Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Which type of information system provides methods for analyzing data warehouses to better understand various aspects of a business? A) Office Automation System B) Transaction Processing System C) Data mining and visualization system D) Electronic Commerce System
1)
2) Which type of information system supports the coordination of suppliers, product or service production, and distribution? A) Supply Chain Management System B) Functional Area Information System C) Customer Relation Management System D) Enterprise Resource Planning System
2)
3) IS personnel today exhibit the ability to integrate all of the following skill areas EXCEPT: A) financial. B) systems. C) business. D) technical.
3)
4) Which IS manager is responsible for managing IS services such as help desks, hot lines, training, consulting, and so on? A) Systems manager B) Maintenance manager C) Account executive D) Information center manager
4)
5) Information systems are combinations of ________ that people build and use to collect, create, and distribute useful data, typically in organizational settings. A) telecommunications networks B) hardware C) software D) all of the above
5)
6) Which IS manager is responsible for forecasting technology trends and for evaluating and experimenting with new technologies? A) Maintenance manager B) Manager of emerging technologies C) IS planning manager D) Telecommunications manager
6)
7) Which IS manager is responsible for coordinating and managing the entire voice and data network? A) Operations manager B) Database administrator C) Network manager D) Telecommunications manager
7)
8) Nicholas Carr argued that as IT becomes more pervasive, it will become more: A) unique. B) ubiquitous. C) unusual. D) unnecessary.
8)
9) Hot skills in the technology and infrastructure domain include all EXCEPT: A) systems design. B) systems auditing. C) systems analysis. D) systems testing.
9)
10) Which of the following is FALSE regarding professionals who work with information? A) Continuous learning is essential because of changing information needs. B) They generally make more money than their agricultural or industrial counterparts. C) The number of information workers is declining. D) They have better career opportunities.
1
10)
11) All of the following categories used to describe information systems cannot be easily categorized EXCEPT: A) enterprise resource planning systems. B) customer relationship management systems. C) supply chain management systems. D) executive information systems.
11)
12) Which type of information system is used to produce detailed information to help manage a firm or a part of the firm? A) Executive Information System B) Transaction Processing System C) Enterprise Resource Planning System D) Management Information System
12)
13) Which type of information system enables customers to buy goods and services from a firm's Web site? A) Office Automation System B) Transaction Processing System C) Customer Relation Management System D) Electronic Commerce System
13)
14) The technical competency area for IS professionals includes: A) knowledge of Web design. B) knowledge of business processes. C) knowledge and skills in networking, hardware, and software. D) All of the above
14)
15) Which type of information system is used to emulate or enhance human capabilities? A) Decision Support System B) Expert System C) Executive Information System D) Intelligent System
15)
16) Which IS manager is responsible for managing ethical and legal use of information systems within the firm? A) CIO B) Auditing or computer security manager C) IS planning manager D) Quality assurance manager
16)
17) It was joked that CIO stood for "Career is Over" because of the high turnover rate of CIOs. The primary reasons for CIO dismissals was: A) CIOs tended to be technically- oriented but were ineffective managers. B) many CIOs could not keep up with constantly changing technologies and employee expectations. C) tightening budgets for technology and unrealistic expectations for CIOs by management. D) many CIOs left to take similar positions at dot- coms.
17)
18) In 1983, Apple launched the ________, which proved to be a commercial disaster. A) Liz B) Jane C) Lisa D) Mary Jane
18)
19) Which type of information system is used to support the functional areas within a firm? A) Enterprise Resource Planning System B) Functional Area Information System C) Transaction Processing System D) Customer Relation Management System
19)
2
20) Which type of information system comprises a collection of technology- based tools to enable the generation, storage, sharing, and management of knowledge assets? A) Expert System B) Data mining and visualization system C) Collaboration System D) Knowledge Management System
20)
21) In looking at the difference between technologies and information technologies, it should be noted that information technologies use ________ technologies as building blocks and then combines them with computing and networking technologies. A) computer B) machine C) system D) innovative
21)
22) What does one call the highest- ranking IS manager who is responsible for strategic planning and IS use throughout the firm? A) Project manager B) CIO C) IS director D) Webmaster
22)
23) Which IS manager is responsible for developing and monitoring standards and procedures to ensure that systems within the firm are accurate and of good quality? A) Quality assurance manager B) Project manager C) Auditing or computer security manager D) CIO
23)
24) In the "new economy" some people have access to information technology and others do not. This contrast over available technology is called: A) parity. B) the Internet gap. C) the wall of separation. D) the digital divide.
24)
25) Which type of information system is used to support executive- level decision making? A) Transaction Processing System B) Expert System C) Enterprise Resource Planning System D) Executive Information System
25)
26) Companies such as IBM, Electronic Data Systems (EDS), and Accenture (formerly Andersen Consulting) play an important support role in IS. These companies are known as: A) networking specialists. B) computer manufacturers. C) consulting firms. D) change agents.
26)
27) Which type of information system provides analysis tools and access to databases in order to support quantitative decision making? A) Expert System B) Decision Support System C) Intelligent System D) Executive Information System
27)
28) The book mentions all of the following as changes accompanying the move into the digital world EXCEPT: A) economic changes. B) cultural changes. C) technological changes. D) ecological changes.
28)
29) Today, information systems: A) are clearly delineated amongst these major systems categories. B) can not be categorized at all. C) often span several categories. D) clearly belong to two of the categories.
29)
3
30) When considering typical IS careers and salary ranges, job categories usually include the following EXCEPT: A) maintenance. B) development. C) sales. D) management.
30)
31) A ________ is a professional who is relatively well educated and creates, modifies, and/or synthesizes knowledge as a fundamental part of his/her job. A) knowledge worker B) technician C) Webmaster D) salesman
31)
32) Which of the flowing is NOT a product marketed by Apple? A) iPod B) iTunes C) Newton
32)
D) iDrive
33) Systems that support electronic commerce are considered: A) very popular and important. B) cumbersome to use and difficult to navigate. C) too complex. D) a declining fad.
33)
34) Office automation systems provide: A) personal productivity tools. C) spreadsheet tools.
34)
B) word processing tools. D) All of the above.
35) The information systems projects of both the U.S. Navy and Fedex were ________ in nature. A) strategic B) operational C) tactical D) large- scale
35)
36) Which executive- level person is responsible for overseeing and managing the organization's information systems? A) Chief Knowledge Officer B) Chief Technology Officer C) Chief Operations Officer D) Chief Information Officer
36)
37) Which IS manager is responsible for supervising the day- to - day operations of the data and/or computer center? A) Systems manager B) Operations manager C) IS planning manager D) Account executive
37)
38) Which IS manager is responsible for coordinating and managing all systems maintenance projects? A) Maintenance manager B) Systems programming manager C) Webmaster D) Operations manager
38)
39) Unprocessed, unformatted words and numbers are known as: A) information. B) inputs. C) raw material.
39)
40) CIO stands for: A) Corporate Information Online. C) Corporate Identification Office.
D) data.
B) Chief Information Officer. D) Chief Intelligence Officer.
41) Which type of information system supports the interaction between a firm and its customers? A) Customer Relation Management System B) Office Automation System C) Electronic Commerce System D) Transaction Processing System
4
40)
41)
42) Which IS manager is responsible for managing the firm's World Wide Web site? A) Webmaster B) Network manager C) Database administrator D) Telecommunications manager
42)
43) A long unformatted number might be a phone number, a social security number, or a bank account number. When dashes, commas, or some other formatting features are added, the number becomes useful and meaningful. Thus, data has been transformed into ________. A) digits B) knowledge C) outputs D) information
43)
44) Which IS manager is responsible for coordinating applications programming efforts? A) Programming manager B) Operations manager C) Project manager D) Systems programming manager
44)
45) The field of information systems includes persons who perform all of the following EXCEPT A) designing and building computer systems. B) purchasing. C) programming. D) systems analysis.
45)
46) One thing that has forced IS people to improve both their operations and their relationship with users is: A) users had started developing their own applications. B) changes in technology. C) the shift from mainframe computers to client/server computing. D) All of the above
46)
47) Which type of information system is used to support day- to - day business event data at the operational level of the organization? A) Management Information System B) Executive Information System C) Enterprise Resource Planning System D) Transaction Processing System
47)
48) Rightsizing is another term for ________ A) downsizing. B) replacing human employees with machines and technology. C) staffing IS personnel within boundary spanners. D) outsourcing.
48)
49) Over the last few decades, the relationship between technical workers and their internal corporate clients has ________. A) become more strained B) ceased to exist C) continued to be a problem D) gradually improved
49)
50) While some IS professionals have only technical skills, others stand out for having a quality that enables them to understand (1) systems development and integration, (2) complex problem solving, and (3) management of technical personnel. This quality is called: A) management. B) systems development. C) systems competency. D) technical smarts.
50)
5
51) Which type of information system is used to create, store, and analyze spatial data? A) Knowledge Management System B) Data mining and visualization system C) Expert System D) Geographic Information System
51)
52) Which of the following is considered to be one of the more traditional categories that are used to describe information systems? A) decision support systems. B) management information systems. C) transaction processing systems. D) All of the above.
52)
53) Systems competency is another area in which the IS professional can: A) solve complex problems and systems projects. B) show that they know how to build and integrate systems. C) manage those with only technical knowledge and skills. D) All of the above.
53)
54) Information systems are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in ________ settings. A) operational B) organizational C) global D) strategic
54)
55) Which IS manager is responsible for managing one piece of the enterprise- wide network? A) Network manager B) Telecommunications manager C) Operations manager D) IS planning manager
55)
56) Which IS manager is responsible for managing a particular existing system? A) Systems manager B) Information center manager C) Manager of emerging technologies D) Maintenance manager
56)
57) What do you call any mechanical and/or electrical means to supplement, extend, or replace human, manual operations or devices? A) Information management B) Internet C) Networking D) Technology
57)
58) Which IS manager is responsible for coordinating and managing all new systems projects? A) Operations manager B) Development manager C) Project manager D) Systems manager
58)
59) ________ enables you to apply concepts from one domain to a new situation or problem. A) Knowledge B) Wisdom C) Data D) Information
59)
60) In the last 10- 15 years which of the following challenges have faced CIOs? A) High dismissal rates (CIOs being fired) B) Unreasonable expectations C) Tight budgets D) All of the above
60)
61) The integration of economies throughout the world, enabled by technological progress, is called: A) globalization. B) equalization. C) integration. D) outsourcing.
61)
6
62) Which IS manager is responsible for managing the day- to - day operations of all aspects of IS within one particular division, plant, functional business area, or product unit? A) Account executive B) IS director C) Maintenance manager D) Systems Programming manager
62)
63) Which IS manager is responsible for managing a particular new systems project? A) Systems manager B) Operations manager C) Development manager D) Project manager
63)
64) The business competency area for IS professionals: A) sets them apart from others who have only technical skills. B) is more strategic than technical. C) is the easiest to outsource. D) None of the above.
64)
65) From simplest to most complex, which is the proper order? A) Data, information, wisdom, knowledge B) Knowledge, data, wisdom, information C) Information, data, wisdom, knowledge D) Data, information, knowledge, wisdom
65)
66) Our "new economy" has been described as a knowledge society. The key factor in building a knowledge society is: A) money. B) education. C) the Internet. D) politics.
66)
67) Machine technology that is controlled by or uses information is called: A) a network. B) information technology. C) hardware. D) process automation.
67)
68) Which IS manager is responsible for coordinating support for maintenance of all systems software (for example, operating systems, utilities, programming languages, and so on)? A) Operations manager B) Project manager C) Network manager D) Systems programming manager
68)
69) Which IS manager is responsible for managing database and database management software use? A) Network manager B) Database administrator C) Development manager D) Systems manager
69)
70) Which of the following is NOT true about knowledge? A) Knowledge is needed to understand relationships between different pieces of information. B) Knowledge is a body of governing procedures. C) Knowledge is used to organize or manipulate data. D) Knowledge is accumulated wisdom.
70)
71) Which type of information system supports and integrate all facets of the business, including planning, manufacturing, sales, marketing, and so on? A) Transaction Processing System B) Customer Relation Management System C) Functional Area Information System D) Enterprise Resource Planning System
71)
7
72) Which IS manager is responsible for developing an enterprise- wide hardware, software, and networking architecture and for planning for systems growth and change? A) Telecommunications manager B) IS planning manager C) Manager of emerging technologies D) Network manager
72)
73) Outsourcing is: A) when jobs are done by employees outside of normal working hours. B) when jobs are performed by lower paid workers in other countries. C) when jobs are performed by workers using the Internet. D) when work is done by employees working from home as opposed to the office.
73)
74) With the Macintosh 128K, Apple introduced the first ________ to the mass market. A) flash drive B) computer mouse C) touch screen D) ergonomic keyboard
74)
75) The Apple I included the following innovation: ________. A) keyboard B) color graphics C) floppy disk drive D) all of the above
75)
76) ________ is/are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings. A) Routers B) Business C) Technology D) Information Systems
76)
77) What is the long- term career outlook for information systems workers? A) IS workers will be in high demand. B) Huge layoffs are anticipated. C) A dot- com hiring boom is expected. D) The demand for tech workers will be stagnant.
77)
8
Answer Key Testname: UNTITLED1 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
C A A D D B D B D C D D D C D B C C B D B B A D D C B D C C A D A D A D B A D B A A D A B D D A D C 9
Answer Key Testname: UNTITLED1 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) 67) 68) 69) 70) 71) 72) 73) 74) 75) 76) 77)
D D D B A A D B B D A A D A D B B D B D D B B B D D A
10
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Wal- Mart has recently introduced ________ tags into their supply chain. A) RFID B) price C) CSID
D) anti- theft
1)
2) A ________ business strategy is best suited for operation in markets differing widely. A) global B) transnational C) multidomestic D) All strategies are equally well suited.
2)
3) Which of the following is a weakness of the transnational business strategy? A) Personnel overhead. B) Difficult to manage. C) Differing product offerings limit economies of scale. D) Inability to react to local market conditions.
3)
4) The ________ industry benefited tremendously from the huge overinvestment in telecommunications infrastructure during the dot- com bubble. A) outsourcing B) on- shoring C) offshoring D) in- sourcing
4)
5) Dimensions on which cultures differ include: A) life focus. C) uncertainty avoidance.
5)
B) concept of time. D) all of the above.
6) Companies setting up entire factories in China is an example of ________. A) in- sourcing B) offshoring C) on- shoring 7) The first mainstream web browser was called: A) Netscape C) Firefox
D) outsourcing
6)
7)
B) Internet Explorer D) Opera
8) ________ reflects degree to which a society is characterized by masculine qualities, such as assertiveness, or by feminine characteristics, such as nurturance. A) Assertiveness B) Life focus C) Masculinity/femininity D) Nurturance
8)
9) A ________ information systems strategy is characterized by local databases. A) hybrid B) multinational C) transnational
9)
D) global
10) A ________ information systems strategy is characterized by multiple networks between the home office and the subsidiaries. A) hybrid B) transnational C) global D) multinational
10)
11) A transnational information systems strategy is characterized by ________ systems A) distributed B) homogeneous C) decentralized D) centralized
11)
1
12) De facto standards contributing to Globalization 3.0 include all of the following EXCEPT: A) Adobe Acrobat B) eBay C) PayPal D) Microsoft Word
12)
13) ________ is a cultural characteristic related to the risk- taking nature of a culture. A) Risk aversion B) Uncertainty avoidance C) Risk seeking D) Fear of future consequences
13)
14) Which of the Asian outsourcing destination countries has the highest relative geopolitical risk? A) Malaysia B) China C) Thailand D) Philippines
14)
15) The U.S. government attempts to isolate the Cuban government economically using ________. A) export regulations B) quotas C) embargoes D) tariffs
15)
16) Which of the following is a weakness of the multidomestic business strategy? A) Difficult to manage. B) Inability to react to local market conditions. C) Differing product offerings limit economies of scale. D) Personnel overhead.
16)
17) A multinational information systems strategy is characterized by ________ systems A) centralized B) distributed C) decentralized D) homogeneous
17)
18) Which of the following American outsourcing destination countries has the highest English proficiency? A) Mexico B) Argentina C) Brazil D) Costa Rica
18)
19) ________ is a cultural characteristic emphasizing the importance of the individual over the collective/group in society. A) Life focus B) Selfishness C) Egocentrism D) Individualism
19)
20) ________ reflects the extent to which a culture focuses on the quantity versus the quality of life. A) Life center B) Quantity of life orientation C) Life focus D) Quality of life orientation
20)
21) Web sites allowing users to add, remove, or edit content are called: A) online diaries. B) wikis. C) blogs.
21)
D) browsers.
22) Which of the following characteristics was not explicitly mentioned by Friedman in his book "The World is Flat?" A) The primary drivers of each phase of globalization. B) The primary entities globalizing in each phase of globalization. C) The regions globalizing. D) The increasing speed of globalization.
22)
23) Which of the following is NOT considered a geoeconomic challenge of operating in a digital world? A) Internet access B) Demographic C) Expertise D) Time zone differences
23)
2
24) ________ refers to the delegation of a company's core operations to a subcontractor that specializes in that operation. A) on- shoring B) outsourcing C) offshoring D) in- sourcing
24)
25) ________ are regulations permitting foreign businesses to export only a certain number of products to a specific country. A) Quotas B) Tariffs C) Export regulations D) Embargoes
25)
26) Using converted PDAs, casino guests will be able to gamble in all of the following situations EXCEPT: A) while being in their hotel room. B) while waiting in the ticket line for a nightly show. C) while waiting for the next course at dinner. D) while being at a meeting in the hotel's convention center.
26)
27) Foreign companies such as Toyota are producing goods in the U.S. to minimize the effect of: A) embargoes B) tariffs C) quotas D) export regulations
27)
28) Assembly plants located on the Mexican side of the U.S.- Mexican border are called: A) Mexinanitas B) Maquiladoras C) Fabricados D) Manufactorias
28)
29) Which of the flowing countries is NOT considered "enemy of the Internet" by the "Reporters without Borders"? A) Vietnam B) North Korea C) Thailand D) Belarus
29)
30) Which of the following countries ranks highest in individualism? A) Mexico B) Peru C) Australia
30)
D) Austria
31) The EU data protection directive is an example of which type of challenge? A) Political system B) Data sharing C) Individual freedom D) Regulatory
31)
32) Differences in network infrastructures throughout the world are an example of which type of challenge? A) Political system B) Infrastructure related reliability C) Regulatory D) Internet access and individual freedom
32)
33) Which of the following is most likely to be considered a domestic company? A) Car manufacturer B) Consumer goods company C) Barber shop D) Insurance company
33)
34) During Globalization 3.0, ________ were the primary entities globalizing. A) families B) countries C) companies D) individuals and small groups
34)
35) Which of the following outsourcing destinations has the lowest average annual salary for experienced programmers? A) Malaysia B) Philippines C) China D) India
35)
3
36) Which of the following is not a service that is being outsourced? A) Preparation of tax returns. B) Reading of X- rays. C) Telephone support. D) All of the activities above can be outsourced.
36)
37) A(n) ________ is a type of export regulation concerning the flow of goods and services, typically limiting (or prohibiting) trade with one particular country. A) quota B) export regulation C) tariff D) embargo
37)
38) Products such as missile or encryption technology underlie ________. A) quotas B) embargoes C) tariffs D) export regulations
38)
39) ________ are government- imposed fees to regulate the flow of goods and services in and out of a country A) Quotas B) Tariffs C) Export regulations D) Embargoes
39)
40) ________ are directed at limiting the export of certain goods to other countries. A) Export regulations B) Quotas C) Embargoes D) Tariffs
40)
41) A global information systems strategy is characterized by ________ systems A) homogeneous B) centralized C) decentralized
41)
D) distributed
42) Which of the following is a reason for companies to outsource business activities? A) To outsource noncore activities B) To increase process efficiencies C) To reduce time to market D) All of the above.
42)
43) Which of the following events interrupted Globalization 2.0? A) World War I B) The Great Depression C) World War II D) All of the above.
43)
44) ________ is a cultural characteristic that reflects the extent to which a culture has a longer- or shorter- term orientation. A) Concept of time B) Time focus C) Life focus D) Punctuality
44)
45) Which of the following is a weakness of the global business strategy? A) Differing product offerings limit economies of scale. B) Difficult to manage. C) Personnel overhead. D) Inability to react to local market conditions.
45)
46) ________ is a cultural characteristic emphasizing the importance of the collective/group over the individual in society. A) Group think B) Collectivism C) Power distance D) Uncertainty avoidance
46)
4
47) The fall of the Berlin wall: A) marked the end of the Cold War. B) gave companies access to a talented labor pool. C) opened up new markets for products. D) all of the above.
47)
48) ________ is a cultural characteristic related to how different societies view authority and hierarchical structures. A) Obesity B) Power distance C) Authoritarianism D) Obedience
48)
49) A ________ information systems strategy is characterized by data sharing between the home office and the subsidiaries. A) transnational B) hybrid C) multinational D) global
49)
50) The EU data protection directive limits: A) personal rights to access data. C) transborder data flows.
50)
B) electronic commerce. D) Internet freedom.
51) During Globalization 1.0, ________ were the primary entities globalizing. A) families B) companies C) countries D) individuals and small groups
5
51)
Answer Key Testname: UNTITLED1 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
A C B A D B A C B C A B B D C C A D D C B D A D A A C B C C B B C D D D D D B A C D D A D B D B A C 6
Answer Key Testname: UNTITLED1 51) C
7
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Companies like Wal- Mart, which offer products or services at competitive prices, are using a(n): A) differentiation strategy. B) low- cost leadership strategy. C) best- cost provider strategy. D) organizational strategy.
1)
2) Low cost leadership strategy, differentiation strategy, and best- cost provider strategy are examples of strategic planning for: A) TQM. B) competitive advantage. C) organizational learning. D) informating.
2)
3) Which of the following is NOT a source of competitive advantage? A) Achieving lower costs than rivals B) Superior customer service C) Having a well- known brand name D) Achieving higher costs than rivals
3)
4) New technologies that are anticipated to have an impact on businesses are called: A) emerging technologies. B) firmware. C) vaporware. D) innovative growth.
4)
5) Making the ________ is the process of building and presenting the set of arguments that show that an information system is adding value to the organization. A) organizational chart B) law case C) organizational case D) business case
5)
6) Companies like Target and Dell Computers, which offer the best prices for goods and/or services, are using a(n): A) best- cost provider strategy. B) low- cost leadership strategy. C) organizational strategy. D) differentiation strategy.
6)
7) The E- Business Innovation Cycle questions the conventional wisdom that: A) databases can keep pace with rapid technological changes. B) emerging technologies are useful. C) marketing dictates which type of technology should be used. D) economic opportunities exist.
7)
8) The largest recurring costs are usually: A) software costs. C) personnel costs.
8)
B) marketing costs. D) computer equipment costs.
9) Productivity from information systems is difficult to demonstrate because: A) a time lag may occur between system implementation and the time when benefits are realized. B) effectiveness improvements are difficult to measure. C) IS may benefit a particular firm, but not the industry as a whole. D) All of the above.
1
9)
10) A company is said to have ________ when it has gained an edge over its rivals. A) a monopoly B) a computer advantage C) profitability D) a competitive advantage
10)
11) "Making the business case" for an information system means: A) choosing the best organizational strategy. B) choosing the best information system. C) conducting business process reengineering (BPR). D) identifying the value provided by an information system to the organization or its constituents.
11)
12) What type of argument is this: "This analysis shows that implementing the inventory control system will reduce errors by 50% and pay for itself within 18 months"? A) An argument based on faith B) An argument based on fact C) An argument based on fear D) None of the above.
12)
13) ________ are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market. A) Processing Innovation. B) Innovator's Dilemm C) Disruptive Innovation D) Innovation Production.
13)
14) From a productivity standpoint, system efficiency is an important concept. A problem associated with system efficiency is: A) the difficulty in measuring benefits associated with the system. B) it is often confused with customer relationship management. C) that management doesn't understand or doesn't care about system efficiency. D) that system efficiency is hampered by computer speed.
14)
15) The example of VHS video cassette recorders (VCRs) winning out the marketplace over technologically superior Betamax illustrates that: A) the best products always win the battle for consumer products. B) technology is more important than marketing. C) emerging technology always entails risk. D) VCRs follow the E - Business Innovation Cycle.
15)
16) When making a successful business case, "Arguments based on beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on" are known as: A) arguments based on fear. B) arguments based on faith. C) arguments based on fact. D) None of the above.
16)
17) Technology is said to ________ when it provides information about its operation and the underlying work process that it supports. A) dominate B) informate C) conglomerate D) innovate
17)
18) When employees in a business unit (e.g., Accounting or Human Resources) assist in the creation of an information system it is called: A) a vendor- bender. B) end- user development. C) business unit production. D) efficiency planning.
18)
2
19) In order to be successful, an organization needs to: A) differentiate themselves from the competition B) focus investments on information systems and technologies C) have a clear vision. D) All of the above
19)
20) In a corporate setting, "________" involves forming a vision of where the organization needs to head, setting objectives and performance targets, and crafting a strategy to achieve the desired results. A) competitive advantage B) strategic planning C) best- cost provider D) total quality management
20)
21) Costs that are one - time costs that are not expected to continue after the system is implemented are called: A) tangible costs. B) nonrecurring costs. C) intangible costs. D) recurring costs.
21)
22) When considering the best technology to fit with a competitive strategy, would computer- aided design be a good fit with a low- cost leader strategy? A) No. B) Yes. C) Sometimes, it depends on the type of organization. D) Low- cost leader is not a typical organizational strategy.
22)
23) For an organization to deploy emerging information systems successfully they must have: A) a tolerance of uncertainty. B) a tolerance for risk. C) a tolerance of problems. D) All of the above.
23)
24) Which of the following is NOT improving the value chain? A) Improving procurement processes B) Increasing operating costs C) Selling more products D) Minimizing marketing expenditures
24)
25) What type of argument is this: "If we don't implement this ERP system we'll get killed by our competitors because they're using these systems"? A) An argument based on fear B) An argument based on fact C) An argument based on faith D) None of the above.
25)
26) When managers make their business case for an information system, they usually base their arguments on all of the following EXCEPT: A) facts. B) faith. C) fear. D) freedom.
26)
27) The term ________ is generally used to mean the use of the Internet and related technologies that support interactive purchasing. The term ________ is used more broadly to mean the use of nearly any information technologies to support business. A) e- business, e- commerce B) e- technology, e- business C) e- commerce, e - business D) e- commerce, e - technology
27)
3
28) This group (vice presidents or higher) typically represents various stakeholders or interest groups within the organization. A) The steering committee B) Company executives C) IS managers D) Stockholders
28)
29) Porter's five forces include: A) competitors, customers, suppliers, new entrants, substitutes B) customers, suppliers, distributors, middlemen, stockholders C) competitors, new entrants, customers, suppliers, distributors D) stockholders, suppliers, distributors, customers, competitors
29)
30) The prediction that the number of transistors that could be squeezed onto a silicon chip (which correlates to microchip processing speed) doubles every 18 months is called: A) a coincidence. B) competitive advantage. C) technological innovation. D) Moore's Law.
30)
31) The most effective approach is the: A) a combination of the technical and automating approaches. B) automating approach. C) learning approach. D) a combination of the automating and learning approaches.
31)
32) Benefits such as reduction in order entry errors, increase in the customer reach of a new Web- based system, etc. are examples of: A) intangible benefits. B) tangible benefits. C) nonrecurring costs. D) recurring costs.
32)
33) If you use measures of perceived value changes to the organization in the context of making a business case, you can communicate these differences in terms of percentages, increases, or decreases (whatever best conveys the benefits). These changes are demonstrated by using: A) proxy variables B) outside consultants C) work profile matrices D) steering committees
33)
34) An example of IS mismanagement is: A) relying on technology to fix a problem that is really fundamental to the business process. B) building a bad system. C) implementing a system poorly. D) All of the above.
34)
35) In the last few decades, it has often been observed that while IS expenditures (salaries, number of IS staff, etc.) have risen, productivity has not increased at the same rate. This observation is referred to as: A) the cost of doing business. B) the "productivity paradox." C) underperformance. D) inflation.
35)
36) All of the following are competitive forces from Porter's Competitive Forces model EXCEPT: A) potential new entrants into the market. B) substitute products. C) online sellers. D) bargaining power of suppliers.
36)
4
37) The four consecutive stages of Choosing, Matching, Executing, and Assessing make up the: A) E- Business Innovation Cycle. B) Executive Information System. C) Functional Area Assessment System. D) System Development Life Cycle.
37)
38) A(n) ________ allows organizations to track and learn trends, allowing for future planning of resource distribution. A) automating approach B) strategy approach C) learning approach D) efficient approach
38)
39) Technology is said to ________ when we take a manual process (done by hand) and use computers to perform the task. A) strategize B) automate C) informate D) compete
39)
40) ________ costs are ongoing costs that occur throughout the life cycle of systems development, implementation, and maintenance. A) Infrastructure costs B) Recurring costs C) High risk costs D) Intangible costs
40)
41) A highly regulated industry can use IS to ________ and ensure compliance with regulations. A) reduce volatility B) mature its business C) become the dominant force D) control processes
41)
42) When making a successful business case, "Arguments based on the notion that if the system is not implemented, the firm will lose out to the competition or, worse, go out of business" are known as: A) arguments based on fact. B) arguments based on faith. C) arguments based on fear. D) None of the above.
42)
43) One of the best ways to make a business case for a new system is to: A) convert benefits to monetary terms. B) gain influence or control of the executive committee. C) take the CEO out to lunch and talk to him/her privately. D) take your case to corporate stockholders.
43)
44) A good strategy for making a business case is to: A) assess the value of the IT infrastructure. B) measure what is important to management. C) devise proxy variables. D) All of the above.
44)
45) When making a successful business case, "Arguments based on data, quantitative analysis, and/or indisputable factors" are known as: A) arguments based on fear. B) arguments based on fact. C) arguments based on faith. D) None of the above.
45)
46) Sir John Maddox was quoted in 1999 as saying, "The most important discoveries of the next 50 years are likely to be ones of which we cannot now ________." A) compute B) invent C) afford D) even conceive
46)
5
47) To be successful in e- business it is important to match new technologies with: A) new computers. B) new employees. C) economic opportunities. D) new businesses.
47)
48) In an organizational context, what is a value chain? A) Gaining a strategic advantage. B) The process of adding value throughout an organization. C) Administration of a business. D) Using technology to enhance operations.
48)
49) The five phases of value chain analysis include all of the following EXCEPT: A) sales and marketing. B) outbound logistics. C) service. D) computer technology.
49)
50) The reason IS expenditures have risen but productivity has not risen at the same pace is hard to explain. One or more of the contributing factors have to do with: A) management expectations of productivity gains are unrealistic. B) spending is out of control in most companies. C) government regulation, complex tax codes, more complex products, and employee behavior such as playing software games, Web- surfing, and e- mailing friends. D) new technology is harder to use and more complicated.
50)
51) Probably the most important factor that can affect IS investment is the nature of ________ in the industry. A) technology B) competition or rivalry C) marketing D) customer service
51)
52) Competitive advantage gained by using information systems is usually: A) long lasting because the E- Business Innovation Cycle is cyclical. B) short- lived because competitors can copy emerging information systems. C) permanent, because innovation tends to be ongoing. D) a slow process because technology changes slowly.
52)
53) ________ costs are those that are easily identified and that are easy to recognize and track. A) Recurring costs B) Tangible costs C) Nonrecurring costs D) Intangible costs
53)
54) ________ costs are those that are hard to quantify, that is, they are difficult to evaluate and track. A) Tangible costs B) Nonrecurring costs C) Recurring costs D) Intangible costs
54)
55) A system that uses the Internet for business- to - business interaction is called a(n): A) network topology. B) extranet. C) intranet. D) privileged network.
55)
6
56) The most common way to make an argument based on fact, where convincing quantitative analysis proves the benefits outweigh the costs, is: A) a cost- benefit analysis. B) to demonstrate what competitors are doing. C) hire independent consultants. D) to look at industry trends.
56)
57) Before an organization can deploy new systems well, its people, structure, and processes must be: A) young and innovative. B) more technical than its rivals. C) knowledge workers. D) capable of adapting well to change.
57)
58) What type of argument is this: "I know I don't have good data to back this up, but I'm convinced that having this CRM system will enable us to serve our customers better."? A) An argument based on fear B) An argument based on faith C) An argument based on fact D) None of the above.
58)
59) What is a computer- aided design system? A) Using computers to do architecture. B) Software that generates innovated designs and artistic patterns. C) Computer software that dictates the best competitive strategy for your company. D) The use of computers to design state- of- the- art, high- quality products.
59)
60) The IS manager: A) has overall responsibility for managing IS development, implementation, and maintenance. B) is a nonrecurring cost. C) is not in a position to make recommendations to decision makers. D) is an intangible cost.
60)
61) When presenting the business case for a new information system, the case may be made to: A) company executives. B) the steering committee. C) the IS manager. D) All of the above.
61)
62) ________ and justifying that value to various stakeholders in the organization has become one of the most important aspects of information systems projects. A) Measuring the value of IS B) Outsourcing C) Developing intranets D) Hiring qualified employees
62)
63) ________ is using technology as a way to help complete a task within an organization faster, more cheaply, and with, perhaps, a greater accuracy and/or consistency. A) Automating B) Strategizing C) Learning D) Processing
63)
64) When direct quantification of financial benefits is difficult, an alternative is the use of ________, which are measures of changes in terms of perceived value. A) proxy variables B) work profile matrices C) outside consultants D) steering committees
64)
65) The mindset of managers in the past was to think about information systems as a(n) ________. Managers must view IS as a(n) ________. A) resource, expense B) expense, overhead C) competitive advantage, liability D) necessary evil, asset
65)
7
66) Hot issues with senior management include: A) customer feedback. C) cycle time (time to process an order).
B) employee morale. D) All of the above.
66)
67) All of the following strategies for presenting a business case to management for an information system are valid EXCEPT: A) measure what is important to employees. B) convert benefits to monetary terms. C) devise proxy variables. D) assess the value of the IT infrastructure.
67)
68) The cost of employee salaries and benefits is an example of: A) intangible costs. B) infrastructure costs. C) high- risk costs. D) recurring costs.
68)
69) Benefits such as improved perception of the firm and faster turnaround on order fulfillment are examples of: A) recurring costs. B) nonrecurring costs. C) tangible benefits. D) intangible benefits.
69)
70) Companies like Porsche, Nordstrom, and IBM, which offer better products or services than their competitors, are using a(n): A) best- cost provider strategy. B) low- cost leadership strategy. C) differentiation strategy. D) organizational strategy.
70)
71) Rubin's four categories for assessing the value of IT infrastructure includes: A) external benchmarks, useful frameworks, IT spending, and profitability. B) interoperability, portability, scalability, and compatibility. C) economic, architectural, operational, and regulatory value. D) None of the above.
71)
72) A ________ organization is defined as an organization that is "skilled at creating, acquiring, and transferring knowledge, and at modifying its behavior to reflect new knowledge and insights." A) learning B) profitable C) technical D) strategizing
72)
73) In terms of the productivity paradox, the failure of strategic information systems can not be explained by the theories that they are: A) making the whole pie bigger. B) redistributing the pie. C) a wash for the industry as a whole. D) beneficial for one organization, but not for all.
73)
8
Answer Key Testname: UNTITLED1 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
C B D A D B C C D D D B C A C B B B D B B A D B A D C B A D D B A D B C A C B B D C A D B D C B D C 9
Answer Key Testname: UNTITLED1 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) 67) 68) 69) 70) 71) 72) 73)
B B B D B A D B D A D A A A D D A D D C C A A
10
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The ________ Act is a government regulation formed as a reaction to large - scale accounting scandals that led to the downfall of large corporations that includes the use of information systems controls in compliance reviews. A) Enron B) CAAT C) COBIT D) Sarbanes- Oxley
1)
2) ________ are Web- based software systems used to integrate information from different applications and databases as well as allow different applications from different sources to interact over a network. A) Web services B) ASPs C) Integration services D) Middleware applications
2)
3) ________ software refers to software the source code is freely available for use and/or modification. A) Source- code B) Application C) Free D) Open- source
3)
4) Google's data center has been set up in The Dalles, OR due to all of the following EXCEPT: A) high- speed connectivity. B) availability of skilled labor. C) access to unlimited water supply. D) availability of cheap, uninterrupted power.
4)
5) A ________ backup site is backup facility consisting of an empty warehouse with all necessary connections for power and communication, but nothing else. A) cold B) hot C) empty D) dormant
5)
6) Autonomic computing systems should be ________, so that users can continue working on tasks, even if parts of the system are not operational. A) self - protecting B) self - healing C) self - optimizing D) self - configuring
6)
7) What is not among the most prominent threats to IS facilities? A) Floods B) Seismic activity C) Hurricanes D) Volcanic activity
7)
8) A single repository of database information integrated from multiple large databases and other information sources is called a(n): A) data warehouse. B) data supermart. C) informational system. D) data mart.
8)
9) Information gathered from different business processes to improve organizational decision- making are referred to as: A) tacit knowledge. B) street smarts. C) explicit knowledge. D) business intelligence.
9)
1
10) The Berkeley software development (BSD) license is a: A) proprietary software. B) nonprotective open source software. C) public domain software. D) protective open source software.
10)
11) ________ is the use of the Internet Protocol for transporting voice, video, fax, and data traffic. A) IP conveyance B) IP convergence C) IP integration D) IP communication
11)
12) Knowledge that can be documented, archived, and codified is called: A) explicit knowledge. B) implicit knowledge. C) tacit knowledge. D) best practices.
12)
13) Application service providers offer: A) utility software. C) utility computing.
13)
B) on- demand software. D) on- demand computing.
14) ________, a big part of interactive e - commerce on the Internet, refers to immediate automated responses to the requests of users. A) Normalization B) Online analytical processing C) Entity relationship diagramming D) Online transaction processing
14)
15) ________ is a set of best practices that help organizations to both maximize the benefits from their information systems infrastructure, while at the same time establishing appropriate controls. A) CAAT B) S- OX C) COBIT D) CMMS
15)
16) ________ are controls helping to ensure the reliability of information, consisting of policies and their physical implementation, access restrictions, or recordkeeping of actions and transactions. A) Information systems controls B) Infrastructure controls C) Access controls D) Audit controls
16)
17) A(n) ________ ASP offers a solution package for an entire industry. A) local B) vertical market C) specialist or functional D) enterprise
17)
18) ________ refers to immediate automated responses to user requests. A) OLAP B) OLIP C) OLTP
18)
D) OLST
19) A(n) ________ ASP offers services for small businesses within a limited geographical area. A) specialist or functional B) local C) enterprise D) vertical market
19)
20) The GNU general public license is a: A) nonprotective open source software. C) protective open source software.
20)
B) public domain software. D) proprietary software.
21) Software asset management includes all of the following EXCEPT: A) matching installed software with licenses. B) performing a software inventory. C) creating a software asset management plan. D) All of these are part of software asset management. 2
21)
c
22) ________ refers to the use of Internet technologies for placing telephone calls. A) VoIP B) PoIP C) IPT
D) IPP
22)
23) ________ are systems used to interact with customers and run a business in real time. A) Informational systems B) Structured query systems C) Office automation D) Operational systems
23)
24) An autonomic computing system must know its: A) configuration. C) capacity.
24)
B) current status. D) All of the above.
25) Knowledge management is: A) the executive team in charge of the knowledge workers. B) the executive team who creates data. C) the executive team in an organization in charge of data. D) the processes that an organization uses to gain the greatest value from its knowledge assets.
25)
26) To ________ means to synchronously store data on independent systems to achieve redundancy for purposes of reliability and/or performance. A) merge B) mirror C) reflect D) synchronize
26)
27) ________ refers to combining the computing power of a large number of smaller, independent, networked computers into a cohesive system in order to solve problems that only supercomputers were previously capable of solving. A) Autonomic computing B) Grid computing C) Pay- per- use computing D) On- demand computing
27)
28) In a(n) ________ architecture, different repeatable business tasks are integrated (using Web services) to better perform various business processes. A) service- oriented B) Web- oriented C) e- Enabled D) integrated
28)
29) In a ________ grid, the computers are just there to perform the grid's computing tasks. A) dedicated B) pure C) uniform D) homogeneous
29)
30) Systems designed to perform specific, predefined task such as a digital video recorder (TiVo) or a network router are referred to as ________ systems. A) integrated B) embedded C) specific D) special- purpose
30)
31) Information systems controls include all of the following EXCEPT: A) corrective controls. B) detective controls. C) preventive controls. D) All of the above are parts of IS controls.
31)
32) ________ is a method of analyzing data used by companies to sort and analyze information to better understand their customers, products, markets, or any other phase of their business. A) Data mining B) Business rules C) OODB D) Data warehousing
32)
3
33) When merging transaction and analytical processing a problem occurs. Real- time analytical processing diminishes the performance of transaction processing. What is the solution to this problem that many companies use? A) Pause transaction processing while analytical processing is occurring. B) Replicate all transactions on a second database server and run analytical processing off of the second server. C) Only allow transaction processing during off- peak hours. D) None of the above.
33)
34) A(n) ________ ASP offers broad solutions for the needs of different organizations. A) local B) enterprise C) vertical market D) specialist or functional
34)
35) Using on - demand computing, resources are allocated on a(n) ________ basis. A) demand- adjusted B) most- important- application C) as- needed D) prioritized
35)
36) The most important aspect of preparing for disaster is: A) creating a disaster recovery plan. B) analyzing information systems risk. C) having an evacuation route. D) being prepared.
36)
37) Graphical software tools that provide complex analysis of stored data are: A) OLAP. B) OLST. C) OLTP.
37)
D) OLIP.
38) Software asset management helps organizations to better manage their software infrastructure by enabling to: A) decide to retire unused software. B) decide when to upgrade or replace software. C) consolidate and standardize software titles. D) All of the above.
38)
39) ________ are systems designed to support decision making based on point- in- time data or historical data. A) Office automation B) Structured query systems C) Operational systems D) Informational systems
39)
40) ________ licenses usually contain limitations of liability and warranty disclaimers. A) Consumer B) Protected C) Negotiated D) Enterprise
40)
41) ________ is specific software to test applications and data, using test data or simulations. A) CAAT B) COBIT C) CMMS D) S- OX
41)
42) Today, it is often more cost effective to set up a ________ grid. A) uniform B) heterogeneous C) uniform
42)
43) The purpose of a data warehouse is to: A) centralize the manageability of data collection. B) put key business information into the hands or more decision makers. C) create backups for mission critical corporate data. D) store all corporate transaction data in one single location. 4
D) dedicated
43)
d
44) What is not a question related to an organization's hardware infrastructure faced by executives? A) How can reliability be assured? B) What time interval should equipment be replaced? C) What technologies should be chosen? D) All of these questions are faced by executives.
44)
45) ________ is the operating system of choice for Web servers, embedded system, and supercomputers alike. A) Linux B) Unix C) Tux D) Pengu- ware
45)
46) Internal sources for gathering business intelligence include all EXCEPT: A) sales figures. B) customer demographics. C) performance indicators. D) competitor analysis.
46)
47) The Windows operating systems is: A) proprietary software. C) nonprotective open source software.
47)
B) protective open source software. D) public domain software.
48) ________ can increase the reliability of an organization's information systems infrastructure. A) Grid computing B) Autonomic computing C) Pay- per- use computing D) On- demand computing
48)
49) In order to be able to use different computing resources, autonomic computing systems should be: A) self - healing. B) self - protecting. C) self - configuring. D) self - optimizing.
49)
50) ________ computing systems are self- managing, meaning that they need only minimal human intervention to operate. A) Edge B) Autonomic C) Grid D) Utility
50)
51) One way to increase independence while still being able to integrate various software applications is the use of: A) Web services. B) ASPs. C) integration services. D) middleware applications.
51)
52) Systems for gaining business intelligence ________ data in order to better manage the organization. A) store B) gather C) process and analyze D) all of the above
52)
53) The Windows Update Service is an example of a ________ system. A) software asset management B) bug- fixing C) online help and repair D) patch management
53)
54) Which of the following is not considered a core business process? A) Hire employees B) Sell products C) Manufacture goods D) Provide service
54)
5
55) ________ are facilities housing a vast number of servers to support the information processing needs of an organization. A) Server farms B) Server rooms C) Server warehouses D) Clusters
55)
56) A ________ is a facility in which businesses can rent space for servers or other information systems equipment. A) collocation facility B) server warehouse C) server room D) data warehouse
56)
57) The Linux operating systems is an example of: A) protective open source software. C) nonprotective open source software.
57)
B) proprietary software. D) public domain software.
58) One factor that adds to the popularity of using dedicated grids is: A) the falling cost of computing hardware. B) outsourcing of noncore activities. C) the increased power. D) the increasing skill level of grid engineers.
58)
59) ________ can help to deal with fluctuating computation needs. A) Autonomic computing B) Grid computing C) On- demand computing D) Pay- per- use computing
59)
60) ________ computing uses relatively small servers close to the end users to save resources in terms of network bandwidth and access time. A) Utility B) Edge C) Network D) Grid
60)
61) A(n) ________ offers on- demand software on an as - needed basis to its clients over the web. A) Web service provider B) best- cost provider C) software provider D) application service provider
61)
62) The most common cause(s) of disaster is (are): A) floods. C) power outages.
62)
B) hardware failures. D) All of the above.
63) Knowledge that reflects processes and procedures that are located in a person's mind is called: A) best practices. B) tacit knowledge. C) implicit knowledge. D) explicit knowledge.
63)
64) Some programs for outdated IBM mainframes are considered: A) nonprotective open source software. B) public domain software. C) protective open source software. D) proprietary software.
64)
65) A ________ is a data warehouse that is limited in scope. It contains selected information of the company's business, for example finance data, inventory data, or personnel data. A) data mart B) data model C) report D) query
65)
6
66) ________ is a set of activities performed to better manage an organization's software infrastructure by being able to consolidate and standardize their software titles, decide to retire unused software, or decide when to upgrade or replace software. A) Software audit B) Software licensing C) Patch management D) Software asset management
7
66)
Answer Key Testname: UNTITLED1 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
D A D B A B D A D B C A B D C A B C B C D A D D D B B A A B D A B B C A A D D D A D B D A D A B C B 8
Answer Key Testname: UNTITLED1 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66)
A D D A A A A A C B D D B B A D
9
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Entering batch data can be done with all of the following devices EXCEPT: A) character reader. B) bar code. C) keyboard. D) scanners. 2) A ________ is 1,024 bytes or approximately a thousand characters. A) terabyte B) gigabyte C) kilobyte
1)
D) megabyte
2)
3) A(n) ________ computer is a microcomputer with minimal memory and storage designed to connect to networks to use resources provided by servers. A) midrange B) network C) workstation D) server
3)
4) The ________ performs mathematics and logical operations. A) a register B) an arithmetic/logic unit C) primary storage D) cache
4)
5) The ________ is the computer's brain. It performs, coordinates, and manages all the calculations and instructions of the computer. A) register B) control unit C) RAM memory D) central processing unit
5)
6) ________ devices transform inputs into outputs. A) Processing B) Output
6)
C) Input
D) Internet
7) RAID (redundant array of independent disks) is a type of: A) hard drive. B) primary storage. C) ROM. D) RAM.
7)
8) A temporary storage location where data must reside while it is being processed or manipulated is called: A) cache. B) primary storage. C) an arithmetic/logic unit. D) a register.
8)
9) Information permanently stored on a hard disk, diskette, CD- ROM disk, or tape, is called ________ storage. A) secondary B) tertiary C) primary D) permanent
9)
10) ________ uses a camera to send a sequence of moving images in a compressed form over the Internet. A) MIDI B) Streaming media C) Video cameras D) Streaming video
10)
11) Flash drives use a special type of memory called: A) SIM. B) EEPROM.
11)
C) SDRAM.
1
D) RAM.
12) A ________ is 1,073,741,824 bytes or approximately a billion characters. A) kilobyte B) terabyte C) gigabyte
D) megabyte
12)
13) A touch pad is best associated with which information category? A) Entering batch data B) Selecting and pointing C) Entering audio and video D) Entering original text/numbers
13)
14) Text recognition software: A) reads text as audible speech. B) converts speech into text. C) analyzes handwriting and identifies forgeries. D) converts handwritten text into characters (as if typed on a keyboard).
14)
15) A ________ is used to solve massive computational problems. A) workstation. B) mainframe C) supercomputer D) midrange computer
15)
16) This type of scanner is used to scan questionnaires and test answer forms where answer choices are circled or blocked in, using pencil or pen. A) Optical mark recognition (OMR) B) Magnetic ink character recognition (MICR) C) Bar code/optical character readers D) Optical character recognition (OCR)
16)
17) A ________ is 1,048,576 bytes or approximately a million characters. A) megabyte B) gigabyte C) terabyte
17)
D) kilobyte
18) This type of scanner is used in grocery stores and other retail businesses to record prices at the checkout counter. A) Optical character recognition (OCR) B) Optical mark recognition (OMR) C) Bar code/optical character readers D) Magnetic ink character recognition (MICR)
18)
19) A type of notebook computer that accepts input from both a keyboard and a stylus is called a ________. A) handheld computer B) tablet PC C) PDA D) portable
19)
20) The hypothesis that computer processing performance would double every 18 months is called: A) Motorola's Law. B) Moore's Law. C) the theory of exponential returns. D) exponential development.
20)
21) Registers, cache, random access memory (RAM), and read- only memory are examples of: A) computer time. B) primary storage. C) central processing units. D) secondary storage.
21)
22) Which binary code uses 16 bits? A) ANSI B) EBCDIC
22)
C) Unicode
2
D) ASCII
23) ________ convert(s) printed text and images into digital data. A) Scanners B) Ergonomics C) Digitizers D) Batch processing
23)
24) This type of scanner is used to read and digitize typewritten, computer - printed, and even hand- printed characters such as on sales tags on department store merchandise or patient information in hospitals. A) Magnetic ink character recognition (MICR) B) Bar code/optical character readers C) Optical character recognition (OCR) D) Optical mark recognition (OMR)
24)
25) A process called ________ makes it possible for your computer to digitize spoken words and display them on the computer monitor. A) Small Talk B) file transfer protocol C) Internet Relay Chat (IRC) D) speech recognition
25)
26) A ________ is a pointing device that works by rolling a ball that sits in a holder. Selections are made by pressing buttons located near or on the holder. A) mouse B) light pen C) joystick D) trackball
26)
27) A ________ is a pointing device that works by moving a small stick that sits in a holder. Selections are made by pressing buttons located near or on the holder. A) joystick B) trackball C) light pen D) mouse
27)
28) Instructions in RAM are considered ________. That is, if the power goes out all information is RAM is lost. A) ephemeral B) volatile C) evaporative D) transient
28)
29) Pointing devices are used to: A) have ergonomically designed workplaces. B) convert handwritten text into computer- based characters. C) select items from menus. D) enter batch dat
29)
30) A ________ is a pointing device that works by placing a pen- like device near a computer screen. Selections are made by pressing the pen to the screen. A) trackball B) joystick C) mouse D) light pen
30)
31) A small block of memory used by processors to store those instructions most recently or most often used is called: A) an arithmetic/logic unit. B) primary storage. C) cache. D) a register.
31)
32) A computer's ________ is the physical box that houses all of the electronic components that do the work inside the computer. A) CPU B) system unit C) memory D) motherboard
32)
33) A ________ is 1,099,511,627,776 bytes or approximately a trillion characters. A) terabyte B) megabyte C) kilobyte
33)
3
D) gigabyte
34) ________ are a special type of credit card with a magnetic strip, a microprocessing chip, and memory circuits. A) Smart cards B) Scanners C) Disc- cards D) Intellisense cards
34)
35) CPU stands for: A) control program unit. C) character parsing unit.
35)
B) computer processing unit. D) central processing unit.
36) The mainstay of large corporate computing has been large, high - powered computers called ________. A) supercomputers B) network computers C) PDAs D) mainframes
36)
37) A mouse is best associated with which information category? A) Entering batch data B) Entering original text/numbers C) Selecting and pointing D) Entering audio and video
37)
38) Fixed length binary code is called: A) ASCII. B) EBCDIC.
38)
C) ANSI.
D) Unicode.
39) This type of scanner is used by the banking industry to read data, account numbers, bank codes, and check numbers on preprinted checks. A) Bar code/optical character readers B) Optical mark recognition (OMR) C) Magnetic ink character recognition (MICR) D) Optical character recognition (OCR)
39)
40) All of the following types of computer storage involve the use of a laser beam to read data from a disk surface EXCEPT a: A) CD- ROM. B) hard disk. C) magneto- optical disk. D) optical disk.
40)
41) The binary digits that make up machine language (1s and 0s) are called: A) electrons. B) bits. C) units.
41)
D) bytes.
42) Computers use a language called ________, which is based on 1s and 0s. A) high- voltage current B) data C) binary code D) streaming
42)
43) A keyboard is best associated with which information category? A) Selecting and pointing B) Entering original text/numbers C) Entering batch data D) Entering audio and video
43)
44) When considering elements of computer time, one millionth of a second is called a: A) microsecond. B) millisecond. C) nanosecond. D) picosecond.
44)
45) The computer's ________ contains all of the components that do the actual processing work of the computer. A) motherboard B) foundation C) control unit D) main memory
45)
4
Answer Key Testname: UNTITLED1 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45)
C C B B D C A D A D B C B D C A A C B B B C A C D D A B C D C B A A D D C A C B B C B A A
5
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Borland Paradox, Microsoft Access, Borland dBase, and Microsoft FoxPro are examples of what type of software? A) Spreadsheets B) PC- based e- mail C) Presentation software D) Database management software
1)
2) Computer programs created using programming languages must be translated into code called ________. A) automation language B) compiler language C) interpreted language D) machine language
2)
3) ________ is a programming language developed by Sun Microsystems in the 1990s that enables dynamic content and displays of moving graphics. A) Java B) SQL C) HTML D) C++
3)
4) CASE stands for: A) computer- aided software engineering. B) computer- architecture system event. C) comprehensive- assessment software enterprise. D) compressed- archive system event.
4)
5) The ________ utility archive(s) files from a hard disk to a diskette. A) backup B) file conversion C) spam blockers 6) Windows and Macintosh operating systems have: A) graphical user interfaces. C) Internet- activated interfaces.
D) antivirus
B) voice- activated interfaces. D) command- based interfaces.
5)
6)
7) ________ software is developed to meet specific organizational needs. It may be developed in- house by the company's own IS staff or it may be contracted or outsourced. A) System B) Security C) Customized application D) Utility program
7)
8) Which computer language, developed in 1960, was the first language designed for business software and is frequently used for transaction processing applications on mainframes? A) FORTRAN B) COBOL C) Basic D) Pascal
8)
9) Another name for a computer's system software is the ________. A) system architecture B) command based system C) application software D) operating system
9)
10) Netscape created a language that allows dynamic content to be added to Web pages called ________. A) CASE. B) JavaScript. C) HTML. D) Java.
1
10)
11) This operating system, the first graphical- based operating system, debuted in 1984 and runs on Apple Macintosh personal computers. A) MS- DOS B) Linux C) OS/390 D) Mac OS
11)
12) ________ allows more data to be stored on a disk. A) File conversion C) Data compression
12)
B) Disk recovery D) Backup
13) The ________ utility translates a file from one format to another, so that it can be used by another application. A) antivirus B) backup C) spam blockers D) file conversion
13)
14) Which computer language, developed by IBM in the 1950s, was designed for mathematical, science, and engineering applications? A) Basic B) COBOL C) Pascal D) FORTRAN
14)
15) ________ is a powerful Web development language that enables users to create their own markup tags and to build database queries. A) XML B) HTML C) C++ D) Java
15)
16) Systems software which have freely distributed source code are called: A) office automation software. B) open source software. C) personal productivity software. D) business information systems.
16)
17) A text- based language with codes or tags used for developing Web pages is called ________. A) Visual Basic B) HTML C) C++ D) SQL
17)
18) A small Java program that runs when a Web pages is accessed is called a(n) ________. A) applet B) Javalet C) cotlet D) miniprogram
18)
19) A program that translates an entire program (written in a particular programming language) into machine language is called a(n) ________. A) integrated B) detailer C) compiler D) compressor
19)
20) Outcome- oriented language, like those used to execute queries, is an example of a ________- generation language. A) second B) fourth C) third D) fifth
20)
21) Which object- oriented computer language, developed by Sun Microsystems in the early 1990s, is a popular Internet programming language because it is highly portable from one make of computer to another? A) LISP B) Java C) HTML D) C++
21)
22) This multiuser, multitasking operating system is used on a wide variety of computer platforms such as Sun Microsystems, Hewlett- Packard, and Silicon Graphics. A) Linux B) UNIX C) OS/390 D) OS X
22)
2
23) ________ application software accomplishes a wide range of tasks from word processing to graphics to e- mail. A) Security B) Customized C) Office automation D) System
23)
24) ________ languages provide interactive components to a Web page. These languages let you build scripts directly into HTML code. A) Scripting B) Visual C) Interactive D) Assembly
24)
25) The process of grouping pieces of data together is called ________. A) encapsulation B) grouping C) inheritance
D) merging
25)
26) Systems analyst use ________ to automate many routine tasks. A) JavaScript. B) CASE. C) HTML.
D) Java.
26)
27) ________ languages allow programmers to group data and program instructions together into modules that can be manipulated by the programmer. A) Artificial intelligence B) Compiled C) Second generation D) Object- oriented
27)
28) Which computer language is one of the main languages used to develop applications in artificial intelligence? A) Pascal B) LISP C) FORTRAN D) Java
28)
29) A characteristic of object- oriented programming is ________, which refers to the fact that when one class of objects is defined, all other objects with the same characteristics are automatically defined by the same terms. A) encapsulation B) object- connectivity C) ownership D) inheritance
29)
30) ________ is/are designed to manage computer resources and files. A) System software B) Backup software C) Application D) Utility programs
30)
31) ________ consists of programs, or sets of instructions, that tell the computer to perform certain processing functions. A) Hardware B) GUIs C) Firmware D) Software
31)
32) ________ allows the recovery of damaged or erased information from hard disks or floppy disks. A) Backup B) Defragmentation C) Data compression D) Data recovery
32)
33) ________ allow(s) new hardware added to your system to function with the operating system. A) File conversion B) Device drivers C) Defragmentation D) Data compression
33)
34) This operating system is a highly reliable system used on large IBM mainframe computers. A) OS/390 B) Linux C) UNIX D) MS- DOS
34)
3
35) Applications developed to perform organization- wide operations are called: A) office automation software. B) open source software. C) personal productivity software. D) business information systems.
35)
36) The advantages of off- the- shelf application software include all of the following EXCEPT: A) low cost. B) fast procurement. C) problem specificity. D) low risk.
36)
37) Programs for creating Web pages are called ________. A) XML B) editors C) event- driven D) visual programming
37)
38) This command- based operating system is used on IBM- compatible PCs and was first introduced in 1981. A) MS- DOS B) OS/390 C) UNIX D) Linux
38)
39) The ________ requires that you type text commands into the computer to perform basic operations. A) graphic user interface B) voice- activated interface C) Internet- activated interface D) command- based interface
39)
40) ________ converts a fragmented file stored on a hard disk into a contiguously stored file which leads more rapidly when referenced by the computer. A) Data compression B) File conversion C) Data recovery D) File defragmentation
40)
41) This operating system, especially popular for use on Web servers, was designed in 1991 by a Finnish university student and is known for its security, low price, and adaptability. A) Linux B) OS X C) UNIX D) OS/390
41)
42) Diagramming tools, report generators, analysis tools, repositories, and code generators are all types of ________. A) system architecture B) systems design C) specifications D) CASE tools
42)
43) A ________ archives or saves a copy of selected files from the hard disk to a diskette or to tapes. A) conversion B) defragmentation C) device driver D) backup
43)
44) A program that translates a programming language into machine language one line at a time is called a(n): A) compiler. B) detailer. C) interpreter. D) compressor.
44)
45) This operating system was developed in 1988 by IBM for powerful PCs and can run applications written for OS/2, MS- DOS, Java, or Windows. A) OS/390 B) Linux C) MS- DOS D) Mac OS
45)
46) ________ software lets a user perform a specific task, such as writing a letter, processing payroll, managing a stock portfolio, etc. A) System B) Application C) Security D) Custom
46)
4
47) Operating systems are often written in ________, a very low- level programming language that allows the computer to operate quickly and efficiently. A) COBOL B) C C) Visual Basic D) assembly language
47)
48) Natural language, which uses true English sentences, to communicate with the computer is an example of a ________ - generation language. A) second B) fourth C) fifth D) third
48)
49) ________ software is the collection of software that controls the basic functions of the computer. That is, it coordinates the interaction between hardware devices, peripherals, application software, and users. A) Systems B) Command C) Applications D) Integration
49)
5
Answer Key Testname: UNTITLED1 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49)
D D A A A A C B D B D C D D A B B A C B B B C A A B D B D D D D B A D C B A D D A D D C A B D C A 6
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) In the DBMS, the individual database is a(n): A) collection of related attributes about entities. B) set of records. C) text file. D) set of attributes.
1)
2) Database files in relational model databases exhibit how many dimensions? A) Three B) Four C) One
D) Two
2)
3) Which of the following enables us to fill out a grid or template in order to extract information from a database? A) GUI B) SQL C) QBE D) DBA
3)
4) A ________ is the most common language used to interface with databases. A) standard query language B) sample query language C) query interface language D) structured query language
4)
5) Databases can be billions or trillions of bytes in size. These quantities are called: A) kilobytes and gigabytes. B) megabytes and trillabytes. C) terabytes and megabytes. D) gigabytes and terabytes.
5)
6) Which of the following are costs or risks associated with database management? A) Installation costs B) Conversion costs C) New, specialized personnel D) All of the above.
6)
7) A database management package, which is based upon a relational database model, is called a: A) DBMS B) RMDB C) RDBS D) RDBMS
7)
8) A(n) ________ is a software application which one uses to create, store, organize, and retrieve data from a single database or multiple databases. A) database administrator B) record C) query by example D) database management system
8)
9) The process of retrieving data from a database is called: A) a removal. B) filtration. C) a query.
9)
10) A database management system: A) creates, stores, organizes, and retrieves data from a database. B) is primarily a report generation tool. C) is used to develop interactive Web pages. D) graphically displays relationships among entities.
1
D) an extraction.
10)
11) The elimination of data redundancy is a major goal and benefit of: A) entities. B) queries. C) normalization. D) a data dictionary.
11)
12) Which of the following would make a bad primary key? A) Social security number B) Student identification number (where numbers are unique) C) Combination of last name and date of birth D) Driver's license number
12)
13) Which of the following is the best example of a database? A) An alphabetically listed address book B) Articles within a magazine C) A collection of books on a shelf D) A set of coins in an envelope
13)
14) Which of the following non- computer items is an example of a database? A) An alphabetic directory listing B) An organized file cabinet C) A card catalog in a library D) All of the above.
14)
15) Database files in flat file databases exhibit how many dimensions? A) Two B) One C) Three
D) Four
15)
16) Another term for an entity is a: A) report. B) table.
D) data.
C) query.
16)
17) An advantage of a database approach to information management is: A) it is easier to enforce standards. B) enhanced data quality. C) it is easier to control and deploy data access. D) All of the above.
17)
18) The world's largest bookstore, with 2.5 million titles is: A) Amazon.com. B) BordersBooks.com. C) Books.com. D) Barnes & Noble (bn.com).
18)
19) A diagramming technique for designing databases which shows associations between entities and where each relationship can be labeled on the diagram is called: A) an entity relationship diagram. B) a flow chart. C) a database model. D) a structure chart.
19)
20) Which is the most common DBMS model? A) Relational B) System
20)
C) Hierarchical
D) Network
21) A(n) ________ is software that is used to retrieve data from a database and the results are manipulated (aggregated, transformed, and grouped) into a nicely formatted display. A) entity formatter B) report generator C) database designer D) query
21)
22) A(n) ________ refers to an attribute that appears as a nonprimary key attribute in one entity and as a primary key attribute in another entity. A) secondary key B) merge key C) foreign key D) master key
22)
2
23) To ensure proper security features in a database, the DBA should: A) coordinate with the CEO. B) coordinate with users. C) coordinate with organizational managers. D) work alone.
23)
24) A(n) ________ is a compilation of data from the database organized and produced in printed format. A) form B) entity C) report D) table
24)
25) Database management systems enable organizations to ________ information easily. A) retrieve B) analyze C) store D) All of the above.
25)
26) A secondary key: A) can be multiple attributes in a table. B) identifies one or more records within a table that share a common value. C) is an attribute not referred to as a primary key. D) All of the above.
26)
27) Which of the following is NOT an advantage to a database management system? A) Improved data quality B) Increased productivity of application development C) Reduced data consistency D) Reduced data redundancy
27)
28) A disadvantage of a database approach to information management is: A) reduced program maintenance. B) higher expense. C) minimal data redundancy. D) improved data accessibility.
28)
29) ________ are standards governing the updating of data, including who has authority to view and update data, acceptable range of data values, and how the data are to be updated. A) Business rules B) ANSI standards C) Computer programs D) Protocols
29)
30) Which of the following is a collection of information that describes data types, uses, storage requirements, and rules that effect data? A) Data dictionary B) Data mart C) Data warehouse D) Data mine
30)
31) A database key not used as a primary key but used to identify records in a table that share a common value is called a(n): A) duplicate key. B) dual key. C) tertiary key. D) secondary key.
31)
32) Databases do one no good if they are not organized. The process of organizing and structuring databases efficiently is called: A) database design. B) data implementation. C) infrastructure management. D) systems architecture.
32)
3
33) One- to - one, one- to- many, and many- to - many are descriptions of "parent- child" database relationships called: A) linkages. B) combinations. C) associations. D) constructions.
33)
34) A unique identifier for linking entities together is a: A) merge link. B) primary key.
34)
C) link list.
D) master key.
35) Most databases managed under a DBMS consist of several: A) files. B) entities. C) tables. D) All of the above.
35)
36) Which of the following is a computer language? A) DBA B) SQL
36)
C) GUI
D) QBE
37) Knowing the data type is useful because it helps the DBMS know how to: A) sort data. B) allocate storage space. C) complete calculations. D) All of the above.
37)
38) When considering data in a database entity, each row is a: A) file. B) data dictionary. C) template. D) record.
38)
39) Many DBMS packages such as Microsoft Access have a simple way of interfacing with the databases using a concept called: A) QBE. B) QCC. C) QBC. D) QRC.
39)
40) A popular personal computer DBMS is: A) Microsoft Access. C) PageMaker Pro.
40)
B) Netscape Communicator. D) PowerPoint.
41) A major goal and benefit of using data normalization is: A) the elimination of data redundancy. B) normalization eliminates the need for queries. C) SQL works best with normalization. D) faster database queries. 42) How many entities can a database have? A) Many B) Two
C) One
41)
D) None
43) What is a form? A) A completed SQL program. B) The process of shaping and designing a database. C) A graphical user interface with some blanks (text boxes, list boxes, option buttons, etc.) where the user can enter information or make choices. D) A printed listing of results from a database query.
4
42)
43)
b
44) ERDs are: A) used to show associations. B) drawn with entities as boxes and lines for relationships. C) useful when designing complex databases. D) All of the above.
44)
45) ________ is the term used to identify whether a field is numeric, text, a date or time value, etc. A) Data category B) Data reference C) Data type D) Data value
45)
46) Query by example: A) generates print- outs of customized database reports. B) graphically displays relationships among entities. C) is a language for manipulating the contents of a database. D) is a technique using a template to select the attributes and criteria for extracting information from a database.
46)
47) Entities are comprised of rows and columns. Each column is a(n): A) DBMS. B) table. C) attribute.
47)
D) record.
48) Who is responsible for the management and development of the organization's database? A) DBA B) DFO C) CEO D) CIO
48)
49) Unique identifiers that are a combination of two or more attributes are called: A) combination primary keys. B) sequential primary keys C) primary keys. D) secondary keys.
49)
50) What technique makes complex databases more efficient and more easily handled by the DBMS? A) Word processing B) Entity management C) Data definition D) Normalization
50)
51) The database relationship example of each player participating in games and each game having many players is an example of what type of relationship? A) Many- to - many B) One- to - one C) One- to - many D) None of the above.
51)
52) By placing a key from one entity in the table of another entity, we are creating inevitable but necessary: A) overlapping. B) database conflicts. C) incompatibility. D) redundancy.
52)
53) A(n) ________ is a graphical user interface with some blanks (text boxes) where the user can enter information or make choices, each of which represents an attribute (or field) within a database record. A) form B) entity C) QBE D) GUI
53)
54) A(n) ________ is a map or diagram that represents entities and their relationships. A) report B) data model C) table D) entity mapper
54)
5
55) Which organization below uses databases in their business operations? A) Nordstrom B) Lands' End C) Eddie Bauer D) All of the above.
55)
56) Which of the following is an attribute about a person? A) Name B) Salary C) Social security number D) All of the above.
56)
57) Forms can be used to ________ data from a database. A) modify B) add C) delete D) All of the above.
57)
58) All of the following are true about costs or risks associated with database management EXCEPT: A) increased database complexity. B) additional employees and expenses. C) organizational conflicts are reduced. D) higher up- front costs associated with installation.
58)
59) The database relationship example of a player being on one team, but a team having many players, is an example of what type of relationship? A) One- to - many B) One- to - one C) Many- to - many D) None of the above.
59)
60) A(n) ________ is a collection of related data organized in a way to facilitate data searches. A) DBA B) SQL C) database D) record
60)
61) A database key comprised of two or more attributes is called a(n): A) duplicate key. B) combination primary key. C) combination lock. D) conjoined key.
61)
62) The person responsible for designating who can look at a database and who is authorized to make changes is the: A) security officer. B) chief information officer. C) project leader. D) database administrator.
62)
63) The database relationship example of each team having one home stadium and each home stadium having one team is an example of what type of relationship? A) Many- to - many B) One- to - one C) One- to - many D) None of the above.
63)
6
Answer Key Testname: UNTITLED1 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
A A C D D D D D C A C C A D A B D A A A B C C C D D C B A A D A C B D B D D A A A A C D C D C A A D 7
Answer Key Testname: UNTITLED1 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63)
A D A B D D D C A C B D B
8
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) A ________ is used as a central point of connection between media segments for the purpose of extending the network to accommodate additional workstations. A) modem B) hub C) transmission media connector D) bridge
1) b
2) ________ uses 24 active satellites to allow users to triangulate their position anywhere on the planet. A) LEO B) LBS C) GIS D) GPS
2) d
3) There are two forms of media used in networks: cable and ________ media. A) topology B) wireless C) coaxial
3) b
D) fiber - optic
4) A ________ performs protocol conversion so that different networks can communicate even though they "speak" different languages. A) router B) gateway C) hub D) bridge
4) b
5) Which of the following is/are a type of network? A) WANs C) LANs
5) d
B) PANs D) All of the above.
6) A medium- speed WAN that includes capabilities such as e- mail, EDI, or security, is called a ________ network. A) personal area B) local area C) wide area D) value- added
6) d
7) The ________ computing model occurs when multiple computers (such as personal computers) are networked together to share information and services. A) wide area network B) distributed C) local area network D) centralized
7) b
8) ________ refers to the shape of a network. A) Network topology C) Communications mapping
8) a
B) Network morphology D) Network geography
9) ________ cable contains a solid inner copper conductor, surrounded by plastic insulation and an outer braided copper or rail shield. A) Coaxial B) Fiber- optic C) Backbone D) Twisted pair 10) ________ is the protocol of the Internet which allows different interconnected networks to communicate using the same language. A) OSI B) LAN C) EDI D) TCP/IP
1
9) a
10) d
11) A company has a computer to store a large employee database, and another computer used to process and update individual employee records. These two computers work together to keep the employee records current. This is an example of ________ computing. A) collaborative B) distributed C) centralized D) networked
11) a
12) ________ are the rules that govern how a given node or workstation gains access to the network to send or receive information. A) Media access controls B) Protocols C) Message services D) Application services
12) a
13) A ________ is any computer that may both request and provide services. A) operating service B) peer C) modem D) client/server
13) b
14) A ________ is used to terminate cable in order to be plugged into a network interface card or into other network components. A) distributor B) connector C) jack D) hub
14) b
15) The network configuration in the shape of a closed loop is called a: A) ring network. B) star network. C) bus network.
15) a
D) mesh network.
16) A ________ is a device that acts as a "buffer" between a LAN and a public carrier's WAN. It ensures that all signals placed on the public lines from the LAN are appropriately timed and formed for the public network. A) bridge B) hub C) transmission media connector D) channel service unit (CSU)
16) d
17) The enabling technology for PANs is called: A) Viking B) Bluetooth
17) b
C) Bluewave
D) Bluenet
18) ________ is the process of converting a photograph, a song, or text into digital information, or bits. A) Digitizing B) Atomizing C) Bitmapping D) Reduction
18) a
19) A ________ is an intelligent device used to connect two or more individual networks by looking at the network address and passing the signals on to the appropriate network. A) modem B) router C) multiplexer D) connector
19) b
20) A(n) ________ is both a bridge and a router. A) multiplexer B) brouter
20) b
C) integrator
D) hub
21) A(n) ________ is a telephone system that serves a particular location. A) PBX B) ISP C) LAN
D) EFT
22) Wireless LANs are based on the ________ family of standards. A) 802.11 B) 311.1 C) 486.4
D) 911
23) A ________ consists of three separate components: servers, clients, and peers. A) network B) protocol C) modem
D) control
2
21) a
22) a
23) a
24) A(n) ________ is used to share a communication line or medium among a number of users because it is able to transmit several signals over a single channel. A) merge unit B) multiplexer C) integrator D) gateway
24) b
25) One of the differences between human and computer communication is that human communication consists of words, whereas computer communications consist of ________, the fundamental information units of computers. A) protons B) protocols C) bits D) blips
25) c
26) Devices with a keyboard and monitor, but with no localized computing power, that are connected to a mainframe are called: A) terminals. B) end points. C) distributed computers. D) servers.
26) a
27) A ________ is any computer on the network that makes access to files, printing, communications, and other services available to users of the network. A) peer B) topology C) server D) client
27) c
28) A(n) ________ is a PC expansion board that plugs into a computer so that it can be connected to a network. A) expansion card B) hard card C) network interface card D) TCP/IP card
28) c
29) A ________ is a modulator/demodulator that enables computers to transmit data over telephone lines and thereby connect your PC with other PCs in a computer network. A) modem B) signal switcher C) hub D) transmission media
29) a
30) A network in which the computers or devices are either fully or partially connected to each other is called a: A) star network. B) mesh network. C) ring network. D) bus network.
30) b
31) The ________ computing model is a synergistic form of distributed computing, in which two or more networked computers are used to accomplish a common processing task. A) distributed B) collaborative C) centralized D) networked
31) b
32) Procedures that different computers follow when they transmit and receive data are called ________. A) controls B) modems C) networks D) protocols
32) d
33) The time it takes for a signal to travel between the satellite and the receiver is called: A) satellite lag B) propagation delay C) latency D) transmission delay
33) b
34) ________ cable is made of a light- conducting glass or plastic core, surrounded by more glass, called cladding, and a tough outer sheath. A) Backbone B) Fiber- optic C) Twisted pair D) Coaxial
34) b
35) High- speed network backbones are generally made of ________ cable. A) coaxial B) fiber - optic C) backbone
35) b
3
D) twisted pair
36) The network configuration when the network is an open - ended line is called a: A) star network. B) bus network. C) mesh network. D) ring network.
36) b
37) ________ occurs when fluorescent lights, weather, or electronic signals interfere with the original signal being sent. A) EMI B) Saturation C) Bandwidth D) Attenuation
37) a
38) ________ is the carrying capacity of the computer or communications channel. A) Attenuation B) Saturation C) Bandwidth
38) c
D) EMI
39) A ________ network is a computer network that is used to connect to or more LANs. A) metropolitan area B) personal area C) value- added D) wide area
39) d
40) When considering LANs, WANs, PANs, and PBXs, which ones are always wireless? A) PBX B) LANs C) PANs D) WANs
40) c
41) Novell NetWare, Microsoft Windows Server, and LANtastic are examples of: A) operating systems. B) network operating systems. C) groupware. D) databases.
41) b
42) Computer networks require all of the following EXCEPT: A) transmission medium. B) modems. C) senders and receivers that have something to share. D) protocols.
42) b
43) The trend in business is to use ________ networks in which servers and clients have defined roles. A) client- server B) server- centric C) integrated D) peer- to- peer
43) b
44) The network configuration when all nodes or workstations are connected to a central hub or concentrator through which all messages pass is called a: A) ring network. B) bus network. C) star network. D) mesh network.
44) c
45) A(n) ________ is a network device used to regenerate or replicate a signal as it weakens when traveling on a network. A) booster B) amplifier C) extender D) repeater
45) d
46) The term ________ refers to the physical pathways used to carry network information. A) transmission media B) wireless C) protocols D) networks
46) a
47) As with human communications, computer networks require three things: senders and receivers, a transmission medium, and rules or ________. A) networks B) protocols C) audio D) communications
47) b
4
48) A network that spans a relatively small area, allowing computer users to connect and share information within a building or limited geographical area is called a ________ network. A) local area B) value- added C) wide area D) personal area
48) a
49) In ________ networks, any computer or device on the network can provide or request services. A) peer- to- peer B) client- server C) integrated D) server- centric
49) a
50) A ________ is used to connect two different LANs or two segments of the same LAN by forwarding network traffic between network segments. A) transmission media connector B) modem C) hub D) bridge
50) d
51) ________ is the tendency of an electric signal to weaken as it is sent over increasing distance. A) Dissipation B) Bandweakening C) Attenuation D) Coaxial fade
51) c
52) A wireless local area network (LAN) is an example of which type of wireless media? A) Modulator- demodulator B) Microwave C) High- frequency radio D) Infrared line of sight
52) c
53) A ________ is any computer on the network that uses services provided by the server. A) control B) client C) topology D) peer
53) b
54) A ________ is system software that controls the network and enables computers to communicate with each other. A) router B) web service C) network operating system D) gateway
54) c
55) ________ is a local area network protocol (developed by the Xerox Corporation in 1976) which uses random access control to send data. A) Arpanet B) WireNet C) SimNet D) Ethernet
55) d
56) The most commonly used method of random access control is called ________. A) token passing B) carrier sense multiple access / collision detect C) Transmission Control Protocol / Internet Protocol D) client/server
56) b
57) A satellite communication is an example of which type of wireless media? A) High- frequency radio B) Infrared line of sight C) Microwave D) Modulator- demodulator
57) c
58) The Internet is an example of a(n) ________ network, one which spans multiple countries across the world. A) value- added B) centralized C) global D) enterprise
58) c
59) ________ cable is made of two or more pairs of insulated copper wires twisted together. A) Fiber- optic B) Twisted pair C) Coaxial D) Backbone
59) b
5
60) A TV remote control is an example of which type of wireless media? A) Microwave B) High- frequency radio C) Modulator- demodulator D) Infrared line of sight
60) d
61) The ________ model is a protocol that represents a group of specific tasks as successive layers that enable computers to communicate data. A) TCP/IP B) LAN C) EDI D) OSI
61) d
62) The most commonly used method of distributed access control is called ________. A) client/server B) Transmission Control Protocol / Internet Protocol C) token passing D) carrier sense multiple access / collision detect
62) c
63) The ________ computing model consists of a large mainframe computer connected to terminals. A) centralized B) network C) distributed D) decentralized
63) a
64) A cellular phone is an example of which type of wireless media? A) Modulator- demodulator B) High- frequency radio C) Microwave D) Infrared line of sight
64) b
65) A new standard for PANs, developed by Nokia to achieve lower power consumption, is called: A) Wi- Light B) N- PAN C) Bluetooth D) Wibree
65) d
66) ________ are agreed- upon formats for transmitting data between connected computers. A) Protocols B) Topologies C) Multiplexers D) Configurations
66) a
6
Answer Key Testname: 4 BRIFING 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
B D B B D D B A A D A A B B A D B A B B A A A B C A C C A B B D B B B B A C D C B B B C D A B A A D 7
Answer Key Testname: 4 BRIFING 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66)
C C B C D B C C B D D C A B D A
8
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) A technology capable of providing high- speed stationary wireless access without needing line- of sight technology is called: A) WiFi. B) Internet over satellite. C) WiMax. D) broadband wireless.
1) c
2) The only job of ________ is to connect networks and forward data packets from one network to another. A) distributors B) senders C) backbones D) routers
2) d
3) The Internet uses special- purpose computers called ________ to interconnect independent networks. A) routers B) senders C) backbones D) distributors
3) a
4) Which of the following domain extensions, or top- level domains, belongs to an educational institution? A) .uni B) .org C) .edu D) .gov
4) c
5) Web pages are hosted on: A) ISPs. C) clients.
5) b
B) web servers. D) web page providers.
6) A domain name can be associated with ________ IP address(es). A) one B) about a dozen C) unlimited
D) multiple
7) Which of the following is NOT a popular web browsing application? A) Firefox B) Internet Explorer C) Jabber D) Opera 8) The first WAN that linked universities and research center was called: A) DARPA B) WAN C) NSFNET
6) d
7) c
D) ARPANET
8) d
9) The Internet relies on ________ technology, which enables millions of users to send large and small chunks of data across the Internet concurrently, based on the concept of turn- taking. A) mainframe B) packet- switching C) e- commerce D) wireless
9) b
10) ________ is a text- based, menu - driven interface that enables users to access Internet resources as if they were in folders and menus on their own computer. A) Archie B) Veronica C) Gopher D) Usenet
10) c
11) Which of the following is NOT a popular voice communication application? A) MSN Messenger B) GTalk C) Skype D) Bittorrent
11) d
1
12) DARPA started researching ways to interconnect networks of various kinds back in the late sixties, producing ________. A) NSFNET B) WAN C) ARPANET D) DARPA
12) c
13) When considering Internet connections there are multiple options. One of them, ISDN, stands for: A) Information Systems Dial- up Network. B) Integrated Services Digital Network. C) International Systems Data Network. D) Internet Signal Direct Network.
13) b
14) An ISP connects to the Internet at an exchange point for Internet traffic, much like a railway station. These exchange points are called: A) intersections. B) Network Access Points (NAPs). C) interchange points. D) onramps.
14) b
15) ________ started researching ways to interconnect networks of various kinds back in the sixties. A) NSF B) DARPA C) WAN D) ARPANET
15) b
16) Satellites that are placed in a fixed position above the earth's surface are known as: A) fixed satellites. B) fixed wireless. C) geostationary. D) Asymmetric Technology Modem.
16) c
17) POTS is also known as: A) public online transfer system. B) personal online telecommunications service. C) public switched telephone network. D) phone operation telecommunication system.
17) c
18) ________ defines how a data packet must be formed and where a router will forward each packet. A) IP B) NSF C) TCP D) UDP
18) a
19) Routers: A) forward data packets from one network to another. B) are used to interconnect independent networks. C) have a central processor, memory, and network interfaces. D) All of the above.
19) d
20) DSL stands for: A) Direct Signal Licenses. C) Data Source Libraries.
20) d
B) Dynamic Signal Links. D) Digital Subscriber Lines.
21) A ________ is a dedicated digital transmission line that can carry 1.544 Mbps of information. A) POTS system B) satellite link- up C) T1 line D) wireless line
21) c
22) The system that uses existing power distribution wires for data transmission is called: A) power line communication. B) WiMax. C) Internet over power lines. D) power Internet.
22) a
2
23) A ________ manages the bulk of network traffic and typically uses a higher - speed connection than the individual LAN segments. A) distributor network B) interconnection network C) router D) backbone network
23) d
24) ________ lines are transmission lines that can carry 45 Mbps of information. A) T1 B) ATM C) T3
24) c
D) IXC
25) The ________ acts as a central repository for Internet- related information. A) IANA B) Internet Registry C) IAB D) IETF
25) b
26) When considering Internet connections there are multiple options. One of them, IoS, stands for: A) Information of Substance. B) Information- online Service. C) Internet over Satellite. D) Internet on Site.
26) c
27) How does one typically connect to the Internet from home? A) Through the ICANN. B) Through the Domain Name System (DNS). C) Through an InterNIC. D) Through an Internet Service Provider (ISP).
27) d
28) What root database is used to associate Internet host names with their IP addresses? A) InterNIC B) IANA C) TCP D) DNS
28) d
29) An ATM, used in the context technology for connecting to the Internet, stands for: A) Automated Telecommunications Mode. B) Asymmetric Technology Modem. C) Automated Teller Machine. D) Asynchronous Transfer Mode.
29) d
30) ________ define the procedures that different computers follow when they transmit and receive data. A) Terminals B) Protocols C) Transmission media D) Networks
30) b
31) Companies that sell long- distance services are called: A) IXC B) ATM C) T3
31) a
32) NAPs are a key component of the: A) Internet backbone. C) DSL service.
D) T1
32) a
B) ISPs' infrastructure. D) wide - area network.
33) A data packet that conforms to IP specifications is called a(n) ________. A) transmission media. B) IP datagram. C) destination address. D) information sequence. 34) Which of the following is NOT a popular instant messaging application? A) Babbler B) Jabber C) AIM
3
33) b
D) GTalk
34) a
35) ________ are the fundamental building blocks of the Internet because they connect thousands of LANs and WANs. A) Packets B) Routers C) IP datagrams D) Backbones
35) b
36) Which of the following is NOT a popular file sharing application? A) Google B) FreeNet C) Bittorrent
36) d
D) WSFTP
37) Computers working as servers on the Internet are known as Internet ________. A) hosts B) servers C) sites D) routers
37) a
38) The protocol of the Internet is: A) NSF. B) UDP.
38) c
C) TCP/IP.
D) IP.
39) User requests for pages stored on Web servers are made with the ________ protocol. A) HTTP B) Internet2 C) gigaPoP D) HTML
39) a
40) Every computer and router connected to the Internet has a ________ address. A) media B) protocol C) standard
40) d
D) unique
41) In rural areas where other high- speed connectivity options are not available, home users often choose ________, which requires line of sight between the sender and receiver. A) cable modem B) mobile wireless C) fiber to the home D) broadband wireless
41) d
42) A(n) ________ is a software application that can be used to locate and display web pages. A) Gopher B) Firefox C) web browser D) Internet Explorer
42) c
43) Packet switching uses the concept of: A) turn taking C) first in- first out
43) a
B) last in- first out D) first come- first served
44) In 1986, the National Science Foundation initiated the development of ________, which became a major component of the Internet. A) DARPA B) WAN C) NSFNET D) ARPANET
44) c
45) A(n) ________ document contains links to other documents that contain related information. A) hypertext B) hyperlink C) referenced D) cross - linked
45) a
46) Which of the following is NOT a popular search engine? A) Opera B) Google C) MSN
46) a
D) Dogpile
47) ________ lines are transmission lines that can carry up to 2.2 Gbps of information. A) T1 B) T3 C) IXC D) ATM
47) d
48) Fiber to the home (FTTH) is also known as: A) Fiber to the premises (FTTP) C) Fiber optic connectivity (FOC)
48) a
B) Cable Internet D) Broadband cable
4
49) A(n) ________ is a Web address containing a domain name, which identifies a particular Web page. A) IP datagram B) Uniform Resource Locator (URL) C) data packet D) HTTP
49) b
50) The technology that enables millions of users to send large and small chunks of data across the Internet concurrently is ________. A) internetworking. B) sliding doors. C) packet switching. D) local area networks.
50) c
51) When considering Internet connections there are multiple options. One of them, POTS, stands for: A) plain old telephone service. B) personal online telecommunications service. C) public online transfer system. D) phone operation telecommunication system.
51) a
52) Which of the following domain extensions, or top- level domains, belongs to a commercial business (whether technical or nontechnical)? A) .org B) .com C) .mil D) .net
52) b
53) The structure of the Internet is: A) flat. B) relational.
53) c
C) hierarchical.
D) convoluted.
54) Which of the following is NOT a popular E - mail application? A) Outlook Express B) Apple Mail C) GTalk D) Mozilla Thunderbird
54) c
55) Why are we transitioning to Ipv6? A) to take the Internet worldwide. B) to comply with new government regulations. C) to avoid confusion when InterNIC morphed into ICANN. D) the number of unassigned Internet addresses is running out.
55) d
56) Cable modems provide Internet service: A) wirelessly. C) over one's phone lines.
56) b
B) through cable TV lines. D) with a fiber- optic cable.
57) In this Web address, www.google.com, what is the domain name? A) google.com B) com C) www
D) index
57) a
58) Domain names have associated numbers such as 1.160.10.240 which enable networks to route messages to the proper destination. These numbers are called: A) Uniform Resource Locators. B) IP datagrams. C) IP addresses. D) domain numbers.
58) c
59) The unique address assigned to every computer and router connected to the Internet is called: A) TCP address. B) destination address. C) IP address. D) IP datagram.
59) c
5
Answer Key Testname: 5 BRIFING 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
C D A C B D C D B C D C B B B C C A D D C A D C B C D D D B A A B A B D A C A D D C A C A A D A B C 6
Answer Key Testname: 5 BRIFING 51) 52) 53) 54) 55) 56) 57) 58) 59)
A B C C D B A C C
7
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Enterprise portals come in two basic forms, the distribution portal and the: A) profitability portal. B) production portal. C) procurement channel. D) procurement portal. 2) The telecommunications networks that enable EDI are termed: A) CANs. B) VANs. C) LANs.
1) d
D) WANs.
2) b
3) Web- based B2B systems range from simple ________ applications to complex trading exchanges where multiple buyers and sellers can congregate to conduct business online. A) intranet B) Web ring C) extranet D) Internet
3) c
4) eBay's typical transaction is an example of a Web site that employs the ________ type of EC. A) B2E B) B2B C) B2C D) C2C
4) d
5) The book relates a three- stage model of EC. Which of the following is not one of the stages? A) E- initiation B) E- information C) E- transaction D) E- integration
5) a
6) An intranet consists of an internal, ________ network using Web technologies to facilitate the secured transmission of proprietary information. A) government B) private C) corporate D) public
6) b
7) The pricing scheme used by the company Priceline.com that allows customers to name their own price is a(n) ________ system. A) forward pricing B) reverse pricing C) immediate pricing D) menu- driven pricing
7) b
8) Intranets and extranets provide many benefits to organizations, including: A) low- cost deployment. B) positive return on investment. C) information timeliness and accuracy. D) All of the above.
8) d
9) Click- only companies may experience challenges in realizing: A) production. B) reverse pricing. C) economies of scale. D) an IPO.
9) c
10) There are several types of EC. Transactions between businesses and consumers (B2C) are known as: A) business- to- carrier. B) business- to- customer. C) business- to- controller. D) business- to- consumer.
10) d
11) A(n) ________ is a vehicle for communicating proprietary information with authorized users outside organizational boundaries. A) Web ring B) intranet C) Internet D) extranet
11) d
1
12) B2C focuses on retail transactions between a company and: A) wholesalers. B) end consumers. C) retailers. D) dealers.
12) b
13) A virtual company is another term for those companies that adopt a ________ strategy. A) business- to- business B) click- only C) brick- and- mortar D) click- and- mortar
13) b
14) By providing ways for customers and firms to conduct business online without assistance from humans, the Internet and Web have significantly reduced ________ costs. A) transaction B) marketing C) human resource D) production
14) a
15) The Internet provides a set of interconnected ________ for individuals and businesses to complete transactions electronically. A) networks B) communication technologies C) platforms D) Web rings
15) a
16) EDI allows companies to have up- to - date information at their command, which enables these companies to make more accurate: A) forecasts. B) purchases. C) marketing strategies. D) None of the above.
16) a
17) Click- and- mortar businesses continue to operate their physical locations, but they have also added a(n) ________ component to their business strategy. A) EC B) marketing C) security D) strategic
17) a
18) E- information is more flexible than traditional promotional methods because this type of information: A) may be modified and posted quickly. B) users obtain outdated information. C) labor expenses are increased. D) is more difficult to update.
18) a
19) Organizations can use ________ to facilitate team efforts. A) videoconferencing B) IM Chat C) their intranet D) all of the above
19) d
20) An extranet allows two or more firms to use the ________ to conduct business together. A) Internet B) Web C) intranet D) telephone
20) a
21) The goal of the e- information stage is to achieve: A) global dissemination of non- customized information. B) customer transaction processing. C) collaboration. D) global dissemination of customized information.
21) a
22) In the term m- commerce, the "m" refers to: A) miscellaneous. B) multi - type.
22) c
C) mobile.
2
D) multimedia.
23) ________ actively pushes information at the consumer whether it is wanted or not. A) Punch marketing B) Pull marketing C) Distribution marketing D) Push marketing
23) d
24) The ability for computing to spread unobtrusively throughout its physical environment is called ________. A) ubiquity. B) embedding. C) localization. D) personalization.
24) a
25) B2B portals can be defined as ________ through which a business partner accesses secured, proprietary information from an organization. A) access points B) intranets C) back doors D) tunnels
25) a
26) Which network is a private network restricted to authorized employees? A) E- Net B) Internet C) Intranet
26) c
D) Extranet
27) Web technologies allow integration of information via Web sites, which can be linked to corporate ________ to provide real- time access to information. A) databases B) executives C) warehouses D) headquarters
27) a
28) A ________ model describes how the firm will generate profits and produce a superior return on invested capital. A) virtual B) revenue C) profit D) business
28) b
29) Interactive communication via the Web enables firms to build ________ by providing immediate communication and feedback to and from customers. A) profit B) firm image C) customer loyalty D) databases
29) c
30) Web- based technologies are ________, which means that disparate computing systems can communicate with each other, provided that standard Web protocols have been implemented. A) multi - platform B) uni- platform C) cross - platform D) non- platform
30) c
31) A VAN is a ________ that provides a direct and secure vehicle for data transmission between a company and its business partners. A) vocal announcement network B) voice analog network C) value- added network D) vehicle analog network
31) c
32) The concept of the ________ refers to a focus on niche markets, rather than purely on mainstream products: A) the long tail B) m - commerce C) e- tailers D) dissemination
32) a
33) Employees access information on the intranet by means of a(n): A) e- mail. B) printer. C) file.
33) d
34) The Web has provided interactive (two- way) communication, which is called: A) interaction. B) communication. C) teamwork. D) collaboration.
3
D) browser.
34) d
35) Firms that operate in both the physical and virtual (online) arenas are termed ________. A) click- and- mortar B) pure play C) brick- and- mortar D) click only
35) a
36) Click- only companies are also referred to as ________ companies. A) click- thru B) pure click C) click- click
36) d
D) pure play
37) The Internet and the World Wide Web are extremely well suited for: A) consumer service and support. B) conducting business electronically. C) marketing products. D) All of the above.
37) d
38) Click- only companies are able to effectively compete with other types of companies on product or service: A) quality. B) delivery. C) price. D) volume.
38) c
39) Web technologies help firms realize their goal of mass: A) employment. B) customization. C) profitability.
39) b
D) production.
40) Which system allow customers to specify the product that they are looking for and set the price that they are willing to pay for the product? A) reverse pricing B) watermarked pricing C) forward pricing D) menu- driven pricing
40) a
41) E- integration, the second stage of EC, is focused on accommodating requests for: A) general information. B) customized information. C) legal information. D) products.
41) b
42) Electronic commerce goes beyond buying and selling. EC can involve the events leading to a purchase, as well as ________ after the sale. A) communication B) management C) marketing D) customer service
42) d
43) The e- information stage of EC involves the promotion of sales and marketing information via a(n): A) e- mail. B) voicemail. C) e- brochure. D) brochure.
43) c
44) Click- only companies do not have: A) warehouses. B) storefronts.
44) b
C) employees.
D) supply chains.
45) While EDI has been used for four decades to conduct B2B transactions, the trend today in business is to use: A) facsimiles. B) facsimiles and the Web. C) facsimiles and telephones. D) the Internet and the Web.
45) d
46) ________ are operated by third- party vendors, meaning that they are built and maintained by a particular company. A) Electronic exchanges B) Resource marketplaces C) Multimedia marketplaces D) Trading exchanges
46) d
4
47) The exchange of ________ in EDI follows a set of formatting standards, which specify how information is transmitted electronically. A) voice mail B) e- mail C) data D) knowledge
47) c
48) Which network is an unrestricted public network? A) E- Net B) Internet
48) b
C) Extranet
D) Intranet
49) Use of the Internet and the Web for internal communications is accomplished by means of a(n): A) LAN. B) intranet. C) extranet. D) tunnel.
49) b
50) Electronic Data Interchange (EDI) is the forerunner of modern ________ EC, as it was used to facilitate transactions between large corporations and their suppliers. A) B2B B) click- only C) B2C D) C2C
50) a
51) According to the book, EC was used as far back as the year ________ during the Berlin Airlift. A) 1945 B) 1943 C) 1948 D) 1941
51) c
52) Another challenge for the click- and- mortar company is the requirement for Web- based computing skills, which requires the company to make substantial investments in resources such as ________ and computers. A) hardware B) networks C) software D) people
52) d
53) EDI refers to the ________ transmission of business information between organizations via telecommunications networks. A) tunneling B) digital C) managerial D) paper
53) b
54) The combination of the Internet and Web technologies has given rise to a global platform where firms across the world can compete for customers and gain access to new: A) markets. B) monies. C) employees. D) competitors.
54) a
55) While EDI was generally limited to large corporations, the Internet and the Web have provided an economical medium over which information can be transmitted, thus enabling small to midsize enterprises to participate in ________ markets. A) C2C B) traditional C) B2C D) B2B
55) d
56) Organizations often install disparate applications on different computing platforms, which made it difficult for users to consolidate the needed information. Today, these consolidation problems can be solved by adding a single product to the ________. A) web page. B) firewall. C) SiteMinder. D) intranet Web server.
56) d
57) EDI began in the: A) 1940s.
57) b
B) 1960s.
C) 1970s.
D) 1950s.
58) This type of technology allows for the tracking of illegal copies of music to be tracked to the original purchaser. A) DRM B) Counterfeit technology C) Tracker technology D) Reverse download technology
5
58) a
59) ________ automate the business processes involved in selling or distributing products from a single supplier to multiple buyers. A) Resource portals B) Procurement portals C) Distribution portals D) Enterprise portals
59) c
60) ________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a supplier and multiple customers. A) Enterprise portals B) Distribution portals C) Procurement portals D) Resource portals
60) b
61) Another term for an electronic marketplace is: A) electronic exchange. C) multimedia marketplace.
61) d
B) trading floor. D) trading exchange.
62) ________ are designed to automate the business processes that occur before, during and after sales have been transacted between a buyer and multiple suppliers. A) Enterprise portals B) Procurement portals C) Resource portals D) Distribution portals
62) b
63) Which network is a private network used for communications with business partners? A) Extranet B) Internet C) Intranet D) E- Net
63) a
64) One particular limitation associated with EDI is its: A) monetary expense. C) lack of need for skilled employees.
64) a
B) lack of utility across many businesses. D) All of the above.
65) The Internet and the World Wide Web (Web) have fueled a revolution in the manner in which products and services are sold. In this respect, their far- reaching effects have led to the creation of a nearly limitless: A) virtual auction house. B) electronic social environment. C) electronic marketplace. D) virtual work environment.
65) c
66) B2B is a type of EC that refers to transactions that occur as: A) buyer- to - business. B) business- to- consumer. C) business- to- business. D) business- to- buyer.
66) c
67) In order to facilitate e- integration, Web sites must be integrated with organizational ________ in order to extract and display the appropriate information. A) databases B) sales offices C) IS team D) headquarters
67) a
68) Electronic commerce (EC) is defined as the online exchange of ________ between firms, and also between firms and their customers. A) goods B) money C) services D) All of the above.
68) d
69) Companies that choose to operate solely in the traditional physical markets are described as: A) pure play. B) business- and- mortar. C) brick- and- mortar. D) brick- and- click.
69) c
6
70) ________ is the phenomenon of cutting out the middle vendor ("middleman") and reaching customers in a more direct and efficient manner. A) Reverse pricing B) Watermarking C) Disintermediation D) Tunneling
70) c
71) The ________ phase adds the ability for customers to enter orders and payments online. A) E- bay B) E- integration C) E- information D) E- transaction
71) d
72) B2E types of EC are referred to as: A) business- to- everyone. C) business- to- employee.
72) c
B) buyer- to - employee. D) business- to- environment.
73) The chapter's opening case relates that eBay.com business model. eBay's profit possibly foretells: A) a stabilizing of EDI. B) that much more time is needed for electronic commerce to become mainstream. C) a stabilizing of Internet- based electronic commerce. D) None of the above.
73) c
74) One of the significant intranet applications used by organizations to leverage their EC investment is: A) application integration. B) training. C) real- time access to information. D) All of the above
74) d
75) The factor of ________ is not a limitation as it is in traditional stores. A) culture B) employees C) money
75) d
D) time
76) While an intranet looks and acts like a publicly accessible Web site, there are ________ that secure proprietary information from the public. A) telecommunication walls B) firewalls C) intranet walls D) boundaries
76) b
77) It is the worldwide connectivity of the Internet that provides a relatively ________ medium for marketing products over long distances. A) economical B) expensive C) difficult D) None of the above.
77) a
78) The major portion of B2C focuses on electronic retailing, which is also called: A) retailing. B) click- tailing. C) e- selling.
78) d
7
D) e- tailing.
Answer Key Testname: 5 CHAPTER 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
D B C D A B B D C D D B B A A A A A D A A C D A A C A B C C C A D D A D D C B A B D C B D D C B B A 8
Answer Key Testname: 5 CHAPTER 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) 67) 68) 69) 70) 71) 72) 73) 74) 75) 76) 77) 78)
C D B A D D B A C B D B A A C C A D C C D C C D D B A D
9
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) To execute denial of service attacks, intruders often use ________ computers. A) android B) monster C) robot
D) zombie
1) d
2) Assuring the recipient that the received message has not been altered in any way from the original that was sent is called: A) Authentication B) Privacy/confidentiality C) Nonrepudiation D) Integrity
2) d
3) Which of the following is NOT a way to react to identified risks? A) Risk transference. B) Risk acceptance. C) Risk embracement. D) Risk reduction.
3) c
4) ________ is electronic junk mail or junk newsgroup postings, usually for the purpose of advertising some product and/or service. A) Spam B) Spyware C) Adware D) Spim
4) a
5) ________ attacks occur when electronic intruders deliberately attempt to prevent legitimate users from using that service. A) Information modification B) Denial of service C) Manipulation D) Brute- force
5) b
6) ________ are the least used security technology. A) Passwords B) Encrypted files
6) c
C) Biometrics
D) Firewalls
7) Which of the following is NOT a threat to information systems security? A) Links to outside business contacts. B) Employees and consultants. C) Accidents and natural disasters. D) All of the above are threats to information systems security.
7) d
8) ________ is any software that covertly gathers information about a user though an Internet connection without the user's knowledge. A) Spyware B) Worms C) Viruses D) Adware
8) a
9) A(n) ________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring. A) risk assessment plan B) information systems security plan C) infrastructure management D) disaster recovery plan
9) b
10) A(n) ________ system is an encryption system where both the sender and recipient use the same key for encoding (scrambling) and decoding the message. A) symmetric key B) asymmetric key C) certificate authority D) public key
1
10) a
11) ________ technology is a data encryption technique that uses two keys a private key and a public key to encrypt and decode messages. A) Certificate authority B) Public key C) Asymmetric key D) Symmetric key
11) b
12) ________ is the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transfer, so that only the intended recipients can read or hear them. A) Encryption B) Authentication C) Authorization D) Encapsulation
12) a
13) ________ is the process of confirming the identity of a user who is attempting to access a system or Web site. A) Authentication B) Privacy/confidentiality C) Nonrepudiation D) Integrity
13) a
14) A ________ is a network connection that is constructed dynamically within an existing network often called a secure tunnel in order to securely connect remote users or nodes to an organization's network. A) virtually protected network B) virtual private network C) verified protected network D) very protected network
14) b
15) ________ and antivirus software are the most widely used security technologies. A) Encrypted files B) Passwords C) Biometrics D) Firewalls
15) d
16) A firewall ________ is the manner in which a firewall is implemented such as hardware only, software only, or a combination of hardware and software. A) architecture B) topology C) topography D) layout
16) a
17) A(n) ________ is a message passed to a Web browser on a user's computer by a Web server, that is then stored in a text file by the browser; that message is sent back to the server each time the user's browser requests a page from that server. A) identifier B) text file C) message D) cookie
17) d
18) A(n) ________ is a firewall that serves as, or creates the appearance of, an alternative server that intercepts all messages entering and leaving the network, effectively hiding the true network addresses. A) Packet filtering B) Application level control C) Circuit- level control D) Proxy server
18) d
19) ________ is a type of security that grants or denies access to a resource (e.g., facility, computer systems) through the analysis of fingerprints, retinal patterns in the eye, or other bodily characteristics. A) Biometrics B) Bioinformatics C) Bio- authentication D) Bio- identification
19) a
20) Human- based safeguards include: A) federal and state laws. C) effective management.
20) d
B) ethical behavior. D) All of the above.
2
21) ________ is the prevention of unauthorized access to a private network by a firewall that detects when a certain type of connection or circuit has been made between specified users or systems on either side of the firewall. A) Packet filtering B) Application level control C) Circuit- level control D) Proxy server
21) c
22) ________ consist of destructive code that can erase a hard drive, seize control of a computer, or otherwise do damage. A) Worms B) Zombies C) Spyware D) Viruses
22) d
23) An information systems security audit should include all EXCEPT: A) hardware and software. B) any business processes that involve hardware, software, data, and networks. C) data and networks. D) It should include all of the above.
23) d
24) Encryption software allows users to ensure: A) nonrepudiation. C) privacy/confidentiality.
24) d
B) authentication. D) All of the above.
25) One critical components of a good information systems audit is a thorough ________ analysis. A) threat B) hazard C) risk D) cost- benefit
25) c
26) According to the CSI/FBI Cyber Crime Survey, ________ conduct routine and ongoing security audits. A) 25 percent or less B) 75 percent C) 90 percent or more D) 50 percent
26) c
27) ________ is a computer attack in which an attacker accesses a computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network. A) Spoofing B) Sneaking C) Shoulder surfing D) Drive- by hacking
27) d
28) ________ is a technology intended to generate unbreakable codes. A) Pretty good privacy B) RSA C) Clipper chip D) Secure sockets layer
28) c
29) ________ is a computer system security policy in which someone else absorbs the risk, as with insurance. A) Risk acceptance B) Risk embracement C) Risk transference D) Risk reduction
29) c
30) Some spam consists of ________, asking you to donate money to nonexistent causes or warning you of viruses and other Internet dangers that do not exist. A) hoaxes B) pranks C) jokes D) tricks
30) a
31) Firewalls can be implemented in: A) hardware. B) software.
31) d
C) data.
3
D) both A and B
32) Common responses to a security breach include all of the following EXCEPT: A) tracing the attacker. B) restoring lost data using backups. C) implementing a combination of additional safeguards. D) performing a new risk audit.
32) a
33) ________ is software used to keep track of computer activity so that auditors can spot suspicious activity and take action if necessary. A) Computer monitoring software B) Internet security software C) Security test software D) Audit control software
33) d
34) Policies and procedures related to computer security include the following EXCEPT: A) security policy. B) information policy. C) prevention policy. D) backup policy.
34) d
35) Unauthorized access can be achieved by: A) stealing storage media. B) opening files on a computer that has not been set up to limit access. C) physically stealing computers. D) all of the above.
35) d
36) Some spam e- mail includes ________, which are attempts to trick financial account and credit card holders into giving away their authorization information. A) luring B) tricking C) phishing D) freaking
36) c
37) Physical access is usually limited by making it dependent on: A) something you are. B) something you have. C) something you know. D) all of the above.
37) d
38) ________ is hardware or software designed to keep unauthorized users out of network systems. A) A firewall B) A network filter C) A wall D) Network protection software
38) a
39) A virtual private network uses ________ to encapsulate, encrypt, and transmit data over the Internet infrastructure, enabling business partners to exchange information in a secured, private manner between organizational networks. A) enclosing B) encryption C) tunneling D) encapsulation
39) c
40) ________, developed by Netscape, is a popular public- key encryption method used on the Internet. A) Clipper chip B) RSA C) Pretty good privacy D) Secure sockets layer
40) d
41) ________ is a type of software for securing information systems by only allowing specific users access to specific computers, applications, or data. A) Computer security software B) Application restriction software C) Access control software D) Data protection software
41) c
4
42) A(n) ________ is a trusted middleman between computers that verifies that a Web sites is a trusted site and is used when implementing public - key encryption on a large scale. A) certificate authority B) certificate provider C) public key generator D) verification service
42) a
43) ________ take advantage of security holes in operating systems and other software to replicate endlessly across the Internet, thus causing servers to crash, denying service to Internet users. A) Worms B) Spyware C) Zombies D) Viruses
43) a
44) Other technological safeguards to protect against security breaches include all EXCEPT: A) closed- circuit television.. B) backups. C) uninterruptible power supply. D) All of the above can help to protect against security breaches.
44) d
45) ________ is the prevention of unauthorized access to a computer network by a firewall at the data packet level; data packets are accepted or rejected based on predefined rules. A) Packet filtering B) Application level control C) Circuit- level control D) Proxy server
45) a
46) The record showing who has used a computer system and how it was used is called ________. A) electronic footprints B) navigational trail C) audit trail D) breadcrumbs
46) c
47) One common way to gain access to a password- protected system is to use a ________ approach. A) back- door B) "sneak peek" C) social engineering D) brute- force
47) d
48) The science of encryption is called ________. A) cryptology B) cryptography
48) b
C) cryptics
D) cryptonics
49) ________ is the process of hiding computers' true network addresses by replacing the computers' IP addresses with a firewall's address; thus, potential attackers only "see" the network address of the firewall. A) Packet filtering B) Application level control C) Circuit- level control D) Network Address Translation
49) d
50) ________ is the prevention of unauthorized access to selected applications by some form of security. A) Packet filtering B) Application level control C) Circuit- level control D) Proxy server
50) b
51) An information systems security plan involves: A) plan implementation and ongoing monitoring. B) planning ways to reduce risks. C) assessing risks. D) All of the above.
51) d
5
52) A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called: A) Authentication B) Privacy/confidentiality C) Nonrepudiation D) Integrity
52) c
53) According to the CSI/FBI Cyber Crime Survey, ________ of the organizations utilize cyberinsurance. A) 50 percent B) 25 percent or less C) 75 percent D) 90 percent or more
53) b
54) ________, developed by Phil Zimmerman, is the global favorite for encrypting messages. A) RSA B) Secure sockets layer C) Clipper chip D) Pretty good privacy
54) d
55) Ensuring that no one can read the message except the intended recipient is called: A) Authentication B) Privacy/confidentiality C) Nonrepudiation D) Integrity
55) b
56) Risk analysis is a process in which you: A) determine the likelihood of the assets being compromised. B) assess the value of the assets being protected. C) compare the probable costs of the assets being compromised with the estimated costs of whatever protection you might have to take. D) All of the above.
56) d
57) ________ is a computer system security policy in which no countermeasures are adopted, and any damages that occur are simply absorbed. A) Risk embracement B) Risk reduction C) Risk transference D) Risk acceptance
57) d
58) Spam over ________ is referred to as spim. A) blogs C) instant messaging
58) c
B) skype D) video telephony
59) ________ attacks occur when someone accesses electronic information and then changes the information in some way. A) Information modification B) Brute- force C) Denial of service D) Manipulation
59) a
60) Any good approach to securing information systems begins first with a thorough ________ of all aspects of those systems. A) audit B) cleaning C) disinfection D) quarantining
60) a
61) According to the CSI/FBI Cyber Crime Survey, ________ of the organizations report computer intrusions to law enforcement. A) 75 percent B) 25 percent or less C) 90 percent or more D) 50 percent
61) b
6
62) ________ collects information about a person in order to customize Web browser banner advertisements. A) Adware B) Viruses C) Worms D) Spyware
62) a
63) A(n) ________ is a distorted image displaying a combination of letters and/or numbers a user has to input in a form. A) passcode B) CAPTCHA C) GOTCHA D) Turing test
63) b
64) ________ is the process of taking active countermeasures to protect information systems. A) Risk embracement B) Risk transference C) Risk reduction D) Risk acceptance
64) c
7
Answer Key Testname: 6 CHAPTER 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
D D C A B C D A B A B A A B D A D D A D C D D D C C D C C A D A D D D C D A C D C A A D A C D B D B 8
Answer Key Testname: 6 CHAPTER 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64)
D C B D B D D C A A B A B C
9
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Functional area information systems are ________ level information systems that are designed to support a discrete area of an organization. A) executive B) operational C) managerial D) cross - organizational
1) d
2) The inputs to an office automation system include: A) messages, reports and schedules. C) requests for help.
2) d
B) reports and trends. D) documents, schedules and data.
3) Some typical uses for an electronic meeting system do NOT include: A) emergency management. B) marketing focus groups. C) strategic planning sessions. D) quality improvement.
3) a
4) A characteristic of the omni- directional camera is that: A) it enables multiple people in different locations to communicate. B) it can detect sound so that it will focus on the person who is talking. C) it can detect motion and can find and focus on moving people's faces. D) All of the above.
4) d
5) An example of a(n) ________ information system is an inventory management system for a shoe store that keeps track of inventory and issues an order for additional inventory when levels drop below a specified level. A) operational B) functional C) managerial D) executive
5) a
6) An executive information system consists of: A) people. C) software and hardware.
6) d
B) data and procedures. D) All of the above.
7) Using the Internet or a high- speed phone line, desktop videoconferencing can be performed ________. A) only with fast network connections. B) on personal computers. C) only in specially adapted conference rooms. D) only with Microsoft Research's camera.
7) b
8) DSSs are typically used by managerial - level employees to help them solve ________ problems, such as sales and resource forecasting. A) semistructured B) structured C) complex D) simple
8) a
9) The goal of a management information system is to: A) support day- to - day activities. B) support the decision making associated within a functional area of the organization. C) provide reports which will be used as input to a TPS. D) automate repetitive information- processing activities.
9) b
1
10) To be competitive, organizations need: A) to ensure that people in teams have the knowledge and skills to solve problems quickly and easy. B) to bring together people who have the appropriate set of knowledge and skills into teams. C) to form teams with the right combinations of people. D) All of the above.
10) d
11) Examples of the types of activities that can be supported by expert systems include: A) medical diagnosis and computer user help desk. B) financial management and forecasting. C) payroll processing and inventory management. D) advertising and product pricing.
11) a
12) Are of the following are benefits to knowledge management systems EXCEPT. A) Improved organizational performance B) Enhanced employee retention C) Enhanced innovation and creativity D) Getting employee buy- in
12) d
13) ________ is an example of a groupware product that enables people to work together more effectively. A) Microsoft FrontPage B) EXSYS C) Notes D) Infogate
13) c
14) A challenge of the executive information system is to provide timely ________ information to executive decision makers. A) soft B) hard C) day- to - day D) None of the above.
14) a
15) Common DSS models in accounting do NOT include: A) auditing. B) payroll and deductions. C) cost analysis. D) budgeting.
15) b
16) The basic systems model is used to describe virtually all information systems and it consists of the following elements: A) processing. B) output. C) input. D) All of the above.
16) d
17) A DSS is created to be a(n) ________ decision aid. A) professional B) passive
17) c
C) interactive
D) analytic
18) An example of a batch transaction system is: A) an event ticket reservation processing system. B) a payroll processing system. C) a grocery store checkout processing system. D) an airline reservation processing system.
18) b
19) Web- based implementations are supporting ________ meetings in which group members access the EMS software from their computers in their offices or from home. A) traditional B) multi - functional C) distributed D) asynchronous
19) c
2
20) People in the ________ function focus on the activities that promote the organization and its products in a way that attracts and retains customers. A) accounting B) finance C) production D) marketing
20) d
21) Examples of typical information systems in production and operations include: A) resource analysis. B) customer problem tracking. C) new product development. D) promotion and advertising.
21) b
22) The goal of ________ systems is to automate repetitive information- processing activities within organizations. A) management information B) transaction processing C) decision support D) executive information
22) b
23) ________ is the second generation of video communication that allows the users to see a live picture of the person(s) they are talking to with the phone calls. A) Electronic meeting system B) Desktop videoconferencing C) Groupware D) Stand- alone videoconferencing
23) b
24) A drill- down report provides ________ information as to why a key indicator is not at an appropriate level. A) unplanned B) nonroutine C) summarized D) detailed
24) d
25) Problems at the executive level of the organization are: A) relatively complex and nonroutine. B) relatively complex and recurring. C) repetitive and insignificant. D) highly structured and recurring.
25) a
26) The advantages of transaction processing systems include: A) decreased data entry errors and marketing expenses. B) increased number of people in the process and less data entry errors. C) increased number of people in the process, speed and accuracy. D) decreased transaction costs and data entry errors.
26) d
27) Examples of asynchronous groupware include: A) electronic meeting systems. C) shared whiteboards.
27) d
B) voting systems. D) e- mail and mailing lists.
28) ________ systems are used to mimic human expertise by manipulating knowledge rather than simply information. A) Office automation B) Decision support C) Functional area information D) Intelligent
28) d
29) Some of the technologies that are most suitable for being used by members of virtual teams include: A) videoconferencing and groupware. B) E- mails. C) fax machines. D) pagers.
29) a
30) Some examples of the outputs created by a transaction processing system include: A) counts and summary reports. B) trends and summary reports. C) recommendations and advice. D) scheduled and ad hoc reports.
30) a
3
31) Managerial - level decision making is referred to as ________ decision making, because solutions and problems are not clear- cut and often require judgment and precision. A) semistructured B) unstructured C) structured D) day- to - day
31) a
32) Information systems at the operational level of an organization are designed to: A) improve the efficiency of the consumer interface. B) automate repetitive activities. C) improve the efficiency of business processes. D) All of the above.
32) d
33) Typical information systems in marketing do NOT include: A) market research and analysis. B) customer service tracking. C) pricing and sales analysis. D) product location analysis.
33) b
34) An interactive class registration system that immediately notifies the user of his or her success to register in a class is an example of ________ processing of transactions. A) operational B) batch C) scheduled D) online
34) d
35) The outputs of a DSS include: A) summary reports and trend analysis. C) textual and graphical reports.
B) exception and scheduled reports. D) recommendations or advice.
35) c
36) The output from an expert system includes: A) a report. C) aggregated data
B) a trend analysis. D) recommendations.
36) d
37) Managers at the executive level of the organization focus on: A) problems within a specific business function. B) improving the efficiency of business processes. C) effectively utilizing and deploying organizational resources. D) long- term strategic issues facing the organization.
37) d
38) For unstructured decisions, information systems are used to: A) improve efficiency by automating routine activities. B) obtain aggregate summaries of trends and projections of the future. C) automate repetitive activities. D) improve effectiveness by automating the monitoring and control of organizational activities.
38) b
39) An executive information system does NOT support: A) long- range and strategic planning. B) staffing and labor relations. C) manufacturing planning and scheduling. D) crisis management.
39) c
40) ________ systems are special- purpose information systems designed to support the decision making related to a particular recurring problem in the organization. A) Functional area information B) Expert C) Office automation D) Decision support
40) d
4
41) Inputs to a management information system are data produced by a(n) ________ system, other internal data and ad hoc requests for special reports or summaries. A) expert B) executive information C) transaction processing D) decision support
41) c
42) The processing aspect of an executive information system focuses on: A) data sorting and summaries. B) data aggregation and summaries. C) data summaries and simulations. D) data summaries and graphical interpretations.
42) d
43) ________ systems consist of technology and the people needed to consolidate information and to support managers at the highest level of the organization. A) Transaction processing B) Decision support C) Executive information D) Management information
43) c
44) ________ reports are produced daily, weekly or monthly to support the routine informational needs of managerial- level decision making. A) Exception B) Ad hoc reports C) Scheduled D) Drill- down
44) c
45) Some common DSS models in marketing include: A) sales performance, product demand forecast and pricing strategies. B) market share analysis, pricing strategies and product design. C) product- mix inventory level, product design and product demand forecast. D) product design, product demand forecast and pricing strategies.
45) a
46) ________ describe the transactions created in a business function and they serve as stimulus to a transaction processing system. A) Source documents B) Business reports C) Scheduled reports D) Structured documents
46)
47) A(n) ________ is a way of encoding knowledge after collecting information from a user. A) fact B) statement C) information D) rule
47) d
48) Within the process component of a DSS, examples of the interactive processing of data and models include: A) optimization and simulations. B) graphical interpretations and simulations. C) data aggregation and forecasting. D) data sorting and summaries.
48) a
49) An example of a ________ TPS is a data capture device which is used at the checkout counter of a grocery store. A) semiautomated B) fully automated C) manual D) batch
49) a
50) In ________ decisions, the procedures for a given situation can be specified in advance. A) unstructured B) structured C) semi - structured D) day- to - day
50) b
5
51) A production manager at Nike uses information about sales forecasts for multiple product lines provided by a(n) ________ information system to create multiple production schedules. A) managerial - level B) executive- level C) operational- level D) organizational- level
51) a
52) Groupware supports: A) different time, different place meetings. C) same time, different place meetings.
52) d
B) same time, same place meetings. D) All of the above.
53) Are of the following are challenges to knowledge management systems EXCEPT. A) Focusing too much on technology B) Getting employee buy- in C) Enhanced employee retention D) Forgetting the goal
53) c
54) ________ consists of matching facts and rules, determining the sequence of questions and drawing a conclusion. A) Planning B) Deduction C) Inferencing D) None of the above.
54) c
55) Some examples of boundary- spanning systems are: A) decision support systems, expert systems and office automation systems. B) transaction processing systems, management information systems and office automation systems. C) decision support systems, expert systems and executive information systems. D) transaction processing systems, management information systems and executive information systems.
55) a
56) Examples of the types of activities supported by an office automation system include: A) manufacturing planning and scheduling. B) financial planning and machine configuration. C) sales and order planning. D) communication and scheduling.
56) d
57) Ford Motor Company uses an online ________ system on the Web to post information about their products and dealers where customers can locate their nearest dealer. A) executive information B) transaction processing C) management information D) expert
57) b
58) Rules in an expert system are typically expressed using a ________ format. A) for- next B) if- then C) what- if D) None of the above.
58) b
59) ________ decisions deal with complex problems with broad and long - term ramifications for the organization. A) Managerial - level B) Executive- level C) Operational - level D) Functional- level
59) b
60) ________ systems are a collection of software and hardware for developing documents, scheduling resources and communicating. A) Management information B) Decision support C) Expert D) Office automation
60) d
6
61) Routine, day- to- day business processes and interaction with customers occur at the ________ level of a firm. A) functional B) operational C) executive D) managerial
61) b
62) Activities supported by transaction processing systems do NOT include: A) accounts payable and receivable. B) sales forecasting. C) inventory management. D) payroll processing.
62) b
63) Problems at the executive level of the organization are: A) relatively complex and nonroutine. B) relatively complex and recurring. C) highly structured and recurring. D) repetitive and insignificant.
63) a
64) An example of a decision analysis tool which is most commonly used with a DSS is: A) Microsoft Excel. B) Microsoft FrontPage. C) Microsoft PowerPoint. D) Microsoft Word.
64) a
65) Lower- level ________ generate much of the hard data provided by an EIS. A) MISs and TPSs B) MISs and DSSs C) TPSs and DSSs D) DSSs, MISs and TPSs
65) a
66) Examples of the types of activities supported by management information systems include: A) financial management and forecasting. B) product purchasing, receiving and shipping. C) long- range and strategic planning. D) payroll processing.
66) a
67) The processing aspect of a management information system focuses on: A) data summaries and simulations. B) data summaries and graphical interpretations. C) data aggregation and summaries. D) data sorting and summaries.
67) c
68) Data entry into a transaction processing system can be: A) semiautomated. B) manual. C) fully automated. D) All of the above.
68) d
69) At the managerial level, ________ managers focus on monitoring and controlling operational- level activities and providing information to higher levels of the organization. A) functional B) operational C) personnel D) executive
69) a
70) Managers at the managerial level typically focus on problems: A) across several departments. B) within a specific business function, such as marketing or finance. C) within a time frame. D) across the organization.
70) b
7
71) The benefits of groupware include all of the following EXCEPT: A) document preparation. B) it automatically records member ideas and comments, and allows foe anonymity. C) it allows easy access to external electronic data and files that can be easily distributed to participants. D) it allows larger groups to participate.
71) a
72) What- if analysis allows the manager to make ________ changes to the data associated with a problem and observe how these changes influence the results. A) real B) scheduled C) complex D) hypothetical
72) d
73) A(n) ________ system combines information from multiple data sources into a structured report that allow managers to monitor and manage the organization better. A) office automation B) management information C) executive information D) decision support
73) b
8
Answer Key Testname: 7 CHAPTER 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
D D A D A D B A B D A D C A B D C B C D B B B D A D D D A A A D B D C D D B C D C D C C A A D A A B 9
Answer Key Testname: 7 CHAPTER 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) 67) 68) 69) 70) 71) 72) 73)
A D C C A D B B B D B B A A A A C D A B A D B
10
Exam Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) ________ involves the business activities associated with receiving and stocking raw materials, parts and products. A) Marketing and sales B) Operations and manufacturing C) Inbound logistics D) Outbound logistics
1) c
2) ________ is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them. A) Technology development B) Human resources C) Infrastructure D) Procurement
2) b
3) ________ tags are small and relatively inexpensive, and typically have a range up to a few feet. A) Basic B) Active C) Passive D) Simple
3) c
4) ________ applications provide support for the day - to - day sales activities of an organization. A) Customer Relationship Management B) Supply Chain Management C) Sales Force Automation D) Enterprise Resource Planning
4) c
5) At the heart of the ________ is the CIC. A) Analytical CRM C) Executional CRM
5) d
B) Operational CRM D) Collaborative CRM
6) Companies must take special care when dealing with customization issues because: A) maintaining and upgrading customizations can be troublesome. B) new vanilla versions must be continually upgraded to accommodate the customization. C) customizations can be costly. D) All of the above.
6) d
7) ________ activities are functional areas within an organization that process inputs and produce outputs. A) Main B) Core C) Secondary D) Support
7) b
8) ________ is often the most overlooked, underestimated and poorly budgeted expense involved in planning enterprise system implementations. A) Help from outside experts B) Executive sponsorship C) Customization D) Training
8) d
9) Altering the way in which business processes are conducted is known as: A) Enterprise Resource Planning. B) Customer Relationship Management. C) Supply Chain Management. D) Business Process Management.
9) d
10) Enterprise portals can be defined as ________ through which a business partner accesses secured, proprietary information from an organization. A) back doors B) intranets C) access points D) tunnels
10) c
1
11) ________ information systems are information systems that allow companies to integrate information across operations on a company- wide basis. A) Functional area B) Enterprise- wide C) Executive D) Management
11) b
12) In contrast to ________, ERP applications make accessing information easier by providing a central information repository. A) packaged applications B) data warehouses C) custom applications D) legacy systems
12) d
13) In most organizations, each department implements applications to assist it with its daily business activities, and as a result, these applications tend to be: A) run on the same platforms. B) similar in each department. C) infrastructure- specific. D) externally focused.
13) c
14) Applications focusing on downstream information flows have two main objectives potential customers and: A) develop and maintain customer satisfaction. B) achieve competitive advantage. C) create customer loyalty. D) None of the above.
14) c
to attract
15) Microsoft Word and Microsoft Excel have similar ________ and simply differ in the features and functionality that each application offers. A) capabilities B) user interfaces C) operations screens D) None of the above.
15) b
16) One of the areas related to control involves the consistency of: A) legacy systems used in each department. B) business activities. C) policies and procedures. D) transactions involved in each department.
16) c
17) A successful CRM strategy must include: A) employee training changes. C) customer service changes.
17) d
B) policy and business process changes. D) All of the above.
18) Marketing researchers have found that the cost of trying to get back customers that have gone elsewhere can be up to ________ times as much as keeping a current one satisfied. A) 0 to 25 B) 50 to 75 C) 25 to 100 D) 50 to 100
18) d
19) ERP applications that access the data warehouses are designed to have: A) the same look and feel, regardless of the unique needs of a particular department. B) a varying look and feel, depending on the needs of the organization. C) different user interfaces to access different pieces of information. D) a different look and feel, depending of the unique needs of a particular department.
19) a
2
20) In today's highly competitive markets, ________ hold the balance of power because, if they become dissatisfied with the levels of service they are receiving, there are many alternatives readily available to them. A) customers B) business partners C) suppliers D) competitors
20) a
21) An operational CRM system includes: A) EMA C) CSS
21) d
B) SFA D) All of the above.
22) A comprehensive CRM system includes: A) analytical CRM. C) operational CRM.
22) d
B) collaborative CRM. D) All of the above.
23) A more descriptive term to describe the flow of materials from suppliers to a company is ________ because multiple suppliers are involved in the process of servicing a single organization. A) supply chain B) value system C) supply network D) value chain
23) c
24) Like ERP and CRM applications, SCM packages are delivered in the form of ________, which companies select and implement according to their business requirements. A) modules B) components C) systems D) solutions
24) a
25) The key purpose of a(n) ________ system is to streamline the flow of information from one company's operations to another's. A) management information B) intraorganizational C) operational D) interorganizational
25) d
26) ________ are operated by third- party vendors, meaning that they are built and maintained by a particular company. A) Multimedia marketplaces B) Resource marketplaces C) Electronic exchanges D) Trading exchanges
26) d
27) A recent survey suggested that ________ percent of companies that undertake enterprise system implementations do not fully realize the results they had hoped. A) 30 to 40 B) 10 to 20 C) 60 to 80 D) 40 to 60
27) d
28) Analytical CRM is commonly referred to as ________ system. A) internal B) external C) front- office
28) d
D) back- office
29) The supply chain ________ module in SCM packages allows a company to monitor every stage of the supply chain process, from price quotation to the moment the customer receives the products and issue alerts when problem arise. A) exchange B) collaboration C) performance management D) event management
29) d
30) ________ are designed to automate the business processes that occur before, during and after sales have been transacted between a buyer and multiple suppliers. A) Procurement portals B) Distribution portals C) Enterprise portals D) Resource portals
30) a
3
31) ________ allows Web page designers to create customized tags that specify how the document should be formatted. A) W3C B) HTML C) XBRL D) XML
31) d
32) SAP's collaborative fulfillment module does NOT include the following functions: A) supporting the entire logistics process, including picking, packing, shipping and international activities. B) sharing information and integrating processes up and down the supply chain. C) fulfilling orders from channels on time with order management, transportation planning and vehicle scheduling. D) committing to delivery dates in real time.
32) b
33) ________ technology uses electromagnetic or electrostatic coupling to transmit signals. A) RFID B) XBRF C) RFED D) XBRL
33) a
34) The implementations of enterprise systems are often ________ originally envisioned. A) less expensive than B) as costly and time consuming as C) more costly and more time consuming than D) not as effective as
34) c
35) The emergence of the Internet and Web has resulted in ________, opening up new opportunities and methods for conducting business. A) the integration of customer and supplier networks B) delineating the customer and supplier networks C) the integration of all business processes within an organization D) the globalization of customer and supplier networks
35) d
36) ________ systems are older systems that are close to or at the end of their useful life. A) Internally- focused B) Legacy C) Conversion D) Packaged
36) b
37) Applications focusing on ________ information flows have two main objectives - to accelerate product development and to reduce costs associated with procuring raw materials, components and services from suppliers. A) integrated B) downstream C) upstream D) internally- focused
37) c
38) A radical redesign of an organization is sometimes necessary to: A) create best practices. B) lower costs and increase quality. C) develop an organizational vision. D) focus on incremental changes.
38) b
39) Successful CSS systems enable: A) faster response times. B) improved productivity for service and support personnel. C) increased first- contact resolution rates. D) All of the above.
39) d
4
40) An Enterprise Marketing Automation system provides a comprehensive view of the: A) environmental factors. B) industry trends. C) competitors. D) All of the above.
40) d
41) Companies need to have a(n) ________ system that captures information from retail stores, Web sites, call centers and various other ways that organizations can communicate downstream within their value chain. A) distributed B) internally- focused C) improved D) integrated
41) d
42) ________ systems are highly useful for standardized, repetitive tasks such as making entries in a check register. A) Custom B) Stand- alone C) Expert D) Packaged
42) d
43) MRP stands for: A) Most Rapid Performance. C) Material Resource Planning.
43) b
B) Material Requirements Planning. D) Multiple Resource Planning.
44) Enterprise systems affect the entire organization and, thus, companies should include personnel from ________ in the implementation project. A) different levels in the same department B) different levels and departments C) the executive level D) the same level in different departments
44) b
45) ________ is an XML- based specification for publishing financial information. A) EDI B) W3C C) HTML
45) d
D) XBRL
46) Sharing ________ between organizations helps companies to adapt more quickly to changing market conditions. A) management B) information C) operations D) packages
46) b
47) Support activities include infrastructure, human resources, ________ and procurement. A) technology development B) operations and management C) marketing and sales D) customer service
47) a
48) Problems such as excessive inventories, inaccurate manufacturing capacity plans and missed production schedules can run rampant when: A) there is a one- to - one relationship between the supplier and a company. B) firms within a supply network do not collaborate effectively. C) more and more suppliers are involved in a supply network. D) multiple suppliers service a single organization.
48) b
49) The National Quality Research Center estimates that a one percent increase in customer satisfaction can lead to a(n) ________ increase in a company's market capitalization. A) insignificant B) considerable C) threefold D) twofold
49) c
50) ________ automate the business processes involved in selling or distributing products from a single supplier to multiple buyers. A) Procurement portals B) Resource portals C) Enterprise portals D) Distribution portals
50) d
5
51) ________ is a corporate- level strategy concentrating on the downstream information flows. A) Enterprise Resource Planning. B) Customer Relationship Management. C) Business Process Management. D) Supply Chain Management.
51) b
52) At ________ of the business process in an organization, value is added in the form of work performed by people associated with that process and new, useful information is generated. A) successive stages B) various stages C) some stages D) each stage
52) d
53) Supply chain planning includes all of the following EXCEPT: A) demand planning and forecasting. B) supply chain execution. C) distribution planning. D) production scheduling.
53) b
54) Enterprise systems can help companies find innovative ways to conduct business, which lead to several advantages. These advantages do NOT include: A) a decrease in the number of anticipated surprises. B) an increase in the accuracy of on- time shipments. C) tremendous inefficiencies within an organization. D) an increase in customer satisfaction.
54) c
55) Among the most prevailing issues facing management when selecting an ERP application are: A) control. B) best practices. C) business requirements. D) All of the above.
55) d
56) The process of conversion transfers information stored on legacy systems to a new, integrated computer platform, which typically comes in the form of: A) Enterprise Resource Planning. B) Supply Chain Management. C) Total Quality Management. D) Customer Relationship Management.
56) a
57) ________ refers to systems for providing effective and efficient communication with the customer from the entire organization. A) Operational CRM B) Executional CRM C) Collaborative CRM D) Analytical CRM
57) c
58) If the vanilla version of an ERP system does not support a certain business process, the software may require ________ to accommodate it. A) customizations B) modifications C) integrations D) differentiations
58) a
59) Industry standard business processes are called: A) customer relationship management. C) workflow management.
59) d
B) functional process improvement. D) best practices.
60) Operational CRM is commonly referred to as ________ system. A) front- office B) external C) back- office
D) internal
61) The term ________ is commonly used to refer to the producers of supplies that a company uses. A) supply network B) value chain C) value system D) supply chain
6
60) a
61) d
62) If the inbound logistics and operations use different systems, information cannot readily flow between these two departments. This leads to: A) inaccurate and outdated data since inventory information may be stored in both systems. B) unnecessary costs associated with entering, storing and updating data redundantly. C) a highly inefficient process for operations personnel, who must have access to two systems in order to get both the order entry and inventory information. D) All of the above.
62) d
63) ________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a supplier and multiple customers A) Resource portals B) Distribution portals C) Procurement portals D) Enterprise portals
63) b
64) ERP core components include all of the following EXCEPT: A) operations management. B) human resources management. C) supply chain management. D) financial management.
64) c
65) A value system is formed when: A) a company creates additional value by integrating internal applications with suppliers, business partners and customers. B) information flows from one company's value chain to another company's value chain. C) companies connect their internal value chains. D) All of the above.
65) d
66) ________ can be accomplished by integrating multiple business processes in ways that enable firms to meet a wide range of unique customer needs. A) Strategic information planning B) Economies of scale C) Competitive advantage D) Process reengineering
66) c
67) The ________ information flow consists of information that is received from another organization. A) downstream B) internally- focused C) upstream D) value system
67) c
68) An information system can be used to support a billing process which would lead to: A) reduced use of paper. B) reduced material and labor costs. C) less handling of paper. D) All of the above.
68) d
69) Data warehouses are databases that store information: A) required for a specific business activity. B) related to a specific department. C) related to the various business activities of an organization. D) that is outdated.
69) c
70) Supply chain ________ is the extent to which a company's supply chain is focusing on maximizing customer service. A) efficiency B) effectiveness C) integration D) none of the above.
70) b
7
71) If packaged applications cannot meet the requirements of the business, the managers must conduct a ________ analysis to ensure that taking the custom application approach will prove worthwhile to the company. A) cost- benefit B) earned value C) what- if D) None of the above
71) a
72) ________ provides the necessary components to facilitate a business process. A) Procurement B) Technology development C) Human resources D) Infrastructure
72) d
73) Companies use information systems to support their various business processes and activities for internal operations, which does NOT include: A) human resource management B) order processing. C) interaction with suppliers. D) manufacturing.
73) c
74) One of the recommendations related to enterprise system implementations includes taking a ________ approach to implementations. A) multidisciplinary B) internally- focused C) thorough D) organizational
74) a
75) The ________ business activity can leverage information systems by accumulating purchase orders from the different functional areas within the corporation. A) operations and manufacturing B) procurement C) marketing and sales D) technology development
75) b
76) ________ refers to the movement of information along the supply chain. A) Information flow B) Data flow C) Financial flow D) Product flow
76) a
77) Another term for an electronic marketplace is: A) trading floor. C) multimedia marketplace.
77) d
B) electronic exchange. D) trading exchange.
78) Externally focused systems coordinate business activities with: A) customers. B) business partners. C) suppliers. D) All of the above.
78) d
79) ________ applications are systems that focus on the specific needs of individual departments and are not designed to communicate with other systems of the organization. A) Internally- focused B) Stand- alone C) Custom D) Packaged
79) b
80) The supply chain ________ module in SCM packages reports key measurements in the supply chain. A) event management B) performance management C) exchange D) collaboration
80) b
81) ________ refers to the movement of goods from the supplier to production. A) Product flow B) Financial flow C) Information flow D) Data flow
81) a
8
82) An upstream information flow consists of information that: A) is produced by a company and sent along to another organization. B) is produced by one department and sent along to other departments. C) is received from another organization. D) is passed on to the company's distributors and customers.
82) c
83) Applications running on different computing platforms are not desirable because: A) the same pieces of data may be stored in several versions throughout the organization. B) data cannot be readily shared between systems. C) they are difficult to integrate. D) All of the above.
83) d
84) One of the most important factors when deciding to implement enterprise solutions involves: A) selecting the customers and suppliers to work with. B) implementing applications that meet the requirements of the customers and suppliers. C) selecting applications that meet the requirements of the business. D) selecting and implementing applications that meet the requirements of the business, as well as its customers and suppliers.
84) d
85) Companies typically either opt for ________ control or allow particular business units to govern themselves. A) decentralized B) centralized C) shared D) distributed
85) b
86) CRM applications are commonly integrated with ERP to leverage ________ information to serve customers. A) external B) internal or external C) internal D) internal and external
86) d
87) Customer Relationship Management applications concentrate on the ________ integrating the value chains of a company and its distributors. A) legacy systems B) externally focused systems C) downstream information flows D) upstream information flows
87) c
88) A ________ refers to the flow of information through a set of business activities, in which information flows through functional areas that facilitate the internal activities of the business. A) company's inventory B) value chain C) flow diagram D) data warehouse
88) b
89) The primary reason that enterprise system implementations fail is believed to be a direct result of lack of ________ management support. A) managerial level B) operational level C) organizational level D) top- level
89) d
9
Answer Key Testname: 8 CHAPTER 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50)
C B C C D D B D D C B D C C B C D D A A D D C A D D D D D A D B A C D B C B D D D D B B D B A B C D 10
Answer Key Testname: 8 CHAPTER 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) 67) 68) 69) 70) 71) 72) 73) 74) 75) 76) 77) 78) 79) 80) 81) 82) 83) 84) 85) 86) 87) 88) 89)
B D B C D A C A D A D D B C D C C D C B A D C A B A D D B B A C D D B D C B D
11