Databases record information about general categories of information referred to as entities.
true
You can manipulate data on a Web server by using a CGI script.
true
To analyze unstructured data, such as memos and legal cases, you would use text mining tools.
true
DBMSs typically include report-generating tools in order to
display data in an easier-to-read format.
In place of application server software to allow a Web server to communicate with a back-end database, you can use
CGI
The coupling of data with the software programs that manipulate the data, such that changes in programs requires changes to the data, is called program-data dependence.
true
The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n)
information policy.
The logical and physical views of data are separated in a DBMS.
true
DBMS have a data definition capability to specify the structure of the content of the database.
true
High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.
true
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called
normalization.
In a table for customers, the information about a single customer would reside in a single
row
The specialized language programmers use to add and change data in the database is called
a data manipulation language.
With in-memory computing, a computer's primary memory (RAM) is used for processing.
true
The data dictionary serves as an important data management tool by
creating an inventory of the data elements contained in the database.
A database server is software that handles all application operations between browser-based computers and a company's back-end business applications or databases.
false
The most prominent data manipulation language today is
SQL
Big data does not refer to
datasets with fewer than a billion records.
A schematic of the entire database that describes the relationships in a database is called a(n)
entity-relationship diagram.
Relational DBMSs use key field rules to ensure that relationships between coupled tables remain consistent.
false
In a relational database, the three basic operations used to develop useful sets of data are
select, project, and join.
The tool that enables users to view the same data in different ways using multiple dimensions is
OLAP
The traditional file environment does not typically have a problem with
program-data independence.
The join operation
combines relational tables to provide the user with more information than is otherwise available.
All of the following are technologies used to analyze and manage big data except
cloud computing.
________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.
text mining
Which of the following technologies would you use to analyze the social media data collected by a major online retailer?
hadoop
The select operation
creates a subset consisting of all records in the file that meet stated criteria.
Data mining is a tool for allowing users to
find hidden relationships in data.
Data ________ occurs when the same data is duplicated in multiple files of a database.
redundancy
Every record in a file should contain at least one key field.
true
A(n) ________ is an example of non-digital data storage that is comparable to a database.
library card catalog
The logical view of a database
presents data as they would be perceived by end users.
NoSQL technologies are used to manage sets of data that don't require the flexibility of tables and relations.
true
You work for a national car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use data mining software that is capable of
classification
Data cleansing not only corrects errors but also
enforces consistency among different sets of data.
In a relational database, a record is referred to in technical terms as a(n)
tuple.
In associations, a data mining tool discovers different groupings within data, such as finding affinity groups for bank cards.
False
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called
data scrubbing.
The project operation
creates a subset consisting of columns in a table.
In a client/server environment, a DBMS is located on a dedicated computer called a Web server.
False
When the same attribute in related data files has different values, this is called data
inconsistency.
Which of the following is not a method for performing a data quality audit?
surveying data definition and query files
Which of the following features enables a DBMS to reduce data redundancy and inconsistency?
minimizes isolated files with repeated data
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with
a crow's foot topped by a short mark.
A household appliances manufacturer has hired you to help analyze their social media datasets to determine which of their refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data?
sentiment analysis software
________ creates confusion that hampers the creation of information systems that integrate data from different sources.
Data redundancy
A DBMS makes the
physical database available for different logical views.
OLAP is a tool for enabling
users to obtain online answers to ad-hoc questions in a rapid amount of time.
A field identified in a record as holding the unique identifier for that record is called the
key field.
The policies and processes for managing the integrity and security of data in a firm are referred to as data governance.
True
The special organizational function whose responsibilities include physical database design and maintenance is called
database administration.
A(n) ________ is a characteristic or quality that describes a database entity.
attribute
You are creating a database to store temperature and wind data from national airport locations. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?
airport code
To perform multidimensional data analysis, you would use OLAP.
true
Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name?
data inconsistency
A data warehouse is composed of
historic and current internal data.
The relationship between entities and attributes is best illustrated by
the entity CUSTOMER with the attribute PURCHASE.
Which of the following is not a DBMS for midrange computers?
Microsoft Access
You work for a retail clothing chain whose primary outlets are in shopping malls, and you are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the
identifying sequences.
Multiple data marts are combined and streamlined to create a data warehouse.
false
In terms of data relationships, associations refers to
occurrences linked to a single event.
An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the
data dictionary.
Which of the following is not one of the techniques used in Web mining?
server mining
Data scrubbing is a more intensive corrective process than data cleansing.
false
Implementing a Web interface for an organization's internal database usually requires substantial changes to be made to the database.
false
The Internet is based on which three key technologies?
client/server computing, packet switching, and the development of communications standards for linking networks and computers
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
True
Which digital cellular standard is used widely throughout the world except the United States?
GSM
The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n)
switch
A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network.
false
Telephone networks are fundamentally different from computer networks.
true
The child domain of the root is the
top-level domain.
RFID technology is being gradually replaced by less costly technologies such as WSNs.
false
The Domain Name System (DNS) converts domain names to IP addresses.
true
Which signal types are represented by a continuous waveform?
analog
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
ISP
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
true
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
true
In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain?
azimuth-interactive
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.
eight
Bandwidth is the
difference between the highest and lowest frequencies that can be accommodated on a single channel.
To use the analog telephone system for sending digital data, you must also use
a modem
________ monetizes the value of the data stored by search engines.
Search engine marketing
In TCP/IP, IP is responsible for
disassembling and reassembling of packets during transmission.
Which of the following is the first generation of cellular systems suitable for watching videos?
4G
The WiMax standard can transmit up to a distance of approximately
30 miles
The most appropriate wireless networking standard for creating PANs is
bluetooth
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called
the Internet of things.
Mobile search makes up at least 50% of all Internet searches.
true
What technology allows people to have content pulled from Web sites and fed automatically to their computers?
RSS
Instant messaging is a type of ________ service.
chat
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
access point
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n)
uniform resource locator.
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.
digital
The total amount of digital information that can be transmitted through any telecommunications medium is measured in
bps
Which of the following statements about RFID is not true?
RFIDs require line-of-sight contact to be read.
More than 50% of U.S. Internet users access the Internet via mobile devices.
True
A network that covers entire geographical regions is most commonly referred to as a(n)
wide area network.
Which type of network is used to connect digital devices within a half-mile or 500-meter radius?
LAN
Central large mainframe computing has largely replaced client/server computing.
false
Web sites that enable users to share information, collaborate, and create new services and content are called ________ sites.
second generation
Based on your reading of the examples in the chapter, what would be the best use of RFID for a business?
managing the supply chain
Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.
true
The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called
SEO
All of the following are physical components of an RFID system except
bar code
Which organization helps define the overall structure of the Internet?
IAB
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as
hotspots
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.
false
The 802.11 set of standards is known as
wi-fi
The backbone networks of the Internet are typically owned by long-distance telephone companies called
network service providers.
IPv6 is being developed in order to
create more IP addresses.
A network that spans a city, and sometimes its major suburbs as well, is called a
MAN
TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet.
false
Digital subscriber lines
operate over existing telephone lines to carry voice, data, and video.
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
peer-to-peer network
Which protocol is the Internet based on?
TCP/IP
T1 lines
are high-speed, leased data lines providing guaranteed service levels.
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called
packet switching.
Which of the following statements is not true about search engines?
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
What are the four layers of the TCP/IP reference model?
application, transport, Internet, and network interface
The most common Web server today is
Apache HTTP Server.
The telephone system is an example of a ________ network.
circuit-switched
In a telecommunications network architecture, a protocol is
a standard set of rules and procedures for control of communications in a network.
What service converts IP addresses into more recognizable alphanumeric names?
DNS
Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
UTM
You can test software before it is even written by conducting a walkthrough.
true
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)
risk assessment.
A Trojan horse
is software that appears to be benign but does something other than expected.
The Gramm-Leach-Bliley Act
requires financial institutions to ensure the security of customer data.
Public key encryption uses two keys.
true
An authentication token is a(n)
gadget that displays passcodes.
All of the following are types of information systems general controls except
application controls.
An acceptable use policy defines the acceptable level of access to information assets for different users.
false
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
deep-packet inspection
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.
true
Client software in a client/server environment is specifically vulnerable to
unauthorized access.
Statements ranking information risks and identifying security goals are included in a(n)
security policy.
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
WPA2
Hackers create a botnet by
causing other people's computers to become "zombie" PCs following a master computer.
Viruses can be spread through e-mail.
true
Which of the following is not an example of a computer used as a target of crime?
illegally accessing stored electronic communication
Smartphones have the same security flaws as other Internet-connected devices.
true
Authentication refers to verifying that a person is who he or she claims to be.
true
Smaller firms may outsource some or many security functions to
MSSPs
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
symmetric key encryption
Evil twins are
bogus wireless network access points that look legitimate to users.
The most common type of electronic evidence is
e-mail.
The HIPAA Act of 1996
outlines medical security and privacy rules.
Computer forensics tasks include all of the following except
collecting physical evidence on the computer.
Packet filtering catches most types of network attacks.
false
________ identify the access points in a Wi-Fi network.
SSIDs
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
DDoS
Currently, the protocols used for secure information transfer over the Internet are
SSL, TLS, and S-HTTP.
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
true
How do software vendors correct flaws in their software after it has been distributed?
They issue patches.
Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.
false
________ is malware that logs and transmits everything a user types.
A keylogger
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called
two-factor authentication.
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
data security
Large amounts of data stored in electronic form are ________ than the same data in manual form.
vulnerable to many more kinds of threats
Most antivirus software is effective against
only those viruses already known when the software is written.
SSL is a protocol used to establish a secure connection between two computers.
true
In a client/server environment, corporate servers are specifically vulnerable to
malware
Pharming involves
redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
Identity theft
A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as
war driving.
Organizations can use existing network security software to secure mobile devices.
false
Biometric authentication
can use a person's voice as a unique, measurable trait.
Which of the following is not an example of a computer used as an instrument of crime?
breaching the confidentiality of protected computerized data
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
true
In 2013, Panda Security reported approximately 30 million new kinds of malware strains.
true
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
may be accessible by anyone who has access to the same network.
Social networking sites have become a new conduit for malware because
they allow users to post software code.
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source for network security breaches to the firm?
employees
Which of the following statements about the Internet security is not true?
VoIP is more secure than the switched voice network.
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
social engineering.
The communications lines in a client/server environment are specifically vulnerable to
tapping
For 100-percent availability, online transaction processing requires
fault-tolerant computer systems.
A digital certificate system
uses third-party CAs to validate a user's identity.
Rigorous password systems
may hinder employee productivity.
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Ransomware
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
Intrusion detection systems
The Sarbanes-Oxley Act
imposes responsibility on companies and management to safeguard the accuracy of financial information.
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Security
Your company, an online discount stationers, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from
$1,250
...
...
...
...
From your reading of the chapter's opening case, ACH Food Companies implemented new information systems in order to achieve which of the following business objectives?
operational excellence
Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications.
analytical CRM
You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?
Select the functions of the system you wish to use.
A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy.
just-in-time
A build-to-order supply-chain model is also called a ________ model.
demand-driven
Which of the following is not true about enterprise systems?
Enterprise software is expressly built to allow companies to mimic their unique business practices.
Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.
False
Which of the following statements about enterprise applications is not true?
Enterprise applications are best implemented when few changes in business processes are required.
Major CRM application software vendors include Oracle, SAP, and Salesforce.com.
True
As they move through the supply chain, ________ are transformed into finished products and shipped to retailers and customers.
Raw materials
The bullwhip effect is countered by
reducing information uncertainty.
All of the following service capabilities would be found in major CRM products except
order management.
Supply chain management systems are a type of enterprise system.
False
Which supply chain planning function determines how much product is needed to satisfy all customer demands?
demand planning
Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.
True
From your reading of the Scott's Miracle-Gro case study, the company implemented SAP and JDA enterprise and supply chain planning systems to solve what problems?
coordination issues caused by the merger of Scott's and MiracleGro
Which of the following is not an example of next-generation enterprise applications?
solutions incorporating SCM
A company having difficulty with timely delivery of parts to its manufacturing plants should implement a supply chain ________ system.
Execution
Supply chain complexity and scale increases when firms
develop products and services that coordinate with many firms and suppliers.
The business value of an effective supply chain management system includes all of the following except
increased inventory levels.
Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.
e-business suites
Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?
customer lifetime value
Next-generation enterprise suites use ________ and SOA to link to systems of customers and suppliers.
Web services
Walmart's continuous replenishment system is an example of a ________ model.
Pull-based
Enterprise application vendors are now including ________ features, such as tools for data visualization, flexible reporting, and ad-hoc analysis, as part of the application.
Business intelligence
________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation.
ERM
Which of the following would not be considered a contact point?
Intranet
CRM systems help businesses obtain which business objective?
customer and supplier intimacy
________ systems are based on a suite of software models used to support business activities across the firm.
Enterprise
The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.
False
Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain ________ systems.
Planning
Supply chain planning systems perform all of the following functions except
track the physical status of goods.
Analyzing customer buying patterns is an example of
analytical CRM.
Customer service modules in CRM systems provide tools for
assigning and managing customer service requests.
Using social networking tools to converse with customers is called
social CRM.
SFA modules in CRM systems would provide tools for
managing sales prospect and contact information.
A company's organizations and processes for distributing and delivering products to the final customers is the
downstream portion of the supply chain.
Selling a customer with a checking account a home improvement loan is an example of
Cross-selling
Capabilities of supply chain execution systems would not include
identifying the optimal transportation mode.
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the
upstream portion of the supply chain.
Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems.
planning; execution
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.
Bullwhip
Components or parts of finished products are referred to as
intermediate products.
Which of the following is not one of the four types of customers described in the case study on Graybar?
Niche customers
Concurrent supply chains are made possible by which technology?
The internet
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes
ERP systems.
Customer relationship management systems typically provide software and online tools for sales, customer service, and
Marketing
In order to achieve maximum benefit from an enterprise software package, a business
changes the way it works to match the software's business processes.
Which of the following is an important capability for sales processes that is found in most major CRM software products?
lead management
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
Safety stock
Why is overstocking warehouses not an effective solution for a problem of low availability?
It increases inventory costs.
The measurement of the number of customers who stop using or purchasing products or services from a company is called
Churn rate
The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce?
Information density
Reducing the business process layers in a distribution channel is called
disintermediation.
What event marked the beginning of e-commerce?
The first paid advertisements placed on a Web site.
Compared to digital markets, traditional markets have
higher transaction costs
Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of
Crowdsourcing
All of the following are activities related to establishing a Web presence except for
Newsletters
Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as
Behavioral targeting
What is the primary benefit to consumers of disintermediation?
Lower costs
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n)
Exchange
Which of the following best describes the digital social graph?
a mapping of all online social relationships
The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?
Interactivity
Which of the following is not one of four types of presence to be considered when building an E-commerce presence?
Corporate
Which of the following best illustrates the affiliate revenue model?
Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase.
Market creators
provide a digital environment where buyers and sellers can establish prices for products.
Net marketplaces
are industry owned or operate as independent intermediaries between buyers and sellers.
Based on your reading of the chapter, e-commerce is
still in a revolutionary phase.
Which of the following is a marketing format that uses banner ads and pop-ups with interactive features?
Display ads
All of the following are unique features of e-commerce technology, except
universality.
________ describes the concept that a large group of people is better at making good decisions than a single person.
The wisdom of crowds
Recent developments in e-commerce include all of the following except
Internet-based models of computing, such as smartphone apps.
Which of the following Internet business models does Amazon.com use?
E-tailer
Digital goods are goods that are
Delivered digitally
A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location is called a(n)
Marketspace
Which of the following is a milestone for the Web site development phase of building an e-commerce presence?
Web site plan
Which of the following best illustrates the sales revenue model?
Apple accepts micropayments for single music track downloads.
Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party.
asymmetry
The effort required to locate a suitable product is called
Search costs
Content providers use ________ systems to process large amounts of very small monetary transactions cost-effectively.
Micropayment
________ is a peer-to-peer market in which participants bet on the outcomes of current events, business, or social trends.
A prediction market
Compared to traditional goods, digital goods have
greater pricing flexibility
________ uses the community provider Internet business model.
What is the difference between personalization and customization, as applied to e-commerce technologies?
Personalization refers to adjusting marketing messages for a consumer; customization refers to adjusting a product or service based on a user's preferences.
Which of the following statements about m-commerce is not true?
In 2014, the main areas of growth are in online banking and location-based services.
In which of the following Internet business models does a merchant create an online digital environment that enables people with like interests to share information?
community provider
What standards are referred to when discussing universal standards as a unique feature of e-commerce?
common spoken and written languages
Goods that are involved in the actual production process are referred to as
direct goods
Which of the following marketing formats is sales oriented, rather than branding oriented or a mix?
Search engine
Which of the following social commerce features allows social network sites to gather and distribute to others information about which products a user likes and dislikes?
Network notification
Which of the following best illustrates the transaction fee revenue model?
eBay receives a small fee from a seller if a seller is successful in selling an item.
eBay is an example of
C2C e-commerce.