IEEM660 Test Bank
IEEM660 Test Bank
2) The widespread use of Microsoft's software products is responsible for today's de facto
software standards in each of the following areas, except:
A) PC operating systems (Windows).
B) office application suites (including word processing).
C) enterprise systems.
D) Internet browsers.
Answer: C
Page Ref: 3
3) Which of the following did not lead to an increase in IT investments by organizations in the
1990s:
A) wireless technology.
B) Internet communication standards (TCP/IP).
C) standard Web browsers.
D) high-bandwidth fiber-optic lines.
Answer: A
Page Ref: 4
4) By the year 2000, more than ________ of capital expenditures by businesses in developed
countries were for IT purchases.
A) one quarter
B) one half
C) three quarters
D) 90 percent
Answer: B
Page Ref: 1
5) Information technology has enabled businesses to compete in which of the following ways?
A) by being a low-cost producer of a good or service
B) by differentiating their products or services
C) both A and B
D) none of the above
Answer: C
Page Ref: 4
1
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
6) Which does not describe a current hardware trend?
A) cheaper purchase costs
B) faster computer processing
C) tethered desktops
D) mobile hardware devices
Answer: C
Page Ref: 2
11) Which statement is true about how modern organizations are dependent on IT?
A) Some companies rely on IT for only back-office support (e.g., accounting).
B) Some companies are dependent on 24x7 IT operations.
C) Not all companies are strategically dependent on new technologies.
D) all of the above
Answer: D
Page Ref: 5
2
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
12) Based on Ross et al. (1996), IT managers need to focus on three types of IT assets, which
include all of the following except:
A) procedural assets.
B) technology assets.
C) relationship assets.
D) human assets.
Answer: A
Page Ref: 5
13) IT leaders who establish mechanisms for joint IT-business decision making are fostering
which IT asset?
A) procedural asset.
B) technology asset.
C) relationship asset.
D) human asset.
Answer: C
Page Ref: 6
14) Keeping a company's IT resources aligned with business goals is the primary responsibility
of:
A) virtual teams.
B) the project sponsor.
C) the CEO.
D) the CIO.
Answer: D
Page Ref: 7
15) A new organizational leadership position that helps plan for and monitor compliance with
federal reporting requirements is:
A) CEO.
B) CSO.
C) CTO.
D) none of the above
Answer: B
Page Ref: 7
16) Information technology is defined as computer hardware and software for processing and
storing information, as well as communications technology (voice and data) for transmitting
information.
Answer: TRUE
Page Ref: 1
17) The company responsible for much of today's de facto software standards throughout
corporate America is Microsoft Corporation.
Answer: TRUE
Page Ref: 2
3
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
18) A telecommuter is one who works from a location outside the company's regular offices and
communicates via IT in order to do his or her work.
Answer: TRUE
Page Ref: 5
19) Managing the costs and vulnerabilities of the data centers and networks that provide access
to business data and applications is the only major role of IT leaders.
Answer: FALSE
Page Ref: 7
======CH2==============
3) Which method of input can recognize characters from typed, printed, or handwritten material?
A) OCR
B) MICR
C) mouse
D) COM
Answer: A
Page Ref: 20-21
4
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
4) In computer memory, a cell that can store two or more characters of data is called a:
A) partition.
B) word.
C) bit.
D) byte.
Answer: B
Page Ref: 22
5) Which of the following is not an advantage of secondary storage devices compared to main
memory?
A) low cost
B) fast speed
C) high capacity
D) nonvolatility
Answer: B
Page Ref: 23
5
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
6) DASD refers to:
A) digital-analog signal distortion.
B) direct analysis system development.
C) direct access storage device.
D) delayed access sequential device.
Answer: C
Page Ref: 24
7) Machine language is the form of a computer program that the control unit of the computer has
been built to understand. In general, a machine language instruction consists of two parts, which
are:
A) bits and bytes.
B) operation code and address(es).
C) sequential and direct access files.
D) RISC and data channel.
Answer: B
Page Ref: 26
8) Evaluating how well various computers will handle an organization's workload by running a
representative set of real jobs on the different machines is called:
A) benchmarking.
B) virtualizing.
C) compiling.
D) testing.
Answer: A
Page Ref: 27
9) What is a commonly used rating of a computer's speed that is based on the number of
instructions per second executed by the computer's control unit?
A) MFLOPS
B) MIPS
C) CPU
D) MPP
Answer: B
Page Ref: 27
10) Which type of computer is often used for numerically intensive scientific calculations or to
act as an extremely large Web server?
A) microcomputers
B) midrange systems
C) mainframes
D) supercomputers
Answer: D
Page Ref: 28
6
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) Which type of computer serves as the heart of the computing systems for many, perhaps
most, major corporations and government agencies? This type of computer system also can act
as a large Web server, as a server in a client/server application, and has the widest range of
available applications.
A) microcomputers
B) midrange systems
C) mainframes
D) supercomputers
Answer: C
Page Ref: 28, 33
12) Which of the following computer storage devices is not an example of a direct access storage
device?
A) hard drive
B) CD/DVD drive
C) magnetic tape drive
D) flash drive
Answer: C
Page Ref: 23-24
14) In the 2000s, a new way of handling multiple servers in a computing center became popular,
in which multiple server modules are housed in a single chassis, saving space in the computing
center, reducing the required cabling, and improving system management. What are these servers
called?
A) blade servers
B) shared servers
C) mini servers
D) razor servers
Answer: A
Page Ref: 32
15) Which of the following is a computer programming language developed in the 1960s that is
still commonly used for older ("legacy") business applications?
A) C
B) COBOL
C) FORTRAN
D) FOCUS
Answer: B
Page Ref: 44-46
7
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) Assembly language programs are converted to machine language using an assembler. The
resulting machine language program is called a(n) ________ program.
A) source
B) output
C) final
D) object
Answer: D
Page Ref: 43
17) The language translator program which translates an entire 3GL or 4GL program into
machine language before any of the program is executed is called a(an):
A) control unit.
B) interpreter.
C) compiler.
D) converter.
Answer: C
Page Ref: 44
18) Which of the following is not an advantage of 4GL programs over 3GL programs?
A) fewer lines of code
B) easier to write
C) more efficient execution on the computer
D) easier to understand and modify
Answer: C
Page Ref: 47
8
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) The collection of applications programs commonly used by office workers–including word
processing, spreadsheets, electronic mail, presentation graphics, and so on–are referred to as
________ software.
A) management
B) support
C) personal productivity
D) systems
Answer: C
Page Ref: 38
22) Each response below lists two operating systems in common use today. In which response
are both of the operating systems listed open systems?
A) Linux and UNIX
B) Windows 7 and UNIX
C) z/OS and z/VM
D) Linux and Windows Vista
Answer: A
Page Ref: 42
23) On large computers, the operating system switches back and forth among multiple programs
stored in memory in order to overlap input and output operations with processing time; the
purpose of this switching is to maximize the work done by the CPU. What is this concept of
switching among multiple programs in memory called?
A) virtual memory
B) multiprogramming
C) job control
D) multiprocessing
Answer: B
Page Ref: 41-42
24) Which of the following is not a benefit associated with the procedural language COBOL?
A) The language resembles English.
B) It is standardized.
C) COBOL programs are shorter than those written in other languages.
D) It is relatively easy to learn.
Answer: C
Page Ref: 44
25) HTML uses ________ placed within a document to tell the Web browser how to display
various elements on a Web page.
A) marks
B) keys
C) tags
D) comments
Answer: C
Page Ref: 48
9
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) The metalanguage standard that is used to facilitate data interchange among applications on
the Web is ________; this is really a standard for specifying a document markup language based
on plain-text tags.
A) HTML
B) HTTP
C) JavaScript
D) XML
Answer: D
Page Ref: 48
28) A 4 GL, nonprocedural language–often provided with the database management system–
which is used to retrieve data from a database is called a ________ language.
A) query
B) search
C) lookup
D) retrieval
Answer: A
Page Ref: 53
29) Which of the following is a collection of software tools to help automate all phases of the
software development life cycle?
A) COBOL
B) CASE
C) XML
D) UNIX
Answer: B
Page Ref: 54
30) Which of the following is an example of communications interface software that is used to
transfer files from one computer system to another?
A) CICS
B) FTP
C) UML
D) Apache
Answer: B
Page Ref: 54
10
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
31) The CPU is made up of two components, the control unit and memory.
Answer: FALSE
Explanation: It is made up of the control unit and the arithmetic/logic unit.
Page Ref: 20
32) When a data item is retrieved from a memory cell, either to print out the item or to use it in a
computation, the contents of the cell are unchanged.
Answer: TRUE
Page Ref: 22
33) The stored-program concept allows users to specify a list of operations that can be carried
out at electronic speeds, rather than waiting for the user to specify each operation separately.
Answer: TRUE
Page Ref: 25-27
34) Encapsulation is one of the important features of objects (in object-oriented programming) in
which a subclass inherits the properties, methods, and events of the class to which it belongs.
Answer: FALSE
Explanation: The statement above is the definition of inheritance, not encapsulation.
Page Ref: 50
35) Virtual memory is a procedure by which the operating system switches portions of programs
between main memory and direct access files so that portions of enough programs are stored in
main memory to enable efficient multiprogramming; to the user, it appears as though an
unlimited amount of main memory is available.
Answer: TRUE
Page Ref: 42
======CH3==============
6) When data can be transmitted in both directions on a telecommunications line, but not
simultaneously, the transmission type is referred to as:
A) switched-line.
B) simplex.
C) half-duplex.
D) full-duplex.
Answer: C
Page Ref: 65
8) A common transmission medium that consists of a heavy copper wire at the center,
surrounded by insulating material, then a cylindrical conductor, and finally an outer protective
plastic covering is called a:
A) fiber-optic cable.
B) coaxial cable.
C) twisted pair of wires.
D) token ring.
Answer: B
Page Ref: 66
10) Which of the following is not an advantage of a wireless LAN versus a wired LAN?
A) faster transmission speed and more secure
B) takes planning, but relatively easy to install
C) enables users of mobile devices to connect to a LAN
D) can be used as an overlay network to permit employees to connect their laptops to the
corporate network from anywhere in the building
Answer: A
Page Ref: 67, 74-75
13
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) Which transmission medium requires an unobstructed straight line between the transmitter
and the receiver?
A) coaxial cable
B) twisted pair of wires
C) microwave
D) wireless (as in a LAN)
Answer: C
Page Ref: 68
14
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) Which statement about active RFID tags is not true?
A) They are much more commonly used today than passive tags.
B) They can transmit information continuously, on request, or on a predetermined schedule.
C) They have their own power supply.
D) They are more expensive than passive tags.
Answer: A
Page Ref: 67
17) Which company was the most visible early adopter of using RFID for inventory
management?
A) Cisco Systems
B) Microsoft
C) Walmart
D) Facebook
Answer: C
Page Ref: 67
19) The term Ethernet is often used as a synonym with which of the following types of local area
networks:
A) token bus network.
B) token ring network.
C) contention bus network.
D) contention ring network.
Answer: C
Page Ref: 73
20) Which statement describes a major difference between a LAN and a WAN?
A) usage by a corporation
B) geographic distance between devices being networked
C) usage of wireless media
D) all of the above
Answer: D
Page Ref: 72-73, 77-80
15
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) The CSMA/CD and CSMA/CA protocols are designed to manage which of the following:
A) low bandwidth.
B) conversion of data from digital to analog.
C) message collisions.
D) passing of token from one device to another.
Answer: C
Page Ref: 73-75
22) A private, packet-switched network using the public Internet is referred to as a(n):
A) VPN network.
B) SONET network.
C) ISDN network.
D) DDD network.
Answer: A
Page Ref: 80
24) Which of the following statements about network topologies is not true?
A) A bus topology can be thought of as a simple "linear" topology.
B) A ring topology is wired like a bus, except the ends of the cable are connected.
C) A star topology is like a ring, except the hub is bigger.
D) In a mesh topology, devices are directly connected to two, three, or more other devices in a
seemingly irregular pattern.
Answer: C
Page Ref: 70-71
25) Which of the following networking hardware devices forwards all messages it receives to all
devices that are connected to it, whether or not the messages need to go there?
A) gateway
B) hub
C) router
D) switch
Answer: B
Page Ref: 76-77
16
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) A broadband service offered by telephone companies that uses copper wires already installed
in homes and offices to connect to the Internet is referred to as:
A) DSL.
B) cable modem.
C) T1.
D) VPN.
Answer: A
Page Ref: 82-83
27) When considering network protocols, why is the multilayer OSI model still important?
A) It provides a conceptual framework for how communication takes place in networks.
B) It is specifically designed for Ethernet transmissions, which are quite common.
C) It describes a protocol that is gradually replacing TCP/IP.
D) It was designed by IBM.
Answer: A
Page Ref: 86-87
28) Which of the following OSI model layers receives a packet of data from the transport layer
and adds header data to it to identify the route the packet is to take to its destination?
A) physical
B) data link
C) network
D) transport
Answer: C
Page Ref: 87
29) Which of the following network protocols is used on the Internet and has become the de
facto standard protocol for networking around the world?
A) SNA
B) TCP/IP
C) VPN
D) OSI
Answer: B
Page Ref: 88
30) In the United States, the two giants in the telephone industry in the decade of the 2010s are:
A) T-Mobile and Sprint Nextel.
B) Verizon and AT&T.
C) BellSouth and SBC.
D) GTE and Cingular.
Answer: B
Page Ref: 90
31) Conversion of digital to analog signals so that the signals can travel over conventional
telephone lines is accomplished with a device called a modem.
Answer: TRUE
Page Ref: 64
17
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
32) The term modem stands for Modulator of Digital Electronic Messages.
Answer: FALSE
Explanation: Modem stands for modulator/demodulator.
Page Ref: 64
33) Early in the decade of the 2010s, two different technologies–WiMAX and LTE (Long Term
Evolution)–are competing to become the dominant 4G network technology.
Answer: TRUE
Page Ref: 76
35) By 2004, the number of cell phones in use in the United States was greater than the number
of wired phones in homes.
Answer: TRUE
Page Ref: 90
36) Using an Infrastructure as a Service provider can enable an organization to avoid major
capital investments for network equipment as well as computer servers and storage.
Answer: TRUE
Page Ref: 91
======CH4==============
4) A top-down data modeling approach to describe the data structure and other requirements of
an organization, independent of any particular reports or screens, is called:
A) corporate modeling.
B) enterprise modeling.
C) view integration.
D) data consolidation.
Answer: B
Page Ref: 98
19
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
6) The process of creating simple data structures from more complex ones, which yields a data
model that is very stable and useful across many different requirements, is called:
A) standardization.
B) consistency.
C) normalization.
D) basic.
Answer: C
Page Ref: 98
7) All of the following are true about using a pre-existing (packaged) data model, except:
A) it cannot be customized to fit the terms and business rules of a specific organization.
B) the modeling projects require less time and money.
C) it may be easier to share data with other organizations in the industry.
D) it is likely to work well with other applications from the same vendor.
Answer: A
Page Ref: 98
8) The data modeling guideline that specifies the functional, business division, and/or corporate
coverage is called the:
A) objective.
B) scope.
C) outcome.
D) timing.
Answer: B
Page Ref: 99
9) The data modeling guideline that captures the need that justified the data modeling effort is
specified in the:
A) objective.
B) scope.
C) outcome.
D) timing.
Answer: A
Page Ref: 99
10) An example of a query language used for posing queries to a database is:
A) SQL.
B) ASP.
C) XML.
D) PHP.
Answer: A
Page Ref: 100
20
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) An example of a data exchange language to pass data between computers for e-business is:
A) SQL.
B) ASP.
C) XML.
D) PHP.
Answer: C
Page Ref: 100
12) Which of the following is not true about managing data in today's large organizations?
A) Application software is separate from the database software.
B) Data is captured more than once to ensure accuracy.
C) Data exists in databases for operational and managerial purposes.
D) The need to manage data is continuous.
Answer: B
Page Ref: 101
13) Databases for managerial control and other decision-making are often subsets, summaries, or
aggregations of ________ with external data supplements.
A) personnel databases
B) strategic databases
C) geographic databases
D) operational databases
Answer: D
Page Ref: 101
14) Which of the following statements about information processing with application
independence is not true?
A) Data are captured and stored in an operational database.
B) Data that is accessed from a database for application processing is automatically deleted from
the database.
C) Subsets and aggregated operational data may be periodically transferred to a long-term data
warehouse.
D) none of the above
Answer: B
Page Ref: 102
15) An application that moves data from one database to another and permits one source of data
to serve many localized systems within an organization is called a:
A) data analysis and presentation application.
B) data capture application.
C) data transfer application.
D) disposable application.
Answer: C
Page Ref: 103
21
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) An application that distributes data to authorized users and manipulates data to create useful
information from established data sources is called a:
A) data analysis and presentation application.
B) data capture application.
C) data transfer application.
D) disposable application.
Answer: A
Page Ref: 103
18) Which of the following statements is true about the retention of data?
A) All organizational data should be retained indefinitely.
B) Some national laws require that certain types of data must be retained for certain periods of
time.
C) Emails should be retained in the same database as transaction data.
D) none of the above
Answer: B
Page Ref: 109
19) An unambiguous description of each type of data that applies to all business circumstances
and users is called a(n):
A) name.
B) descriptor.
C) identifier.
D) definition.
Answer: D
Page Ref: 105
20) A characteristic of a business entity that uniquely distinguishes it from other instances of the
entity for the long term is called a(n):
A) name.
B) definition.
C) identifier.
D) integrity rule.
Answer: C
Page Ref: 104
22
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) Which of the following prescribes who can do what and when to each kind of data?
A) ranges
B) integrity rules
C) edit rules
D) usage rights
Answer: D
Page Ref: 105
23) ________ refers to the disciplines, technologies, and methods to ensure the currency,
meaning and quality of reference data within and across various subject areas.
A) DD/D
B) MDM
C) DBMS
D) ERP
Answer: B
Page Ref: 105
24) What organizational role or unit is responsible for functions such as physical database
design, database interfaces with other technologies, and database recovery methods?
A) data steward
B) database administrator
C) CIO
D) data administration group
Answer: B
Page Ref: 112
25) Determining the physical arrangement of data based on the data currently required by the
business and expected to be required in the future is part of which of the following data resource
management functions?
A) organize and make accessible
B) define/describe and inventory
C) control quality and integrity
D) accounting for usage
Answer: A
Page Ref: 107
23
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) What organizational role or unit is responsible for functions such as maintaining metadata,
reducing redundant data, and improving data quality across an organization?
A) data steward
B) database administrator
C) CIO
D) data administration
Answer: D
Page Ref: 110
27) What organizational role or unit is responsible for the quality of the data in a particular
subject database or departmental area?
A) data steward
B) database administrator
C) CIO
D) data administration
Answer: A
Page Ref: 110
28) Each of the following is a critical step in a data quality initiative, except:
A) cleaning up existing data errors.
B) avoiding the usage of advanced data cleansing tools.
C) establishing procedures to prevent errors.
D) verifying that third-party vendors provide clean data.
Answer: B
Page Ref: 109, textbox
30) Which of the following is a justification given for laws that control data flows across national
borders?
A) promote economic imperialism
B) protect a domestic industry
C) protect individual privacy
D) both B and C
Answer: D
Page Ref: 111
31) If an organization maintains application independence, then application software can more
easily be abandoned or replaced.
Answer: TRUE
Page Ref: 103
24
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
32) Data warehouses provide a method for making historical and current data accessible for
queries by many people throughout an organization.
Answer: TRUE
Page Ref: 103
34) The permissible range or set of values for each data element is defined by integrity rules.
Answer: TRUE
Page Ref: 105
======CH5==============
5) In describing a client/server system, the software needed to support the interactions between
the clients and the server is called:
A) clientware.
B) middleware.
C) expert system.
D) telecommunications interface software.
Answer: B
Page Ref: 193
27
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) The components of a three-tier client/server system include:
A) server, middleware, and client.
B) client, applications server, and database server.
C) database server, client, and middleware.
D) applications server, middleware, and client.
Answer: B
Page Ref: 193
12) Which of the following statements about service-oriented architecture (SOA) is false?
A) Services can be developed internally to the organization or purchased externally.
B) Once a service is created, it can be used over and over again.
C) Services can communicate or be connected with one another.
D) none of the above
Answer: D
Page Ref: 194
13) A type of transaction processing system that consists of a set of integrated business
applications, or modules, to carry out most common business functions (such as inventory
control, general ledger accounting, accounts payable, order processing, etc.) is called a(n):
A) distributed system.
B) client/server system.
C) enterprise resource planning system.
D) group support system.
Answer: C
Page Ref: 198
14) All of the following statements about enterprise resource planning (ERP) systems are true
except:
A) the modules of an ERP system are integrated through common definitions and a common
database.
B) ERP systems are designed to support business processes that involve multiple functional
units.
C) the modules of an ERP system are typically designed for companies operating in the U.S.
only.
D) ERP systems are typically purchased from a software vendor.
Answer: C
Page Ref: 198
15) Establishing a data warehouse requires software tools to do all of the following except:
A) operate the warehouse.
B) access and analyze data.
C) construct the warehouse.
D) process transactions (such as a sales order).
Answer: D
Page Ref: 202-203
28
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) Which of the following CRM enterprise vendors offers only a hosted or on-demand solution?
A) Oracle
B) Microsoft
C) Salesforce.com
D) SAP
Answer: C
Page Ref: 205
17) Which of the following are potential disadvantages of electronic mail systems?
A) can result in information overload
B) can result in the usage of offensive words by a sender who would not use them face-to-face
C) can be electronically monitored by supervisor
D) all of the above
Answer: D
Page Ref: 208
19) Which of the following is a potential business benefit from implementing an ERP system?
A) improved financial process controls
B) lower costs for inventory warehousing
C) re-engineered business processes
D) all of the above
Answer: D
Page Ref: 198-202
20) Lotus Notes (an IBM product) is an example of which of the following types of application
software?
A) enterprise resource planning (ERP) system
B) transaction processing system
C) groupware
D) physician documentation for patient records
Answer: C
Page Ref: 210
29
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) Which of the following is not a capability associated with groupware products?
A) data modeling
B) electronic bulletin boards
C) document sharing
D) instant messaging
Answer: A
Page Ref: 209-210
22) According to the textbook, which of the following is not true when a firm is considering the
implementation of an intranet?
A) If the basic infrastructure is already in place (e.g., Web browsers and Web server),
implementation requires relatively little effort.
B) Little planning is required to design Web pages and contents.
C) The per-user costs are generally low.
D) Minimal user training is required.
Answer: B
Page Ref: 213-214
23) A computer system that relies on extensive data input to produce a production schedule for
the factory and a schedule of needed raw materials is what kind of system?
A) computer-aided manufacturing (CAM)
B) shop floor control (SFC)
C) computer-aided process planning (CAPP)
D) material requirements planning (MRP)
Answer: D
Page Ref: 215
24) A manufacturing computer system that logically groups parts according to physical
characteristics, machine routings through a factory, and similar machine operations is what kind
of system?
A) computer-aided process planning (CAPP)
B) group technology (GT)
C) computer-aided manufacturing (CAM)
D) computer-aided design (CAD)
Answer: B
Page Ref: 216
25) Which one of the following answers consists of systems all of which have been defined in
this textbook as enterprise systems?
A) expert system, data mining, neural networks
B) groupware, intranet, group support systems
C) data warehousing, data mining, business intelligence systems
D) intranet, customer relationship management, groupware
Answer: D
Page Ref: 190
30
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) What are the three major categories of computer-integrated manufacturing (CIM) systems?
A) robotics, engineering systems, and manufacturing administration
B) design, factory operations, and engineering systems
C) manufacturing administration, factory operations, and design
D) engineering systems, manufacturing administration, and factory operations
Answer: D
Page Ref: 215
27) Which of the following is not an example of an outcome that would be expected from the
implementation of a supply chain management (SCM) system?
A) reduction in time for getting a new product designed and at a retail store
B) reducing out-of-stock items in warehouses
C) more accurate accounting records
D) delivering the right number of products to the right customers at the right time
Answer: C
Page Ref: 217-219
28) MRP II is a computer-based manufacturing administration system that usually has which of
the following components?
A) computer-aided design, master production schedule, and group technology
B) master production schedule, material requirements planning, and shop floor control
C) material requirements planning, computer-aided engineering, and master production schedule
D) shop floor control, manufacturing automation protocol, and material requirements planning
Answer: B
Page Ref: 216-217
29) An engineering system that uses computer graphics to create and modify engineering designs
is what type of system?
A) computer-aided engineering (CAE)
B) computer-aided design (CAD)
C) graphic user design (GUD)
D) computer-aided process planning (CAPP)
Answer: B
Page Ref: 216
30) What are the 5 basic components of a supply chain management (SCM) system?
A) market, source, make, sell, deliver
B) plan, source, buy, sell, deliver
C) plan, source, make, deliver, return
D) procure, make, market, sell, deliver
Answer: C
Page Ref: 218
31
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
31) Intraorganizational systems are systems that span organizational boundaries.
Answer: FALSE
Explanation: Interorganizational systems span organizational boundaries.
Page Ref: 189-190
33) Payroll and order entry systems are examples of transaction processing systems.
Answer: TRUE
Page Ref: 196-198
34) In a survey of IT leaders, CIO magazine found that the companies represented were
completely dependent on their ERP systems, but they also had major concerns including
complex system integration, high cost of ownership, and systems that are difficult to use.
Answer: TRUE
Page Ref: 199
35) Groupware systems attempt to provide an integrated approach to all aspects of interaction a
company has with its customers.
Answer: FALSE
Page Ref: 204
======CH6==============
1) A computer-based system that allows a police officer to consider a variety of alternatives for
allocating police officers to different neighborhoods is an example of a:
A) group support system.
B) transaction processing information system.
C) vertically integrated information system.
D) decision support system (DSS).
Answer: D
Page Ref: 224
3) An actual DSS application that assists in the decision-making process of an organization (e.g.,
a DSS for investment portfolio management or a DSS for staff scheduling) is referred to as a:
A) specific DSS.
B) DSS generator.
C) planning DSS.
D) DSS model.
Answer: A
Page Ref: 224
5) A DSS that provides a set of capabilities (such as a spreadsheet) to build a specific decision
support system quickly and easily is referred to as a:
A) specific DSS.
B) DSS generator.
C) planning DSS.
D) DSS tool.
Answer: B
Page Ref: 224
33
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
6) An application that extracts data from a database and structures it by individual dimensions,
such as region, organizational unit, or dealer, is referred to as:
A) OLAP software.
B) data mining software.
C) data warehousing software.
D) expert system software.
Answer: A
Page Ref: 226
7) In extracting information from large data warehouses, a data mining tool may use which of the
following techniques?
A) decision trees
B) regression
C) rule induction
D) all of the above
Answer: D
Page Ref: 226
8) A technique to search for small "nuggets" of information from the vast quantities of data
stored in an organization's data warehouse, using technologies such as decision trees and neural
networks, is called:
A) statistical inferencing.
B) data mining.
C) data regression.
D) analytic extraction.
Answer: B
Page Ref: 226
10) From a manager's perspective, all of the following are potential advantages of using group
support systems except:
A) to encourage creative thinking.
B) to have more productive meetings.
C) to make it easier for higher-ranking participants to sway everyone else's vote.
D) to obtain higher quality ideas and decisions.
Answer: C
Page Ref: 228-229
34
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) A GSS can be used to support:
A) meetings at one physical location.
B) meetings with participants at multiple locations.
C) meetings of pre-existing teams or newly formed groups.
D) all of the above
Answer: D
Page Ref: 228-229
12) A data mining product which has the ability to handle textual information, pulling data out of
letters, memos, medical records, tweets, and documents of all kinds, is called a:
A) neural network.
B) decision tree.
C) text miner.
D) text-to-data reducer.
Answer: C
Page Ref: 226
13) Questions that a GIS can directly answer include all of the following except:
A) What is adjacent to this feature?
B) Is this the best site for a new business?
C) How many features are within a certain distance of a site?
D) Which site is the nearest one?
Answer: B
Page Ref: 232
35
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) Which of the following is not a typical characteristic of an executive information system?
A) provides easy online access to current information about business conditions in an aggregated
form
B) requires the assistance of a user with a technology background
C) is a system used by managers at all levels of the organization
D) includes internal transaction data and may incorporate qualitative data from both internal and
external sources
Answer: B
Page Ref: 234-235
17) Information extracted from executive information systems is typically displayed in any of the
following formats except:
A) spreadsheets.
B) charts.
C) detailed, nonaggregated information.
D) dashboards.
Answer: C
Page Ref: 234-235
18) In many cases, EIS applications have evolved into which of the following type(s) of
application?
A) performance management system.
B) business intelligence system.
C) competitive intelligence system.
D) all of the above
Answer: D
Page Ref: 235
19) Which of the following approaches to representing spatial data relies on dividing space into
small, equal-sized cells arranged in a grid?
A) vector-based GIS
B) coverage GIS
C) raster-based GIS
D) polygon-based GIS
Answer: C
Page Ref: 231-232
36
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) The branch of artificial intelligence that is concerned with building systems that incorporate
the decision-making logic of a human expert is called:
A) expert systems.
B) fuzzy logic.
C) natural languages.
D) neural networks.
Answer: A
Page Ref: 241
22) Which statement about business intelligence (BI) tools is not true?
A) Most BI tools are designed specifically for use by financial analysts.
B) BI tools are used to improve the outcomes from direct marketing campaigns.
C) BI tools are used to identify customer purchasing patterns.
D) BI tools are used in marketing to decide on promotions and online advertising.
Answer: A
Page Ref: 235-238
23) A machine that possesses visual and/or aural abilities that affect the machine's physical
behavior (response) is referred to as a(n):
A) programmed system.
B) perceptive system.
C) command-driven system.
D) expert system.
Answer: B
Page Ref: 241
25) The individual who is responsible for gathering an expert's knowledge to be used to build an
expert system is called a(n):
A) systems programmer.
B) expert system manager.
C) knowledge programmer.
D) knowledge engineer.
Answer: D
Page Ref: 241
37
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) Which statement about virtual reality applications is not true?
A) VR systems are being used to train professionals and to design new products.
B) Users of VR systems may use helmets, glasses, and/or gloves that immerse them into a virtual
world that seems real to one or more of their senses.
C) A "virtual tour" of a real estate property uses VR-like technology.
D) none of the above
Answer: D
Page Ref: 245-247
27) The part of an expert system that automatically executes a line of reasoning when supplied
with the rules and parameters involved in a decision is called the:
A) explanation subsystem.
B) inference engine.
C) workspace.
D) knowledge base.
Answer: B
Page Ref: 241-242
28) One way to develop an expert system is to use a development environment that contains all
the basic expert system components plus a limited but user-friendly special language with which
to develop a knowledge base. This development environment is referred to as a(n):
A) fourth-generation language.
B) high-level programming environment.
C) artificial intelligence shell.
D) natural language system.
Answer: C
Page Ref: 242
29) The AI technology that is used to evaluate handwriting on credit card slips, select
undervalued stocks as part of portfolio pension plan management, and determine where to drill
for oil and gas is:
A) neural networks.
B) perceptive systems.
C) natural languages.
D) expert systems.
Answer: A
Page Ref: 244-245
38
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
31) Participants in GSS sessions must identify themselves to eliminate any doubt about the
integrity of the source of information provided.
Answer: FALSE
Explanation: Participants may provide input anonymously to avoid being ridiculed.
Page Ref: 228-229
32) Data for executive information systems (EISs) come from both quantitative and qualitative
sources.
Answer: TRUE
Page Ref: 235
33) Once a neural network has established an acceptable level of predictive ability, no further
changes are made to the weights of the predictor variables.
Answer: FALSE
Explanation: Neural networks continue to "learn" and improve their predictive ability.
Page Ref: 244
34) The goal of a knowledge management system (or KMS) is to tap into the knowledge of the
individual and the organization and disseminate it throughout the firm to derive operational and
market improvements.
Answer: TRUE
Page Ref: 238
======CH7==============
2) Which law describes the relative value of a network as proportional to the square of the
number of its members?
A) Moore's Law
B) Metcalfe's Law
39
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
C) M-commerce Law
D) McAffe's Law
Answer: B
Page Ref: 253
3) According to the textbook, which statement about electronic data interchange (EDI) is not
true?
A) EDI involves computer-to-computer communications between trading partners.
B) EDI saves costs due to automated transaction handling and the elimination of paper
documents.
C) EDI requires an Internet connection.
D) Some EDI standards are industry-specific.
Answer: C
Page Ref: 257-258
4) In the first half of the 1990s, which of the following paved the way for today's Internet?
A) The National Science Foundation lifted the ban on commercial usage of the Internet.
B) A commercial web browser was available.
C) Google bought PayPal.
D) both A and B
Answer: D
Page Ref: 254
40
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
6) Which statement about the growth of e-business in the 1990s is not true?
A) the U.S. Congress did not impose a sales tax on purchases via the Internet
B) credit card processing for online purchases was available even before the web browser
C) DSL and cable modems to U.S. homes increased the download speeds for web sites
D) search engines enabled users to find web sites without keying in their URLs
Answer: B
Page Ref: 254-258
7) Which of the following uses cryptography to ensure secure transmission over a public
network?
A) digital signatures
B) communication protocols
C) web browsers
D) search engines
Answer: A
Page Ref: 256, textbox
9) According to Porter's model, which of the following is not one of the competitive forces that
business organizations typically face?
A) supplier power
B) threat of new entrants
C) threat of government regulation
D) threat of substitute products
Answer: C
Page Ref: 259
10) According to Porter (2001), the Internet has had which kind of competitive impact?
A) widening of geographic markets to increase the reach to potential customers
B) increased difficulties in keeping a product or service offering proprietary
C) reduction in switching costs for customers
D) all of the above
Answer: D
Page Ref: 259
41
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) Which type of e-business is most dependent upon the number of individuals having Internet
access?
A) B2B
B) B2C
C) G2G
D) C2B
Answer: B
Page Ref: 263
14) Which statement about the usage of social media as a B2C platform is not true?
A) companies are using social media to communicate with customers
B) Fortune 500 companies are using Facebook, but not Twitter
C) blogs are being used to help "brand" a company or products
D) some companies have used online communities to generate and comment on product ideas
Answer: C
Page Ref: 275
15) Which of the following businesses have a Web site that promotes a sense of "community" by
their consumers?
A) Amazon
B) Netflix
C) TD Ameritrade
D) both A and B
Answer: D
Page Ref: 264-266, 273
42
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) Which of the following was NOT a pioneer in providing online customers with the ability to
order customized products through their Web site?
A) Lands' End
B) Blockbuster
C) Dell
D) all of the above
Answer: B
Page Ref: 265, 267
17) Which of the following was a pioneer in developing a superior online shopping experience
for consumers?
A) Amazon.com
B) Dell.com
C) Landsend.com
D) Netflix.com
Answer: A
Page Ref: 264
19) Providing customized content to the user based on the actual geographic location of their
handheld device is a form of:
A) C2C
B) M-commerce
C) EDI
D) none of the above
Answer: B
Page Ref: 256
20) What term refers to web sites that were designed to be an initial point of access, or gateway,
to other sites?
A) Web portal
B) Firewall
C) Web browser
D) Virus
Answer: A
Page Ref: 255
43
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) In what industries are companies that serve as online B2B intermediaries more likely to have
a sustainable business model?
A) those with lots of buyers and few sellers
B) those with lots of buyers and lots of sellers
C) those with few buyers and lots of sellers
D) none of the above
Answer: B
Page Ref: 261-262, Fig 7.7
23) Which of the following is NOT a difference in e-business after the U.S. dot-com meltdown
when compared with before the meltdown?
A) less venture capital
B) pure-play businesses no longer exist
C) company valuations based on potential for earnings and profits
D) some state sales taxes
Answer: B
Page Ref: 260, Fig. 6.5
24) The 1999 end-of-year holiday season was considered a milestone in B2C e-business in the
U.S. because online sales approached what percentage of total holiday sales?
A) 1%
B) 2%
C) 5%
D) 10%
Answer: A
Page Ref: 260
25) Which of the following is included in the 7Cs framework for evaluating B2C web sites by
Rayport and Jaworski?
A) content (site layout and design)
B) context (usage of text and other media)
C) community (enabling feelings of membership and shared interest)
D) all of the above
Answer: D
Page Ref: 273
44
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) Which of the following companies uses the Web for both B2B and B2C?
A) Dell
B) Facebook
C) Staples
D) both A and C
Answer: D
Page Ref: 266-267, 272
28) Which of the following is an example of a "first mover" success not always being valid?
A) Google
B) eBay
C) Yahoo!
D) Staples
Answer: C
Page Ref: 273
29) Why would a consumer want to see a TRUSTe seal on a web site?
A) TRUSTe is a government organization concerned with consumer trust
B) a TRUSTe seal signifies that the company's website has a clear privacy policy
C) the company is affiliated with Apple computer
D) sites that do not display this seal are not trustworthy
Answer: D
Page Ref: 257-258, textbox
30) Which of the following countries has a national policy that requires that all web sites be
registered and in compliance with national guidelines about certain content?
A) Japan
B) China
C) U.S.
D) U.K.
Answer: B
Page Ref: 274, textbox
31) The World Wide Web Consortium (W3C) is an industry consortium that oversees the
assignment of domain names.
Answer: FALSE
Page Ref: 254
45
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
32) An extranet is a private network operating within an organization that employs the TCP/IP
protocol to provide information, applications, and other tools for use by the organization's
employees.
Answer: FALSE
Page Ref: 256
33) The Internet has its roots in ARPANET, a network of U.S. government and selected research
and development firms in the private sector that grew to include educational institutions and
other nonprofit organizations.
Answer: TRUE
Page Ref: 254
34) According to the textbook, traditional U.S. retailers that had developed a multichannel
capability appeared to have an online B2C advantage by 2005.
Answer: TRUE
Page Ref: 268
======CH8==============
1) Which of the following is a type of control that is used to ensure the development of a high
quality, reliable information system?
A) methodology standards
B) system testing
C) system backup
D) all of the above
Answer: D
Page Ref: 355
2) Why is it important for a system analyst to document formal as well as informal systems
within an organization?
A) informal systems are always less efficient.
B) the usage of an informal system by users means that the formal system is deficient in some
way and users have designed ways to work around it.
C) informal systems require natural language processing, but formal systems do not.
D) all of the above
Answer: B
Page Ref: 331
3) Which of the following elements usually includes subcomponents to filter, translate, store, and
correct data that flows through it?
A) component
46
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
B) environment
C) storage
D) interface
Answer: D
Page Ref: 333
4) Using a sales tracking system as an example, the customer orders and customer returns of
goods are examples of which type of system components?
A) outputs
B) inputs
C) storage
D) memory
Answer: B
Page Ref: 332
47
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
5) Using a payroll system as an example, paychecks and W-2 forms are examples of which of the
following system elements?
A) outputs
B) inputs
C) storage
D) memory
Answer: A
Page Ref: 332
6) In basic systems terminology, the process of breaking down a system into successive levels of
subsystems is called:
A) functional analysis.
B) factoring.
C) interfacing.
D) hierarchical decomposition.
Answer: D
Page Ref: 332
7) A numerical digit based on the other digits within a numerical identifier is referred to as a:
A) ITIL rule.
B) check digit.
C) lottery number.
D) none of the above
Answer: B
Page Ref: 356
9) Which of the following is not an example of a principal method for system decoupling?
A) slack resources to provide alternative paths
B) usage of standards
C) sharing data stores
D) benchmarking
Answer: D
Page Ref: 334
48
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
10) A physical system description depicts ________ the system operaters, while a logical system
description depicts ________ the system does.
A) how; what
B) how; why
C) what; how
D) why; what
Answer: A
Page Ref: 335
11) Which of the following system descriptions depicts the function and purpose (the what) of
the system without reference to, or implications for, the actual way in which the system will be
implemented?
A) functional system description
B) logical system description
C) physical system description
D) network system description
Answer: B
Page Ref: 335
12) Which is a basic principle of business process reengineering (BPR) suggested by Hammer ?
A) integrating information processing into the work that produces the information
B) building reengineering efforts around legacy systems
C) developing parallel processes for redundancy
D) escalating decision-making up an organizational hierarchy
Answer: A
Page Ref: 336
13) As defined in the textbook, the generic systems development life cycle consists of the
following three phases:
A) requirements, design, and implementation.
B) definition, construction, and implementation.
C) specifications, development, and installation.
D) feasibility analysis, testing, and maintenance.
Answer: B
Page Ref: 339
14) Which of the following best describes the definition phase of the systems life cycle?
A) The system is functionally designed, and then its physical design is specified.
B) The new system is installed.
C) Business and systems professionals document systems needs and feasibility.
D) Data and procedures from the old system are converted.
Answer: C
Page Ref: 339
49
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
15) Which of the following best describes the construction phase of the systems life cycle?
A) The system is functionally designed, and then its physical design is specified.
B) The new system is installed.
C) Business and systems professionals document systems needs and feasibility.
D) Data and procedures from the old system are converted.
Answer: A
Page Ref: 340
16) Which of the following describes an early step in the implementation phase of the systems
life cycle?
A) The system is detailed functionally, and then its physical design is specified.
B) Programs and computer files are designed.
C) Operational feasibility is conducted.
D) Data and procedures from the old system are converted.
Answer: D
Page Ref: 340
18) When a physical model of a system is depicted with a diagram, cylinders are used to
represent:
A) major modules.
B) databases.
C) data flows.
D) processes.
Answer: B
Page Ref: 342
19) Which of the following technique is most closely associated with the Logical To-Be model?
A) work process flow diagram
B) context diagram
C) data flow diagram
D) swimming lane diagram
Answer: C
Page Ref: 345
50
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
20) Which of the following is not graphically represented in a data flow diagram (DFD)?
A) sender
B) process
C) data flow
D) data store
Answer: A
Page Ref: 345
22) When developing a logical data flow diagram, a rectangle (or open rectangle) indicates:
A) data at rest.
B) data in motion.
C) an element in the environment of the system that sends or receives data.
D) a process component.
Answer: A
Page Ref: 345
23) The most common approach to defining data elements in a DFD is to create a(n):
A) data store.
B) data dictionary/directory.
C) process.
D) external entity.
Answer: B
Page Ref: 346
24) All of the following are tools for representing the Logical To-Be model of an information
system except a(n):
A) program chart.
B) data dictionary.
C) entity-relationship diagram.
D) data flow diagram.
Answer: A
Page Ref: 345, 346
51
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
25) In the object-oriented (O-O) approach to software engineering, the term "encapsulation"
refers to:
A) sharing commonalities between classes of objects.
B) a relationship between a generalized object class and one or more specialized classes.
C) storing data and related operations together within objects.
D) the reusability of objects across a wide variety of applications.
Answer: C
Page Ref: 352
26) Which of the following diagrams is not part of the Unified Modeling Language for O-O
modeling?
A) class diagram
B) context diagram
C) sequence diagram (to capture messages)
D) use Case diagram
Answer: B
Page Ref: 352-353
27) Which of the following statements is not true about system testing controls in the
construction phase of the systems life cycle?
A) Each program is tested individually and in combination with other programs.
B) The results from processing typical and atypical inputs are examined.
C) Users are not involved in system testing.
D) Validation rules and calculations are checked.
Answer: C
Page Ref: 357
28) What set of international guidelines includes an extensive set for implementation
management practices against which firms can benchmark their own practices?
A) CCM
B) COSO
C) ITIL
D) none of the above
Answer: C
Page Ref: 356
29) Controls for the validity of data entered into an application program (such as ensuring that
only numbers are entered into a numeric field) are referred to as:
A) batch totals.
B) encryption rules.
C) access privileges.
D) edit rules.
Answer: D
Page Ref: 356
52
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
30) Security measures that are concerned with whether or not users can run an application, read a
file, or change data in a database, or can change who can access to data that others have created
are referred to as:
A) logical access controls.
B) physical access controls.
C) backup procedures.
D) audit trails.
Answer: A
Page Ref: 358
31) One of the fundamental principles of systems analysis and design (SA&D) is that the logical
system should be described before the physical system.
Answer: TRUE
Page Ref: 335
32) System testing only occurs when systems are initially developed.
Answer: FALSE
Explanation: Testing also occurs when systems are modified.
Page Ref: 357
33) In general, the term "system" is defined as a set of interrelated components that must work
together to achieve some common purpose.
Answer: TRUE
Page Ref: 330
======CH9==============
1) The SDLC phase that typically requires the greatest percentage of the total cost for a custom
development project is the ________ phase.
A) definition
B) construction
C) implementation
D) final
Answer: B
Page Ref: 363, Fig. 9.2
53
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
2) During the feasibility analysis phase of the SDLC, which of the following types of feasibility
is not assessed?
A) economic
B) operational
C) time-driven
D) technical
Answer: C
Page Ref: 363
3) Who usually takes primary responsibility for establishing the custom development costs for an
SDLC project?
A) end user
B) business manager
C) IS analyst
D) both B and C
Answer: C
Page Ref: 364
4) The ________ approach to systems development has often been referred to as the "waterfall"
model.
A) SDLC
B) prototyping
C) RAD
D) XP
Answer: A
Page Ref: 363
5) Deciding what hardware and systems software will be used to operate the system and defining
the processing modules that will comprise the system are part of which SDLC step?
A) system building
B) requirements definition
C) system design
D) feasibility analysis
Answer: C
Page Ref: 365
7) Which of the following accurately describes the order in which a system is tested?
A) module testing, subsystem testing, integration testing, acceptance testing
54
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
B) subsystem testing, acceptance testing, integration testing, module testing
C) acceptance testing, integration testing, subsystem testing, module testing
D) module testing, integration testing, subsystem testing, acceptance testing
Answer: A
Page Ref: 366
8) A conversion strategy whereby an organization continues to operate the old system together
with the new one for one or more cycles, until the new system is working properly and the old
system can be discontinued, is called a:
A) pilot strategy.
B) phased strategy.
C) cutover strategy.
D) parallel strategy.
Answer: D
Page Ref: 367
9) A conversion strategy whereby the new system is first implemented in only part of the
organization to solve any problems before implemented in the rest of the organization is called a:
A) pilot strategy.
B) phased strategy.
C) cutover strategy.
D) parallel strategy.
Answer: A
Page Ref: 367
10) The following diagram depicts which of the following conversion strategies?
A) parallel strategy
B) phased strategy
C) pilot strategy
D) entrepreneurial strategy
Answer: B
Page Ref: 367, Fig. 9.4
11) The following diagram depicts a cutover conversion strategy. Which of the following best
characterizes this type of conversion strategies?
A) costly
B) time consuming
C) risky
D) all of the above
55
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Answer: C
Page Ref: 367
13) Which of the following is not typically the responsibility of an IT project manager?
A) approve funds for the project
B) oversee multiple project phases
C) determine how long each development task will take
D) form a project team with appropriate knowledge and skills
Answer: A
Page Ref: 370
15) Which prototyping step is not the responsibility of the system builders?
A) develop initial prototype
B) use prototype and note desired changes
C) revise and enhance prototype
D) assist with converting the prototype to an operational system
Answer: B
Page Ref: 374
56
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) Which of the following is not an advantage of prototyping?
A) Only basic system requirements are needed at the front-end of the project.
B) End-prototype typically has more security and control features than a system developed with
an SDLC process.
C) Strong top-down commitment may be less necessary at the outset of the project.
D) User acceptance is likely to be higher than with a system developed using an SDLC process.
Answer: B
Page Ref: 375
18) When prototyping is incorporated into a traditional SDLC approach, it is most commonly
included as part of which of the following steps?
A) requirements definition
B) feasibility analysis
C) system design
D) system building
Answer: A
Page Ref: 376
19) Which of the following best describes a common prototyping goal when it is used as part of a
prototyping/piloting approach?
A) to establish and demonstrate basic concepts of the new system and to get buy-in from key
stakeholders
B) to demonstrate the technical feasibility of the new system
C) to test a complex system
D) both A and B
Answer: D
Page Ref: 377
20) Which of the following is a technique where a team of users and IS specialists engage in an
intensive session to minimize the total time required for gathering information from multiple
participants?
A) RAD
B) Piloting
C) JAD
D) CASE
Answer: C
Page Ref: 377
57
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) A software tool used to automate one or more steps of a software development methodology
is referred to as:
A) RAD.
B) Piloting.
C) JAD.
D) CASE.
Answer: D
Page Ref: 378
22) All of the following are considered advantages to using RAD methodology, except:
A) dramatic savings in development time.
B) system quality much higher than with SDLC.
C) focuses on essential system requirements.
D) ability to rapidly change system design at user request.
Answer: B
Page Ref: 378-379
23) Which is a potential advantage of having an application developed by a business user, rather
than an IS professional?
A) The system requirements do not have to be explained to an IS analyst.
B) If the system is a high priority for a business unit, it does not have to compete with other
business units for IS personnel to work on it.
C) Business managers have more control over the development costs for the application.
D) all of the above
Answer: D
Page Ref: 382
24) Which is not a potential disadvantage of having an application developed by a business user,
rather than an IS professional?
A) A similar application may already exist in another business unit, so it could be a redundant
effort.
B) Users typically pay more attention to system controls for ensuring data quality and security,
and therefore development costs are higher.
C) It is common for user developers to change jobs.
D) User-developed systems are frequently less well documented.
Answer: B
Page Ref: 382
25) What three characteristics should be evaluated by organizations when choosing whether or
not to have a non-IS professional develop a new application?
A) application, development tool, and telecommunications characteristics
B) training classes attended by user, IS professional certifications, security issues
C) application, development tool, and developer characteristics
D) number of years developer has been in the organization, the application size, and the cost of
the development tool
Answer: C
Page Ref: 384, Fig. 9.15
58
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) What is a specific characteristic of an application that can be important for determining the
potential risks of developing a new business application by an employee with no professional IS
training?
A) the number of users of the application
B) the potential impact on operations or decisions based on the application
C) the average age of the developer
D) both A and B
Answer: D
Page Ref: 384
29) The agile method that emphasizes independent project teams, coordination and
communication between and within teams with lots of team meetings, iterative and continuous
monitoring of work, team ownership of the final product is called:
A) XML.
B) RAD.
C) Scrum.
D) JAD.
Answer: C
Page Ref: 381
30) Which of the following is not a key guideline for managing day-to-day interactions with
outsourced staff?
A) communicate frequently
B) closely monitor and manage the work of the outsourcer's staff
C) create a centralized project management office
D) hire offshore legal expertise for writing contracts
Answer: B
Page Ref: 382
59
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
31) The parallel strategy of installing a new system is the riskiest method of installation because
the old system is abandoned as soon as the new system is implemented.
Answer: FALSE
Explanation: The cutover (or cold turkey) strategy is riskiest.
Page Ref: 367
32) The Construction phase of the SDLC involves installation and operations of the new system.
Answer: FALSE
Explanation: These steps are part of the Implementation phase.
Page Ref: 365, Fig. 9.1
33) The SDLC methodology is the best methodology when an application needs to be quickly
developed.
Answer: FALSE
Explanation: The SDLC is a very time-consuming process.
Page Ref: 371
34) Agile methodologies are especially useful for developing smaller systems rather than
largescale transaction processing applications.
Answer: TRUE
Page Ref: 377
35) A type of testing where the objective is to make sure that the system performs reliably and
does what it is supposed to do in a user environment is referred to as user acceptance testing.
Answer: TRUE
Page Ref: 366
36) When a change made to one part of a system results in unexpected changes to another part of
the system, it is commonly referred to as a ripple effect.
Answer: TRUE
Page Ref: 369
37) Some consultants have claimed that up to one-third of all spreadsheets contain errors, which
can include mechanical errors (typos), errors in logic, as well as errors in omission.
Answer: TRUE
Page Ref: 383, textbox
60
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
======CH10==============
1) When considering the purchase of a major software application, managers need to also
consider the following potential downside:
A) It is typically more expensive than custom development.
B) The package seldom totally fits the company's needs.
C) It takes much longer to implement because of the software's complexity.
D) There is no documentation.
Answer: B
Page Ref: 391
3) If an organization purchases a software package and does not modify or add to the package in-
house, the construction phase then is often limited to which step?
A) system design
B) system building
C) system testing
D) feasibility analysis
Answer: C
Page Ref: 398
4) When comparing a traditional SDLC and a purchasing life cycle methodology, which step is
found in a modified SDLC approach but not in a traditional SDLC?
A) feasibility analysis
B) requirements definition
C) establish evaluation criteria
D) system testing
Answer: C
Page Ref: 392, Fig. 10.1
61
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
5) When purchasing a software package, a successful definition phase ends with a(n):
A) system testing plan.
B) vendor contract.
C) system design.
D) RFP.
Answer: B
Page Ref: 396, Fig. 10.1
8) The requirements definition for a purchased system is ________ detailed than the
requirements used to build a prototype, and ________ detailed than the requirements needed to
design a custom system.
A) more, less
B) less, more
C) more, more
D) less, less
Answer: A
Page Ref: 392
9) Which criterion should a firm consider when evaluating candidate software packages?
A) functional capabilities of the packaged system
B) technical requirements the software must satisfy
C) business characteristics of the vendor firm
D) all of the above
Answer: D
Page Ref: 395
62
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
10) The acronym RFP stands for:
A) request for proposal.
B) requirement for program.
C) review of product.
D) request for product.
Answer: A
Page Ref: 395
11) In addition to evaluating the vendors' responses from the formal RFP process, what other
type of data collection for a leading candidate package is recommended?
A) software demonstration of the package
B) references from users of the software package in other companies
C) in-house user acceptance test results
D) both A and B
Answer: D
Page Ref: 396
12) When matching a company's needs with the capabilities of a software package, an alternative
to address a mismatch is:
A) modify the software package.
B) change business procedures to match the software.
C) both A and B
D) none of the above
Answer: C
Page Ref: 397, Fig. 10.6
13) Which of the following statements about choosing alternative packages is false?
A) It is likely that there will be discrepancies between the organization's needs and the package's
capabilities.
B) If modifications are made to a package, it will not impact what modifications may need to be
made when the vendor releases an upgraded version of the package.
C) Procedural assumptions incorporated into a package may be better ways of doing things than
the company's current procedures.
D) none of the above
Answer: B
Page Ref: 397, Fig. 10.6
63
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
15) With a cost-reimbursement type of contract, the greatest risk is assumed by:
A) the purchasing company.
B) the vendor.
C) both the purchasing company and the vendor.
D) neither the purchasing company nor the vendor.
Answer: A
Page Ref: 398
16) With a fixed-price contract, the greatest risk is typically assumed by:
A) the purchasing company.
B) the vendor.
C) both the purchasing company and the vendor.
D) neither the purchasing company nor the vendor.
Answer: B
Page Ref: 398
18) Which of the following is a factor that can affect the success of the installation plan for a
purchased package?
A) vendor support before the installation
B) vendor support after Go Live
C) the number of different business units implementing the software and their locations
D) all of the above
Answer: D
Page Ref: 399
64
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
20) Which of the following activities is not part of the installation step of the SDLC for a
purchased package?
A) installation planning
B) data cleanup
C) acceptance testing
D) user Training
Answer: C
Page Ref: 399
21) Which of the following statements about having a vendor perform package maintenance is
false?
A) The vendor may go out of business before the clinet wishes to stop using the system.
B) Vendors continue to support all prior versions of a package.
C) New versions of a system may include undesired changes.
D) A well-designed contract with a vendor can result in considerable cost avoidance over the life
of the system.
Answer: B
Page Ref: 400
23) If extensive changes in business processes and procedures are needed to effectively
implement the purchased software, business managers are typically asked to take the role of:
A) attorney.
B) project manager.
C) purchasing specialist.
D) all of the above
Answer: B
Page Ref: 400
65
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
25) A primary advantage of purchasing an existing software package rather than developing a
custom application is:
A) being the first to test the system.
B) less time needed for the implementation phase.
C) an application that takes into account unique organizational needs.
D) IS people resources can be dedicated to projects for systems that can't be purchased.
Answer: D
Page Ref: 402, Fig. 10.7
28) Which of the following statements about purchasing enterprise system packages is false?
A) ERP systems require training on how to write interfaces and queries.
B) A risk of purchasing ERP systems is the dependence on a single vendor for all core business
processes.
C) ERP systems typically involve a lot of custom interfaces to legacy systems.
D) ERP systems are very expensive to purchase.
Answer: C
Page Ref: 403
29) Which of the following is not a critical success factor for ERP project success?
A) Project leaders should have prior experience with large scale systems.
B) Third party consultants should transfer their knowledge, not just implement.
C) Top management should be engaged in the project to ensure managerial buy-in.
D) The ERP system should be customized to match current business processes.
Answer: D
Page Ref: 404
66
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
30) Which is not an advantage of open source software?
A) Complete documentation for the software is freely available.
B) The acquisition cost is the same for one copy or thousands of copies.
C) The source code can be modified to add new features.
D) The organization is not dependent on one vendor or proprietary code.
Answer: A
Page Ref: 405
32) When there are discrepancies between a package's capabilities and a company's needs, the
only way to deal with the discrepancies is by modifying the package.
Answer: FALSE
Explanation: A company can change procedures to match those of the package, or implement
the package "as is" and work around the differences.
Page Ref: 397
34) Choosing between building a custom application and purchasing a software package is called
a make-or-buy decision.
Answer: TRUE
Page Ref: 391
35) For large enterprise system packages, it is common for companies to contract with a
consulting firm, called a third-party implementation partner, to provide installation and
maintenance support.
Answer: TRUE
Page Ref: 403
36) A company that elects to use a "hosted" application rather than to purchase the software
application and host it on its own equipment, is making use of a(n) application service provider
(or ASP).
Answer: TRUE
Page Ref: 399
37) Open source software is well-suited for very specialized applications and business processes.
Answer: FALSE
Explanation: Generic applications that are common to many organizations are the most viable
applications because they will attract a large community of developers.
Page Ref: 406
67
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
======CH11==============
1) Which of the following is NOT one of the nine project management competencies certified by
the Project Management Institute?
A) conflict management
B) managing project communications
C) risk management
D) integration management
Answer: A
Page Ref: 410, Fig. 11.1
2) Applying knowledge, skills, tools, and techniques to a broad range of activities in order to
meet the requirement of a particular project is called:
A) project management.
B) life-cycle management.
C) change management.
D) program management.
Answer: A
Page Ref: 411
3) Which of the following competencies certified by the Project Management Institute has been
developed recently?
A) scope
B) time
C) procurement (including contract management)
D) cost
Answer: C
Page Ref: 410
5) The organizational unit responsible for ensuring that standard approaches to project
management are utilized across projects is called the:
A) Program Management Office.
B) PMI.
C) Portfolio Management Team.
D) Project Oversight Committee.
Answer: A
Page Ref: 411
6) Using the scheme proposed by Denis et al (2004) for prioritizing systems projects, which
statement is true?
A) Absolute Must and Highly Desired/Business-Critical projects are typically funded in the year
submitted.
B) Wanted projects with an ROI greater than 12 months are never funded.
C) Nice to Have projects are typically outsourced.
D) all of the above
Answer: B
Page Ref: 411-12
7) What would not typically be a part of a business case for a new systems project?
A) expected business benefits
B) initial development costs
C) ongoing costs for operations and maintenance
D) all of the above
Answer: D
Page Ref: 411
9) A project sponsor usually participates in which of the following activities associated with a
new project?
A) development of the initial project proposal
B) an assessment of the detailed system design
C) ensuring resources are available for the project team
D) both A and C
Answer: D
Page Ref: 413
70
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) The process of identifying the phases and sequence of tasks that need to be accomplished to
meet a project's goals is known as:
A) timeboxing.
B) work breakdown analysis.
C) project scheduling.
D) milestone analysis.
Answer: B
Page Ref: 417
12) A common pitfall in developing a master schedule for a project is a failure to:
A) understand the interdependencies among project tasks and subtasks.
B) identify all of the project tasks and subtasks.
C) correctly estimate the number of resources needed to complete the tasks.
D) correctly estimate the total time needed to complete all tasks.
Answer: A
Page Ref: 417
13) Which of the following is a characteristic of the bottom-up method for estimating a project's
cost?
A) Cost elements are estimated only at the lowest task level.
B) Cost elements are estimated using the last project after adjusting for inflation.
C) Cost elements are aggregated from subordinate tasks.
D) none of the above
Answer: C
Page Ref: 417
14) According to Frame (1994), which of the following is not a trap that inexperienced cost
estimators fall into?
A) They are too optimistic about what is needed to do the job.
B) They tend to leave components out that should be estimated.
C) They do not use a consistent estimation methodology.
D) They do not rely on historical project costs.
Answer: D
Page Ref: 417
71
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) A project charter describes:
A) the project's broad objectives, but not its intended scope.
B) any unknown constraints.
C) the estimated project benefits.
D) all of the above
Answer: C
Page Ref: 415
17) The project management chart that graphically models the sequence of project tasks and their
interrelationships using a flowchart diagrams is called a:
A) Gantt chart.
B) PERT chart.
C) work breakdown.
D) project charter.
Answer: B
Page Ref: 420, Fig 11.6
18) Which of the following graphically depicts the estimated times (and later, the actual times)
for each project task against a horizontal timescale?
A) Gantt chart
B) PERT chart
C) work breakdown
D) project charter
Answer: A
Page Ref: 421, Fig. 11.7
19) According to Kappelman et al. (2006), which is one of the people-related early warning signs
of IT project failure?
A) inadequate business stakeholder involvement or participation in the project
B) subject matter experts (SMEs) in the business are overscheduled
C) both A and B
D) none of the above
Answer: C
Page Ref: 423
72
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) The highest level of project risk typically occurs at what stage of a project's life?
A) during the beginning of a project
B) after the planning stage
C) during the execution and control stage
D) none of the above
Answer: A
Page Ref: 424
22) Which of the following is a common risk avoidance and mitigation strategies?
A) assigning the best human resources available to reduce a specific type of project risk
B) choosing an alternative technical approach to avoid risk exposure
C) subcontracting a specific deliverable to a third-party
D) all of the above
Answer: D
Page Ref: 424, Fig. 11.11
23) According to Keil and Robey (1999), a common pitfall in monitoring the risks of a project
already underway is:
A) relying too heavily on the use of consultants.
B) failing to increase the resources working on the project.
C) ignoring negative feedback.
D) all of the above
Answer: C
Page Ref: 424
24) According to Markus (1983), resistance to the implementation of a new information system
is commonly due to:
A) the complexity of the new system.
B) the selected hardware.
C) changes in the managerial power structure due to the new system.
D) fear of computers.
Answer: C
Page Ref: 424
25) Which of the following is not one of the three stages of the Lewin/Schein change model?
A) unfreezing stage
B) moving stage
C) refreezing stage
D) transitioning stage
Answer: D
Page Ref: 424
73
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) What is a common question to ask as part of a post-project review?
A) Who did something wrong?
B) What went wrong on this project, not what went right?
C) What could the project leaders have done differently?
D) all of the above
Answer: C
Page Ref: 426, Fig. 11.12
27) Which of the following is a major change management activity associated with successful IT
projects?
A) communications about the project to all affected employees
B) training on the system and process changes
C) the need for incentives to key team members
D) all of the above
Answer: D
Page Ref: 424
28) Virtual teamwork introduces IT project risk due to which of the following factors?
A) differences in communication norms across working groups
B) unfamiliarity with a team member's culture
C) lack of trusting relationships across team members
D) all of the above
Answer: D
Page Ref: 427
29) The project champion is a business manager who has high credibility as an organizational
spokesperson among the user community, and is successful at communicating the business
vision and project benefits.
Answer: TRUE
Page Ref: 413
30) A PERT (or CPM) chart graphically depicts the estimated times for each project task against
a horizontal time line, for displaying a project schedule and for tracking the progress of a set of
tasks against the project plan.
Answer: FALSE
Explanation: This is a description of a Gantt chart.
Page Ref: 421
31) Additional project management skills are needed when using offsite and offshore resources
for new application development.
Answer: TRUE
Page Ref: 427
32) Greater changes in business processes are associated with "vanilla" implementations of
software packages.
Answer: TRUE
Page Ref: 419
74
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
33) Some organizations have found the use of red-yellow-green (traffic light) symbols effective
in communicating problem areas to project oversight committees.
Answer: TRUE
Page Ref: 422
======CH12================
1) A(n) ________ is a written expression of the desired future about how information will be
used and managed in the organization.
A) information resource assessment
B) information vision
C) IT architecture
D) strategic IS plan
Answer: B
Page Ref: 524
2) The ________ contains a set of longer-term objectives (often three to five years) that represent
measurable movement toward the information vision and IT architecture and a set of associated
major initiatives that must be undertaken to achieve these objectives.
A) business strategic plan
B) operational IS plan
C) strategic IS plan
D) information resource assessment
Answer: C
Page Ref: 526
5) According to the process described in the textbook, which of the following steps in the
information resources planning process would come first?
A) vision for the business
B) IT architecture
C) strategic IS plan
D) assessment of current information resources
Answer: D
Page Ref: 520, Fig. 12.1
7) Which of the following is not a typical approach for formulating a strategic IS plan?
A) value chain analysis
B) SWOT analysis
C) setting forth project budgets and schedules
D) translating the organization's vision into a set of major initiatives that describes how to
accomplish the organization's vision of its future
Answer: C
Page Ref: 526-32
9) Which stage of IT architecture maturity seeks to both achieve the flexibility needed by local
business units and to retain enterprise-wide standards, such as with ERP systems, for a
multinational firm?
A) Application Silos
B) Standardized Technology
C) Rationalized Data and Process
D) Modularity
76
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Answer: D
Page Ref: 525
10) The strategic IS planning process consists of all of the following steps except:
A) setting objective or goals.
B) conducting internal and external analyses.
C) defining the IS mission statement.
D) establishing strategic initiatives.
Answer: C
Page Ref: 526
77
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) While conducting internal and external analyses, a firm may develop a series of four
statements that together make up a SWOT analysis. SWOT stands for:
A) strategies, weaknesses, objectives, and targets.
B) systems, weaknesses, opportunities, and targets.
C) strengths, weaknesses, objectives, and threats.
D) strengths, weaknesses, opportunities, and threats.
Answer: D
Page Ref: 528, Fig. 12.7
13) In a value chain analysis, which is not a method of establishing a competitive advantage in
an industry?
A) make products/services more desirable by offering unique features
B) establish stronger links with suppliers to obtain lower-cost, higher-quality materials
C) replicate other successful companies' IT architectures
D) inhibit the entry of competitors by raising the stakes for competing in the market
Answer: C
Page Ref: 529
14) All of the following are primary value chain activities except:
A) inbound logistics.
B) human resource management.
C) operations.
D) service.
Answer: B
Page Ref: 531, Fig. 12.10
15) In the value chain of Porter and Millar, which of the following are support activities?
A) inbound logistics
B) information technology
C) human resources
D) both B and C
Answer: D
Page Ref: 531, Fig. 12.10
78
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) Operational IS plans include plans for projects, such as:
A) expected benefits.
B) due dates.
C) priorities.
D) all of the above
Answer: D
Page Ref: 532
20) According to the textbook, which of the following is not a potential benefit of information
resources planning?
A) provides a context for IS resource decisions
B) aligns IS and business goals
C) balances tradeoffs between standardization and agility goals
D) makes products/services more desirable than those of current competitors
Answer: D
Page Ref: 520
21) The information technology architecture depicts how the technological and human assets of
the IS organization should be organized to support the organization's operating model and its
information vision.
Answer: TRUE
Page Ref: 524
79
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
22) A critical success factor (CSF) approach is a well-known method for identifying strategic IT
opportunities by eliciting input from key managers about information needs and processes most
important to the success of a business function or to the entire organization.
Answer: TRUE
Page Ref: 527
23) The strategic IS plan contains a set of short-term objectives that represent measureable
movement toward the intended performance metrics.
Answer: FALSE
Explanation: This plan sets longer-term objectives (often 3 to 5 years).
Page Ref: 565
======CH13==============
1) Which of the following has led to changes in the IS role within today's organizations?
A) rapid technological changes in information technology
B) the extent to which IS plays a strategic role in the organization
C) the pervasiveness of IT in business activities
D) all of the above
Answer: D
Page Ref: 536
4) An IS steering committee or advisory board is typically not effective at which of the following
tasks?
A) approving system design documents
B) setting priorities for systems development projects
C) monitoring progress of IT projects against established timelines and budgets
D) developing shared business/IT responsibility and accountability
Answer: A
Page Ref: 553
5) The most common benefit from offshore outsourcing to a business in a developed country is:
A) higher quality of services.
B) cost savings due to lower labor market costs.
C) the ability to expand globally.
D) use of state-of-the-art technology.
Answer: B
Page Ref: 556
81
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
6) According to a survey of U.S. managers, which of the following IS skills are likely to be least
critical to maintain in-house and most likely to be outsourced?
A) project management skills
B) business domain skills
C) systems analysis and design skills
D) computer programming with a 3rd-generation language
Answer: D
Page Ref: 552, Fig. 13.14
8) The standard performance metrics for new applications projects include all of the following
except:
A) high-quality
B) delivered on time
C) defined processes
D) within budget
Answer: C
Page Ref: 549
10) Chargeback transfer prices are often established for all of the following except:
A) IS personnel time.
B) number of IS managers on staff.
C) disk file space utilized.
D) usage of help desk support.
Answer: B
Page Ref: 541
82
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) Application outsourcing to countries that are geographically closer to a company's
headquarters and in an overlapping time zone is referred to as:
A) proximity development centers.
B) near-shore outsourcing.
C) multisourcing.
D) captive sourcing.
Answer: B
Page Ref: 557
12) ________ IS governance designs are often found in organizations with highly autonomous
business units that see no major benefits from sharing IS applications and other IT resources.
A) Customized
B) Centralized
C) Decentralized
D) Federal
Answer: C
Page Ref: 537
13) Organizations that choose a ________ design are attempting to achieve the benefits of both
the centralized and decentralized designs by centralizing computer operations and decentralizing
application development and maintenance.
A) classic
B) federal
C) mixed
D) split
Answer: B
Page Ref: 537
15) Which of the following is a popular tool used to assess the overall performance of the IS
organization, not just the financial impacts?
A) chargeback system
B) business manager satisfaction surveys
C) financial cost-benefit analysis
D) balanced scorecard
Answer: D
Page Ref: 554
83
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) Which performance metric is not part of the typical balanced scorecard?
A) effective governance model
B) innovation learning
C) customer satisfaction
D) financial performance
Answer: A
Page Ref: 554
21) Which of the following is not an IT asset that IS leaders are responsible for managing?
A) technology asset
B) outsourcing asset
C) human resources asset
D) business/IT relationship asset
Answer: B
Page Ref: 536
84
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
22) "Best shore" outsourcing refers to:
A) using a vendor based on the East or West coast of the U.S.
B) using a vendor that is geographically closest to the client firm headquarters.
C) keeping all IS work in-house.
D) choosing the best geographic site where the client firm already has a presence.
Answer: D
Page Ref: 557
25) The ITIL framework was developed by a branch of the British government to provide
standardization in chargeback systems.
Answer: FALSE
Page Ref: 542
26) A shared services unit may include not only the IS organization but also other functional
support organizations (such as legal or human resource departments).
Answer: TRUE
Page Ref: 538
27) Many technology decisions involve trade-off decisions from a service delivery perspective.
Answer: TRUE
Page Ref: 539
28) When to abandon a legacy system, versus continuing to incur application maintenance costs,
is a key application management issue.
Answer: FALSE
Page Ref: 548
85
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
29) In many organizations, an IS steering committee or advisory board is responsible for
approving and prioritizing IT investments.
Answer: TRUE
Page Ref: 553
30) Decentralized IS designs are found in companies with highly autonomous business units that
can achieve only minimal benefits from sharing IS operations or applications with other business
units.
Answer: TRUE
Page Ref: 537
31) Physically locating IS personnel within the business units they are supporting is a common
mechanism for fostering strong business/IT relationships.
Answer: TRUE
Page Ref: 598
======CH14==============
1) What is the approximate total business loss (in U.S. dollars) resulting from the largest reported
customer data security breach to date involving retailers or financial institutions as of 2010?
A) 876,000
B) 4.2 million
C) 16.7 million
D) 1 billion
Answer: D
Page Ref: 562
2) When a web site mimics a legitimate site for the purpose of misleading or defrauding an
Internet user, it is called:
A) identity theft.
B) illegal spam e-mail
C) spoofing.
D) phishing.
Answer: C
Page Ref: 564
86
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
3) Hackers can be differentiated from crackers by:
A) the types of targets they select.
B) the tools that they use.
C) their level of malicious intent.
D) whether they are internal or external to the target organization.
Answer: C
Page Ref: 562
4) Which type of employee does not need to be aware of basic types of information security
technologies?
A) business managers
B) managers who only work on IT applications
C) the CSO
D) none of the above
Answer: D
Page Ref: 561
5) Research has shown that an organization's inability to return to normal business activities after
a major disruption is a key predictor of:
A) business survival.
B) business renewal.
C) business growth.
D) business start.
Answer: A
Page Ref: 571
9) What is the best term to describe those who break into computers to steal information, wipe
out hard drives, or do others harm?
A) cyber terrorists
B) computer felons
C) hackers
D) crackers
Answer: D
Page Ref: 562
10) Why is it difficult for companies to manage their e-mail on their own private subnets?
A) Individuals within organizations can make copies and save them.
B) Individuals can forward copies to others.
C) Individuals do not completely remove them from their storage devices.
D) all of the above
Answer: D
Page Ref: 572, textbox
88
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) Determining a Return Benefit for a specific security action is based on which of the
following?
A) annualized Expected Losses and Annualized Cost of Actions
B) benefits of remote PC access
C) electronic records management
D) none of the above
Answer: A
Page Ref: 567, Fig. 14.4
12) What are sources to use to calculate a single loss expectancy as part of a risk assessment?
A) historical experiences of the organization
B) industry averages
C) recent incidents only (typically the past 6 months)
D) both A and B
Answer: D
Page Ref: 565
13) Which organizational position is directly responsible for the balancing of an organization's
security risks with the costs to avoid them?
A) the CEO
B) the CFO
C) the CSO
D) the CIO
Answer: C
Page Ref: 565
14) Which of the following is one of the areas in which controls are assessed by auditors using
the COSO framework?
A) Risk Assessment
B) monitoring
C) Control Environment.
D) all of the above
Answer: D
Page Ref: 568
15) Which of the following is not one of the rules that the GLBA gives federal agencies and
states the ability to enforce?
A) Financial Privacy Rule
B) Credit Information Rule
C) Safeguards Rule
D) none of the above
Answer: B
Page Ref: 569
89
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) What effect does The PATRIOT Act passed by Congress have on the U.S. government's
ability to access an individual's personal information?
A) significantly strengthens
B) significantly weakens
C) has no effect
D) none of the above
Answer: A
Page Ref: 569
17) What are some of the benefits to organizations with written privacy policies?
A) justification for quickly removing employees who behave improperly.
B) compliance with one part of SOX.
C) better ability to be insured.
D) all of the above
Answer: D
Page Ref: 569
18) Which of the following is not one of the common policy areas generally included in an
information security policy?
A) Access Control Policies (e.g., password controls)
B) External Access Policies (e.g., accessing the Web and Internet)
C) Usage of Social Security Number Policies. (e.g., whether it is an identifier)
D) Acceptable Use Policies (e.g., usage of organization's computer resources)
Answer: C
Page Ref: 570
19) Putting plans in place to ensure that employees and business processes can continue when
faced with any major unanticipated disruption is called:
A) Business Contingency Planning.
B) Disaster Recovery Planning.
C) Business Continuance Planning.
D) Business Continuity Planning.
Answer: D
Page Ref: 571
20) What are some means to deal with key information security management issues?
A) Managers must determine what their real information assets are and assign values and
priorities for them.
B) Managers must determine how long the organization can function without a specific
information asset.
C) Departmental managers and the owners of the information assets need to develop and
implement the security procedures to protect all major information assets.
D) all of the above
Answer: D
Page Ref: 565
90
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) Which position is responsible for continually assessing an organization's information security
risks and developing and implementing effective countermeasures?
A) CSO or CISO
B) CEO
C) COSO
D) all of the above
Answer: A
Page Ref: 565
23) What should an ERM manager (or an ERM committee) be responsible for?
A) defining what constitutes an electronic transaction
B) classifying specific records based upon their importance, regulatory requirements, and
duration.
C) formulating and managing SOX compliance
D) all of the above
Answer: B
Page Ref: 573
25) The Sarbanes-Oxley act requires officers of publicly traded companies in the U.S. to certify
that:
A) the organization has a CIO.
B) they are responsible for establishing and maintaining internal financial controls.
C) the organization has a CSO.
D) all email over one year old has been securely deleted.
Answer: B
Page Ref: 568
91
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) Creating a BCP in the U.S. requires:
A) inventorying all desktop PCs, but not laptops.
B) keeping files on magnetic tape.
C) identifying interdependencies between critical business processes and business units.
D) following Federal Rules of Civil Procedure.
Answer: C
Page Ref: 571
27) Which of the following is the recommended means for disseminating an organization's
information security policy?
A) hardcopy distributions to all employees, not just new employees
B) email distributions
C) posting the policy on the organization's intranet
D) all of the above
Answer: D
Page Ref: 570
29) A worm is a virus that has the ability to copy itself from machine to machine, usually over a
network.
Answer: TRUE
Page Ref: 562, Fig. 14.1
30) Due to several recent laws regarding information security, it is a good practice to provide
existing civil and criminal laws rather than have a company-specific information security policy.
Answer: FALSE
Page Ref: 570
31) Primary sources of thefts of intellectual property rights, trade secrets, and research and
development knowledge are employees.
Answer: TRUE
Page Ref: 562
32) The goal of the IS manager responsible for information security is to eliminate all
information risk.
Answer: FALSE
Page Ref: 565
92
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
33) Electronic Records management (ERM) practices became a more important information
security management issue in the U.S. in 2006 when new legislation established new rules for
timely information gathering in response to potential litigation.
Answer: TRUE
Page Ref: 573
======CH15==============
1) Which is not a social problem that is perceived to have increased due to information
technology?
A) the theft of personal information
B) increased potential for exploitation of children (child pornography)
C) theft of an organization's intellectual property
D) difficulties in connecting with people in other regions of the world
Answer: D
Page Ref: 575
2) Which of the following is not a reason that legal systems in developed countries have not kept
up with available information technologies?
A) Technology changes very quickly.
B) Those who create laws generally have little expertise with complex IT issues.
C) The existing laws can easily be reinterpreted to apply to new technologies.
D) Laws are difficult to create in an Internet age when it is difficult to determine which country
has legal jurisdiction.
Answer: C
Page Ref: 575
3) Ethical problems associated with the use of IT may affect all of the following except:
A) managers.
B) stockholders.
C) customers.
D) all of the above
Answer: D
Page Ref: 576
93
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
4) Approximately what percentage of the U.S. public is quite sensitive to the loss of privacy of
their personal information?
A) 5%
B) 10%
C) 25%
D) 50%
Answer: C
Page Ref: 579
5) Which large Internet advertising company has caused concerns among privacy organizations
due to its purchase or alliance with other companies?
A) DoubleClick
B) ClickTrack
C) AdClick
D) Google
Answer: A
Page Ref: 581
7) According to the textbook, which of the following is also an ethical behavior that is
recognized by most world religions?
A) do no harm
B) treat others as you would like them to treat you
C) forbid killing
D) no stealing
Answer: B
Page Ref: 578
8) In the context of developing and using IT, what is the common flaw in ethical reasoning?
A) ignoring the developers
B) ignoring members of your organization
C) ignoring members of your segment of society
D) ignoring some affected parties
Answer: D
Page Ref: 578
9) Sending an e-mail that falsely claims to be a legitimate enterprise in an attempt to scam the
user into providing private information is called:
A) spoofing.
94
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
B) cracking.
C) hacking.
D) phishing.
Answer: D
Page Ref: 584
10) Which is not true about the impacts of identity theft today?
A) the number of Americans affected is on the increase
B) financial losses due to identity theft of Americans is on the increase
C) losses by credit card companies have increased because these companies absorb the cost if
your credit card is misused
D) none of the above
Answer: D
Page Ref: 584
95
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11) Which of the following is true about investigations of identity theft in the U.S. today?
A) Banks don't pursue all potential cases because of the high cost of investigating.
B) Police don't vigorously pursue cases even though money has been taken from the victim.
C) It is a U.S. federal crime.
D) both A and C
Answer: D
Page Ref: 584
14) When a customer wants to "opt-out" from a U.S. company sharing his or her information
with third parties:
A) the financial institution has no obligation to comply with this request.
B) it often takes a lot of effort and time for customers to understand how to accomplish it.
C) a written request from a government official is required.
D) all of the above
Answer: B
Page Ref: 582
15) The U.S. position on privacy can be characterized as being favorable toward:
A) a restricted flow of data among companies.
B) consumer data are primarily viewed as a saleable, usable asset that belongs to the corporation
that collected the data.
C) having its citizens be in control of their personal data.
D) a more protective position of personal rights with respect to data about individuals than the
European position.
Answer: B
Page Ref: 582
96
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) According to the Federal Trade Commission, "someone appropriating your personal
information without your knowledge to commit fraud or theft" is called:
A) an identity theft.
B) a credit information theft.
C) an intellectual property theft.
D) internet file sharing.
Answer: A
Page Ref: 583
17) Advances in artificial intelligence can raise social and ethical issues because:
A) computers can sift through mountains of data better than humans.
B) computers can be programmed to replace human experts in the workplace.
C) the degree to which a robot acts ethically depends on how it is programmed.
D) all of the above
Answer: D
Page Ref: 591
19) In the U.S., the only federal law that limits employer surveillance of its workers is related to:
A) eavesdropping on spoken personal conversation.
B) reading employees e-mails.
C) videotaping workers.
D) recording employee phone calls.
Answer: A
Page Ref: 582
20) Which of the following regions has the lowest rate of software piracy?
A) North America
B) Western Europe
C) Asia/Pacific
D) Latin America
Answer: A
Page Ref: 586
97
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21) Which of the following prevents someone else from creating another computer program that
does the same thing as a copyrighted program?
A) patents.
B) copyrights.
C) all of the above
D) none of the above
Answer: A
Page Ref: 586
22) What type of impact on the software industry from awarding a large number of patents to IT
industry giants such as Microsoft has been documented?
A) the overall number of infringement lawsuits is decreased
B) it accelerates innovations among smaller firms
C) the growth of small software firms is inhibited
D) none of the above
Answer: C
Page Ref: 587
25) Recent piracy rates for music CDs were highest in:
A) African countries.
B) Indonesia and Paraguay.
C) Western Europe.
D) United States.
Answer: B
Page Ref: 586
98
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26) Swapping or sharing music on the Internet:
A) first gained widespread popularity with the advent of Napster.
B) was upheld by U.S. courts, which meant Napster was able to remain in business.
C) was first made possible with the use of B2C files.
D) cannot be traced so people cannot be prosecuted.
Answer: A
Page Ref: 587
27) In 2007, Microsoft asserted that 235 company patents were infringed upon by open source
programs. What effect did this announcement have?
A) IBM also filed dozens of lawsuits to enforce these patents
B) open source organizations filed lawsuits alleging that Microsoft is infringing upon their
patents
C) it slowed down the growth of open source communities.
D) public backlash caused Microsoft to withdraw the statements
Answer: C
Page Ref: 587
28) Which of the following is true regarding personal financial credit reports?
A) they rarely contain inaccurate data
B) inaccuracies are not usually spotted because many individuals do not review their reports
regularly
C) there are no laws that govern them
D) they are easily corrected if found inaccurate
Answer: B
Page Ref: 590
29) In a recent survey, what percentage of students studying in a sample of U.S. colleges and
universities said it is always wrong to pirate music and movies?
A) 10%
B) more than 10% but less than 25%
C) about 50%
D) 90%
Answer: B
Page Ref: 589
30) Amazon.com settled a lawsuit with Barnes and Noble in March 2002 that centered on the
infringement of what patent?
A) the personalization of content on an e-commerce site
B) the use of cookies to track patterns across visits
C) its "one-click-ordering" process
D) the "buy it now" feature
Answer: C
Page Ref: 587
99
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
31) The U.S. has much stronger privacy laws and practices than Europe.
Answer: FALSE
Page Ref: 583
32) U.S. copyright laws make it illegal to copy software and use it without the software vendor's
permission.
Answer: TRUE
Page Ref: 586
33) A patent gives its creator the exclusive right to the manufacture and use of a new design or
method for a limited period of time.
Answer: TRUE
Page Ref: 586
34) Some ethical issues are viewed differently depending upon the culture in which they arise.
Answer: TRUE
Page Ref: 589
35) According to the Federal Trade Commission (FTC), identify theft is "someone appropriating
your personal information without your knowledge to commit fraud or theft."
Answer: TRUE
Page Ref: 583
100
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall