Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Which of the following represents the core drives of the information age? A. Data, Information, Business Intelligence, Knowledge. B. Fact, Data, Intelligence, Experience. C.

1. Which of the following represents the core drives of the information age? A. Data, Information, Business Intelligence, Knowledge. B. Fact, Data, Intelligence, Experience. C. Fact, Intelligence, Business Skills, Knowledge. D. Data, Intelligence, Business Information, Knowledge. 2. What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making? A. Supplier's intelligence. B. Social intelligence. C. Employee intelligence. D. Business intelligence. 3. The process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed is the definition of __________. A. Feedback B. Information C. Competitive intelligence D. Data 4. The Victory Wireless store in Denver is currently offering a fabulous marketing strategy for potential new iPhone customers. Victory Wireless offers customers who purchase an iPhone with a 2 year subscription a free Otter phone case, car charger, ear phones, and speakers. In terms of Porter's Five Forces what is Victory Wireless attempting to achieve with this marketing strategy? A. Increase buyer power. B. Increase substitute products. C. Decrease supplier power. D. Decrease buyer power. 5. Michael Porter defined the Five Forces Model and the potential pressures that can hurt sales. Which of the following is not one of the potential pressures that can hurt sales? A. Suppliers can drive down profits by charging less for supplies. B. New market entrants can steal potential investment capital. C. Substitute products can steal customers. D. Competition can steal customers. 1 6. Kevin Campbell is an incoming freshman at your college. Kevin is frustrated by the cost of books, tuition, and expenses and he also needs to purchase a rather expensive laptop. In an effort to save money, Kevin beings a Facebook group finding other college students who need to purchase laptops. Soon, Kevin's Facebook group has close to 100,000 students. Kevin decides to collectively approach different computer companies to see if his group qualifies for a special discount. What business strategy is Kevin using to purchase laptops? A. Collecting business intelligence. B. Decreasing entry barriers. C. Purchasing a substitute product. D. Increasing buyer power. 7. Callie Crystal owns and operates The Edgewater Caf. Each time a customer purchases their 100th cup of coffee at The Edgewater Caf they receive a free pound of coffee of their choice. What is Callie attempting to create with her unique "Free Pound of Coffee" marketing program? A. Reducing buyer power with a loyalty program. B. Increasing buyer power with a loyalty program. C. Decreasing supplier power with a differentiated product. D. Creating a substitute product. 8. ABC pharmaceutical company produces the number one selling cancer fighting drug on the market. Due to its incredible success ABC pharmaceuticals has decided to increase the cost of the drug from $8 a pill to $15 a pill. Which force is ABC pharmaceutical using to increase its drug price? A. Supplier power. B. Buyer power. C. Threat of false entrants. D. Business power. 9. How can a company reduce the threat of substitute products or services? A. Market the product to less than ten customers. B. Ignore competitive forces. C. Offer additional value through wider product distribution. D. Offer less value making the product far more generic and similar to the competition. 10. Some industries' competition is much more intense than others. Retail grocery stores such as Kroger, Safeway, and Albertson's in the United States experience fierce competition and offer similar marketing campaigns to compete. What is this an example of in terms of Porter's Five Forces? A. Rivalry among new entrants. B. Rivalry among existing competitors. C. Threat of substitute products or services. D. Buyer power. 2 11. Porter identified three generic strategies that a business could follow after identifying a market it wanted to enter. Which of the following is not included as one of Porter's three generic strategies? A. Broad differentiation. B. Supplier cost differentiation. C. Focused strategy. D. Broad cost leadership. 12. Which of the following offers an example of a company operating in a narrow focused-market operating as the low-cost provider? A. Walmart. B. Tiffany & Co. C. Neiman Marcus. D. Payless Shoes. 13. Which of the following demonstrates a company that has implemented a low cost, broad market strategy? A. Neiman Marcus. B. Payless Shoes. C. The Sharper Image. D. Walmart. 14. When evaluating the value chain, which of the following is included in the support value activities? A. Inbound activities. B. Marketing and sales. C. Firm infrastructure. D. Finance and sales. 15. What includes support value activities and primary value activities and is used to determine how to create the greatest possible value for customers? A. Supplier power. B. Operations management. C. Porter's Five Forces Model. D. The Value Chain analysis. 16. Which of the below would you include as decisions and responsibilities typically found at the operational level of a company? A. Develop core business activities required to run the day-to-day operations B. Control core business activities required to run the day-to-day operations C. Maintain core business activities required to run the day-to-day operations D. All of the above 3 17. Which of the below represents the three different levels of a company pyramid from the top to the bottom? A. Managerial-Strategic-Operational B. Strategic-Managerial-Operational C. Operational-Managerial-Strategic D. Strategic-Operational-Managerial 18. The level where managers develop overall business strategies and monitor the performance of the organization and the competitive business environment is the ___________ level. A. Operational B. Strategic C. Managerial D. Communications 19. What are the crucial steps companies perform to achieve their goals and objectives and implement their strategies? A. Critical success factors B. Crucial success factors C. Key performance indicators D. Key performance factors 20. Which of the below statements is accurate? A. Key performance indicators can have no more than four critical success factors B. Critical success factors can have no more than four key performance indicators C. Key performance indicators can have several critical success factors D. Critical success factors can have several key performance indicators 21. What is the process of continuously measuring system results, comparing those results to optimal system performance, and identifying steps and procedures to improve system performance? A. Benchmarking B. Bottlenecking C. Consolidation D. Cycle time 22. Key performance indicators are the metrics a company uses to evaluate progress toward critical success factors. Which of the below represents a key performance indicator? A. Create high-quality products B. Reduce product costs C. Percentage of help desk calls answered in the first minute D. Hire the best business professionals 4 23. CSF's and KPI's are the two core metrics used within a business to track progress or success. What is the relationship between CSFs and KPIs? A. CSF's are business strategy elements where KPI's measure the progress of the CSF's B. CSF's build the business environment where KPI's explain how to build the CSF's C. KPI's are used first where CSF's are applied after D. KPI's promote employees on their performance where CSF's demote employees based on their performance level 24. What is drill-down capability? A. Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information B. The ability to look at information from different perspectives C. Enables users to get details, and details of details, of information D. Finds the inputs necessary to achieve a goal such as a desired level of output 25. What is slice-and-dice capability? A. Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information B. The ability to look at information from different perspectives C. Enables users to get details, and details of details, of information D. Finds the inputs necessary to achieve a goal such as a desired level of output 26. What are the three primary types of management information systems available to support decision making across the company levels? A. Transaction Processing Systems, Decision Support Systems, Executive Information Systems B. Analytical Information, Decision Support Systems, Executive Information Systems C. Transaction Processing Systems, Drill-Down Systems, Expert Systems D. What-If Analysis, Sensitivity Analysis, Goal-Seeking Analysis 27. Online transaction processing (OLTP) is the capturing of transaction and event information using technology to ____________. A. Update existing information to reflect the new information B. Store the information C. Process the information according to defined business rules D. All of the above 28. What is the MIS system that manipulates information to create business intelligence in support of strategic decision making? A. Online transaction processing (OLTP) B. Online analytical processing (OLAP) C. Digital dashboard D. Visualization 5 29. What is the DSS analysis that checks the impact of a change in a variable or assumption on the model? A. Optimization analysis B. Goal-seeking analysis C. Sensitivity analysis D. What-if analysis 30. Online transaction processing (OLTP) and online analytical processing (OLAP) are similar MIS strategies used to help with business decision making. What is the primary difference between OLTP and OLAP? A. OLTP is used at the operational level; OLAP is used at the managerial level B. OLTP is used to capture transactional and event data; OLAP is used to manipulate information C. OLTP is used to support structured decisions; OLAP is used to support semistructured decisions D. All of the above 31. What is the analysis that works in reverse to what-if and sensitivity analysis by finding the inputs necessary to achieve a goal such as a desired level of output? A. Solutions based analysis B. Optimization system C. Goal-seeking analysis D. Revenue analysis 32. Decision making at the executive or strategic level require business intelligence and knowledge to support the uncertainty and complexity of the business. What is a specialized DSS that supports seniorlevel executives and unstructured decisions requiring judgment, evaluation, and insight? A. OLTP B. Executive Information System (EIS) C. Transaction Support System (TSS) D. Decision Support System (DSS) 33. How does a DSS typically differ from an EIS? A. EIS requires data from external sources to support unstructured decisions where a DSS typically uses internal sources to support semistructured decisions B. DSS typically uses external sources and EIS use internal sources to support decisions C. A DSS never uses external sources D. EIS always uses internal sources to support structured decisions 34. Review the below list of key terms and determine which one typically occurs during managerial business process improvement. A. Automation B. Streamlining C. Reengineering D. Improvement 6 35. Review the below list of key terms and determine which one typically occurs during strategic business process improvement. A. Automation B. Streamlining C. Reengineering D. Improvement 36. Changing business processes with MIS outlines how to improve the three levels of business processes which include operational, managerial, and strategic. From operational to strategic, what are the three major improvement strategies that the author describes? A. Automation-streamlining-reengineering B. Artificial intelligence-streamlining-reengineering C. Automation-workflow-reinvention D. Automation-consolidating-restructuring 37. Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction? A. Collective intelligence B. Digital Darwinism C. Joint venture D. Sole proprietorship 38. What is a business that operates in a physical store without an Internet presence? A. Brick-and-mortar business B. Click-and-mortar business C. Virtual business D. Pure-play business 39. Which of the following represents businesses buying from and selling to each other over the Internet? A. B2B B. B2C C. C2B D. C2C 40. Which type of ebusiness model is Barnes & Noble using? A. Pure-play B. Brick-and-mortar C. Click-and-mortar D. Virtual 41. What is a pure-play business? A. A business that operates only on the Internet without a physical store B. A business that sells products only in a physical store C. A business that sells services only in a physical store D. All of the above 7 42. What is an ISP? A. Instant service provider is a company that provides access to the Internet for a monthly fee. B. Internet service provider is a company that provides access to the Internet for a monthly fee. C. Internet sales provider is a company that provides access to the Internet for a monthly fee. D. Instant sales provider is a company that provides access to the Internet for a monthly fee. 43. Which of the below is not a characteristic of Business 2.0 (=Web 2.0)? A. Encourages user participation B. Technical skills are required C. Eliminates entry barriers to publishing on the Web D. Provides an exciting and vibrant virtual environment 44. What is the term that is similar to taxonomy except that crowdsourcing determines the tag or keywordbased classification system? A. Podcasting B. Network effects C. Folksonomy D. Social bookmarking 45. What is an online journal that allows users to post their own opinions, comments, graphics, and video? A. Web masters B. Folksonomy C. Disintermediation D. A Blog or Web log 46. What is the practice of sending brief posts 140-200 characters to a personal blog either publicly or to a private group of subscribers? A. Ebusiness model B. Tagging C. Blogging D. Microblog 47. Twitter is an example of a _________. A. Social bookmarking website B. Social tagging website C. Microblogging website D. Blogging website 48. Unlike traditional HTML, which of the following lets writers communicate and readers respond on a regular basis through a simple online journal? A. Instant messaging B. HTTP C. Blog D. Email 8 49. What is the difference between a wiki and a blog? A. A wiki is free and a blog has a subscription fee B. A wiki user can alter the original content of an article, where a blog user can only add information as a comment C. A wiki is original content, where a blog is used sources D. All of the above 50. What is a website or Web application that uses content from more than one source to create a completely new product or service? A. Social tagging B. Mashup blog C. Social media D. Mashup 51. Which of the following best describes Web 1.0? A. Static text-based information websites B. Static electricity and connectivity C. Social media D. Technology intelligence 52. Which of the following best describes Web 2.0? A. Static websites B. Intelligent websites C. Social media and user-generated Web content D. Hypertext markup language 53. Which of the following best describes Web 3.0? A. User-generated online business B. Based on the 'intelligent' Web where applications use natural language processing C. Collaboration and social media D. All of the above 54. Which statement below is inaccurate? A. Web 2.0 is a simple static website without any interaction with its users B. Web 2.0 brings people closer together with information using machines C. Web 3.0 brings machines closer together using information D. Web 3.0 is a rich 'intelligent' understanding and relationships among concept and topics 55. What is a component of Web 3.0 that describes things in a way that computers can understand? A. Social tagging B. Sustaining Web C. Social Web D. Semantic Web 9 56. What does digital Darwinism imply? A. Organizations that can adapt to the new demands placed on them for surviving in the information age are doomed to extinction B. Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction C. Organizations that can adapt to new information systems are doomed to extinction D. Organizations that cannot adapt to new information systems are doomed to exile 57. Which of the following include the three section titles of an MIS infrastructure? A. Information MIS, aggregated MIS, and sustainable MIS infrastructures B. Information MIS, operational MIS, and changing MIS infrastructures C. Information MIS, agile MIS, and sustainable MIS infrastructures D. Varies depending on the industry 58. Which characteristics support an agile MIS infrastructure? A. Accessibility, availability, maintainability, portability, reliability, scalability, usability B. Backup and recovery plan, disaster recovery plan, business continuity plan C. Grid computing, cloud computing, and virtualization D. All of the above 59. Which characteristics support a sustainable MIS infrastructure? A. Accessibility, availability, maintainability, portability, reliability, scalability, usability B. Backup and recovery plan, disaster recovery plan, business continuity plan C. Grid computing, cloud computing, and virtualization D. All of the above 60. Which characteristics support an information MIS infrastructure? A. Accessibility, availability, maintainability, portability, reliability, scalability, usability B. Backup and recovery plan, disaster recovery plan, business continuity plan C. Grid computing, cloud computing, and virtualization D. All of the above 61. Which of the below represents the primary elements in an information MIS infrastructure? A. Backup, recovery, disaster recovery, and business continuity planning B. Backup, accessibility, and usability C. Backup, cloud computing, and virtualization D. Grid computing, cloud computing, and virtualization 10 62. The __________ MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured. A. Sustainable B. Information C. Virtualized D. Agile 63. What occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to a secondary server? A. Failover B. Disaster recovery cost curve C. Reliability D. Maintainability 64. ___________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. A. Hot site B. Cold site C. Warm site D. Disaster site 65. Which term refers to the varying levels that define what a user can access, view, or perform when operating a system? A. Availability B. Accessibility C. Usability D. Responsibility 66. What service delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model? A. Infrastructure as a Service (IaaS) B. Dynamic scaling C. Software as a Service (SaaS) D. Platform as a Service (PaaS) 67. What are the three cloud computing service delivery models? A. Independent as a Service, Supportive as a Service, Partnering as a Service B. Infrastructure as a Service, Software as a Service, Platform as a Service C. Innovation as a Service, Server as a Service, Platform as a Service D. Intuit as a Service, Storage as a Service, Programming as a Service 11 68. What does reliability ensure? A. The system has the ability to operate in many different operating systems B. The system is easy to learn and efficient and satisfying to use C. The system is functioning correctly and providing accurate information D. The time frames when the system is operational 69. Which of the following reflects Moore's law? A. The computer chip performance per dollar doubles every 18 months B. A company's ability to acquire small amounts of MIS equipment for cheaper cost C. A company's ability to acquire small amounts of capital for spending on innovative ideas every two years D. The computer chip performance per dollar doubles every 6 months 70. What uses resources and applications hosted remotely on the Internet? A. Virtualized computing B. Grid computing C. Cloud computing D. Smarts grid 71. What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple 'virtual' machines all on a single computing device? A. Virtualization B. Innovation C. Availability D. Viral computing 72. In the relational database model, what is a person, place, thing, transaction, or event about which information is stored? A. Entity B. Relationships C. Attribute D. Foreign Key 73. _____________ assists in creating, maintaining, and manipulating databases. A. DBMS B. KMS C. CRM D. MIS 74. The name of the field, the data type, and number of characters allowed (i.e., data about data) would be an example of: A. attributes B. characters C. content 12 D. metadata E. overhead 75. What is a primary key? A. A field (or group of fields) that uniquely identifies a given record in a table B. A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables C. Characteristics or properties of an entity D. A field (or group of fields) that uniquely identifies a given attribute in a table 76. In a relational database application a ___________________ key is used to link one table with another. A. primary B. composite C. foreign D. index E. Secondary 77. What compiles all of the metadata about the data elements in the data model? A. Data entity B. Data element C. Data attribute D. Data dictionary 78. Which of the below represents a reason why data warehouses were created? A. Numbers and types of operational databases increased as businesses grew B. Many companies had information scattered across multiple systems with different formats C. Completing reporting requests from numerous operational systems took days or weeks D. All of the above 79. What is data mining? A. The common term for the representation of multidimensional information B. A particular attribute of information C. Uses a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making D. Process of analyzing data to extract information not offered by the raw data alone 80. When does information cleansing occur in the data warehouse? A. During the ETL process B. On the information, once it is in the data warehouse C. During the ETL process and once it is in the data warehouse D. During the ETL process and before it is in the data warehouse 13 81. What are the primary differences between a data warehouse and a data mart? A. Data warehouses make quick decisions, data marts make slow decisions B. Data warehouse tackle ethical issues, data marts tackle hypothetical issues C. Data warehouses have a more organization-wide focus, data marts have functional focus D. Data warehouses have a physical focus, data marts have logical focus 82. Which of the following is the common term for the representation of multidimensional information? A. Block B. Square C. Column D. Cube 83. What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible? A. Statistical detection B. Cluster analysis C. Association detection D. None of the above 84. Which of the below defines the relationship between items along with the nature and frequency of the relationship to detect customers' buying behavior and predict future behavior? A. Association detection B. Masking detection tool C. Cluster grouping D. Blocking barriers 85. What does extraction, transformation, and loading mean? A. It is a process of entering data, tracking data, and loading it into a database B. It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse C. It is a process that is performed at the end of the data warehouse model prior to putting the information in a cube D. It is a process that is performed at the beginning of the data mining model 86. The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include ____________________. A. New system provider (NSP), Current system provider (CSP), and Order entry system provider (OSP) B. National service provider (NSP), Regional service provider (RSP), and Internet service provider (ISP) C. Net server point (NSP), Radio server point (RSP), and Internet server point (ISP) D. None of the above 14 87. NSPs are private companies that own and maintain the worldwide backbone that supports the Internet. Which of the below is not an NSP? A. Sprint B. Verizon C. Microsoft D. AT&T 88. What connects a group of computers in close proximity, such as in a school or office setting? A. Metropolitan area network (MAN) B. Local area network (LAN) C. Wide area network (WAN) D. Secure area network (SAN) 89. Which of the followings is not correctly paired? A. PAN: Cellular phone B. Wireless LAN (WLAN): WiFi C. Wireless MAN (WMAN): WiMAX D. Wireless WAN (WWAN): Satellite 90. What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, and web publishing? A. National ISP B. Regional ISP C. Intranet D. Extranet 91. What is the standard Internet protocol, which provides the technical foundation for the public Internet? A. Data streaming and DSL protocols B. Transmission control protocol/Internet protocol (TCP/IP) C. Data streaming rules and regulations D. DSP protocol 92. What is a means by which portable devices can connect wirelessly to a local area network (LAN), using access points that send and receive data via radio waves? A. Bluetooth B. Wireless fidelity (WI-FI) C. Wide area network (WAN) D. Wireless data centers 93. Which of the following systems uses electronic tags and labels (or readers) to identify objects wirelessly over short distances? A. Radio-frequency identification (RFID) B. Global positioning systems (GPS) C. Geographic information systems (GIS) D. Data mart 15 94. What is a VPN? A. A direct network provider using a company server B. A direct private network that creates a "private tunnel" within the Internet to connect to the corporate server C. A direct URL that creates a private tunnel for a company D. A direct P2P that creates an open access community for a company 95. What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server? A. Secure hypertext transfer protocol (SHTTP) B. Secure sockets layer (SSL) C. SSL certificate D. SHTTP certificate 96. What is the conversion of IP addresses that identifies labels that use a variety of recognizable naming conventions? A. Domain grades B. URL spaces C. Domain national sequences (DNS) D. Domain name system (DNS) 16 97. What is the digital divide? A. A worldwide gap giving advantage to those with access to technology B. A data interruption in the Internet connection C. A deficiency in school-aged children with computer knowledge D. A divide between the economies of third world countries 98. Which network uses radio signals to transmit and receive data over distances of a few hundred feet? A. WMAN B. WWAN C. PAN D. WLAN 99. What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves? A. Bluetooth B. Wireless fidelity (WI-FI) C. Wide area network (WAN) D. Wireless data centers 100. Which business application uses location information to provide a service and is designed to give mobile users instant access to personalized local content? A. Radio-frequency identification B. Global positioning systems C. Geographic information systems D. Location-based services 17

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Fundamentals Of Law Office Management

Authors: Pamela Everett-Nollkamper

5th Edition

1133280846, 978-1133280842

More Books

Students also viewed these General Management questions

Question

18. I would represent the group at outside meetings.

Answered: 1 week ago