• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/526

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

526 Cards in this Set

  • Front
  • Back
1. Which of the following is a diagram that depicts the design of how a database will be organized? [Chapter 6, moderate]

a) data flow diagram
b) activity diagram
c) use case diagram
d) logical data model
e) none of the above
d) logical data model
2. Whereas a data warehouse includes current transactions only, a database includes historical data [chapter 5, page 130, moderate]
a) true
b) false
b) false
Match the type of inputs with the appropriate examples [chapter 4, slide 6, easy]:

Column A
a. Labor
b. Raw materials
c. Capital
d. Technology

Column B
A. money required by businesses to operate
B. employees who carry out a business process
C. hardware and software
D. ingredients from which a company makes products
aB, bD, cA, dC
Team 1

1. How are data and information related? [Chapter 1, page 8, easy]

a) Information is organized data.
b) Data is organized information.
c) Data and information create knowledge.
d) Both A and C are correct.
Answer: a)
Team 1

2. Which one is a type of hardware and software, respectively? [Chapter 2, page 26, easy]

a) MS Office and Windows XP
b) LCD screen and Mouse
c) MS Office and Pointer
d) LCD screen and Windows XP
Answer: d)
Team 1

3. A stakeholder is best described as a person that: [Chapter 4, page 87, moderate]

a) Has an interest in the business
b) Has an influence in the business
c) Must have money invested in the company
d) Has to be external to the business system
e) Both A and B
Answer: e)
Team 1

4. Middleware is a term referring to: [Chapter 5, page 136, moderate]

a) Software that produces output for a person dealing with multiple clients
b) Equipment that relies on hardware
c) Software that links applications with dissimilar hardware or software
d) Software suites such as Microsoft Office
Answer: c)
Team 1

5. How many phases does an IS go through in its life cycle? [Chapter 6, page 162, moderate]

a) 5
b) 2
c) 7
d) 10
Answer: c)
Team 1

6. Which one of the following is not one of the four core functions that lead to specific project objectives? [Chapter 6, page 175, moderate]

a) Project Scope Management
b) Communications Management
c) Time Management
d) Cost Management
Answer: b)
Team 1

7. ______ is a general formula for how a business is going to use computer networks and information systems to compete in a global marketplace. [Chapter 7, page 204, moderate]

a) E-Commerce Strategy
b) Privacy Policy
c) Mobile Commerce
d) Data Security
Answer: a)
Team 1

8. The most common client-side scripting language is ________________. [Chapter 8, page 235, moderate]

a) Scripting language
b) JavaScript
c) Data validation
d) ActiveX
Answer: b)
Team 1

9. What does TLS stand for? [Chapter 8, page 245, moderate]

a) Transport Layer Security
b) Three Layer Security
c) Transfer Language Server
d) Transmit Letter Systems
Answer: a)
Team 1

10. Controls are specific actions, including procedures and policies, designed to ensure the achievement of business objectives. [Chapter 9, page 281, easy]

a) True
b) False
Answer: a)
Team 1

11. Guest speaker Matt Gonzalez from EITS spoke about SAAS. What does SAAS stand for? [Guest Speaker Matt Gonzalez, easy]

a) Software and a Service
b) Software at a Station
c) Software as a Service
d) None of the above
Answer: c)
Team 1

12. The in-class activity that required the construction of a Lego tower reinforced which of the following concepts? [Lego In-Class Activity, easy]

a) Organizational Software
b) Project Management
c) Teamwork
d) Both b & c
e) All of the above
Answer: d)
Team 8
True or False: Globalization is the process of extending a technology
to other parts of the globe.[Chapter 1, Slide 12, Easy]
Answer: True
Team 8
Which of the following is not one of the five the five knowledge work
activities?[Chapter 3, Slide 6, Medium]

a)synthesis
b)discovery
c)analysis
d)group discussion
Answer: d
Team 8
Using transaction data to understand the subscription process and customers is an example of what process?[Chapter 4, Slide 33, Medium]
a. automating
b. informating
c. transforming
d. support of value chain
Answer: b
Team 8
Which type of computer is highest on the computer hierarchy?[Chapter 5 , Slide 9, medium]
a. embedded processor
b. personal computer
c. mega computer
d. supercomputer
Answer: d
Team 8
True/False An entity-relationship diagram is a simplified representation of something real. [Chapter 6, pg. 171, medium]
Answer: False
Team 8
Which level of project management software includes tools for resource allocation, cost-control, and flexible-charting capabilities? [ Chapter 6, pg.182-183, Hard]
a. low-level
b. mid-level
c. high-level
d. none of the above
Answer: b
Team 8
Which of the following are guidelines to keeping a password as strong as possible? [Chapter 7, pg. 209, Easy]
Answer: e
Team 8
What does (SET) stand for? [Chapter 8, pg.245, Medium]

A. Standard Education Testing
B. Secure Electronic Transaction
C. Safe Economnic Transactions
D. None of the above
Answer: b
Team 8
Match the type of Global Sourcing in Column A with its definition in Column B [Chapter 9, pg.267-268, easy]:
Column A Column B
a. In-sourcing A. occurs in the same country as a business
b. Onshoring B. outsourcing to a business outside your country but in the same general geographic area of your business
c. Nearshoring C. the decision to keep services or functions in-house rather than globally sourcing them
d. Offshoring D. a partnership with a business in a far-distant country from the home office
Answer: aC;bA;cB;dD
Which piece of legislation holds a company’s officers personally responsible for providing accurate public financial information to investors[Chapter 9, pg.278, Hard]?

a. Gramm-Leach-Bliley Act
b. The Security Breach Information Act
c. EU Data Protection Directive
d.Sarbanes-Oxley Act
Answer: d
Team 8
Based on Ron Swift’s presentation what does a company need to do to establish a brand identity? [Ron Swift Presentation, Slide 36, easy]
a. know their customer’s needs well
b. give great customer service
c. reward customer loyalty
d. all of the above
Answer: d
Team 16: True/False: The IPO Model of an Information System contains Input, People, and Output.
Answer: False; The IPO Model of an Information System contains Input, Process, Output.
Team 8
Which factors had to be considered when building the most effective tower for the in-class activity? [Easy]
a. amount of materials used
b. time taken to assemble the tower
c. the color of the blocks used
d. both a and b
Answer: d
Team 16:Which one of the following is the name of a computer on a network that is assigned a specific task to manage the functions of the network? a.) client
b.) protocol
c.) server
d.) workstation
Answer: c
Team 16-Multiple Choice: In the acronym CARROTS, C stands for
a.) Computer
b.) Consistent
c.) Correct
d.) Complete
Answer: d
Team 16-Which category of computer hierarchy represents the type of computer with the most
processing power at any given time?
a.) Embedded processors
b.) Mainframe
c.) Server farm
d.) Supercomputer
Answer: d
Team 16-Matching
a.) Insourcing i.) we outsource to a partner in our own country
b.) Onshoring ii.) we do it ourselves
c.) Nearshoring iii.) we outsource to a partner in a distant country
d.) Offshoring iv.) we outsource to a partner in a near country
Answer: a.) ii
b.) i
c.) iv
d.) iii
Team 16-True/ False: In a client/server network an HTTP request is sent from the Client to the Web server and an HTTP response is sent from the Web server back the client.
Answer: True
Team 16-Multiple Choice: Which of the following is not an advantage of Methodology to IS development?
a.) Risk Management
b.) Faster Results
c.) Assures Quality
d.) Improved Planning
Answer: b
1. A Hypertext Transfer Protocol (HTTP) specifies a unique address for each page that indicates the location of a document. [Chapter 2, page 48, moderate]
a. True
b. false
Answer: B
Team 23's cards
1. A person who uses information, information systems, and information technology to create business value is a: [Chapter 1, easy]
a) supplier
b) customer
c) knowledge worker
d) none of the above
Answer: C
2. _______ is the knowledge work activity that will help you answer and gain understanding through a thoughtful investigation examination of the available data, information, and knowledge. [Chapter 3, Page 60, moderate]
a. Analysis
b. Synthesis
c. Communication
d. Transformation
e. None of the above
Answer: A
Team 23's Cards
2. Which of the following is true regarding storage and memory? [Chapter 2, hard]
a) Storage is used for storing information for the long term while memory is used for short term.
b) Storage is usually slower to access than memory.
c) RAM is best classified as storage rather than memory.
d) Both A and B
e) None of the above
Answer: D
3. True or False. Attributes are data fields that often describe an instance of an entity. [Chapter 5, Page 128, moderate]
a. True
b. False
Answer: A
Team 23's Cards
3. Which Step of the IADD model would involve evaluating solutions and making decisions as to how to implement the solution [Chapter 3, moderate]
a) Investigate
b) Analyze
c) Decide
d) Do
Answer: C
4. Which of the following is not one of the three primary categories of IT devices? [Chapter 2, Page 26, easy]
a) Hardware
b) Software
c) Central processing unit (CPU)
d) Networks
Answer: C
Team 23's Cards
4. Which of the following is not a characteristic of storming according to Tuckman? [Chapter 4, moderate]
a) Ideas begin to be criticized
b) Feelings of insecurity, anxiety, and excitement
c) Competition among group members
d) Emerging conflict such as roles, priorities, and leadership
Answer: B
5. Through _________, developers produce a partial running system which they then evaluate, revise, and enhance. [Chapter 6, Page 170, easy]
a. Data flow systems
b. Prototyping
c. Use cases
d. Waterfall development
Answer: B
Team 23's Cards
5. When a company decides to build a new system by hiring another company to build all or part of the system, this is called_______. [Chapter 6, easy]
a) In-house development
b) Outsource
c) Leasing
d) Acquisition
Answer: B
6. TRUE or FALSE: Personalization is a marketing message that a business personalizes for each potential customer’s interests based on his/her searching, browsing, or buying habits. [Chapter 7, Page 202, easy]
a. True
b. False
Answer: A
7. The most popular type of ecommerce security, ________, allows a client and a server to communicate in a way that prevents ease dropping, message forgery, or tampering. [Chapter 8, Page 245, difficult]
a. Transport Layer Security (TLS)
b. Secure Electronic Transaction (SET)
c. Secure Socket Layer (SSL)
d. Secure Hypertext Protocol (S-HTTP)
Answer: C
8. An extranet uses Internet technologies to interconnect the intranet of an organization with the intranets of its business partners. [Chapter 8, Page 219, moderate]
a. True
b. False
Answer: A
Team 23's Cards
6. _____________ and ____________ are the two most commonly used models for designing relational databases (pick two answers). [Chapter 6, hard]
a) Entity-Relationship diagram
b) Data flow diagram
c) Logical data model
d) Unified modeling language
Answer: A,C
9. A _________ chart is used to show sequences of project activities and to identify a critical path. [Chapter 6, Page 183, moderate]
a. Pie Chart
b. Gantt
c. Program Evaluation Review Technique (PERT)
d. Sequence
Answer: C
Team 23's Cards
7. Buying a book off of amazon.com is what type of E-commerce transaction? [Chapter 7, moderate]
a) B2C
b) C2C
c) B2G
d) B2B
Answer: A
10. True or False: HTML defines the rules for sending messages with content and instructions over the web. [Chapter 8, Page 228, moderate]
a. True
b. False
Answer: B, correct answer is HTTP
11. Which is not a security risk to businesses? [Jon Gorzynski, moderate]
a. Financial loss due to intellectual property leak or abuse
b. Social engineering and sabotage
c. Confidence in customers
d. Reputational damage from sensitive data loss
Answer: C
Team 23's Cards
8. _______________ is a set of technologies that Microsoft designed to support the sharing of information among different applications. [Chapter 8, easy]
a) Applets
b) Plug-ins
c) Java Script
d) ActiveX
Answer: D
12. In the class activity where teams built a Lego tower, what was NOT factor that impacted the amount of profit the team could make? [In-Class Team Activity: Lego Tower, easy]
a. Amount of time it took to build the tower
b. Amount of Legos used
c. Height of the Tower
d. Width of the tower
e. All of these factors impacted the amount of profit
Answer: D
Team 23's Cards
9. Which of the following can be defined as “a worldwide approach to business that attempts to create business value in an economic world that is flat, borderless, and cyber-connected”? [Chapter 9, moderate]
a) Globalization
b) Global perspective
c) Global sourcing
d) None of the above
Answer: B
Team 23's Cards
10. The three factors that affect enterprise information security are people, policies, and technology. [Chapter 9, moderate]
a) True
b) False
Answer: A
Team #15

1.) _____ contains instructions and data that only special devices can alter. In a computer, the _____ holds the instructions to control the start up process. [Chapter 2, pg. 30, easy]
A.)ROM
B.)RAM
C.)Memory
D.)Storage
Answer: A
Team 23's Cards
11. Which of the following was something “positively learned” from the egg drop activity? [Egg Drop activity, easy]
a) Learning how to apply the IADD model to create the best possible “egg drop structure”
b) The ways that competition can positively affect a team
c) The ability to communicate and work with team members effectively and efficiently in order to create the best possible “egg drop structure”
d) All of the above
Answer: D
Team #15

2.) _____ allows you to discover trends or patterns that seem to explain the past and the present, and may suggest causes of action likely to favorably influence the future. [Chapter 3, pg. 60, moderate]
A.) Transformation
B.) Synthesis
C.) Discovery
D.) Analysis
Answer: B
Team 23's Cards
12. Philip Grossman’s job as a consultant involves analyzing and advising clients to help them make the best possible choices. [Philip Grossman guest speaker, easy]
a) True
b) False
Answer: A
Team #15

3.) A stakeholder is a person, or entity, that has an interest an influence on how a business will function in order to succeed; a stakeholder must be internal to the company. [Chapter 4, pg. 87, moderate]
A.) True
B.) False
Answer: False
Team #15

4.) What type of network are you most likely to find in a student apartment? [Chapter 5, pg. 101, moderate]
A.) PAN
B.)WAN
C.) MAN
D.)LAN
Answer: D
Team #15

5.) The application of knowledge skills, tools, and techniques to project activities to meet project requirements is known as what? [Chapter 6, pg. 175, easy]
A.) Prototyping
B.) Agile Development
C.) Project Management
D.) Risk Management
Answer: C
Team #15

6.) I bought a stellar black Marc Jacobs fedora on Ebay. This is an example of what type of transaction? [Chapter 7, pg.197, moderate]
A.) C2C
B.) B2C
C.) C2G
D.) B2B
Answer: A
Team #15

7.) A privacy policy is a set of procedures and philosophies that a company adopts to handle information intended for public use. [Chapter 7, pg. 204, moderate]
A.) True
B.) False
Answer: B
Team #15

8.) The business of housing, serving, and maintaining files for one or more Websites is called: [Chapter 8, pg. 235, easy]
A.) Data Validation
B.) Server-side Programming
C.) Web Hosting
D.) Electronic Data Interchange (EDI)
Answer: C
Team #15

9.) What are the two main types of HTTP messages? [Chapter 8, pg. 230, medium]
A.) HTTP request & HTTP response
B.) HTTP query & HTTP response
C.) HTTP request & HTTP answer
D.) HTTP request & HTTP query
Answer: A
Team #15

10.) “All written documentation related to the vision, standards and rules for governance and operation of organizational IT” is known as: [ Chapter 9, pg. 285, moderate]
A.) E-Procurement
B.) Information Density
C.) Interchange
D.) Policy
Answer: D
Team #15

11.) During the egg drop discussion, which of the following was not mentioned as a stage of the team development process? [personal notes, easy]
A.) Storming
B.) Performing
C.) Adjourning
D.) Mourning
Answer: D
Team #15

12.) Ron Swift’s company TeraData makes about 1.7 billion dollars annually. [Ron Swift Presentation, personal notes, easy]
A.) True
B.) False
Answer: A
1. An information system (IS) is an organized collection of which four components? [Chapter 1, Page 12, Moderate]

a) information technology, information, people, business processes
b) data, information, knowledge, business processes
c) information technology, data, knowledge, wisdom
d) none of the above
Answer: a)
2. Which of the following is NOT one of the three basic categories of information technology? [Chapter 2, Page 26, Easy]
a) Hardware
b) Knowledge Work
c) Software
d) Network
Answer: b)
Team 29
1. Which type of internet connection is becoming obsolete because of newer, faster technology? [Chapter 1, page 35 , Easy]
a) Cable Modem
b) Telephone Modem
c) Verizon FIOS
d) T3
e) DSL
Answer: B
Team 29
2. What is the purpose of a PDA? [Chapter 5, page 120, Easy]
a) Enables users to carry out processing tasks needed to perform their job, usually networked together
b) Provides data and voice transmission typically at high speeds (≈ 100 Mbps).
c) Provides users with portable computing power; often usd to communicate with PC or other users
d) Cost reduction, efficiency, quality, and consistency
Answer: C
3. What type of memory contains instructions used to control the start up processes (booting-up)? [Chapter 3, Page 30, Moderate]
a) RAM (Random Access Memory)
b) Input Hardware
c) ROM (Read Only Memory)
d) Micro-processing memory
Answer: c)
Team 29
3. True or False: Wi-Fi is the popular name for the 802.11 standards for wireless network access. [Chapter 2, Page 47, Easy]
Answer: True
4. Which is not a step of the IADD model? [Chapter 3, Page 69, Easy]
a) Investigate
b) Decide
c) Analyze
d) Describe
Answer: d)
Team 29
4. Which of the following is part of Accounting IS? [Chapter 5, page 143, Difficult]
a) Provides financial information to the organizations financial managers
b) Supports activities related to managing the employees of the organization
c) Generates both internal and external audits, support management of funds
d) Provides both internal and external reports of a company’s financial status
e) Outputs include marketing research
Answer: D
Team 29
5. Macromedia Dreamweaver is what type of software? [Chapter 6, Page 186, Moderate]
a) Web Development
b) Audio content
c) Animation/Video
d) Database (DBMS)
e) Graphics
Answer: A
5. According to Ron Swift’s Lecture, a weak password is: [Guest speaker, Easy]

a) a real word
b) an important date
c) anybody’s name
d) none of the above
e) all of the above
Answer: e)
Team 29
6. Which of these are guidelines you should follow to ensure password security? [Chapter 7, Page 209, Moderate]
a) Use only lowercase characters
b) Include digits, punctuation and non printing characters
c) Use at least 8 characters
d) A, B, and C
e) Both B and C
Answer: E
6. In the Tower Construction Exercise, what were the three critical variables to consider in order to maximize your company’s profits, when completing the task? [In-class activity, Moderate]

a) tower height, tower width, materials
b) tower height, construction time, materials
c) tower height, tower strength, construction time
d) none of the above
Answer: b)
Team 29
7. Which of the following make up the LAMP acronym? [Chapter 8, Page 240, Difficult]
a) Lenovo, Apple, Microsoft, Packard
b) Linux, Apache, MySQL, Perl
c) Linux, Apple, Macintosh, PHP
d) Linux, Apache, Microsoft, Python
Answer: B
7. Which of the following is NOT an organizational structure mentioned in the text? [Chapter 4, Page 91, Moderate]

a. Functional
b. Decentralized by Product Line
c. Decentralized by Geography
d. Matrix
e. Centralized
Answer: e)
Team 29
8. Which of these Laws and Regulations is described by: Holds a company’s officers personally responsible for providing accurate public financial information to investors. Emphasis is on internal controls.
a) EU Data Protection Directive
b) Gramm-Leach-Bliley Act (GLBA)
c) Sarbanes-Oxley Act
d) California Senate Bill 1386 (Security Breach Information Act)
Answer: C
Team 29
9. Match the global source options with the description [Chapter 9, Page 267, Moderate]

Column A
a. In-sourcing
b. Onshoring
c. Nearshoring
d. Offshoring



Column B
A. We outsource to a partner in a nearby country
B. We do it ourselves
C. We outsource to a partner in a distant country
D. We outsource to a partner in our own country
Answer: aB, bD, cA, dC
8. Collaborative Software Category is also called ________________. [Chapter 5, Page 134, Moderate]

a. Groupware
b. Integrationware
c. Talking Software
d. Collaborware
e. Communiware
Answer: a)
9. Which of the following answers has all three primary options for obtaining an IS? [Chapter 6, Page 159, Moderate]

a. Acquisition, Buy, Leasing
b. Buy, Building, Acquisition
c. Leasing, Acquisition, Building
d. Leasing, Buy, Building
e. Buy, Leasing, Purchasing
Answer: c)
Team 29
10. True or False: Static content refers to information on a web page that may change depending on a number of factors. [Chapter 8, Page 227, Easy]
Answer: False
10. Creating a deliverable schedule document by analyzing the sequences, durations, and resource requirements of identified activities is referred to as _________. [Chapter 6, Page 179, Hard]

a) Activity sequencing
b) Activity duration estimating
c) Schedule development
d) Schedule control
Answer: c)
Team 29
11. What did Philip Grossman say one should do to become a consultant? [Philip Grossman, Slide 13, Moderate]
a) Know what XML is
b) Understand data modeling
c) Take Psychology classes
d) A and B
e) All of the above
Answer: E
11. The use of laptops, mobile phones, and PDA’s to connect to the Internet to conduct many activities commonly associated with e-commerce is called _________. [Chapter 7, Page 206, Easy]

a) E-communication
b) Mobile communication
c) I-commerce
d) Mobile commerce
Answer: d)
Team 29
12. In the class activity where team members were asked to build a Lego tower, teams had to manage time, scope, and cost. The goal of balancing these three factors in the project management of building the Lego tower was what?
a) To produce the tallest tower possible.
b) To produce the tower with the highest quality possible.
c) To produce the tower as quickly as possible.
d) To produce the tower that used the most Lego blocks.
Answer: B
12. Which of the following examples shows Customer Relationship Management? [Chapter 7, Page 205, Medium]

a) browse feature on an easy access toolbar
b) A 24/7 phone support line
c) Coupons delivered by mail to potential customers
d) Providing free shipping
Answer: b)
Team 16-8. What is the use of information systems, technologies, and computer networks by individuals and organizations to carry our transactions in order to create or support the creation of business value?
a.) MIST
b.) Business technology
c.) E-commerce
d.) Internet
Answer: c
Team 16-9. True/ False: A business model defines how a company will meet the needs of its customers while making a profit.
Answer: True
Team 16- True/False: A methodology is also known as a development life cycle.
Answer: True
Team 16- True/False: A methodology is also known as a development life cycle.
Answer: True
Team 16- 11. Multiple Choice: Ron Swift used an example of how a company may ‘segment’ their customers to achieve greater costs savings and sales by using which of the following groups:
a.) Quality Oriented, Family Oriented, and Low Representation
b.) Poor, Middle-Class, Rich
c.) Blue Collar People and White Collar People
d.) None of the above
Answer: A
Team 16- 12. The Lego building activity made the groups use all of the following except:
a.) Teamwork
b.) Quick Thinking
c.) Use of technology
d.) Efficient use of resources
Answer: C
Team 20 -- 1. Your company has realized that it will be much easier to outsource some of their production outside the US. As the CEO, you have to decide that the Global Sourcing technique that would be best for your company is Nearshoring. Which country would be an example of using the strategy of Nearshoring? [Chapter 9, pg. 267, easy]

a. India
b. China
c. Mexico
d. Argentina
e. None of the above
Answer: c
Team 20 -- 2. The knowledge work activity transformation is when a knowledge worker discovers trends or patterns that seem to explain the past and the present, and may suggest courses of action likely to favorably influence the future. [Chapter 3, pg. 59, moderate]

a. True
b. False
Answer: b
Team 20 -- 3. Which of the following is not a purpose of a business organization? [Chapter 1, pg. 5, moderate]

a. Deciding on one or more goals to pursue
b. Working together to locate and organize resources
c. Create a suitable working area
d. Create processes in order to achieve the desired goal or goals
e. None of the above
Answer: c
Team 20 -- 4. A structured decision problem is one in which you have uncertain information and no known path to a solution. [Chapter 3, pg. 65, easy]

a. True
b. False
Answer: b
Team 20 -- 5. In CARROTS, the “A” stands for: [Chapter 3, pg. 66, Moderate]

a. Acute
b. Actual
c. Accurate
d. Analyze
Answer: c
Team 20 -- 6. iTunes and ringtones are examples of: [Chapter 7, pg. 198, moderate]

a. B2B Commerce
b. C2C Commerce
c. B2C Commerce
d. C2G Commerce
e. None of the above
Answer: c
Team 20 -- 7. What is the primary language for creating Web pages? [Chapter 8, pg. 230, moderate]

a. HTTP
b. HTML
c. Java
d. VOIP
e. None of the above
Answer: b
Team 20 -- 8. ____________ is a set of technologies that Microsoft designed to support the sharing of information among different applications. [Chapter 8, pg. 236, moderate]

a. applet
b. Active X
c. plug-in
d. JavaScript
e. None of the above
Answer: b
Team 20 -- 9. A Java servlet(s)[Chapter 8, pg. 239, moderate]
a. is a small Java program that runs on a server
b. can execute more quickly than CGI applications on servers with a lot of traffic
c. can run on several different types of Web servers
d. all of the above
Answer: d
Team 20 -- 10. A(n) _________________Web site enables competitors to cooperate on a Web site. [Chapter 7, pg. 203, easy]
a. Coopetitive
b. Affiliate
c. Community
d. Brokerage
Answer: a
Team 20 -- 11. The Lego tower building project was an experiment in balancing cost, quality and __________. [In-class activity, moderate]

a. Resources
b. Materials
c. Time
d. Technology
Answer: c
Team 20 -- 12. A reduction of ______ on 80% of Sprint’s customer service calls saved the company $1,000,000 per month. [Presentation slides, number 15, Phillip Grossman, moderate]

a. 10 seconds
b. 60 seconds
c. 30 seconds
d. 45 seconds
e. 15 seconds
Answer: e
Team 26
1. Examples of ____________ include networks for school labs and private home wireless networks. (Chapter 2, Easy)
a) CAN
b) GAN
c) LAN
d) WAN
Answer: C
Team 26
2. A prospective UGA student has come to campus to get a feel for the atmosphere, visit classes, and examine campus housing. Which step of the IADD model is this scenario describing? (Chapter 3, Moderate)
a) Investigate
b) Analyze
c) Decide
d) Do
Answer: A
Team 26
3. Which of the following is an example of a stakeholder in a business? (Chapter 4, Difficult)
a) An individual
b) A government Agency
c) A Competitor
d) All of the above
Answer: D
Team 26
4. The purpose of a ____________ is to allow multiple servers to handle network processing activities. (chapter 5, moderate)
a) supercomputer
b) server farm
c) main frame
d) metropolitan area network
Answer: B
Team 26
5. ______________ is the application of knowledge, skills, tools, and techniques, to project activities to meet their requirements. (Chapter 6, moderate)
a) Project management
b) Time management
c) Project Scope management
d) Cost management
Answer: A
Team 26
6. In-house development involves hiring another company outside of one’s own staff to perform work related tasks (Chapter 6, page 160 easy).
a) True
b) False
Answer: B
Team 26
7. Which one of these phases of the life cycle of an IS involves the final training of users and management of users? (Ch. 6, Page 163, Moderate)
A) Elaboration
B) Transition
C) Construction
D) None of the above
Answer: B
Team 26
8. Online auctions such as eBay and Yahoo! Auctions are a part of ___ e-commerce transactions. [Ch. 7, Page 197, Moderate]
A) B2B
B) B2C
C) C2C
D) C2G
Answer: C
Team 26
9. Which of the following is the most common client-side scripting language? (Chapter 8, pg. 235, Moderate)
a) Active X
b) Google
c) Data validation
d) JavaScript
Answer: D
Team 26
10. Which of the following describes outsourcing to a business partner located outside your country but in the same general geographic area as your business? (Chapter 9, page 267, Easy)
a) Offshoring
b) Nearshoring
c) Onshoring
d) Farshoring
Answer: B
Team 26
11. True or False. IS consultant, Philip Grossman explained in his presentation, the difference between a goal and a requirement is that a goal is NOT measurable while a requirement is something that can be measured. [Guest Speaker Presentation, Philip Grossman, Difficult]
A) True
B) False
Answer: A
Team 26
12. The “Lego Tower” building activity was meant to stress which of the following requirements of a successful team effort? (Class Activity: Lego Tower, Easy)
A) Organization
B) Team Work
C) Communication
D) Planning
E) All of the above
Answer: E
Team 24

1.What does TPS (transaction processing system) do? (Chapter 1, page 14, moderate)
a.Provides analytical and visualization tools to support and enhance decision making and planning
b.Integrates and standardizes processes and centralizes and standardizes storage and management of data
c.Captures and processes transactions to make them available to the organization
d.Provides timely information to decision makers
e.None of the above
Answer: C
Team 24
2. Which type of network connects computers that cover entire regions, countries, and even overseas? (Chapter 2, page 43, easy)

a.LAN
b.CAN
c.GAN
d.WAN
e.MAN
Answer: D
Team 24
3. Which knowledge work activity involves comparing sales data of the first week in May to similar data from our company for the previous two months? (Chapter 3, page 63, moderate)

a.Discovery
b.Transformation
c.Analysis
d.Synthesis
e.Communication
Answer: B
Team 24
4.Which of the following is not a disadvantage of a functional organizational form? (Chapter 4, page 93, difficult)

a.Poor communication and coordination between functional areas
b.Less direct control by upper management
c.Relatively inflexible or slow responses to changes in business environments
d.Employees may focus on functional area goals rather than organizational goals
e.None of the above
Answer: B
Team 24
5. What is an advantage of using in-house development vs. outsourcing? (Chapter 6, page 161, moderate)

a.High level of skill and expertise
b.Firm retains complete control of the project
c.Generally lower time and costs
d.Internal staff provides project oversight, which is less time intensive than full development
Answer: B
Team 24
6. Selling your record collection on ebay.com is a form of _______ e-commerce? ( Chapter 7, page 199, easy)

a.B2B
b.C2G
c.C2C
d.B2C
Answer: C
Team 24
7.For the strategic orientation, the CIO must understand and effectively manage the people, the processes, and the technologies of IS. (Chapter 9, page 262, hard)

a.True
b.False
Answer: False: for structural orientation, the CIO must understand and effectively manage the people, the processes.
Team 24
8.A ______ study is a detailed investigation and analysis of a proposed development, to determine whether it is technically and economically possible. (Chapter 6, page 157, easy)

a.Hardware
b.Compatibility
c.Feasibility
d.Needs
Answer: C
Team 42

1.What is a high-level computer language that another program interprets? [Chapter 8, page 235, Easy]
a. Data validation
b. Plug-in
c. Scripting language
d. Cookie
Answer: C
Team 24

9.True of False: An affiliate receives a fee for their web sites when purchases come through them. (Chapter 7, page 210, moderate)

a.True
b.False
Answer: True
Team 24
10.What does the LAMP acronym stand for? (Chapter 8, page 240, hard)
(Fill in the blank)
Answer: Linux: Apache: Mysql: Per, I PHP, or Python
Team 24
11.Segmentation involnes… (Ron Swift, slide 33, hard)
a.Defining, satisfying, growing, interacting, buildingselling, profiling, modeling, and RFM.
b.Identifying product affinities
c.Template process and verbiage for reusable Targeted Campaigns
d.A & C
e.None of the above
Answer: A
Team 24
12. Business processes and IT are more complex than every before due to which of the following factors? (Class activity, team case B, easy)

a. Globalization
b. Mergers and acquisitions
c. Constantly improving technology
d. All of the above
e. None of the above
Answer: D
Team 42

2.Match the following with their correct definitions [Chapter 9, page 267, Moderate]:

A.In-sourcing a. outsource to a partner in a distant country
B.Onshoring b. outsource to a partner in the same country
C.Nearshoring c. do it in-house
D.Offshoring d. outsource to a partner in a nearby country
Answers: Ac, Bb, Cd, Da
Team 42

3.The FBI will only consider identity theft cases that involve more than [John Gorzynski Guest Lecture, Difficult]
a. $25,000
b. $50,000
c. $100,000
d. $250,000
Answer: C
Team 31

Ch.1, p.6

Difficulty: Easy

The most widely used component of the Internet is the World Wide Web, or “the web”. True or False?
Correct Answer: True
Team 42

2.Match the following with their correct definitions [Chapter 9, page 267, Moderate]:

A.In-sourcing a. outsource to a partner in a distant country
B.Onshoring b. outsource to a partner in the same country
C.Nearshoring c. do it in-house
D.Offshoring d. outsource to a partner in a nearby country
Answers: Ac, Bb, Cd, Da
Team 42

2.Match the following with their correct definitions [Chapter 9, page 267, Moderate]:

A.In-sourcing a. outsource to a partner in a distant country
B.Onshoring b. outsource to a partner in the same country
C.Nearshoring c. do it in-house
D.Offshoring d. outsource to a partner in a nearby country
Answers: Ac, Bb, Cd, Da
Team 31

Ch.2, p.26

Difficulty: Moderate

Information Technology consists of three basic categories:
A. Hardware, Software, and Networks
B. Monitors, CPUs, and Printers
C. Bits, Bytes, and Kilobytes
D. Microprocessors, RAM, and Hard Drives
Correct Answer: A. Hardware, Software, and Networks
Team 31

Ch. 3, p.60

Difficulty: Easy

Which of the following allows you to discover the trends or patterns that seem to explain the past and the present, and my suggest courses of action for the future?
A. Analysis
B. Synthesis
C. Transformation
D. Discovery
Correct Answer: B. Synthesis
Team 31

Ch. 4, p.87

Difficulty: Moderate

Which of the following is an input to an organization as an open system?
A. Labor
B. Raw material
C. Capital
D. Feedback
E. A, B, and C
Correct Answer: E. A, B, and C
Team 31

Ch.6, p.175
Difficulty: Easy
The application of knowledge skills, tools, and techniques to project activities
to meet project requirements is known as ___________
A. A model
B. Data flow diagram (dfd)
C. Project management
D. Code generation
Correct Answer: C. Project Management
Team 31

Ch. 7, p.201
Difficulty: Moderate
What is the ability to create custom products or services on-demand?
A. Information density
B. Mass customization
C. Personalization
D. Strategic sourcing
Correct Answer: B. Mass Customization
Team 31

Ch. 7, p.211

Difficulty: Easy

A ______ defines how a company will meet the needs of its customers while
making a profit.
A. Business model
B. CEO
C. Clientele
D. Deadline
Correct Answer: A. Business Model
Team 31

Ch. 8, p.235
Difficulty: Easy
A scripting language is a high-level computer language that another program interprets. True or False?
Correct Answer: True
Team 31

Ch.8, p.235
Difficulty: Hard
A high-level computer language that another program interprets when executed is a ______
A. Web browser
B. Program
C. Url
D. Scripting language
Correct Answer: D. Scripting Language
Team 31

Ch.8, p. 236
Difficulty: Moderate
What is a small software module that is compatible and can work along with your browser?
A. Applet
B. Database
C. Plug-in
D. Script
Correct Answer: C. Plug-in
Team 31

From guest presentation, Matt_Gonzales_Presentation_012709-1, Slide 2.
Difficulty: Hard
Matt Gonzales is an IT Specialist at the University of Georgia in the EITS department, which is abbreviated for this department:
A. Electronic Information Technology Support
B. Electronic Information Tools Services
C. Electronic Information Technology Systems
D. Enterprise Information Technology Support
Correct Answer: D. Enterprise Information Technology Support
Team 31

From class activity, Egg Drop

Difficulty: Easy

During the Egg Drop activity the eggs were dropped from what location?
A. Sanford Bridge
B. London Bridge
C. North Campus Parking Deck
D. Main Library Rooftop
Correct Answer: A. Sanford Bridge
A __________ is a person who uses information, information systems, and information technology to create business values for an organization. [Chapter 1 (pg.4), Moderate]
a.) MIST student
b.) secretary
c.) data specialist
d.) knowledge worker
Answer: d
2. Match the appropriate categories of information technology to its definition [Chapter 2 (pg.26), Easy]

Column A
a.) Network
b.) Hardware
c.) Software
Column B
A. electronic & mechanical components
B. set of instructions that direct hardware
C. allows shared resources
Answer: aC, bA, cB
3. ________________________ contains instructions and data that only special devices can alter. [Chapter 2 (pg.30), Difficult]
a.) Random Access Memory (RAM)
b.) Read Only Memory (ROM)
c.) Central Processing Unit (CPU)
d.) Network Interface Card (NIC)
e.) Liquid Crystal Displays (LCDs)
Answer:b
4. A mainframe is larger and faster than a supercomputer. [Chapter 5 (pg.120), Easy]
a.) True
b.) False
Answer: b (False)
Team 11
1) A person who uses information, information systems, and information technology to create business value for organizations (Chapter 1, pg. 4, easy)
a) Knowledge worker
b) IT technician
c) Project manager
d) CEO
Answer: a
5. There are ____ stages and activities of system development. [Chapter 6 (pg.162), Moderate]
a.) 4
b.) 1
c.) 10
d.) 7
e.) 14
Answer: d
Team 11
2) Which one of these is NOT a type of hardware? (Chapter 2, moderate)
a) storage
b) memory
c) input
d) LAN
Answer: d
6. Which was the first life cycle model to gain wide acceptance among system developers? [Chapter 6 (pg.168), Difficult]
a.) build-and-fix model
b.) Waterfall model
c.) evolutionary model
d.) logical data model
Answer: b
Team 11
3) Match the terms to the definitions in the CARROTS acronym (Chapter 3, slide 17, hard)

Column A Column B
a. Complete A. The data source contains data that are dependable and consistent with data from other comparable data sources
b. Accurate B. The data source contains data that can be applied to today’s problems and objectives
c. Reliable C. The data source contains the entire range of data you need
d. Relevant D. A data source is internal if it contains data concerning the internal operations and entitles within the organization. A data source is external if it contains data concerning operations or entitles external to the organization.
e. Objective E. The data source contains data that are appropriate and current for the time frame during which the data are needed
f. Timely F. The data source contains data that are unbiased
g. Source G. The data source contains data that are correct
Answer: aC, bG, cA, dB, eF, fE, gD
7. Match the types of e-commerce with its description. [Chapter 7 (pg.197), Easy]
Column A:
a.) business-to-consumer
b.) business-to-government
c.) business-to-business
d.) consumer-to-government
e.) consumer-to-consumer
Column B:
A.) electronic payment of taxes
B.) electronic exchange between companies
C.) use of online auctions
D.) online sales to government agencies
E.) online shopping for retail stores
Answer: aE, bD, cB, dA, eC
Team 11
A main frame is smaller than a personal computer (Chapter 5, pg. 120, easy)
a) true
b) false
Answer: b
8. Which is the language that guides the display of a requested page when using the world wide web? [Chapter 8 (pg.228), Easy]
a.) HTML
b.) HTTP protocol
c.) GUI (graphical user interface)
d.) Java
Answer: a
9. A cookie is stored on the client’s machine. [Chapter 8 (pg.223), Easy]
a.) True
b.) False
Answer: a (True)
Team 11
Which one of these is a stage of system development? (Chapter 6, pg. 162, hard)
a) Inception
b) Elaboration
c) Programming
d) Retirement
Answer: c
10. Which type of global sourcing occurs in the same country of the business? [Chapter 9 (pg.267), Difficult]
a.) In-Sourcing
b.) Nearshoring
c.) Onshoring
Answer: c
Team 11
Which one of the following is a programming language? (Chapter 6, pg. 185, hard)
a) IDE
b) C + +
c) PERT
d) Gantt
Answer: b
11. How can criminals use a stolen identity? [Gorzynski speaker, Moderate]
a.) Pay a loan
b.) Cover for drug trafficking
c.) Create new credit card accounts
d.) All of the above
Answer: d
Team 11
Amazon.com is an example of business-to-consumer (B2C). (Chapter 7, pg. 197, moderate)
a) True
b) False
Answer: a
12. The Egg Drop Activity exemplified which team skills? [In-class activity, Easy]
a.) Complementary
b.) Specialist
c.) Assorted
d.) Comprehension
Answer: a
Team 11
A general formula for how a business is going to use computer networks and information systems to compete in a global marketplace. (Chapter 7, pg. 204, easy)
a) Privacy policy
b) E-commerce
c) Mobile commerce
d) Strategic sourcing
Answer: b
Team 11
Match the terms with the definitions from the LAMP acronym (Chapter 8, pg. 241, moderate)

Column A Column B
a. Linux A. a web server software application
b. Apache B. a selection of script programming languages
c. MySql C. used as the operating system for the servers (and possibly the clients)
d. Perl, PHP, or Python D. a database management system
Answer: aC, bA, cD, dB
Team 11
A business’s leader of the information and technology efforts, especially as it relates to the creation of business value. (Chapter 9, pg. 262, easy)
a) CFO
b) CIO
c) CEO
d) CRO
Answer: b
Team 11
Which guest speaker discussed Business Intelligence and the use of large data sets to drive business decisions? (guest presentation, moderate)
a) John Gorzynski of EITS
b) Matt Gonzales of EITS
c) Ron Swift of Teradata
Answer: c
Team 11
The egg drop activity in class was a good example of (Chapter 4 appendix lecture, easy)
a) Information system
b) Business procedures
c) Teamwork
d) Knowledge work
Answer: c
Team 6

Which one of these are not a type of Information System? (Chapter 1 slide 23, moderate)
a. Transaction Processing Systems
b. Management Information System
c. Enterprise Resource Planning
d. Information Security
Answer: D
What are raw unorganized facts, numbers, and pictures? [Chapter 1, pg. 8, easy]
A) Data
B) Information
C) Knowledge
D) Wisdom
Answer: A
Which of the following is/are information technology categories? [Chapter 2, pg. 26, moderate]
A) Hardware
B) Software
C) Network
D) All of the Above
Answer: D
Team 6

What is the difference between hardware and software? (Chapter 2 slide 6, easy)
a. Hardware is the electronic and mechanical components that you can see and touch. Software is the set of instructions that direct the hardware.
b. Software is the electronic and mechanical components that you can see and touch. Hardware is the set of instructions that direct the hardware.
c. Hardware temporarily stores data and instructions before processing. Software provides the interface used for data entry into a device.
d. Software temporarily stores data and instructions before processing. Hardware provides the interface used for data entry into a device.
Answer: E
Team 6

In the acronym C.A.R.R.O.T.S what does the O stand for? (Chapter 3 slide 18, easy)

a. Orderly
b. Objective
c. Organized
d. Open-Minded
Answer: B
Team 6

Skills that include expertise or functional knowledge, such as a CPA’s accounting knowledge or an experienced programmer’s IS knowledge? (Chapter 4 pg.112, moderate)

a. Technical Skills
b. Problem-solving skills
c. Interpersonal skills
d. None of the Above
Answer: A
Team 6

A feasibility study is a detailed investigation and analysis of a proposed development project, to determine whether it is technically and economically possible. (Chapter 6 pg.157, moderate)

a. True
b. False
Answer: A (True)
Team 6

Which step in the overview of management tasks identifies and manages all the tasks required to complete a project? (Chapter 6 pg.175, moderate)

a. Time management
b. Cost management
c. Project Scope management
d. Quality management
Answer: C
Team 6

Which of the following is not a type of E-Commerce Transaction? (Chapter 7 slide 7, moderate)

a. Business-to-consumer
b. Business-to-government
c. Business-to-Conglomerate
d. Business-to-Business
Answer: C
Team 6

Which of the following is the programming language of CGI (Common Gateway Interface) (Chapter 8 pg. 239, moderate)

a. PERL
b. PHP
c. JAVA
d. Visual Basic
Answer: A
Team 6

A secure gateway provider is a company that provides a network to process encrypted transactions from a merchant’s Web site. (Chapter 8 slide 28, easy)

a. True
b. False
Answer: A (True)
Team 6

A ______________ is a worldwide approach to business that seeks to create business value in an economic world that is largely flat, borderless, and cyber-connected? (Chapter 9 pg. 265, moderate)

a. Global Perspective
b. Global Sourcing
c. In- Sourcing
d. Onshoring
Answer: A
Team 6

What is an IS consultant? (From Philip Grossman’s presentation, easy)

a. Anyone who uses a computer.
b. The cashier at a local supermarket.
c. An experienced individual that is trained to analyze and advise a client in order to help the client make the best possible choices.
d. A software designer.
Answer: C
Team 6

What is the importance of using small teams to work on a project? (From class activities, easy)

a. To get multiple perspectives of problems and solutions.
b. For team members to build of each other’s ideas.
c. To utilize several different skill sets.
d. All of the above.
Answer: D
Team 2
What does the information system, TPS, stand for? [chapter 1, slide 23, easy]:

a) Transaction Processing System
b) Transformation Practice System
c) Test Procedure Specification
d) Transactions Per Second
Answer: A
Team 2
IS security protects which of the following [chapter 1, page 15, easy]:
a. people
b. information
c. software
d. hardware
e. all of the above
Answer: E
Team 2
What allows you to discover trends of patterns that seem to explain the past and the present, and may suggest courses of action likely to favorably influence the future [chapter 3, page 60, moderate]:
a. Analysis
b. Synthesis
c. Transformation
d. Discovery
Answer: B
Team 2
IT devices share a common set of _____ components [chapter 2, page 29, hard]:
a. hardware
b. software
c. network
d. system
Answer: D
Team 2
When managing a project which of the following life cycle models would provide the best plan for the team? [chapter 6, page 169, moderate]
a. The Build-and-Fix Model
b. The Waterfall Model
c. The Evolutionary Model
d. Methodical Model
Answer: C
Team 2
__________ is the primary language for defining how Webs pages are displayed in a browser. [chapter 8, page 230, moderate]
a. HTTP
b. HTML
c. Java
d. VOIP
Answer: B
Team 2
In the PPT Enterprise Information Security Framework Model, what is PPT an acronym for? [chapter 9, page 285, easy]
a. Police – Per – Terminal
b. People – Policy – Technology
c. Personnel – Problem – Technology
d. Persons – Per – Terminal
Answer: B
Team 2
The most common method of providing security to e-commerce transactions, as well as most other Internet activity, is encryption. [chapter 8, slide 32, moderate]:
a) true
b) false
Answer: A
Team 2
The three types of internal control that were discussed in class are Defensive, Detective, and Corrective. [chapter 9, slide 33, easy]:

a) true
b) false
Answer: B
Team 2
______ is a process affected by an entity’s board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives. [chapter 9, page 281, easy]
a) External Controls
b) Reliance
c) Compatibility Shareholder
d) Internal Controls
Answer: D
Team 2
Which of the following is NOT an element of project management that the class did not consider when creating their lego towers? [lecture (group activity), chapter 6, slide 43, moderate]:

a) Time
b) Resources
c) Leadership
d) Quality
Answer: C
Team 2
The FBI will pick up identity theft cases involving more than how
much money? [John Gorzynski Presentation]
a) $50,000
b) $100,000
c) The CIA not the FBI investigates identity theft
d) The FBI will investigate any cases of identity theft
Answer: B
Team 10
1.) A Transaction Processing System (TPS) is an information system that integrates and standardizes processes. [Chapter 1, Page 14, Moderate]

A) True
B) False
Answer: B) False
Team 10
2) Which of the following is not a way IT benefits the support the organization and its processes? [Chapter 4, Page 104, Hard]

A) Informating
B) Gaining a competitive advantage
C) Automating
D) Analyzing
E) Supporting the Value Chain
Answer: D) Analyzing
Team 10
3) Teradata, the business which employs guest speaker Ron Swift, earns its revenue by doing which of the following? [Ron Swift-Guest Speaker, 1/20/09, Easy]

A) researching technology
B) Manufactoring hardware
C) Creating large databases for corporations
D) Updating corporations’ security systems
Answer: C
Team 22
1. An ______ uses Internet technolgies to interconnect the intranet of an organization with the intranets of its business partners. ( Chapter 7, pg 218, Easy)

a) Outernet
b) Extranet
c) Fishnet
d) Digitalnet
Answer: b)
Team 22
2. When using e-commerce, it is commonly referred to as______________ ( chp 7, pg 215,difficult)
a) e-process
b) e-procurement
c) e-transaction
d) e-business
Answer: b)
Team 22
3.What ASP stands for______________? ( Chapter 6, pg 160, moderate)
a). Application service providers
b). Application software providers
c). Application service position
d). Application service products
Asnwer: a)
Team 22
4. In the IADD model, A stands for ___________? (Chapter 3, pg 71,moderate)
a) Apply
b) Analyze
c) Associate
d) Abreviate
Answer: b)
Team 22
5. Someone who does knowledge work is a ______________? ( Chapter 1, pg 4, easy)
a) Knowledge worker
b) Business partner
c) CEO
d) None of the above
Answer: a)
Team 22
6. The name of a city-wide area network is a ___________? ( Chapter 2, pg 43, difficult)
a) LAN
b) PAN
c) GAN
d) MAN
Answer: d)
Team 22
7. Which of the following is the foundation technology that makes the internet possible? ( Chapter 2, pg 46, moderate)
a) WWW
b)HTTP
c) TCP/IP
d) ISP
Answer: C)
Team 22
8. What did Mr. Ron Swift of Teradata mainly discussed in the class? ( Guest Speaker question, difficult)
a). He discussed information security at UGA and indentify theft
b) He discussed the issues an organization faces in managing large numbers of Pcs
c) He discussed Business Intelligence and the use of large data sets to drive business decisions.
d) He disused his last summer vacation in Canada.
Answer: C)
Team 22
9. What was the purpose of Egg-Drop in class activity? (Class activity question, easy)
a) To chill out
b) To waste the eggs
c) To explore team decision making
d) To have fun
Answer: C)
Team 22
10. What does CIO stands for? ( Chapter 9, pg 262, Difficult)
a) Chief IntelligenceOfficer
b) Chief Investment Officer
c) Chief Innovative Officer
d) Chief Information Officer
Answer: d)
Team 22
11. Control totals can help detect fraudulent actions. ( Chapter 9, pg 283, moderate)
a) True
b) False
Answer: a)
Team 22
12. Why most business use server-side programming ? ( Chapter 8, pg 238, moderate)
a) to deliver truly dynamic content
b) to deliver instant messages
c) to deliver business processes
d) to deliver spam messages
Answer: a)
Team 38
1. Which of the following is not a stakeholder in Bob's Company? [Chapter 4, page 87; easy]
a. Bob's supplier
b. Bob's employee, Konrad
c. Will, a potential customer
d. Jim, a shareholder of Bob's Company
Answer: c
Team 38
2. Productivity is... [Chapter 3, page 68; moderate]
a. achieving the most output from a given input
b. the ability to create more work in a quicker amount of time
c. the ability to create business value at the least amount of cost
d. pursuing a goal or task faster than it is appropriate for the given situation
Answer: c
Team 38
3.Although ergonomically designed tools can help keep workers safe, they will almost always be less productive. [Chapter 2, page 31; moderate]
a. True
b. False
Answer: b
Team 38
4. In order, list the 5 stages of “Tuckman’s Stage Model of Team Development”. [Chapter 4, page 115; hard]
a. Storming, Norming, Forming, Performing, Adjourning
b. Storming, Forming, Norming, Performing, Adjourning
c. Forming, Storming, Norming, Performing, Adjourning
d. Forming, Storming, Performing, Norming, Adjourning
e. None of the above
Answer: c
Team 38
5. The Waterfall model is a document-driven process, meaning work during each phase generally produces a document or other type of deliverable. [Chapter 6, page 168; easy]
a. True
b. False
Answer: a
Team 38
6. E-Commerce affects competition between organizations in which of the following ways? [Chapter 7, page 202; moderate]
i. Reduced barriers to entry
ii. Prevents competition from “owning” the market
iii. Changes marketplace drivers
iv. Reduces market niches
a. i and ii only
b. i, ii, and iii only
c. iv only
d. i, ii, iii, and iv
Answer: b
Team 38
7. Match the following Global Sourcing decisions with the appropriate examples. [Chapter 9, page 267; easy]
Column A Column B
c. In-sourcing A. outsource to a partner in a nearby country
d. Onshoring B. no outsourcing is used
e. Nearshoring C. outsource to a partner in a distant country
f. Offshoring D. outsource to a partner in own country
Answer: aB, bD, cA, dC
Team 38
8. The E-commerce business model “brokerage” can be described as: [Chapter 7, page 210; moderate]
a. Selling products, both physical and electronic, to consumers
b. Bringing together buyers and sellers for a fee
c. Charging a fee to users to subscribe to service or information source
d. Enabling competitors to cooperate on a web site
Answer: b
Team 38
9. In-sourcing means: [Chapter 9, page 267; easy]
a. We outsource to a partner in a nearby country
b. We outsource to a partner in a distant country
c. We do it ourselves
d. We outsource to a partner in our own country
Answer: c
Team 38
10. An organization usually chooses one of the three primary options for obtaining an IS: (1) acquisition (2) leasing (3) building. [Chapter 6, page 159; easy]
a. True
b. False
Answer: a
Team 38
11. In the Lego Tower activity, the quality triangle was bounded by the triple constraints. Which of the following is NOT a triple constraint? [In-Class Activity; easy]
a. Time
b. Project Members
c. Resources
d. Scope
Answer: b
Team 38
12. According to John Gorzynski’s presentation, which of the following is NOT a technique to employ when creating a good password? [In-Class Presentation; easy]
a. Include capital and lower case letters
b. Have at least 8 characters
c. Add special characters and symbols
d. Use a word that is in the dictionary
Answer: d
Team 5:
What are the two main types of system software? [Chapter 2, slide 20 moderate]
a. Firmware and system software
b. Operating systems software and utility software
c. Utility software and information software
d. Firmware and productivity software
Answer: b
Team 5:
Chapter 3, slide 15, easy
a. Discovery A. Recognizing patterns-“putting together
b. Transformation B. Organizing the data
c. Analysis C. Relaying ideas and solutions
d. Synthesis D. Finding relevant data to the problem
e. Communication E. Thoughtful investigation of data-“taking apart”
Answer:aD, bB, cE, dA, eC
Team 5:
While working with the egg drop, you worked together as a team. When you were brainstorming to come up with a design for your drop, what developmental stage of teamwork were you participating in? (Chapter 4 appendix, page 115)
a. Storming
b. Performing
c. Adjourning
d. Norming
Answer: A
Team 36:
12) ____________ uses technology instead of knowledge workers to perform tedious or repetitive tasks. [Chapter 4, easy]

a) information technology
b) spyware
c) enterprise-wide systems
d) automating
Answer - d
Team 36:
Which off the following is not a category of information technology? [Chapter 2, moderate]

a) Hardware
b) Software
c) Programs
d) Networks
e) None of the above
Answer c
Team 36:
A knowledge worker is a person who uses information systems and information technology to create business value for an organization. [Chapter 1, easy]

True
False
Answer: True
Team 36:

A process that is effected by an entity’s stakeholders and applied strategically across an enterprise is known as: [Chapter 9, moderate]

A. Compliance
B. Enterprise Risk Management
C. Control Advantage
D. Policy
Answer: B
Team 36:

What is e-commerce? [Chapter 7, easy]

a) The use of information systems, technologies, and computer networks to carry out transactions in order to create or support the creation of business value.
b) A broad-based formula for how a business is going to compete
c) An extension of the traditional media broadcasting model in which ads appear on websites.
d) When a business makes and sells products directly to the customer.
Answer: A
Team 36:

Which of the following are not elements of project management? [Chapter 6, moderate]

a) Time
b) Resources
c) Scope
d) Paper
Answer: D
Team 36:

Which of the following is not one of the events listed in Teradata’s Event-Driven marketing scheme as presented by Ron Swift? [Ron Swift presentation slide 23, difficult]

a) marriage
b) death
c) new home
d) divorce
e) new job
Answer: C
Team 36:

In the class activity involving a demonstration for a courier service, the egg delivery designs that had the most success did not involve the use of a parachute. [In class activity, moderate]

true
false
Answer: False
Team 36:

Which of the following is not a component of the CARROTS acronym for data use? [Chapter 3 slide 17, difficult]

a) resource
b) objective
c) complete
d) relevant
e) source
Answer: A
Team 36:

What is not a limitation to consumer e-commerce? [Chapter 7, page 208, moderate]

a) Increased competition due to global marketplace
b) Delay in receiving physical products
c) Unavailability of micropayments for purchase of small-cost products
d) Security and privacy concerns
e) Inability to touch, feel, or smell
Answer: A
Team 36:

What is the most common client-side scripting language? [Chapter 8, page 235, easy]

a) HTML
b) ActiveX
c) Javascript
d) MySql
Answer: C
Team 36:

A ________________ translates entities and relationships that are indicated by the ___________________ into a diagram of the tables in a database. [Chapter 6, pages 171-172, moderate]

a) Logical Data Model; Entity-Relationship Diagram
b) Entity-Relationship Diagram; Logical Data Model
c) Logical Data Model; Data Flow Diagram
d) Data Flow Diagram; Logical Data Model
Answer: A
Team 21
Electronic exchanges between companies would be classified as? [Ch.7, pg. 197, easy]
A) B2B
B) B2C
C) C2C
D) B2G
Answer: A
Team 21
A small data file used to store data on a client’s computer? [Ch. 8, pg.233, easy]
A) Cookie
B) Web Server
C) Web Client
D) Plug-in
Answer: A
Team 21
During the egg drop activity, which was an advantage of working in a team? [Egg Drop Activity, easy]
A) Variety of Design Ideas
B) Use of other groups' ideas
C) More Eggs
D) Having the ability to test your design
Answer: A
Team 21
Which of the following computer programs is not used by Matt Gonzalez at EITS? [Matt Gonzalez Power Point, Hard]
A) Symantic Ghost
B) Faronics Deep Freeze
C) Altria Brix
D) Windows Server 2003
Answer: C
Team 30
1. Organizers of a __________ select a group of people to show up for a predetermined reason at a pre-established time through the use of technology like cell phones, text messages, e-mail, instant messages, and web sites. [Chapter 2 page 27, moderate]
a. Flash mob
b. Selecting mob
c. Smart flock
d. A and C
Answer: d
Team 30
2. Intellectual property is any creation of the mind, including inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce. [Chapter 3 page 64, easy]
a. True
b. False
Answer: a
Team 30
3. A disadvantage of a decentralized organizational form would be: [Chapter 4 page 93, moderate]
a. Faster response and greater flexibility
b. Greater communication and coordination between organizations
c. Duplication of resources and efforts across organizational units
d. Greater development of breadth of managerial skills
Answer: c
Team 30
4. The problem of combining all of the disparate technologies into a single, overall system is known as the collaborate software. [Chapter 5 page 135, easy]
a. True
b. False
Answer: b
Team 30
5. In system development, which stage finalizes the system and puts it in place? [Chapter 6, moderate, page 163]
a) Inception
b) Elaboration
c) Transition
d) Retirement
e) none of the above
Answer: c)
6. Which one is false? E-commerce affects competitions in number of ways such as: [Chapter 7, hard, page 202]
a) Multiplying market niches
b) Reducing barriers to entry
c) Making easier to prove that your product is better
d) Changing marketplace drivers
e) none of the above
Answer: c)
Team 30
7. Which one is true? [Chapter 8, moderate, page 227]
a) Different stages of e-commerce can exist in the same time.
b) If one stage ends, a new one begins, while the old one disappears.
c) There are 5 stages of e-commerce.
d) There are 3 stages of e-commerce.
e) none of the above
Answer: a)
8. Which one is true? [Chapter 9, easy, page 267]
a) In-sourcing is part of global sourcing
b) near-shoring is part of global sourcing
c) on-shoring is part of global sourcing
d) off-shoring is part of global sourcing
e) all of the above
Answer: e)
9. What is the most common client-side scripting language?[Chapter 8, easy, page 235]
a)JavaScript
b)ActiveX
c)WebScript
d)SAP
e) None of the Above
Answer: A
10. What does SOA stand for? [Chapter 8, moderate, page 252]
a) Service Oriented Administration
b)Selling or Archiving
c) Service-Oriented Architecture
d)Sale-Oriented Advertising
e) None of the above
Answer: A
11. When we constructed lego buildings in class we were limited by a few factors that consisted of time, _______, and scope; also known as the triple constraints.[In class activity]
a. resources
b. management
c. information
d. none of the above
ANSWER A
12. What two books did Philip Grossman recommend reading?[Hard, Guest Speaker - Grossman]
a. “48 Laws of Power” and “Predictably Irrational”
b. “Freakonomics” and “The Millionaire Mind”
c. “37 Laws of Power” and “Freakonomics”
d. “Predictably Irrational” and “The Millionaire Mind”
e. None of the Above
Answer: A
1.Which best fits the IPO model of an Information System? (Easy, Ch. 1)

A) Information, Precision, Operation
B) Input, Process, Output
C) Information, People, Output
D) Input, Process, Operation
Answer: B
2. Which is not an output hardware component? (Easy, Ch.2)

A) Printer
B) Speaker
C) Screen
D) USB Flash Drive
Answer:D
3. A decision that cannot be programmed because it is part of a routine or habit is known as?
(Moderate, Ch.3)
A) Unstructured
B) Semi-structured
C) Structured
D) Destructed
Answer:C
4. Which is the correct computer hierarchy from largest to smallest? (Moderate, Ch. 5)

A) Mainframe, Server, PC, PDA
B) Supercomputer, PC, Server, Processor
C) Server, Mainframe, PDA, PC
D) PC, Server, Supercomputer, PDA
Answer: A
1) A person who uses information, information systems, and information technology to create business value for organizations (Chapter 1, pg. 4, easy)
a) Knowledge worker
b) IT technician
c) Project manager
d) CEO
Answer: a)
2) Which one of these is NOT a type of hardware? (Chapter 2, moderate)
a) storage
b) memory
c) input
d) LAN
Answer: d)
3) Match the terms to the definitions in the CARROTS acronym (Chapter 3, slide 17, hard)

Column A Column B
a. Complete A. The data source contains data that are dependable and consistent with data from other comparable data sources
b. Accurate B. The data source contains data that can be applied to today’s problems and objectives
c. Reliable C. The data source contains the entire range of data you need
d. Relevant D. A data source is internal if it contains data concerning the internal operations and entitles within the organization. A data source is external if it contains data concerning operations or entitles external to the organization.
e. Objective E. The data source contains data that are appropriate and current for the time frame during which the data are needed
f. Timely F. The data source contains data that are unbiased
g. Source G. The data source contains data that are correct
Answer: aC, bG, cA, dB, eF, fE, gD
A main frame is smaller than a personal computer (Chapter 5, pg. 120, easy)
a) true
b) false
Answer: b)
Which one of these is a stage of system development? (Chapter 6, pg. 162, hard)
a) Inception
b) Elaboration
c) Programming
d) Retirement
Answer: c)
Which one of the following is a programming language? (Chapter 6, pg. 185, hard)
a) IDE
b) C + +
c) PERT
d) Gantt
Answer: b)
Amazon.com is an example of business-to-consumer (B2C). (Chapter 7, pg. 197, moderate)
a) True
b) False
Answer: a)
A general formula for how a business is going to use computer networks and information systems to compete in a global marketplace. (Chapter 7, pg. 204, easy)
a) Privacy policy
b) E-commerce
c) Mobile commerce
d) Strategic sourcing
Answer: b)
Match the terms with the definitions from the LAMP acronym (Chapter 8, pg. 241, moderate)

Column A Column B
a. Linux A. a web server software application
b. Apache B. a selection of script programming languages
c. MySql C. used as the operating system for the servers (and possibly the clients)
d. Perl, PHP, or Python D. a database management system
Answer: aC, bA, cD, dB
A business’s leader of the information and technology efforts, especially as it relates to the creation of business value. (Chapter 9, pg. 262, easy)
a) CFO
b) CIO
c) CEO
d) CRO
Answer: b)
Which guest speaker discussed Business Intelligence and the use of large data sets to drive business decisions? (guest presentation, moderate)
a) John Gorzynski of EITS
b) Matt Gonzales of EITS
c) Ron Swift of Teradata
Answer: c)
1. What type of worker is a person who uses information, information systems, and information technology to create business value for organizations? [Chapter 1 p. 4, moderate]
a) knowledge worker
b) technology worker
c) mechanical worker
d) business worker
e) none of the above
Answer: a)
The egg drop activity in class was a good example of (Chapter 4 appendix lecture, easy)
a) Information system
b) Business procedures
c) Teamwork
d) Knowledge work
Answer: c)
2. What are raw unorganized facts, numbers, and pictures? [Chapter 1, easy]
a) data
b) information
c) knowledge
d) business process
e) none of the above
Answer: a)
3. The internet is controlled by several independent, international companies. [Chapter 2, hard]
a) true
b) false
Answer: b)
4. What does the C stand for in CARROTS? [Chapter 3 p.66, moderate]
a) Correct
b) Calculated
c) Complete
d) Compressed
e) none of the above
Answer: c)
5. What is a traditional IS model that depicts how data move through a system? [Chapter 6, hard]
a) UML sequence diagram
b) Entity Relationship Diagram
c) Logical Data Model
d) data flow diagram
e) none of the above
Answer: d)
6. What job is to recognize, address, and eliminate sources of risk before they threaten the successful completion of a project? [Chapter 7, easy]
a) Risk Avoidance
b) Risk Transfer
c) Schedule Development
d) Risk Management
e) Activity sequencing
Answer: d)
7. What is a general formula for how a business is going to use computer networks and information systems to compete in a global marketplace?[Chapter 7 p. 204, moderate]
a) E-commerce strategy
b) Personalization
c) coopetitive Web site
d) Mass customization
e) Mobile Commerce
Answer: a)
8. Which of the following is not an E-Commerce Business Model? [Chapter 7, hard]
a) Brokerage
b) Advertising
c) Merchant
d) Manufacturer Direct
e) Search Engine
Answer: e)
9. Which of the following allows a client and a server to communicate in a way that prevents eavesdropping, message forgery, or tampering? [Chapter 8 p. 245, hard]
a) SSL
b) HTTP
c) XML
d) FTP
e) Security Wizard 2009
Answer: a)
10. True or False, Offshoring results from a partnership with a business in a far-distant country from the home office? [Chapter 9, moderate]
a) True
b) False
Answer: a)
11. What technological languages did Philip Grossman say you should become familiar with, if you plan on working with technology? [guest lecture, hard]
a) Java
b) XML
c) JavaScript
d) SQL
e) All of the above
Answer: e)
12. True or False, The purpose of the tower building exercise was to develop team skills? [In class activity, easy]
a) True
b) False
Answer: a)
Team 25:
A MAN (Metropolitan area network) shares files, resources, and servers among members of an organization. (Chapter 5, page 121, easy)

a) true
b) false
Answer: b) false
Team 25
2.Filing you income tax return is a form of ______________________ e-commerce. (Chapter 7, page 198, medium)

a)B2G
b)C2G
c)C2C
d)B2B
Answer: b)
Team 44
1. In this type of system, inputs and outputs can pass through the boundary and interact with both the environment and the system.
[Lecture (1/15/2009); moderate]
a. Closed
b. Transparent
c. Opaque
d. Open
Answer: d.
Team 44
2. _______ are raw, unorganized facts, numbers, pictures, etc.
[Chapter 1, Slide 14; easy]
a. Information
b. Data
c. Problems
d. Decisions
Answer: b.
Team 44
3. Using Unicode, how many bytes are in the phrase “PIERCY MIST 2090”? (Do not include quotations)
[Field Guide A, Slides 7-12; difficult]
a. 14
b. 224
c. 112
d. 20
Answer: a.
Team 44
4. A _______ is a small number of people with complementary skills who are committed to a common purpose, performance goals, and approach for which they hold themselves mutually accountable.
[Chapter 4 Appendix; moderate]
a. Organization
b. Class
c. Team
d. Database
Answer: c
Team 44
5. The process of completing an Information System project is known as _____.
[Chapter 6, Slide 18; moderate]
a. SAD
b. MAD
c. PAD
d. RAD
Answer: a
Team 44
6. UML is a very popular modeling tool in industry. UML stands for ….?
[Chapter 6, Slide 39; moderate]
a. United Modifying Lesson
b. Unified Modeling Language
c. Unified Modifying Language
d. Unknown Messaging Link
Answer: b
Team 44
7. Most e-commerce transactions are …..
[Chapter 7, Slide 6; moderate]
a. Business to Consumer
b. Consumer to Business
c. Business to Business
d. Consumer to Consumer
Answer: c
Team 44
8. In data storage, this modern technological language is used to store data in plain text files that allow the development of generic applications to store, retrieve, and display the data.
[Chapter 8, Slide 36; difficult]
a. HTML
b. XML
c. SSL
d. HTTP
Answer: b
Team 44
9. _____ is an on-going, strategic business process of risk assessment and management, which helps to ensure safe business operations and the availability, confidentiality, and integrity of an enterprise’s information resources wherever they may be located.
[Chapter 9, Slide 38; difficult]
a. Loss Prevention
b. Enterprise Risk Management
c. Enterprise Information Security
d. People, Policy, Technology Framework
Answer: c
Team 44
10. Which of the following countries has the highest net global outsourcing?
[Chapter 9, Lecture 4/21/09; difficult]
a. China
b. India
c. France
d. United States
Answer: d
Team 44
11. Phillip Grossman is a consultant for Intercontinental Hotels Group. He suggested that MIS majors should take psychology classes. Why did he say these classes were important?
[Phillip Grossman Guest Speaker; difficult]
a. To be able to better read people to understand what they want
b. To give your mind a break from HTML and binary code
c. To easily get credits and good grades
d. To become a well-rounded individual
Answer: a
Team 44
12. In the in-class Egg Drop activity, the materials used included an egg, paper clips, tape, yarn, and what else?
[In-Class Activity; easy]
a. Paper towel
b. Toilet Paper
c. Newspaper
d. Magazines
Answer: c
Team 19
1.Which of the following enables managers to make data-based decisions and to discover new business opportunities through the use of its tools? [Ch.1 pg. 14, moderate]

a) TPS
b) MIS
c) DSS
d) ERP
e) CRM
Answer: c
Team 19
2.Information technology consists of three basic categories- hardware, software, and neworks. [Ch. 2 pg. 26, easy]

a) true
b) false
Answer: a
Team 19
3.Match the following knowledge work activities to an example of the activitiy[Ch. 3 pg. 63, moderate]:

Column A Column B
a. Discovery A. Given the analysis, suggest ideas to gain strength b. Transformation B. Identify any trends in the data by week
c. Analysis C. Find weekly sales data
d.Synthesis D. Compare the sales data
Answer: aC, bD, cB, dA
Team 19
4.Which of the following networks covers a large geographical area?[Ch. 5 pg. 121, moderate]

a)PAN
b)LAN
c)MAN
d)WAN
Answer: d)
Team 19
5. A cookie is a small bit of data, usually created by programs running on the server, stored o the client machine, and passed back and forth in the HTML request and response. [Chapter 8, page 233, easy]

a) true
b) false
Answer: b) false
Team 19
6.With server-side programming, a business cannot: [Chapter 8, page 238, moderate]

a) Deliver content that it customizes for the individual user
b) Access data stored in a server-side database and send it to the client’s browser.
c) Store data
d) Optimally manage the traffic to the site
Answer: c)
Team 19
7.Which of the following concepts about control is not true? [Ch.9 pg. 280, Difficult]
a)Control is a process that runs throughout an organization
b)Control influences how people behave at work
c)Control provides a reasonable assurance of achieving goals
d)All of the above
e)None of the above
Answer: E
Team 19

8.Which of the following is not a type of Risk Response? [Ch.9 pg. 277, Moderate]
a)Risk Avoidance
b)Risk Deferral
c)Risk Production
d)Risk Transfer
e)All of the above
Answer: C
Team 19
9.Which of the following puts the seven phases of IS development in order? 1. Elaboration, 2. Production, 3. Construction, 4. Inception, 5. Transition, 6. Retirement, 7. Pre-Inception. [Ch.6 powerpoint slides 15 & 16, Difficult]
a. 2, 5, 6, 7, 2, 4, 3
b. 7, 4, 1, 3, 5, 2, 6
c. 3, 7, 4, 5, 1, 6, 2
d. 1, 3, 2, 4, 7, 6, 5
Answer: b
Team 19
10.What are the two primary categories that products can be divided into? [Ch. 7 Powerpoint slide 8, Moderate]
a. Internal and External
b. Hardware and Electronic
c. Physical and Electronic
d. Public and Private
Answer: c
Team 19
11.What is the average that a consultant works per week? [Guest speaker Phillip Grossman slide #11, moderate]

A. 20-30 Hours
B. 40-60 Hours
C. 30-40 Hours
D. 60-70 Hours
Answer: B
Team 19
12. The group members for the in-class building block activity were the same as your team case study group members. [In Class Activities,Easy]

a)true
b)false
Answer: b)
Team 10
4. What type of computer hardware would a modem be considered as? [Chapter 2, Page 35, Easy]

a. Input hardware
b. Output hardware
c. Storage hardware
d. Communications hardware
Answer: D)
Team 10
6. The most common client scripting language is called ____________. [Chapter 8, Page 235, Intermediate]

a. VBScript
b. ActiveX
c. JavaScript
d. Adobe Reader
e. Python
Answer: C)
Team 10
7. Match the type of risk response with its action [Chapter 9, Page 277, Easy]

Column A Column B
a. Risk transfer A. Move the risk to someone who is more able to deal with it, possibly using an insurer or outsourcing it to another type of business partner
b. Risk deferral B. Realizing that some risks are unavoidable, make sure that contingency plans are in place
c. Risk reduction C. Postpone exposure to the risk until circumstances are more favorable or resources are available to address the risk
d. Risk acceptance D. Eliminate the possibility of the risk occurring: however, that may close the doors on some business opportunities as well
e. Risk avoidance E. Either reduce the probability of the risk occurring or lessen the impact, such as through a strong commitment to security, and frequent and secure offsite back-up of data and applications
Answer: aA, bC, cE, dB, eD
Team 10
8. Match the four elements of project management [Chapter 6, Page 175, Easy]

Column A Column B
1) Time Management A – identifying and managing all tasks
2) Quality Management B – estimating the duration of the project
3) Project Scope Management C – preparing the budget
4) Cost Management D – ensuring that the finished project satisfies goal
Answer: 1:B, 2:D, 3:A, 4:C
Team 10
9. E-commerce does NOT affect competition between organizations by [Chapter 7, Page 202, Moderate]

a. Increasing barriers to entry
b. Enhancing collaboration
c. Limiting market niches
d. Both A and C
e. All the Above
Answer: D
Team 25 (1):
1. A decision that involves some uncertainty or doubt about the outcome is called a(n) ______________________ .
a. Structured decision
b. Unstructured decision
c. Semi-structured decision
d. None of the above
Answer: C
Team 10
10. The purpose of the egg drop activity was to experience team development, put the five stages in the correct order from beginning to end [Lecture February 19, Moderate]

a. forming, norming, storming, performing, adjourning
b. norming, storming, forming, performing, adjourning
c. forming, storming, norming, performing, adjourning
d. storming, forming, norming, performing, adjourning
Answer: C
Team 25(2): 2. True/False: A MAN (Metropolitan area network) shares files, resources, and servers among members of an organization.
Answer: False
Team 10
11. Which type of E-Commerce is the one that involves online sales to government agencies, as well as electronic payment of taxes? [Chapter 7, easy]

a. Business-to-consumer
b. Business-to-business
c. Business-to-government
d. Consumer-to-government
Answer: C
Team 25(3): 3. What does the problem-solving acronym IADD stand for?
a. Investigate, Analyze, Decide, Do
b. Investigate, Analyze, Do, Decide
c. Interrogate, Assess, Determine, Dispose
d. Inquire, Appraise, Determine, Discharge
Answer: A
Team 10
12. RosettaNet is a standards organization that provides an Internet-based supply chain management (SMC) data registry service for e-commerce companies and companies that have an e-commerce component [Chapter 9, page 280, Moderate]

a. true
b. false
Answer: B
Team 25(4): 4. Which of the following is a device that lets you connect to networks or break a large network into two smaller, more efficient networks?
a. Bridge
b. Router
c. Hub
d. None of the above
Answer: A
Team 25(5): 5. Which of the following is true regarding XML?
e. The goal of XML is to describe data and focus on what it means.
f. XML uses tags to mark up content and data.
g. By itself, XML does not do anything.
h. All of the following are true.
Answer: H
Team 10
3. In what stage of the IADD process would a company apply criteria they have gathered to alternative solutions? [Chapter 3, Page 73, Moderate]

a. Investigate
b. Analyze
c. Decide
d. Do
Answer: C
Team 25(6): 6. Filing you income tax return is a form of ______________________
e-commerce.
a. B2G
b. C2G
c. C2C
d. B2B
Answer: B
Team 25(7): 7. The movement of data from country to country over global information networks is known as ____________.
a. global data flow
b. transborder data flow
c. international data flow
d. transnational data flow
Answer: B
Team 25(8): 8. True or false: the most common client-side scripting language is XML.
Answer: False
The correct answer is JavaScript
Team 25(9): 9. ________ is the process of scrambling a message that it is meaningful only to the person holding the key to deciphering it.
a. Decryption
b. Password protecting
c. Encryption
d. Coding
Answer: C
Team 25(10): 7. True or False: The Sarbanes-Oxley Act (2002) holds a company’s officers personally responsible for providing accurate public financial information to investors.
Answer: True
Team 25(11): Which of the following ways to prevent identity theft is not part of S.C.A.M.?
a. Secure your identity
b. Ask for a report
c. Check your finances
d. Maintain careful records
e. Cancel your credit cards
Answer: E
Team 25(12): Which Knowledge Work Activities were used to complete the Egg Drop class activity?
a. Communication
b. Discovery
c. Analysis
d. All of the above
Answer: D
Team 33: 1. What type of knowledge is readily codified?

A. Knowledge work
B. Explicit knowledge
C. Tacit knowledge
D. Data knowledge
Answer: B
Team 33: 2. The ___________ helps provide the physical connection between a computer and a local area network.

A. Controller
B. Modem
C. Network Interface Card
D. Random Access Memory
Answer: C
TEAM 5
What are the two main types of system software? [Chapter 2, slide 20 moderate]
a. Firmware and system software
b. Operating systems software and utility software
c. Utility software and information software
d. Firmware and productivity software
Answer: B
Team 28
1. The name podcasting is derived by combining the words iPod and broadcasting [Chapter 1, page 10, easy]


a. True
b. False
Answer: A
Team 33: 3. An opens systems model allows a business to receive inputs and to produce outputs.

A. True
B. False
Answer: B
Team 5
Match the following terms with the correct definition. [Chapter 3, slide 15, easy]
a. Discovery A. Recognizing patterns-“putting together
b. Transformation B. Organizing the data
c. Analysis C. Relaying ideas and solutions
d. Synthesis D. Finding relevant data to the problem
e. Communication E. Thoughtful investigation of data-“taking apart”
ANSWER: aD, bB, cE, dA, eC
Team 5
While working with the egg drop, you worked together as a team. When you were brainstorming to come up with a design for your drop, what developmental stage of teamwork were you participating in? [Chapter 4 appendix, page 115]
a. Storming
b. Performing
c. Adjourning
d. Norming
Answer: a
Team 33: 4. A Mainframe from the Computer Hierarchy has a large processing power that _________________.

A. Allows multiple servers to handle network processing activities.
B. Provides users with portable computing power
C. Performs extremely processor intensive computations using parallel processing.
D. Carries out many of the organizational processing needs using high-speed chips.
Answer: D
Team 5
Which of the following is not a characteristic of ACID:
[Chapter 5, page 140, moderate]
a. Atomicity
b. Congruency
c. Isolation
d. Durability
Answer: b
Team 33: 5. What is not a stage or activity of the information system life cycle?

A. Creation
B. Transition
C. Production
D. Retirement
Answer: A
Team 5
For the following advantages of Methodology to IS Development, match the following terms to their meaning. [Chapter 6, page 168, moderate]

______ Development fundamentals

______ Avoiding rework

______ Risk management

______ Assures quality

______ Customer orientation

______ Improved planning

______ Trageting resources

A. Helps detect errors earlier, when they are easier to correct.

B. Makes it easy to identify and organize the activities required by the project.

C. Methodologies help team members use best practices.

D. Helps target resources toward the activities that need them.

E. Focuses on customers' needs and desires.

F. Process helps to identify and manage risks.

G. The process that can be oriented toward avoiding repeating tasks in the event of changing requirements.
Answer: C, G, F, A, E, B, D
Team 5
True or False: Virus protection software, mailing lists, and databasese of product information are all examples of Business-To-Business Transactions. [Chapter 7, page 197-198, moderate]
Answer: True
Team 33: 6. The project management tasks that consists of estimating the duration of the project is__________.

A. Project scope management
B. Cost management
C. Time management
D. Quality management
Answer: C
Team 5
Which of the following is the primary language for creating Web pages?
[Chapter 8, page 230, easy]
a. HTTP
b. XML
c. WWW
d. HTML
e. None of the above
Answer: d
Team 33: 7. Which statement does not support how E-Commerce dramatically affects competition between organizations?

A. Reducing barriers to entry
B. Preventing any company from “owning” the market
C. Enhancing collaboration/alliances.
D. Increasing productivity
Answer: D
Team 5
What does the protocol SSL stand for? [Chapter 8, page 245, moderate]
a. Social Security Layer
b. Secure Socket Layer
c. Shopping Server Layer
d. None of the above
Answer: b
Team 33: 8. Hypertext markup language (HTML) is the primary language for creating Web pages.

A. True
B. False
Answer: A
Team 33: 9. JavaScript is not a type of client-side scripting language.

A. True
B. False
Answer: B
Team 5
Choose which of the following represent a key concept of control.
I. Control is a process that runs throughout the organization
II. Control influences how people behave at work
III. Control can only provide reasonable, not absolute, assurance of achieving objectives
[Chapter 9, page 280, easy]

a.) I
b.) I and II
c.) I and III
d.) II and III
e.) I, II, and III
Answer: e
Team 33: 10. _____ ____ occurs in the same country as a business.

A. Global Sourcing
B. Onshoring
C. In-sourcing
D. Nearshoring
Answer: B
Team 5
The enterprise information security framework is supported by the three pillars,____,_____, and _____
[Chapter 9, page 286, easy]

a.) technology, people, and policy
b.) Business, IT Governance, and people
c.) Security training, awareness, and technology
d.) people, technology, and business
Answer: a
Team 5
True or False: Guest speaker Matt Gonzales works for a Microsoft branch where he and a group of knowledge workers manage the business’ computer systems.
ANSWER: False (He works for UGA EITS)
Team 5
1. The in-class Leggo Tower Building activity reflected which project management model?
a. Waterfall Model
b. Data Flow Diagram
c. The Triple Constraints
d. Logical Data Model
Answer: c
Team 33: 11. Which guest speaker worked for EITS and was in charge of managing UGA’s I.S. network?

A. Ron Swift
B. John Gorzynski
C. Matt Gonzales
D. Phillip Grossman
Answer: C
Team 28
2. Which of the following is NOT true about the Internet? [Chapter 2, page 47, moderate]
a. most users do not connect directly to the Internet
b. the World Wide Web is synonymous with the Internet
c. no single organization or government entity owns the Internet
d. most knowledge workers use the Internet on a daily basis
e. Access to the Internet in public places is increasingly simple with the increase in “Wi-Fi Hotspots”
Answer: B
Team 33: 12. What was one of the project management tasks that was involved in the Lego construction.

A. Money management
B. Time management
C. Technology management
D. Team management
Answer: B
Team 28
3. In what step of the IADD model will you transform existing data to look at them in new ways? [Chapter 3, page 71, moderate]
a. Investigate
b. Analyze
c. Decide
d. Do
e. Hope
Answer: B
Team 28
4. Match each computer type with its relative processing power [Chapter 5, page 120, moderate]:
Column A Column B
a.Server farms A. Small to medium
b. Mainframe B. Large
c. Supercomputer C.
Medium/many
d. Personal computer (PC) D. Largest and fastest
Answer: aC, bB, cD, dA
Team 28
5. Which one of the following is project team skills represents a knowledge of techniques for ensuring that a project is successfully completed on time? (Chap 6, moderate)
a. Architecture and design
b. Client interface
c. Programming
d. Project management
Answer: D
Team 28
6. A knowledge worker must possess technical skills such as the ability to design databases or write a computer program in order to be on IS team project. (Chap 6, moderate)
a. True
b. False
Answer: B
Team 28
7. Matching (Chap 7, easy)
1) CRM a. Competing sellers partnering on a common Web site
2) Commerce b. Creating a one-to-one marketing system
3)Coopetitive Web c. Transaction using handheld devices
Answer: 1b, 2c, 3a
Team 28
8. Which of the following is a small data file that can be used to store data on the client’s computer? (Chap 8, moderate)
a. ActiveX
b. Cookie
c. Crumpet
d. Plug-in
Answer: B
Team 27
1. Which of the following is an Internet software application that allows us to transfer images, audio, and video? [Chapter 1, page 6, easy]
a. Commerce
b. E-Commerce
c. World Wide Web
d. Business Knowledge
Answer: C
Team 27
2. The fundamental hardware component of all digital devices is the [Chapter 2, page 29, moderate]
a. Microprocessor
b. Transistor
c. Central Processing Unit
d. Memory Storage Unit
Answer: B
Team 28
9. Which of the following is true regarding XML? (Chapter 8, moderate)
a. XML tags define the “look and feel” of a Web page as it is displayed in a browser
b. XML is platform independent and can be used by many different applications
c. All Devices using XML must use primary XML with no new tags defined
d. XML is only used for database query data
Answer: B
Team 27
3. Match the Following [Chapter 2, moderate)
a. RAM A. Coordinates and handles details of working with the computer hardware
b. ROM B. Provides additional tools that you can use to maintain and service your system
c. System Software C. Contains instructions and data that only special devices can alter
d. Operating System D. any software required to control the hardware components and to support the execution of application software
e. Utility Software E. stores data until they are no longer needed
Answer: aE, bC, cD, dA, eB
Team 27
4. “Evaluating solutions, and making choices regarding how to implement the solution” is part of which step in IADD? (Chapter 3 page 69 moderate).
a. Investigate
b. Analyze
c. Decide
d. Do
Answer: C
Team 27
5. Which of the following is not a financial measure used by a company to prove it is financially feasible? (Chapter 6, page 158, difficult)
a. ROI
b. CVP
c. NPV
d. IRR
Answer: B
Team 27
6. True/ False (Chapter 6, page 160, easy)

If a company chooses to build an entirely new system through another company, this is known as outsourcing.
Answer: False, it is known as in-house development
Team 27
7. Which of the following E-commerce transactions would the transaction of office furniture like desks and chairs fall under? (chapter 7, page 198, moderate)
a. B2B
b. B2G
c. B2C
d. A and C
Answer: A
Team 27
8. Which of the following is the most common client-side scripting language? (Chapter 8, page 235, difficult)
a. Google
b. Java
c. ActiveX
d. JavaScript
Answer: D
Team 28
10. A global perspective believes that the economic world is largely flat, borderless, and cyber-connected. (Chapter 9, moderate)
a. True
b. False
Answer: A
Team 27
9. True/ False
Nearshoring occurs in the same country as a business. (Chapter 9, page 267, easy)
Answer: False, it is known as onshoring.
Team 27
10. Which of the following guides process improvements across those organizations especially associated with software development? (Chapter 9, page 280, very difficult)
a. COSO
b. UCCnet
c. RosettaNet
d. CMMI
e. All of the above
Answer: D
Team 27
11. Which nation will be the largest English speaking nation in the world? (from the video “Did You Know?” difficulty depends on if they were in class or not)
a. Canada
b. China
c. India
d. USA
Answer: B
Team 28
11. Chapter 5, page 121, easy
Q: Which organizational network ranges in size from a few blocks to an entire metropolitan area?

a. LAN
b. WAN
c. Internet
d. MAN
Answer: D
Team 28
12. Which step of the IADD model involves implementing the solution and monitoring the results?

a. Investigate
b. Analyze
c. Decide
d. Do
Answer: D
Team 28
13. Which one of the following represents the set of primary rules for transmitting and receiving data over the Internet using packet switching?

a. FTP
b. HTTP
c. SMTP
d. TCP/IP
Answer: B
Team 28
14. Which IT hardware component temporarily stores data and instructions before processing?

a. Memory
b. Storage
c. Input
d. Processing
Answer: A
Team 28
15. Matt Gonzales was a member of UGA’s…
a. SMIS department
b. IFC
c. EITS department
d. Career Center
Answer: C
Team 28
16. In the egg drop activity teams used Tuckman’s stage model of team development.
a. True
b. False
Answer: A
Team 28
17. Put these phases in the life-cycle of an information system in the correct order: [Chapter 6, page 163, moderate]
a. Inception; Construction; Production; Elaboration
b. Construction; Production; Elaboration; Inception
c. Inception; Elaboration; Construction; Production
d. Inception; Elaboration; Production; Construction
Answer: C
Team 28
18. True or False: As part of an IS project team, the responsibility of the project management team is to ensure that the project goals correspond to the organization’s business objectives. [Chapter 6, page 164, difficult]
a. True
b. False
Answer: B
Team 28
18. True or False: As part of an IS project team, the responsibility of the project management team is to ensure that the project goals correspond to the organization’s business objectives. [Chapter 6, page 164, difficult]
a. True
b. False
Answer: B
Team 28
18. True or False: As part of an IS project team, the responsibility of the project management team is to ensure that the project goals correspond to the organization’s business objectives. [Chapter 6, page 164, difficult]
a. True
b. False
Answer: B
Team 28
18. True or False: As part of an IS project team, the responsibility of the project management team is to ensure that the project goals correspond to the organization’s business objectives. [Chapter 6, page 164, difficult]
a. True
b. False
Answer: B
Team 28
19. Purchasing a guitar on your computer via ebayÔ is an example of what kind of transaction? [Chapter 7, page 198, easy]
a. C2C Transaction
b. C2G Transaction
c. B2C Transaction
d. B2B Transaction
Answer: A
Team 28
20. Presently, the world is in which generational stage of e-commerce? [Chapter 8, page 227, moderate]
a. Internal Automation
b. External Automation
c. Static Content
d. Dynamic Content
Answer: B
Team 28
21. Which of the following is NOT a method that an e-commerce website would use to record and gather orders from their website? [Chapter 8, page 243, difficult]
a. A shopping cart service provided by a third party
b. A nonsecure HTML order form, with the results sent to the firm’s e-mail address
c. A secure HTML order form, with the results sent to the firm’s e-mail address
d. A secure HTML order form, with the results sent to a third party’s database
Answer: D
Team 28
22. E-Lead, a data provider for car dealerships across the country, has its main headquarters in California, but has recently built a call center in Mexico. This is an example of what form of global sourcing? [Chapter 9, page 267, difficult]
a. In-sourcing
b. Offshoring
c. Nearshoring
d. Onshoring
Answer: C
Team 32
1. During the Lego tower in-class activity, the group went through Tuckman’s Stage Model of Development and when conflicts emerged it was known as what stage? (Chapter 4, Lego tower in-class activity, easy)
a) Forming
b) Norming
c) Storming
d) Performing
Answer: c
Team 32
2. What is the main goal of HTML? (Chapter 8, Slide 8, moderate)
a) Describe the data
b) Describe how to display the data
c) Focus on what the data means
d) To store data
Answer: a
Team 32
3. Match the types of global sourcing with the appropriate definition (Chapter 9, Slide 15, easy)
1. Offshoring A. The work is done by ourselves
2. In Sourcing B. Work is outsourced to a partner in the same country
3. Onshoring C. Outsource to a partner in a distant country
4. Nearshoring D. Outsource the work to a partner in a nearby country
Answer: 1. C 2.A 3. B 4. D
Team 32
4. Which of the following is not commonly used by businesses as a way to obtain an Information System? (Chapter 6, Slide 10, hard)
a) Acquistion
b) Lease
c) Build
d) Copy
Answer: d
Team 32
5. What is information density? (Chapter 7, Slide 14, easy)
a) the quality and quantity of information about products and services.
b) how closely packed the information is
c) how much information is on the hard drive
d) how much information you can find in one spot
Answer: a
Team 32
6. All of the following are true about partnerships, EXCEPT: (Chapter 9, Slide 14, moderate)
a) Partnerships only work on a local level.
b) Complementary talents, large capital requirements and opportunities to synergize necessitate partnerships.
c) Credit cards are a result of partnerships among banks and retailers.
d) IT is a huge enabler of global partnerships.
Answer: a
Team 32
7. What is created when a person combines experience and judgment with information? (Chapter 1, Slide 7, easy)
a) Data
b) Knowledge
c) Technology
d) Facts
Answer: b
Team 32
8. Consider the IADD model. A knowledge worker is currently looking at various network solutions in order to integrate previously separate company databases into one multi-accessed database system with real time updates. In what stage of the IADD model would this worker currently be? (Chapter 3, Slide 24, moderate)
a) Investigate
b) Do
c) Analyze
d) Decide
Answer: c
Team 32
9. What is the application of knowledge skills, tools and techniques to project activities to meet project requirements? (Chapter 6, all slides “15”, easy)
a) Project management
b) Waterfall development
c) Risk Management
d) Knowledge work
Answer: a
Team 32
10. In accordance with proper security procedures, what four steps should users take to prevent identity theft? (Presentation from Mr. John Gorzynski, “Information Security in Business, Slides 15-19, moderate)

a) Check FCC procedures, contract with security firm, maintain theft loss procedures, review process
b) Comply with company protocol, check in with supervisor, download latest security software, report suspicious activity
c) Secure your identity, check your finances, ask for a report, maintain careful records
d) Research current threats, watch e-mail attachments, check records with your bank, always change passwords
Answer: c
Team 32
11. Think about the PAWS network system utilized by the University of Georgia. Under network classifications, this network would be classified as a… (Chapter 2, Slide 25, easy)

a. WAN
b. LAN
c. PAN
d. SAN
Answer: a
Team 32
12. All of the following would be classified as productivity software except… (Chapter 2, Slide 23, hard)

a) Presentation Graphics Software
b) Database Management Software
c) Electronic Spreadsheet Software
d) Network Integration Software
Answer: d
Team 17
1. Suppose you want to share data and information privately to members of your organization. Which networking method would you most likely use?

A. LAN
B. Internet
C. WAN
D. PAN
E. None of the above
Answer C
Team 17
2. Software designed to be fully functional for a certain period of time, but then cease to work after that time is known as:

A. Trial Software
B. Groupware
C. Trialware
D. Shareware
E. None of the above
Answer D
Team 17
3. High tech scam that uses spam to deceive consumers into disclosing heir credit card numbers, bank account information, or other sensitive information is called:

A. Scam Fraud
B. Phishing
C. TPS
D. Identity Theft
E. None of the above
Answer B
Team 17
4. Someone who uses information, information systems, and information technology to create business value for organizations is called a:

A. Business worker
B. Knowledge worker
C. Information analyst
D. Information worker
E. None of the above
Answer B
Team 17
5. This type of Diagram/Model depicts data moving or flowing through a system.

A. Flow diagram
B. Data Flow diagram
C. Linear Connection graph
D. Information Flow diagram
E. None of the above
Answer B
Team 17
6. __________________________ level project management software is the best choice when you need tools for entry-level users such as basic scheduling, project control, reporting, filtering, and sorting.

A. Low
B. Mid
C. High
D. Specific
Answer A
Team 17
7. True/False: A business model defines how a company will meet the needs of its customers while making a profit.

A. True
B. Flase
Answer A
Team 17
8. A/an _________________________ website receives a fee for their web site when purchases come through them.

A. Merchant
B. Affiliate
C. Subscription
D. Advertising
E. None of the above
Answer B
Team 17
9. This simple client-side scripting of making sure data is in the correct format before submitting is common in many HTML forms is most often expressed by Javascript.

A. Data validation
B. Information formatting service
C. Scripting language
D. Information validation
E. None of the above
Answer A
Team 17
10. A _______________________ is a small, malicious program that pretends to be something it isn’t to trick the user into downloading and installing it.

A. Stealth virus
B. Flash-tack virus
C. Trojan Horse
D. Trick virus
E. None of the above
Answer C
Team 17
11. True/False: The purpose of the Lego Building activity was to understand the Triple-Constraints of the elements of Project Management.

A. True
B. False
Answer A
Team 17
12. According to Matt Gonzalez, __________________________ is software that can be accessed over a public server.

A. BAS
B. TPS
C. SAS
D. FTP
E. None of the above
Answer C
Team 34
1. Which of the following is not considered an input hardware device? (Chapter 2, page 31-34, easy)
a) A speaker
b) A barcode scan
c) A mouse, or pointing device
d) A keyboard
Answer A
Team 34
2. What knowledge work activity requires you to organize the results from discovery activities, (ex. Importing data into a database or spreadsheet application, and use its features and tools to organize the data, and find the previous months’ data and import that as well) (Chapter 3, page 59 & 63, medium)
a) Communication
b) Analysis
c) Synthesis
d) Transformation
e) Input
Answer D
Team 34
3. A knowledge worker is a person or entity that has an interest and an influence on how a business will function in order to succeed. (Chapter 4, page 87, easy)
a) True
b) False
Answer B
Team 34
4. A network that covers a very small space that ranges from the size of a human body to a small office is called a ______? (Chapter 5, page 121, medium)
a) LAN
b) PAN
c) MAN
d) WAN
Answer B
Team 34
5. In the life cycle of an IS, what phase does the project team finalizes the requirements for the system and designs the system architecture? [Chapter 6, page 162-163, easy]
a) Elaboration
b) Construction
c) Transition
d) Inception
e) None of the above
Answer A
Team 34
6. Which of the description of EDI and Extranet is correct? [Chapter 7, page 219, moderate]
a) Extranet- more secure due to use of private network
b) Extranet- more costly due to proprietary software and use of private networks
c) EDI – more flexible because it is based on the Internet, which permits greater customization and wider access to development tools
d) EDI – gradually being replaced by extranet-based applications
e) None of the above are correct
Answer D
Team 34
7. Which of these is not a type of E-Commerce Transaction? (Chapter 7, page 197, difficult)
a) Business to Business (B2B)
b) Business to Consumer (B2C)
c) Business to Government (B2G)
d) Business to Investor (B2I)
e) All of the Above are Correct
Answer D
Team 34
8. ________________ refers to fixed information, such as company information, online marketing, and electronic versions of company brochures. (Chapter 8, page 227, moderate)
a) Dynamic Content
b) Static Content
c) Persistent Content
d) Scripted Content
e) None of the Above
Answer B
Team 18
1.Which best fits the IPO model of an Information System?
A) Information, Precision, Operation
B) Input, Process, Output
C) Information, People, Output
D) Input, Process, Operation
Answer B
Team 34
9. HTTP dynamically displays web pages (Chapter 8, page 230, hard)
a) True
b) False
Answer B
Team 18
2. Which is not an output hardware component?
A) Printer
B) Speaker
C) Screen
D) USB Flash Drive
Answer D
Team 34
10. Which one of these five positions is in charge of IT (information technology)? (Chapter 9, page 262, moderate)
a) CEO
b) CFO
c) CTO
d) COO
e) CIO
Answer E
Team 18
3. A decision that cannot be programmed because it is part of a routine or habit is known as?
A) Unstructured
B) Semi-structured
C) Structured
D) Destructed
Answer C
Team 34
11. Which of the following is not true about Mr. Gonzalez’s Lecture? (Guest Presentation, Moderate)
a) His group consists of 10 full time workers and 1 student worker.
b) His team manages software for about 1,000 computers on campus.
c) Matt Gonzalez talked about SAAS -> software as a service: instead of having software already loaded on your computer you can access it over a browser
d) Their company needs information technology to support needs.
Answer A
Team 18
4. Which is the correct computer hierarchy from largest to smallest?
A) Mainframe, Server, PC, PDA
B) Supercomputer, PC, Server, Processor
C) Server, Mainframe, PDA, PC
D) PC, Server, Supercomputer, PDA
Answer A
Team 34
12. The IADD model (investigate, analyze, decide, do) was implemented during the in-class egg drop activity. (Lecture, easy)
a) True
b) False
Answer A
Team 18
5. Which of the following is not a part of System Development?
A) Elaboration
B) Transition
C) Inception
D) Implementation
Answer D
Team 18
6. A company that has an IS staff experience in systems development and which wants to retain complete control over its systems would most likely develop its IS using:A) Acquisition
B) In-House Development
C)Leasing
D) Outsourcing
Answer B
Team 18
7. A general formula for how a business is going to use computer networks and information systems to compete in a global market place is known as:
A) Mobile commerce
B) E-commerce strategy
C) E-commerce
D) Mass customization
Answer B
Team 18
8. Bill files his personal taxes electronically. This is an example of ______ e-commerce.
A) B2B
B) B2G
C) C2C
D) C2G
Answer D
Team 18
9. What is a small bit of data, usually created by programs running on the server, stored on the client machine, and passed back and forth in the HTTP request and response?
A) memory
B) bit
C) cookie
D) bite
Answer C
Team 18
10. Which of the following is not one of the three types of controls?
A) Preventive
B) Organized
C) Corrective
D) Detective
Answer B
Team 18
11. Who did Ron Swift work for?
A) UGA Computer Security
B) Intercontinental Hotel Groups (IHG)
C) UGA EITS
D) Teradata
Answer D
Team 7
1. Which of the following is not included in the acronym CARROTS [Chapter 3, page 67, Easy]
a. Timely
b. Relevant
c. Compatability
d. Accurate
Answer C
Team 18
12. As a class, we did which of the following team activities during the class period

I. Built devices to prevent eggs from breaking when dropped off Sanford Bridge
II. Designed a mock webpage
III. Built skyscrapers out of legos and tested them to see if they would blow over

A) I.
B) II.
C) I. and II.
D) I. and III
Answer D
Team 7
2. What is an example of an input device? [Chapter 2, page 28-29, Easy]
a. Monitor
b. Hard drive
c. Keyboard
d. Printer
Answer C
Team 7
3. Tacit Knowledge is knowledge that is readily codified, such as the knowledge in a magazine or book. (Chapter 1 Slides, Moderate)
a. True
b. False
False
Team 7
4. What are the characteristics of the IADD model? [Chapter 3, page 69, Moderate]
a. Interpret, Action, Determine, Do
b. Input, Aggregate, Develop, Differentiate
c. Involve, Facts, Advantage, Xylophone
d. Investigate, Analyze, Decide, Do
Answer D
Team 7
5. Guest speaker Phillip Grossman spoke about the realities of business consulting: [easy]
a. True
b. False
True
Team 7
6. What is the purpose of a portal? [Chapter 7, page 211, Moderate]
a. to facilitate sales between third parties
b. to provide a gateway to many other web sites
c. to sell goods and services
d. to travel through time
Answer A
Team 7
7. ____________________ is the primary language for creating Web pages. [Chapter 8, page 230, Moderate]
a. HTML
b. Java
c. VOIP
d. HTTP
Answer A
Team 7
8. What does the acronym CASE stand for? [Chapter 6, page 185, moderate]
a. Customer Assistance Software Engineering
b. Client Aided Software Engineering
c. Computer Assisted Software Education
d. Computer Aided Software Engineering
Answer D
Team 7
9. The two most common forms of Interorganizational Systems are based on electronic data interchange [Chapter 7, page 218, moderate]
a. True
b. False
True
Team 7
10. When comparing Electronic Data Interchange and Extranet-Enabled B2B E-Commerce, which of the two is more secure? [Chapter 7, page 219, Hard]
a. Electronic Data Interchange
b. Extranet-Enabled B2B E-Commerce
Answer A
Team 7
11. What does CIO stand for? [Chapter 9, page 262, moderate]
a. Computer Input Oscillation
b. Chief Investigative Officer
c. Chief Information Officer
d. none of the above
Answer C
Team 7
12. Which answer best describes the objective of the in-class LEGO project?
a. testing students lego architecture skills
b. exploring students abilities to work collectively for a common goal while exercising cost-benefit analysis skills to make the best informed business decision
c. to help illustrate the CARROTS model
d. none of the above
Answer B
Team 42
1. There are far more ROM chips than RAM chips in a computer. (Chapter 2, slide 10, easy).
A) true
b) false
Answer B
2. Which of the following is NOT an example of a primary activity? (Chapter 4, slide 16, moderate).
a) Operations
B) Marketing and Sales
C) Human resource management
D) Inbound logistics
Answer C
3. Match the term with its definition: (Chapter 4, slide 22, moderate)
Column A Column B
a. Automating A. Using IT to help a business acquire or continue a competitive advantage
over their competitors by adjusting how the company does business.
b. Informating B. Uses technology to perform tedious or repetitive tasks.
c. Transforming C. Recognizing that executing business processes also creates new data and
information and then may use this to improve the process.
Answer: aB, bC, cA
Team 35
1. An electronic switch that can be either on (represented by 1) or off (represented by 0) is known as what? (Chapter 2, pg. 29; moderate)

A) microprocessor
B) processor
C) transistor
D) hard drive
Answer: C
Team 35
2. True or False: Teradata, the company Mr. Ron Swift represented, built a large database for Wal-Mart? (Guest Speaker; difficult)
Answer: True
Team 35
3. True or false: An example of tacit knowledge is the knowledge gained from studying the MIST textbook. (Chapter 1, slide 17; moderate)
Answer: False
Team 35
4. _________ are specific actions, including policies and procedures, designed to ensure the achievement of business objectives. (Chapter 8; easy)
Answer: Controls
Team 35
5. List the steps of an information life cycle in order (Chapter 6, Page 162; moderate)

a) Pre-Inception, Inception, Elaboration, Construction, Production, Transition, Retirement
b) Pre-Inception, Inception, Elaboration, Construction, Transition, Production, Retirement
c) Pre-Inception, Inception, Construction, Elaboration, Production, Transition, Retirement
d) Pre-Inception, Inception, Production, Elaboration, Construction, Transition, Retirement
Answer: B
Team 35
6. _______________ is the ability to create custom products or services on-demand (Chapter 7, Page 200; easy)

a) Mass Customization
b) Customer Customization
c) Customized Consumer Product
d) Personal Production
Answer: A
Team 35
7. Encryption is the process of _____________________. (Chapter 8, Page 246; easy)

a) scrambling information so only the key owner can decipher it
b) unscrambling information using the key to decipher it
c) adding hidden files into emails to spread viruses
d) stealing information from poorly protected computers
Answer: A
Team 35
8. A disadvantage of outsourcing is _____________________. (Chapter 6, Page 161, moderate)

a. High level of skill or expertise
b. Generally higher development time and costs
c. Requires good contracts and oversight
d. Internal staff provides project oversight, which is less time intensive than full development
Answer: C
Team 35
9. True or False? The value chain is another way to view the organization as a system (Chapter 4, slide 19; easy)
Answer: True
Team 35
10. __________________ results from a partnership with a business in a far-distant country from the home office. (Chapter 9, Page 268; easy)

a. Geo-shoring
b. Onshoring
c. Offshoring
d. Globalization
Answer: C
Team 35
11. Which of the following are primary components required by a computer network? (Chapter 2, Page 41; easy)

a. Data
b. Special Hardware
c. Software that allows computers to communicate and share the data
d. Communication media to link the computers together
e. All of the above
f. None of the above
Answer: E
Team 35
12. All of the above were provided materials for the egg drop activity except:
(Egg drop activity; easy)
a. Newspaper
b. Tin foil
c. Popsicle sticks
d. Paperclips
Answer: B
Team 42
4. What is the correct order for the Stages of Business Intelligence? (Chapter 5, pg. 146 easy)
A. Situation awareness, Decision support, Data sourcing, Risk assessment, Data analysis
B. Data sourcing, Data analysis, Situation awareness, Risk assessment, Decision support
C. Data sourcing, Data analysis, Situation awareness, Decision support, Risk assessment
D. Situation awareness, Data sourcing, Risk assessment, Decision support, Data analysis
Answer: B
Team 42
5. Which of the following IS project team skills represent an ability to understand the financial aspects of the project such as budget and returns on investment? (Chapter 6 pg. 164-165, hard)
A. Specialists
B. Client Interface
C. Project Strategy
D. Account Management
Answer: C
Team 42
10. True or False. A difficulty with transborder data flow is that it is often unclear which countries have jurisdiction over the data? (Chapter 9 pg. 268 easy)
A. True
B. False
Answer: A
group 23 (just alex levitt)

The overall goal of e-commerce is to create business value.

TRUE or FALSE
True
group 23 (just alex levitt)

Data are raw, unorganized facts. (Ch. 1, pg. 8, easy)

TRUE or FALSE
False - information
group 23 (just alex levitt)

The type of network connection that allows users to connect over a large area or region rather than a small, localized area is called a (Ch. 2, p. 43, easy) :

a) WAN b) PAN c) LAN d) RPAN
A
group 23 (just alex levitt)

Software that links applications that use dissimilar software or hardware platforms is called (Ch.5, pg. 136, moderate):
a) an expert system b) intranet c) middleware d) a server
C - middleware
group 23 (just alex levitt)

One weakness of the Waterfall model is that (Ch. 6, pg. 168, difficult):a) It can only be used with tangible products b) It is only effective when users can express their exact needs c) It is highly inaccurate d) All of the above
B
group 23 (just alex levitt)

A type of visual chart often used by project managers to manage project time, activity sequencing, and schedule control and development is called a (ch. 6, pg. 179) :
C - Gantt Chart
group 23 (just alex levitt)

The L in the LAMP acronym stands for which of the following? (Ch. 8, pg. 240, difficult) a) Linear b) Linus c) Linux d) Latency
C - Linux
group 23 (just alex levitt)

What is the purpose of creating a business model? (ch. 7, pg. 210, moderate)
To define how to meet the needs of its customers while making a profit.
group 23 (just alex levitt)

The individual in a business responsible for addressing IT governance and the challenges that come with it is the (Ch. 9, pg. 262, moderate):

a) CIO b) CEO c) TRE d) CAO
A - CIO
group 23 (just alex levitt)

The process of outsourcing to a business partner located outside your country but in the same general geographic area as your business is known as: (Ch. 9, pg. 266, easy)
a) Onshoring b) Nearshoring c) In-sourcing d) Offshoring
B - nearshoring
group 23 (just alex levitt)

The piece of advice given to us by Phillip Grossman regarding how much to information to give to a client was (guest presentation, Phillip Grossman talking, difficult):
a) tell them everything they need to know b) don’t tell them anything c) tell them less than they need to know
C - tell them less than they need to know
group 23 (just alex levitt)

What was one thing you learned from the egg drop activity? (in class activity, easy)
There are multiple answers. Think about it!
group 42 (Tracy)
1. Which of the following is NOT an element of project management?[chapter 6, slide 43, easy]
a. Time
b. Scope
c. Knowledge
d. resouces
c. Knowledge
group 42(tracy)
2. Which of the following is not a benefit of B2C E-commerce? [chapter 7,hard]
a. Access to a global marketplace
b. Increased marketing opportunities
c. Greater customer loyalty
d. Lower prices due to increased competition
D. lower prices due to increased competition
group 42(tracy)
3. B usiness Process Management is the adaptation of the business process in order to improve outcome in order to meet new customer or market needs. [IBM game, moderate]
a. True
b. False
a. True
Team 27
Matthew Gonzales serves as an IT Professional Specialist for the University of Georgia who manages which of the following software (Power Point slide from Matt Gonzales: Slide 4):
a. Windows XP Professional
b.Symantec Ghost
c.Windows Server 2003
d.Faronics Deep Freeze
e.All of the above
Answer: E
Team 13

1. RAM stands for read only memory, which stores data only until they are no longer needed, or until the computer is shut off.
[Chapter 2, Slide 12, Moderate]
False
Team 13

2. We use CARROTS to make more informed decisions. In CARROTS, the R’s stand for:
[Chapter 3, Page 66, Easy]

a. Relevant
b. Reliable
c. Rhetorical
d. Both A & B
e. None of the Above
Answer: D
Team 13

3. A(n) __________ is a choice about actions to take or not to take in a given situation.
[Chapter 3, Slide 16, Easy]

a. Communication
b. Decision
c. Problem Solving
d. Analysis
Answer: B
Team 13

4. A(n) _________ is a(n) important set of services for distributing private information throughout an organization.
[Chapter 5, Slide 1, Easy]

a. Internet
b. Network
c. Intranet
d. Organizational Network
Answer: C
Team 13

5. Which of the following is not one of the “six best practices” that occur in each development phase?
[Chapter 6, Page 171, Hard]

a. Manage Requirements
b. Control Changes
c. Model Textually
d. Verify Quality
e. Develop Literacy
Answer: C
Team 13

Which business model has a company as either a seller to many other companies or a buyer from many companies?
[Chapter 7, Page 213, Moderate]

a. Exchange Model
b. Company-Centric Business Model
c. Free Market Model
d. One-to-One Marketing Model
Answer: B
Team 13

LAMP is one of the most popular sets of technologies used in the solution stack. In LAMP, a database management system is:
[Chapter 8, Page 240, Hard]

a. M – My SQL
b. M - Microsoft Office
c. L – Linux
Answer: A
Team 13

8. SSL stands for:
[Chapter 8, Page 245, Moderate]

a. Super Secret Layers
b. Secure Socket Layer
c. Secure System layer
d. Secret Search Layers
Answer: B
Team 13

Which of the following is a type of global business model?
[Chapter 9, Page 269, Moderate]

a. Global Partnership
b. Multinational Company
c. Transnational Company
d. All of the Above
Answer: D
Team 13

10. Ives and Jarvenpaa list four key issues that businesses must address if they want be successful in managing global IT from a global IT perspective. Which is NOT the one of the four key issues that were suggested?
[Chapter 9, Page 271, Moderate]
Answer: B
Team 13

What is the number one concern among users contacting the Federal Trade Commission?
[John Gorzynski – Information Security in Business, Slide 6, Hard]
a. Bankruptcy
b. Eviction
c. Identity Theft
d. Arrest
e. Law Suits
Answer: D
Team 13

12. During the egg drop class activity, what material was not available for use?
[Egg Drop Activity, Easy]
Answer: A
Team 14

1. What is one of the cheapest and most effective ways of extending the life of your computer? [Chapter2 pg.30, easy]
a. Increasing your RAM capacity
b. Increasing your ROM capacity
c. Decreasing your ROM capacity
d. Increasing your CPU,a. Increasing your RAM capacity
a. Increasing your RAM capacity
Team 14

2. In the _________ stage, we identify a challenge or problem and gather data to determine if meeting the challenge or resolving the problem is possible. [Chapter 3 pg.70, intermediate]
a. Discovery
b. Analyze
c. Investigate
d. Transform
c. Investigate
Team 14

3. Which type of IS captures and processes transactions to make them available to the organization. [Chapter 1, p.14, easy-moderate]
a. DSS (decision support system)
b. TPS (transaction processing system)
c. MIS (management information system)
d. ERP (enterprise resource planning)
b. TPS (transaction processing system)
Team 14

4. Which of the following does NOT connect computers or other devices to a network? [Chapter 2, p.44, difficult]
a. Network Interface Cards (NICs)
b. Cable Modems
c. Modems
d. Wireless Cards
e. None of the above
e. None of the above
Team 14

5. Which one of these is NOT a programming language? [Chapter 8, slide 20, moderate]

a. Java
b. Perl
c. HTTP
d. PHP
c. HTTP
Team 14

6. According to the project management triangle, which objective appears in the triangle? [Chapter 6, p.175, easy]

a. Quantity
b. Efficiency
c. Productivity
d. Quality
d. Quality
Team 14

7. What are the elements of project management? (Chapter 6 pg.175, intermediate)
a. Scope
b. Time
c. Resource
d. All of the Above
d. All of the above
Team 14

8. What are the three primary options that an organization chooses from for obtaining an IS? [Chapter 6, pg.159, easy]
a. Acquisition, Constructing, Building
b. Acquisition, Leasing, Building
c. Construction, Leasing Building
d. None of the above are correct
b. Acquisition, Leasing, Building
Team 14

9. True or False: The evolutionary model is the most common reference model for describing the development process, allowing developers to share a common language when discussing requirements, designs, implementation, testing, or maintenance. [Chapter 6, pg. 169, Difficult]
Answer: False, the correct answer is the waterfall model
Team 14

10. What does the acronym LAMP stand for? [Chapter 8, pg. 240, Intermediate]
a. Linux, Apache, Mysql, Perl, PHP, or Python
b. Linux, Adobe, Mysql, Python
c. Linux, Apache, Mysql, Protocol
d. Linux, Apache, Mysql, Perl or PHP
a. Linux, Apache, Mysql, Perl, PHP, or Python
Team 14

11. In the acronym SCAM, what does the “m” stand for? [speaker-John Gorzynski, slide 13, intermediate]
a. Maintain your identity
b. Maintain your finances
c. Make a report
d. Make careful records
e. Maintain careful records
e. Maintain careful records
Team 14

12. The Egg Drop class activity served as an example to demonstrate how companies organize into teams to effectively generate and communicate ideas to meet challenges and complexities? [class lecture, Egg Drop Activity, easy]
True or False
True
Team 9
1. In John Gorzynski’s talk, he talked about how to prevent identity theft. Which of the following is NOT part of the acronym he gave us for protecting our identities? (Gorzynski’s PowerPoint, slide 14, moderate)
A. Secure you identity
B. Check your finances
C. Ask for a report
D. Manage your bank account
D, should be Maintain careful records
Team 9
2. What made the Lego tower activity more of a competition then the egg drop activity? (easy)
A. Incentives
B. Strict guidelines
C. Bigger Groups
D. Dealt with money
A, the incentive of a point on your final grade made many groups work harder and be more competitive.
Team 9
3. Which of the following is NOT part of the first generation of e-commerce? (chapter 8, moderate)
A. Client/server networks
B. Browser
C. XML
D. HTML
C, XML (eXtensible Markup Language) is part of the fourth generation
Team 9
4. What is it called when a business outsources to a business partner located outside its country but in the same geographic area as your business? (chapter 9, moderate)
A. Nearshoring
B. Onshoring
C. In-sourcing
D. Offshoring
A, Nearshoring
Team 9
5.Which of the following statements about the hardware component of RAM (Random Access Memory)is not true? [Chapter 2, page 30, hard]
a. Stores data only until information is needed or the computer is turned off.
b. There are fewer RAM chips than ROM chips in a computer.
c. The CPU can access any item stored in RAM directly.
d. RAM is short term memory so anything in RAM is lost when the computer is shut down.
e. Increasing RAM capacity is the easiest way to increase effectiveness of a computer.
B, There are fewer ROM chips in a computer than RAM chips.
Team 9
6.Match the letter from the CARROTS acronym with the information characteristic it describes: [Chapter 3, page 66-67, easy]


Column A

A. Complete
B. Accurate
C. Reliable
D. Relevant
E. Objective
F. Timely
G. Source


Column B

a) Free from bias
b) Dependable and consistent
c) Internal or external
d) Covers the entire range of data needed
e) Can be applied to problems and useful
f) Appropriate and current or time data is needed
g) Source contains correct data.
A. d, B. g, C. b, D. e, E. a, F. f, G. c
Team 9
7.What are the three main types of informational structures that businesses use to” get the job done”? [Chapter 4, page 91, moderate]
a. Functional, Linear, Matrix
b. Linear, Matrix, Decentralized
c. Functional, Decentralized, Matrix
d. Modern, Linear, Functional
e. Decentralized, Matrix, Modern
C- Functional, Decentralized, Matrix
Team 9
8.True or False: A Business System is an organized collection of people, information, business processes, and information technology, designed to transform inputs into outputs, in order to achieve a goal. [ Chapter 1, page 12, easy/moderate]
a. True
b. False
False- An Information System is an organized collection of people, information, business processes, and information technology, designed to transform inputs into outputs, in order to achieve a goal.
Team 9
9. Which of the following is not an example of why good people can make bad teams? (Chapter 6, moderate)
A. Lack of Trust
B. Ineffective communication
C. Lack of Punctuality
D. Lack of common vision
C, Lack of Punctuality
Team 9
10. Which is not a part of the Implementation section of the Waterfall model? (Chapter 6, easy)
A. Building a System
B. Integration and testing
C. Designing a system
D. Operation and maintenance
C, Designing
Team 9
11. Which of the following is one way, described in the book, to keep a strong password? (Chapter 7, moderate)
A. Use at least 8 characters
B. Make sure you use the same password so that you can remember them
C. Use things that relate to you specifically to help remember them
D. Use at least 9 characters
A, Use at least 8 characters
Team 9
12. Which is not a common use for XML? (Chapter 8, Hard)
A. Data exchange
B. Basis for new language
C. Data storage
D. Universal Description, Discovery, and Integration
D, Universal Description, Discovery, and Integration