QUESTION
Exam 1
Question
1. Question : Which of the following ratios has fallen as a result of Moore’s
Law?
Price/performance
Demand/supply
Profit/loss
Debt/equity
Question
2. Question : You have a spreadsheet that provides the airfares to different
cities from Chicago. If the contents of the spreadsheet are used to make a
decision, it will be considered:
knowledge.
data.
information.
intuition.
Question
3. Question : Which of the following is categorized as a non-routine cognitive
skill?
Computer
programming
Marketing
knowledge
Tax
accounting
Systems
thinking
Question
4. Question : Which of the following statements is true of data characteristics
in the context of information systems?
Data
generated should be in excess of what is required.
An appropriate
relationship should exist between the cost of data and its value.
Data
should be relevant to the context, not necessarily to the subject.
Freely
available data is always accurate and timely.
Question
5. Question : Melissa wants to create a password. Which of the following is the
strongest password that she could use?
Melissa@123
Melissa@Melissa
NewYork
NOOCSmyPw$42
Question
6. Question : Meredith constantly analyzes her work in terms of her individual
contribution that she makes to the overall output of the organization. This
shows her ________ skills.
collaboration
experimentation
systems
thinking
problem-solving
Question
7. Question : ________ states that the number of transistors per square inch on
an integrated chip doubles every 18 months.
Nielsen’s
Law
Faraday’s
Law
Moore’s
Law
Newton’s
Law
Question
8. Question : Graham & Hilda Corp. is a firm that offers enterprise
software solutions to independent retailers. The firm recently entered into a
contract with a major national retail chain to develop and implement
proprietary software that tracks inventory, restocking, and supplier
information. Which of the following actions will be most difficult to perform
when implementing the new information system?
Upgrading
the computer systems used by the retail chain
Writing
the programs to create the software
Changing
the structure of existing databases that reflect supplier and customer data
Training
the employees to use and manage the new system
Question
9. Question : An automobile company decides to improve the quality of all its
products and bring more variety into its product line. The company has decided
to adopt:
focused
cost leadership.
industry-wide
differentiation.
industry-wide
cost leadership.
focused
differentiation.
Question
10. Question : According to Porter’s five forces model, in which of the
following situations would a supplier have the highest bargaining power?
A
Houston-based vendor is the only supplier of a patented material for many
smartphone manufacturers
A
fashion brand’s outlet catering to a niche market
A
restaurant that serves only army veterans
A
large retailer buying finished goods from many small suppliers
Question
11. Question : FunText is a company that owns an app used for text messaging.
It recently offered a membership extension of six months without any additional
charges to its existing customers who had registered for a three-year
membership. By doing this, which competitive strategy did FunText implement?
Creation
of a new service
Product
differentiation
Locking
in customers
Locking
in suppliers
Question
12. Question : Which of the following statements is consistent with the central
idea of business process design?
Technology
should be used to supplement the existing value chain.
Business
processes should not focus on the core competencies of organizations.
Organizations
should create new business processes rather than improve existing systems.
Technology
should be used to modify and improve standard business processes.
Question
13. Question : Bargaining power of customers is likely to be the highest for
markets involving:
limited
edition apparel.
industrial
products.
patented
drugs.
vintage
cars.
Question
14. Question : Locking in customers by making it difficult or expensive for
customers to move to another product is called establishing high:
entry
barriers.
switching
costs.
product
standards.
value
differentiation.
Question
15. Question : A(n) ________ is a network of activities that generate value by
transforming inputs into outputs.
business
process
competitive
strategy
linkage
information
system
Question
16. Question : Focused cost leadership is observed when a product has the
lowest cost:
within
an industry segment.
across
the product range offered by a company.
within
an industry.
within
the supply chain of a company.
Question
17. Question : Which of the following statements is true of closed-source
projects?
Only
users and developers are allowed to alter the source code in closed-source
projects.
Anyone
can obtain the source code for a closed-source project.
Only
trusted programmers are allowed to make changes to a closed-source project.
Programmers
can alter the closed-source code based on their interests and goals.
Question
18. Question : Which of the following refers to server virtualization?
A
personal computer, such as a desktop or portable computer, that hosts several
different operating systems
A
server computer that hosts one, or more, other server computers
A
storage area that loses its contents when the power is off
A
server that hosts many versions of desktop operating systems
Question
19. Question : Thin-client applications are developed using:
HTML5.
Java.
Objective-C.
C#.
Question
20. Question : ________ refers to data delivered to the user at the precise
moment it is needed.
Asynchronous
data
Just-in-time
data
Source
code
Payload
Question
21. Question : The CPU stores results of computations in the:
joystick.
main
memory.
printer.
barcode
scanner.
Question
22. Question : 10 TB is equivalent to ________ gigabytes.
10,240
1,000
1,024
102.4
Question
23. Question : Android applications are developed using:
Objective-C.
C#.
Java.
VB.Net.
Question
24. Question : Which of the following is an example of storage hardware in
computers?
Plotter
Magnetic
disk
Projector
Inkjet
printer
Question
25. Question : Each entity in a database has a unique attribute called a(n)
________.
public
key
identifier
foreign
key
index
field
Question
26. Question : __________ is the first step in transforming a data model into a
relational database design.
Representing
the data relationships
Normalizing
the data and files
Creating
foreign keys
Creating
a table for each entity
Question
27. Question : In a database, when data items disagree with one another, it
leads to a(n):
data
integrity problem.
crow’s-foot
paradigm.
adaptation
conflict.
lost-update
problem.
Question
28. Question : Identify the type of task that a database administrator is
performing when validating the data model to be used in a database management
system.
Development
Adaptation
Backup
and recovery
Operation
Question
29. Question : Which of the following database administration tasks is related
to adaptation?
Monitoring
backup procedures
Conducting
training for users
Monitoring
database performance
Managing
configuration changes in systems
Question
30. Question : An administrator should create a ________ before developing a
database design.
data
aggregator
query
model
data
model
data
application
Question
31. Question : Brad, a project manager, wants to build a database to integrate
information about employees and tasks that they handle. Brad wants to track
information such as task name, percentage completed, and employee name. These
aspects that Brad wants to track are called:
identifiers.
records.
primary
keys.
entities.
Question
32. Question : Which of the following is an example of a database management
system?
MS
Excel
BigData
NoSQL
Access
Question
33. Question : Communications speeds are expressed in:
bits.
bytes.
hertz.
packets.
Question
34. Question : Which of the following is a characteristic of in-house hosting?
Speedy
development
Superior
adaptability to fluctuating demand
Control
of data location
Possibly
the best disaster preparedness
Question
35. Question : ________ signals do not interfere with TV signals, even though
they use the same lines.
DSL
Dial-up
Cable
ADSL
Question
36. Question : Which of the following statements is true about IEEE 802.3?
It
is the protocol for wireless LAN connections.
It
is the protocol for Bluetooth.
It
is the protocol for wired LAN connections.
It
is the universal standard protocol for all WAN connections.
Question
37. Question : Which of the following is an example of IaaS?
Apple
iCloud
Microsoft
Azure
Office
365
Amazon
S3
Question
38. Question : To enable a seamless flow of data across the networks that comprise
an internet, an elaborate scheme called a ________ is used.
layered
protocol
virtual
private network
three-tier
system
remote
access system
Question
39. Question : A(n) ________ is a number that identifies a particular device.
domain
IP
address
hyperlink
href
Question
40. Question : Rackspace is an example of:
SaaS.
PaaS.
IaaS.
VPN.
Question
41. Question : A private internet that is used exclusively within an
organization is called a(n)
Ethernet.
intranet.
cloud.
server.
Question
42. Question : Which phase of the customer life cycle focuses on increasing the
value of existing customers by selling them more product?
Marketing
Customer
acquisition
Relationship
management
Loss/churn
Question
43. Question : ________ is the activity of altering existing and designing new
business processes to take advantage of new information systems.
Business
process modeling
Business
process reengineering
Business
process outsourcing
Enterprise
resource planning
Question
44. Question : ________ is a measure of the ratio of process outputs to inputs.
Process
effectiveness
Process
efficiency
Process
conformance
Process
reliability
Question
45. Question : When an organization has inconsistent duplicated data, it is
said to have a problem of:
information
silo.
data
integrity.
error
of omission.
data
segregation.
Question
46. Question : Which of the following workgroup processes is related to
manufacturing?
Order
entry and tracking
Finished
goods inventory management
Product
and brand management
Planning
and scheduling
Question
47. Question : Which of the following information systems minimizes data
duplication among departments?
Departmental
information systems
Workgroup
information systems
Personal
information systems
Enterprise
information systems
Question
48. Question : The two dimensions of process quality are:
efficiency
and effectiveness.
performance
and reliability.
conformance
and durability.
perception
and serviceability.
Question
49. Question : Which of the following workgroup processes is related to
customer service?
Assessment
Account
tracking
Sales
forecasting
Accounts
payable
Question
50. Question : Which of the following workgroup processes is related to
operations?
Account
updating and tracking
Sales
forecasting
Finished
goods inventory management
Treasury
and account management
Exam 2
Question
1. Web 2.0 refers to Web-delivered services and content paid for by:
SM
sponsors.
users.
advertisers.
investors.
Question
2. Question : Which of the following statements is true of social CRM?
Customers
likely to generate the most business get the most attention from the
organization.
All
the customer relationship processes in social CRM are structured and
controlled.
Each
customer crafts his or her own relationship with the company.
Though
relationships emerge from joint activity, companies control the customers.
Question
3. Question : When a student attends a business function for the purpose of
meeting people and reinforcing relationships, he or she is investing in his or
her:
human
capital.
process
capital.
social
capital.
structural
capital.
Question
4. Question : A group considers Twitter to be far superior to Facebook and
attempts to convince others that this is true. When confronted with contrary
evidence, the group members do not change their opinion. According to Gossieaux
and Moran, which of the following kinds of communities is most likely being
illustrated in the given scenario?
Defenders
of belief
Seekers
of the truth
Proprietary
community
Gated
community
Question
5. Question : The primary risk of peer-to-peer support in the context of social
media and customer service is:
loss
of control.
loss
of credibility.
lack
of privacy.
increase
in expenses.
Question
6. Question : Social capital, unlike traditional capital:
appreciates
with time and never depreciates.
depreciates
with time and never appreciates.
sometimes
depreciates and at other times appreciates with time.
remains
constant with time.
Question
7. Question : According to the SEAMS dynamic process, which of the following
activities is most likely to involve the identification of important
communities, what they do, where they hang out, what they care about, and how
organizations relate to them?
Sensing
Engaging
Activating
Measuring
Question
8. Question : Enterprise 2.0 workers want applications to enable them to rate
tagged content and to use the tags to predict content that will be of interest
to them, a process McAfee refers to as:
links.
authoring.
signals.
extensions.
Question
9. Question : In McAfee’s SLATES Enterprise 2.0 model, “A” stands
for:
auditing.
alerts.
authoring.
announcements.
Question
10. Question : ________, which refers to the matter in an SM site that is
contributed by nonemployee site visitors, is the essence of SM relationships.
User-generated
content
Folksonomy
Secondary
data
Continuous
data
Question
11. Question : ________ measures the frequency that someone who clicks on an ad
makes a purchase, “Likes” a site, or takes some other action desired
by the advertiser.
Pay-per-click
Conversion
rate
Folksonomy
Enterprise
2.0
Question
12. Question : Which of the following revenue models is most likely followed by
companies providing Web 2.0 services?
Traditional
marketing
Pay-per-click
User
participation
Venture
capital
Question
13. Question : According to Gossieaux and Moran, which of the following
observations is true about a hyper-social organization?
It
uses social media in an organization-centric manner.
It
creates relationships in which only one of the parties perceives and gains
value.
It
is characterized by a transformation of thinking from market segments to
tribes.
It
is an organization that transitions from a dynamic process to a structured one.
Question
14. Question : The storage of ________ differentiates SMIS from Web site
applications.
secondary
data
content
data
connection
data
continuous
data
Question
15. Question : According to Gossieaux and Moran, which of the following
statements is true of defenders-of-belief communities?
They
are open to changing their beliefs when confronted with contrary evidence.
They
are very effective for activities that involve innovation or problem solving.
They
make ineffective sales and marketing professionals.
They
seek conformity and want to convince others of the wisdom of their beliefs.
Question
16. Question : A ________ is a person who is well versed in an organization’s
strategy and focuses on ensuring that business processes and information
systems meet the organization’s competitive strategies.
business
analyst
business
application programmer
business
administrator
business
supervisor
Question
17. Question : In a business process, resources are:
people
or computer applications that are assigned to roles.
collections
of procedures and activities.
the
total number of points of work that can be accomplished in each scrum period.
collections
of related tasks that receive inputs and produce outputs.
Question
18. Question : According to Brooks’ Law, adding more people to a late project
will:
guarantee
efficiencies.
speed
up the project.
create
diseconomies of scale.
reduce
the need for coordination.
Question
19. Question : Organizational feasibility assesses:
the
organization’s budget and schedule requirements.
the
competitor’s business process model.
whether
the organization has the technical infrastructure to implement the new system.
whether
the new system fits within the organization’s customs or legal requirements.
Question
20. Question : In a business process, ________ are defined as collections of
related tasks that receive inputs and produce outputs.
activities
databases
resources
presentations
Question
21. Question : In a business process, an inventory or a database is an example
of a:
decision
tree.
repository.
botnet.
cookie.
Question
22. Question : A ________ is a sequence of activities that determine the
earliest date by which a project can be completed.
Venn
diagram
Pareto
chart
critical
path
scatter
plot
Question
23. Question : According to the scrum process, once the tasks are known for a
given set of requirements, the next step is to assign each task a difficulty
score, called:
scrums.
points.
grades.
tallies.
Question
24. Question : In Business Process Modeling Notation (BPMN) diagrams, a square
with a plus sign means that:
a
question can be answered with no.
it
is the end of the process.
a
question can be answered with yes.
an
activity is considered to be a subprocess of a process.
Question
25. Question : During the system implementation phase of the SDLC, once a system
has passed testing, the organization installs the new system. Which of the
following terms is used to refer to this activity?
Beta
testing
System
conversion
Agile
development
System
control
Question
26. Question : During the requirements definition stage of developing an
information system, the project team will consist mostly of:
programmers
and testers.
testers
and business users.
business
and systems analysts.
database
designers and administrators.
Question
27. Question : The term ________ refers to a set of management policies,
practices, and tools that developers use to maintain control over the SDLC
project’s resources.
swim-lane
layout
trade-off
transmission
control protocol
configuration
control
Question
28. Question : Which of the following phases of the SDLC include identifying
what is to be produced, how frequently, and how fast it is to be produced?
Requirements
analysis
System
implementation
Component
design
System
definition
Question
29. Question : The project plan which results from defining the system is the
input to ________, which is the second phase of the SDLC.
system
design
system
implementation
requirements
analysis
system
maintenance
Question
30. Question : Which of the following are the four dimensions of feasibility?
Planning,
process, technical, and schedule feasibility
Operational,
strategic, technical, and tactical feasibility
Cost,
schedule, technical, and organizational feasibility
Schedule,
process, technical, and competitive feasibility
Question
31. Question : Firewalls produce ________ which include lists of all dropped
packets, infiltration attempts, and unauthorized access attempts from within
the firewall.
honeypots
blogs
activity
logs
RSS
feeds
Question
32. Question : Key escrow is a(n):
protocol
used to secure communication over the internet.
safety
procedure that allows a trusted party to have a copy of the encryption key.
device
that prevents unauthorized network access.
encryption
algorithm that uses both public and private keys.
Question
33. Question : Secure Socket Layer is also known as:
application
layer.
transport
layer security.
presentation
layer.
network
interface layer security.
Question
34. Question : Which of the following is classified as a technical safeguard?
Cookies
Firewalls
Key
escrow
Passwords
Question
35. Question : Which of the following statements is true of the Secure Socket
Layer (SSL)?
It
uses asymmetric encryption exclusively.
It
is used to send sensitive data such as credit card numbers.
It
uses one set of encryption keys for multiple sessions.
It
is a stronger version of HTTPS.
Question
36. Question : A virus is a computer program that replicates itself. The
program code that causes unwanted activity is called the:
payload.
kernel.
bot
herder.
key
escrow.
Question
37. Question : ________ is a function pertaining to a particular database that develops
procedures and practices to control and protect the database.
Data
encryption
Database
administration
Data
authentication
Database
normalization
Question
38. Question : ________ refers to an organization-wide function that is in
charge of developing data policies and enforcing data standards.
Data
administration
Authentication
Usurpation
Data
encryption
Question
39. Question : Packet-filtering firewalls:
can
filter both inbound and outbound traffic.
examine
the destination address but not the source address.
are
the most complex type of firewall.
seldom
examine the data or the addresses of the message.
Question
40. Question : Which of the following is an example of a sniffing technique?
IP
spoofing
Caches
Denial
of service
Adware
Question
41. Question : ________ is a technique for intercepting computer
communications, either through a physical connection to a network or without a
physical connection in the case of wireless networks.
Spoofing
Phishing
Sniffing
Pretexting
Question
42. Question : Which of the following systems procedures is specifically the
responsibility of operations personnel?
Writing
software program codes
Using
systems to perform job tasks
Creating
back up of system databases
Knowing
whom to contact when a security breach occurs
Question
43. Question : ________ occurs through human error when employees do not follow
proper procedures or when procedures have not been well designed.
Unauthorized
data disclosure
Incorrect
data modification
Denial
of service
Loss
of infrastructure
Question
44. Question : A(n) ________ has a microchip in it to hold data.
ATM
card
smart
card
cookie
key
escrow
Question
45. Question : In information security, which of the following is true of
managing risk?
All
organizations except financial institutions should invest heavily in security
safeguards.
Organizations
should implement safeguards that balance the trade-off between risk and cost.
Passwords
are classified under the technical safeguards category.
Physical
security is classified under the human safeguards category.
Question
46. Question : When a firm is localizing a computer program, which of the
following should it avoid?
Translating
the user interface
Retaining
forms and reports that have labels
Adjusting
the sorting order for different character sets
Redrawing
and translating diagrams
Question
47. Question : A ________ is a network of organizations and facilities that
transforms raw materials into products delivered to customers.
legacy
system
flat
organization
shell
corporation
supply
chain
Question
48. Question : Which of the following best describes the bullwhip effect?
The
value of a telecommunications network is proportional to the square of the
number of users connected to the system.
The
performance improvement to be gained from using some faster mode of execution
is limited by the fraction of the time the faster mode can be used.
The
variability in the size and timing of orders increases at each stage up the
supply chain, from customer to supplier.
Improvements
in technology lead to new applications, which result in new markets and
industries.
Question
49. Question : Which of the following statements is true of global databases?
A
single database increases data integrity problems.
A
single database makes it possible to have an integrated view of the operations
of an organization.
When
using a single database to process data, data transmission speeds are extremely
high.
The
processing of a single database that resides in a single location is referred
to as distributed database processing.
Question
50. Question : Enterprise systems, such as ERP, solve the problems of data
isolation by integrating data into a database that provides a comprehensive and
organization-wide view. This would require:
all
processes to be located in the same geographical place.
the
company to standardize on a single language.
backshoring
processes to the home country.
the
company to customize its product offerings.
Exam 3
Question
1. Which of the following ways would à /100 – 73 be represented in an Excel
spreadsheet?
10(2)
* 5(3) / 100 ^ 73
10(2)
^ 5(3) / 100 – 73
10^2
* 5^3 / 100 – 73
10*2
^ 5*3 / 100 – 73
Question
2. Question : Monte Carlo sampling differs from Latin Hypercube sampling in
that the Monte Carlo sampling:
results
in a more even distribution of output values.
uses
the entire range of the distribution in a more consistent manner.
selects
random variates independently over the entire range of possible values of the
distribution.
uses
an uncertain variable whose probability distribution is divided into intervals
of equal probability.
Question
3. Question : Which of the following inputs of a decision model is an example
of data?
Estimated
consumer demand
Inflation
rates
Costs
Investment
allocations
Question
4. Question : Descriptive decision models:
aim
to predict what will happen in the future.
do
not tell a manager what to do.
help
analyze the risks associated with various decisions.
do
not facilitate evaluation of different decisions.
Question
5. Question : Which of the following symbols is used to represent exponents in
Excel?
^
*
#
!
Question
6. Question : Following are the components of a data set containing purchase
details of a shoe manufacturing company. Identify the ratio data.
Item
Number
Rank
of suppliers
Item
cost
Arrival
Date
Question
7. Question : During which phase in problem solving is a formal model often
developed?
Analyzing
the problem
Structuring
the problem
Defining
the problem
Implementing
the solution
Question
8. Question : Which of the following is necessary to calculate the variable
cost of production for the company to develop a profit model?
Unit
sale price
Quantity
of item produced
Quantity
of item sold
Fixed
cost of production
Question
9. Question : When will a company use a predictive decision model?
When
it wishes to determine the best product pricing to maximize revenue.
When
it wishes to know how best to use advertising strategies to influence sales.
When
it wishes to know sales patterns to plan inventory levels.
When
it wishes to ensure that a specified level of customer service is achieved.
Question
10. Question : The demand for coffee beans over a period of three months has
been represented in the form of an L-shaped curve. Which form of model was used
here?
Mathematical
model
Visual
model
Kinesthetic
model
Verbal
model
Question
11. Question : Prescriptive decision models help:
Make
predictions of how demand is influenced by price.
Make
trade-offs between greater rewards and risks of potential losses.
Decision
makers identify the best solution to decision problems.
Describe
relationships and influence of various elements in the model.
Question
12. Question : The data mining approach called ________ involves the developing
of analytic models to describe the relationship between metrics that drive
business performance like profitability, customer satisfaction, or employee
satisfaction.
association
reduction
cause-and-effect
modeling
classification
Question
13. Question : In the cause-and-effect modeling, internal metrics, such as
employee satisfaction, productivity, and turnover are considered to be ________
measures.
logit
life
leading
lagging
Question
14. Question : In the ________ method, the distance between groups is defined
as the distance between the closest pair of objects, where only pairs
consisting of one object from each group are considered.
Ward’s
linkage clustering
single
linkage clustering
divisive
clustering
average
group linkage clustering
Question
15. Question : Which of the following is true of hierarchical clustering?
All
clusters must have the same number of data.
No
single cluster can have all objects
The
data are not partitioned into a particular cluster in a single step.
All
clusters must have more than one object in it.
Question
16. Question : Which of the following typically describes the support for the
association rule?
The
number of transactions that include all items that are in the antecedent parts
of the rule
The
number of transactions that include all items in the antecedent and consequent
parts of the rule
The
number of transactions that include half from the antecedent and half from the
consequent
The
number of transactions that include all items that are in the consequent parts
of the rule
Question
17. Question : Which of the following is true of cluster analysis?
It
is a cause-and-modeling type of analytic model.
It
does not provide a definitive answer from analyzing the data.
It
is primarily a prescriptive analytical method.
It
uses clustered data that are not affected by the specific method used.
Question
18. Question : Sendstars is a package delivering company that recently made a
study on its customer retention and service renewal metrics. They found that
most customers defected from using Sendstars’ services due to customer
dissatisfaction stemming from delivery personnel being rude or ill-mannered. To
curb this issue, Sendstars gave special training to its employees in customer service.
Which of the following data mining approaches did Sendstars employ when they
decided to train their employees in customer care based on the study?
Association
Cause-and-effect
modeling
Classification
Reduction
Question
19. Question : ________ is a data-mining technique used for classifying a set
of observations into predefined classes.
Logistic
regression
k-Nearest
Neighbors algorithm
Discriminant
analysis
Linear
regression
Question
20. Question : Which of the following would be considered a lagging measure in
a restaurant using the cause-and-modeling method of data mining?
A
manager who is having trouble meeting the daily demands
A
waiter’s behavior toward a customer
An
accurately billed meal
A
satisfied customer
Question
21. Question : Which of the following is true of random partitioning?
It
cannot be used for creating training data sets.
It
can contain any non-negative value from the observations.
It
can include negative-value observations in its data.
It
selects its data based on observations that have similar properties.
Question
22. Question : Divisive clustering method is different from agglomerative
clustering methods in that divisive clustering methods:
can
only have a pair of subjects in each cluster.
separate
objects into a particular cluster in one step.
separate
n objects successively into finer groupings.
can
only have a single subject in each cluster.
Question
23. Question : Uniform or triangular distributions are used in the absence of data.
True
False
Question
24. Question : A normal distribution has a limited range and can be skewed in
either direction.
True
False
Question
25. Question : Monte Carlo simulation is an inappropriate tool to analyze cash
budgets because of the inherent uncertainty of the sales forecasts on which
most cash budgets are based.
True
False
ANSWER
CLICK HERE TO GET AN EXPERT SOLUTION TO THE QUESTION
Place an order in 3 easy steps. Takes less than 5 mins.