
(p. 249)
wireless markup language (WML) by __________ software.
filter
126. _______________ are the most common type of communications processor.
(p. 251)
Modems
127. A modem converts digital signals into analog frequencies and then back again. This
(p. 251)
process is known as modulation and _______________.
demodulation
128. The main idea in OSI is that the process of communication between two endpoints in a
(p. 255)
telecommunication network can be divided into _______________.
layers
129. The first part of an Internet address identifies the network on which the host resides,
(p. 257)
while the second part identifies the particular __________ on the given network.
host
130. Regular telephone service relies on circuit _______________, in which a switch opens a
(p. 260)
circuit to establish a link between a sender and receiver. It remains open until the
switching
131. In the X.25 protocol, packets are _____ characters long, while in frame relay technology
(p. 260)
they are of variable length.
128
Chapter 07:e-Business Systems
Knowledge management applications provide a firm's employees with tools that support
group collaboration and decision making, but not human resources management.
5. Enterprise application integration (EAI) software enables users to model the business
(p. 266)
processes and interactions that should occur between business applications. TRUE
6. Enterprise application integration (EAI) software provides legacy systems that perform
(p. 276)
data conversion and coordination, and application communication and messaging
services. FALSE
Enterprise application integration (EAI) software provides middleware that performs data
conversion and coordination, and application communication and messaging services.
7. Distribution and manufacturing are considered front office systems; customer service
(p. 277)
and sales order entry are back office systems. FALSE
Distribution and manufacturing are back office systems; customer service and sales
order entry are front office system.
8. The integration of enterprise application clusters has little, if any, impact on customer
(p. 277)
call center responsiveness. FALSE
12. Transaction reports can take the form of a transaction listing, such as a payroll register.
(p. 280)
TRUE
13. Enterprise collaboration systems are cross-functional e-business systems that enhance
(p. 281)
communication, coordination, and collaboration among the members of business teams
and workgroups.
TRUE
14. Training in a virtual world is effective, but obstacles include both technology and culture.
(p. 283)
TRUE
15. Training in a virtual world can both lower costs and increase efficiency.
(p. 283)
TRUE
16. Collaborative work management tools help people accomplish or manage individual
(p. 283)
work activities. FALSE
Collaborative work management tools help people accomplish or manage group work
activities.
17. The term interactive marketing has been coined to describe a supply chain management
(p. 284)
process that is based on using the Internet, intranets, and extranets to establish a two-
way transactions between a business and its customers. FALSE
18. Increasingly, sales people are using Web browsers and contact management software
(p. 289)
to connect to their company's marketing websites. TRUE
19. Many companies view sales force tracking as a way to gain a strategic advantage in
(p. 289)
sales productivity and marketing responsiveness. FALSE
Many companies view sales force automation as a way to gain a strategic advantage.
20. Firms such as transportation companies, wholesalers, retailers, financial institutions, and
(p. 290)
service companies must use production/operations information systems to plan and
control their operations. TRUE
22. Computer aided manufacturing systems are those that automate the production
(p. 291)
process, such as employing humanlike robots to complete the step of painting the
product being manufactured. TRUE
23. A process control computer system uses special sensing devices that measure physical
(p. 292)
phenomena, such as temperature or pressure changes. TRUE
24. Human resource information systems are designed to support most common human
(p. 292)
resource functions, such as recruitment, selection, hiring, job placement, performance
appraisals, and training over corporate intranets. TRUE
25. Human resource management applications offered over corporate intranets can enable
(p. 292-
managers and other employees to perform HRM tasks with little intervention by the
294)
HRM department. TRUE
26. Accounting information systems are among the newest, yet are the most widely used
(p. 295)
information systems in business. FALSE
Accounting information systems are among the oldest systems.
27. Operational accounting systems emphasize legal and historical record-keeping and the
(p. 295)
production of accurate financial statements. TRUE
28. According to the Real World case, some of Cisco's employees are full-time
(p. 302-
telecommuters, living and working in places such as Illinois while telecommuting to the
303)
firm's offices in California. TRUE
Whirlpool would like to work with a single vendor to provide the bulk of its supply chin
needs.
29. _______________ is defined as the use of the Internet and other networks and information
(p. 272)
technologies to support electronic commerce, enterprise communication and
A. Electronic business
B. Enterprise collaboration
30. _______________ systems cross the boundaries of traditional business functions in order
(p. 272)
to reengineer and improve vital business processes all across the enterprise.
A. Electronic business
B. Enterprise collaboration
C. Cross-functional enterprise
processes.
A. electronic business
B. enterprise collaboration
C. cross-functional enterprise
A. application software
B. business processes
C. customer relationships
34. A(n) _______________ architecture illustrates the inter-relationships of the major cross-
(p. 272)
functional enterprise applications that many companies have, or are installing, today.
A. enterprise application
B. enterprise operation
C. cross-functional
35. Which of the following applications focuses on the efficiency of a firm's internal
(p. 275)
production, distribution, and financial processes?
C. Knowledge management
36. Which of the following applications focuses on acquiring and retaining profitable
(p. 275)
customers via marketing, sales, and service processes?
C. Knowledge management
C. Knowledge management
38. Which of the following applications focuses on tools that support group collaboration and
(p. 275)
decision support?
C. Knowledge management
39. Which of the following applications aims to acquire and retain partners who can enhance
(p. 275)
the sale and distribution of a firm's products and services?
A. Developing the most efficient and effective sourcing and procurement processes
C. Acquiring and retaining partners who can enhance the selling and distribution of a
D. Providing a firm's employees with tools that support group collaboration and decision
support
41. As described in the text, supply chain management focuses on:
(p. 275)
A. Developing the most efficient and effective sourcing and procurement processes
C. Acquiring and retaining partners who can enhance the selling and distribution of a
D. Providing a firm's employees with tools that support group collaboration and decision
support
A. Developing the most efficient and effective sourcing and procurement processes
B. Acquiring and retaining profitable customers via marketing and delivery of timely
C. Acquiring and retaining partners who can enhance the selling and distribution of a
D. Providing a firm's employees with tools that support group collaboration and decision
support
A. Developing the most efficient and effective sourcing and procurement processes
support
A. Developing the most efficient and effective sourcing and procurement processes
C. Acquiring and retaining partners who can enhance the selling and distribution of a
D. Providing a firm's employees with tools that support group collaboration and decision
support
45. Enterprise application integration (EAI) software enables users to model the business
(p. 276)
processes and interactions that should occur between:
A. International divisions
C. End users
D. Business applications
46. Enterprise application integration (EAI) software provides _______________ that performs
(p. 276)
data conversion and subordination, and application communication and messaging
services.
A. middleware
B. a legacy system
C. the telecommunication protocol
D. a business application
A. middleware
B. legacy systems
48. _______________ software can integrate the front-office and back office systems
(p. 277)
applications of a business so they work together in a seamless, integrated way.
A. middleware
B. legacy systems
50. _______________ are events that occur as part of doing business, such as sales,
(p. 278)
purchases, deposits, withdrawals, refunds, and payments.
A. Items
B. Transactions
C. Occurrences
D. Processes
52. Transaction processing systems play a vital role in supporting the _______________ of an
(p. 278-
e-business enterprise.
279)
A. customer service
B. product distribution
C. operations
D. systems architecture
53. Transaction processing systems are _______________ information systems that process
(p. 278)
data resulting from the occurrence of business transactions.
C. operational accounting
D. cross-functional
A. customer service
B. post-event
C. batch processing
D. real time
A. inquiry processing
B. document generation
C. transaction processing
D. data entry
56. _______________ update the corporate databases of an organization to reflect changes
(p. 280)
resulting from day-to-day business transactions.
57. Transaction processing systems process data in two basic ways: _______________ and
(p. 280)
_______________.
workgroups.
A. Enterprise coordination
B. Enterprise integration
C. Enterprise collaboration
D. Transaction processing
59. The capabilities and potential of _______________ are driving the demand for better
(p. 281)
enterprise collaboration tools in business.
A. the Internet
B. intranets
C. extranets
60. Electronic mail, voice mail, faxing, Web publishing, bulletin board systems, and paging
(p. 281-
are considered _______________ tools.
282)
A. electronic communication
C. electronic conferencing
A. electronic communication
C. electronic conferencing
62. Workflow systems, document sharing, and knowledge management are considered
(p. 281-
_______________ tools.
282)
A. electronic communication
C. electronic conferencing
B. Instant messaging
C. Voice conferencing
D. Paging
B. Instant messaging
C. Voice conferencing
D. Chat systems
65. Which of the following is considered an electronic conferencing tool?
(p. 283)
B. Instant messaging
C. Data conferencing
D. Paging
66. Training in a virtual world is effective, but obstacles include both _______________.
(p. 283)
D. Knowledge management
69. Collaborative work management tools include all of the following except:
(p. 282-
283)
D. Knowledge management
70. A(n) _______________ business system is a type of information system that supports the
(p. 284)
business functions of accounting, finance, marketing, operations management, and
A. functional
B. inter-enterprise
C. collaboration
D. enterprise resource
71. Marketing information systems can help marketing managers with:
(p. 284)
A. Compensation analysis
B. Payroll
B. Process control
C. Investment management
A. Compensation analysis
B. Process control
C. Credit management
75. All of the following are supported by the accounting business function except:
(p. 287)
A. General ledger
B. Inventory control
C. Capital budgeting
D. Payroll
76. Providing website visitors with chat rooms, Web forms and questionnaires, and e-mail
(p. 287)
correspondence opportunities enables companies to use _______________ to encourage
A. order processing
B. interactive marketing
A. Online behavior
B. Content
C. Credit
D. Demographics/psychographics
78. Advertising and promotion efforts can be tailored to each visit to a site by an individual.
(p. 288)
This strategy is based on a variety of tracking techniques, such as Web "__________"
A. Virus
B. Donut
C. Cookie
D. Compressed
79. Many companies view sales force automation as a way to gain _______________ in sales
(p. 289)
productivity and marketing responsiveness.
A. customer loyalty
B. strategic advantage
C. higher profits
A. Finance
B. Management
C. Marketing
D. Manufacturing
81. Computer integrated manufacturing is an overall concept that stresses using computer-
(p. 291)
based systems in manufacturing to do all the following, except:
82. Computer-integrated manufacturing systems do all the following for activities that are
(p. 291)
needed to produce products, except:
A. simplify
B. automate
C. segregate
D. integrate
83. The overall goal of computer-integrated manufacturing is to create flexible, agile,
(p. 291)
manufacturing processes that do what?
B. Inquiry processing
C. Agile manufacturing
____________________.
B. computer-aided manufacturing
C. process control
D. task control
B. computer-aided manufacturing
C. process control
B. computer-aided manufacturing
C. process control
88. Machine control is the use of computers to control the actions of machines. This is also
(p. 292)
known as ____________________.
A. numerical control
B. computer-aided manufacturing
C. process control
90. According to the text, _______________ emphasize legal and historical record-keeping
(p. 295)
and the production of accurate financial statements.
A. Accounts payable
B. Accounts receivable
C. Inventory control
D. Order processing
92. Which of the six essential accounting business systems mentioned in the text records
(p. 296)
purchases from, amounts owed to, and payments to suppliers?
A. Accounts payable
B. Accounts receivable
C. Inventory control
D. Order processing
93. Computer-based _______________ systems support business managers and
(p. 296)
professionals in decisions concerning the financing of a business, and the allocation and
A. accounting information
B. financial management
C. marketing information
D. management information
processes
95. An enterprise _______________ architecture illustrates the inter-relationships of the major
(p. 272)
cross-functional enterprise applications that many companies have, or are installing,
today.
application
96. _______________ systems cross the boundaries of traditional business functions in order
(p. 272)
to reengineer and improve vital business processes all across the enterprise.
Cross-functional enterprise
98. EAI software can integrate the front-office and ________________ applications of a
(p. 277)
business so they work together in a seamless, integrated way.
back-office
99. A transaction is _______________.
(p. 278)
100. Transaction processing systems (TPS) are _______________ information systems that
(p. 278)
process data resulting from the occurrence of business transactions.
cross-functional
101. Transaction processing systems process data in two basic ways: batch processing and
(p. 280)
_______________ processing.
real-time or online
102. Many online systems depend on the capabilities of _______________ tolerant computer
(p. 280)
systems that can continue to operate if parts of the system fail.
fault
103. Electronic conferencing options include electronic meeting systems and other group
(p. 282)
support systems where team members can meet at the same time and place in a
decision
104. The goal of interactive marketing is to enable a company to profitably use networks to
(p. 287)
attract and ___________ customers who will become partners with the business.
keep or retain
105. Advertising and promotion efforts can be tailored to each visit to a site by an individual.
(p. 288)
This strategy is based on a variety of tracking techniques, such as Web "__________"
cookie
106. The production/operations function is concerned with the management of the operational
(p. 290)
processes and __________ of all business firms.
systems
107. _______________ is an overall concept that stresses that the objectives of computer-
(p. 291)
based systems in manufacturing must be to simplify, automate, and integrate all
material requirements
109. Manufacturing execution systems monitor, track, and control the five essential
(p. 292)
components in a production process: materials, equipment, _______________,
personnel
110. _______________ control is the use of computers to control an ongoing physical process.
(p. 292)
Process
111. Machine control is the use of computers to control the actions of machines. This is also
(p. 292)
popularly known as _______________ control.
numerical
112. _______________ information systems are designed to support planning to meet the
(p. 292)
personnel needs of the business, development of employees to their full potential, and
Human resource
113. Human resource information systems support the strategic, tactical, and
(p. 293)
_______________ use of the human resources of an organization.
operational
114. Management accounting systems focus on the planning and __________ of business
(p. 295)
operations.
control
115. The __________ budgeting process involves evaluating the profitability and financial
(p. 297)
impact of proposed capital expenditures.
capital
116. _______________ planning software can help determine the financing needs of a
(p. 297)
business and analyze alternative methods of financing.
Financial
117. EAI software can integrate _______________ and ________________ applications so they
(p. 277)
work together in a seamless, integrated way.