Information Systems Today, 5e
(Valacich/Schneider)
Chapter
1: Managing in the Digital World
1)
Knowledge workers are professionals who ________.
A)
use knowledge to perform their jobs, but do not create
knowledge
B)
create, modify, and/or synthesize knowledge as a
fundamental part of their jobs
C)
use their skills to help others gain knowledge
D)
modify knowledge created by others, but do not create
knowledge themselves
E)
work in the education industry
2)
Which of the following predictions made by Peter Drucker is true?
A)
Knowledge workers have lesser bargaining power than workers in other
industries.
B)
Knowledge workers do not possess valuable real-world skills.
C)
Knowledge workers are not reliant on formal education.
D)
Knowledge workers are continually learning how to do their jobs better.
E)
Knowledge workers are not paid as well as their prior industrial counterparts.
3)
During the time of the industrial revolution, some individuals who felt
threatened by the changes brought about by technology resorted to protesting
against the technology. Identify these individuals.
A)
Luddites
B)
Utopists
C)
Millenarists
D)
Utilitarians
E)
Preterists
4)
Which of the following occurred when Alvin Toffler's "third wave"
gained speed?
A)
Society moved from a predominantly agrarian culture to the urbanized machine
age.
B)
Occupations changed to accommodate the mechanized society.
C)
The ability to perform repetitive tasks became a quality to be instilled and
valued.
D)
Individuals shifted from handicrafting items for sale to working in factories.
E)
Information became the currency of the realm.
5)
The ability to independently learn new technologies as they emerge and assess
their impact on your work and life is called ________.
A)
computer assisted learning
B)
computer adaptation
C)
computer fluency
D)
computer compatibility
E)
computer programming
6)
Which of the following best describes the phenomenon termed Web 2.0?
A)
using the Internet as a platform for applications
B)
uploading files on the Internet
C)
learning new technologies as they emerge
D)
setting up an online business
E)
downloading free software from the Internet
7)
Which of the following is an example of an economic change brought about by
globalization?
A)
increases in the frequency of worldwide fads and
phenomena
B)
development of low-cost computing platforms
C)
availability of low-cost communication systems
D)
increases in the outsourcing of labor
E)
decentralization of organizations
8)
Which of the following is an example of a technological change brought about by
globalization?
A)
increases in the frequency of international travel
B)
increases in the levels of immigration
C)
enforcement of global patent and copyright laws
D)
decreases in the frequency of worldwide fads
E)
decentralization of organizations
9)
In his book The World Is Flat, New York Times foreign affairs
columnist Thomas L. Friedman characterized the evolution of globalization as
having distinct phases. During this globalization phase, mainly European
countries were globalizing, attempting to extend their territories into the New
World. Identify this globalization phase.
A)
Globalization 1.0
B)
Globalization 2.0
C)
Globalization 3.0
D)
Globalization 4.0
E)
Globalization 5.0
10)
According to Thomas L. Friedman, which of the following is true about
Globalization 2.0?
A)
During this stage, mainly European countries were globalizing.
B)
It brought continents closer together, shrinking the world "from size
large to size medium."
C)
During this stage, virtually every nation joined the globalization movement.
D)
It was interrupted by the Great Depression and the two world wars.
E)
During this stage, people didn't notice how it affected their lives due to the
slow pace of change.
11)
According to Thomas L. Friedman, which of the following is true about
Globalization 3.0?
A)
Industries changed slowly and change took generations.
B)
Continents were brought closer together, shrinking the world "from size
medium to size small".
C)
Individuals and small groups from virtually every nation joined the
globalization movement.
D)
Mainly Americans and Europeans were globalizing.
E)
People didn't notice how it affected their lives due to the slow pace of
change.
12)
In 1994, a company called ________ released the first mainstream Web browser
thereby opening up the possibilities of the Internet for the general public.
A)
Netscape
B)
Microsoft
C)
Opera
D)
Internet Explorer
E)
Firefox
13)
Uploading enables individuals to ________.
A)
access sensitive information on the Internet
B)
be producers of information instead of mere consumers
C)
copyright information available on the Internet
D) save information
found on the Internet onto their personal computers
E)
permanently remove information available on the
Internet
14)
The term ________ refers to Web sites allowing users to add, remove, or edit
content and is now often used synonymously with open source dictionaries.
A)
html
B)
ajax
C)
wiki
D)
perl
E)
Web 2.0
15)
Which of the following best explains the process of moving business processes
or tasks to another company?
A)
offshoring
B)
in-forming
C)
in-sourcing
D)
exporting
E)
outsourcing
16)
Which of the following can be cited as an example of outsourcing?
A)
Microsoft hands over its customer service function to Convergys, located in
India.
B)
Volkswagon acquires a steel manufacturing plant to reduce its overall
production costs.
C)
Dell sources computer parts from suppliers located in Russia.
D)
Audi starts a manufacturing facility in China to take advantage of low labor
costs.
E)
P&G acquires a retail outlet to reduce its distribution costs.
17)
Which of the following refers to having certain functions performed by the same
company but in a different country?
A)
outsourcing
B)
offshoring
C)
exporting
D)
licensing
E)
franchising
18)
Aircraft manufacturer Boeing designed its new 787 Dreamliner aircraft in
Russia, making use of the availability of highly skilled aeronautical
engineers. Identify this strategy.
A)
offshoring
B)
outsourcing
C)
in-sourcing
D)
franchising
E)
licensing
19)
In order to take advantage of the high quality talent pool, Ernst & Young
sets up operations in the Philippines and moves part of its tax services to its
new facility. Identify this strategy.
A)
outsourcing
B)
franchising
C)
offshoring
D)
in-sourcing
E)
in-forming
20)
TransCorp is a medium-sized IT firm that is looking to outsource its payroll
processes. Which of the following statements, if true, would most
strengthen the decision to outsource?
A)
Companies in other countries can do the same amount of work at a comparable cost.
B)
Outsourcing has become a trend among most firms in developed nations.
C)
Companies in other countries are more efficient in all aspects of work, along
with lower cost.
D)
Firms across the globe are adopting cloud computing systems.
E)
The firm is enjoying good profit margins.
21)
TransCorp is a medium-sized IT firm that has outsourced its customer-service
processes to the Philippines for the last two years. Which of the following
statements, if true, would most weaken the decision to continue outsourcing?
A)
Most firms in the Philippines have been accused of poor working conditions.
B)
The firm's prime competitor recently withdrew its outsourcing process.
C)
Customers' complaints about the quality of service have risen dramatically over
the past two years.
D)
According to a company survey, most employees feel that they require extensive
training.
E)
The value of the company's stock recently fell by 5 percent in the New York
Stock Exchange.
22)
________ refers to the delegation of a company's logistics operations to a
subcontractor that specializes in that operation.
A)
Outsourcing
B)
In-forming
C)
Offshoring
D)
In-sourcing
E)
Licensing
23)
Which of the following allows individuals to utilize powerful search engines on
the Internet to build their "own personal supply chain of information,
knowledge, and entertainment"?
A)
offshoring
B)
in-forming
C)
in-sourcing
D)
exporting
E)
outsourcing
24)
Thomas L. Friedman uses the term "the steroids" to refer to
technologies ________.
A)
that make different forms of collaboration digital,
mobile, virtual, and personal
B)
that tightly integrate retailers, their suppliers, and
their customers
C)
that allow firms to outsource business processes on a
global scale
D)
that allow users to add, remove, or edit content from
Web sites
E)
that allow individuals to build their own personal
supply chain of information and entertainment
25)
Outsourcing has seen a huge increase because of the ________.
A)
increase in decentralization
B)
decrease in transportation costs
C)
increase in advertising costs
D)
decrease in telecommunication costs
E)
increase in the cost of raw materials
26)
________ is the use of locations closer to the home country in terms of
geographical, political, linguistic, economic, or cultural distance.
A)
In-forming
B)
Nearshoring
C)
Onshoring
D)
In-sourcing
E)
Outsourcing
27)
U.S. companies move work from India back to Mexico or British Columbia in order
to address some of the challenges associated with overseas destinations. This
is an example of ________.
A)
in-sourcing
B)
outsourcing
C)
in-forming
D)
onshoring
E)
nearshoring
28)
Which of the following is as an example of nearshoring?
A)
British Airways moves customer relations and passenger revenue accounting to
India.
B)
Parts of Airbus and Boeing airplanes are designed and engineered in Moscow,
Russia.
C)
McKinsey sets up a global research division in India.
D)
Worldwide banking group HSBC moves back-office operations to India.
E)
T-Mobile moves part of its content development process from India to the Czech
Republic.
29)
Aortego, a U.S.-based automobile company, has a manufacturing plant in India
and has been able to reduce its manufacturing costs significantly because of
the country's highly-skilled yet low cost labor. However, Aortego is forced to
shift its plant from India to Canada because of the introduction of a new law
which mandates that all companies collaborate with Indian companies before
entering into the country. Which of the following best explains Aortego's shift
from India to Canada?
A)
offshoring
B)
outsourcing
C)
in-forming
D)
nearshoring
E)
in-sourcing
30)
According to Nicholas Carr, cloud computing may contribute to the decline in
outsourcing. Which of the following justifies this statement?
A)
An IT outsourcer's business is built around managing complex internal systems.
A shift to a simpler cloud-based IT infrastructure should reduce the need for
outsourcers.
B)
Outsourcing is based on the availability of cheap labor; these workers will not
be able to work on complex cloud-based IT infrastructures, thereby contributing
to the decline in outsourcing.
C)
Cloud computing is customized in each country, thus making it impossible to
outsource.
D)
Cloud computing is standardized in all countries, reducing the need for
outsourcing.
E)
An IT outsourcer's business is built around managing simple internal systems. A
shift to a complex cloud-based IT infrastructure would discourage outsourcing.
31)
Which of the following is a cultural challenge of operating in the digital
world?
A)
conducting videoconferences across different time
zones
B)
aging populations in the United States and Western
Europe
C)
differences in power distance and uncertainty
avoidance
D)
availability of labor force and salary differences
E)
differences in academic degrees and measurement units
32)
Which of the following is a geoeconomic challenge of operating in the digital
world?
A)
differences in network infrastructures
B)
differences in the concept of time and life focus
C)
differences in measurement units
D)
differences in export and import regulations
E)
differences in languages
33)
________ refers to physical computer equipment, such as the computer monitor,
central processing unit, or keyboard.
A)
Software
B)
Malware
C)
Data
D)
Hardware
E)
Telecommunication
34)
________ refer(s) to a program or set of programs that tell the computer to
perform certain tasks.
A)
Software
B)
Telecommunication
C)
Hardware
D)
Data
E)
Networks
35)
Which of the following statements is true about information systems (IS) and
information technology (IT)?
A)
IS programs are more technical in nature than IT programs.
B)
IT programs have a stronger managerial focus than IS programs.
C)
Software and telecommunications are present in IS, but excluded from IT.
D)
The differences between IT and IS is increasing due to globalization.
E)
IT programs are more technical in nature, whereas IS programs have a stronger
managerial focus.
36)
Which of the following statements is true about data?
A)
It can be defined as a representation of reality.
B)
It is the ability to understand information.
C)
It has no meaning in and of itself.
D)
It is the ability to make decisions or predictions based on information.
E)
It organizes or manipulates information to make it suitable for a given task.
37)
Which of the following statements is true about information?
A)
It has no meaning in and of itself.
B)
It organizes or manipulates knowledge to make it suitable for a given task.
C)
It is raw material—recorded, unformatted words and
numbers.
D)
It is a representation of reality.
E)
It is the ability to make predictions based on data.
38)
Which of the following IS personnel is responsible for the maintenance of
information systems?
A)
a systems analyst
B)
a database administrator
C)
a programmer
D)
an IS security manager
E)
a systems consultant
39)
Which of the following IS personnel is responsible for coding, testing,
debugging, and installing programs?
A)
a programmer
B)
a systems consultant
C)
an IS manager
D)
a systems analyst
E)
an IS security manager
40)
Which of the following IS personnel is responsible for strategic planning and
IS use throughout a firm?
A)
the chief information officer
B)
the IS security manager
C)
the IS manager
D)
the Webmaster
E)
the IS auditor
41)
In information systems management, a systems consultant is responsible for
________.
A)
analyzing business requirements and selecting
information systems that meet those needs
B)
coding, testing, debugging, and installing programs
C)
auditing information systems for compliance with
internal and external standards
D)
managing security measures and disaster recovery
E)
providing information systems knowledge to external
clients
42)
Which of the following is part of an IS personnel's technical knowledge and
skills?
A)
systems analysis and design
B)
integrating subsystems and systems
C)
alternative development methodologies
D)
network operating systems
E)
technological communication and presentation
43)
Which of the following is part of an IS personnel's business knowledge and
skills?
A)
information gathering and synthesis
B)
technological communication and presentation
C)
systems development life cycle
D)
problem identification and solution formulation
E)
virtualization
44)
Which of the following is part of an IS personnel's systems knowledge and
skills?
A)
hardware platforms
B)
business processes
C)
alternative development methodologies
D)
cabling and network interface cards
E)
application software
45)
Identify the purpose of a transaction processing system used in organizations.
A)
to support the activities within a specific functional
area of the firm
B)
to handle day-to-day business event data at the
operational level of the organization
C)
to support interaction between the firm and its
customers
D)
to support the coordination of suppliers, product or
service production, and distribution
E)
to enable customers to buy goods and services from a
firm's Web site
46)
The purpose of a(n) ________ is to support and
integrate all facets of the business, including planning, manufacturing, sales,
marketing, and so on.
A)
intelligent system
B)
functional area information system
C)
electronic commerce system
D)
enterprise resource planning system
E)
management information system
47)
The purpose of an intelligent system is to ________.
A)
enable people to communicate, collaborate, and
coordinate with each other
B)
create, store, analyze, and manage spatial data
C)
emulate or enhance human capabilities
D)
support the coordination of suppliers, product or
service production, and distribution
E)
produce detailed information to help manage a firm
48)
Which of the following can be cited as an example of a supply chain management
system?
A)
procurement planning
B)
market analysis
C)
knowledge portal
D)
sales force automation
E)
product demand forecasting system
49)
Identify the purpose of an office automation system.
A)
to processes day-to-day business event data at the
operational level of the organization
B)
to provide access to databases in order to support
quantitative decision making
C)
to support a wide range of predefined day-to-day
activities of individuals and small groups
D)
to support interaction between the firm and its
customers
E)
to support the activities within a specific functional
area of the firm
50)
A grocery store checkout cash register with a connection to a network is an
example of a(n) ________.
A)
intelligent system
B)
functional area information system
C)
decision support system
D)
transaction processing system
E)
electronic commerce system
51)
The process of connecting separate information systems and data to improve
business processes and decision making is known as ________.
A)
database development
B)
business intelligence
C)
systems integration
D)
application development
E)
collaboration systems
52)
Microsoft's Exchange/Outlook and Lotus Notes, provide people with e-mail,
automated calendaring, and online, threaded discussions, enabling close contact
with others, regardless of their location. Identify this type of information
system. These are examples of ________.
A)
collaboration systems
B)
office automation systems
C)
data mining and visualization systems
D)
functional area information systems
E)
transaction processing systems
53)
Which of the following statements is true about today's service-oriented IS
personnel?
A)
They modify systems at a moment's notice to meet customer needs quickly and
effectively.
B)
They patiently wait for customers to come in with systems complaints.
C)
They believe that they own and control the computing resources.
D)
They give reasons why customers' ideas cannot or will not work.
E)
They believe they should tell users what they can and cannot do with the
computing resources.
54)
Toyota's automotive electronics systems and FedEx's Web site were not developed
solely because managers in these organizations wanted to do things faster or
because they wanted to have the latest, greatest technology. These
organizations developed these systems to help gain or sustain competitive
advantage. The choices made in developing the systems at both Toyota and FedEx
were ________ in their intent.
A)
operational
B)
functional
C)
strategic
D)
departmental
E)
tactical
55)
Which of the following is used to describe the issues and standards of conduct
as they pertain to the use of information systems?
A)
virtual ethics
B)
social informatics
C)
cyber security
D)
computer etiquette
E)
computer ethics
56)
________ is concerned with what information an individual should have to reveal
to others in the workplace or through other transactions.
A)
Information accessibility
B)
Information accuracy
C)
Information privacy
D)
Information asymmetry
E)
Information piracy
57)
SlamBook is a social networking site which currently has around 2,000,000
users. The company has always valued its users' privacy and has taken extensive
measures to safeguard it. However, SlamBook has recently faced severe customer
backlash regarding privacy issues associated with one of its applications.
Which of the following statements would best explain the apparent discrepancy
above?
A)
Recently, the government introduced stringent privacy regulations for Internet
firms.
B)
The application did not have any provisions that restricted minors from using
the application.
C)
MyPlace, SlamBook's closest competitor, had seen great success with a similar
application and an opt-out system.
D)
Launching opt-out applications instead of opt-in applications is an industry
trend.
E)
The application was an opt-out system, whereby all users were enrolled by
default.
58)
WorldTravel (www.worldtravel.com) is a travel Web site that provides detailed
information about the different places that tourists can visit across the
globe. Additionally, it also helps visitors to book tickets and hotels in these
destinations. Which of the following, if true, would most assure the
customers about their online privacy?
A)
WorldTravel, when collecting personal information, explicitly states the
purpose of the information and that it will not be used for anything else.
B)
WorldTravel informs its members that it is following the best practices in the
industry.
C)
WorldTravel, when collecting personal information, explicitly tells all its
customers that the information collected will be protected by a third party who
specializes in this domain.
D)
WorldTravel decides not to send any spam mails to any of its members.
E)
WorldTravel, when collecting personal information, explicitly tells all its
customers that the information collected is protected under the Electronic
Communications Privacy Act.
59)
Which of the following statements is true about online privacy?
A)
A vendor cannot track the Web pages you look at.
B)
A vendor cannot track what products you examine in detail.
C)
A vendor is not capable of knowing the method of payment you choose to use.
D)
A vendor is not required by law to respect your privacy.
E)
A vendor cannot know where you are having the product delivered.
60)
Which of the following steps should be taken to ensure ones privacy online?
A)
Avoid Web sites that are monitored by independent organizations.
B)
Visit Web sites anonymously.
C)
Adjust your Web browser settings to save cookies.
D)
Ensure you receive a confirmation e-mail whenever you buy products online.
E)
Maintain only one e-mail account and use it when making online purchases.
61)
________ is concerned with ensuring the authenticity and fidelity of
information as well as with identifying who is responsible for informational
errors that harm people.
A)
Information privacy
B)
Information accuracy
C)
Information accessibility
D)
Information property
E)
Information protection
62)
Information property focuses on ________.
A)
who owns information about individuals and how
information can be sold and exchanged
B)
information that has been encrypted by the owner to
make it unaccessible to others
C)
information an individual should or should not have to
reveal to others in the workplace
D)
information a person or organization has the right to
obtain about others
E)
the authenticity of information as well as
responsibility for informational errors that harm people
63)
Who owns the computerized information that is stored in thousands of databases
by retailers, credit card companies, and marketing research companies?
A)
the government
B)
the Chief Information Officer
C)
the firm that maintains the database
D)
the customers themselves
E)
the company's IT department
64)
Information about "who am I, and where do I live?" is an example of
________.
A)
behavioral data
B)
geographic data
C)
psychographic data
D)
demographic data
E)
attitudinal data
65)
Information accessibility focuses on ________.
A)
defining what information a person or organization has
the right to obtain about others
B)
identifying who is responsible for informational
errors that harm people
C)
information that has been encrypted by the owner to
make it unaccessible to others
D)
who owns information about individuals and how
information can be sold and exchanged
E)
what information an individual should have to reveal
to others in the workplace
66)
The ________ Act of 1986 made it much more difficult for anyone, including the
government, to eavesdrop on phone conversations.
A)
Electronic Communication Modernization
B)
Internet Privacy
C)
Sarbanes-Oxley
D)
Gramm–Leach–Bliley
E)
Electronic Communications Privacy
67)
The gap between those individuals in our society who are
computer literate and have access to information resources like the Internet
and those who do not is referred to as the ________.
A)
horizontal disparity
B)
digital divide
C)
electronic gap
D)
generation gap
E)
knowledge divide
68)
Which of the following can be cited as an example of a digital divide?
A)
Unlike Joey, Ryan has access to more books and good advice because he studies
in a better school.
B)
Unlike Ben, Claudia possesses superior analytical skills, which makes her
better at mathematics.
C)
Kevin is more successful than Vincent because of his people skills.
D)
Lora has access to more information than Frank because she knows how to operate
a computer.
E)
Trisha is wealthier than Neal because her father is a successful businessman.
69)
The digital divide is one of the major ethical challenges facing society today
when you consider the strong linkage between computer literacy and a person's
ability to compete in the information age. Which of the following statements,
if true, would widen the digital divide?
A)
According to Moore's law, the cost of computing is expected to decrease
drastically over the next few years.
B)
Companies like Microsoft and Berkshire Hathaway have invested billions of
dollars in research on information technology.
C)
IT firms are concerned about and are conducting extensive research on the
obsolescence of technology.
D)
The increase in the need for innovative technology has increased the cost of
research, which has resulted in an increase in the cost of computing.
E)
Certain IT firms are conducting exclusive research to make the technology
product life-cycle longer.
70)
A global project called One Laptop per Child is attempting to distribute
low-cost laptop computers to children in developing countries around the world
in an attempt to shrink the ________.
A)
digital divide
B)
electronic gap
C)
power distance
D)
horizontal disparity
E)
knowledge gap
Chapter
2: Gaining Competitive Advantage Through Information
Systems
1)
At the ________ level of a firm, the routine, day-to-day business processes and
interactions with customers occur.
A)
strategic
B)
tactical
C)
operational
D)
managerial
E)
executive
2)
Information systems at the ________ level are designed to automate repetitive
activities, such as sales transaction processing, and to improve the efficiency
of business processes and the customer interface.
A)
tactical
B)
executive
C)
strategic
D)
managerial
E)
operational
3)
Which of the following actions can be included as a part of operational
planning?
A)
making day-to-day decisions that are highly structured
and recurring
B)
effectively utilizing and deploying organizational
resources to achieve strategic objectives
C)
focusing on long-term strategic questions facing the
organization
D)
dealing with complex problems with broad and long-term
ramifications for the organization
E)
focusing on balancing performance across the
organization
4)
At the ________ level, information systems are typically used to optimize
processes and to better understand the underlying causes of any performance
problems.
A)
tactical
B)
executive
C)
managerial
D)
operational
E)
strategic
5)
Ben White is the manager of a retail store. His work typically includes the
routine, day-to-day interactions with customers and, once in a while, solving a
customer's problem or dealing with a dissatisfied
customer. Additionally, he has to keep track of inventory and issue an order
for additional inventory with levels below a specified level. Ben is a(n) ________ level manager.
A)
operational
B)
tactical
C)
strategic
D)
managerial
E)
executive
6)
The managerial level of the organization is also known as the ________ level.
A)
functional
B)
tactical
C)
executive
D)
operational
E)
strategic
7)
Managers at the tactical level of the organization focus on ________.
A)
deploying organizational resources to achieve the
objectives of the organization
B)
routine, day-to-day business processes, and
interactions with customers
C)
long-term strategic questions facing the organization
D)
complex problems with broad and long-term
ramifications for the organization
E)
the efficiency of business processes and the customer
interface
8)
Jane Estroisch works as a manager in a multidomestic firm. She focuses on the
long-term questions facing the organization such as which countries to compete
in and what organizational policies to follow. Jane is in the the ________
level of the organization.
A)
operational
B)
tactical
C)
executive
D)
functional
E)
managerial
9)
Managers in the ________ level are referred to as "executives."
A)
operational
B)
tactical
C)
functional
D)
strategic
E)
managerial
10)
________ decisions deal with complex problems with broad and long-term
ramifications for the organization.
A)
Executive-level
B)
Functional-level
C)
Tactical-level
D)
Operational-level
E)
Managerial-level
11)
To assist ________ decision making, information systems are used to obtain
aggregate summaries of trends and projections of the future.
A)
managerial-level
B)
functional-level
C)
tactical-level
D)
operational-level
E)
executive-level
12)
Doing things faster is associated with information systems for ________.
A)
learning
B)
automating
C)
supporting
D)
initiating
E)
negotiating
13)
Information systems at the ________ level of an organization often help in
automating repetitive activities.
A)
tactical
B)
strategic
C)
managerial
D)
operational
E)
executive
14)
"Doing Things Smarter" is associated with information systems for
________.
A)
automating
B)
organizational learning
C)
encrypting
D)
networking
E)
supporting strategy
15)
Which of the following actions would an organization take if it decides to
pursue a best-cost provider strategy?
A)
offering the best prices in its industry on its goods
and/or services
B)
providing better products or services than its
competitors
C)
offering products or services of reasonably good
quality at competitive prices
D)
providing high quality products at low prices in
specific markets
E)
offering low quality products at low prices with high
quality after-sales services
16)
Tere'OWind, a fashion apparel company, provides numerous low-cost products to a
broad range of customers. Tere'OWind is pursuing a ________ strategy.
A)
focused low-cost
B)
best-cost provider
C)
broad differentiation
D)
low-cost leadership
E)
focused differentiation
17)
Which of the following is an example of a focused differentiation strategy?
A)
Manufacturers like Ferrari, Aston Martin, and Lamborghini compete in the tiny
super car category with prices starting at $150,000 and running as high as
$600,000.
B)
Global furniture retailer Ikea provides customers with "affordable
solutions for better living" by offering home furnishings that combine
good design, function, and quality with low prices.
C)
McDonald's has extended its appeal across age groups, social groups, and
national boundaries by emphasizing a few qualities with universal appeal:
speed, consistency, value, hygiene, and family lifestyles.
D)
Wal-Mart's every day low prices (EDLP) strategy hinges upon Wal-Mart's ability
to obtain consumer goods at the cheapest possible price and pass these savings
on to consumers.
E)
Toyota's Lexus brand is considered a luxury car. Some of Lexus' models like the
ES model, however, are in the midrange of prices for cars.
18)
Which of the following is an example of a focused low-cost strategy?
A)
McDonald's has extended its appeal across age groups, social groups, and
national boundaries by emphasizing a few qualities with universal appeal:
speed, consistency, value, hygiene, and family lifestyles.
B)
Toyota's Lexus brand is considered a luxury car. Some of Lexus' models like the
ES model, however, are in the midrange of prices for cars.
C)
Global furniture retailer Newton provides customers who
live in high-altitude areas with "affordable solutions for better
living" by offering home furnishings that combine good design, function,
and quality with low prices.
D)
Walmart's every day low prices (EDLP) strategy hinges upon Walmart's ability to
obtain consumer goods at the cheapest possible price and pass these savings on
to consumers.
E)
Big Dog builds motorcycles that target only the very high end of the
heavyweight market—the high-end premium cruiser market—with names such as
Pitbull, Wolf, Mastiff, and Bulldog.
19)
Which of the following is an example of a best-cost provider strategy?
A)
Manufacturers like Ferrari, Aston Martin, and Lamborghini compete in the tiny
super car category with prices starting at $150,000 and running as high as
$600,000.
B)
Toyota's Lexus brand is considered a luxury car. Some of Lexus' models like the
ES model, however, are in the midrange of prices for cars.
C)
Global furniture retailer Ikea provides customers with "affordable
solutions for better living"by offering home furnishings that combine good
design, function, and quality with low prices.
D)
Big Dog builds motorcycles that target only the very high end of the
heavyweight market—the high-end premium cruiser market—with names such as
Pitbull, Wolf, Mastiff, and Bulldog.
E)
Wal-Mart's every day low prices (EDLP) strategy hinges upon Wal-Mart's ability
to obtain consumer goods at the cheapest possible price and pass these savings
on to consumers.
20)
Firms targeting a niche market with low cost products are pursuing a ________
strategy.
A)
best-cost provider
B)
broad differentiation
C)
focused low-cost
D)
focused differentiation
E)
low-cost leadership
Answer: C
21)
A ________ strategy can also be referred to as a middle-of-the-road strategy.
A)
best-cost provider
B)
focused low-cost
C)
low-cost leadership
D)
broad differentiation
E)
focused differentiation
22)
Which of the following is an implication for firms that have a threat of new
entrants in their market?
A)
increased cost
B)
reduced quality
C)
increased demand for services
D)
increased price
E)
decreased market share
23)
Reduced prices, need for increased quality, and demand for more services would
result due to high ________.
A)
threat of substitute products from other industries
B)
customers' bargaining power
C)
threat of new entrants into the market
D)
traditional rivals within the industry
E)
increased suppliers' bargaining power
24)
With reference to assessing value for the IS infrastructure, ________ value is
the contribution an investment makes toward improving the infrastructure's
ability to enhance the profitability of the business.
A)
architectural
B)
operational
C)
regulatory
D)
compliance
E)
economic
25)
With reference to assessing value for the IS infrastructure, architectural
value is derived from ________.
A)
the infrastructure's ability to enhance the
profitability of the business
B)
an investment's ability to extend the infrastructure's
capabilities to meet business needs today and in the future
C)
an investment's impact on enabling the infrastructure
to better meet business processing requirements
D)
assessing the extent to which an investment helps to
meet requirements for control, security, and integrity as required by a
governing body or a key customer
E)
the infrastructure's ability to improve product
quality and customer satisfaction
26)
While assessing value of the IS infrastructure, "before-and-after"
assessments of infrastructure characteristics such as interoperability,
portability, scalability, recoverability, and compatibility can be taken to
measure ________ value.
A)
economic
B)
operational
C)
regulatory
D)
architectural
E)
compliance
27)
While assessing value of the IS infrastructure, ________ value is derived from
assessing an investment's impact on enabling the infrastructure to better meet
business processing requirements.
A)
architectural
B)
regulatory
C)
operational
D)
economic
E)
compliance
28)
While assessing value of the IS infrastructure, if we measure the impact of not
investing in a particular project, we are deriving the ________ value.
A)
operational
B)
economic
C)
compliance
D)
regulatory
E)
architectural
29)
While assessing value of the IS infrastructure, ________ value is derived from
assessing the extent to which an investment helps to meet requirements for
control, security, and integrity as required by a governing body or a key
customer.
A)
architectural
B)
tactical
C)
operational
D)
regulatory and compliance
E)
economic
30)
Which of the following international business strategies is associated with low
degree of global integration and high degree of local responsiveness?
A)
global strategy
B)
home-replication strategy
C)
international strategy
D)
multidomestic strategy
E)
transnational strategy
31)
A global strategy is associated with ________.
A)
low degree of global integration and high degree of
local responsiveness
B)
low degree of global integration and lack of local
responsiveness
C)
high degree of global integration and high degree of
local responsiveness
D)
low degree of global integration and low degree of
local responsiveness
E)
high degree of global integration and low degree of
local responsiveness
32)
A firm that enjoys high degree of global integration and local responsiveness
is pursuing a(n) ________ strategy.
A)
transnational
B)
global
C)
international
D)
multidomestic
E)
home-replication
33)
Which of the following statements is true about firms pursuing a
home-replication strategy?
A)
They attempt to achieve economies of scale by producing identical products in
large quantities for a variety of different markets.
B)
They develop products for the global market.
C)
They focus on their domestic customers' needs and wants and merely export their
products to generate additional sales.
D)
They have a need to create integrated networks between the home office and the
multiple local subsidiaries.
E)
They leverage the flexibility offered by a decentralized organization while at
the same time reaping economies of scale enjoyed by centralization.
34)
Companies pursuing a(n) ________ strategy attempt to
achieve economies of scale by producing identical products in large quantities
for a variety of different markets.
A)
global
B)
international
C)
export
D)
multidomestic
E)
home-replication
35)
While pursuing a global business strategy, the ________ prohibit(s) the
implementation of local strategies, and thus a global company cannot quickly
react to local challenges and opportunities.
A)
increased bargaining power of customers
B)
threat of new entrants into the market
C)
increased bargaining power of suppliers
D)
need to achieve economies of scale
E)
threat of substitute products from other industries
36)
Which of the following statements is true about organizations pursuing a global
business strategy?
A)
They use a loose federation of associated business units, each of which is
rather independent in their strategic decisions.
B)
They attempt to achieve economies of scale by producing identical products in
large quantities for a variety of different markets.
C)
They are extremely flexible and responsive to the needs and demands of local
markets.
D)
They focus on their domestic customers' needs and wants and merely export their
products to generate additional sales.
E)
They leverage the flexibility offered by a decentralized organization while at
the same time reaping economies of scale enjoyed by centralization.
37)
Which of the following is a disadvantage of firms that pursue a global
strategy?
A)
lack of control over subsidiaries
B)
limited knowledge transfer between individual
subsidiaries
C)
lack of interest in obtaining additional knowledge
about foreign operations
D)
inability to control decentralization
E)
inability to react quickly to local challenges and
opportunities
38)
Which of the following statements is true about firms pursuing a multidomestic
business strategy?
A)
They leverage the flexibility offered by a decentralized organization while at
the same time reaping economies of scale enjoyed by centralization.
B)
They focus on their domestic customers' needs and wants and merely export their
products to generate additional sales.
C)
They cannot react quickly to local challenges and opportunities.
D)
They are extremely flexible and responsive to the needs and demands of local
markets.
E)
They work in a centralized fashion and the home location exerts strong control
on the subsidiaries.
39)
Which of the following is a disadvantage for firms pursuing a multidomestic
business strategy?
A)
limited knowledge transfer between individual subsidiaries
B)
exerting unnecessary control over subsidiaries
C)
lack of interest in obtaining additional knowledge about foreign operations
D)
inability to react quickly to local challenges and opportunities
E)
restriction of decision-making ability of subsidiaries
Scenario
Glasco
Hardware Co. is a multinational firm that manufacturers hardware components for
companies like Dell, Sony, and Toshiba. Glasco has seen steady growth for the
past 3 years and cites its decision to start manufacturing firms in developing
nations as the primary reason for its steady growth, even during recession.
40)
Which of the following statements, if true, would support the argument that
Glasco implements a global business strategy?
A)
Glasco's top managers have a global view and look for the best approaches and
people regardless of origin.
B)
Glasco's top managers have the view that employees in the host country know the
best work approaches and practices for running their business.
C)
Glasco's top managers believe that the best work approaches and practices are
those of the home country.
D)
Glasco's top managers view every foreign operation as different and hard to
understand.
E)
Glasco's top managers believe that decentralization is the ideal approach in
todays dynamic environment.
41)
Which of the following statements, if true, would imply that Glasco implements
a multidomestic business strategy?
A)
Glasco's top managers have a global view and look for the best approaches and
people regardless of origin.
B)
Glasco's top managers believe that people in foreign countries don't have the
needed skills, expertise, knowledge, or experience to make the best business
decisions.
C)
Glasco's top managers ignore others' values and customs and rigidly apply an
attitude of "ours is better than theirs"to foreign cultures.
D)
Glasco's top managers believe that the best work approaches and practices are
those of the home country.
E)
Glasco's top managers have the view that employees in the host country know the
best work approaches and practices for running their business.
42)
Which of the following statements, if true, would support the argument that
Glasco pursues a transnational business strategy?
A)
Glasco's top managers believe that the best work approaches and practices are
those of the home country.
B)
Glasco's top managers have a global view and look for the best approaches and
people regardless of origin.
C)
Glasco's top managers are facing a problem that has arisen because of the lack
of communication between its two subsidiaries.
D)
Glasco's top managers believe that people in foreign countries don't have the
needed skills, expertise, knowledge, or experience to make the best business
decisions.
E)
Glasco's top managers ignore others' values and customs and rigidly apply an
attitude of "ours is better than theirs"to foreign cultures.
43)
The ________ business strategy allows companies to leverage the flexibility
offered by a decentralized organization while at the same time reaping
economies of scale enjoyed by centralization.
A)
international
B)
global
C)
multidomestic
D)
transnational
E)
home-replication
44)
Which of the following actions distinguish firms pursuing a transnational business
strategy?
A)
responding to local challenges and opportunities quickly
B)
exerting strong control over its subsidiaries
C)
striking a balance between centralization and decentralization
D)
responding to global challenges and opportunities quickly
E)
standardizing product offerings to achieve economies of scale
45)
Mystic, a Texas-based fashion apparel company with subsidiaries in more that 25
countries across the world, is one of the most recognized brands in the global
and domestic markets. In a recent interview with The New York Times, the
CEO and the spearhead of Mystic Co. Burt Swager said, "The secret of the
company's success is its ability to strike the right balance between
centralization and decentralization." Mystic Co. is a firm that successfully
pursues a(n) ________ business strategy.
A)
global
B)
transnational
C)
home-replication
D)
multidomestic
E)
international
46)
According to ________, the number of transistors that could be squeezed onto a
silicon chip would double every 18 months.
A)
Metcalfe's law
B)
Megan's law
C)
Murphy's law
D)
Moore's law
E)
Ashby's law
47)
To deploy innovative information systems well, people in the organization must
be willing to do whatever they can to bypass and eliminate internal
bureaucracy, set aside political squabbles, and pull together for the common
good. These requirements can be categorized as ________ requirements.
A)
process
B)
customer
C)
resource
D)
quality
E)
risk tolerance
48)
Which of the following actions would fulfill the process requirements for the
deployment of an innovative information system?
A)
hiring the necessary human capital
B)
finding system partners
C)
concentrating on economies of scale
D)
eliminating internal bureaucracy
E)
discouraging decentralization
49)
Organizations deploying innovative information systems must have the human
capital necessary to deploy the new systems. These requirements can be
categorized as ________ requirements.
A)
resource
B)
process
C)
risk tolerance
D)
customer
E)
quality
50)
Which of the following actions would fulfill the resource requirements for the
deployment of an innovative information system?
A)
discouraging decentralization
B)
evaluating the risk tolerance of employees
C)
concentrating on economies of scale
D)
eliminating internal bureaucracy
E)
finding system partners
51)
________ are new technologies, products, or services that eventually surpass
the existing dominant technology or product in a market.
A)
Constructive innovations
B)
Destructive innovations
C)
Disruptive innovations
D)
Facultative innovations
E)
Extensive innovations
52)
Which of the following statements is true about disruptive innovations?
A)
They have a very short life span and are discarded quickly.
B)
They surpass the existing dominant technology or product in a market.
C)
They are innovations used to incapacitate a rival firm.
D)
They lack the ability to destroy an organization or industry.
E)
They are innovations created or used with the intention of harming the human
race.
53)
The innovator's dilemma refers to how disruptive innovations ________.
A)
force rival firms to copy the innovations, often leading to intellectual
property violations
B)
cause the failure of the firm that created it
C)
encourage firms to make heavy investments that result in losses when these innovations
fail
D)
cause established firms or industries to lose market dominance when ignored
E)
lead to loss of government control in these industries
54)
According to the disruptive growth engine, executive leadership will allow a
firm to ________.
A)
effectively identify and evaluate potential disruptive innovations
B)
gain credibility and to bridge sustaining and disruptive product development
C)
gain the greatest opportunities
D)
build a competent team of expert innovators
E)
educate those closest to customers and competitors in order to identify
opportunities
55)
According to the disruptive growth engine, firms need to build a team of expert
innovators to ________.
A)
effectively identify and evaluate potential disruptive innovations
B)
gain credibility and to bridge sustaining and disruptive product development
C)
gain the greatest opportunities
D)
educate those closest to customers and competitors in order to identify
opportunities
E)
build a competent team of expert innovators
56)
Which of the statements explains the difference between "e-commerce"
and "e-business?"
A)
E-commerce is the use of nearly any information technologies or systems to
support commerce, e-business is the use of the Internet and related
technologies to support every part of the business.
B)
E-commerce is the use of nearly any
information technologies or systems to support commerce, e-business is the use
of nearly any information technologies or systems to support every part of the
business.
C)
E-commerce is the use of nearly any information technologies or systems to
support commerce, e-business is the use of e-commerce to support every part of
the business.
D)
E-commerce is the use of the Internet and related technologies to support
commerce, e-business is the use of nearly any information technologies or
systems to support e-commerce.
E)
E-commerce is the use of the Internet and related technologies to support
commerce, e-business is the use of nearly any information technologies or
systems to support every part of the business.
57)
Which of the following statements is true about the e-business innovation
cycle?
A)
The vertical dimension of the cycle shows the life expectancy of a particular
information technology, and the horizontal dimension shows time.
B)
The vertical dimension of the cycle shows the extent to which an organization
derives value from a particular information technology, and the horizontal
dimension shows time.
C)
The vertical dimension of the cycle shows the expected investments required for
a particular information technology, and the horizontal dimension shows time.
D)
The vertical dimension of the cycle shows the efficiency of a particular
information technology, and the horizontal dimension shows time.
E)
The vertical dimension of the cycle shows the user-friendliness of a particular
technology, and the horizontal dimension shows the amount of investment in that
technology.
58)
In an e-business innovation cycle, after an organization scans the environment
for new emerging and enabling technologies, the next step is to ________.
A)
create jobs, groups, and processes that are all devoted to scanning the
environment
B)
select the database and data storage advances
C)
address the current opportunity to grab customers and market share
D)
match the most promising new technologies with current economic opportunities
E)
assess the value of the use of technology for customers and internal clients
59)
In an e-business innovation cycle, after a firm executes business innovation
for growth, the next step is to ________.
A)
assess the value of the use of technology for customers and internal clients
B)
create jobs, groups, and processes that are all devoted to scanning the
environment
C)
select the database and data storage advances
D)
match the most promising new technologies with current economic opportunities
E)
address the current opportunity to grab customers and market share
60)
Freeconomics is the leveraging of digital technologies to ________.
A)
provide high quality products and services at low prices as a business strategy
for gaining a competitive advantage
B)
allow free product information to customers as a business strategy for gaining
a competitive advantage
C)
allow dissatisfied customers easy access to business premises and top
management of the firm
D)
match customer preferences with product features
E)
provide free goods and services to customers as a business strategy for gaining
a competitive advantage
61)
According to basic economics within a competitive marketplace, the price of a
product is set by its ________.
A)
opportunity cost
B)
sunk cost
C)
marginal cost
D)
transaction cost
E)
fixed cost
62)
Which of the following defines marginal cost?
A)
It is the cost of an alternative that must be forgone in order to pursue a
certain action.
B)
It is the cost of producing an additional unit of output.
C)
It is the cost that is not dependent on the level of goods or services produced
by the business.
D)
It is the cost that has already been incurred and cannot be recovered.
E)
It is the cost incurred in making an economic exchange.
63)
Which of the following actions of a firm suggests that it is using the freemium
approach to applying freeconomics?
A)
providing free services to customers and getting paid for it by third parties
B)
reducing the sale price of one item in order to sell something else of value
C)
distributing products to customers without an appreciable cost to anyone
D)
offering basic services for free, but charging a premium for special features
E)
allowing people to participate and collaborate to create something of value
64)
Musicmatch Jukebox is an all-in-one music management tool that was first
marketed in 1999. Most users can use the Basic/Free version, but a $19.99
upgrade provides extra features such as supertagging and faster ripping and
burning. Which of the following explains this approach to applying
freeconomics?
A)
advertising approach
B)
freemium approach
C)
zero marginal cost approach
D)
cross subsidies approach
E)
gift economy approach
65)
Tele'Wire, a mobile manufacturer, offers free connections to customers who buy
its mobile phones. This cost of connection is actually included in the price of
the mobile phone. Tele'Wire is pursuing a(n) ________ approach to applying
freeconomics.
A)
cross subsidies
B)
gift economy
C)
zero marginal cost
D)
advertising
E)
freemium
66)
Web sites like ez-tracks and beemp3 pursue a(n) ________ approach to applying
freeconomics when they offer free music downloads for users because
reproduction and distribution of these products come at no cost.
A)
gift economy
B)
zero marginal cost
C)
advertising
D)
cross subsidies
E)
freemium
67)
Wikipedia is a free, web-based, collaborative, multilingual encyclopedia
project supported by the non-profit Wikimedia Foundation. Its 17 million
articles have been written collaboratively by volunteers around the world, and
almost all of its articles can be edited by anyone with access to the site.
This allows people to participate and create something of value for everyone.
Wikipedia is pursuing a(n) ________ approach to applying freeconomics.
A)
gift economy
B)
zero marginal cost
C)
advertising
D)
cross subsidies
E)
freemium
Chapter
3: Managing the Information Systems Infrastructure and Services
1)
________ are used to enter information into a computer using devices such as a
keyboard and mouse on your personal computer, a biometric fingerprint reader to
authenticate a person entering a secure laboratory, or RFID scanners to track
valuable inventory in a warehouse.
A)
Processing technologies
B)
Storage technologies
C)
Input technologies
D)
Computational technologies
E)
Output technologies
2)
Which of the following statements is true about processing technologies?
A)
They are used to enter information into a computer.
B)
They deliver information in a usable format.
C)
They define the procedures that different computers follow when they transmit
and receive data.
D)
They transform inputs into outputs.
E)
They move data storage away from a centralized location to the"edges"
of a network.
3)
________ deliver information to you in a usable format.
A)
Output technologies
B)
Computational technologies
C)
Storage technologies
D)
Input technologies
E)
Processing technologies
4)
A(n) ________ is also referred to as the computer's brain.
A)
random-access memory
B)
operating system
C)
read-only memory
D)
application software
E)
microprocessor
5)
The ________ is responsible for performing all the operations of the computer.
A)
random-access memory
B)
central processing unit
C)
read-only memory
D)
application software
E)
operating system
6)
Any input your computer receives is digitized and then is processed by the CPU.
Which of the following explains the meaning of the word "digitized"
in the preceding sentence?
A)
stored in random-access memory
B)
encrypted in the operating system
C)
stored in a hard drive
D)
translated into binary code
E)
converted into application software
7)
The primary storage is also known as ________.
A)
volatile memory
B)
permanent memory
C)
nonvolatile memory
D)
protocols
E)
long-term memory
8)
Which of the following statements is true about secondary storage?
A)
The instructions and work stored in secondary storage are lost when the
computer is shut off.
B)
It retains the data when the power to the computer is shut off.
C)
It is a temporary storage place for data that is currently being processed.
D)
It is considerably faster than primary storage.
E)
The work stored in secondary storage is lost when new data is placed.
9)
The CPU interacts with ________ for permanently storing data.
A)
primary storage
B)
volatile memory
C)
random-access memory
D)
output technologies
E)
secondary storage
10)
________ is the collection of programs that control the basic operations of
computer hardware.
A)
Application software
B)
Transitory software
C)
Systems software
D)
Open source software
E)
Peripheral software
11)
The operating system of a computer is an example of a(n) ________ software.
A)
systems
B)
open source
C)
transitory
D)
peripheral
E)
application
12)
Operating systems are often written in ________, a very low level computer
programming language that allows the computer to operate quickly and
efficiently.
A)
structured query language
B)
hyper text markup language
C)
assembly language
D)
extensible markup language
E)
practical extraction and report language
13)
Which of the following tasks is performed by the systems software?
A)
writing a business letter
B)
managing a stock portfolio
C)
coordination of suppliers, product or service production, and distribution
D)
printing documents
E)
manipulating a series of forecasts
14)
Which of the following tasks is performed by the application software?
A)
printing documents
B)
writing a business letter
C)
presenting information via a monitor
D)
updating the system clock
E)
saving data to a disk
15)
The customer relationship management system and personal productivity software
are examples of ________.
A)
application software
B)
peripheral software
C)
systems software
D)
transitory software
E)
open source software
16)
Which of the following statements is true about open source software?
A)
These programs are used by a few professional users.
B)
These programs do not include systems software.
C)
They are back-up software used when a system is converting from systems to
application software.
D)
These programs do not include application software.
E)
These programs' source code is freely available for use and/or modification.
17)
A ________ is the most expensive and most powerful kind of computer, which is
used primarily to assist in solving massive scientific problems.
A)
supercomputer
B)
workstation
C)
mainframe
D)
server
E)
microcomputer
18)
A ________ is used primarily as the main, central computing system for major
corporations.
A)
microcomputer
B)
supercomputer
C)
server
D)
mainframe
E)
workstation
19)
A ________ is any computer on a network that makes access to files, printing,
communications, and other services available to users of the network.
A)
workstation
B)
server
C)
microcomputer
D)
supercomputer
E)
mainframe
20)
Designed for medical, engineering, or animation and graphics design uses,
________ are optimized for visualization and rendering of three-dimensional
models.
A)
mainframes
B)
supercomputers
C)
workstations
D)
servers
E)
microcomputers
21)
A ________ is used for personal computing and small business computing.
A)
workstation
B)
microcomputer
C)
mainframe
D)
server
E)
supercomputer
22)
Which of the following statements is true about servers?
A)
They are used to provide services to users within large organizations or to Web
users.
B)
They are primarily used as the main, central computing system for major
corporations.
C)
They are used primarily to assist in solving massive scientific problems.
D)
They are optimized for visualization and rendering of three-dimensional models.
E)
They are used for personal computing and small business computing.
23)
________ define the procedures that different computers follow when they
transmit and receive data.
A)
Consoles
B)
Ports
C)
Protocols
D)
Hosts
E)
Domains
24)
________ is the transmission capacity of a computer or communications channel.
A)
Latency
B)
Throughput
C)
Bandwidth
D)
Jitter
E)
Codec
25)
Bandwidth is measured in ________.
A)
moles per second
B)
joules per second
C)
parts per million
D)
bits per second
E)
relays per second
26)
A ________ is any computer on the network, or any software application that
uses only the services provided by the server.
A)
peer
B)
client
C)
host
D)
console
E)
port
27)
A ________ is any computer that requests and provides services.
A)
console
B)
client
C)
peer
D)
host
E)
port
28)
In ________ networks, servers and clients have defined roles.
A)
server-centric
B)
peer-to-peer
C)
peer-centric
D)
client-centric
E)
server-to-peer
29)
________ networks enable any computer or device on the network to provide and
request services. All members of the network have equivalent capabilities and
responsibilities.
A)
Server-centric
B)
Server-to-peer
C)
Client-to-peer
D)
Peer-to-peer
E)
Client-centric
30)
The Internet relies on ________ technology to deliver data and information across
networks.
A)
circuit-switching
B)
frame-relay
C)
packet-switching
D)
packet-sniffing
E)
store-and-forward
31)
________ is based on the concept of turn taking and enables millions of users
to send large and small chunks of data across the Internet concurrently.
A)
Packet switching
B)
Store-and-forward
C)
Frame-relay
D)
Circuit-switching
E)
Packet-sniffing
32)
Which of the following is mandatory for packet switching to work?
A)
Each packet being sent across a network must go through a supercomputer.
B)
Each packet being sent across a network must be labeled with a header.
C)
Each packet being sent across a network must be thoroughly scanned.
D)
Each packet being sent across a network must be broken down into sub-packets.
E)
Each packet being sent across a network must pass through a mainframe computer.
33)
Which of the following statements is true about packet-switching systems?
A)
For this system to work, each packet being sent across a network must be
verified.
B)
In this system, each computer attached to a network has the same network
address.
C)
Packet switching is used when only one computer needs to use the network.
D)
These systems adapt instantly to changes in network traffic.
E)
Wide Area Networks and the Internet do not use these technologies.
34)
Which of the following occurs if only one
computer needs to use the network in a packet-switching system?
A)
Data is sent continuously.
B)
The system waits for another computer to send data.
C)
Data is verified by the central server.
D)
Data blocks the network traffic and slows the system.
E)
Data is sent through the packet-switching technology.
35)
Internet protocol or the protocol used by the Internet is called the ________.
A)
Transmission Control Protocol (TCP)
B)
Dynamic Host Configuration Protocol (DHCP)
C)
Address Resolution Protocol (ARP)
D)
Trivial File Transfer Protocol (TFTP)
E)
TOC protocol
36)
A ________ is a device used to connect two or more individual networks.
A)
port
B)
console
C)
router
D)
jitter
E)
codec
37)
Datagram routing and delivery are possible because every computer and router
connected to the Internet is assigned an ________.
A)
IP packet
B)
IP console
C)
IP router
D)
IP address
E)
IP port
38)
Prior to the invention of the Web, content posted on the Internet could be accessed
through the Internet tool Gopher. The Web took Gopher one step further by
introducing ________.
A)
animation
B)
hypertext
C)
simulation
D)
file sharing
E)
instant chat
39)
The standard method of specifying the format of Web pages is called ________.
A)
Structured Query Language (SQL)
B)
Practical Extraction and Report Language (PERL)
C)
Extensible Markup Language (XML)
D)
Assembly Language (AL)
E)
Hypertext Markup Language (HTML)
40)
Web servers process user requests for pages using the ________.
A)
Hypertext Transfer Protocol
B)
TOC protocol
C)
Address Resolution Protocol
D)
Dynamic Host Configuration Protocol
E)
Trivial File Transfer Protocol
41)
Which of the following statements is true about the Information Infrastructure
Act?
A)
It allowed the use of the Web by education institutions such as universities.
B)
It allotted certain governmental agencies with the power to pick-and-scan any
document on the Web for security reasons.
C)
It opened the Web for commercial purposes.
D)
It permitted the controlled use of pornography over the Internet.
E)
It allowed the use of peer-to-peer networks on the Web.
42)
Which of the following is true about the graphical Web browser Mosaic?
A)
It provided users with references or links to other documents.
B)
It initiated file sharing on the Web.
C)
It is the basis of popular browsers such as Internet Explorer and Mozilla
Firefox.
D)
It made the tracking of IP addresses possible.
E)
It allowed users to open and use more than one Web page simultaneously.
43)
Which of the following statements is true about a uniform resource locator?
A)
It is used to locate specific information in a Web page.
B)
It is used to identify and locate a particular Web page.
C)
It is a protocol that helps Web servers store Web pages.
D)
It is a standard method for specifying the format of Web pages.
E)
It is a software application used to display the features of a Web page.
44)
The suffix ".org" is reserved for ________.
A)
governmental entities
B)
commercial organizations
C)
network organizations
D)
educational institutions
E)
nonprofit organizations
45)
Which of the following is likely to have the suffix ".com" after the
domain name in its URL?
A)
UNICEF
B)
the Federal Reserve
C)
Microsoft
D)
the World Wide Fund for Nature
E)
Massachusetts Institute of Technology
46)
Which of the following is likely to have the suffix ".org" after the
domain name in its URL?
A)
the Red Cross Society
B)
Starbucks
C)
the Federal Bureau of Investigation
D)
McDonalds
E)
Harvard Business School
47)
Which of the following is likely to have the suffix ".edu" after the
domain name in its URL?
A)
Yahoo!
B)
UNICEF
C)
the Federal Reserve
D)
Harvard Business School
E)
America Online
48)
In a URL, the ________ is the particular Web server or group of Web servers (if
it is a larger Web site) that will respond to the Web request.
A)
domain name
B)
host name
C)
client name
D)
top-level domain name
E)
port name
49)
Which of the following is the host name in the URL "labs.google.co.in/jack
carver?"
A)
labs
B)
google
C)
co
D)
in
E)
jack carver
50)
Which of the following statements is true about an IP address?
A)
The format of an IP address is a 64-bit numeric address.
B)
It is written as eight numbers separated by periods.
C)
Each number separated by periods can have any number between 0 to 999.
D)
It can be used to navigate to particular Web addresses.
E)
It is written as one number with a period at the end of the number
51)
The prediction that the number of transistors on a chip would double about
every two years is known as ________.
A)
Megan's law
B)
Ashby's law
C)
Murphy's law
D)
Metcalfe's law
E)
Moore's law
52)
The first CPU had 2,200 transistors, whereas the newest models have broken the
2-billion-transistor mark. Take for example, the Intel Core i7 Extreme CPU which
can complete hundreds of millions of operations every second. Which of the
following is the most similar to this scenario?
A)
Advanced "cloud" applications can be used for grid computing, edge
computing, and IP convergence.
B)
Apple has seen its sales volumes skyrocket by being able to come up with
products that leverage existing technology.
C)
New generation digital cameras have a higher number and size of pixels than
older digital camera models.
D)
The value of social networking sites increases as the number of users and
membership increase.
E)
The greater the number of contributors to an open source software, the greater
the "hidden costs" of running it.
53)
Which of the following occurred in the 1964-1990s generation of computing?
A)
The mainframe era began.
B)
The personal computer era began and interpersonal computing began.
C)
The mainframe era ended and the personal computer era began.
D)
The interpersonal computing era ended and the Internetworking era began.
E)
The Internetworking era ended.
54)
Which of the following occurred in the 1990s-2000 generation of computing?
A)
The mainframe era began.
B)
The personal computer era ended and interpersonal computing began.
C)
The mainframe era ended and the personal computer era began.
D)
The interpersonal computing era ended and the Internetworking era began.
E)
Internetworking era ended.
55)
Manufacturers of hardware and software often apply the concept of planned
obsolescence, meaning that ________.
A)
the companies have already decided when to launch their next product
B)
the product is designed in such a way as to extend its life span
C)
the product is designed to last only for a certain life span
D)
the product is designed to avoid obsolescence
E)
the companies do not enter markets which have the risk of product obsolescence
56)
Data centers managed by a third party that rents out space to multiple
organizational customers are known as ________.
A)
collocation facilities
B)
multi bay stations
C)
serial port facilities
D)
data ease facilities
E)
datahub stations
57)
Under the ________ model, organizations "rent" resources such as
processing, data storage, or networking from an external provider on an
as-needed basis and pay only for the services used.
A)
cluster computing
B)
grid computing
C)
distributed computing
D)
utility computing
E)
parallel computing
58)
Utility computing offers tremendous benefits in terms of ________ for companies
operating in the digital world.
A)
reliability
B)
usability
C)
portability
D)
extensibility
E)
scalability
59)
The ability to adapt to increases or decreases in demand for processing or data
storage is known as ________.
A)
extensibility
B)
portability
C)
reliability
D)
scalability
E)
usability
60)
Using ________, multiple machines located at different locations and each with
its own applications can be configured to run on one single computer, enabling
the IT service providers to better utilize their resources.
A)
indemnification
B)
gentrification
C)
demutualization
D)
ramification
E)
virtualization
61)
Which of the following statements is true about the software as a service
model?
A)
The customer has no knowledge or control over the underlying infrastructure and
has only limited ability to control or configure application-specific settings.
B)
The customer has to manage the licenses for the operating systems being used.
C)
The customer can run his or her own applications that are typically designed
using tools provided by the service provider.
D)
The customer is provided with the basic capabilities of processing, storage,
and networking.
E)
The user has control over the applications but has limited or no control over
the underlying infrastructure.
62)
Which of the following statements is true about the platform as a service
model?
A)
The customer is provided with the basic capabilities of processing, storage,
and networking.
B)
The customer has no knowledge or control over the underlying infrastructure and
has only limited ability to control or configure application-specific settings.
C)
The customer can run his or her own applications that are typically designed
using tools provided by the service provider.
D)
The customer uses an application provided via a cloud infrastructure.
E)
The customer has to manage the licenses for the operating systems being used.
63)
Which of the following statements is true about the infrastructure as a service
model?
A)
The customer has to manage the licenses for the operating systems being used.
B)
The customer has no knowledge or control over the underlying infrastructure and
has only limited ability to control or configure application-specific settings.
C)
The customer can run his or her own applications that are typically designed
using tools provided by the service provider.
D)
The customer uses an application provided via a cloud infrastructure.
E)
The user has control over the applications but has limited or no control over
the underlying infrastructure.
64)
Which of the following statements is true about a public cloud?
A)
It gives the organization a high degree of customizability over their data and
applications.
B)
It can be used by any interested party on a pay-per-use basis.
C)
It is internal to an organization.
D)
It does not free an organization from the issues associated with managing the
cloud infrastructure.
E)
It gives the organization a high degree of control over their data and
applications.
65)
EasyQuery is a knowledge management company that is contemplating a partnership
with Kasko, a cloud service provider. The management of EasyQuery is
particularly concerned about Kasko's viability and will start a partnership
only when it is sure that Kasko meets this criteria. Assume that viability is
the only criteria that a cloud service provider needs to meet. If EasyQuery
enters into a partnership with Kasko, it means that ________.
A)
Kasko can meet EasyQuery's current and future business needs
B)
Kasko has long-term sustainability
C)
Kasko offers other services that EasyQuery would require in the future
D)
Kasko will protect the privacy of customers
E)
Kasko will provide sufficient bandwidth to access large amounts of data
66)
________ is used to solve large-scale computing problems.
A)
Trusted computing
B)
Edge computing
C)
IP convergence
D)
Grid computing
E)
Distributed computing
67)
________ is used to increase Web application performance.
A)
Trusted computing
B)
Distributed computing
C)
Edge computing
D)
IP convergence
E)
Green computing
68)
________ is used to transmit voice and video communication over the Internet.
A)
Edge computing
B)
IP convergence
C)
Distributed computing
D)
Green computing
E)
Trusted computing
69)
ImmuneEarth, a research and development company, has a motto to "eradicate
all diseases." It has numerous departments that research the cure of
various diseases. One of its largest departments include the AIDS department
where more than 500 scientists are researching the cure for AIDS. ImmuneEarth
has numerous computers that have been grouped into a cohesive system for this
purpose. Recently, one of its computers was updated because it had low performance
which had slowed the entire system. Which of the following is ImmuneEarth using
to research the cure for AIDS?
A)
grid computing
B)
cloud computing
C)
trusted computing
D)
edge computing
E)
IP convergence
70)
Which of the following differentiates grid computing from cloud computing?
A)
Grid computing uses a large number of computers.
B)
Grid computing is a natural evolution of the widespread adoption of
virtualization and utility computing.
C)
Grid computing is applied to a single large problem.
D)
Grid computing involves over-the-Internet provision of dynamically scalable and
often virtualized resources.
E)
Grid computing is a model for enabling convenient, on-demand network access to
a shared pool of configurable computing resources.
71)
In grid computing, the slowest computer creates a bottleneck and slows down the
entire grid. A ________ can help overcome these problems.
A)
trusted grid
B)
edged grid
C)
clustered grid
D)
dedicated grid
E)
parallel grid
72)
________ has allowed enterprises to make use of new forms of communication and
collaboration, as well as traditional forms of communication, at much lower
costs.
A)
Grid computing
B)
Green computing
C)
IP convergence
D)
Edge computing
E)
Trusted computing
Technology
Briefing: Foundations of Information Systems Infrastructure
Hardware
and Software
1)
Which of the following input technologies has been historically used for
entering text and numbers on computers?
A)
graphics tablet
B)
QWERTY keyboard
C)
optical mouse
D)
scanner
E)
joystick
2)
Which of the following selecting and pointing devices is used to simulate the
process of drawing or sketching on a sheet of paper?
A)
eye-tracking device
B)
joystick
C)
optical mouse
D)
graphics tablet
E)
ergonomic keyboard
3)
The ________ is an innovative pointing device developed primarily for the
disabled for help with computer pointing.
A)
eye-tracking device
B)
graphics tablet
C)
optical mouse
D)
joystick
E)
touch screen
4)
Which of the following pointing devices works by moving a small lever that sits
in a holder?
A)
QWERTY keyboard
B)
optical mouse
C)
trackball
D)
touch screen
E)
joystick
5)
Entering a large number of separate forms or documents into a computer system
and manipulating this data at a single time is referred to as ________.
A)
cluster analysis
B)
data mining
C)
batch processing
D)
sequential coupling
E)
line coding
6)
Which of the following types of specialized scanners is used to scan
questionnaires and test answer forms where answer choices are indicated by
filling in circles using pencils or pens?
A)
optical mark recognition
B)
biometric scanner
C)
bar code reader
D)
magnetic ink character recognition
E)
optical character recognition
7)
________ is a scanning technology used to read and digitize typewritten,
computer-printed, and even handwritten characters such as those on sales tags on
department store merchandise, patient information in hospitals, or the address
information on a piece of postal mail.
A)
Magnetic ink character recognition
B)
Optical mark recognition
C)
Biometric scanning
D)
Optical character recognition
E)
Batch processing
8)
Which of the following scanning technologies is used by the banking industry to
read data, account numbers, bank codes, and check numbers on preprinted checks?
A)
optical mark recognition
B)
bar code reading
C)
magnetic ink character recognition
D)
biometric scanning
E)
optical character recognition
9)
Which of the following specialized scanners is used to scan human body
characteristics for identification and security purposes?
A)
biometric scanner
B)
optical scanner
C)
bar code scanner
D)
smart card scanner
E)
port scanner
10)
Which of the following speech recognition-based technologies is used for
telephone surveys and to guide customers through the various menu options when
calling a company's customer service line?
A)
transcription
B)
telemetrics
C)
speaker diarization
D)
interactive voice response
E)
computer-aided translation
11)
Which of the following statements accurately describes the difference between
digital and film-based cameras?
A)
High-quality digital cameras are generally less expensive than film-based
cameras.
B)
The storage capacity of film-based cameras depends on picture resolution, while
digital cameras offer consistent storage capacity.
C)
Digital cameras record still images or short video clips in digital form on
small, removable memory cards rather than on film.
D)
Film-based cameras offer video recording facilities, while digital cameras are
specialized for still photography.
E)
Digital cameras must
record images by using a scanner, while film-based cameras do not offer that
functionality.
12)
________ are represented as a
series of ones and zeros and are used to relay data and instructions to and
from the central processing unit (CPU) of a computer.
A)
Binary codes
B)
Morse codes
C)
Protocols
D)
Hexadecimal codes
E)
Octal codes
13)
Which of the following character encoding formats, based on the English
alphabet, represents symbols in binary form?
A)
MIME
B)
ASCII
C)
UTF
D)
UCS
E)
MAC OS Roman
14)
Which of the following encoding formats is the standard coding for e-mail over
the Internet?
A)
ACSII
B)
UTF
C)
MIME
D)
UCS
E)
MAC OS Roman
15)
Which of the following encoding formats has become an industry standard that
was designed to allow symbols from all languages, including Arabic and Chinese?
A)
ASCII
B)
MIME
C)
MAC OS Roman
D)
EBCDIC
E)
UTF
16)
Which of the following is considered as the heart of a computer's system unit?
A)
motherboard
B)
random access memory (RAM)
C)
hard drive
D)
central processing unit (CPU)
E)
read-only memory (ROM)
17)
The electronic circuit that generates pulses at a rapid rate to set the pace
for processing events to take place within a computer is known as the ________.
A)
peripheral port
B)
motherboard
C)
system clock
D)
universal serial bus
E)
system board
18)
In microcomputers, the processor's clock speed is measured in ________.
A)
hertz
B)
milliseconds
C)
angstrom
D)
amperes
E)
nanoseconds
19)
A ________ is a small block of memory used by processors to store those
instructions most recently or most often used.
A)
random access memory
B)
BIOS
C)
cache
D)
read-only memory
E)
flash memory
20)
________ is used to store programs and instructions that are automatically
loaded when the computer is turned on.
A)
Random access memory
B)
Cache memory
C)
Read-only memory
D)
Flash memory
E)
Virtual memory
21)
Which of the following is an example of secondary storage?
A)
cache memory
B)
read-only memory
C)
hard disk drives
D)
random access memory
E)
virtual memory
22)
________ is a technology in which extra copies of data are stored on two or
more hard drives to ensure that critical data is not lost.
A)
JBOD
B)
RAID
C)
SLED
D)
BIOS
E)
SPAN
23)
A(n) ________ occurs if a read/write head for some reason touches one of the
disks in a hard drive, leading to a loss of data.
A)
head crash
B)
click of death
C)
bad sector
D)
disk compression
E)
base isolation
24)
Which of the following is a secondary storage technology that uses microchips
to store information?
A)
cache memory
B)
virtual memory
C)
redundant array of independent disks
D)
solid state drive
E)
read-only memory
25)
Which of the following is a valid observation regarding the difference between
solid state drives and hard disk-based drives?
A)
Hard disk drives are typically faster than solid state drives.
B)
Solid state drives have no moving parts, while hard disk drives have both
electronic and mechanical parts.
C)
Solid state drives are louder and less reliable than hard disk drives.
D)
Hard disk drives are more expensive than solid state drives.
E)
Hard disk drives use microchips to store data, while solid state drives use
magnetic disks.
26)
Data stored on disks is easier and faster to locate than data on magnetic tapes
because ________.
A)
the data on disks is stored in binary form
B)
disks have larger and
more efficient storage capacities
C)
disks have both mechanical and electronic parts
D)
magnetic tapes store data in tiny magnetic spots
E)
computers do not have to scan an entire tape to find a specific data file
27)
A(n) ________ provides a hardware interface, such as plugs and sockets, for
connecting to computers.
A)
input device
B)
Universal Serial Bus
C)
removable storage device
D)
motherboard
E)
port
28)
Which of the following types of ports is used to transfer one bit at a time and
hence, has the slowest data transfer rates?
A)
USB port
B)
parallel port
C)
IEEE 1394 port
D)
serial port
E)
ethernet port
29)
Which of the following types of ports used to connect networks, is the most
common standard for local area networks?
A)
ethernet port
B)
VGA port
C)
serial port
D)
parallel port
E)
USB port
30)
Which of the following types of ports is used to connect printers to computers?
A)
serial ports
B)
HDMI ports
C)
parallel ports
D)
ethernet ports
E)
VGA ports
31)
Which of the following types of ports is used to connect digital disks and
camcorders to computers?
A)
IEEE 1394 port
B)
Ethernet
C)
DVI port
D)
VGA port
E)
HDMI port
32)
Which of the following is a multiuser, multitasking operating system that is
available for a wide variety of computer platforms, and is commonly used
because of its superior security?
A)
Android
B)
iOS
C)
Windows
D)
Unix
E)
OS/390
33)
Which of the following operating systems was the first commercial
graphical-based operating system, which made its debut in 1984?
A)
Mac OS
B)
Linux
C)
Windows
D)
Unix
E)
OS/390
34)
Google's Linux-based operating system for mobile devices is known as ________.
A)
iOS
B)
Symbian
C)
Java
D)
Bada
E)
Android
35)
Which of the following is an operating system designed for mobile devices,
jointly developed by Nokia, Ericsson, and Psion?
A)
Linux
B)
iOS
C)
Symbian OS
D)
Android
E)
Mac OS
36)
Which of the following types of computer software utilities is used to archive
files from hard disks to tapes, flash drives, or other storage devices?
A)
data compression
B)
file defragmentation
C)
disk and data recovery
D)
backup
E)
device drivers
37)
Which of the following types of computer software utilities allows more data to
be stored on a disk by substituting short code for frequently repeated patterns
of data, allowing more data to be stored on a disk?
A)
file defragmentation
B)
data compression
C)
device drivers
D)
file conversion
E)
disk and data recovery
38)
Which of the following types of computer software utilities monitors users' incoming
e-mail messages and filters unwanted messages from arriving?
A)
spam blockers
B)
antivirus
C)
spyware detection and removal
D)
disk and data recovery
E)
data compression
39)
Which of the following types of computer software utilities transfers a file
from one format to another so that it can be used by an application other than
the one used to create it?
A)
file conversion
B)
data compression
C)
backup
D)
file defragmentation
E)
device drivers
40)
Which of the following is an example of a word processing software?
A)
Microsoft Outlook
B)
Opera Presto
C)
Apple Keynote
D)
Lotus Notes
E)
OpenOffice Writer
41)
Which of the following is an example of presentation software?
A)
Mozilla Thunderbird
B)
Microsoft Excel
C)
Lotus Notes
D)
Apple Keynote
E)
ACT!
42)
Microsoft Access is an example of ________.
A)
word processing software
B)
database management software
C)
presentation software
D)
calendar and contact management software
E)
Web browsers
43)
A(n) ________ is a type of program that translates a program's source code into
machine language and executes one statement at a time.
A)
compiler
B)
disassembler
C)
interpreter
D)
executable
E)
linker
44)
Which of the following statements accurately reflects a difference between
compilers and interpreters?
A)
Interpreters translate assembly language to machine language, while compilers
translate machine language to assembly language.
B)
Compilers convert a program's entire source code into an executable, while
interpreters translate source code one statement at a time.
C)
Compiled programs run much slower than interpreted programs.
D)
Compiling programs is a slower process compared to their execution, while with
interpreters, the translation and execution happens concurrently.
E)
Compared to interpreters, it is easier to quickly evaluate the effects of any
changes made to a program's source code when using a compiler.
45)
Which of the following is the most widely used language for developing Web
pages?
A)
C/C++
B)
Java
C)
LISP
D)
HTML
E)
.NET
46)
LISP is a programming language that finds application in ________.
A)
business
B)
scientific research
C)
artificial intelligence
D)
teaching structured programming
E)
developing Web pages
47)
________ languages use common modules which combine properties and behaviors to
define the relevant system components.
A)
Object-oriented
B)
Markup
C)
Structured query
D)
Metaprogramming
E)
Synchronous
48)
Which of the following object-oriented programming concepts uses modules that
allow programmers to group properties and behavior together?
A)
encapsulation
B)
inheritance
C)
class
D)
polymorphism
E)
abstraction
49)
Which of the following object-oriented programming concepts is reflected by a
word processor that reacts to a user's typing and clicking?
A)
inheritance
B)
event-driven program execution
C)
encapsulation
D)
class
E)
delegation
50)
Which of the following programming languages allows programmers to easily add a
command button to a screen with a few clicks of a mouse instead of programming
the button pixel by pixel and using many lines of code?
A)
object-oriented languages
B)
Web development languages
C)
visual programming languages
D)
scripting languages
E)
prototype-based programming languages
51)
Which of the following is an example of a visual programming language?
A)
VB.NET
B)
Java
C)
HTML
D)
Microsoft.NET
E)
XML
52)
Which of the following is an example of an HTML editor?
A)
Microsoft Expression Web
B)
Adobe Acrobat Reader
C)
Apple Keynote
D)
OpenOffice Base
E)
Harvard Graphics
53)
Which of the following HTML tags sets off the visible portion of the HTML
document?
A)
<html> . . . </html>
B)
<head> . . . </head>
C)
<body> . . . </body>
D)
<table> . . . </table>
E)
<link> . . . </link>
54)
Which of the following HTML tags is used to create a hyperlink?
A)
<html> . . . </html>
B)
<head> . . . </head>
C)
<body> . . . </body>
D)
<object> . . . </object>
E)
<a href="URL"> . . . </a>
55)
What is the function of markup languages such as HTML?
A)
adding dynamic content to Web pages
B)
developing applications in high-speed arcade graphics
C)
checking the accuracy of user-entered information on Web pages
D)
supplying interactive components to Web pages
E)
laying out or formatting Web pages
56)
________, a programming language developed by Sun Microsystems in the early 1990s,
is used to add dynamic content to Web pages.
A)
HTML
B)
Visual Basic
C)
Java
D)
XML
E)
PHP
57)
________ is a programming platform that is used to develop applications that
are highly interoperable across a variety of platforms and devices.
A)
Adobe Dreamweaver
B)
Microsoft Expression Web
C)
HTML
D)
PHP
E)
Microsoft.NET
58)
Which of the following is used by Web services to support the interoperability
between machines?
A)
XML
B)
PHP
C)
HTML
D)
MySQL
E)
Adobe Flash
59)
Which of the following purposes was XML designed to serve?
A)
adding dynamic content to Web pages
B)
building database queries
C)
developing applications in high-speed arcade graphics
D)
checking the accuracy of user-entered information on Web pages
E)
supplying interactive components to Web pages
60)
Which of the following functions do scripting languages perform?
A)
creating animation and video that can be compressed small enough for fast
download speeds
B)
developing applications in high-speed arcade graphics
C)
checking the accuracy of user-entered information on Web pages
D)
automating or supporting activities throughout the information systems
development process
E)
laying out or formatting Web pages
61)
Which of the following statements reflects the difference between Java and JavaScript
most accurately?
A)
Java can be used across multiple platforms and operating systems, while
JavaScript cannot be used similarly.
B)
JavaScript is used to check accuracy of user-entered information, which Java
does not support.
C)
Java is used to supply interactive components to Web pages, while JavaScript is
not.
D)
JavaScript can be used as a useful component tool for creating Web pages, while
Java is not used to create Web pages.
E)
Java allows users to create or add applets that lend dynamic content to Web
pages, while JavaScript does not.
62)
Which of the following software tools allows developers to create animation and
video that can be compressed small enough for fast download speeds?
A)
Adobe Flash
B)
MySQL
C)
PHP
D)
HTML
E)
XML
63)
Which of the following computer-aided software engineering (CASE) tools enable
system process, data, and control structures to be represented
diagrammatically?
A)
repositories
B)
code generators
C)
diagramming tools
D)
screen and report generators
E)
analysis tools
64)
Which of the following matches the description of screen and report generators?
A)
tools that enable system process, data, and control structures to be
represented graphically
B)
tools that automatically check for incomplete, inconsistent, or incorrect
specifications in diagrams, screens, and reports
C)
tools that help produce both technical and user documentation in standard
formats
D)
tools that make it easier for the systems analyst to identify data requirements
and relationships and also help model how systems look and feel to users
E)
tools that enable the automatic generation of program and database definition
code directly from the design documents, diagrams, screens, and reports
65)
________ are CASE tools that enable the integrated storage of specifications,
diagrams, reports, and project management information.
A)
Repositories
B)
Analysis tools
C)
Code generators
D)
Diagramming tools
E)
Documentation generators
66)
Which of the following is an example of an open source Web server software that
provides access to Web sites?
A)
Ubuntu Linux
B)
GRASS GIS
C)
Mozilla Firefox
D)
MySQL
E)
Apache
67)
MySQL is a(n) ________.
A)
proprietary application development suite
B)
open source software for accessing and maintaining data in a database
C)
proprietary software that operates the hardware on mainframe computers
D)
open source software used to provide users access to Web sites
E)
automated software tool suite used by systems developers to design and
implement information systems