Introduction To Information Systems 6th Edition Rainer Test Bank
Introduction To Information Systems 6th Edition Rainer Test Bank
Introduction To Information Systems 6th Edition Rainer Test Bank
https://testbankdeal.com/product/introduction-to-information-
systems-6th-edition-rainer-solutions-manual/
https://testbankdeal.com/product/introduction-to-information-
systems-7th-edition-rainer-test-bank/
https://testbankdeal.com/product/introduction-to-information-
systems-canadian-4th-edition-rainer-test-bank/
https://testbankdeal.com/product/introduction-to-information-
systems-canadian-3rd-edition-rainer-test-bank/
Introduction to Information Systems Canadian 4th
Edition Rainer Solutions Manual
https://testbankdeal.com/product/introduction-to-information-
systems-canadian-4th-edition-rainer-solutions-manual/
https://testbankdeal.com/product/introduction-to-information-
systems-canadian-3rd-edition-rainer-solutions-manual/
https://testbankdeal.com/product/management-information-
systems-4th-edition-rainer-test-bank/
https://testbankdeal.com/product/management-information-
systems-3rd-edition-rainer-test-bank/
https://testbankdeal.com/product/management-information-
systems-3rd-edition-rainer-solutions-manual/
Package Title: Test Bank
Course Title: Introduction to IS 6e
Chapter Number: 6
Answers in blue highlight
13. The ____________ protocol enables client application programs to access the other
layers.
A. Application
B. Internet
C. Network interface
D. Transport
Answer: A
Difficulty: Easy
Section: Network Fundamentals
Learning Objective: 2
Bloom: Knowledge
AACSB: Information technology
14. The ____________ protocol places packets on, and receives them from, the network
medium.
A. Application
B. Internet
C. Network interface
D. Transport
Answer: C
Difficulty: Easy
Section: Network Fundamentals
Learning Objective: 2
Bloom: Knowledge
AACSB: Information technology
22. Google’s main business reason for installing fiber in select US cities is to _______.
A. begin competing with the cable distribution giants
B. bring the internet to rural areas
C. generate more web traffic, which generates more ad revenue for them
D. give people an option other than the telecommunications companies who control
existing cable networks
Answer: C
Difficulty: Medium
Section: IT’s About Business: Google Fiber
Learning Objective: 3
Bloom: Knowledge
AACSB: Information technology
24. The internet in _____________ is among the most tightly controlled in the world.
A. China
B. Cuba
C. Russia
D. Vietnam
Answer: B
Difficulty: Easy
Section: IT’s About Business: Internet Access in Cuba
Learning Objective: 3
Bloom: Knowledge
AACSB: Information technology
28. A(n) ____________ portal is for critical business information inside and outside the
organization.
A. Affinity
B. Commercial
C. Corporate
D. Industrywide
Answer: C
Difficulty: Easy
Section: Network Applications: Discovery
Learning Objective: 4
Bloom: Knowledge
AACSB: Information technology
30. Search engines use indexes created by web _________ to provide fast searches.
A. crawlers
B. indexers
C. searchers
D. users
Answer: A
Difficulty: Easy
Section: Network Applications: Discovery
Learning Objective: 4
Bloom: Knowledge
AACSB: Information technology
32. _________ are/is the largest-volume application running over the Internet.
A. Blogs
B. Chat rooms
C. Email
D. Voice
Answer: C
Difficulty: Easy
Section: Network Applications: Communication
Learning Objective: 5
Bloom: Knowledge
AACSB: Information technology
39. Atos’ Zero Email initiative banned __________ as a form of communication _________.
A. email; externally
B. email; internally
C. social networking; externally
D. social networking; internally
Answer: B
Difficulty: Easy
Section: IT’s About Business: Get Rid of E-Mail? Seriously?
Learning Objective: 5
Bloom: Knowledge
AACSB: Information technology
40. When you use Google Drive to work on a document with a classmate, this is considered
_________.
A. crowdsourcing
B. teleconferencing
C. virtual collaboration
D. workflow
Answer: C
Difficulty: Medium
Section: Network Applications: Collaboration
Learning Objective: 6
Bloom: Knowledge, Application
AACSB: Information technology, Application of knowledge
41. The Doritos’ customer-created Super Bowl commercials are an example of _________.
A. crowdsourcing
B. teleconferencing
C. virtual collaboration
D. workflow
Answer: A
Difficulty: Medium
Section: Network Applications: Collaboration
Learning Objective: 6
Bloom: Knowledge, Application
AACSB: Information technology, Application of knowledge
42. When you exchange documents with your co-workers through organization-approved
methods, this is considered __________.
A. crowdsourcing
B. teleconferencing
C. virtual collaboration
D. workflow
Answer: D
Difficulty: Easy
Section: Network Applications: Collaboration
Learning Objective: 6
Bloom: Knowledge, Comprehension
AACSB: Information technology
44. Telepresence requires _________ and costs have ________ in the last 10 years.
A. dedicated rooms; decreased
B. dedicated rooms; increased
C. tele- and video-conferencing capabilities; decreased
D. tele- and video-conferencing capabilities; increased
Answer: A
Difficulty: Easy
Section: Network Applications: Collaboration
Learning Objective: 6
Bloom: Knowledge
AACSB: Information technology
45. E-learning refers to learning supported by __________.
A. an extranet
B. an intranet
C. the internet
D. the web
Answer: D
Difficulty: Easy
Section: Network Applications: Educational
Learning Objective: 7
Bloom: Knowledge
AACSB: Information technology
Answer: False
Difficulty: Easy
Section: What is a Computer Network?
Learning Objective: 1
Bloom: Knowledge
AACSB: Information technology
Answer: False
Difficulty: Easy
Section: Network Fundamentals
Learning Objective: 2
Bloom: Knowledge
AACSB: Information technology
Answer: False
Difficulty: Easy
Section: The Internet and the World Wide Web
Learning Objective: 3
Bloom: Knowledge
AACSB: Information technology
Answer: False
Difficulty: Medium
Section: Network Applications: Collaboration
Learning Objective: 6
Bloom: Knowledge
AACSB: Information technology
Answer: True
Difficulty: Easy
Section: IT’s About Business: Massive Open Online Courses
Learning Objective: 7
Bloom: Knowledge
AACSB: Information technology
6. The internet bandwidth issue is only an economic problem.
Answer: False
Difficulty: Easy
Section: Closing Case
Learning Objective: 2
Bloom: Knowledge
AACSB: Information technology
Answer: True
Difficulty: Easy
Section: Closing Case
Learning Objective: 2
Bloom: Knowledge
AACSB: Information technology
Answer: Broadband
Difficulty: Easy
Section: What is a Computer Network?
Learning Objective: 1
Bloom: Knowledge
AACSB: Information technology
Answer: inexpensive
Difficulty: Medium
Section: Network Fundamentals
Learning Objective: 2
Bloom: Knowledge
AACSB: Information technology
Answer: NAPs
Difficulty: Easy
Section: The Internet and the World Wide Web
Learning Objective: 3
Bloom: Knowledge
AACSB: Information technology
Answer: webcrawlers
Difficulty: Medium
Section: Network Applications: Discovery
Learning Objective: 4
Bloom: Knowledge
AACSB: Information technology
5. Knowledge workers are being called the distributed workforce, which is enabled by the
process called ________________.
Answer: telecommuting
Difficulty: Easy
Section: Network Applications: Communication
Learning Objective: 5
Bloom: Knowledge
AACSB: Information technology
Answer: Workflow
Difficulty: Easy
Section: Network Applications: Collaboration
Learning Objective: 6
Bloom: Knowledge
AACSB: Information technology
1. List and describe the four types of computer networks from largest to smallest. Provide a
wired and wireless example for each.
Answer:
1) PAN – personal area network, short-range network around a person; wired = headset
jack; wireless = Bluetooth
2) LAN – local area network, limited geographical region; wired = computer connected to
printer or Ethernet cable; wireless = WiFi
3) MAN – metropolitan area network; spans a city; wired = plain old telephone system;
wireless = IP systems
4) WAN – wide area network; spans the globe; wired = fiber backbone; wireless = cell
phone network
Difficulty: Medium
Section: What Is A Computer Network? AND Network Fundamentals
Learning Objective: 1, 2
Bloom: Knowledge, Comprehension, Application
AACSB: Written and oral communication, Information technology, Application of knowledge
2. Define client/server computing, packet switching, and TCP/IP. Explain how these three
things make the Internet so powerful and robust.
Answer:
Client/server computing – links two or more computers in an arrangement in which some
machines, called servers, provide computing services for users PCs, called clients; it
makes it really easy to add more and more machines so the growth of the internet is
endless
Packet switching – the transmission technology that divides blocks of text into packets; it
makes the internet faster because people don’t have to “stand in line” for really large
communication streams, breaking them into smaller pieces makes the internet faster
TCP/IP – a file transfer protocol that can send large files of information across sometimes
unreliable networks with assurance that the data will arrive uncorrupted; it makes the
internet reliable and fault tolerant (everyone has to follow the rules and it ensures the data
gets to its destination as intended)
Difficulty: Hard
Section: Network Fundamentals
Learning Objective: 2
Bloom: Knowledge, Comprehension, Evaluation
AACSB: Written and oral communication, Analytical thinking, Information technology
3. What is the difference between the Internet, an intranet, and an extranet? Provide an
example of each. HINT: Providing definitions is not enough to explain the differences.
Answer:
Internet = network of networks that everyone can access; Google, Facebook, e-mail, FTP
run on the internet
Intranet = a network that is internal to an organization and is not available to everyone;
university registration system or course management system
Extranet = a network that connects organizations – an intranet with external access; VPN
Difficulty: Easy
Section: The Internet and the World Wide Web
Learning Objective: 3
Bloom: Knowledge, Comprehension, Application
AACSB: Written and oral communication, Information technology, Application of knowledge
4. What is telecommuting? Discuss why you would and would not want to telecommute.
Answer:
A process whereby workers are able to work anywhere and anytime
Advantages:
Reduced stress
Improved family life
More opportunities if a single parent or have a disability
Increased productivity
Can work someplace that isn’t nearby
Disadvantages:
Isolation
Loss of fringe benefits
Lower pay
No workplace visibility
Slower promotions
Lack of socialization
Difficulty “training” family that at work
Security
Lack of supervision (could be a positive if want to be lazy)
Difficulty: Easy
Section: Network Applications: Communication
Learning Objective: 5
Bloom: Knowledge, Comprehension, Evaluation
AACSB: Written and oral communication, Information technology, Reflective thinking
Answer:
When an organization outsources a task to an undefined, generally large group of people
in the form of an open call
Benefits:
Cheaper and quicker problem resolution
Tap a wider range of talent
Gain insight into customer desires
Rapid design process
Example – 5 examples in book (help desk, recruitment, etc.) and Doritos commercials – have to
pay the Super Bowl fees but not the design and filming fees
Difficulty: Easy
Section: Network Applications: Collaboration
Learning Objective: 6
Bloom: Knowledge, Comprehension, Application
AACSB: Written and oral communication, Information technology, Application of knowledge
Another random document with
no related content on Scribd:
even locally. An observer on the spot says: “In the disposition of their
destroyers, the authorities did not seem disposed to give them a free
hand, or to allow them to take any chances.” And again, “The torpedo
boats were never sent out with the aim of attacking Japanese ships,
or transports. If out, and attacked, they fought, but they did not go
out for the purpose of attacking, although they would to cover an
army flank.” These two actions define the rôle indicated by the
expression, “Fortress Fleet.” The Japanese expressed surprise that no
attempt by scouting was made to ascertain their naval base, which
was also the landing place of their army; and, although the sinking of
the two battleships on May 15 was seen from Port Arthur, no effort
was made to improve such a moment of success, and of
demoralization to the enemy, although there were twenty-one
destroyers at Port Arthur; sixteen of which were under steam and
outside. So, at the very last moment, the fleet held on to its defensive
rôle; going out only when already damaged by enemy’s shells, and
then not to fight but to fly.
It is a curious commentary upon this course of action, that, as far
as any accounts that have come under my eye show, the fleet
contributed nothing to the defense of the fortress beyond landing
guns, and, as the final death struggle approached, using their
batteries in support of those of the fortress; but the most extreme
theorist would scarcely advocate such an end as the object of
maintaining a fleet. The same guns would be better emplaced on
shore. As far as defense went, the Russian Port Arthur fleet might as
well have been at Cronstadt throughout. Indeed, better; for then it
would have accompanied Rozhestvensky in concentrated numbers,
and the whole Russian navy there assembled, in force far superior,
would have been a threat to the Japanese command of the sea much
more effective, as a defense to Port Arthur, than was the presence of
part of that fleet in the port itself.
The Russian fleet in the Far East, assembled as to the main body in
Port Arthur, by its mere presence under the conditions announced
that it was there to serve the fortress, to which it was subsidiary.
Concentrated at Vladivostok, to one side of the theater of war, and
flanking the enemy’s line of communications to that which must be
the chief scene of operations, it would have been a clear evident
declaration that the fortress was subsidiary to the ships; that its chief
value in the national military scheme was to shelter, and to afford
repairs, in short, to maintain in efficiency, a body which meant to go
out to fight, and with a definite object. The hapless Rozhestvensky
gave voice to this fact in an expression which I have found attributed
to him before the fatal battle at Tsushima: that; if twenty only of the
numbers under his command reached Vladivostok, the Japanese
communications would be seriously endangered. This is clear “Fleet
in Being” theory, and quite undiluted; for it expresses the extreme
view that the presence of a strong force, even though inferior, near
the scene of operations, will produce a momentous effect upon the
enemy’s action. The extreme school has gone so far as to argue that it
will stop an expedition; or should do so, if the enemy be wise. I have
for years contended against this view as unsound; as shown to be so
historically. Such a “fleet in being,” inferior, should not be accepted
by an enemy as a sufficient deterrent under ordinary circumstances.
It has not been in the past, and the Japanese did not so accept it. The
Russian “fleet in being,” in Port Arthur, did not stop their
transportation; although they recognized danger from it, and
consistently took every step in their power to neutralize it. Their
operations throughout were directed consistently to this end. The
first partially successful torpedo attack; the attempts to block the
harbor by sinking vessels; the distant bombardments; the mines laid
outside; and the early institution and persistence in the siege
operations,—all had but one end, the destruction of the fleet, in
being, within; but, for all that, that fleet did not arrest the transport
of the Japanese army.
These two simultaneous operations, the transport of troops despite
the fleet in being, and the persevering effort at the same time to
destroy it—or neutralize it—illustrate what I have called adjustment
between opposite considerations. The danger from the fleet in being
is recognized, but so also is the danger in delaying the initiation of
the land campaign. The Fleet in Being School would condemn the
transportation, so long as the Port Arthur fleet existed. It actually did
so condemn it. The London Times, which is, or then was, under the
influence of this school, published six weeks before the war began a
summary of the situation, by naval and military correspondents, in
which appears this statement: “With a hostile fleet behind the guns
at Port Arthur, the Japanese could hardly venture to send troops into
the Yellow Sea.” And again, four weeks later: “It is obvious that, until
the Russian ships are sunk, captured, or shut up in their ports with
their wings effectually clipped, there can be no security for the sea
communications of an expeditionary force.” These are just as clear
illustrations of the exaggeration inherent in the Fleet in Being theory,
which assumes the deterrent influence of an offensive threatened by
inferior force, as the conduct of the Russian naval operations was of
the inefficiency latent in their theory of Fortress Fleet.
If security meant the security of peace, these Fleet in Being
statements could be accepted; but military security is an entirely
different thing; and we know that, coincidently with the first torpedo
attack, before its result could be known, an expeditionary Japanese
force was sent into the Yellow Sea to Chemulpo, and that it rapidly
received reinforcements to the estimated number of fifty or sixty
thousand. The enterprise in Manchuria, the landing of troops west of
the mouth of the Yalu, was delayed for some time—two months,
more or less. What the reason of that delay, and what determined the
moment of beginning, I do not know; but we do know, not only that
it was made in face of four Russian battleships within Port Arthur,
but that it continued in face of the increase of their number to six by
the repair of those damaged in the first torpedo attack. As early as
May 31, it was known in Tokyo that the damaged ships were nearly
ready for the sortie, which they actually made on June 23.
It is doubtless open to say that, though the Japanese did thus
venture, they ought not to have done so. Note therefore that the
Japanese were perfectly alive to the risks run. From the first they
were exceedingly careful of their battleships, knowing that on them
depended the communications of their army. The fact was noted
early in the war by observers on the spot. This shows that they
recognized the full menace of all the conditions of the Russian fleet
in Port Arthur, also of the one in the Baltic, and of the danger to their
communications. Nevertheless, though realizing these various
dangers from the hostile “fleets in being,” they ventured.
About the middle of March, that is, six weeks after the war began,
a report, partly believed by the Japanese authorities, came in that the
Port Arthur ships had escaped in a snow storm, on March 11. It is
reported that all transportation of troops stopped for some ten days.
It may be remembered that in our war with Spain, a very similar
report, from two different and competent witnesses, arrested the
movement of Shafter’s army from Key West until it could be verified.
In the case of the Japanese, as in our own, the incident illustrates the
possible dangers from a “fleet in being.” In neither report was there
an evident impossibility. Had either proved true the momentary
danger to communications is evident; but the danger is one the
chance of which has to be taken. As Napoleon said, “War cannot be
made without running risks.” The condition that an enemy’s fleet
watched in port may get out, and may do damage, is entirely
different from the fact that it has gotten out. The possibility is not a
sufficient reason for stopping transportation; the actual fact is
sufficient for taking particular precautions, adjusting dispositions to
the new conditions, as was done by ourselves and by the Japanese in
the circumstances. The case is wholly different if the enemy has a
fleet equal or superior; for then he is entirely master of his
movement, does not depend upon evasion for keeping the sea, and
communications in such case are in danger, not merely of temporary
disarrangement but of permanent destruction. No special warning is
needed to know this; the note of the “Fleet in Being” School is
insistence on the paralyzing effect of an inferior fleet.
Divided Forces[103]
[As the date indicates, the essay was written at the time of the
Revolution in Hawaii, six years before its annexation. The part of the
essay preceding points out the predominant interest of the United
States in the Islands owing to their control of our trade routes and
naval approaches, and refers to the benefit to the world from British
colonial expansion.—Editor.]
But if a plea of the world’s welfare seem suspiciously like a cloak
for national self-interest, let the latter be accepted frankly as the
adequate motive which it assuredly is. Let us not shrink from pitting
a broad self-interest against the narrow self-interest to which some
would restrict us. The demands of our three great seaboards, the
Atlantic, the Gulf, and the Pacific,—each for itself, and all for the
strength that comes from drawing closer the ties between them,—are
calling for the extension, through the Isthmian Canal, of that broad
sea common along which, and along which alone, in all the ages
prosperity has moved. Land carriage, always restricted and therefore
always slow, toils enviously but hopelessly behind, vainly seeking to
replace and supplant the royal highway of nature’s own making.
Corporate interests, vigorous in that power of concentration which is
the strength of armies and of minorities, may here withstand for a
while the ill-organized strivings of the multitude, only dimly
conscious of its wants; yet the latter, however temporarily opposed
and baffled, is sure at last, like the blind forces of nature, to
overwhelm all that stand in the way of its necessary progress. So the
Isthmian Canal is an inevitable part in the future of the United
States; yet one that cannot be separated from other necessary
incidents of a policy dependent upon it, whose details cannot be
foreseen exactly. But because the precise steps that hereafter may be
opportune or necessary cannot yet be foretold certainly, is not a
reason the less, but a reason the more, for establishing a principle of
action which may serve to guide as opportunities arise. Let us start
from the fundamental truth, warranted by history, that the control of
the seas, and especially along the great lines drawn by national
interest or national commerce, is the chief among the merely
material elements in the power and prosperity of nations. It is so
because the sea is the world’s great medium of circulation. From this
necessarily follows the principle that, as subsidiary to such control, it
is imperative to take possession, when it can be done righteously, of
such maritime positions as contribute to secure command. If this
principle be adopted, there will be no hesitation about taking the
positions—and they are many—upon the approaches to the Isthmus,
whose interests incline them to seek us. It has its application also to
the present case of Hawaii.
There is, however, one caution to be given from the military point
of view, beyond the need of which the world has not yet passed.
Military positions, fortified posts, by land or by sea, however strong
or admirably situated, do not confer control by themselves alone.
People often say that such an island or harbor will give control of
such a body of water. It is an utter, deplorable, ruinous mistake. The
phrase indeed may be used by some only loosely, without forgetting
other implied conditions of adequate protection and adequate
navies; but the confidence of our own nation in its native strength,
and its indifference to the defense of its ports and the sufficiency of
its fleet, give reason to fear that the full consequences of a forward
step may not be weighed soberly. Napoleon, who knew better, once
talked this way. “The islands of San Pietro, Corfu, and Malta,” he
wrote, “will make us masters of the whole Mediterranean.” Vain
boast! Within one year Corfu, in two years Malta, were rent away
from the state that could not support them by its ships. Nay, more:
had Bonaparte not taken the latter stronghold out of the hands of its
degenerate but innocuous government, that citadel of the
Mediterranean would perhaps—would probably—never have passed
into those of his chief enemy. There is here also a lesson for us.
32. Application of the Monroe Doctrine[107]