chapter 1chapter 1. multiple choice. what is the most important reason for google being able to...
TRANSCRIPT
Chapter 1Multiple Choice
What is the most important reason for Google being able to pursue four business strategies simultaneously? A. The company has a global platform.B. The company has a huge amount of cash reserves.C. The company’s platform enables it to develop applications quickly and deliver applications and results to users almost instantaneously.D. The company saw that Microsoft was vulnerable as a result of Microsoft’s proprietary software model.E. The company has excellent employee benefits.
ANS: CREF: Chapter 1 opening case
Which of the following statements is not correct? A. To succeed in today’s environment, it is often necessary to change business models and strategies.B. IT enables organizations to survive in the face of business pressures.C. IT requires small investments over a long period of time.D. Organizations can leverage their platforms to develop Web-based applications, products, and services.
ANS: CREF: Material following chapter opening case
The fact that you practice continuous computing means all of the following except: A. You are surrounded by a movable information network.B. You can pull information about almost everything from anywhere all the time.C. You can push your ideas to the Web.D. Your daily routines are exactly the same as students 20 years ago, but you can do your tasks much slower and with more effort.
ANS: DREF: Material following chapter opening case
The modern business environment has all of the following characteristics except:A. globalB. interconnectedC. competitive
D. relatively staticE. real-time
ANS: DREF: Material following chapter opening case
_____ deal with the planning for – and the development, management, and use of – technology to help people perform their tasks related to information processing.A. IT architectureB. IT infrastructureC. information technologyD. management information systemsE. IT services
ANS: DREF: 1.1 Information Systems: Concepts and Definitions
_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem. A. dataB. informationC. knowledgeD. experienceE. wisdom
ANS: CREF: 1.1 Information Systems: Concepts and Definitions
_____ is (are) data that have been organized to have meaning and value to a recipient.A. dataB. informationC. knowledgeD. experienceE. wisdom
ANS: BREF: 1.1 Information Systems: Concepts and Definitions
The list of all your purchases from Amazon (books bought, price paid, dates) would be considered to be:A. dataB. informationC. knowledgeD. experience
1
E. wisdom
ANS: BREF: 1.1 Information Systems: Concepts and Definitions
If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then Amazon is applying its _____.A. dataB. informationC. knowledgeD. experienceE. wisdom
ANS: CREF: 1.1 Information Systems: Concepts and Definitions
A listing of all courses offered at your university would be considered _____, where a listing of all courses required in your major along with the credit hours and pre-requisite requirements would be considered _____.A. information, dataB. knowledge, informationC. information, knowledgeD. data, informationE. data, knowledge
ANS: DREF: 1.1 Information Systems: Concepts and Definitions
You are registering for the next semester at your university. The combination of your previous experience registering, your major, the courses you need, the prerequisites for each course, the times you need each course, and the professors teaching each section, as well as your work schedule, means that you are using _____ to select your class schedule. A. informationB. knowledgeC. expertiseD. wisdomE. data
ANS: BREF: 1.1 Information Systems: Concepts and Definitions
An organization’s information technology architecture: A. provides a guide for current operationsB. provides a blueprint for future directionsC. integrates the information requirements of the organization and all usersD. is analogous to the architecture of a houseE. all of the above
ANS: EREF: 1.1 Information Systems: Concepts and Definitions
_____ are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services. A. IT componentsB. IT servicesC. information technologyD. information systemE. computer-based information system
ANS: AREF: 1.1 Information Systems: Concepts and Definitions
An organization’s _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization. A. information technology architectureB. information technology infrastructureC. information technologyD. information systemE. computer-based information system
ANS: BREF: 1.1 Information Systems: Concepts and Definitions
_____ is the integration of economic, social, cultural, and ecological facets of life, enabled by information technologies.
A. regionalizationB. nationalizationC. globalizationD. business environment
ANS: CREF: 1.2 The Global, Web-Based Platform
2
The Global, Web-Based Platform enables individuals to do which of the following? A. connect, compute, communicate, collaborate, and compete everywhere and all the timeB. access information, services, and entertainmentC. exchange knowledgeD. produce and sell goods and servicesE. all of the above
ANS: EREF: 1.2 The Global, Web-Based Platform
The force behind globalization in _____ was the amount of muscle, horsepower, wind power, or steam power that a country could deploy.A. Globalization 1.0B. Globalization 2.0C. Globalization 3.0D. None of these
ANS: AREF: 1.2 The Global, Web-Based Platform
A convergence of Friedman’s 10 flatteners is driving _____.A. Globalization 1.0B. Globalization 2.0C. Globalization 3.0D. None of these
ANS: CREF: 1.2 The Global, Web-Based Platform
Falling telecommunications costs from the telegraph, telephone, computer, satellites, and fiber-optic cable drove (or drives) globalization in _____.A. Globalization 1.0B. Globalization 2.0C. Globalization 3.0D. None of these
ANS: BREF: 1.2 The Global, Web-Based Platform
Falling transportation costs (e.g., steam engine, railroads) drove (or drives) globalization in _____.A. Globalization 1.0B. Globalization 2.0
C. Globalization 3.0D. None of these
ANS: BREF: 1.2 The Global, Web-Based Platform
Multinational companies were the force behind globalization in _____.A. Globalization 1.0B. Globalization 2.0C. Globalization 3.0D. None of these
ANS: BREF: 1.2 The Global, Web-Based Platform
The Global, Web-Based Platform appeared in _____.A. Globalization 1.0B. Globalization 2.0C. Globalization 3.0D. None of these
ANS: CREF: 1.2 The Global, Web-Based Platform
The force behind globalization in _____ is (was) biotechnology, cloning, and gene sequencing.A. Globalization 1.0B. Globalization 2.0C. Globalization 3.0D. None of these
ANS: DREF: 1.2 The Global, Web-Based Platform
The global economy began to appear in _____.A. Globalization 1.0B. Globalization 2.0C. Globalization 3.0D. None of these
ANS: BREF: 1.2 The Global, Web-Based Platform
Globalization 1.0 focused on _____, Globalization 2.0 focused on _____, and Globalization 3.0 focuses on _____.A. companies, groups, countriesB. countries, groups, companies
3
C. countries, companies, groupsD. groups, companies, countriesE. groups, countries, companies
ANS: CREF: 1.2 The Global, Web-Based Platform
The fall of the Berlin Wall had all of the following consequences except: A. collapse of the Soviet UnionB. the rise of the European UnionC. a move toward centrally planned economiesD. people thinking about the world as a single economy
ANS: CREF: 1.2 The Global, Web-Based Platform
The consequences of uploading include all of the following except: A. growth of the open-source software movementB. shift toward a static, passive approach to mediaC. increased collaboration over the WebD. growth of blogs and Wikis
ANS: BREF: 1.2 The Global, Web-Based Platform
_____ enables computer applications to interoperate without human interaction.A. supply-chainingB. informingC. uploadingD. work-flow softwareE. outsourcing
ANS: DREF: 1.2 The Global, Web-Based Platform
_____ involves taking a specific function that your company was doing itself, having another company perform that same function for you, and then integrating their work back into your operation.A. informingB. insourcingC. offshoringD. outsourcingE. uploading
ANS: D
REF: 1.2 The Global, Web-Based Platform
If UPS is taking Dell computers at the loading dock, and then shipping them to Dell customers, then Dell is practicing which of the following? A. informingB. insourcingC. offshoringD. outsourcingE. uploading
ANS: BREF: 1.2 The Global, Web-Based Platform
_____ means that you can create content and send or post it to the Web.A. informingB. insourcingC. deliveringD. participatingE. uploading
ANS: EREF: 1.2 The Global, Web-Based Platform
If your university hires a company to manage its entire human resources function, then your university is practicing _____. A. insourcingB. outsourcingC. offshoringD. temporary hiringE. consulting
ANS: BREF: 1.2 The Global, Web-Based Platform
Market pressures include which of the following? A. global economyB. no competitionC. homogeneous workforceD. weak customersE. high-cost labor offshore
ANS: AREF: 1.3 Business Pressures, Organizational Responses, and IT Support
4
In general, labor costs are _____ in developed countries than in developing countries. A. lowerB. higherC. about the sameD. decreasing fasterE. decreasing slower
ANS: BREF: 1.3 Business Pressures, Organizational Responses, and IT Support
The workforce in developed countries has which of the following characteristics? A. more diversifiedB. more womenC. more single parentsD. more persons with disabilitiesE. all of the above
ANS: EREF: 1.3 Business Pressures, Organizational Responses, and IT Support
Today’s customers have which of the following characteristics? A. less knowledge about productsB. less sophisticationC. difficulty in finding information about productsD. higher expectationsE. difficulty in comparing prices
ANS: DREF: 1.3 Business Pressures, Organizational Responses, and IT Support
The digital divide is an example of which type of societal pressure? A. social responsibilityB. government regulationsC. protection against terrorismD. ethicsE. information overload
ANS: AREF: 1.3 Business Pressures, Organizational Responses, and IT Support
Cybercafes are an example of which type of societal pressure?
A. social responsibilityB. government regulationsC. protection against terrorismD. ethicsE. information overload
ANS: AREF: 1.3 Business Pressures, Organizational Responses, and IT Support
How does information technology impact the people of Bangladesh?A. Landline telephones enable people to communicate with each other and provide access to the Internet.B. Cell phones provide access to the Internet.C. Computers in many homes provide access to the Internet.D. Kiosks provide access to the Internet.E. Laptops for children in school provide access to the Internet.
ANS: BREF: IT’s About Business 1.1
When identical items are produced in large quantities, this is called:A. strategic systemsB. customer focusC. continuous improvementD. mass productionE. mass customization
ANS: DREF: 1.3 Business Pressures, Organizational Responses, and IT Support
JPMorgan made large information technology investments for all of the following reasons except:A. To overhaul its networks.B. To increase the number of data centers it operates.C. To improve the bank’s efficiency.D. To make it easier for customers to interact with the bankE. To improve the bank’s return on equity
ANS: BREF: IT’s About Business 1.3
Which of the following is not a fact about IT careers?
5
A. The four-fastest growing U.S. jobs that require college degrees from 2002 through 2012 are IT-related.B. Highly-skilled IT jobs will typically not be offshored.C. There are no computing jobs.D. MIS majors usually receive high starting salaries.
ANS: CREF: 1.4 Why Are Information Systems Important to You?
Amazon is using its IT infrastructure to deliver a variety of services for all of the following reasons except: A. because the company only uses 10 percent of its processing capacity at any one timeB. to stablize profits and revenueC. to compete with GoogleD. to help start-up companies with their IT needs
ANS: BREF: Chapter closing case
Chapter 2Multiple Choice
Which of the following statements about information systems is not correct?A. Information systems are concentrated in the IS Department.B. Information systems tend to follow the structure of the organization.C. Information systems are based on the needs of employees.D. Any information system can be strategic.E. Managing information systems is difficult.
Ans: ARef: Discussion immediately following Chapter opening case
A collection of related files, tables, and so on that stores data and the associations among them is _____. A. hardwareB. software C. databaseD. networkE. procedures
Ans: CRef: 2.1 Types of Information Systems
A set of programs that enable the hardware to process data is _____. A. hardwareB. software C. databaseD. networkE. procedures
Ans: BRef: 2.1 Types of Information Systems
Which of the following is not a major capability of information systems? A. perform high-speed, high-volume numerical computationsB. provide fast, accurate communications among organizationsC. store very small amounts of information in a very large spaceD. increase the effectiveness and efficiency of people working in groupsE. automate semiautomatic business processes
Ans: CRef: 2.1 Types of Information Systems
Two information systems that support the entire organization are:A. Enterprise resource planning systems, dashboardsB. Transaction processing systems, office automation systemsC. Enterprise resource planning systems, transaction processing systemsD. Expert systems, office automation systemsE. Expert systems, transaction processing systems
Ans: CRef: 2.1 Types of Information Systems
_____ systems are designed to correct a lack of communications among _____.A. Office automation systems, expert systemsB. Transaction processing systems, functional area information systemsC. Enterprise resource planning systems, functional area information systemsD. Dashboards, office automation systems
6
E. Functional area information systems, enterprise resource planning systems
Ans: CRef: 2.1 Types of Information Systems
When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data. A. transaction processing systemB. functional area information systemC. dashboardD. enterprise resource planning systemE. office automation system
Ans: ARef: 2.1 Types of Information Systems
Supply chain systems are which type of information system? A. departmental information systemsB. enterprisewide information systemsC. interorganizational information systemsD. end-user computing systemsE. individual information systems
Ans: CRef: Types of Information System
Electronic commerce systems are which type of information system?A. departmental information systemsB. enterprisewide information systemsC. interorganizational information systemsD. end-user computing systemsE. individual information systems
Ans: CRef: 2.1 Types of Information Systems
_____ are professional people who act as advisors and assistants to both top and middle managers and are often subject-area experts in a particular area. A. clerical workersB. operational managersC. knowledge workersD. middle level managersE. executives
Ans: C
Ref: 2.1 Types of Information Systems
_____ make decisions that deal with situations that may significantly change the manner in which business is done. A. knowledge workersB. staffC. middle managersD. operational managersE. senior managers
Ans: ERef: 2.1 Types of Information Systems
_____ attempt to duplicate the work of human experts by applying reasoning capabilities.A. expert systemsB. dashboardsC. functional area information systemsD. decision support systemsE. business intelligence systems
Ans: ARef: 2.1 Types of Information Systems
An information system that analyzes credit card applications and suggests approval or denial is a(n): A. expert systemB. dashboardC. functional area information systemD. decision support systemE. business intelligence system
Ans: ARef: 2.1 Types of Information Systems
_____ provide rapid access to timely information and direct access to structured information in the form of reports.A. expert systemsB. dashboardsC. functional area information systemsD. decision support systemsE. business intelligence systems
Ans: BRef: 2.1 Types of Information Systems
7
Information-based industries are most susceptible to which one of Porter’s five forces? A. threat of entry of new competitorsB. bargaining power of suppliersC. bargaining power of customersD. threat of substitute productsE. rivalry among existing firms in an industry
Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems
Competitive advantage for an organization manifests as all of the following except:A. lower costsB. higher qualityC. increased time to marketD. increased profitsE. increased speed
Ans: CRef: 2.2 Competitive Advantage and Strategic Information Systems
For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry.A. decreases, increasingB. increases, decreasingC. increases, increasingD. decreases, decreasing
Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems
_____ is a feature that must be offered by a competing organization for it to survive in the marketplace.A. Competitive advantageB. Entry barrierC. Strategic advantageD. Rapid time-to-marketE. One-to-one marketing
Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems
The threat of competitors’ entering the automobile manufacturing industry is _____ because barriers to entry are so _____.A. low, lowB. high, highC. high, lowD. low, highE. cheap, expensive
Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems
The threat of competitors’ entering a market is very high in industries that perform a(n) _____ role, and in industries where the primary product or service is _____.A. intermediation, physicalB. broker, physicalC. sales, financialD. financial, digitalE. intermediation, digital
Ans: ERef: 2.2 Competitive Advantage and Strategic Information Systems
The Internet has had which of the following impacts on the way you purchase your textbooks? A. The Internet gives you fewer choices.B. The Internet increases your bargaining power.C. The Internet provides you with less information.D. The Internet decreases your bargaining power.E. The Internet increases your switching costs.
Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems
Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices.A. high, the sameB. high, lowC. low, lowD. low, highE. low, the same
Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems
8
The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel.A. e-commerce, digitalB. digital, e-commerceC. digital, physicalD. physical, financialE. physical, digital
Ans: ERef: 2.2 Competitive Advantage and Strategic Information Systems
Porter’s competitive forces model helps organizations identify _____, where his value chain model helps organizations identify specific _____.A. competitive opportunities, activitiesB. general strategies, activitiesC. activities, competitive opportunitiesD. activities, general strategiesE. primary activities, support activities
Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems
_____ activities create value for which customers are willing to pay, where _____ activities do not add value directly to the firm’s products or services.A. Support, primaryB. Human resource management, inbound logisticsC. Procurement, operationsD. Primary, supportE. Accounting, outbound logistics
Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems
If there are _____ substitutes for an organization’s products or services, then the threat of substitutes is _____.A. many, highB. few, fewC. few, highD. many, fewE. few, negligible
Ans: A
Ref: 2.2 Competitive Advantage and Strategic Information Systems
New technologies can produce new products very _____, which _____ the threat from substitute products.A. slowly, decreasesB. slowly, increasesC. slowly, does not affectD. quickly, increasesE. quickly, does not affect
Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems
The visibility of Internet applications on the Web makes proprietary systems more difficult to keep secret. This is an example of which of Porter’s five forces? A. threat of entry of new competitorsB. bargaining power of suppliersC. bargaining power of customersD. threat of substitute productsE. rivalry among existing firms in an industry
Ans: ERef: 2.2 Competitive Advantage and Strategic Information Systems
Wal-Mart’s automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage? A. cost leadershipB. differentiationC. innovationD. operational effectivenessE. customer-orientation
Ans: ARef: 2.2 Competitive Advantage and Strategic Information Systems
Offering different products, services, or product features is which strategy for competitive advantage? A. cost leadershipB. differentiationC. innovationD. operational effectiveness
9
E. customer-orientation
Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems
Introducing new products and putting new features in existing products is which strategy for competitive advantage? A. cost leadershipB. differentiationC. innovationD. operational effectivenessE. customer-orientation
Ans: CRef: 2.2 Competitive Advantage and Strategic Information Systems
The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?A. cost leadershipB. innovationC. differentiationD. operational effectivenessE. customer-orientation
Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems
Southwest Airlines’ low-cost, short-haul strategy is an example of which strategy for competitive advantage? A. cost leadershipB. differentiationC. innovationD. operational effectivenessE. customer-orientation
Ans: BRef: 2.2 Competitive Advantage and Strategic Information Systems
Improving the manner in which internal business processes are executed is which strategy for competitive advantage? A. cost leadershipB. differentiation
C. innovationD. operational effectivenessE. customer orientation
Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems
When Amazon welcomes you by name back to its Web site on your second visit, this is an example of which strategy for competitive advantage?A. cost leadershipB. differentiationC. innovationD. operational effectivenessE. customer orientation
Ans: ERef: 2.2 Competitive Advantage and Strategic Information Systems
Refer to IT’s About Business 2.2. The benefits gained from Norfolk Southern Railway’s strategic information system include all of the following except:A. Cost savingsB. Increased carload volumeC. Increased average train speedD. Increased number of railway cars neededE. Decreased time in the yard for trains
Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems
The impact of IT on managers’ jobs is all of the following except: A. gives managers time to get into the fieldB. managers can spend more time planningC. managers must spend more time managing fewer employeesD. managers can gather information more quicklyE. none of the above
Ans: CRef: 2.2 Competitive Advantage and Strategic Information Systems
Porter’s _____ help(s) companies identify general strategies, where his _____ help(s) to identify
10
specific activities where companies can use the strategies for greatest impact.A. Value chain model, competitive forces modelB. Primary activities, support activitiesC. Competitive forces model, primary activitiesD. Competitive forces model, value chain modelE. Value chain model, support activities
Ans: DRef: 2.2 Competitive Advantage and Strategic Information Systems
Which of the following statements about the impact of IT on managers is not correct?A. IT makes managers more productive.B. IT increase the number of employees who can report to one manager.C. IT will increase the number of managerial levels in an organization.D. IT will reduce the number of line and staff managers.
Ans: CRef: 2.3 Why Are Information Systems So Important to Us?
Which of the following statements concerning information resources is not correct?A. Information resources include all the hardware, information systems and applications, data, and networks in an organization.B. Without their information resources, organizations cannot function.C. Information resources typically do not change quickly.D. Information resources are expensive to acquire, operate, and maintain.
Ans: CRef: 2.4 Managing Information Resources
_____ is the direct use of information systems by employees in their work. A. Transaction processing systemsB. Executive information systemsC. Decision support systemsD. Management information systemsE. End-user computing
Ans: ERef: 2.4 Managing Information Resources
Dividing the responsibility for developing and maintaining information resources between the Information System Department and end users depends on all of the following except :A. Size of the organizationB. Amount and type of information resources in the organizationC. Organization’s revenue and profitsD. Organization’s attitude towards computingE. Maturity level of the organization’s information technologies
Ans: CRef: 2.4 Managing Information Resources
Which of the following is a traditional, major IS function?A. Managing systems development B. Partnering with the firm’s executivesC. Managing outsourcingD. Educating non-IS managers about ITE. Incorporating the Internet and electronic commerce into the business
Ans: ARef: 2.4 Managing Information Resources
The role of the director of the Information Systems Department is changing from more _____ to more _____.A. hands-on, managingB. technical, managerialC. operational, technicalD. hands-on, decision-makingE. managerial, technical
Ans: BRef: 2.4 Managing Information Resources
Technology Guide 1Multiple Choice
Which of the following is not a component of hardware?A. Primary and secondary storageB. The operating systemC. Input and output technologiesD. Central processing unitE. Communication technologies
11
Ans: BRef: TG1.2 The Central Processing Unit
Which of the following is not a component of the central processing unit? A. RegistersB. Control unitC. Secondary storageD. Arithmetic-logic unit
Ans: CRef: TG1.2 The Central Processing Unit
Processing speed increases with which of the following? A. Increased clock speedB. Increased bus widthC. Decreased line widthD. Increased word lengthE. All of the above
Ans: ERef: TG1.2 The Central Processing Unit
Processing speed increases with all the following except A. increased bus widthB. increased line widthC. increased clock speedD. increased word lengthE. none of the above
Ans: BRef: TG1.2 The Central Processing Unit
The _____ is measured in megahertz or gigahertz.A. clock speedB. word lengthC. bus widthD. line widthE. bandwidth
Ans: ARef: TG1.2 The Central Processing Unit
The _____ is the size of the physical paths down which the data and instructions travel in the CPU.A. clock speed
B. word lengthC. bus widthD. line widthE. bandwidth
Ans: CRef: TG1.2 The Central Processing Unit
The _____ is the distance between transistors on a chip.A. clock speedB. word lengthC. bus widthD. line widthE. bandwidth
Ans: DRef: TG1.2 The Central Processing Unit
Gordon Moore (with Moore’s Law) predicted that microprocessor complexity would do which of the following? A. Double every yearB. Double every two yearsC. Increase slowlyD. Decrease slowlyE. Decrease rapidly
Ans: BRef: TG1.2 The Central Processing Unit
Increased microprocessor complexity comes from which of the following?A. Decreasing line widthB. Increasing transistor miniaturizationC. Using new materials for the chip that increase conductivityD. Putting more transistors on the chipE. All of the above
Ans: ERef: TG1.2 The Central Processing Unit
The amount and type of memory that a computer possesses affects which of the following? A. The type of program the computer can runB. The speed of the computerC. The cost of the computerD. The cost of processing dataE. All of the above
12
Ans: ERef: TG1.3 Computer Memory
The amount and type of memory that a computer possesses affects all the following exceptA. the type of program the computer can runB. the speed of the computerC. the cost of the computerD. the cost of processing dataE. the speed of data entry
Ans: ERef: TG1.3 Computer Memory
Arrange in the correct sequence, from smallest to largest: A. megabyte – kilobyte – gigabyte – terabyte B. kilobyte – megabyte – terabyte – gigabyteC. kilobyte – megabyte – gigabyte – terabyteD. megabyte – terabyte – kilobyte – gigabyteE. kilobyte – gigabyte – megabyte – terabyte
Ans: CRef: TG1.3 Computer Memory
Primary storage stores which of the following for very brief periods of time? A. Data to be processed by the CPUB. Instructions for the CPU as to how to process the dataC. Operating system programs that manage various aspects of the computer’s operationsD. All of the above
Ans: DRef: TG1.3 Computer Memory
Which of the following is not stored in primary storage? A. Data to be processed by the CPUB. Instructions for the CPU as to how to process the dataC. Archival dataD. Operating system programsE. None of the above
Ans: CRef: TG1.3 Computer Memory
The main types of primary storage areA. RegisterB. Random access memoryC. Cache memoryD. Read-only memoryE. All of the above
Ans: ERef: TG1.3 Computer Memory
Which of the following is not a type of primary storage? A. RegisterB. Random access memoryC. Flash memoryD. Read-only memoryE. Cache memory
Ans: CRef: TG1.3 Computer Memory
The part of primary storage that holds a software program (or portion of it) and small amounts of data when they are brought from secondary storage is calledA. read-only memoryB. random access memoryC. cache memoryD. registersE. flash memory
Ans: BRef: TG1.3 Computer Memory
Random access memory is _____ and _____. A. volatile, temporaryB. nonvolatile, permanentC. nonvolatile, temporaryD. volatile, permanentE. None of the above
Ans: ARef: TG1.3 Computer Memory
Registers have all of the following characteristics exceptA. a type of primary storageB. least capacity storageC. store limited amounts of data
13
D. slower than RAME. none of the above
Ans: DRef: TG1.3 Computer Memory
Which of the following is not a type of primary storage? A. Random access memoryB. RegistersC. CacheD. Read-only memoryE. Optical Storage
Ans: ERef: TG1.3 Computer Memory
The type of primary storage, closest to the CPU where the computer can temporarily store blocks of data used most often is calledA. read-only memoryB. registersC. random access memoryD. cache memoryE. flash memory
Ans: DRef: TG1.3 Computer Memory
The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called A. read-only memoryB. random access memoryC. cache memoryD. registersE. flash memory
Ans: ARef: TG1.3 Computer Memory
Secondary storage has which of the following characteristics? A. NonvolatileB. More cost effective than primary storageC. Slower than primary storageD. Can utilize a variety of mediaE. All of the above
Ans: ERef: TG1.3 Computer Memory
Which of the following is not a characteristic of secondary storage?A. NonvolatileB. More cost effective than primary storageC. Slower than primary storageD. Can utilize only chips as its mediumE. None of the above
Ans: DRef: TG1.3 Computer Memory
The characteristics of magnetic tape include all of the following except A. fastest magnetic storage mediumB. cheapest magnetic storage mediumC. sequential accessD. greater capacity than thumb drivesE. often used for archival storage
Ans: ARef: TG1.3 Computer Memory
If you wished to store a large amount of archival data for a long period of time, you would choose which of the following? A. Magnetic diskB. Magnetic tapeC. Read-only chipsD. Cache chipsE. Thumb drives
Ans: BRef: TG1.3 Computer Memory
To access a specific piece of information, _____ are usually faster than _____. A. sequential access storage devices, direct access storage devicesB. direct access storage devices, sequential access storage devicesC. streaming tape devices, DVDsD. optical storage devices, random access memoryE. sequential access storage devices, thumb drives
Ans: BRef: TG1.3 Computer Memory
14
_____, a type of enterprise storage system, links groups of hard drives to a specialized microcontroller, which coordinates the drives so they appear to be a single, logical drive.A. Redundant array of independent disksB. Storage area networkC. Network-attached storageD. Secondary storageE. Primary storage
Ans: ARef: TG1.3 Computer Memory
_____, a type of enterprise storage system, is an architecture for building dedicated networks that allow rapid and reliable access to storage devices by multiple servers.A. Redundant array of independent disksB. Storage area networkC. Network-attached storageD. Secondary storageE. Primary storage
Ans: BRef: TG1.3 Computer Memory
_____ are electronic storage devices that contain no moving parts.A. Hard drivesB. Flash memory devicesC. Magnetic tapeD. DVDsE. CDs
Ans: BRef: TG1.3 Computer Memory
The _____ of computers used vacuum tubes to store and process information.A. first generationB. second generationC. third generationD. fourth generationE. fifth generation
Ans: ARef: TG1.4 Computer Hierarchy
The _____ of computers used transistors to store and process information.A. first generationB. second generationC. third generationD. fourth generationE. fifth generation
Ans: BRef: TG1.4 Computer Hierarchy
The _____ of computers used integrated circuits for storing and processing information.A. first generationB. second generationC. third generationD. fourth generationE. fifth generation
Ans: CRef: TG1.4 Computer Hierarchy
The _____ of computers used massively parallel processing to process information.A. first generationB. second generationC. third generationD. fourth generationE. fifth generation
Ans: ERef: TG1.4 Computer Hierarchy
To model the weather or simulate nuclear weapons testing, you would most likely use a A. mainframe computerB. workstationC. supercomputerD. personal computerE. active badge
Ans: CRef: TG1.4 Computer Hierarchy
A _____ refers to computers with the most processing power available.A. SupercomputerB. MainframeC. Midrange computerD. Microcomputer
15
E. Laptop computer
Ans: ARef: TG1.4 Computer Hierarchy
An example of a computer system designed to accommodate multiple users simultaneously is a _____. A. microcomputerB. mainframeC. laptopD. palmtopE. wearable computer
Ans: BRef: TG1.4 Computer Hierarchy
A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users.A. supercomputerB. mainframeC. midrange computerD. microcomputerE. laptop computer
Ans: BRef: TG1.4 Computer Hierarchy
Many firms are recentralizing their applications to mainframes for which of the following reasons? A. To support the large number of transactions caused by electronic commerceB. To reduce the total cost of ownership of distributed systemsC. To simplify administration of IT resourcesD. To improve system performanceE. all of the above
Ans: ERef: TG1.4 Computer Hierarchy
Firms are recentralizing their applications to mainframes for all the following reasons exceptA. to support the large number of transactions caused by electronic commerceB. to reduce the total cost of ownership of distributed systemsC. to more adequately support end-user computingD. to improve system performance
E. none of the above
Ans: CRef: TG1.4 Computer Hierarchy
_______ can be subdivided into five classifications based on their size: desktops, thin clients, notebooks and laptops, and ultra-mobile PCs. A. SupercomputerB. MainframeC. MinicomputerD. Microcomputer/Personal Computer
Ans: DRef: TG1.4 Computer Hierarchy
A _____ is the least expensive general-purpose computer.A. supercomputerB. mainframeC. midrange computerD. microcomputer/personal computerE. None of the above Ans: DRef: TG1.4 Computer Hierarchy
_____ applies the unused processing resources of many geographically dispersed computers in a network to form a virtual supercomputer.A. Server farmB. VirtualizationC. Grid computingD. Utility/Subscription computingE. The Internet
Ans: CRef: TG1.6 Innovations in Hardware Utilization
In _____, a service provider makes computing resources and infrastructure management available to a customer as needed.A. server farmB. virtualizationC. grid computingD. utility/subscription computingE. the Internet
Ans: DRef: TG1.6 Innovations in Hardware Utilization
16
_____ is the process in which parts of Web site content and processing are located close to the user to decrease response time and lower processing costs.A. Edge computingB. VirtualizationC. Grid computingD. Utility computingE. The Internet
Ans: ARef: TG1.6 Innovations in Hardware Utilization
_____ refers to the creation of materials, devices, and systems on a scale of billionths of a meter.A. NanotechnologyB. Ultra-large scale integrationC. Very-large scale integrationD. Utility computingE. Edge computing
Ans: ARef: TG1.6 Innovations in Hardware Utilization
Technology Guide 2Multiple Choice
Over the past twenty years, hardware costs have _____, while software costs have _____. A. increased, increasedB. decreased, decreasedC. decreased, increasedD. increased, decreasedE. increased, remained level
Ans: CRef: TG2.1 Significance of Software
Today, software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s for which of the following reasons? A. Hardware costs have decreasedB. Hardware performance has increasedC. Software has become increasingly complexD. Building software applications remains slow, complex, and error-proneE. All of the above
Ans: ERef: TG2.1 Significance of Software
_____ is a written description of a computer program’s functions.A. Explanatory instructionsB. DocumentationC. Graphical user interfaceD. Plug and playE. README files
Ans: BRef: TG2.1 Significance of Software
Unlike the hardwired computers of the 1950s, modern software uses the _____, where computer programs are executed in the computer’s CPU.A. Stored program conceptB. MultitaskingC. MultithreadingD. MultiprogrammingE. Plug and play
Ans: ARef: TG2.1 Significance of Software
The _____ complexity of software means a _____ potential for errors.A. decreasing, decreasingB. decreasing, increasingC. increasing, decreasingD. increasing, levelE. increasing, increasing
Ans: ERef: TG2.1 Significance of Software
_____ are sequences of instructions used to direct the workings of a computer. A. Computer programsB. Microcode instructionsC. Assembler commandsD. XMLE. Input/output instructions
Ans: ARef: TG2.1 Significance of Software
The set of computer programs used to manage hardware resources is calledA. Microsoft Office SuiteB. application software
17
C. general softwareD. systems softwareE. personal application software
Ans: DRef: TG2.1 Significance of Software
The set of computer instructions that provides specific functionality to a user is calledA. transaction processing softwareB. application softwareC. general softwareD. systems softwareE. microcode
Ans: BRef: TG2.1 Significance of Software
Which of the following is not a function of the operating system?A. Allocates CPU time and main memory to programs running on the computerB. Provides an interface between the user and the hardwareC. Supervises the overall operation of the computerD. Increases the complexity of the system to the userE. None of the above
Ans: DRef: TG2.2 Systems Software
The main system control program is the _____.A. operating systemB. cache softwareC. virtual memoryD. security monitorE. multithread register
Ans: ARef: TG2.2 Systems Software
Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what? A. ROMB. EPROMC. Extended memoryD. RAME. The registers
Ans: DRef: TG2.2 Systems Software
_____ means that several parts of the same application can work simultaneously. A. MultithreadingB. MultitaskingC. Time-sharingD. ScalabilityE. Multiprocessing
Ans: ARef: TG2.2 Systems Software
_____ occurs when a computer system with two or more processors runs more than one program, or thread, at a given time by assigning them to different processors.A. MultithreadingB. MultitaskingC. Time-sharingD. ScalabilityE. Multiprocessing
Ans: ERef: TG2.2 Systems Software
_____ means that two or more programs can run on the computer system at the same time.A. NultithreadingB. NultitaskingC. Time-sharingD. ScalabilityE. Multiprocessing
Ans: BRef: TG2.2 Systems Software
The _____ allows users to exert direct control of icons on the computer screen.A. systems softwareB. application softwareC. graphical user interfaceD. plug-and-playE. operating system
Ans: CRef: TG2.2 Systems Software
18
_____ are programs that sort records, create directories and sub-directories, restore accidently deleted files, and manage memory usage.A. System utilitiesB. General application softwareC. Personal application softwareD. System performance monitorsE. System security monitors
Ans: ARef: TG2.2 Systems Software
_____ are programs that manage the processing of jobs on a computer system.A. System utilitiesB. General application softwareC. Personal application softwareD. System performance monitorsE. System security monitors
Ans: DRef: TG2.2 Systems Software
_____ are programs that protect a computer system from unauthorized use, fraud, and destruction.A. System utilitiesB. General application softwareC. Personal application softwareD. System performance monitorsE. System security monitors
Ans: ERef: TG2.2 Systems Software
Creating specific application software using an organization’s own resources is called what?A. OutsourcingB. Consultant-based developmentC. In-house developmentD. Contract softwareE. Application service providers
Ans: CRef: TG2.3 Application Software
Off-the-shelf software _____.A. may not match an organization’s current work processes and dataB. is more flexible in making modifications
C. requires more risk because all features and performance are not knownD. is rarely tested prior to release
Ans: ARef: TG2.3 Application Software
_____ programs are often used when analyzing financial data. A. DatabaseB. Word processingC. SpreadsheetD. GraphicsE. Communications
Ans: CRef: TG2.3 Application Software
Which of the following is not a characteristic of today’s typical software?A. EfficientB. Full of errorsC. Poorly designedD. ExpensiveE. An art as well as a science
Ans: ARef: TG2.4 Software Issues
Which of the following is not a factor in the selection of software?A. Size and location of the user baseB. Number of the databases required for the softwareC. CostsD. In-house technical skillsE. System capabilities
Ans: BRef: TG2.4 Software Issues
The concept of _____ refers to competing computing products working together.A. open source softwareB. software-as-a-serviceC. object oriented softwareD. application software packageE. open systems
Ans: ERef: TG2.4 Software Issues
19
In order to protect their software from illegal distribution, vendors often rely on _____ A. encryptionB. private security agentsC. software licensingD. Internet-based distribution methods
Ans: CRef: TG2.4 Software Issues
_____ is software whose source code is available at no cost to developers and users.A. FreewareB. SharewareC. Open systemsD. Open source softwareE. Software-as-a-service
Ans: DRef: TG2.4 Software Issues
Which of the following is not an advantage of open-source software?A. Produces high quality codeB. Produces code that can be changed to meet the needs of the usersC. Bugs are discovered quicklyD. Limited support is available only through online communities of core developersE. Produces reliable code
Ans: DRef: TG2.4 Software Issues
Which of the following is not a disadvantage of open-source software?A. Organizations need in-house technical support or a maintenance contract from a third partyB. May not be easy to useC. May take time and money to train usersD. May not be compatible with existing systemsE. Runs slower than comparable vendor-developed software
Ans: ERef: TG2.4 Software Issues
_____ is copyrighted software that is made available to the user at no cost for an unlimited period of time.A. FreewareB. SharewareC. Open systemsD. Open source softwareE. Software-as-a-service
Ans: ARef: TG2.4 Software Issues
_____ is software that typically allows no access to the underlying source code.A. FreewareB. SharewareC. Open systemsD. Open source software
Ans: BRef: TG2.4 Software Issues
Developers use _____ to write new application and systems software. A. code generatorsB. appletsC. programming languagesD. developer workbenches
Ans: CRef: TG2.5 Programming Languages
Which programming language uses mnemonics such as SUB for subtract and MOV for move to help users with programming?A. Machine languageB. Assembly languageC. Procedural languageD. Non-procedural languageE. Visual programming language
Ans: BRef: TG2.5 Programming Languages
Which programming language consists entirely of 0’s and 1’s?A. Machine languageB. Assembly languageC. Procedural languageD. Non-procedural languageE. Visual programming language
20
Ans: ARef: TG2.5 Programming Languages
Place the following programming languages in order of programmer ease of use, from easiest to most difficult: A. machine language – assembly language – procedural language – non-procedural languageB. assembly language – machine language – procedural language – non-procedural languageC. non-procedural language – procedural language – assembly language – machine languageD. non-procedural language – procedural language – machine language – assembly languageE. procedural language – machine language – non-procedural language – assembly language
Ans: CRef: TG2.5 Programming Languages
Languages that use icons, symbols, and pull-down menus to develop applications are called _____A. object-oriented languagesB. second generation languagesC. visual programming languagesD. JavaE. third generation languages
Ans: CRef: TG2.5 Programming Languages
In an object-oriented language, one of the primary advantages of an object is that it contains _____ A. reusable codeB. reusable dataC. embedded graphicsD. messagesE. no errors
Ans: ARef: TG2.5 Programming Languages
Which of the following is not a benefit of Java to organizations?A. Companies need to purchase only one network copy of softwareB. Companies will need powerful personal computers for their employees
C. Companies will have better control over their data and applicationsD. Software management will be easierE. None of the above
Ans: BRef: TG2.5 Programming Languages
Chapter 4Multiple Choice
In the opening case of Chapter 4, which of the following are problems that Panasonic faces when it wants to introduce a new product?A. The company has multiple sales subsidiaries and manufacturing facilities.B. The company has difficulties procuring the right materials from the right sources.C. Language barriers.D. The amount of time required to modify product materials for national product releases.E. All of the above.
Ans: ERef: Chapter opening case
In the opening case of Chapter 4, what is the most significant benefit of Panasonic’s new data management system?A. Cost savingsB. Improved time-to-market for productsC. Reduced time required for creating and maintaining product informationD. Company moved from “push” inventory model to “pull” modelE. Improved response to retailer orders
Ans: BRef: Chapter opening case
It is very difficult to manage data for which of the following reasons? A. amount of data stays about the same over timeB. data are scattered throughout organizationsC. decreasing amount of external data needs to be consideredD. data security is easy to maintainE. data are stored in the same format throughout organizations
Ans: B21
Ref: 4.1 Managing Data
When customers access a Web site and make purchases, they generate _____:A. Tracking cookiesB. InformationC. Clickstream dataD. Web dataE. Hyperlink data
Ans: CRef: 4.1 Managing Data
Place the following members of the data hierarchy in the correct order: A. bit – byte – field – record – database – file/tableB. bit – field – byte – record – file/table – databaseC. byte – bit – record – field – databaseD. bit – byte – field – record – file/table – databaseE. bit – record – field – byte – file/table -- database
Ans: DRef: 4.2 The Database Approach
Verifying that no alphabetic characters are in a Social Security Number field is an example of _____ :A. data isolationB. data integrityC. data consistencyD. data redundancyE. application/data dependence
Ans: BRef: 4.2 The Database Approach
_____ occurs when applications cannot access data associated with other applications.A. Data isolationB. Data integrityC. Data consistencyD. Data redundancyE. Application/data dependence
Ans: ARef: 4.2 The Database Approach
_____ occurs when the same data are stored in many places.A. Data isolation
B. Data integrityC. Data consistencyD. Data redundancyE. Application/data dependence
Ans: DRef: 4.2 The Database Approach
_____ occurs when various copies of the data agree.A. Data isolationB. Data integrityC. Data consistencyD. Data redundancyE. Application/data dependence
Ans: CRef: 4.2 The Database Approach
You have moved to a different apartment, but your electricity bill continues to go to your old address. The Post Office in your town has a problem with its data management, which is:A. Data redundancyB. Data inconsistencyC. Data isolationD. Data securityE. Data dependence
Ans: BRef: 4.2 The Database Approach
A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number.A. byteB. fieldC. recordD. fileE. database
Ans: BRef: 4.2 The Database Approach
A(n) _____ is a logical grouping of related/similar fields.A. byteB. fieldC. recordD. fileE. database
22
Ans: CRef: 4.2 The Database Approach
A(n) _____ is a logical grouping of related/similar records.A. byteB. fieldC. recordD. file/tableE. database
Ans: DRef: 4.2 The Database Approach
A(n) _____ represents a character, such as a letter, number, or symbol. A. byteB. fieldC. recordD. fileE. database
Ans: ARef: 4.2 The Database Approach
In a database, the primary key field is used to _____: A. specify an entityB. create linked listsC. identify duplicated dataD. uniquely identify a recordE. uniquely identify an attribute
Ans: DRef: 4.2 The Database Approach
As an individual student in your university’s student database, you are a(n) _____ of the STUDENT class.A. instanceB. individualC. representativeD. entityE. relationship
Ans: ARef: 4.2 The Database Approach
At Umass, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship?
A. one-to-oneB. one-to-manyC. many-to-oneD. many-to-manyE. some-to-many
Ans: DRef: 4.2 The Database Approach
In a university’s relational database, the student record contains information regarding the student’s last name. The last name is a(n): A. attributeB. entityC. primary keyD. objectE. file
Ans: ARef: 4.2 The Database Approach
In the relational database model, related tables can be joined when they contain common _____.A. FilesB. RowsC. RecordsD. Columns
Ans: DRef: 4.3 Database Management Systems
_____ tell the database management system which records are joined with others in related tables.A. Primary keysB. Secondary keysC. Common attributesD. Common filesE. Common fields
Ans: ARef: 4.3 Database Management Systems
Data dictionaries perform all of the following functions except:A. Provide information on each recordB. Provide information on why attributes are needed in the databaseC. Define the format necessary to enter data into the databaseD. Provide information on name of attributes
23
E. Provide information on how often attributes should be updated
Ans: ARef: 4.3 Database Management Systems
In a relational database, every row represents a _____:A. fileB. recordC. attributeD. primary keyE. secondary key
Ans: BRef: 4.3 Database Management Systems
A standardized language used to manipulate data is _____: A. MS-AccessB. OracleC. query-by-example languageD. structured query languageE. data manipulation language
Ans: DRef: 4.3 Database Management Systems
Data dictionaries provide which of the following advantages to the organization? A. reduce data inconsistencyB. provide for faster program developmentC. make it easier to modify data and informationD. all of the above
Ans: DRef: 4.3 Database Management Systems
_____ is a method for analyzing and reducing a relational database to its most streamlined form.A. Structured queryB. NormalizationC. Query by exampleD. JoiningE. Relational analysis
Ans: BRef: 4.3 Database Management Systems
When data are normalized, attributes in the table depend only on the _____.A. Common record B. Common attributeC. Primary keyD. Common row
Ans: CRef: 4.3 Database Management Systems
The data in a data warehouse have which of the following characteristics? A. are organized by subjectB. are coded in different formatsC. are updated in real timeD. are typically retained for a defined, but limited, period of timeE. are organized in a hierarchical structure
Ans: ARef: 4.4 Data Warehousing
The data in a data warehouse:A. Are updated constantly in real timeB. Are updated in batch mode, approximately once per dayC. Are not updatedD. Are purged constantly as new data enterE. Are available for MIS analysts, but not users
Ans: CRef: 4.4 Data Warehousing
The process of moving data from various sources into the data warehouse is called:A. UploadB. Extract, transform, loadC. Online transaction processingD. Master data managementE. Online analytical processing
Ans: BRef: Data Warehousing
Compared to data warehouses, data marts have which one of the following characteristics? A. cost lessB. have longer lead time for implementationC. have central rather than local controlD. contain more information
24
E. are harder to navigate
Ans: ARef: 4.4 Data Warehousing
_____ is a formal approach to managing data consistently across an entire organization.A. Database managementB. Enterprise information managementC. Data warehousingD. Data governanceE. Data mart
Ans : DRef : Data GovernanceDifficulty : Easy
_____ provides companies with a single version of the truth for their data.A. Data warehouseB. Data martC. DatabaseD. Master data managementE. Enterprise information management
Ans: DRef: 4.5 Data Governance
_____ describe the activities of the business, where _____ categorize, aggregate, and evaluate data generated by the organization’s activities.A. Transaction data, master dataB. Source data, transaction dataC. Operational data, master dataD. Master data, source dataE. Business dimensional data, databases
Ans: ARef: 4.5 Data Governance
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization’s memory and typically reside inside the organization in an unstructured manner. A. discoveryB. knowledge managementC. decision supportD. online analytical processingE. data mining
Ans: BRef: 4.6 Knowledge Management
Explicit knowledge has which of the following characteristics? A. objective and codifiedB. personalC. slowD. costly to transferE. ambiguous
Ans: ARef: 4.6 Knowledge Management
Tacit knowledge has which of the following characteristics?A. codifiedB. objectiveC. unstructured D. rationalE. technical
Ans: CRef: 4.6 Knowledge Management
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. A. tacitB. explicitC. managerialD. geographicalE. cultural
Ans: BRef: 4.6 Knowledge Management
The most important benefit of knowledge management systems is:A. Improved customer serviceB. Make best practices available to employeesC. Retention of scarce knowledge if employees retireD. Improved moraleE. More efficient product development
Ans: BRef: Knowlege Management
25