0% found this document useful (0 votes)
69 views

True / False Questions

True, most retail stores now use computer-based information systems to both keep track of inventory and to evaluate sales trends. Increased importance placed on cyber-security will result in an increased need for workers skilled in information security. Multiple systems may share the same environment.

Uploaded by

Suleyman Tesfaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views

True / False Questions

True, most retail stores now use computer-based information systems to both keep track of inventory and to evaluate sales trends. Increased importance placed on cyber-security will result in an increased need for workers skilled in information security. Multiple systems may share the same environment.

Uploaded by

Suleyman Tesfaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 264

True / False Questions

1. Having a basic understanding of information systems is good, but not nearly as important as
(p. 4)
understanding other functional business areas. FALSE

Having a basic understanding of information systems is just as important as understanding

other functional business areas. TRUE

2. Information technology can help all kinds of businesses improve the efficiency and
(p. 4)
effectiveness of their business processes and managerial decision making. TRUE

3. Maintenance is one of the key activities in the development and management of a business
(p. 18)
information system. TRUE

4. One system can be made up of other systems or can be a part of a bigger system. TRUE
(p. 4)

5. Smoke signals and library card catalogs are examples of an information system. TRUE
(p. 4)

6. The term "information technology" refers to all of the components and resources necessary to
(p. 7)
deliver the information and functions of a system to an organization. FALSE

The term "information technology" refers to the various hardware, software, networking, and

data management components necessary for the system to operate. "Information system"

describes all of the components and resources necessary to deliver its information and

functions to the organization. TRUE

7. An information system can use hardware as simple as a pencil and paper to capture and store
(p. 7)
its data. TRUE

8. Gaining a strategic advantage over competition requires the innovative application of


(p. 9)
information technologies. TRUE
9. Integration of business systems allows greater flexibility and provides greater business
(p. 8)
support than any of the individual systems could provide alone. TRUE

10. Most retail stores now use computer-based information systems to keep track of inventory, but
(p. 8)
few use them to evaluate sales trends. FALSE

Most retail store now use computer-based information systems to both keep track of inventory

and to evaluate sales trends. TRUE

11. Decision support systems (DSS) provide managerial end users with ad hoc and interactive
(p. 10)
support of their decision-making processes. TRUE

12. Expert systems can serve as consultants to users by providing expert advice in limited subject
(p. 11)
areas. TRUE

13. An extranet is an Internet-like network inside the enterprise; an intranet is between the
(p. 12)
enterprise and its trading partners. FALSE

An intranet is an Internet-like network inside the enterprise; an extranet is between the

enterprise and its trading partners. TRUE

14. Enterprise collaboration systems involve the use of software tools to support e-commerce
(p. 13)
functions with customers and suppliers. FALSE

Enterprise collaboration systems involve the use of software tools to support communication,

coordination, and collaboration among the members of networked teams and workgroups.

TRUE
15. A process control system is an example of an operation support system that records and
(p. 14)
processes data resulting from business transactions. FALSE

A transaction processing system is an example of an operation support system that records

and processes data resulting from business transactions. TRUE

16. In real-time processing, data are processed immediately after a transaction occurs. TRUE
(p. 14)

17. Management information systems (MIS) provide information in the form of reports and
(p. 14)
displays. TRUE

18. An information system that supports accounting is an example of a functional business


(p. 15)
system. TRUE

19. Information systems that focus on operational and managerial applications in support of basic
(p. 15)
business functions, such as accounting, are known as strategic information systems. FALSE

Information systems that focus on operational and managerial applications in support of basic

business functions are known as functional business systems. TRUE

20. An expert system can provide advice for operational chores, such as equipment diagnostics or
(p. 15)
loan portfolio management. TRUE

21. Mismanagement or misapplication of information systems can ultimately result in business


(p. 17)
failure. TRUE

22. A large-scale movement to outsource basic software programming functions to India, the
(p. 20)
Middle East, and Asia-Pacific countries has resulted because U.S. programmers have been

inadequately trained. FALSE


Outsourcing software programming functions has resulted because of rising labor costs in

North America, Canada, and Europe. TRUE

23. Falling prices of computer hardware and software should continue to induce more businesses
(p. 23)
to expand their computerized operations.

TRUE

24. Increased importance placed on cyber-security will reduce the need for workers skilled in
(p. 23-
information security. FALSE
24)

Increased importance placed on cyber-security will result in an increased need for workers

skilled in information security. TRUE

25. The human body and an oil refinery can both be classified as systems. TRUE
(p. 26)

26. In order for something to be classified as a "system", a computerized environment must be


(p. 26)
involved. FALSE

Many examples of systems can be found in the physical and biological sciences, technology,

and human society. TRUE

27. A home temperature control system is an example of a cybernetic system. TRUE


(p. 29)

28. A sales manager exercises control when reassigning salespersons to new territories after
(p. 29)
evaluating feedback about their sales performance. TRUE
29. An organization is considered an open system when it interfaces and interacts with other
(p. 29)
systems in its environment. TRUE

30. Multiple systems never share an environment; each has its own. FALSE
(p. 29)

Several systems may share the same environment. TRUE

31. Information systems are just like any other system, but their value to the modern organization
(p. 31)
is unlike any other system ever created. TRUE

32. Anyone who uses an information system or the information it produces can be referred to as
(p. 32)
an end user. TRUE

33. Most end users in business are referred to as knowledge workers, people who spend most of
(p. 32)
their time communicating, collaborating, and creating, using, and distributing information.

TRUE

34. Optical disks and plastic cards are examples of hardware resources, but paper forms are not.
(p. 32-
FALSE
33)

Optical disks, plastic cards, and paper forms are all examples of hardware resources. TRUE

35. In the context of the information systems model, computer peripherals typically consist of
(p. 33)
hardware devices, such as keyboards, and productivity tools, such as word processing

software. FALSE

Computer peripherals typically consist of hardware devices that allow the input, output, or

storage of data; word processing software is not a hardware resource. TRUE


36. In the context of the information systems model, data resources are typically organized as
(p. 33)
databases and expert systems. FALSE

Data resources are typically organized as databases and knowledgebases. TRUE

37. In the context of the information systems model, information is subjected to a "value-added"
(p. 34)
process that converts it to data that meet the needs of end users. FALSE

In the context of the information systems model, data is subjected to a value-added process

that converts it to information that meets the needs of end users TRUE.

38. Data can be thought of as context independent. This means that a list of numbers or name by
(p. 34)
themselves do not provide an understanding of the context in which they were recorded.

TRUE

39. Data are raw facts or observations, typically about physical phenomena or business
(p. 34)
transactions. TRUE

40. In information systems activities, the processing of data resources typically takes the form of
(p. 35)
data entry activities. FALSE

The input of data resources typically takes the form of data entry activities. TRUE

41. In information systems activities, a user interface commonly refers to a more convenient and
(p. 35)
efficient method of end-user input and output with a computer system. TRUE

42. Calculating employees' pay, federal taxes, and other payroll deductions is a business example
(p. 35)
of a computerized processing activity. TRUE
43. After data has been entered into a computerized information system, it is usually not
(p. 35)
necessary to correct or update it. That is the benefit of a computerized system—once entered,

always correct. FALSE

The quality of any data stored in an information system must be maintained by a continual

process of correcting and updating activities. TRUE

Multiple Choice Questions

44. Information technology can be used to support _______________.


(p. 4)
A. product development teams

B. customer support processes

C. any other business activity

D. All the choices are correct.

45. In its simplest form, a system consists of all the following except:
(p. 4)
A. A group of cooperative users

B. A set of interrelated components

C. A clearly defined boundary

D. A common set of objectives

46. According to the Real World case, eCourier embraced technology by:
(p. 5)
A. Doing the same things that all their competitors were doing successfully.

B. Installing a new computerized bar-scanning system for packages.

C. Enabling a new telephone system for customers.

D. Giving all their couriers handheld GPS units for tracking and communication.

Lufthansa plans to phase out the desktop computers that it had previously deployed in

airports, thereby streamlining its infrastructure and cutting costs.


47. According to the Real World case, eCourier uses SeeWhy software to:
(p. 5)
A. Track packages that have not been delivered.

B. Provide business intelligence in terms of customer satisfaction.

C. Interface with their accounting software.

D. All of the above.

48. According to the Real World Case, the goal of Bryan Cave is:
(p. 6)
A. To have the best value for their customers.

B. To create increased profit per customer.

C. To build the best long-term relationships in the world.

D. All the above.

49. According to the Real World Case, the Bryan Cave law firm had difficulty billing its real estate
(p. 6)
customers because:

A. The developers could not afford their rates.

B. Developers think in terms of square feet, not hours worked.

C. Their lawyers did not understand the real estate profession.

D. None of the above.

50. According to the Real World Case, the big problem facing the Bryan Cave law firm in 2002
(p. 6)
was:

A. Communications between all their lawyers and offices.

B. Dealing with the differences in laws around the world.

C. Billing their clients correctly.

D. Making the highest profits from their resources while delivering the highest customer value.
51. All the following are examples of an information system, except:
(p. 7)
A. A day planner

B. A cash register

C. A group of marbles in a box

D. A paper-based accounting ledger

52. According to the text, most retail stores today use computer-based information systems to
(p. 8)
support business processes and operations. This support falls broadly into the categories of:

A. Business decisions and strategies for competitive advantage.

B. Operations and support strategies.

C. Business decisions and operations.

D. Strategic business decisions and tactical business decisions.

53. How do information systems aid in decision making?


(p. 8)
A. Information systems help companies determine investments.

B. Information systems help companies determine which products to sell or discontinue.

C. Information systems can be used to gain competitive advantage.

D. All of the choices are correct.

54. All of the following are fundamental reasons for business applications of information
(p. 8)
technology except:

A. Support of strategies for competitive advantage

B. Support of business processes and operations

C. Compliance with environmental regulations

D. Decision making support


55. According to the textbook case, Welch's uses BI software from Oco to:
(p. 9)
A. manage their gasoline usage.

B. decide which products should be produced.

C. ensure that its carriers are shipping full truckloads to customers.

D. follow new competitive trends from its competitors.

56. According to the textbook case, the Oco BI software used by Welch's:
(p. 9)
A. increases the number of deliveries made on Fridays.

B. assures that most deliveries are not made on Fridays.

C. assures that most deliveries are made on Fridays.

D. helps them even out the number of delivery trucks used each day of the week.

57. The expanding role of information systems from the 1950s to the present, in sequential order,
(p. 10)
are:

A. Management reporting, decision support, electronic business and commerce, data

processing, strategic and end user support

B. Data processing, management reporting, strategic and end user support, electronic

business and commerce, decision support

C. Data processing, management reporting, decision support, strategic and end user support,

electronic business and commerce

D. Electronic business and commerce, management reporting, data processing, strategic and

end user support, decision support

58. The rapid development of microcomputer processing power, application software packages,
(p. 10)
and telecommunications networks gave birth to the phenomenon of _______________.

A. manufacturer-to-public direct sales

B. MIS departments

C. end user computing

D. electronic monitoring
59. Which of the following is a false statement?
(p. 11)
A. Today's information systems are doing the same basic things that they did over 40 years

ago.

B. Today there is a much higher level of integration of system functions.

C. Today there is greater connectivity across dissimilar system components.

D. None of the statements is false.

60. Companies generally rely on e-business applications to do all of the following except:
(p. 12)
A. Re-engineer internal business processes

B. Implement electronic commerce systems

C. Monitor employee productivity

D. Promote enterprise collaboration among business teams and workgroups

61. In an e-business enterprise, an intranet refers to:


(p. 12)
A. An Internet-like network inside the enterprise

B. A network between an enterprise and its trading partners

C. A network between the members of a single workgroup

D. All the choices are correct.

62. E-business uses Internet technologies to work and empower _______________.


(p. 12)
A. business processes

B. electronic commerce

C. collaboration among business teams

D. All of the choices are correct.


63. E-commerce ____________________.
(p. 13)
A. involves buying, selling, marketing, and servicing of products, services, and information

over a variety of computer networks

B. uses the Internet, intranets, and extranets to support every step of the commercial process,

such as multimedia advertising, product information, and customer support

C. involves Internet security and payment mechanisms that ensure completion of delivery and

payment processes

D. All of the choices are correct.

64. The text classifies information systems as either operations or management support
(p. 13)
information systems. Which one of the following would not be classified as an operations

support system?

A. Transaction processing systems

B. Process control systems

C. Enterprise collaboration systems

D. Decision support systems

65. Electronic commerce systems generally include all of the following except:
(p. 13)
A. Internet websites for online sales

B. Direct links to credit reporting services

C. Extranet access of inventory databases

D. Intranets that allow sales reps to access customer records

66. Process control systems monitor and control _______________ processes.


(p. 14)
A. physical

B. transactional

C. inter-departmental

D. mechanical
67. A nuclear power plant uses electronic sensors linked to computers to continually monitor
(p. 14)
processes and make instant (real-time) adjustments that control the power generation

process. This is an example of a(n) _______________.

A. transaction processing system

B. decision support system

C. enterprise collaboration system

D. process control system

68. When employees in a project team use email to send and receive messages and use video
(p. 14)
conferences to hold electronic meetings and coordinate their activities, they are using

_______________.

A. transaction processing systems

B. process control systems

C. enterprise collaboration systems

D. decision support systems

69. A database of customer purchases that provides end-user managers with interactive and ad
(p. 15)
hoc decision-making support is referred to as _______________.

A. a transaction processing system

B. a decision support system

C. an information reporting system

D. an executive information system


70. A production manager needs a system to help determine how much product to manufacture
(p. 15)
based on the expected sales associated with a future promotion, plus the location and

availability of the raw materials necessary to manufacture the product. What type of system

would meet this manager's needs?

A. Transaction processing system

B. Process control system

C. Enterprise collaboration system

D. Decision support system

71. When information system applications focus on providing information and support for effective
(p. 15)
decision making by managers, they are called _______________ support systems.

A. decision

B. management

C. collaboration

D. process

72. An information system that supports the business functions of accounting, finance, human
(p. 16)
resource management, marketing, or operations would be classified as a(n) _______________

system.

A. functional business

B. executive information

C. management information

D. decision support
73. Information systems that focus on operational and managerial applications in support of basic
(p. 16)
business functions, such as accounting or marketing, are known as _______________.

A. functional business systems

B. strategic information systems

C. executive information systems

D. knowledge management systems

74. Most information systems are designed to _______________.


(p. 15)
A. produce information and support decision making

B. handle record-keeping

C. handle transaction processing chores

D. All the choices are correct.

75. Executive information systems (EIS) are tailored to meet the strategic information needs of
(p. 15)
which of the following management levels?

A. Top management (strategic)

B. Middle management (tactical)

C. Lower management (operational)

D. All of the choices are correct.

76. Business applications of information systems are typically combinations of several types of
(p. 15)
information systems. This integration is referred to as _______________ systems.

A. information reporting

B. decision support

C. cross-functional informational

D. end user computing


77. Success in today's dynamic business environment depends heavily on maximizing the use of
(p. 16)
Internet-based technologies and Web-enabled information systems to meet the competitive

requirements of _______________.

A. customers

B. suppliers

C. business partners

D. All of the choices are correct.

78. A functional business system supports all of the following types of applications except:
(p. 16)
A. Accounting

B. Customer problem resolution

C. Marketing

D. Human resource management

79. Which of the following systems acts as a consultant to users?


(p. 16)
A. Knowledge

B. Integrated information

C. Executive information

D. Expert

80. According to the textbook case on responsibility and accountability, even if a project is not an
(p. 17-
IT project, who is held responsible for optimizing returns on IT-related investments?
18)
A. CEO

B. CFO

C. COO

D. CIO
81. According to the textbook case on responsibility and accountability:
(p. 17-
A. IT is always 100% responsible for any large project involving information technology.
18)
B. IT is never 100% responsible for any large project involving information technology.

C. IT is sometimes 100% responsible for any large project involving information technology.

D. None of the above is correct.

82. Developing an information system solution involves all of the following steps except:
(p. 18)
A. Investigation

B. Implementation

C. Redesign

D. Maintenance

83. Computer-based information systems are usually conceived, designed, and implemented
(p. 18)
using some form of systematic development process. The investigation stage includes

_______________.

A. determining the economic or technical feasibility of a proposed application

B. acquiring and learning how to use the necessary software

C. improving the system

D. All of the choices are correct.

84. Developing information system solutions to business problems in an organization is the


(p. 18)
responsibility of _______________.

A. information system specialists

B. computer programmers

C. systems analysts

D. all information system users within the organization


85. When applying a systematic development process for computer-based information systems,
(p. 18)
_______________ would be part of the analysis phase.

A. determining the business requirements of the system

B. acquiring and learning how to use the necessary software

C. implementing a trial system

D. obtaining feedback from end users of the system

86. According to the text, the steps of developing an information system, in their proper order,
(p. 19)
are:

A. Investigate, analyze, implement, design, maintain

B. Investigate, design, analyze, implement, maintain

C. Maintain, implement, design, analyze, investigate

D. Investigate, analyze, design, implement, maintain

87. In the lawsuit filed against Hannaford Brothers, which of the following was not alleged as a
(p. 20-
reason for filing the suit?
21)
A. Hannaford has installed inadequate security measures.

B. Hannaford did not disclose the security breach to the public quickly enough.

C. Hannaford sold the data to spammers.

D. All the choices are correct.

88. The information systems function is equally as important to business success as the function
(p. 24)
of _______________.

A. accounting

B. operations management

C. human resources management

D. All the choices are correct.


89. In the information systems concept, the processing function involves:
(p. 26)
A. Capturing and assembling elements that enter the system to be processed

B. Transformation processes that convert input into output

C. Transferring elements that have been produced by a transformation process to their

ultimate destination

D. Monitoring and evaluating feedback to determine whether a system is moving toward the

achievement of its goal

90. According to the Real World case about the New York Times, the newspaper industry is in
(p. 27)
very deep trouble. What has become most important to them?
A. Business model innovation

B. Internet connectivity

C. Technological innovation

D. Communication initiatives

91. If a system is one of the components of a larger system, it is considered a(n)


(p. 29)
_______________.

A. environment

B. feedback loop

C. subsystem

D. interface

92. A system that can change itself or its environment in order to survive is _______________
(p. 29)
system.

A. a control

B. a self-monitoring

C. an environmental

D. an adaptive
93. Organizations are examples of _______________ systems because they interface and interact
(p. 29)
with other systems in their environment.

A. linked

B. open

C. dependent

D. parallel

94. The majority of organizations today would be classified as _______________ systems.


(p. 29)
A. open

B. closed

C. open adaptive

D. closed adaptive

95. An information system depends on all of the following resources except:


(p. 30)
A. Hardware

B. Software

C. People

D. Time

96. All of the following would be considered a hardware resource except:


(p. 31)
A. A microcomputer

B. A keyboard

C. Magnetic and optical disks

D. Programs and procedures

97. All of the following would be considered a software resource in an information system except:
(p. 31)
A. A computer operating system

B. A word processing software package

C. A telecommunication network

D. All of the choices are software resources.


98. In an information system context, which one of the following would be the most applicable
(p. 33)
description of application software?

A. It controls and supports the operations of a computer

B. It consists of programs that direct particular processing activities

C. It consists of operating instructions for people who will use an information system

D. None of the choices are correct.

99. In an information system, alphanumeric data normally takes the form of _______________.
(p. 33)
A. numbers and alphabetical characters

B. sentences and paragraphs

C. graphic shapes and figures

D. All of the choices are correct.

100. In an information system, image data normally takes the form of _______________.
(p. 33)
A. numbers and alphabetical characters

B. sentences and paragraphs

C. graphic shapes and figures

D. voice and other sounds

101. All of the following are good examples of information except:


(p. 34)
A. The social security number of the company's forklift operator

B. The retail price of blue widgets

C. How much the company owes to vender number 17

D. The numbers 1236789, 349875, and 340977


102. Telecommunications networks consist of _______________.
(p. 34)
A. computers, the Internet, intranets, and extranets

B. communications processors

C. devices interconnected by communication media and controlled by communications

software

D. All of the choices are correct.

103. All of the following normally happens to data during a value-added process except:
(p. 34)
A. Their useful life is determined

B. Their form is aggregated, manipulated, and organized

C. Their content is analyzed and evaluated

D. They are placed in a proper context for a human user

104. All of the following are considered computer hardware technology except:
(p. 32-
A. Operating system software
33)
B. Microcomputers

C. Keyboards

D. Printers

105. Which of the following is an example of control of an information system's performance?


(p. 36)
A. A system malfunction wiped out two weeks of student registration records

B. Programmers created a user friendly input screen for a new system

C. Subtotals do not add up to total sales; IT staff investigates whether data entry or processing

is the problem

D. An extra $20 was added to every water bill by mistake


106. The original, formal record of a transaction is called the:
(p. 35)
A. Updated form

B. Paper form

C. Transaction document

D. Source document

107. The source document is:


(p. 35)
A. The form of a document after its final update

B. A transaction document that refers to the source of the product

C. The original, formal record of a transaction

D. The first update to any transaction

Fill in the Blank Questions

108. An _______________ system is an organized combination of people, hardware, software,


(p. 4)
telecommunications networks, and data resources that collects, transforms, and disseminates

information in an organization.

information

109. With a strategic information system (SIS), information technology becomes an integral part of
(p. 11)
business processes, products, and _______________.

services

110. _______________ is defined as the use of Internet technologies to work and empower business
(p. 12)
processes, electronic commerce, and enterprise collaboration within a company and with its

customers, suppliers, and other business stakeholders.

E-business
111. Enterprise collaboration systems use software tools to support _______________ among the
(p. 12)
members of networked teams and workgroups.

communication, coordination, or collaboration

112. During the 1980s and 1990s, information technology helped companies gain a competitive
(p. 11)
advantage in the global marketplace. This is referred to as the _______________ information

systems concept.

strategic

113. A _______________ team uses a corporate intranet and the Internet for electronic mail,
(p. 13)
videoconferencing, electronic discussion groups, and Web pages of work-in-progress

information to collaborate on business projects.

virtual

114. Electronic _______________ is the buying, selling, marketing, and servicing of products,
(p. 13)
services, and information over a variety of computer networks.

commerce

115. Types of information systems are generally classified as either operations information systems
(p. 13)
or _______________ information systems.

management

116. Marketing and selling books to consumers over the Internet is an example of _______________
(p. 13)
commerce.

electronic or Internet or "E-"

117. A system that controls the industrial processes of an organization would be classified as a(n)
(p. 13)
_______________ support system.

operations
118. Transaction processing systems process transactions in two basic ways, _______________
(p. 14)
processing or real-time.

batch

119. When a manager uses an interactive, computer-based information system to assist in his/her
(p. 15)
decision making, the manager is using a _______________ support system.

decision

120. A system that provides pre-specified reports for the managers of an organization would be
(p. 15)
classified as a _______________ system.

management

121. Enterprise collaboration systems enhance team and workgroup communication and
(p. 14)
productivity, and include applications that are sometimes called office _______________

systems.

automation

122. The goal of knowledge management systems (KMS) is to help knowledge workers create,
(p. 15)
organize, and _______________ important business knowledge wherever and whenever it is

needed.

share

123. The success of an information system should be measured by both its efficiency and its
(p. 17)
_______________.

effectiveness

124. The design of an information system application is based on an _______________ of the


(p. 18)
business requirements of an organization.

analysis
125. As a manager, you must be aware of what uses of information technology might be
(p. 20)
considered improper, irresponsible, or harmful to individuals or to society. This dimension of

the use of information technology is referred to in the text as an _______________

responsibility.

ethical

126. A manufacturing system accepts raw materials as input and produces finished goods as
(p. 26)
output. An information system accepts data as input and processes them into

_______________ as output.

information

127. A system with feedback and _______________ functions is sometimes called a cybernetic
(p. 29)
system.

control

128. The _______________ component in a cybernetic system refers to the data about the
(p. 29)
performance of the system.

feedback

129. _______________ is data about the performance of a system.


(p. 29)
Feedback

130. _______________ involves monitoring and evaluating feedback to determine whether a system
(p. 29)
is moving toward the achievement of its goal.

Control

131. People, hardware, software, __________, and networks are the five basic resources of
(p. 31)
information systems.

data
132. Information processing consists of the system activities of input, processing, output,
(p. 32)
_______________, and control.

storage

133. In the context of the information system model, software resources include the sets of
(p. 33)
operating instructions called _______________, which direct and control computer hardware.

programs

134. In the context of the information systems model, _______________ are the operating
(p. 33)
instructions for the people who will use an information system. Examples are instructions for

filling out a paper form or using a software package.

procedures

135. Information in various forms is transmitted to end users and made available to them in the
(p. 35)
_______________ activity.

output

136. A _______________ document is the original, formal record of a transaction.


(p. 35)
source

137. _______________ is the information systems activity in which data and information are retained
(p. 36)
in an organized manner for later use.

Storage

138. In an information system, the _______________ activity would be considered the component
(p. 36)
that evaluates feedback in order to determine whether the system is moving toward the

achievement of its goal.

control
Chapter 02 Competing with Information Technology Answer Key

True / False Questio

1. When an organization uses information technology to develop products, services and

(p. 46) capabilities in order to gain a strategic advantage over competitive forces in the global
marketplace, it is using information systems in a strategic role.

TRUE

2. Competition is a negative characteristic in business that can require significant resources to

(p. 49) overcome.

FALSE

Although competition can require significant resources, it is a positive characteristic in business

that is natural and healthy.

3. Most products and services have some sort of substitute available to the consumer.

(p. 49)
TRUE

4. In the Internet world, a firm's biggest competitor may be one that is not yet in the marketplace

(p. 49) but could emerge almost overnight.

TRUE
5. The threat of new entrants is often at its strongest during periods of rising costs or inflation.

(p. 49) FALSE

The threat of substitutes is often at its strongest during periods of rising costs or inflation.

6. If a key supplier's bargaining power gets too strong, it can force the price of goods and services

(p. 49) to unmanageably high levels.

TRUE

7. An innovation strategy may allow a firm to focus its products or services and gain an advantage

(p. 50) in a particular segment or niche of a market.

FALSE

A differentiation strategy may allow a firm to focus its products or services and gain an

advantage in a particular segment or niche of a market.

8. When a firm develops ways to differentiate its products from a competitor's, it is pursuing a cost

(p. 50) leadership strategy.

FALSE

When a firm develops ways to differentiate its products from a competitor's, it is pursuing a

differentiation strategy.

9. When a firm uses IT to create virtual organizations of business partners, it is pursuing a growth

(p. 50) strategy.

FALSE
When a firm uses IT to create virtual organization of business partners, it is pursuing an

alliance strategy.

10. A given activity can fall into one or more of the categories of competitive strategy.

(p. 50)
TRUE

11. If an organization offers its online package tracking system in a manner that allows its

(p. 50) customers to access shipment information not only via a computer, but via a mobile phone as
well, then such an action could fall into both the differentiation and innovation strategy

categories.

TRUE

12. When a firm makes such radical changes to its business processes for producing products and

(p. 50) services that it alters the fundamental structure of an industry, it is pursuing an innovation
strategy.

TRUE

13. Not everything innovative will serve to differentiate one organization from another.

(p. 50)
TRUE

14. Investments in information technology can allow a business to lock in customers and suppliers,

(p. 50) and lock out competitors, by building valuable new relationships with them.

TRUE
15. Companies like Wal-Mart use information technology to implement competitive strategies for

(p. 51) strategic advantage.

TRUE

16. When a business effectively builds in switching costs, its customers and/or suppliers become

(p. 52) reluctant to switch to another competitor.

TRUE

17. A strategic use of information technology would be to leverage investment in information

(p. 52) system specialists, hardware, software, databases, and networks from operational uses into
strategic applications.

TRUE

18. A company that places a strategic focus on customer value recognizes that quality, rather than

(p. 54) price, has become a primary determinant in a customer's perception of value.

TRUE

19. Companies that consistently offer the best value from the customer's perspective must provide

(p. 54) two key services: keeping track of their individual customers' preferences and selling products
or services at lowest price.

FALSE

Companies that consistently offer the best value from the customer's perspective (a) keep track

of their customers' individual preferences, (b) keep up with market trends, (c) supply products,

services, and information anytime, anywhere, and (d) provide customer services tailored to
individual needs.

20. Internet technologies can make customers the focal point of customer relationship

(p. 54) management (CRM) and other e-business applications.

TRUE

21. The value chain framework can be used to view a firm as a series, a chain, or a network of

(p. 56) basic activities that add value to its products and services, and thus add a margin of value to
the firm.

TRUE

22. According to the value chain concept, primary processes include such things as the

(p. 56) procurement of resources and human resource management that are directly related to the
manufacturing of products or delivery of services to the customer.

FALSE

Human resource management is a support process, not a primary process.

23. When using the value chain concept, managers should seek to develop strategic information

(p. 56) systems for those activities that they view as the "weakest link" in the value chain.

FALSE

Managers should try focus on the basic processes that add the most value to a company's

products or services.

24. The value chain concept can help managers decide where and how to apply the strategic

(p. 56) capabilities of information technology.


TRUE

25. Business process reengineering (BPR) is most often called streamlining.

(p. 58)
FALSE

Business process reengineering (BPR) is most often called reengineering.

26. Although the potential payback of reengineering is high, so is the risk of failure and level of

(p. 58) disruption to the organizational environment of the firm.

TRUE

27. Business process reengineering (BPR) combines a strategy of promoting business innovation

(p. 58) with a strategy of making major improvements to business operations so that a company can
become a much stronger and more successful competitor in the marketplace.

TRUE

28. Many companies have found that organizational redesign approaches are an important enabler

(p. 58) of business process reengineering.

TRUE

29. All the employees within a marketing department, from clerical staff to top managers, form a

(p. 58) cross-functional team.

FALSE

A cross-functional team includes employees from several different departments or specialties.


30. Information technology plays a major role in the business process reengineering of most

(p. 58) business processes.

TRUE

31. Becoming an agile company depends on customer perceptions of products and services, as

(p. 63) much as any other strategy.

TRUE

32. An agile company cooperates with its suppliers and competitors.

(p. 63)
TRUE

33. By nurturing an entrepreneurial spirit, an agile company provides powerful incentives for

(p. 63) employee responsibility, adaptability, and innovation.

TRUE

34. Information technology can enable a company to develop relationships with its customers in

(p. 64) virtual communities.

TRUE

35. Yahoo! transformed its service from a search engine into a portal by dedicating one branch of

(p. 63) its business to providing content and other media-related services.

FALSE

Yahoo! transformed its service from a search engine into a portal by initiating numerous

partnerships to provide content and other media-related services from its website.
36. One of the reasons people form virtual companies is to keep new entrants out of a market.

(p. 65)
FALSE

The basic strategies of virtual companies include (a) share information and risk with alliance

partners, (b) link complementary core competencies, (c) reduce concept-to-cash time, (d)

increase facilities and market coverage, (e) gain access to new markets and share market or

customer loyalty, and (f) migrate from selling products to selling solutions.

37. Knowledge-creating companies constantly create new business knowledge and then

(p. 66) disseminate it throughout the company in order to quickly build the new knowledge into their
products and services.

TRUE

38. Explicit knowledge involves the "how-to" knowledge that resides in workers.

(p. 66)
FALSE

Explicit knowledge is made up of data, documents, and things written down.

39. Successful knowledge management creates techniques, technologies, and rewards for getting

(p. 66) employees to share what they know and to make better use of accumulated workplace
knowledge.

TRUE

40. As an organization's learning process continues and its knowledge base expands, the

(p. 67) knowledge creating company works to integrate its knowledge into its business processes,
products, and services.

TRUE
Multiple choice Questions

41. A strategic information system can be any kind of information system that uses information

(p. 46) technology to help an organization _______________.

A. gain a competitive advantage

B. reduce a competitive disadvantage

C. meet strategic enterprise objectives

D. all of the choices are correct.

42. A firm can survive and succeed in the long run if it successfully develops strategies to confront

(p. 46) the _______________ that shape the structure of competition in its industry.

A. technological innovations

B. competitive business processes

C. competitive forces

D. competitive strategies

43. A(n) _______________ strategy is a competitive strategy by which a firm seeks to become a

(p. 49) low-cost producer of products and services in the industry.

A. cost leadership

B. differentiation

C. innovation

D. alliance
44. A(n) _______________ strategy is a competitive strategy by which a firm develops ways to

(p. 49) differentiate its products and services from those of its competitors.

A. low cost leadership

B. innovation

C. differentiation

D. growth

45. A(n) _______________ strategy is a competitive strategy by which a firm develops unique

(p. 49) products or services from those of its competitors, or makes radical business changes that may
alter the fundamental nature of the industry.

A. alliance

B. growth

C. differentiation

D. innovation

46. A(n) _______________ strategy is a competitive strategy by which a firm significantly expands

(p. 49) its capacity to produce goods and services, expanding and diversifying in the market.

A. alliance

B. growth

C. differentiation

D. innovation
47. A(n) _______________ strategy is a competitive strategy by which a firm establishes new

(p. 49) business linkages with customers, suppliers, competitors, and other companies.

A. growth

B. low cost leadership

C. differentiation

D. alliance

48. According to the text, competition is a _______________ characteristic in business that

(p. 49) _______________.

A. positive, is natural and healthy

B. negative, can consume significant resources

C. neutral, can help a firm meet strategic enterprise objectives

D. none of the choices are correct.

49. According to the text, in the world of the Internet, a firm's biggest competitor:

(p. 49)
A. Usually exists and is close in the physical world

B. Usually does not exist but will emerge close in the physical world

C. May not yet exist but could emerge almost overnight

D. Probably exists in an overseas location

50. According to the text, the Internet:

(p. 49)
A. Has limited competition world-wide

B. Has created many ways to enter the market quickly, with relatively low cost

C. Has created new entry barriers to competition

D. Has decreased prices world-wide

51. Which of the following is a competitive strategy?

(p. 49)
A. New entries into the market

B. Innovation

C. Bargaining power

D. Substitutes

52. All the following are competitive strategies except:

(p. 49)
A. New entries into the market

B. Innovation

C. Cost leadership

D. Alliances

53. All of the following can be used to counter competitive forces in the marketplace except:

(p. 49)
A. Alliances

B. Growth
C. Innovation

D. Bargaining

54. All of the following are competitive forces in the marketplace except:

(p. 49)
A. Alliances

B. Competition

C. Substitutes

D. Bargaining

55. Which of the following is a competitive force in the marketplace?

(p. 49)
A. Cost leadership

B. Competition

C. Differentiation

D. Alliances

56. Developing a relationship with a customer such that the customer cannot afford to switch

(p. 50) suppliers is an example of:

A. Monopolistic enterprise

B. Locking in the customer

C. Growth strategies

D. None of the above is correct


57. The practice of becoming the largest purchaser of products from a given supplier is an example

(p. 50) of:


A. Cost leadership

B. Growth strategies

C. Differentiation

D. Locking in the supplier

58. Becoming a low-cost producer of products and services in an industry is an example of a(n):

(p. 49) A. Cost leadership strategy

B. Differentiation strategy

C. Innovation strategy

D. Growth strategy

59. All of the following are basic competitive forces discussed in the text except:

(p. 49)
A. Rivalry of competitors

B. Threat of substitutes

C. Bargaining power of suppliers

D. Bargaining power of competitors

60. All of the following are basic competitive strategies discussed in the text except:

(p. 49)
A. Cost leadership

B. Innovation
C. Product differentiation

D. Strategic dominance

61. Expanding a company's product offering into global markets is an example of a(n)

(p. 50) _______________ strategy.

A. cost leadership

B. differentiation

C. growth

D. alliance

62. Investments in information technology that build valuable new relationships allow a firm to:

(p. 50)
A. Lock in the supplier

B. Lock in the customer

C. Lock out competition

D. All the above

63. In addition to the five basic competitive strategies, the text describes several key strategies

(p. 52) implemented with information technology. Which of the following is not one of those
strategies?

A. Locking in customers

B. Building switching costs

C. Creating alliances

D. Raising barriers to entry


64. Using an information system to make customers and/or suppliers reluctant to change to

(p. 52) another competitor is called:


A. Growth strategy

B. Building switching costs

C. Creating alliances

D. Raising barriers to entry

65. When a firm develops ways to differentiate their products and services from their competitors',

(p. 50) it is pursuing a _______________ strategy.


A. differentiation

B. alliance

C. innovation

D. marketing

66. A sales company such as eBay would be most likely to use information technology to promote

(p. 51) _______________.

A. online stock trading

B. point-of-sale inventory tracking

C. online auctions

D. virtual manufacturing alliances

67. When a firm strives to find ways to help its suppliers and customers reduce their costs or to

(p. 51) increase the costs of their competitors, it is pursuing a strategy of _______________.
A. innovation

B. alliance

C. cost leadership

D. growth

68. When customers become dependent on mutually beneficial inter-enterprise information

(p. 52) systems, they become reluctant to switch to a company's competitors because they would
incur all following costs except:

A. Time

B. Money

C. Innovation

D. Effort

69. Companies like Wal-Mart extend their networks to their customers and suppliers in order to

(p. 52) build innovative continuous inventory replenishment systems that would lock in their business.
This creates a(n) _______________ information system.

A. leveraged

B. inter-enterprise

C. intra-enterprise

D. locked-in

70. A serious problem of competitive advantage is that:

(p. 53)
A. It normally doesn't last very long and it isn't sustainable over the long term

B. Competitors figure out how it was done and do the same thing

C. A competitive advantage can become a competitive necessity

D. All of the choices are correct.

71. A company that places a strategic focus on customer value recognizes that __________, rather

(p. 54) than __________, has become a primary determinant in a customer's perception of value.

A. service, price

B. price, quality

C. quality, service

D. quality, price.

72. Companies that consistently offer the best value from the customer's perspective do all the

(p. 54) following, except:

A. Keep track of their customers' individual preferences

B. Keep up with market trends

C. Supply products, services, and information anytime, anywhere

D. Offer lowest prices and fastest delivery

73. A customer-focused business can build customer value and loyalty by:

(p. 55)
A. Making a loyal customer feel special with website personalization
B. Letting customers place orders directly, or through distribution partners

C. Letting customers check order history and delivery status

D. All of the choices are correct.

74. A transaction database allows all of the following activities except:

(p. 55)
A. Linking employees and distribution partners to customers

B. Letting customers check order history

C. Giving employees a complete view of each customer

D. None of these activities are supported by a transaction database.

75. According to the textbook case, innovation in information systems at Universal Orlando comes

(p. 55- from thinking like a:


56)
A. Customer

B. Competitor

C. Employee

D. IT specialist

76. The value chain framework can be used to view a firm as a series, a chain, or a network of

(p. 56) basic activities that:

A. Add value to its products and services, and thus add a margin of value to the firm.

B. Lower costs along the product development chain.


C. Create the perception of value and goodwill to employees.

D. Create a smooth-flowing chain of events between the supplier and the customer.

77. Which of the following is a primary business process?

(p. 57)
A. Collaborative workflow intranet

B. Targeted marketing

C. Technology development

D. Procurement of resources

78. All of the following are primary business processes, except:

(p. 57)
A. Customer relationship management

B. Targeted marketing

C. Technology development

D. Just-in-time warehousing

79. Which of the following is a support process?

(p. 57)
A. Collaborative workflow intranet

B. Targeted marketing

C. Customer relationship management

D. Just-in-time warehousing

80. All of the following are support processes, except:


(p. 57)
A. Customer relationship management

B. Procurement of resources

C. Technology development

D. Employee benefits intranet

81. Business process reengineering is best defined as:

(p. 58)
A. A key technology to reduce customer late payments

B. A radical redesign of business processes to achieve improvements in cost, quality, speed,

or service

C. A key way to ensure successful improvement in processing

D. All of the choices are correct.

82. Business process reengineering (BPR) is often referred to as:

(p. 58)
A. Streamlining

B. Reengineering

C. Quickening

D. None of the choices are correct.

83. Business process reengineering (BPR) incorporates all the following strategies, except:

(p. 58) A. Lowering prices as a competitive strategy

B. Promoting business innovation

C. Making major improvements to business operations


D. None of the choices are correct.

84. Traditional business improvement includes:

(p. 61)
A. Top-down participation

B. Long time requirements

C. Brand new business processes

D. Incremental levels of change

85. Business process engineering includes:

(p. 61)
A. Bottom-up participation

B. Short time requirements

C. Improved new versions of current processes

D. Radical levels of change

86. Traditional business improvement includes all the following, except:

(p. 61)
A. Bottom-up participation

B. Short time requirements

C. Improved new versions of current processes

D. Radical levels of change

87. Business process redesign includes all the following, except:

(p. 61)
A. Top-down participation

B. Long time requirements


C. Brand new business processes

D. Incremental levels of change

88. Organizations are changing from a competitive environment in which mass-market products

(p. 62) and services were standardized, long-lived, information-poor, and exchanged in one-time
transactions to an environment in which companies compete globally with niche-market

products and services that are _______________.

A. individualized

B. short-lived

C. exchanged on an ongoing basis with customers

D. All the choices are correct.

89. An agile company supports all the following except:

(p. 62)
A. Short-lived products and services

B. Standardized products and services

C. Information-rich products and services

D. Niche market products and services

90. _______________ agility is the ability to co-opt customers in the exploitation of innovation

(p. 63) opportunities.


A. Customer

B. Partnering
C. Operational

D. Technological

91. _______________ agility is the ability to leverage assets, knowledge, and competencies in the

(p. 63) exploration and exploitation of innovation opportunities.

A. Customer

B. Partnerin

C. Operational

D. Technological

92. _______________ agility is the ability to accomplish speed, accuracy, and cost economy in the

(p. 63) exploitation of innovation opportunities.

A. Customer

B. Partnering

C. Operational

D. Technological

93. Which of the following is not a strategy of a virtual company?

(p. 65)
A. Share infrastructure and risk with alliance partners

B. Link complementary core competencies

C. Migrate from selling products to selling solutions


D. Increase concept-to-case time

94. Explicit knowledge deals with:

(p. 66)
A. Data, documents, and things written down or stored on computers.

B. "How-to" knowledge, which resides in workers.

C. Using data mining techniques to capture external information.

D. All of the choices are correct.

95. Tacit knowledge deals with:

(p. 66) A. Data, documents, and things written down or stored on computers.

B. "How-to" knowledge, which resides in workers.

C. Using data mining techniques to capture external information.

D. None of the choices are correct.

96. Accessing and retrieving documents that have been stored online is a function of

(p. 66) _______________.


A. document management

B. enterprise intelligence

C. information creation, sharing, and management

D. All of the choices are correct.

97. Real-time information management, communication, and collaboration are a function of

(p. 66) _______________.


A. document management

B. enterprise intelligence

C. information creation, sharing, and management

D. All of the choices are correct.

98. Performance support, building expert networks, and leveraging organizational know-how are a

(p. 66) function of _______________.


A. document management

B. enterprise intelligence

C. information creation, sharing, and management

D. All of the choices are correct.

99. The goal of knowledge management systems (KMS) is to help knowledge workers

(p. 66) _______________ important business knowledge.


A. create

B. organize

C. distribute

D. All of the choices are correct.

100. According to the textbook case, the Matter Page System at Goodwin Proctor increases

(p. 67) efficiency of their attorneys by.


A. Separating the client billing, documents, and contact data

B. Enabling the attorneys to launch more than one application at a time to find information

C. Requiring the attorneys to spend more time researching their cases


D. Pulling all the client billing, documents and contact data into a single "one-stop-shop" for

users

Fill in the Blank Questions

101. A firm can survive and succeed in the long run if it successfully develops strategies to confront

(p. 46) the five _______________ forces that shape the structure of competition in its industry.

competitive

102. When an organization uses information technology to develop products, services and

(p. 46) capabilities in order to gain a strategic advantage over competitive forces in the global
marketplace, it is using information systems in a _______________ role.

strategic

103. The competitive threat of _______________ is often at its strongest during periods of rising costs

(p. 49) or inflation.

substitutes

104. A _______________ strategy is a competitive strategy by which a firm seeks to become a low-

(p. 49) cost producer of products and services in the industry.

cost leadership
105. When using a(n) _______________ strategy, a firm seeks to find new ways of producing or

(p. 50) distributing its products and services that are so different from the way business has been
conducted that they may alter the fundamental structure of the industry.

innovation

106. _______________ are the costs in time, money, effort, and inconvenience that it would take a

(p. 52) customer or supplier to move its business to a firm's competitors.

Switching costs

107. If a company has successfully increased the amount of investment or the complexity of the

(p. 53) technology required to compete in an industry or a market segment, it has raised
_______________ that would discourage or delay other companies from entering the market.

barriers to entry

108. Although large investments in technology can create entry barriers for present or prospective

(p. 53) players in an industry, the barriers can evaporate over time as competitors employ the new
technologies. This is an example of IT becoming a competitive _______________.

necessity

109. When a strategy or action becomes a(n) _______________, it means that instead of creating an

(p. 53) advantage, the strategy or action becomes necessary simply to compete and do business in
the industry.

competitive necessity
110. A customer-focused business has a strategic focus on customer _______________, which

(p. 54) recognizes that quality rather than price has become the primary determinant in a customer's
perception of value.

value

111. In the _______________ concept, some business activities are primary processes while others

(p. 56) are support processes.

value chain

112. According to the value chain concept, _______________ processes within the organization

(p. 57) would include human resources management and technology development.

support

113. _______________ is defined as the restructuring and transforming of a business process by a

(p. 58) fundamental rethinking and radical redesign to achieve improvements in costs, quality, speed,
and service.

Reengineering

114. Many companies have found that organizational _______________ approaches are an important

(p. 58) enabler of business process re-engineering.

redesign

115. A(n) _______________ company can make a profit in markets with broad product ranges and

(p. 63) short model lifetimes, and it can produce orders individually and in arbitrary lot sizes.

Agile
116. A _______________ company can be defined as an organization that uses telecommunications

(p. 64) networks and other information technology to link people, assets, and ideas.

virtual

117. Virtual companies develop alliances and extranet links that form _______________ information

(p. 64) systems with suppliers, customers, subcontractors, and competitors.

inter-enterprise

118. People and corporations are forming virtual companies as the best way to implement key

(p. 64) business strategies and alliances that promise to ensure success in today's turbulent
_______________ climate.

business

119. The concept of _______________-management refers to organizing and sharing the diverse

(p. 66) forms of business information created within an organization. This includes managing project
and enterprise document libraries, discussion databases, hypermedia web site databases, and

other types of knowledge bases.

knowledge

120. _______________ knowledge deals with "how-to" knowledge, which resides in workers.

(p. 66)
Tacit

121. _______________ knowledge is made up of data, documents, and things written down.

(p. 66)
Explicit

122. Enterprise Intelligence, Information Creation, Sharing, and Management, and Document
(p. 66) Management are the three levels of _______________.

knowledge management

123. Leveraging organizational "know-how", performance support, interacting with operational

(p. 66) databases, and building expert networks are part of the _______________ level of knowledge
management.

enterprise intelligence

124. Capturing and distributing expert stories, real-time information management, communication

(p. 66) and collaboration, and new content creation are part of the _______________ level of knowledge
management.

information creation, sharing, and management

125. Accessing and retrieving documents stored online are part of the _______________ level of

(p. 66) knowledge management.

document management
Chapter 03 Computer Hardware Answer Key

True / False Questions

1. All computers are systems of input, processing, output, storage, and distribution
(p. 78)components.

FALSE

All computers are systems of input, processing, output, storage, and control
components.

2. The first electronic digital computer was completed in the 1960s.

(p. 81)
FALSE

The first electronic digital computer was completed in 1946 at the Moore School of
Electrical Engineering.
3. Personal computers, networkservers, and technicalworkstations are terms used to
(p. 83)highlight major uses of particular types of computers.

TRUE

4. Experts predict the merging or disappearance of several computer categories. For

(p. 83)example, many midrange and mainframe systems have been made obsolete by the
power and versatility of client/server networks composed of microcomputers and
servers.

TRUE

5. Network servers are the most important category of computer systems for both
(p. 83)businesspeople and individual consumers.

FALSE

Microcomputers are the most important category of computer systems for both
businesspeople and individual consumers.

6. The computing power of microcomputers currently exceeds that of the mainframe

(p. 83)computer of previous generations, at a fraction of the cost.

TRUE
7. Some microcomputers are powerful enough to support applications with heavy

(p. 83)mathematical computing and graphics display demands, such as computer-aided


design (CAD) or investment analysis.

TRUE

8. Network servers are some of the less powerful microcomputers; they are used to

(p. 83)coordinate telecommunications and resource sharing in small LANs and in Internet
and intranet websites.

FALSE

Network servers are usually the more powerful microcomputers.

9. The top criteria for corporate PC ownership are operating systemready, connectivity,
(p. 85)solidperformance, and globalcompatibility.

FALSE

The top criteria for corporate PC ownership are operating system ready, connectivity,
solid performance, and security equipped.

10. Today's corporate buyers seek networked PCs equipped with reliable wireless

(p. 84)capabilities.
TRUE

11. Web-enabled personal digital assistants use touch screens, pen-based handwriting
(p. 86)recognition, or keyboards, so mobile workers can send and receive e-mail, access the
Web, and exchange information with their desktop PCs or Web servers.

TRUE

12. Midrange computers are often used as network servers in order to help manage large
(p. 87-Internet websites, corporate intranets and extranets, and client/server networks.
88)
TRUE

13. Microcomputers can act as powerful workstations for computer-aided design and other

(p. 88)computation and graphics-intensive applications.

TRUE

14. A RIM Blackberry combines a mobile phone, a music and video player, and an
(p. 90)Internet communications device.

FALSE

An iPhone does all this.


15. The function of an input device is to interpret computer program instructions and to
(p. 93)transmit directions to the other components of the computer system.

FALSE

The function of an input device is to convert data into electronic form for entry into a

computer system.

16. The central processing unit (CPU) is the main processing component of a computer
(p. 93)system.

TRUE

17. The output devices of a computer system can include videodisplayunits, scanners,
(p. 93)and printers.

FALSE

A scanner is an input device.

18. The control unit of the CPU interprets instructions and directs processing.

(p. 93)
TRUE

19. The clock speed of a microprocessor today is commonly expressed in teraflops; earlier
(p. 94)microcomputer speeds were reported in gigahertz.

FALSE

The clock speed of a microprocessor today is commonly expressed in gigahertz;

earlier microcomputer speeds were reported in megahertz.

20. Moore's Law refers to the exponential growth in the number of transistors per

(p. 94)integrated circuit, which quadruples computer power every six months.

FALSE

Moore's Law refers to the exponential growth in the number of transistors per

integrated circuit, which quadruples computer power every 18 to 24 months.

21. When discussing the concept of a computer system, peripherals is the generic name
(p. 97)given to all input, output, and secondary storage devices that are part of a computer
system.

TRUE

22. Peripherals depend on direct connections or telecommunications links to the central

(p. 97)processing unit of a computer system.

TRUE
23. Offline devices are separate from, but can be electronically connected to and
(p. 97)controlled by, a CPU.

FALSE

Offline devices are not under the control of the CPU.

24. A pointing stick is the most popular pointing device used today.

(p. 97)
FALSE

An electronic mouse is the most popular pointing device used today.

25. A trackball is a type of pointing device that converts drawings and other graphic
(p. 97)images into digital data in order to enter it into a computer system.

FALSE

A trackball is a stationary device related to the mouse.

26. Some touch screens emit a grid of infrared beams or soundwaves that is broken
(p. 100)when the screen is touched.

TRUE
27. Pen-based computing technologies are being used in many hand-held computers
(p. 101)and personal digital assistants.

TRUE

28. Speech recognition systems typically require training the computer to recognize your

(p. 101)voice and its unique sound patterns in order to achieve a high degree of accuracy.

TRUE

29. Speaker independent voice recognition systems allow a computer to understand a


(p. 102)few words from a voice it has never heard before.

TRUE

30. Optical scanning enables the direct entry of data from source documents into a
(p. 103)computer system.

TRUE

31. OCR technology is used to read codes on merchandise tags, product labels, credit
(p. 103)card receipts, and other documents.

TRUE
32. The dark, magnetic stripe on the back of credit cards can hold about 200 gigabytes of
(p. 105)information.

FALSE

The dark, magnetic stripe on the back of credit cards can hold about 200 bytes of
information.

33. Smart cards, a form of input technology that contains an embedded microprocessor
(p. 105)chip, are becoming popular in the United States for use in debit and credit cards.

TRUE

34. Digital cameras and digital video cameras enable users to shoot, store, and
(p. 105)download still photos or full-motion video and audio onto their PCs.

TRUE

35. Video displays and printed documents have been, and still are, the most common

(p. 105)forms of output from computer systems.

TRUE

36. Advances in video monitor technology, such as activematrix and dualscan

(p. 106)capabilities, have improved the color, but not the clarity, of LCD displays.
FALSE

Advances in video monitor technology have improved both the color and the clarity of
LCD displays.

37. Printing information on paper is the most common form of information output.

(p. 106)
FALSE

Printing information on a video display is the most common form of output.

38. One of the major trends in secondary storage has been toward massive capacities
(p. 107-using magnetic and optical media.
108)
TRUE

39. High speed storage media cost less per byte and provide higher capacities than

(p. 107-lower-speed storage media.


108)
FALSE

High-speed storage media cost more per byte and provide lower capacities.

40. Data are processed and stored in a computer system through the presence or

(p. 108)absence or electronic or magnetic signals to the computer. This is called a "bi-state"
representation of data, because the computer and the media can exhibit only two
states or conditions.

FALSE

This is called a "two-state" or "binary" representation of data.

41. A byte typically consists of ten bits and represents one character of data in most

(p. 108)computer coding schemes.

FALSE

A byte consists of eight bits.

42. Magnetic tape devices are frequently called direct access storage devices (DASDs),

(p. 109)while magnetic disks are known as sequential access devices.

FALSE

Magnetic tape devices are sequential access devices; magnetic disks are DASDs.

43. The terms directaccess and randomaccess describe the same concept.
(p. 109)
TRUE
44. The primary storage (main memory) of a computer consists of microelectronic
(p. 110)semiconductor memory chips.

TRUE

45. Random Access Memory (RAM) is non-volatile memory.

(p. 110)
FALSE

RAM is volatile.

46. ROM chips are widely used as a primary storage medium because they can be
(p. 101)erased and overwritten.

FALSE

ROM chips can be read, but not erased or overwritten.

47. Magnetic disks are common forms of secondary storage because they provide fast
(p. 112)access and high storage capacity at a reasonable cost.

TRUE

48. RAID disk units provide fault tolerant storage capacity because data can be

(p. 113)recovered from backup copies stored on other disks should one disk fail.
TRUE

49. Magnetic tapes are no longer used by businesses today because the cost of storage
(p. 113)on tape is very expensive compared to other types of storage media.

FALSE

Magnetic tape is a low-cost storage medium.

50. Most CD-ROM disks can hold more than 600 megabytes of information.
(p. 114)
TRUE

51. The main advantage of CD-R (compact disk-recordable) disks is that they enable
(p. 114)recorded data to be erased many times.

FALSE

The major limitation of CD-R disks is that recorded data cannot be erased.

52. DVD+RW+R with CD-RW provides an all-in-one drive for burning DVD-RW or DVD-
(p. 114)R disks, burning CDs, and reading DVDs and CDs.

TRUE
53. Active RFID chips are self-powered and must be close to the reader to transmit their

(p. 115)signal.

FALSE

Active RFID chips do not need to be close to the reader to transmit their signal.

54. RFID chips may be attached to objects, but cannot be injected into them because it
(p. 115)interferes with radio signal transmission.

FALSE

RFID chips can be attached to objects, but they can also be injected into them. A
recent use for RFID chips is the identification of pets, who have a chip imbedded

under their skin.

55. The use of RFID technology poses concerns for privacy issues.
(p. 117)
TRUE

56. It is predicted that in the future we will be able to back up our biological memories.
(p. 118)
TRUE
Multiple Choice Questions

57. Computer systems rely on all the following components except _______________.
(p. 78)

A. input

B. internet

C. processing

D. storage
58. Computer systems rely on which of the following components?
(p. 78)

A. Input, processing, output, storage, and control

B. Input, processing, output, storage, and the Internet

C. The Internet, processing, output, storage, and control

D. Input, processing, output, the Internet, and control

59. The mechanical loom was invented by _______________.


(p. 78)

A. Blaise Pascal

B. Joseph Jacquard

C. Herman Hollerith
D. Keith Glennan

60. The first generation of computers relied on _______________.


(p. 81)

A. miniaturized circuits

B. transistors

C. vacuum tubes

D. punch cards

61. The second generation of computers relied on _______________.


(p. 81)

A. miniaturized circuits

B. transistors

C. vacuum tubes

D. punch cards

62. In the 1950s, _______________ were invented and quickly replaced the thousands of
(p. 81)vacuum tubes used in electronic computers.

A. microchips
B. resistors

C. transistors

D. miniaturized circuits

63. The third generation of computers relied on _______________.


(p. 81)

A. solid state technology and integrated circuits

B. transistors

C. vacuum tubes

D. punch cards

64. The first electronic digital computer was completed in the _______________.

(p. 81)

A. 1870s

B. 1940s

C. 1950s

D. 1960s

65. The _______________ generation of computers was characterized by further


(p. 82)miniaturization of circuits, increased multiprogramming, and virtual storage memory.

A. second

B. third

C. fourth

D. fifth

66. _______________ are the most important category of computer systems for both

(p. 83)businesspeople and individual consumers.

A. Microcomputers

B. Supercomputers

C. Network Servers

D. Mainframes

67. According to the text, which of the following is considered by millions of computer
(p. 83)users to be the primary function of the desktop PC?

A. Allows access to the Internet

B. Increases productivity through the use of software applications


C. Facilitates creation of local area networks

D. All of the choices are correct

68. Which of the following statements best describes a workstation computer?

(p. 83)

A. Supports applications with heavy mathematical computing and graphics display


demands, such as computer-aided design (CAD)

B. Coordinates telecommunications and resource sharing in small, local area


networks (LANS)

C. Allows convenient mobile communications and touch-screen computing

D. All of the choices are correct.

69. __________ are some of the more powerful microcomputers; they are used to
(p. 83)coordinate telecommunications and resource sharing in small LANs and in Internet
and intranet websites.

A. Mainframes

B. Supercomputers

C. Network Servers

D. None of the choices are correct.


70. According to the text, using web-enabled PDAs allows workers to realize all the
(p. 86)following benefits except:

A. Send and receive email

B. Access the Web

C. Exchange information with desktop PCs or Web servers

D. Helps retain younger and more technologically savvy employees

71. An intelligent terminal that can perform data entry and some information processing
(p. 86)tasks independently is called a _______________ terminal.

A. transaction

B. dumb

C. Windows

D. remote

72. Which of the following does not apply to a personal digital assistant (PDA)?

(p. 86)

A. Supports applications with heavy mathematical computing

B. Touchscreens
C. Pen-based handwriting recognition

D. Web access

73. Personal digital assistants most commonly use which of these technologies?

(p. 86)

A. Pen-based computing

B. Optical scanning

C. Jump drives

D. Back-lit keyboards

74. What sets the RIM BlackBerry apart from other wireless PDA solutions?

(p. 86)

A. Lower price

B. It is always on and connected

C. Smaller size and weight

D. Longer battery life

75. A BlackBerry ____________________.


(p. 86)

A. performs common PDA functions


B. doesn't have a visible antenna

C. uses the same network as most mobile phones

D. All of the choices are correct.

76. _______________ are high-end network servers that handle large-scale processing of
(p. 88)business applications.

A. Midrange computers

B. Mainframes

C. Supercomputers

D. All of the choices are correct.

77. _______________ are popular as powerful network servers to help manage large

(p. 88)Internet Websites, intranets, and extranets.

A. Workstations

B. Minicomputers

C. Supercomputers

D. Mainframes
78. Which of the following is a common application for a midrange computer?
(p. 88)

A. Internet functions.

B. Integrated enterprise-wide manufacturing and distribution.

C. Financial applications.

D. All of the choices are correct.

79. According to the text, which of the following is not true of Mainframes?
(p. 89)

A. Mainframes can process thousands of million instructions per second (MIPS).

B. Mainframes are large, fast, and powerful.

C. Mainframes have large storage capacities.

D. All of the choices are correct.

80. Which of the following would not be considered a characteristic of supercomputer


(p. 90)systems?

A. Costs between $5 million and $50 million.

B. Used for global weather reports and military defense.


C. Runs the same software found on most home computers, but at faster speeds

D. Designed specifically for high-speed numeric computation

81. The function of an input device is:

(p. 93)

A. to interpret computer program instructions

B. to transmit directions to other components of the computer system

C. to convert data into electronic form for entry into a computer system

D. none of the above

82. The central processing unit (CPU):

(p. 93)

A. is the main processing component of a computer system

B. controls all the peripheral devices of a computer system

C. is controlled by the RAID unit

D. is also called a Fuzzy Logic unit

83. The output devices of a computer system include:


(p. 93)

A. printers and video displays


B. the Arithmetic-logic unit

C. scanners and RAID units

D. the Fuzzy Logic unit

84. The central processing unit (CPU) consists of:


(p. 93)

A. the Control unit and the RAID unit

B. Arithmetic-logic unit and the RAID unit

C. the RAID unit and the Fuzzy Logic unit

D. the Control unit and the Arithmetic-logic unit

85. Which of the following would perform the required mathematical and logic operations

(p. 93)of a central processing unit (CPU)?

A. Control unit

B. Arithmetic-logic unit

C. RAID unit

D. Fuzzy logic unit


86. The function of an output device is to:
(p. 93)

A. Convert data into an electronic machine-readable form for direct entry into a

computer system

B. Perform the arithmetic and logic functions required in computer processing

C. Convert electronic information produced by the computer system into human-


intelligible form for presentation to end-users

D. Store the data and program instructions needed for processing

87. Which of the following is a secondary storage device?

(p. 93)

A. Primary memory

B. Random access memory

C. Magnetic disk

D. The CPU

88. According to Moore's Law, _______________ doubles every 18 to 24 months.

(p. 94)

A. computing power

B. computer prices
C. computer storage capacity

D. the number of functioning computers

89. Which of the following would not fit the typical classification of a computer peripheral?

(p. 97)

A. Monitors and printers

B. Scanners and hard disk drives

C. CD-ROM drives and backup systems

D. Central processing unit

90. Offline devices:

(p. 97)

A. are directly attached to the CPU

B. are not controlled by the CPU

C. are controlled by the CPU

D. can replace the CPU

91. The most popular pointing device used today is the _______________.
(p. 97)

A. pointing stick
B. light pen

C. trackball

D. electronic mouse

92. All of the following relate to Peripherals except:


(p. 97)

A. input devices

B. output devices

C. CPU devices

D. secondary storage devices

93. One device used as an input device in a computer system is a pointing stick, which is

(p. 97)best described as:

A. A small gearshift lever set in a box

B. A stationary device containing a roller ball whose top is exposed outside its case

C. A pen-shaped device with a ballpoint at the end

D. A small, button-like device, sometimes likened to the eraser head of a pencil


94. A touchpad is best described as a:
(p. 97)

A. Small, rectangular, touch-sensitive surface usually placed below the keyboard

B. Stationary device containing a roller ball whose top is exposed outside its case

C. Pen-shaped device with a ballpoint at the end

D. Device rolled along the desktop in order to move the cursor on the screen

95. Continuous speech recognition systems:

(p. 101)

A. Compare speech patterns to a dictionary

B. Allow a computer to understand a few words from a voice it has never heard

before

C. Require users to pause between each spoken word

D. Recognize conversationally paced speech

96. Speech recognition devices in work situations allow operators to perform all the
(p. 101)following except:

A. Enter data without using their hands.

B. Input data faster.


C. input data more accurately.

D. Input data without using a computer.

97. Speaker independent voice recognition systems:

(p. 102)

A. Compare speech patterns to a dictionary

B. Allow a computer to understand a few words from a voice it has never heard
before

C. Require users to pause between each spoken word

D. All of the choices are correct.

98. Which of the following best describes optical scanning devices?


(p. 103-
104)
A. Hand-held wands used to read data on merchandise tags

B. Photoelectric devices that scan data

C. Converts reflected light patterns into electronic impulses, which are accepted as
input into the computer system

D. All of the choices are correct.

99. Which of the following best describes magnetic stripe technology?


(p. 105)

A. A form of data entry that helps computers read credit cards

B. A form of computing where debit and credit cards have an embedded


microprocessor chip

C. Technology that enables users to download full-motion video into a computer


system

D. Technology commonly used in banks in order to magnetically read checks and


deposit slips

100. The dark, magnetic stripe on the back of credit cards can hold about

(p. 105)_______________ of information.

A. 200 gigabytes

B. 200 kilobytes

C. 200 bytes

D. Immaterial, as this technology is not yet available in the United States

101. Smart card technology:


(p. 105)

A. Allows debit cards to store a cash balance on a card and electronically transfer

some of it to others to pay for items and services


B. Is not yet available in the United States

C. Is commonly used by banks to read and process checks

D. All of the choices are correct.

102. Banks use _______________ technologies for check processing.


(p. 105)

A. voice response

B. magnetic ink character recognition

C. laser printer

D. optical scanner

103. The most common output trend is _______________.

(p. 106)

A. printed reports and documents

B. audio responses

C. voice responses

D. video displays

104. Which of the following is not a valid storage medium?


(p. 107-
108)
A. Paper documents

B. Optical disks

C. Magnetic tape

D. All of the choices are valid storage media.

105. High speed storage media _______________ than lower-speed storage media.
(p. 107-
108)
A. cost less per byte and provide higher capacities

B. cost less per byte and provide lower capacities

C. cost more per byte and provide higher capacities

D. cost more per byte and provide lower capacities

106. _______________ bytes of storage are needed to represent the name "Sarah."

(p. 108)

A. Two

B. Three

C. Five

D. Ten
107. Data are processed and stored in a computer system through the presence or

(p. 108)absence of electronic or magnetic signals to the computer. This is called a


_______________ representation of data, because the computer and the media can
exhibit only two states or conditions.

A. Ternary

B. Trinary

C. Binary

D. Bipolar

108. Data are processed and stored in a computer system through the presence or
(p. 108)absence of electronic or magnetic signals to the computer. This is called a "binary"
representation of data, because the computer and the media can exhibit only
_______________ states or conditions.

A. two

B. three

C. five

D. ten
109. A bit, the smallest element of data, can have values of:
(p. 108)

A. 0 or 1

B. 0, 1, or 8

C. 0 through 7

D. 0 through 8

110. A gigabyte (GB) is used to express which of the following approximate measures?

(p. 108)

A. 1,000 byes of storage

B. 1,000,000 bytes of storage

C. 1,000,000,000 bytes of storage

D. 1,000,000,000,000 bytes of storage

111. Which of the following is an advantage of RAID?


(p. 109)

A. It provides virtually unlimited online storage

B. It provides high access speeds

C. It provides fault-tolerant storage capacity


D. All of the choices are advantages.

112. The primary storage (main memory) of a computer is also called:

(p. 110)

A. ROM

B. RAID

C. RAM

D. None of the choices are correct.

113. Which of the following storage types is volatile?

(p. 110)

A. RAM

B. ROM

C. PROM

D. All the choices are volatile.

114. Which of the following applies best to CD-RW optical disk technology?
(p. 114)

A. Users are unable to record their own data on the disks

B. Users can record their own data, but only once


C. Users are able to record and then erase the disks

D. None of the choices are correct.

115. Which of the following statements about optical disks is true?

(p. 114)

A. They can be read only, recordable, or rewritable

B. They can hold approximately 50 megabytes on a single disk

C. They have totally replaced "3.5" diskettes

D. They have totally replaced magnetic tape as secondary storage

116. According to the text, what are the current types of RFID chips?
(p. 115-
117)
A. Electrical and magnetic

B. Positive and negative

C. Active and passive

D. Red and Green

Fill in the Blank Question


117. The word calculate is derived from calculus, the Latin word for _______________.
(p. 78)
small stone

118. A computer that uses vacuum tube technology is called a __________-generation

(p. 81)computer.

first

119. The principal drawback of the Electronic Numerical Integrator and Computer (ENIAC)
(p. 81)was its __________ and processing ability.

size

120. In the 1950s, _______________ replaced the vacuum tubes used in electronic

(p. 81)computers.

transistors

121. Industry experts predict that the emergence of network computers and
(p. 83)_______________ appliances for applications on the Internet and corporate intranets
will replace many personal computers.

information
122. _______________ are the most important category of computer systems for both
(p. 83)business people and individual consumers.

Microcomputers

123. A _______________ server is a powerful microcomputer that is used to coordinate

(p. 83)telecommunications and resource sharing in small local area networks (LANs) and
Internet and intranet web sites.

network

124. The _______________ is a recent entrant into PDA technology that enables the user to
(p. 86)manage information, such as appointments, to-do lists, and sales contracts. It also
allows them to receive E-mail, access the Web, and exchange such information with a

desktop PC or network server.

BlackBerry

125. The most recent entries to the information appliance and PDA market, from Apple, are
(p. 86)________________________________.

the iPhone and the iPad

126. _______________ systems include high-end network servers that handle large-scale
(p. 87-processing of many business applications.
88)
Midrange

127. A special type of parallel computing that relies on complete computers connected to a

(p. 92)network by a conventional network interface is called _______________.

Distributed or Grid Computing

128. _______________ computers continue to handle the information processing needs of

(p. 89)major corporations and governmental agencies with high transaction processing
volumes or complex computational problems.

Mainframe

129. A _______________ is an extremely powerful mainframe computer system, which is


(p. 90)specifically designed for high-speed numeric computations and is used by government
research agencies and national weather forecasting agencies.

supercomputer

130. A computer is a system, an interrelated combination of components that perform the


(p. 93)basic system functions of _______________, processing, output, storage, and control.

input

131. The _______________ is the main processing component of a computer system.


(p. 93)
central processing unit (CPU)

132. The _______________ devices of a computer system include video display units,
(p. 93)printers, audio response units, and so on.

output

133. A computer is a _______________, an interrelated combination of components that


(p. 92)performs the basic system functions of input, processing, output, storage, and control.

system

134. The central processing unit (CPU) of a computer system is divided into two major
(p. 93)subunits: the arithmetic-logic unit and the _______________ unit.

control

135. Computers today operate in the nanosecond range, which is one _______________ of
(p. 94)a second.

billionth

136. Most computers today can process program instructions in MIPS, which is
(p. 94)____________________.
millions of instructions per second

137. Moore's Law states that the number of transistors on an integrated circuit will
(p. 94)__________ every _______________.

double; 18-24 months

138. A _______________ user interface presents a user with icons, bars, buttons, boxes,
(p. 97)and other images to initiate computer-based tasks.

graphical

139. An electronic _______________ is a pointing device that is used to move the cursor on
(p. 97)the screen, as well as to issue commands and make icon and menu selections. It is
the most popular pointing device used today.

mouse

140. A _______________ is a stationary pointing device. You turn a roller with only its top
(p. 97)exposed outside its case to move the cursor on the screen.

trackball

141. According to the text, the __________ is one of several commercial devices that takes
(p. 126)the human-computer interface to a new level.

iPhone

142. A _______________ allows users to use a computer by touching the surface of its

(p. 100)video display screen.

touch screen

143. Computing technology that can be used to draw or write on a pressure-sensitive


(p. 101)graphics table is called _______________-based technology.

pen

144. When using _______________ speech recognition, software recognizes continuous,

(p. 101)conversationally paced speech.

continuous

145. Optical _______________ devices read text or graphics and then convert them into
(p. 103)digital input for your computer.

scanning

146. OCR stands for ____________________.


(p. 103)
optical character recognition

147. _______________ technology is a form of input technology commonly used by banks


(p. 105)on their ATM cards.

Magnetic stripe

148. _______________ cards are a form of input technology. These cards have an
(p. 105)embedded microprocessor chip and several kilobytes of memory.

Smart

149. _______________ ink allows the computer systems of the banking industry to read
(p. 105)checks and deposit slips.

Magnetic

150. Use of _______________ panel video monitors for desktop systems has become more
(p. 106)common as their cost has become more affordable.

flat

151. The capacity of memory chips is usually expressed in terms of bytes. A


(p. 108)_______________ is a basic grouping of bits that the computer operates as a single
unit.

byte

152. The storage capacities in computer systems are frequently measured in kilobytes

(p. 109)(KB), megabytes (MB), _______________ (GB), or terabytes (TB).

gigabytes

153. There are two basic types of semiconductor memory: Read Only Memory (ROM) and
(p. 110-_______________.
111)
Random Access Memory (RAM)

154. A _______________ drive is a new, innovative form of storage that uses

(p. 111)semiconductor memory and transistors that can be programmed to store data for
virtually unlimited periods without power.

flash or jump

155. Floppy disks consists of a polyester film disk covered with an _______________
(p. 112)compound.

iron oxide
156. The primary advantage of CD-RW disks over CD-ROM and CD-R disks is that they
(p. 114)can be recorded and _______________ many times.

erased

157. RFID stands for ____________________.

(p. 115)
radio frequency identification
Chapter 04 Computer Software Answer Key

True / False Questions

1. Software is considered the variable part of the computer, whereas the hardware is considered the
(p. 130)
invariable part.

TRUE

2. Unlike hardware, which has several categories, software has only one category—computer
(p. 130)
applications.

FALSE

There are two general types of software; application software and system software.

3. General purpose application programs perform common information processing jobs for end users.
(p. 130)

TRUE

4. COTS software is custom, off-the-shelf software that is purchased and then modified to meet the
(p. 130)
needs of the customer.

FALSE

COTS iscommercial, off-the-shelf software, and COTS software cannot be customized.


5. The specifications and functionality of custom software are controlled or retained by the developing
(p. 132-
organization.
133)

TRUE

6. System software are programs that manage and support the operation of computer systems and
(p. 133)
networks.

TRUE

7. An accounting program is an example of application-specific software.


(p. 133)

TRUE

8. According to the text, operating systems are a type of general purpose application program.
(p. 133)

FALSE

An operating system is a system management program.

9. One of the biggest advantages offered by software suites is that all the programs within the suite use
(p. 135)
a similar graphical user interface (GUI). This gives them the same look and feel, and makes them
easier to learn and use.

TRUE
10. Although Microsoft Office has a large share of the software suite market, Lotus, Corel, and Sun all
(p. 135)
offer competing productivity suites.

TRUE

11. Web browsers are the key software interface used to point and click through the hyperlinked
(p. 136)
resources of the Internet, as well as corporate intranets and extranets.

TRUE

12. Web browsers are becoming the universal software platform from which end users launch into
(p. 136)
information searches, multimedia file transfer, discussion groups, and many other Internet, intranet,
and extranet applications.

TRUE

13. Instant messaging is quite popular in today's society, outside of the workplace. It is not yet being
(p. 137)
used in the business environment.

FALSE

Instant messaging is also being used by business professionals, who use it to communicate and
collaborate in real time.
14. A weblog is a website on which a company advertises its products in a very brief, yet commercial
(p. 137)
way.

FALSE

A weblog is a website of personal or noncommercial origin.

15. Blogs are online diaries from a particular point of view. They are personal in origin, not commercial.
(p. 137-
138)
FALSE

Blogs can be personal or commercial in origin.

16. Some powerful word processing packages have built-in capabilities that end users can use to
(p. 138)
convert documents to HTML format for publication as web pages.

TRUE

17. When a spreadsheet is used to answer "what if" questions, the user must reenter the values and
(p. 139-
formulas into the cells in order to see the impact of the changes.
140)

FALSE

To answer "what if" questions, one must only change a selected variable to see the impact of the
changes. It is not necessary to reenter all the data.
18. Presentation graphics packages help end users design and manage computer-generated slide
(p. 140)
shows that can contain text, graphics, and multimedia displays.

TRUE

19. Presentation graphics packages have gotten more powerful in recent years, but not even the top-
(p. 140)
end packages enable end users to publish to the World Wide Web.

FALSE

Top-end presentation graphics packages allow graphics and multimedia presentations to be


transferred in HTML format to websites on corporate intranets or the World Wide Web.

20. A personal information manager helps users store, organize, and retrieve information about
(p. 141)
customers and prospects, and schedule and manage appointments.

TRUE

21. Web sites built with collaborative development tools can integrate a wide variety of individual
(p. 143)
applications in order to increase team productivity. However, they do little to improve individual
productivity.

FALSE

Websites built with collaborative development tools can help increase both individual and team
productivity.
22. A number of large and fast-growing companies are turning to application service providers instead of
(p. 143)
developing or purchasing the application software they need to run their businesses.

TRUE

23. Application service providers rely on the Internet to provide their services to customers.
(p. 143)

TRUE

24. A company without enterprise resource planning expertise can call upon an application service
(p. 143)
provider to deliver, support, and maintain an ERP for a fixed monthly fee.

TRUE

25. One key disadvantage of an application service provider is that a "pay as you go" structure is often
(p. 143)
more expensive than what a company would pay if it had purchased the software outright.

FALSE

Companies can save millions of dollars by using a "pay as you go" structure because they do not
have to purchase the platform infrastructure and upgrade hardware before rolling out software.

26. Regardless of whether a software application is purchased off the shelf or is accessed via an ASP, it
(p. 145)
must be licensed for use.

TRUE
27. Software licensing is a complex topic that involves considerations of the special characteristics of
(p. 145-
software in the context of the underlying intellectual property, including copyright, trademark, and
146)
trade secrets.

TRUE

28. Contrary to what many believe, when an individual or a company buys a software application, they
(p. 146)
have actually purchased the rights of ownership.

FALSE

When an individual or company buys a software application, they have not purchased the rights of

ownership.

29. As a software purchaser, the license you agree to typically prohibits reverse engineering or
(p. 146)
modifying the software.

TRUE

30. Purchasing an operating system is an unnecessary expense because off-the-shelf application


(p. 147)
software packages contain a built-in operating system.

FALSE

The computer must contain an operating system in order to execute application software packages.
31. Linux is considered an opensource operating system because it offers unrestricted access to its
(p. 153)
source code.

TRUE

32. An advantage of open source software is that programmers can read and modify the source code,
(p. 153)
so they can improve it, adapt it, and fix bugs.

TRUE

33. Utility programs are used to perform miscellaneous housekeeping and file conversion functions,
(p. 156)
including data backup, data recovery, virus protection, data compression, and file defragmentation.

TRUE

34. Performance monitor programs are designed to monitor the performance and usage of computer
(p. 157)
systems in order to achieve system and data security.

FALSE

Performance monitor programs are designed to monitor the performance and usage of computer
systems in order to achieve maximum efficiency.
35. Performance monitor programs are designed to monitor and control the use of computer systems,
(p. 157)
provide warning messages, and record evidence of unauthorized use of computer resources.

FALSE

Security monitor programs monitor and control the use of computer systems, provide warning
messages, and record evidence of unauthorized use of computer resources.

36. Machine languages are high-level languages whose instructions closely resemble human language
(p. 157-
or the standard notation of mathematics.
158)

FALSE

Machine languages are low level languages that use binary code instructions.

37. When high-level programming languages are used, programmers must learn a different language for
(p. 158)
each type of computer that uses the program.

FALSE

High-level languages are machine-independent.

38. Most fourth-generation programming languages encourage programmers and users to specify the
(p. 159)
results they want, while the computer determines the sequence of instructions that will accomplish
those results.

TRUE
39. A key characteristic of object-oriented programming languages is that they separate the data
(p. 160)
elements from the procedures or actions that will be performed upon that data.

FALSE

Although most other programming languages separate data elements from the procedures or
actions that will be performed upon them, object-oriented languages tie them together into objects.

40. When programming in an object-oriented language, an example of an object would be a set of data
(p. 160)
about a customer's account and the operations that are performed on the data.

TRUE

41. Of the different programming languages, third-generation COBOL is the most widely used today.
(p. 161)

FALSE

Object-oriented languages are the most widely used programming languages because they are
efficient and easier to use.

42. HTML, XML, and COBOL are all popular programming languages for building multimedia web
(p. 161)
pages, websites, and web-based applications.

FALSE

COBOL is not used for building multimedia web pages, websites, or web-based applications.
43. Extensible Markup Language (XML) classifies data in such a way that it makes website information
(p. 162)
easier to search, sort, and analyze.

TRUE

44. XML-enabled search software can easily find the exact product you specify if the product data at a
(p. 162)
website is labeled with identifying HTML tags.

FALSE

XML-enabled search software can easily find the exact product you specify if the product data at a
website is labeled with identifying XML tags.

45. The ease of creating Java applets and distributing them from network servers to client PCs and
(p. 164)
network computers is one of the major reasons for Java's popularity.

TRUE

46. Microsoft's .NET is a relatively new collection of programming support for what are known as Web
(p. 164)
services, the ability to use the Web without limit.

FALSE

Microsoft's .NET is a relatively new collection of programming support for what are known as Web
services, the ability to use the Web rather than your own computer for various services.
47. Web services can link key business functions for the exchange of data in real time within the Web-
(p. 165)
based applications a business might share with its customers, suppliers, and other business

partners.

TRUE

48. A language compiler translates computer programs written in another programming language into
(p. 167)
the computer's own machine language instruction codes.

FALSE

A language translator translates computer programs written in another programming language into

the computer's own machine language instruction codes.

49. In programming packages, a compiler is used to translate high-level language statements into
(p. 167)
machine language instructions.

TRUE

50. Software developers can use CASE tools at different stages of the software development
(p. 168)
processes.

TRUE
51. Open source software is typically not encumbered by licensing restrictions.
(p. 153)

FALSE

Open source software is typically provided under a license.

52. Whatever a person builds using open-source software, he or she must provide the same capabilities
(p. 154)
to anyone else under the same open-source license terms.

TRUE
Multiple Choice Questions

53. Which of the following is true of off-the-shelf software?


(p. 130)

A. It is developed with the intent to sell multiple copies

B. The company buying the software has no control over the specifications, schedule, or evolution of
the software

C. The company that develops the software is not the intended audience

D. All of the choices are correct.

54. Software is considered the _______________ part of the computer, whereas the hardware is
(p. 130)
considered the _______________ part.

A. expensive, inexpensive

B. inexpensive, expensive

C. variable, invariable

D. invariable, variable

55. The two general classifications of software are:


(p. 130)

A. Systems and application

B. Programming and CASE

C. Commercial and custom

D. Programming languages and development tools


56. _______________ application programs perform common information processing jobs for end users.
(p. 130)

A. Systems

B. CASE

C. Commercial

D. General purpose

57. _______________ software are programs that manage and support the operation of computer
(p. 133)
systems and networks.

A. System

B. CASE

C. Commercial

D. General purpose

58. An accounting program is an example of _______________ software.


(p. 133)

A. System

B. CASE

C. Application-specific

D. General purpose
59. According to the text, operating systems are a type of _______________ program.
(p. 133)

A. CASE

B. System management

C. Application-specific

D. General purpose

60. Application software can be subdivided into two categories:


(p. 130)

A. COTS and POTS

B. First generation and second generation

C. Custom and commercial

D. General purpose and function specific

61. COTS software stands for:


(p. 130)

A. Custom off-the-shelf software

B. Commercial off-the-shelf software

C. Combined off-the-shelf software

D. Contaminated on-the-surface software


62. According to the Real World Case, GE spends $150 million each year to purchase all of its desktop
(p. 131)
and laptop computers from how many vendors?

A. Two

B. One

C. Ten

D. Nobody is certain

63. According to the Real World Case, GE spends $150 million each year to purchase all of its desktop
(p. 131)
and laptop computers from which vendor?

A. Dell

B. Hewlett-Packard

C. Gateway

D. None of the above

64. According to the Real World Case, GE's Global Supplier Library lacked which of the following?
(p. 131)

A. A central repository

B. Multi-language capabilities

C. Self-management of data

D. All the above


65. According to the Real World Case, which of the following is a problem with SaaS?
(p. 131-
132)

A. SaaS is open-source software.

B. GE owns the software and is responsible for making it work daily.

C. GE does not own the software, it's on lease. If the vendor goes bankrupt, everything shuts down.

D. SaaS refuses to license its software to GE.

66. Which of the following are considered application software packages?


(p. 133)

A. Word processing programs

B. Operating systems

C. System utilities

D. System development programs

67. Which of the following are considered general purpose application software packages?
(p. 133)

A. Education and entertainment

B. Electronic mail

C. System utilities

D. Programming languages
68. Which of the following are considered application specific software packages?
(p. 133)

A. Education and entertainment

B. Electronic mail

C. System utilities

D. Programming languages

69. Which of the following is not considered a system management software packages?
(p. 133)

A. Database management

B. CASE tools

C. System utilities

D. Application servers

70. According to the text, which of the following describes system software?
(p. 133)

A. Used for developing new systems as required for business purposes

B. Performs information processing tasks for end users

C. Allows anyone to contribute to the development of a specific application

D. Manages and supports operations of computer systems and networks


71. According to the text, function-specific application software does which of the following?
(p. 134)

A. It supports specific applications of end users in business and other fields

B. Provides CASE tools for developing new applications

C. Allows anyone to contribute to the development of a specific application

D. Manages and supports operations of computer systems and networks

72. One of the biggest advantages offered by software suites is that:


(p. 135)

A. All the programs within the suite use a similar graphical user interface (GUI)

B. The packages take up a lot of disk space

C. There is a custom graphical user interface for each application in the suite

D. They cost more than the total cost of buying the individual packages separately

73. Which of the following statements is not a characteristic of software suites?


(p. 135)

A. They contain software tools that can help increase productivity, collaborate with colleagues, and

access intranets, extranets, and the Internet

B. All components of the software use a similar graphical user interface

C. There is a custom graphical user interface for each application in the suite

D. They cost less than the total cost of buying the individual packages separately
74. Which of the following software suites is an open-source product?
(p. 135)

A. Microsoft Office

B. Lotus Smartsuite

C. WordPerfect Office

D. OpenOffice

75. One disadvantage of software suites is that:


(p. 135)

A. Users may be paying for features that they never use

B. The packages take up a lot of disk space

C. Upgrade costs are often expensive

D. All of the choices are correct.

76. Which of the following, according to the text, are the basic components found in a comprehensive
(p. 135)
software suite?

A. Word processing, spreadsheet, and accounting

B. Word processing, spreadsheet, and email

C. Word processing, spreadsheet, database manager, and presentation graphics

D. Word processing, database manager, presentation graphics, and email


77. According to the text, the most important software component for many computer users today is the
(p. 136)
once simple and limited, but now powerful and feature rich, _______________.

A. word processing application

B. presentation graphics package

C. web browser

D. database management system

78. According to the text, Web browsers are sometimes called the _______________.
(p. 136)

A. HTML client

B. communication tool of the future

C. universal client

D. online collaboration client

79. According to the text, which of the following is true of integrated packages?
(p. 136)

A. They have more features than software suites

B. They are more powerful than software suites

C. They are cheaper than software suites

D. They require more disk space than software suites


80. According to the text, which of the following is not true of integrated packages?
(p. 136)

A. They require less disk space than software suites

B. They have fewer features than software suites

C. They are more powerful than software suites

D. They are cheaper than software suites

81. According to the text, experts predict the Web browser will be the model for:
(p. 137)

A. Internet development tools for the future

B. How most people use networked computers in the future

C. New graphical user interfaces in the future

D. Cloud computing

82. According to the text, e-mail:


(p. 137)

A. Is a fad that will soon disappear

B. Will be replaced by instant messaging

C. Works best in cloud computing

D. Has changed the way people work and communicate


83. All of these statements regarding web logs or blogs are false except:
(p. 137)

A. Blogs are websites of personal origin, not commercial.

B. Each blog is a developing commentary on a particular theme that uses a dated log format.

C. Blogs are declining in popularity because they are difficult to update.

D. The information on a blog can only be written by the site owner.

84. All of the following are considered characteristics of a word processing package except:
(p. 138-
139)

A. Spell checker and thesaurus

B. Grammar and punctuation correction

C. Instant messaging

D. Web page design capability

85. All of the following are considered characteristics of a desktop publishing package except:
(p. 139)

A. Used to print newsletters and brochures

B. Imports text and graphic files from other programs

C. Used for business analysis and modeling

D. Used to print books and manuals


86. According to the text, spreadsheet packages are used by virtually every business for
(p. 139)
_______________.

A. analysis, planning, and modeling

B. maintaining accounting records, such as a general ledger

C. keeping up-to-the-minute inventory records

D. tracking human resources

87. When using a spreadsheet package to answer "what if" questions, the user must change:
(p. 139)

A. Only a selected variable to see the impact of that change

B. A number of variables to make a single change to the spreadsheet output

C. All the formulas in order to calculate new values

D. Nothing - spreadsheets cannot be used to answer "what if" questions

88. Which one of the following would typically not be accomplished with presentation graphics
(p. 140)
software?

A. Converting numerical data into graphics and displays

B. Incorporating multimedia files into presentations

C. Preparing a computerized slideshow to accompany an oral presentation

D. Preparing a text report for management


89. Presentation graphics have become more powerful in recent years and can now:
(p. 140)

A. Calculate formulas for business planning

B. Enable collaboration within teams

C. Organize appointments and calendars

D. Prepare graphics and presentations for transfer to Web sites in HTML format

90. Groupware aids collaboration by providing users with _______________.


(p. 141)

A. electronic mail, scheduling, and task management

B. electronic mail and spreadsheet software

C. electronic mail and word processing software

D. All of the choices are correct.

91. Groupware is best described as a(n) _______________ program.


(p. 141)

A. general purpose application

B. application specific

C. system management

D. system development
92. Cloud computing is best described as:
(p. 145)

A. Grid computing

B. A style of computing where applications are provided by unknown sources "hidden in the clouds"

C. A style of computing where resources are provided as a service over the Internet

D. A style of computing where a network is not connected to the Internet

93. Cloud computing is not:


(p. 145)

A. Grid computing

B. A style of computing users need not have knowledge, expertise, or control over the technological
infrastructure

C. A style of computing where resources are provided as a service over the Internet

D. A metaphor for the Internet

94. When a company purchases software, it has:


(p. 145-
146)

A. Purchased the rights of ownership

B. Purchased a license to use the software under the terms of the agreement

C. A difficult time obtaining a license because of legality issues

D. None of the choices are correct.


95. System management programs:
(p. 147)

A. Manage the hardware, software, networking, and data resources of computer systems during the
execution of information processing jobs

B. Manage e-mail and CASE tools for both end users and developers

C. Help users develop information system programs and procedures

D. All of the choices are correct.

96. Which of the following is a basic function that an operating system performs in the operation of a
(p. 147)
computer system?

A. User interface and support services

B. Resource and task management

C. File management and utilities

D. It performs all of the functions above.

97. The user interface function of an operating system typically:


(p. 147)

A. Allows end users to communicate with it so they can load programs, access files, and accomplish
other tasks

B. Manages the hardware resources of a computer system

C. Controls the creation, deletion, and access of files of data and programs

D. Manages the accomplishment of the computing tasks of end users


98. Which of the following is the most popular type of user interface?
(p. 147)

A. Graphical

B. Command-driven

C. Menu-driven

D. Voice

99. Which statement best describes open source software?


(p. 153)

A. The primary enhancements are made by teenagers

B. It is a very insecure operating system because of its huge security holes

C. It is more reliable than traditional software because it is subject to more rigorous code review

D. It is more costly than propriety software

100. Open-source licensing is defined by all of the following except:


(p. 154)

A. The license must not discriminate against any person or group of persons

B. The license must not contaminate other software by placing restrictions on any software

distributed along with the licensed software

C. The license must allow modifications and derived works, and must allow them to be distributed
under the same terms as the license of the original software

D. The license must be specific to a product


101. According to the text, Linux' popularity is due to all the following except:
(p. 153)

A. Performance and price

B. Flexibility and reliability

C. It is Open Source software

D. All of the choices are correct.

102. Machine languages are _______________.


(p. 157)

A. first-generation programming languages

B. written using binary codes

C. difficult languages in which to program compared to more recent languages

D. All of the choices are correct.

103. The text outlines four levels of languages that allow a programmer to develop the sets of instructions
(p. 157-
that constitute a computer program. Which of the following is not one of those languages?
159)

A. Machine languages

B. Graphical languages

C. Assembler languages

D. High-level languages
104. Which of the following characteristics does a high-level language possess?
(p. 158)

A. They are also known as machine or assembler languages

B. They are designed to be utilized by specific types of computers

C. High-level instructions resemble mathematical expressions

D. They are more efficient than assembler language programs

105. Which of the following is not considered a high-level language?


(p. 158)

A. BASIC

B. COBOL

C. FORTRAN

D. Ruby on Rails

106. Fifth generation languages, which are designed to be as much as possible like spoken languages,
(p. 159)
are referred to as _______________ languages.

A. natural

B. macro

C. generator

D. syntax
107. Object-oriented programming languages:
(p. 160)

A. Are a type of assembler language

B. Separate data elements from the procedures that will be performed on them

C. Use programming statements that tell objects to perform actions on themselves

D. Are useful for numerical processing, but not for graphics-oriented applications

108. _______________ is a major benefit of object-oriented programming.


(p. 160)

A. Reusability of objects

B. Conformity of objects

C. A simplified programmer interface

D. Faster compilation time

109. All of the following are popular programming languages for developing multimedia web pages,
(p. 161)
websites, and web-based applications except:

A. XML

B. HTML

C. Java

D. COBOL
110. The acronym HTML stands for:
(p. 161)

A. High Transfer Machine Language

B. High Transmission Markup Language

C. Hypertext Markup Language

D. Hypermedia Markup Language

111. Which of the following statements is applicable to the Java programming language?
(p. 164)

A. It is a page description language that creates hypertext or hypermedia documents

B. It inserts control codes within a document that create links to other parts of the document or to
other documents anywhere on the World Wide Web

C. It embeds control codes in the ASCII text of a document, which designates titles, headings,

graphics, and multimedia components, as well as hyperlinks within the document

D. It consists of small application programs called applets that can be executed by any computer

and any operating system anywhere in a network

112. Linux, an open source product, is a _______________-like operating system that is rapidly gaining
(p. 153)
market share as a high-performance operating system for network and Web servers.

A. Unix

B. BASIC

C. COBOL

D. Windows
113. Program editors, debuggers, and code analyzers are types of _______________.
(p. 173)

A. Unix tools

B. Programming languages

C. CASE tools

D. Operating Systems

114. Those CASE tools that support activities early in the life cycle of a software project (e.g.,
(p. 173)
requirements, design support tools) are sometimes called _______________.

A. Pre-CASE tools

B. Post-CASE tools

C. Front-end or Upper CASE tools

D. Back-end or Lower CASE tools

115. Those CASE tools that are used later in the life cycle (e.g., compilers, test support tools) are
(p. 173)
sometimes called _______________.

A. Pre-CASE tools

B. Post-CASE tools

C. Front-end or Upper CASE tools

D. Back-end or Lower CASE tools


Fill in the Blank Questions

116. Because general purpose application programs, such as those for word processing and database
(p. 130)
management, significantly increase the productivity of end users, they are sometimes known as

_______________ packages.

productivity

117. COTS is an acronym for _______________ off-the-shelf software.


(p. 130)

commercial

118. Microsoft Office and Corel WordPerfect Office are examples of a combination of individual software
(p. 135)
packages that share a common graphical user interface and are designed for easy transfer of data

between applications. Collectively, this software is referred to as a software _______________.

suite
119. Because of limited functionality, _______________ packages require less disk space than software
(p. 136)
suites, even though they also offer word processing, spreadsheet, and other general-purpose

applications.

integrated

120. Browsers are sometimes called the _______________ client. That is, the software component
(p. 136)
installed on all of the networked computing and communications devices of the clients (users)
throughout an enterprise.

universal

121. _______________ allows groups of business professionals to send and receive electronic messages
(p. 137)
instantly. Thus, they can communicate and collaborate in real time in a near conversational mode.

Instant messaging or IM

122. _______________ packages have computerized the creation, editing, and printing of documents by
(p. 138)
electronically processing text data.

Word processing or desktop publishing

123. End users and organizations can use _______________ software to produce their own printed
(p. 139)
materials that look professionally published.

desktop publishing (DTP) or word processing


124. When an end user wants to analyze numerical data by applying formulas and then graphing the
(p. 139)
results, _______________ packages are the correct choice of software.

spreadsheet

125. Presentation graphics packages help users convert _______________ data into graphics displays,
(p. 140)
such as line charts, bar charts, pie charts, and other types of graphics that can help users prepare
multimedia presentations.

numeric

126. _______________ software helps end users store, organize, and retrieve information about
(p. 141)
customers, clients, and prospects. It also helps them schedule and manage appointments, meetings,
and tasks, thus enhancing productivity and collaboration.

Personal information management

127. _______________ is software used to support and enhance communication, coordination, and
(p. 141)
collaboration among networked teams and workgroups. It generally includes software tools for

electronic communications, electronic conferencing, and cooperative work management.

Groupware

128. The primary purpose of an operating system is to maximize the _______________ of a computer
(p. 147)
system by operating it in the most efficient manner.

productivity
129. _______________ software consists of programs that manage and support a computer system and its
(p. 147)
information processing activities.

System

130. An _______________ system is an integrated set of programs that supervise the processing
(p. 147)
operations of the CPU, control the input/output functions of the computer system, and provide
various support services.

operating

131. The trend in user interfaces is toward an easy-to-use, _______________ user interface, which uses
(p. 147)
icons, bars, buttons, boxes, and other images.

graphical

132. Three main types of user interfaces are __________-driven, menu-driven, and graphical.
(p. 147)

command

133. A computer equipped with _______________ memory capability can process larger programs and
(p. 150)
greater amounts of data than the capacity of its memory circuits would normally allow.

virtual
134. The component of the operating system that keeps track of the physical location of files on magnetic
(p. 150)
disks and other secondary storage devices and controls the creation, deletion, and access of files is

the ____________________ program.

file management

135. An example of _______________ is a computer that appears to perform several computing tasks in a
(p. 151)
seemingly simultaneous fashion.

multitasking

136. To be considered open-source software, the program must allow distribution in source code as well
(p. 153-
as in ____________ form.
154)

compiled

137. _______________ is software that helps diverse software applications and networked computer
(p. 157)
systems exchange data and work together more efficiently.

Middleware

138. _______________ language is considered the most basic level of programming languages and
(p. 157)
involves the difficult task of writing instructions in the form of strings of binary digits.

Machine
139. _______________ is a page description language that creates hypertext or hypermedia documents.
(p. 161)
The language is an important tool for developing multimedia web pages, websites, and web-based

applications.

Hypertext Markup Language (HTML)

140. _______________ is an object-oriented programming language defined for programming real-time,


(p. 164)
interactive web-based applications in the form of applets.

Java

141. The term _______________ is commonly used to describe the Web-based business and computing
(p. 165)
functions or services accomplished by Web services software technologies and standards.

Web services

142. The __________ language is one of the key technologies that enable Web services to make
(p. 165-
applications work between different computing platforms.
166)

XML

143. UDDI, an acronym for a Web-based technical standard, stands for ____________________.
(p. 166)

Universal Description Discovery and Integration


144. Simple Object Access Protocol (SOAP) is used to link _______________ running on different
(p. 166)
computer platforms.

applications

145. Most software development programs now include powerful graphics-oriented programming editors
(p. 167)
and _______________.

debuggers

146. At the simplest level, open source refer to software that is delivered with unrestricted access to its
(p. 153)
_______________.

source code
Chapter 05 Data Resource Management Answer Key

True / False Questions

1. Variable-length records contain a variable number of fields with fixed field lengths.
(p. 181)

FALSE

Variable-length records contain both a variable number of fields and variable field lengths.

2. When independent of any other files related to it, a single table is referred to as a compressed file.
(p. 181)

FALSE

When independent of any other files related to it, a single table is referred to as a flatfile.

3. Files are frequently classified by the application for which they are primarily used, such as a payroll
(p. 181)
file or an inventory file.

TRUE

4. A master file is an integrated collection of logically related data elements.


(p. 181)

FALSE

A database is an integrated collection of logically related data elements.


5. Databases contain data elements that describe both entities and the relationships among entities.
(p. 182)

TRUE

6. Database management packages based on the relational model can link data elements from various
(p. 184)
tables to provide information to users.

TRUE

7. The project operation is used to create a subset of the columns contained in the temporary tables
(p. 185)
created by the select and join operations.

TRUE

8. A major benefit of multidimensional databases is that they are a compact and easy-to-understand
(p. 185)
way to visualize and manipulate data elements that have many interrelationships.

TRUE

9. Multidimensional databases have become the least popular structure for analytical databases that
(p. 185)
support online analytical process (OLAP) applications, in which fast answers to complex queries are
expected.

FALSE

Multidimensional databases are the most popular database structure for OLAP applications.
10. The multidimensional database structure is considered one of the key technologies of a new
(p. 185)
generation of Web-based applications.

FALSE

The object-oriented model is one of the key technologies of a new generation of Web-based
applications.

11. A database with a network data structure can easily handle a many-to-many data relationship,
(p. 187)
whereas a hierarchical model cannot.

TRUE

12. The network model can easily handle ad hoc requests for information, whereas the hierarchical
(p. 187)
model cannot.

FALSE

Because its relationships must be specified in advance, the network model is unable to handle ad
hoc requests for information.
13. All of the relationships between the data elements in a relationally organized database need to be
(p. 187)
specified when the database is created.

FALSE

Not all of the relationships between data elements need to be specified when the database is
created. Database management software can create new tables of data relationships by using parts

of the data from existing tables.

14. Relational databases are more difficult for programmers to work with and more difficult to maintain
(p. 187)
than the hierarchical and network models.

FALSE

Because database management software can create new tables of data relationships from existing
tables, relational databases are easier for programmers to work with and maintain than the

hierarchical and network models.

15. Large organizations usually place control of enterprise-wide database development in the hands of
(p. 188)
database administrators (DBAs) and other database specialists.

TRUE

16. An active data dictionary will prevent a data entry program from using a nonstandard definition of a
(p. 189)
customer record.

TRUE
17. A data model serves as a logical framework on which to base the physical design of a database.
(p. 190)

TRUE

18. Distributed databases can reside on network servers on the World Wide Web, on corporate
(p. 193)
intranets, or on corporate extranets.

TRUE

19. A large database system is often distributed into smaller databases based on some logical
(p. 196)
relationship between the data and the location of the databases.

TRUE

20. In a distributed database system, each location gains control of its local data, but loses access to
(p. 197)
data in other locations.

FALSE

Each location has control of its local data, but all locations can access any other database in the
company.

21. One drawback to the database duplication process is that no changes can ever be made to any
(p. 197)
database other than the master. Otherwise, local changes will be overwritten during the duplication
process.

TRUE
22. Distributed databases require fewer resources when it comes to computing power and bandwidth.
(p. 197)

FALSE

Distributed databases require extra computing power and bandwidth to access multiple databases in
multiple locations.

23. In a traditional file processing approach, each business application is designed to use one or more
(p. 202)
specialized data files containing only specific types of data records.

TRUE

24. Having data in independent files makes it easier to provide end users with information for ad hoc
(p. 203)
requests.

FALSE

Having data in independent files makes it difficult to provide end users with information for ad hoc
requests.

25. In file processing systems, application programs typically contain references to the specific format of
(p. 203)
the stored data.

TRUE
26. In file processing systems, it was easy for data elements, such as stock numbers and customer
(p. 203)
addresses, to be defined differently by different end users and applications.

TRUE

27. Boolean logic was developed during the latter part of the 1900s.
(p. 207)

FALSE

Boolean logic was developed by George Boole in the mid-1800s.

28. The Internet is nothing more than the world's largest database.
(p. 207)

TRUE

29. DBMS packages play a major role in application development.


(p. 208)

TRUE
Multiple Choice Questions

30. In all information systems, data resources must be organized and structured in some logical manner,
(p. 178)
so that they can be:

A. Easily accessed

B. Processed efficiently

C. Retrieved quickly

D. All of the choices are correct.

31. From a logical point of view, a(n) _______________ is the smallest data element that can be observed
(p. 178)
and manipulated.

A. character

B. bit

C. attribute

D. byte

32. A record represents a collection of _______________ that describe an entity.


(p. 178)

A. characters

B. fields

C. files

D. attributes
33. All the fields used to describe the attributes of an entity are grouped to form a(n) _______________.
(p. 178)

A. field

B. record

C. file

D. database

34. A group of related records is a data file, or a _______________.


(p. 181)

A. field

B. record

C. table

D. database

35. Variable-length records contain:


(p. 181)

A. both a variable number of fields and variable field lengths.

B. both a variable number of fields and fixed field lengths.

C. both a fixed number of fields and variable field lengths.

D. both a fixed number of fields and fixed field lengths.


36. Fixed-length records contain:
(p. 181)

A. both a variable number of fields and variable field lengths.

B. both a variable number of fields and fixed field lengths.

C. both a fixed number of fields and variable field lengths.

D. both a fixed number of fields and fixed field lengths.

37. When independent of any other files related to it, a single table is referred to as a(n):
(p. 181)

A. Independent file

B. Flat file

C. Hierarchical file

D. Non-variable file

38. A(n) _______________ is an integrated collection of logically related data elements.


(p. 181)

A. master file

B. program base

C. database

D. integrated file
39. Databases contain data elements that describe both entities and the _______________ among
(p. 182)
entities.

A. relationships

B. disparities

C. subsets

D. applications

40. Database management packages based on the _______________ model can link data elements from
(p. 184)
various tables to provide information to users.

A. object-oriented

B. relational

C. network

D. hierarchical

41. Early mainframe DBMS packages used the _______________ structure, in which all records are
(p. 184)
dependent and arranged in multilevel structures, consisting of one root record and any number of
subordinate levels.

A. network

B. relational

C. hierarchical

D. object-oriented
42. In a(n) _______________ database structure, all of the relationships among records are one-to-many,
(p. 184)
because each data element is related to only one element above it.

A. hierarchical

B. relational

C. network

D. object-oriented

43. Which database model allows many-to-many relationships among records so that a data element
(p. 184)
can be accessed by following one of several paths?

A. Hierarchical

B. Network

C. Object-oriented

D. Relational

44. The _______________ model is the most widely used database structure today.
(p. 184)

A. network

B. object-oriented

C. relational

D. hierarchical
45. In the relational database model, all data elements within the database are viewed as being stored in
(p. 184)
the form of simple two-dimensional tables, sometimes referred to as _______________.

A. records

B. rows

C. columns

D. relations

46. The tables in a relational database are flat files which have rows and columns. Each row represents
(p. 184)
a _______________ in the file.

A. field

B. record

C. file

D. relation

47. The tables in a relational database are flat files which have rows and columns. Each column
(p. 184)
represents a _______________ in the file.

A. field

B. record

C. file

D. relation
48. The _______________ operation is used to create a subset of the columns contained in the temporary
(p. 185)
tables created by the select and join operations.

A. link

B. relate

C. project

D. merge

49. Using a relational database, a user can temporarily combine two or more tables so that he/she can
(p. 185)
see relevant data in a form that looks like it is in one big table. This is the _______________
operation.

A. join

B. link

C. merge

D. select

50. _______________ is the most commonly used database application for the PC.
(p. 185)

A. Oracle 10g

B. Microsoft Access

C. DB2

D. SQL Server
51. _______________ databases have become the most popular structure for analytical databases that
(p. 185)
support online analytical process (OLAP) applications, in which fast answers to complex queries are

expected.

A. Relational

B. Object-oriented

C. Inter-relational

D. Multidimensional

52. The _______________ database structure is considered one of the key technologies of a new
(p. 185)
generation of Web-based applications.

A. hierarchical

B. relational

C. object-oriented

D. multidimensional

53. The object-oriented database model supports _______________. That is, new objects can be
(p. 185)
automatically created by replicating some or all of the characteristics of one or more parent objects.

A. inheritance

B. morphing

C. duplication

D. cloning
54. Object technology allows designers to do all of the following except:
(p. 185)

A. Develop product designs

B. Replicate product designs and then modify them to create new product designs

C. Save designs as objects in an object-oriented database

D. Substantially reduce the file size of designs

55. Which database structure works effectively with complex data types, such as video clips, audio
(p. 187)
segments, and other subsets of Web pages, and is considered one of the key technologies of Web-

based applications?

A. Hierarchical

B. Network

C. Object-oriented

D. Relational

56. A database with a(n) _______________ data structure can easily handle a many-to-many data
(p. 187)
relationship.

A. hierarchical

B. network

C. relational

D. object-oriented
57. A database with a(n) _______________ data structure can easily handle ad hoc requests for
(p. 187)
information.

A. hierarchical

B. network

C. relational

D. object-oriented

58. According to one database pioneer, the future development of databases and data warehouses will
(p. 188)
depend on _______________.

A. rows

B. columns

C. transaction

D. All of the choices are correct.

59. Large organizations usually place control of enterprise-wide database development in the hands of
(p. 188)
_______________.

A. Database administrators (DBAs)

B. Automated CASE tools

C. End users

D. All of the choices are correct.


60. According to the text, most data warehouses will run _______________ in a column format.
(p. 188)

A. 20 times faster

B. 50 times faster

C. 50 times slower

D. None of the choices are correct.

61. Database administrators and database design analysts work with end users and systems analysts to
(p. 189)
do all of the following except:

A. Model business processes and the data they require

B. Determine what data definitions should be included in the database

C. Determine what structure or relationships should exist among the data elements

D. Enter live data into the system until it has proven to be reliable

62. _______________ are used to model the relationships among the many entities involved in business
(p. 189)
processes.

A. Entity-relationship diagrams

B. Data-flow diagrams

C. Schema diagrams

D. Subschema diagrams
63. The physical design stage of database development:
(p. 190)

A. Develops a model of business processes

B. Translates conceptual models into the data models

C. Determines the data storage structures and access methods

D. Defines the information needs of end users in a business process

64. The _______________ stage of database development translates the conceptual models into the data
(p. 190)
model of a DBMS.

A. data planning

B. requirements specification

C. conceptual design

D. logical design

65. A _______________ is an overall logical view of the relationships among the data elements in a
(p. 190)
database.

A. schema

B. subschema

C. logical data model

D. conceptual design
66. A _______________ is an overall logical view of the relationships needed to support specific end-user
(p. 191)
application programs that will access the database.

A. schema

B. subschema

C. logical data model

D. conceptual design

67. According to the textbook case, the innovation of the open-source product Hadoop is
(p. 192)
_______________.

A. that it has not been sued by Google

B. that it actually works

C. that it has no proprietary predecessor

D. its algorithms run contrary to contemporary mathematics

68. According to the textbook case, file processing in Hadoop is not halted by hardware failures because
(p. 192)
_______________.

A. Hadoop is a software product

B. Open-source products are not affected by hardware failures

C. Hadoop is an Internet product and does not need hardware

D. Hadoop keeps three (3) copies of all data


69. Operational databases store the detailed data needed to support the business processes and
(p. 193)
operations of a company. They are also called _______________.

A. Subject area databases

B. Transaction databases

C. Production databases

D. All of the choices are correct.

70. The primary challenge of a distributed database is:


(p. 197)

A. Data accuracy

B. Data transmission speed

C. Storage costs

D. Data security

71. Which of the following statements concerning the replication and duplication process for updating
(p. 197)
distributed databases is correct?

A. The two terms are interchangeable because the processes work the same way

B. Duplication is the more complicated process because it has to identify one database as a master
and prevent changes being made to any database other than the master

C. Replication is the more complicated process because it must find changes in each distributed
database and make appropriate changes to make each database identical

D. None of the choices are correct.


72. What type of databases are employees using when they access online data banks, whether those
(p. 197)
data banks are free or paid for through subscriptions?

A. Common databases

B. Distributed databases

C. External databases

D. Local databases

73. A central source of data that have been cleaned, transformed, and cataloged so that they can be
(p. 199)
used for business analysis, market research, and decision support is called a _______________.

A. data mart

B. data warehouse

C. transaction processing mart

D. data repository

74. A data warehouse contains data that have been processed in all the following ways except:
(p. 199)

A. Separated

B. Cleaned

C. Transformed

D. Cataloged
75. Which of the following is true of data marts?
(p. 199)

A. They hold data from many different data warehouses.

B. They are a subset of a data warehouse.

C. They focus on many generalized aspects of a company.

D. None of the choices are correct.

76. Which of the following is true of data in a data warehouse?


(p. 199-
200)

A. Data in operational databases is ever changing; data in data warehouses is static

B. Data in operational databases is static; data in data warehouses is ever changing

C. Data in operational databases can be cataloged; data in data warehouses cannot

D. None of the choices are correct.

77. Which of the following is a legitimate use for data mining?


(p. 201)

A. Performing "market-basket analysis" to identify new product bundles

B. Profiling customers

C. Finding the root cause of a quality or manufacturing problem

D. All of the choices are correct.


78. All of the following contribute to problems when using a file management approach except:
(p. 203)

A. Data redundancy

B. Lack of integration of data

C. Data independence

D. Lack of data integrity

79. Database management involves the use of database management software to control how
(p. 204)
databases are _______________.

A. created

B. interrogated

C. maintained

D. All of the choices are correct.

80. In mainframe and server computer systems, the database management system controls the
(p. 204)
_______________ of the databases of computer-using organizations.

A. maintenance

B. development

C. use

D. All of the choices are correct.


81. All of the following are major functions of a database management system except:
(p. 206)

A. Creating new databases and database applications

B. Identifying insufficient data processing or storage needs

C. Maintaining the quality of the data in an organization's databases

D. Using the databases of an organization to provide the information needed by its end users

82. Database development involves defining and organizing the _______________ of the data needed to
(p. 206)
build a database.

A. structure

B. content

C. relationships

D. All of the choices are correct.

83. A DBMS query language is designed to:


(p. 206)

A. Support information systems professionals in the development of complex application software

B. Support end users who wish to obtain ad hoc reports

C. Provide efficient batch mode processing of the database

D. Specify the content, relationships, and structure of a database


84. The database maintenance process is accomplished via:
(p. 206)

A. Hierarchical database systems that provide flexibility and network databases

B. Transaction processing systems and other end user applications, with the support of the DBMS

C. Graphical query languages correctly phrasing SQL

D. File processing systems with the support of 4GLs

85. The basic form of a SQL query is:


(p. 207)

A. SELECT … AND … OR

B. SELECT … WHERE … FROM …

C. SELECT … FROM … WHERE …

D. AND … OR … NOT …

86. Boolean logic deals with three logical operators:


(p. 207)

A. AND, OR, and BUT

B. AND, NOT, and BUT

C. OR, BUT, and NOT

D. AND, OR, and NOT


87. Many end users have trouble correctly phrasing database language search queries, so most end-
(p. 208)
user DBMS packages now offer _______________ methods.

A. speech recognition

B. command line

C. GUI

D. All of the choices are correct.


Fill in the Blank Questions

88. All of the fields used to describe the attributes of an entity are grouped to form a _______________.
(p. 178)

record

89. _______________ contain both a variable number of fields and variable field lengths.
(p. 181)

Variable-length records

90. _______________ contain both a fixed number of fields and fixed field lengths.
(p. 181)

Fixed-length records

91. A group of related records is a data file, or a _______________.


(p. 181)

table

92. A _______________ is an integrated collection of logically related data elements.


(p. 181)

database

93. Databases contain data elements that describe both entities and the _______________ among
(p. 182)
entities.

relationships
94. In the relational database model, all data elements within the database are viewed as being stored in
(p. 184)
the form of simple, two-dimensional tables, sometimes referred to as _______________.

relations

95. The tables in a relational database are flat files, which have rows and columns. Each row presents a
(p. 184)
single _______________ in the file.

record

96. The tables in a relational database are flat files, which have rows and columns. Each column
(p. 184)
represents a _______________.

field

97. The _______________ operation is used to create a subset of the columns contained in the temporary
(p. 185)
tables created by the select and join operations.

project

98. An _______________ consists of data values describing the attributes of an entity, plus the operations
(p. 185)
that can be performed upon the data.

object

99. A weakness in the hierarchical model is that it cannot handle _______________ data relationships.
(p. 187)

many-to-many
100. A weakness in the network model is that it cannot handle _______________ for information.
(p. 187)

ad hoc requests

101. A database of data definitions and specifications is called a metadata repository, or a


(p. 188)
_______________.

data dictionary

102. Database administrators and designers work with corporate and end user management to develop
(p. 189)
an _______________ model that defines the basic business process of the enterprise.

enterprise

103. _______________ relationship diagrams are used to model the relationships among the many entities
(p. 189)
involved in business processes.

Entity

104. A _______________ is an overall logical view of the relationships among the data elements in a
(p. 190)
database.

schema

105. _______________ database design takes a physical view of the data that describes how data are to
(p. 191)
be physically stored and accessed on the storage devices of a computer system.

Physical
106. Data models represent _______________ views of the data and relationships of the database.
(p. 190)

logical

107. Entity Relationship Diagrams are _______________ of the various files and their relationships within a
(p. 189)
database system.

graphical models

108. A website stores hyperlinked pages of multimedia (text, graphics, photographs, video, and audio) in
(p. 197)
a _______________ database.

hypermedia

109. The duplication process basically identifies one database as a _______________ and then duplicates
(p. 197)
that database at a prescribed time so that each distributed location has the same data.

master

110. Data warehouses may be subdivided into _______________, which hold subsets of data from the
(p. 199)
warehouse that focus on specific aspects of a company, such as a department or a business
process.

data marts
111. _______________, data that define the data in the data warehouse, are stored in a metadata
(p. 199)
repository and cataloged by a metadata directory.

Metadata

112. In _______________, the data in a data warehouse are analyzed to reveal hidden patterns and trends
(p. 200)
in historical business activity.

data mining

113. To solve the problems encountered with the file processing approach, the _______________
(p. 203)
management approach was conceived. It is the foundation of modern methods of managing
organizational data.

database

114. Database _______________ involves using transaction processing systems and other tools to add,
(p. 208)
delete, update, and correct the data in a database.

maintenance

115. SQL is an acronym for _______________. It is an international standard query language found in
(p. 206-
many DBMS packages.
207)

Structured Query Language


116. The basic form of a SQL query is SELECT…FROM… _______________.
(p. 207)

WHERE

117. Boolean logic consists of three logical operators: AND, OR, and _______________.
(p. 207)

NOT
Chapter 06 Telecommunications and Networks Answer Key

True / False Questions

1. A change in technology often induces social, political, and economic system changes
(p. 221)
long before a critical mass of users is reached.

FALSE

Until a critical mass of users is reached, a change in technology only affects the

technology.

2. The telecommunications industry has changed from a deregulated market to


(p. 221-
government-regulated monopolies.
222)

FALSE

The opposite is true; the telecommunications industry has gone from government-

regulated monopolies to a deregulated market.


3. Middleware is an essential component of any IT infrastructure because it allows
(p. 222)
disparate systems to be isolated.

FALSE

Middleware is an essential component of any IT infrastructure because it allows

disparate systems to be joined together in a common framework.

4. Business-to-business electronic commerce websites can be used by businesses to


(p. 225)
establish strategic relationships with their customers and suppliers.

TRUE

5. The Internet has a central computer system that is the most powerful in the world.
(p. 225)

FALSE

The Internet has no central computer system or telecommunications center.

6. The Internet provides electronic discussion forums and bulletin board systems that are
(p. 226)
formed and managed by special-interest newsgroups.

TRUE
7. Booking a reservation over the Internet costs an airline about 50 percent less than
(p. 228)
booking the same reservation over the telephone.

FALSE

Booking a reservation over the Internet costs an airline about 90 percent less than

booking the same reservation over the telephone.

8. An intranet is a network inside an organization that uses Internet technologies to provide


(p. 229)
an Internet-like environment within the enterprise.

TRUE

9. Intranets seldom have much impact on communications and collaboration within an


(p. 230)
enterprise.

FALSE

Intranets can significantly improve communications and collaboration within an

enterprise.
10. Software that is installed on intranet Web servers can be accessed by employees within
(p. 231)
the company or by external business partners who are using Web browsers, if access is

allowed by the company.

TRUE

11. If access to data is not restricted with passwords and other security mechanisms, the
(p. 231)
integrity of the data can be easily compromised.

TRUE

12. An extranet is a network inside a company that uses Internet technologies to provide a
(p. 232)
private Internet-like network environment to the firm.

FALSE

An intranet does this.

13. Web browser technology makes customer and supplier access of intranet resources a
(p. 232)
lot easier and faster than with previous business methods.

TRUE
14. A client/server network of several interconnected local area networks can replace a
(p. 242)
large mainframe-based network with many end user terminals.

TRUE

15. The network-centric concept views the PC as the central computing resource of any
(p. 242)
computing environment.

FALSE

The network-centric concept views networks as the central computing resource of any

computing environment.

16. In the central server architecture of P2P networking, the P2P software connects your
(p. 243)
PC to a central server with the directory of all users of the network.

TRUE
17. In the pure peer-to-peer architecture of P2P networking, the P2P software connects
(p. 243)
your PC to a central server with the directory of all users of the network.

FALSE

In the central server architecture of P2P networking, the P2P software connects your

PC to a central server with the directory of all users of the network.

18. The Internet, as originally conceived in the late 1960s, was a pure peer-to-peer
(p. 244)
system.8

FALSE

The Internet was conceived as a peer-to-peer system.

19. The unique achievement of Napster was the empowerment of the peers, in association
(p. 244)
with a central index, to quickly and efficiently locate available content.

TRUE
20. Output from analog devices must be converted into digital form in order to input it into a
(p. 245)
computer.

TRUE

21. Today, ordinary telephone wire is the least used medium for telecommunications.
(p. 246)

FALSE

Ordinary telephone wire is still the most widely used medium for telecommunication.

22. Newly developed optical routers will be able to send optical signals up to 2,500 miles
(p. 246)
without regeneration.

TRUE

23. Communications satellites can use microwave radio as their telecommunications


(p. 247)
medium.

TRUE
24. PCS phone systems cost substantially more to operate and use than cellular systems,
(p. 248)
but have lower power consumption requirements.

FALSE

PCS phone systems cost substantially less to operate and use than cellular system, and

they have lower power consumption requirements.

25. Wi-Fi is faster and less expensive than Standard Ethernet and other common wire-
(p. 299)
based LAN technologies.

TRUE

26. A Bluetooth chip is designed to replace cables; it takes the information normally carried
(p. 249)
by a cable and transmits it to a receiver Bluetooth chip.

TRUE
27. In frequency division multiplexing (FDM), a multiplexer effectively divides one high-
(p. 252)
speed channel into multiple high-speed channels.

FALSE

A multplexer divides a high-speed channel into multiple slow-speed channels.

28. Multiplexers work to increase the number of transmissions possible, while also
(p. 253)
increasing the number of physical data channels.

FALSE

Multiplexers work to increase the number of transmissions possible without increasing

the number of physical data channels.

29. Telecommunications and network management software can reside in communications


(p. 253)
processors, such as multiplexers and routers.

TRUE
30. Mainframe-based wide area networks frequently use telecommunications monitors or
(p. 253)
teleprocessing monitors.

TRUE

31. The Open System Interconnection (OSI) model was officially adapted as an
(p. 255)
international standard by the International Organization of Standards (ISO).

TRUE

32. The Internet uses a system of telecommunications protocols that have become so
(p. 257)
widely used that they are now accepted as a network architecture.

TRUE

33. An IP address is expressed as four decimal numbers separated by periods, such as


(p. 257)
127.154.95.6.

TRUE
34. IP addressing can identify a particular PC connected to the Internet, but not the network
(p. 257)
to which it is attached.

FALSE

IP addressing can identify a specific network because the IP space is divided into three

address classes, A, B, and C. The Class B portion of the address identifies networks.

35. Skype software allows telephone conversations through a PC and over the Internet
(p. 258)
instead of a separate phone connection.

TRUE

36. Each IP address is divided into three address classes, which are A, B, and C. Class C
(p. 257)
addresses are normally owned by large Internet service providers or major

corporations.

FALSE

Class A addresses are normally owned by large Internet service providers or major

corporations.
37. New technologies are extending IP addresses beyond computers to TVs, toasters, and
(p. 257)
coffeemakers.

TRUE

38. Developed to work Internet2, IPv6 increases the IP address size from 32 bits to 256 bits
(p. 258)
to support more levels of the address hierarchy.

FALSE

IPv6 increases the IP address size from 32 bits to 128 bits.

39. IPv6 supports over 300 trillion trillion trillion addresses.


(p. 258)

TRUE

40. Voice over IP is a technology that allows a remote worker to function as if he or she
(p. 258)
were directly connected to a regular telephone network, even while at home or in a

remote office.

TRUE
41. Skype users can call to any non-computer-based landline or mobile telephone in the
(p. 258-
world for just pennies a minute.
259)

FALSE

Calls made to non-computer-based landlines or mobile telephones via Skype are free.

42. "Bandwidth" is typically measured in characters per second (CPS).


(p. 260)

FALSE

"Bandwidth" is typically measured in bits per second.

43. Narrow-band channels typically use microwave, fiber optics, or satellite transmission.
(p. 260)

FALSE

Narrow-band channels are usually unshielded twisted-pair lines used for telephone and

modem communications.
44. Frame relay technology is slower than X.25 and not as well suited to handle the heavy
(p. 260-
communications traffic of interconnected local area networks.
261)

FALSE

Frame relay is considerably faster than X.25.

45. Although we tend to think of the FCC as the oversight body for radio and television, it is
(p. 261)
equally involved in all aspects of data and voice communications.

TRUE

46. Regular telephone service relies on Packet Switching, while the Internet relies on Circuit
(p. 260)
Switching.

FALSE

Regular telephone service relies on Circuit Switching, while the Internet relies on Packet

Switching.
47. Packet Switching involves dividing a message into multiple packets which are
(p. 260)
transmitted over a network to the receiver.

TRUE

48. The Internet is owned by the government of the United States.


(p. 225)

FALSE

Nobody owns the Internet.

Multiple Choice Questions

49. Telecommunications and network technologies are internetworking and revolutionizing


(p. 218)
_______________.

A. business and society

B. business and globalization

C. society and politics

D. globalization and politics


50. Which of the following statements best defines a network?
(p. 218)

A. The usefulness or utility that comes from linking computers together

B. An interrelated or interconnected chain, group, or system

C. Computers linked together via cabling or wireless technology

D. A group of individuals linked via hardware and software

51. A network with 100 nodes has 9,900 possible connections. A network with 1,000 nodes
(p. 218)
has _______________ possible connections.

A. 9,900,000

B. 999,000

C. 99,000

D. over one million

52. Metcalfe's law states that:


(p. 220-
221)

A. The usefulness or utility of a network equals the square of the number of users

B. More network nodes equals more usefulness to network members

C. Networks with too many nodes rapidly lose their effectiveness

D. The usefulness or utility of a network equals the number of users times the number of

nodes
53. A change in technology induces social, political, and economic system changes
(p. 221)
_______________.

A. long before a critical mass of users is reached.

B. before the technology is well understood.

C. only after a critical mass of users is reached.

D. when it is used as a political tool by radical countries.

54. The telecommunications industry has changed _______________.


(p. 221-
222)

A. from a deregulated market to government-regulated monopolies.

B. not at all since 1900.

C. from government-regulated monopolies to a deregulated market.

D. none of the above.

55. Open systems are a recent telecommunications trend. Open systems:


(p. 222)

A. Use common standards for hardware, software, applications, and networking

B. Create a computing environment that is easily accessed by end users and their

networked computer systems

C. Provide greater connectivity, and a high degree of network interoperability

D. All of the choices are correct.


56. Programming that serves to "glue together" or mediate between two separate, and
(p. 222-
usually already existing, programs is known as _______________.
223)

A. front-line software

B. software handshaking

C. middleware

D. back-line software

57. Local and global telecommunications networks are rapidly converting to digital
(p. 223)
transmission technologies. Digital technology provides all of the following benefits over

analog technology except:

A. Much lower error rates

B. Equivalent transmission speeds

C. Movement of larger amounts of information

D. Greater economy
58. Telecommunications networks now play vital and pervasive roles in Web-enabled
(p. 223)
_______________.

A. e-business processes

B. electronic commerce

C. enterprise collaboration

D. All of the choices are correct.

59. Which of the following statements regarding Internet2 is true?


(p. 223)

A. Internet2, like the first Internet, is open to all users

B. Internet2 uses the same infrastructure as the current Internet, so it will be easy to

learn

C. The purpose of Internet2 is to build a roadmap that can be followed during the next

stage of innovation for the current Internet

D. Internet2 will someday replace the original Internet


60. Most of the institutions and commercial partners on the Internet2 network are connected
(p. 224)
via _______________, a network backbone that will soon support throughput of 10 Gbps.

A. Abilene

B. Phoenix

C. Enterprise

D. Indiana

61. Traveling salespeople and those at regional sales offices can use the Internet,
(p. 225)
extranets, and other networks to transmit customer orders from their laptop or desktop

PCs, thus breaking _______________ barriers.

A. physical

B. competition

C. structural

D. geographic
62. Telecommunications-based business applications can help a company overcome all of
(p. 224)
the following barriers to business success except:

A. Time barriers

B. Geographic barriers

C. Human resource barriers

D. Cost barriers

63. All of the following statements about the Internet revolution are true except:
(p. 225)

A. The Internet has become the largest and most important network today, and has

evolved into a global information superhighway

B. The central computer system of the Internet is the most powerful communications

center in the world

C. The Internet is constantly expanding, as more and more businesses and other

organizations join its global web

D. The Internet does not have a headquarters or governing body


64. Which of the following statements regarding Internet Service Providers is correct?
(p. 225)

A. ISPs provide individuals and organizations with access to the Internet for a fee

B. ISPs are independent organizations; they have no connection to one another

C. ISPs are no longer necessary for access to the Internet

D. ISPs provide a direct connection between a company's networks and the Internet

65. ISPs are connected to one another through network _______________.


(p. 226)

A. touch points

B. portals

C. access points

D. hubs

66. Which of the following is a key business use of the Internet?


(p. 228)

A. Internet websites for interactive marketing and electronic commerce

B. E-mail, file transfer, and discussion forums

C. Intranet links with remote employee sites

D. All of the choices are correct.


67. Applications that use the Internet and Internet-based technologies are typically less
(p. 228)
expensive to _______________ than traditional systems.

A. develop

B. operate

C. maintain

D. All of the choices are correct.

68. Most companies are building e-business and e-commerce websites to achieve all of the
(p. 229)
following goals except:

A. Generate new revenue from online sales

B. Increase foot traffic at brick and mortar locations

C. Reduce transaction costs

D. Increase the loyalty of existing customers via Web customer service and support
69. An _______________ is a network inside an organization that uses Internet technologies
(p. 229)
to provide an Internet-like environment within the enterprise.

A. extranet

B. omninet

C. intranet

D. none of the above

70. An _______________ is a network link that uses Internet technologies to interconnect the
(p. 229)
intranet of a business with the intranets of its customers, suppliers, or other business

partners.

A. extranet

B. omninet

C. intranet

D. none of the above


71. The use of an intranet in an organization _______________.
(p. 229)

A. can significantly improve communications and collaboration within an enterprise.

B. can significantly hinder communications and collaboration within an enterprise.

C. has no effect communications and collaboration within an enterprise.

D. is only possible if the organization is using WiFi.

72. All of the following would typically be supported by an organization's intranet information
(p. 230-
portal except:
231)

A. Communication and collaboration

B. Business operations and management

C. Web publishing

D. Recruitment
73. The comparative _______________ of publishing and accessing multimedia business
(p. 230)
information internally via intranet websites has been one of the primary reasons for the

explosive growth in the use of intranets in business.

A. attractiveness

B. lower cost

C. ease

D. All of the choices are correct.

74. Based on the information presented in the text, telecommunications terminals are best
(p. 235)
described as:

A. Any input/output device that uses telecommunications networks to transmit or receive

data, including telephones

B. Devices that support data transmission and reception between terminals and

computers

C. Channels over which data are transmitted and received

D. Programs that control telecommunications activities and manage the functions of

telecommunications networks
75. The text lists five basic categories of components in a telecommunications network. One
(p. 235)
of these categories includes telecommunications processors, which:

A. Support data transmission and reception between terminals and computers

B. Are channels over which data are transmitted and received

C. Consist of programs that control telecommunications activities and manage the

functions of telecommunications networks

D. Include input/output terminals

76. The five basic categories of components in a telecommunications network include:


(p. 235)

A. Protocols, telecommunications channels, computers, telecommunications control

software, and modems

B. Terminals, telecommunications processors, telecommunications channels,

computers, and telecommunications control software

C. Terminals, telecommunications channels, computers, and modems

D. Terminals, telecommunications processors, computers, modems, and protocols


77. A network that covers a large geographic distance, such as a state or a country, is
(p. 238)
considered a _______________ network.

A. client/server

B. local area

C. small area

D. wide area

78. Which of the following best describes a local area network?


(p. 239)

A. A network that covers a large geographic area, such as a city or state

B. A network that connects computers within a limited physical area, such as inside a

single building

C. A network that covers no more than a single state

D. A private network that uses the Internet as its main backbone


79. To communicate over a network, each PC usually has a circuit board called a
(p. 239)
_______________.

A. printed circuit card

B. modem

C. router

D. network interface card

80. All of the following statements about a virtual private network are correct except:
(p. 239)

A. Uses the Internet as its main backbone network

B. Connects the intranets of a company's different locations, or establishes extranet

links between a company and its customers, suppliers, and business partners

C. Relies on modem, twisted-pair wire, and router technology

D. Relies on network firewalls, encryption, and other security features to provide a

secure network
81. All the following describe a VPN except:
(p. 239)

A. A VPN uses the Internet as its main backbone network.

B. A VPN relies on network firewalls, encryption, and other Internet and intranet security

features.

C. A VPN uses the Internet to establish secure intranets between its distant offices and

locations.

D. A VPN is available for use by anyone with access to the Internet.

82. Older, traditional mainframe-based business information systems are called


(p. 242)
_______________ systems.

A. historical

B. standard

C. legacy

D. application
83. Most Linux distributions are released via BitTorrent to help with _______________
(p. 244)
needs.

A. security

B. bandwidth

C. user registration

D. file compression

84. The Internet, as originally conceived in the late 1960's was a _______________ system.
(p. 244)

A. client-server

B. central server

C. pure peer-to-peer

D. peer-to-peer

85. In telecommunications networks, twisted-pair wire:


(p. 266)

A. Is the least commonly used medium

B. Facilitates mobile data communication

C. Is used for both voice and data transmission

D. Is commonly laid on the floors of lakes and oceans


86. A communications medium that consists of one or more central wires surrounded by
(p. 266)
thick insulation is called _______________ cable.

A. coaxial

B. fiber optic

C. twisted-pair

D. packet-transmission

87. Compared to coaxial cable, standard twisted-pair telephone lines:


(p. 266)

A. Support lower data transmission speeds

B. Are virtually the same as coaxial cable in speed and service provided

C. Have less interference and distortion because of their insulation

D. None of the choices are correct.

88. Fiber optics uses cables consisting of one or more hair-thin filaments of __________ fiber
(p. 246)
wrapped in a protective jacket.

A. glass

B. plastic

C. ceramic

D. nylon
89. Fiber optics are regarded as the communications media of the future, primarily due to its
(p. 246)
_______________.

A. availability

B. greater speed and capacity

C. lower installation costs

D. greater compatibility with existing communications media

90. As it relates to telecommunications media, the problem of the last mile is:
(p. 246-
247)

A. A low voltage drop at the end of the line

B. Tying into older technology

C. Finding the money to complete the project

D. None of the choices are correct.

91. Which of the following technologies transmits data at the fastest rate?
(p. 252)

A. Modem

B. Cable modem

C. ISDN

D. Home satellite
92. An internetworking unit that connects networks based on different protocols is a
(p. 252)
_______________.

A. bridge

B. router

C. gateway

D. hub

93. In a telecommunications network, a hub is a communications processor that:


(p. 252)

A. Connects two LANS based on the same network standards or protocols

B. Connects different communications architectures

C. Facilitates port switching

D. None of the choices are correct.

94. In a telecommunications network, a gateway is a communications processor that:


(p. 252)

A. Is used for port switching

B. Connects different communications architectures

C. Connects two LANS based on the same network standards or protocols

D. Connects LANs to Wi-Fi networks


95. In telecommunications networks, multiplexers:
(p. 252)

A. Convert digital signals to analog and vice versa

B. Allow a single communications channel to carry multiple simultaneous data

transmissions

C. Include bridges, routers, hubs, and gateways, which interconnect a local area

network with other local and wide area networks

D. Make connections between communications circuits in a network

96. Network management package functions include all of the following except:
(p. 253-
254)

A. Managing network resources and traffic to avoid congestion

B. Providing security

C. Informing network administrators of potential problems before they occur

D. All of the choices are functions of network management packages.


97. Security is a top concern of network management today, so telecommunications
(p. 254)
software must provide all of the following except:

A. Authentication

B. Encryption

C. Firewalls

D. Central processing

98. A network configuration that consists of a central computer system with a number of
(p. 254)
smaller computers tied directly to it, but not to each other, is a _______________

network.

A. bus

B. ring

C. central processing

D. star
99. Which of the following best describes how star, ring, and bus networks differ?
(p. 255)

A. Performance and reliability

B. Performance, reliability, and cost

C. Reliability and cost

D. Performance and cost

100. A(n) _______________ is a standard set of rules and procedures for the control of
(p. 255)
communication in a network.

A. amplification

B. algorithm

C. protocols

D. transponders
101. Which one of the following statements regarding a telecommunications network is
(p. 255)
false?

A. A protocol is a standard set of rules and procedures for the control of

communications in a network

B. The communications control information needed for "handshaking" between

terminals and computers is a protocol

C. A protocol deals with the control of data transmission/reception in a network

D. Protocols are not applicable to hardware, such as cables and modems

102. The _______________ layer in an OSI model provides communications services for end
(p. 256)
users.

A. application

B. data link

C. network

D. transport
103. In an OSI model, the _______________ layer does the routing and forwarding.
(p. 256)

A. physical

B. data link

C. network

D. application

104. When IP was first standardized, the specification required that each system attached to
(p. 257)
the Internet be assigned a unique, _______________ Internet address value.

A. 4-bit

B. 8-bit

C. 16-bit

D. 32-bit

105. All of the following statements regarding Internet telephony are correct except:
(p. 258)

A. It is often referred to as voice over IP or VOIP

B. It involves using an Internet connection to pass voice data using IP instead of a

standard public telephone network

C. It incurs standard long-distance telephone call charges

D. It demands a very well-configured network to run smoothly


106. Communications channels such as microwave, fiber optics, or satellite transmission that
(p. 260)
provide high-speed transmission rates typically use _______________ channels.

A. broadband

B. narrow-band

C. wireless

D. voice-band

107. ATM (asynchronous transfer mode) is an emerging high-capacity __________ switching


(p. 261)
technology.

A. node

B. packet

C. cell

D. network
108. VoIP works by digitizing a voice signal, chopping it into __________, and then sending
(p. 258)
them over a company's computer network or the Internet, much like data or email.

A. bits

B. packets

C. characters

D. waves

109. IPv4, the current Internet addressing protocol, can accommodate about
(p. 257)
_______________ addresses.

A. 4 trillion

B. 4 billion

C. 4 million

D. None of the above


Fill in the Blank Questions

110. _______________ systems are information systems that use common standards for
(p. 222)
hardware, software, applications, and networking.

Open

111. Open systems provide greater _______________. That is, the ability of networked
(p. 222)
computers and other devices to easily access and communicate with each other and

share information.

connectivity

112. Internet2 is all about high-speed telecommunications and infinite _______________.


(p. 224)

bandwidth

113. We can think of the _______________ as a network made up of millions of smaller,


(p. 225)
private networks, each with the ability to operate independent of, or in harmony with, all

the other millions of connected networks.

Internet
114. Companies can create private secure Internet links between themselves, called
(p. 232)
_______________ private networks.

virtual

115. A communications network is any arrangement where a sender transmits a message to


(p. 235)
a receiver over a _______________, consisting of some type of medium.

channel

116. Devices such as modems, switches, and routers, which support data transmission and
(p. 235)
reception between terminals and computers, are known as telecommunications

_______________.

processors

117. Thin clients provide a browser-based user interface for processing small application
(p. 242)
programs called _______________.

applets
118. Network computing is sometimes called a _______________ client/server model,
(p. 243)
because it consists of thin clients, application servers, and database servers.

three-tier

119. The terms analog and _______________ refer to the methods used to convert
(p. 244)
information into an electrical signal so that it can be transmitted or processed.

digital

120. If the temperature being measured by an electronic analog thermometer is 83 degrees,


(p. 244-
the analog system would put out __________ volts.
245)

830, 83, 8.3, or .83

121. Dense wave division multiplexing (DWDM) can split a strand of glass fiber into _____
(p. 246)
channels, which enables each strand to carry 5 million calls.

40
122. Terrestrial microwave involves earthbound microwave systems that transmit high-speed
(p. 247)
_______________ signals in a line-of-sight path between relay stations spaced

approximately 30 miles apart.

radio

123. All cellular and PCS telephone systems divide a geographic area into small areas, or
(p. 248)
__________, typically from one to several square miles in area.

cells

124. Smart telephones, pagers, PDAs, and other portable communications devices have
(p. 249)
become very thin clients in _______________ networks.

wireless

125. The WAP standard specifies how Web pages in HTML and XML are translated into a
(p. 249)
wireless markup language (WML) by __________ software.

filter
126. _______________ are the most common type of communications processor.
(p. 251)

Modems

127. A modem converts digital signals into analog frequencies and then back again. This
(p. 251)
process is known as modulation and _______________.

demodulation

128. The main idea in OSI is that the process of communication between two endpoints in a
(p. 255)
telecommunication network can be divided into _______________.

layers

129. The first part of an Internet address identifies the network on which the host resides,
(p. 257)
while the second part identifies the particular __________ on the given network.

host
130. Regular telephone service relies on circuit _______________, in which a switch opens a
(p. 260)
circuit to establish a link between a sender and receiver. It remains open until the

communication session is completed.

switching

131. In the X.25 protocol, packets are _____ characters long, while in frame relay technology
(p. 260)
they are of variable length.

128
Chapter 07:e-Business Systems

True / False Questions


1. Cross-functional enterprise systems cross the boundaries of traditional business
(p. 272)
functions in order to reengineer and improve vital business processes all across the
enterprise. TRUE

2. Networked enterprises view cross-functional enterprise systems as a strategic way to


(p. 272)
use IT to centralize information resources. FALSE

Networked enterprises view cross-functional enterprise systems as a strategic way to


use IT to share information resources and improve the efficiency and effectiveness of
business processes.

3. Partner relationship management concentrates on the efficiency of a firm's internal


(p. 275)
production, distribution, and financial processes. FALSE

Enterprise resource planning concentrates on the efficiency and effectiveness of a firm's


internal production, distribution, and financial processes.

4. Knowledge management applications focus on providing a firm's employees with tools


(p. 275)
that support group collaboration, decision making, and human resources management.
FALSE

Knowledge management applications provide a firm's employees with tools that support
group collaboration and decision making, but not human resources management.

5. Enterprise application integration (EAI) software enables users to model the business
(p. 266)
processes and interactions that should occur between business applications. TRUE

6. Enterprise application integration (EAI) software provides legacy systems that perform
(p. 276)
data conversion and coordination, and application communication and messaging
services. FALSE

Enterprise application integration (EAI) software provides middleware that performs data
conversion and coordination, and application communication and messaging services.
7. Distribution and manufacturing are considered front office systems; customer service
(p. 277)
and sales order entry are back office systems. FALSE

Distribution and manufacturing are back office systems; customer service and sales
order entry are front office system.

8. The integration of enterprise application clusters has little, if any, impact on customer
(p. 277)
call center responsiveness. FALSE

The integration of enterprise application clusters has been shown to dramatically


improve customer call center responsiveness and effectiveness.

9. Transaction processing systems play a vital role in supporting the operations of an e-


(p. 278-
business enterprise. TRUE
279)

10. Online transaction processing (OLTP) is generally considered a post-event system


(p. 279)
because transactions are entered nightly. FALSE

Online transaction processing is considered a real-time system because it captures and


processes transactions immediately.

11. Transaction processing systems update the corporate databases of an organization to


(p. 280)
reflect changes resulting from day-to-day business transactions. TRUE

12. Transaction reports can take the form of a transaction listing, such as a payroll register.
(p. 280)

TRUE

13. Enterprise collaboration systems are cross-functional e-business systems that enhance
(p. 281)
communication, coordination, and collaboration among the members of business teams
and workgroups.

TRUE

14. Training in a virtual world is effective, but obstacles include both technology and culture.
(p. 283)

TRUE

15. Training in a virtual world can both lower costs and increase efficiency.
(p. 283)
TRUE

16. Collaborative work management tools help people accomplish or manage individual
(p. 283)
work activities. FALSE

Collaborative work management tools help people accomplish or manage group work
activities.

17. The term interactive marketing has been coined to describe a supply chain management
(p. 284)
process that is based on using the Internet, intranets, and extranets to establish a two-
way transactions between a business and its customers. FALSE

The term interactive marketing has been coined to describe a customer-focused


management process.

18. Increasingly, sales people are using Web browsers and contact management software
(p. 289)
to connect to their company's marketing websites. TRUE

19. Many companies view sales force tracking as a way to gain a strategic advantage in
(p. 289)
sales productivity and marketing responsiveness. FALSE
Many companies view sales force automation as a way to gain a strategic advantage.

20. Firms such as transportation companies, wholesalers, retailers, financial institutions, and
(p. 290)
service companies must use production/operations information systems to plan and
control their operations. TRUE

21. The overall goal of computer-integrated manufacturing is to segregate the production


(p. 291)
and support processes. FALSE

The overall goal of computer-integrated manufacturing is to integrate the production and


support processes.

22. Computer aided manufacturing systems are those that automate the production
(p. 291)
process, such as employing humanlike robots to complete the step of painting the
product being manufactured. TRUE

23. A process control computer system uses special sensing devices that measure physical
(p. 292)
phenomena, such as temperature or pressure changes. TRUE

24. Human resource information systems are designed to support most common human
(p. 292)
resource functions, such as recruitment, selection, hiring, job placement, performance
appraisals, and training over corporate intranets. TRUE

25. Human resource management applications offered over corporate intranets can enable
(p. 292-
managers and other employees to perform HRM tasks with little intervention by the
294)
HRM department. TRUE

26. Accounting information systems are among the newest, yet are the most widely used
(p. 295)
information systems in business. FALSE
Accounting information systems are among the oldest systems.

27. Operational accounting systems emphasize legal and historical record-keeping and the
(p. 295)
production of accurate financial statements. TRUE

28. According to the Real World case, some of Cisco's employees are full-time
(p. 302-
telecommuters, living and working in places such as Illinois while telecommuting to the
303)
firm's offices in California. TRUE

Whirlpool would like to work with a single vendor to provide the bulk of its supply chin
needs.
29. _______________ is defined as the use of the Internet and other networks and information
(p. 272)
technologies to support electronic commerce, enterprise communication and

collaboration, and Web-enabled business processes, both within a networked enterprise

and with customers and business partners.

A. Electronic business

B. Enterprise collaboration

C. Cross-functional system management

D. Supply chain management

30. _______________ systems cross the boundaries of traditional business functions in order
(p. 272)
to reengineer and improve vital business processes all across the enterprise.

A. Electronic business

B. Enterprise collaboration

C. Cross-functional enterprise

D. Supply chain management

31. Networked enterprises view _______________ systems as a strategic way to use IT to


(p. 272)
share information resources and improve the efficiency and effectiveness of business

processes.

A. electronic business

B. enterprise collaboration
C. cross-functional enterprise

D. supply chain management

32. Moving from mainframe-based legacy systems to integrated, cross-functional


(p. 272)
client/server applications typically involves installing _______________ software.

A. enterprise resource planning

B. supply chain management

C. customer relationship management

D. all of the choices are correct.

33. Instead of focusing on the information processing requirements of business functions,


(p. 272)
enterprise software focuses on supporting integrated clusters of _______________

involved in the operations of a business.

A. application software

B. business processes

C. customer relationships

D. all of the choices are correct.

34. A(n) _______________ architecture illustrates the inter-relationships of the major cross-
(p. 272)
functional enterprise applications that many companies have, or are installing, today.

A. enterprise application
B. enterprise operation

C. cross-functional

D. none of the choices are correct.

35. Which of the following applications focuses on the efficiency of a firm's internal
(p. 275)
production, distribution, and financial processes?

A. Customer relationship management

B. Enterprise resource planning

C. Knowledge management

D. Supply chain management

36. Which of the following applications focuses on acquiring and retaining profitable
(p. 275)
customers via marketing, sales, and service processes?

A. Customer relationship management

B. Enterprise resource planning

C. Knowledge management

D. Supply chain management


37. Which of the following applications focuses on developing the most efficient and effective
(p. 275)
sourcing and procurement processes?

A. Customer relationship management

B. Enterprise resource planning

C. Knowledge management

D. Supply chain management

38. Which of the following applications focuses on tools that support group collaboration and
(p. 275)
decision support?

A. Customer relationship management

B. Enterprise resource planning

C. Knowledge management

D. Supply chain management

39. Which of the following applications aims to acquire and retain partners who can enhance
(p. 275)
the sale and distribution of a firm's products and services?

A. Customer relationship management

B. Enterprise resource planning

C. Partner Relationship Management

D. Supply chain management


40. As described in the text, partner relationship management focuses on:
(p. 275)

A. Developing the most efficient and effective sourcing and procurement processes

B. Acquiring and retaining profitable customers via delivery of timely products

C. Acquiring and retaining partners who can enhance the selling and distribution of a

firm's products and services

D. Providing a firm's employees with tools that support group collaboration and decision

support
41. As described in the text, supply chain management focuses on:
(p. 275)

A. Developing the most efficient and effective sourcing and procurement processes

B. Acquiring and retaining profitable customers via delivery of timely products

C. Acquiring and retaining partners who can enhance the selling and distribution of a

firm's products and services

D. Providing a firm's employees with tools that support group collaboration and decision

support

42. According to the text, customer relationship management focuses on:


(p. 275)

A. Developing the most efficient and effective sourcing and procurement processes

B. Acquiring and retaining profitable customers via marketing and delivery of timely

products and services

C. Acquiring and retaining partners who can enhance the selling and distribution of a

firm's products and services

D. Providing a firm's employees with tools that support group collaboration and decision

support

43. According to the text, enterprise resource planning focuses on:


(p. 275)

A. Developing the most efficient and effective sourcing and procurement processes

B. Acquiring and retaining profitable customers via delivery of timely products

C. The efficiency of a firm's internal production, distribution, and financial processes


D. Providing a firm's employees with tools that support group collaboration and decision

support

44. As described in the text, knowledge management focuses on:


(p. 275)

A. Developing the most efficient and effective sourcing and procurement processes

B. Acquiring and retaining profitable customers via delivery of timely products

C. Acquiring and retaining partners who can enhance the selling and distribution of a

firm's products and services

D. Providing a firm's employees with tools that support group collaboration and decision

support

45. Enterprise application integration (EAI) software enables users to model the business
(p. 276)
processes and interactions that should occur between:

A. International divisions

B. Suppliers and customers

C. End users

D. Business applications

46. Enterprise application integration (EAI) software provides _______________ that performs
(p. 276)
data conversion and subordination, and application communication and messaging

services.

A. middleware

B. a legacy system
C. the telecommunication protocol

D. a business application

47. Distribution and manufacturing are _______________.


(p. 277)

A. middleware

B. legacy systems

C. back office systems

D. front office systems

48. _______________ software can integrate the front-office and back office systems
(p. 277)
applications of a business so they work together in a seamless, integrated way.

A. Customer relationship management (CRM)

B. Knowledge management (KM)

C. Enterprise application integration (EAI)

D. Supply chain management (SCM)


49. Customer service and sales order entry are _______________.
(p. 277)

A. middleware

B. legacy systems

C. back office systems

D. front office systems

50. _______________ are events that occur as part of doing business, such as sales,
(p. 278)
purchases, deposits, withdrawals, refunds, and payments.

A. Items

B. Transactions

C. Occurrences

D. Processes

51. A transaction is _______________.


(p. 278)

A. any exchange of goods

B. any business event that must be captured and recorded

C. an event requiring an exchange of money

D. any business process where an exchange of resources occurs

52. Transaction processing systems play a vital role in supporting the _______________ of an
(p. 278-
e-business enterprise.
279)

A. customer service
B. product distribution

C. operations

D. systems architecture

53. Transaction processing systems are _______________ information systems that process
(p. 278)
data resulting from the occurrence of business transactions.

A. customer relationship management (CRM)

B. knowledge management (KM)

C. operational accounting

D. cross-functional

54. Online transaction processing is considered a _______________ system because it


(p. 279)
captures and processes transactions immediately.

A. customer service

B. post-event

C. batch processing

D. real time

55. The first step of the transaction processing cycle is _______________.


(p. 280)

A. inquiry processing

B. document generation

C. transaction processing

D. data entry
56. _______________ update the corporate databases of an organization to reflect changes
(p. 280)
resulting from day-to-day business transactions.

A. Online transaction processing (OLTP) systems

B. Enterprise application integration systems

C. Accounting processing systems

D. Transaction processing systems

57. Transaction processing systems process data in two basic ways: _______________ and
(p. 280)
_______________.

A. Online processing, offline processing

B. Online/real-time processing, batch processing

C. Distributed processing, centralized processing

D. Replicated processing, distributed processing

58. _______________ systems are cross-functional information systems that enhance


(p. 281)
communication and coordination among the members of business teams and

workgroups.

A. Enterprise coordination

B. Enterprise integration

C. Enterprise collaboration

D. Transaction processing

59. The capabilities and potential of _______________ are driving the demand for better
(p. 281)
enterprise collaboration tools in business.

A. the Internet

B. intranets

C. extranets

D. All of the choices are correct.

60. Electronic mail, voice mail, faxing, Web publishing, bulletin board systems, and paging
(p. 281-
are considered _______________ tools.
282)

A. electronic communication

B. collaborative work management

C. electronic conferencing

D. All of the choices are correct.

61. Video-conferencing, chat systems, and discussion forums are considered


(p. 281-
_______________ tools.
282)

A. electronic communication

B. collaborative work management

C. electronic conferencing

D. All of the choices are correct.

62. Workflow systems, document sharing, and knowledge management are considered
(p. 281-
_______________ tools.
282)
A. electronic communication

B. collaborative work management

C. electronic conferencing

D. All of the choices are correct.

63. Which of the following is considered a collaborative work management tool?


(p. 283)

A. Calendaring and scheduling

B. Instant messaging

C. Voice conferencing

D. Paging

64. Which of the following is considered an electronic communications tool?


(p. 283)

A. Calendaring and scheduling

B. Instant messaging

C. Voice conferencing

D. Chat systems
65. Which of the following is considered an electronic conferencing tool?
(p. 283)

A. Calendaring and scheduling

B. Instant messaging

C. Data conferencing

D. Paging

66. Training in a virtual world is effective, but obstacles include both _______________.
(p. 283)

A. technology and culture

B. hardware and software

C. front office and back office

D. suppliers and customers

67. Training in a virtual world can both _______________.


(p. 283)

A. increase costs and increase efficiency

B. lower costs and lower efficiency

C. increase costs and lower efficiency

D. lower costs and increase efficiency


68. _______________ tools help people accomplish or manage group work activities.
(p. 283)

A. Calendaring and scheduling

B. Task and project management

C. Collaborative work management

D. Knowledge management

69. Collaborative work management tools include all of the following except:
(p. 282-
283)

A. Calendaring and scheduling tools

B. Task and project management

C. Faxing, paging, and bulletin board systems

D. Knowledge management

70. A(n) _______________ business system is a type of information system that supports the
(p. 284)
business functions of accounting, finance, marketing, operations management, and

human resource management.

A. functional

B. inter-enterprise

C. collaboration

D. enterprise resource
71. Marketing information systems can help marketing managers with:
(p. 284)

A. Customer relationship management

B. Product planning and pricing

C. Targeted marketing strategies

D. All of the choices are correct.

72. Which of the following is considered a human resource business function?


(p. 287)

A. Compensation analysis

B. Payroll

C. Customer relationship management

D. Sales force automation

73. Which of the following is considered a production/operations business function?


(p. 287)

A. Personnel requirements forecasting

B. Process control

C. Investment management

D. Sales force automation


74. Which of the following is supported by the marketing business function?
(p. 287)

A. Compensation analysis

B. Process control

C. Credit management

D. Sales force automation

75. All of the following are supported by the accounting business function except:
(p. 287)

A. General ledger

B. Inventory control

C. Capital budgeting

D. Payroll

76. Providing website visitors with chat rooms, Web forms and questionnaires, and e-mail
(p. 287)
correspondence opportunities enables companies to use _______________ to encourage

customers to become involved in product development, delivery, and service issues.

A. order processing

B. interactive marketing

C. sales force automation

D. None of the choices are correct.


77. Targeted marketing includes all of the following components except:
(p. 288)

A. Online behavior

B. Content

C. Credit

D. Demographics/psychographics

78. Advertising and promotion efforts can be tailored to each visit to a site by an individual.
(p. 288)
This strategy is based on a variety of tracking techniques, such as Web "__________"

files recorded on the visitor's disk drive from previous visits.

A. Virus

B. Donut

C. Cookie

D. Compressed
79. Many companies view sales force automation as a way to gain _______________ in sales
(p. 289)
productivity and marketing responsiveness.

A. customer loyalty

B. strategic advantage

C. higher profits

D. demographic/psychographic customer statistics

80. _______________ information systems support the production/operations function that


(p. 290)
includes all activities concerned with the planning and control of the processes producing

goods and services.

A. Finance

B. Management

C. Marketing

D. Manufacturing
81. Computer integrated manufacturing is an overall concept that stresses using computer-
(p. 291)
based systems in manufacturing to do all the following, except:

A. Simplify production processes

B. Automate production processes

C. Integrate all production and support processes

D. Integrate collaboration and communication throughout the organization

82. Computer-integrated manufacturing systems do all the following for activities that are
(p. 291)
needed to produce products, except:

A. simplify

B. automate

C. segregate

D. integrate
83. The overall goal of computer-integrated manufacturing is to create flexible, agile,
(p. 291)
manufacturing processes that do what?

A. Support the knowledge management processes of the organization.

B. Create products leading specifically to high customer satisfaction.

C. Efficiently produce products of the highest quality.

D. Integrate well into Supply Chain information systems.

84. Computer-integrated manufacturing systems support all of the following concepts


(p. 291)
except:

A. Flexible manufacturing systems

B. Inquiry processing

C. Agile manufacturing

D. Total quality management


85. When a manufacturer automates production of a product by installing computer systems
(p. 292)
to monitor processes and robots to do some of the assembly tasks, it is an example of

____________________.

A. computer integrated manufacturing

B. computer-aided manufacturing

C. process control

D. task control

86. When a manufacturer installs performance-monitoring information systems for factory


(p. 292)
floor operations, it is an example of ____________________.

A. computer integrated manufacturing

B. computer-aided manufacturing

C. process control

D. manufacturing execution systems


87. When a manufacturer uses computers to control ongoing physical processes, it is an
(p. 292)
example of ____________________.

A. computer integrated manufacturing

B. computer-aided manufacturing

C. process control

D. manufacturing execution systems

88. Machine control is the use of computers to control the actions of machines. This is also
(p. 292)
known as ____________________.

A. numerical control

B. computer-aided manufacturing

C. process control

D. manufacturing execution systems


89. Accounting systems are among the ____________________, yet _______________
(p. 295)
information systems in business.

A. newest, least used

B. newest, most widely used

C. oldest, least used

D. oldest, most widely used

90. According to the text, _______________ emphasize legal and historical record-keeping
(p. 295)
and the production of accurate financial statements.

A. operational accounting systems

B. management accounting systems

C. cross-functional accounting systems

D. financial accounting systems


91. Which of the six essential accounting business systems mentioned in the text reflects
(p. 296)
changes in inventory and provides shipping and reorder information?

A. Accounts payable

B. Accounts receivable

C. Inventory control

D. Order processing

92. Which of the six essential accounting business systems mentioned in the text records
(p. 296)
purchases from, amounts owed to, and payments to suppliers?

A. Accounts payable

B. Accounts receivable

C. Inventory control

D. Order processing
93. Computer-based _______________ systems support business managers and
(p. 296)
professionals in decisions concerning the financing of a business, and the allocation and

control of financial resources within a business.

A. accounting information

B. financial management

C. marketing information

D. management information

Fill in the Blank Questions

94. Instead of focusing on the information processing requirements of business functions,


(p. 272)
enterprise software focuses on supporting integrated clusters of business

_______________ involved in the operations of a business.

processes
95. An enterprise _______________ architecture illustrates the inter-relationships of the major
(p. 272)
cross-functional enterprise applications that many companies have, or are installing,

today.

application

96. _______________ systems cross the boundaries of traditional business functions in order
(p. 272)
to reengineer and improve vital business processes all across the enterprise.

Cross-functional enterprise

97. _______________ focuses on the efficiency of a firm's internal production, distribution,


(p. 275)
and financial processes.

Enterprise resource planning

98. EAI software can integrate the front-office and ________________ applications of a
(p. 277)
business so they work together in a seamless, integrated way.

back-office
99. A transaction is _______________.
(p. 278)

any business event that must be captured and recorded

100. Transaction processing systems (TPS) are _______________ information systems that
(p. 278)
process data resulting from the occurrence of business transactions.

cross-functional

101. Transaction processing systems process data in two basic ways: batch processing and
(p. 280)
_______________ processing.

real-time or online

102. Many online systems depend on the capabilities of _______________ tolerant computer
(p. 280)
systems that can continue to operate if parts of the system fail.

fault

103. Electronic conferencing options include electronic meeting systems and other group
(p. 282)
support systems where team members can meet at the same time and place in a

_______________ room setting.

decision
104. The goal of interactive marketing is to enable a company to profitably use networks to
(p. 287)
attract and ___________ customers who will become partners with the business.

keep or retain

105. Advertising and promotion efforts can be tailored to each visit to a site by an individual.
(p. 288)
This strategy is based on a variety of tracking techniques, such as Web "__________"

files recorded on the visitor's disk drive from previous visits.

cookie

106. The production/operations function is concerned with the management of the operational
(p. 290)
processes and __________ of all business firms.

systems

107. _______________ is an overall concept that stresses that the objectives of computer-
(p. 291)
based systems in manufacturing must be to simplify, automate, and integrate all

production and support processes.

Computer-integrated manufacturing (CIM)


108. Manufacturing information systems help companies plan the types of material needed in
(p. 291)
the production process. This is called ____________________ planning (MRP).

material requirements

109. Manufacturing execution systems monitor, track, and control the five essential
(p. 292)
components in a production process: materials, equipment, _______________,

instructions and specifications, and production facilities.

personnel

110. _______________ control is the use of computers to control an ongoing physical process.
(p. 292)

Process

111. Machine control is the use of computers to control the actions of machines. This is also
(p. 292)
popularly known as _______________ control.

numerical
112. _______________ information systems are designed to support planning to meet the
(p. 292)
personnel needs of the business, development of employees to their full potential, and

control all personnel policies and programs.

Human resource

113. Human resource information systems support the strategic, tactical, and
(p. 293)
_______________ use of the human resources of an organization.

operational

114. Management accounting systems focus on the planning and __________ of business
(p. 295)
operations.

control

115. The __________ budgeting process involves evaluating the profitability and financial
(p. 297)
impact of proposed capital expenditures.

capital
116. _______________ planning software can help determine the financing needs of a
(p. 297)
business and analyze alternative methods of financing.

Financial

117. EAI software can integrate _______________ and ________________ applications so they
(p. 277)
work together in a seamless, integrated way.

front office; back office

118. Syntellect Interactive Services developed _______________ for cable pay-per-view


(p. 279)
systems.

online transaction processing system

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy