chapters 6-8, MIS chapters 9&10

Databases record information about general categories of information referred to as entities.

true

You can manipulate data on a Web server by using a CGI script.

true

To analyze unstructured data, such as memos and legal cases, you would use text mining tools.

true

DBMSs typically include report-generating tools in order to

display data in an easier-to-read format.

In place of application server software to allow a Web server to communicate with a back-end database, you can use

CGI

The coupling of data with the software programs that manipulate the data, such that changes in programs requires changes to the data, is called program-data dependence.

true

The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n)

information policy.

The logical and physical views of data are separated in a DBMS.

true

DBMS have a data definition capability to specify the structure of the content of the database.

true

High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.

true

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called

normalization.

In a table for customers, the information about a single customer would reside in a single

row

The specialized language programmers use to add and change data in the database is called

a data manipulation language.

With in-memory computing, a computer's primary memory (RAM) is used for processing.

true

The data dictionary serves as an important data management tool by

creating an inventory of the data elements contained in the database.

A database server is software that handles all application operations between browser-based computers and a company's back-end business applications or databases.

false

The most prominent data manipulation language today is

SQL

Big data does not refer to

datasets with fewer than a billion records.

A schematic of the entire database that describes the relationships in a database is called a(n)

entity-relationship diagram.

Relational DBMSs use key field rules to ensure that relationships between coupled tables remain consistent.

false

In a relational database, the three basic operations used to develop useful sets of data are

select, project, and join.

The tool that enables users to view the same data in different ways using multiple dimensions is

OLAP

The traditional file environment does not typically have a problem with

program-data independence.

The join operation

combines relational tables to provide the user with more information than is otherwise available.

All of the following are technologies used to analyze and manage big data except

cloud computing.

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

text mining

Which of the following technologies would you use to analyze the social media data collected by a major online retailer?

hadoop

The select operation

creates a subset consisting of all records in the file that meet stated criteria.

Data mining is a tool for allowing users to

find hidden relationships in data.

Data ________ occurs when the same data is duplicated in multiple files of a database.

redundancy

Every record in a file should contain at least one key field.

true

A(n) ________ is an example of non-digital data storage that is comparable to a database.

library card catalog

The logical view of a database

presents data as they would be perceived by end users.

NoSQL technologies are used to manage sets of data that don't require the flexibility of tables and relations.

true

You work for a national car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use data mining software that is capable of

classification

Data cleansing not only corrects errors but also

enforces consistency among different sets of data.

In a relational database, a record is referred to in technical terms as a(n)

tuple.

In associations, a data mining tool discovers different groupings within data, such as finding affinity groups for bank cards.

False

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called

data scrubbing.

The project operation

creates a subset consisting of columns in a table.

In a client/server environment, a DBMS is located on a dedicated computer called a Web server.

False

When the same attribute in related data files has different values, this is called data

inconsistency.

Which of the following is not a method for performing a data quality audit?

surveying data definition and query files

Which of the following features enables a DBMS to reduce data redundancy and inconsistency?

minimizes isolated files with repeated data

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with

a crow's foot topped by a short mark.

A household appliances manufacturer has hired you to help analyze their social media datasets to determine which of their refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data?

sentiment analysis software

________ creates confusion that hampers the creation of information systems that integrate data from different sources.

Data redundancy

A DBMS makes the

physical database available for different logical views.

OLAP is a tool for enabling

users to obtain online answers to ad-hoc questions in a rapid amount of time.

A field identified in a record as holding the unique identifier for that record is called the

key field.

The policies and processes for managing the integrity and security of data in a firm are referred to as data governance.

True

The special organizational function whose responsibilities include physical database design and maintenance is called

database administration.

A(n) ________ is a characteristic or quality that describes a database entity.

attribute

You are creating a database to store temperature and wind data from national airport locations. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?

airport code

To perform multidimensional data analysis, you would use OLAP.

true

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name?

data inconsistency

A data warehouse is composed of

historic and current internal data.

The relationship between entities and attributes is best illustrated by

the entity CUSTOMER with the attribute PURCHASE.

Which of the following is not a DBMS for midrange computers?

Microsoft Access

You work for a retail clothing chain whose primary outlets are in shopping malls, and you are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the

identifying sequences.

Multiple data marts are combined and streamlined to create a data warehouse.

false

In terms of data relationships, associations refers to

occurrences linked to a single event.

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the

data dictionary.

Which of the following is not one of the techniques used in Web mining?

server mining

Data scrubbing is a more intensive corrective process than data cleansing.

false

Implementing a Web interface for an organization's internal database usually requires substantial changes to be made to the database.

false

The Internet is based on which three key technologies?

client/server computing, packet switching, and the development of communications standards for linking networks and computers

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

True

Which digital cellular standard is used widely throughout the world except the United States?

GSM

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n)

switch

A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network.

false

Telephone networks are fundamentally different from computer networks.

true

The child domain of the root is the

top-level domain.

RFID technology is being gradually replaced by less costly technologies such as WSNs.

false

The Domain Name System (DNS) converts domain names to IP addresses.

true

Which signal types are represented by a continuous waveform?

analog

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

ISP

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

true

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

true

In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain?

azimuth-interactive

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.

eight

Bandwidth is the

difference between the highest and lowest frequencies that can be accommodated on a single channel.

To use the analog telephone system for sending digital data, you must also use

a modem

________ monetizes the value of the data stored by search engines.

Search engine marketing

In TCP/IP, IP is responsible for

disassembling and reassembling of packets during transmission.

Which of the following is the first generation of cellular systems suitable for watching videos?

4G

The WiMax standard can transmit up to a distance of approximately

30 miles

The most appropriate wireless networking standard for creating PANs is

bluetooth

The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called

the Internet of things.

Mobile search makes up at least 50% of all Internet searches.

true

What technology allows people to have content pulled from Web sites and fed automatically to their computers?

RSS

Instant messaging is a type of ________ service.

chat

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

access point

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n)

uniform resource locator.

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

digital

The total amount of digital information that can be transmitted through any telecommunications medium is measured in

bps

Which of the following statements about RFID is not true?

RFIDs require line-of-sight contact to be read.

More than 50% of U.S. Internet users access the Internet via mobile devices.

True

A network that covers entire geographical regions is most commonly referred to as a(n)

wide area network.

Which type of network is used to connect digital devices within a half-mile or 500-meter radius?

LAN

Central large mainframe computing has largely replaced client/server computing.

false

Web sites that enable users to share information, collaborate, and create new services and content are called ________ sites.

second generation

Based on your reading of the examples in the chapter, what would be the best use of RFID for a business?

managing the supply chain

Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.

true

The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called

SEO

All of the following are physical components of an RFID system except

bar code

Which organization helps define the overall structure of the Internet?

IAB

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as

hotspots

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.

false

The 802.11 set of standards is known as

wi-fi

The backbone networks of the Internet are typically owned by long-distance telephone companies called

network service providers.

IPv6 is being developed in order to

create more IP addresses.

A network that spans a city, and sometimes its major suburbs as well, is called a

MAN

TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet.

false

Digital subscriber lines

operate over existing telephone lines to carry voice, data, and video.

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?

peer-to-peer network

Which protocol is the Internet based on?

TCP/IP

T1 lines

are high-speed, leased data lines providing guaranteed service levels.

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called

packet switching.

Which of the following statements is not true about search engines?

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

What are the four layers of the TCP/IP reference model?

application, transport, Internet, and network interface

The most common Web server today is

Apache HTTP Server.

The telephone system is an example of a ________ network.

circuit-switched

In a telecommunications network architecture, a protocol is

a standard set of rules and procedures for control of communications in a network.

What service converts IP addresses into more recognizable alphanumeric names?

DNS

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

UTM

You can test software before it is even written by conducting a walkthrough.

true

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)

risk assessment.

A Trojan horse

is software that appears to be benign but does something other than expected.

The Gramm-Leach-Bliley Act

requires financial institutions to ensure the security of customer data.

Public key encryption uses two keys.

true

An authentication token is a(n)

gadget that displays passcodes.

All of the following are types of information systems general controls except

application controls.

An acceptable use policy defines the acceptable level of access to information assets for different users.

false

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

deep-packet inspection

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

true

Client software in a client/server environment is specifically vulnerable to

unauthorized access.

Statements ranking information risks and identifying security goals are included in a(n)

security policy.

Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?

WPA2

Hackers create a botnet by

causing other people's computers to become "zombie" PCs following a master computer.

Viruses can be spread through e-mail.

true

Which of the following is not an example of a computer used as a target of crime?

illegally accessing stored electronic communication

Smartphones have the same security flaws as other Internet-connected devices.

true

Authentication refers to verifying that a person is who he or she claims to be.

true

Smaller firms may outsource some or many security functions to

MSSPs

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

symmetric key encryption

Evil twins are

bogus wireless network access points that look legitimate to users.

The most common type of electronic evidence is

e-mail.

The HIPAA Act of 1996

outlines medical security and privacy rules.

Computer forensics tasks include all of the following except

collecting physical evidence on the computer.

Packet filtering catches most types of network attacks.

false

________ identify the access points in a Wi-Fi network.

SSIDs

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

DDoS

Currently, the protocols used for secure information transfer over the Internet are

SSL, TLS, and S-HTTP.

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

true

How do software vendors correct flaws in their software after it has been distributed?

They issue patches.

Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

false

________ is malware that logs and transmits everything a user types.

A keylogger

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called

two-factor authentication.

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

data security

Large amounts of data stored in electronic form are ________ than the same data in manual form.

vulnerable to many more kinds of threats

Most antivirus software is effective against

only those viruses already known when the software is written.

SSL is a protocol used to establish a secure connection between two computers.

true

In a client/server environment, corporate servers are specifically vulnerable to

malware

Pharming involves

redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

Identity theft

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as

war driving.

Organizations can use existing network security software to secure mobile devices.

false

Biometric authentication

can use a person's voice as a unique, measurable trait.

Which of the following is not an example of a computer used as an instrument of crime?

breaching the confidentiality of protected computerized data

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

true

In 2013, Panda Security reported approximately 30 million new kinds of malware strains.

true

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

may be accessible by anyone who has access to the same network.

Social networking sites have become a new conduit for malware because

they allow users to post software code.

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source for network security breaches to the firm?

employees

Which of the following statements about the Internet security is not true?

VoIP is more secure than the switched voice network.

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called

social engineering.

The communications lines in a client/server environment are specifically vulnerable to

tapping

For 100-percent availability, online transaction processing requires

fault-tolerant computer systems.

A digital certificate system

uses third-party CAs to validate a user's identity.

Rigorous password systems

may hinder employee productivity.

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Ransomware

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

Intrusion detection systems

The Sarbanes-Oxley Act

imposes responsibility on companies and management to safeguard the accuracy of financial information.

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Security

Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from

$1,250

...

...

...

...

From your reading of the chapter's opening case, ACH Food Companies implemented new information systems in order to achieve which of the following business objectives?

operational excellence

Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications.

analytical CRM

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?

Select the functions of the system you wish to use.

A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy.

just-in-time

A build-to-order supply-chain model is also called a ________ model.

demand-driven

Which of the following is not true about enterprise systems?

Enterprise software is expressly built to allow companies to mimic their unique business practices.

Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.

False

Which of the following statements about enterprise applications is not true?

Enterprise applications are best implemented when few changes in business processes are required.

Major CRM application software vendors include Oracle, SAP, and Salesforce.com.

True

As they move through the supply chain, ________ are transformed into finished products and shipped to retailers and customers.

Raw materials

The bullwhip effect is countered by

reducing information uncertainty.

All of the following service capabilities would be found in major CRM products except

order management.

Supply chain management systems are a type of enterprise system.

False

Which supply chain planning function determines how much product is needed to satisfy all customer demands?

demand planning

Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.

True

From your reading of the Scott's Miracle-Gro case study, the company implemented SAP and JDA enterprise and supply chain planning systems to solve what problems?

coordination issues caused by the merger of Scott's and MiracleGro

Which of the following is not an example of next-generation enterprise applications?

solutions incorporating SCM

A company having difficulty with timely delivery of parts to its manufacturing plants should implement a supply chain ________ system.

Execution

Supply chain complexity and scale increases when firms

develop products and services that coordinate with many firms and suppliers.

The business value of an effective supply chain management system includes all of the following except

increased inventory levels.

Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.

e-business suites

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?

customer lifetime value

Next-generation enterprise suites use ________ and SOA to link to systems of customers and suppliers.

Web services

Walmart's continuous replenishment system is an example of a ________ model.

Pull-based

Enterprise application vendors are now including ________ features, such as tools for data visualization, flexible reporting, and ad-hoc analysis, as part of the application.

Business intelligence

________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation.

ERM

Which of the following would not be considered a contact point?

Intranet

CRM systems help businesses obtain which business objective?

customer and supplier intimacy

________ systems are based on a suite of software models used to support business activities across the firm.

Enterprise

The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.

False

Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain ________ systems.

Planning

Supply chain planning systems perform all of the following functions except

track the physical status of goods.

Analyzing customer buying patterns is an example of

analytical CRM.

Customer service modules in CRM systems provide tools for

assigning and managing customer service requests.

Using social networking tools to converse with customers is called

social CRM.

SFA modules in CRM systems would provide tools for

managing sales prospect and contact information.

A company's organizations and processes for distributing and delivering products to the final customers is the

downstream portion of the supply chain.

Selling a customer with a checking account a home improvement loan is an example of

Cross-selling

Capabilities of supply chain execution systems would not include

identifying the optimal transportation mode.

A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the

upstream portion of the supply chain.

Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems.

planning; execution

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.

Bullwhip

Components or parts of finished products are referred to as

intermediate products.

Which of the following is not one of the four types of customers described in the case study on Graybar?

Niche customers

Concurrent supply chains are made possible by which technology?

The internet

A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes

ERP systems.

Customer relationship management systems typically provide software and online tools for sales, customer service, and

Marketing

In order to achieve maximum benefit from an enterprise software package, a business

changes the way it works to match the software's business processes.

Which of the following is an important capability for sales processes that is found in most major CRM software products?

lead management

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?

Safety stock

Why is overstocking warehouses not an effective solution for a problem of low availability?

It increases inventory costs.

The measurement of the number of customers who stop using or purchasing products or services from a company is called

Churn rate

The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce?

Information density

Reducing the business process layers in a distribution channel is called

disintermediation.

What event marked the beginning of e-commerce?

The first paid advertisements placed on a Web site.

Compared to digital markets, traditional markets have

higher transaction costs

Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of

Crowdsourcing

All of the following are activities related to establishing a Web presence except for

Newsletters

Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as

Behavioral targeting

What is the primary benefit to consumers of disintermediation?

Lower costs

A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n)

Exchange

Which of the following best describes the digital social graph?

a mapping of all online social relationships

The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?

Interactivity

Which of the following is not one of four types of presence to be considered when building an E-commerce presence?

Corporate

Which of the following best illustrates the affiliate revenue model?

Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase.

Market creators

provide a digital environment where buyers and sellers can establish prices for products.

Net marketplaces

are industry owned or operate as independent intermediaries between buyers and sellers.

Based on your reading of the chapter, e-commerce is

still in a revolutionary phase.

Which of the following is a marketing format that uses banner ads and pop-ups with interactive features?

Display ads

All of the following are unique features of e-commerce technology, except

universality.

________ describes the concept that a large group of people is better at making good decisions than a single person.

The wisdom of crowds

Recent developments in e-commerce include all of the following except

Internet-based models of computing, such as smartphone apps.

Which of the following Internet business models does Amazon.com use?

E-tailer

Digital goods are goods that are

Delivered digitally

A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location is called a(n)

Marketspace

Which of the following is a milestone for the Web site development phase of building an e-commerce presence?

Web site plan

Which of the following best illustrates the sales revenue model?

Apple accepts micropayments for single music track downloads.

Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party.

asymmetry

The effort required to locate a suitable product is called

Search costs

Content providers use ________ systems to process large amounts of very small monetary transactions cost-effectively.

Micropayment

________ is a peer-to-peer market in which participants bet on the outcomes of current events, business, or social trends.

A prediction market

Compared to traditional goods, digital goods have

greater pricing flexibility

________ uses the community provider Internet business model.

Twitter

What is the difference between personalization and customization, as applied to e-commerce technologies?

Personalization refers to adjusting marketing messages for a consumer; customization refers to adjusting a product or service based on a user's preferences.

Which of the following statements about m-commerce is not true?

In 2014, the main areas of growth are in online banking and location-based services.

In which of the following Internet business models does a merchant create an online digital environment that enables people with like interests to share information?

community provider

What standards are referred to when discussing universal standards as a unique feature of e-commerce?

common spoken and written languages

Goods that are involved in the actual production process are referred to as

direct goods

Which of the following marketing formats is sales oriented, rather than branding oriented or a mix?

Search engine

Which of the following social commerce features allows social network sites to gather and distribute to others information about which products a user likes and dislikes?

Network notification

Which of the following best illustrates the transaction fee revenue model?

eBay receives a small fee from a seller if a seller is successful in selling an item.

eBay is an example of

C2C e-commerce.