• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/212

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

212 Cards in this Set

  • Front
  • Back
Which of the following is a basic concept associated with Web 2.0?
B) shift in users' role from the passive consumer of content to its creator
2) Which of the following is a consequence of the use of social software?
D) People are sharing more personal information.
3) The use of ________ within a company's boundaries or between a company and its customers or stakeholders is referred to as Enterprise 2.0.
C) Web 2.0 techniques and social software
4) Which of the following statements is true about Web 1.0?
B) It helps users find information.
5) A major benefit of social software is the ability to harness the "wisdom of crowds," which is also referred to as ________.
E) collective intelligence
6) The concept of ________ is based on the notion that distributed groups of people with a divergent range of information and expertise will be able to outperform the capabilities of individual experts.
C) collective intelligence
7) Which of the following statements is true about a discussion forum?
D) It is dedicated to a specific topic, and users can start new threads.
8) Which of the following statements is true about blogs?
B) They allow individuals to express their thoughts in a one-to-many fashion.
9) Which of the following Web 2.0 applications has been classified as the "amateurization" of journalism?
A) blogs
10) Keith Norat, the Chief Technology Officer of Kender Internationals, relies on blogs while making decisions. In his words, "Blogs are an important part of our purchase decisions. In todays environment, blogs provide diverse information that help us to make good decisions." Which of the following is an underlying assumption?
A) Information in blogs is accurate.
11) Which of the following explains the term "blogosphere?"
D) the community of all blogs
12) Social presence tools are also known as ________ tools.
C) microblogging
13) Which of the following facilitates real-time written conversations?
A) instant messaging
14) ________ take the concept of real-time communication a step further by allowing people to
E) Virtual worlds
15) Which of the following statements is true about virtual worlds?
A) It allows people to communicate using avatars.
16) The network effect refers to the notion that the value of a network is dependent on ________.
B) the number of other users
17) ________ is a cooperative Web 2.0 application making use of the network effect.
A) Media sharing
18) ________ is the distribution of digital media, such as audio or video files via syndication
D) Netcasting
19) Podcasting is a misnomer because podcasts ________.
E) can be played on a variety of devices in addition to Apple's iPods
20) Social bookmarking allows users to share Internet bookmarks and to create categorization systems. These categorization systems are referred to as ________.
C) folksonomies
21) Which of the following statements is true about social bookmarking?
D) It allows users to create folksonomies.
22) ________ is the creation of a categorization system by users.
A) Social cataloging
23) ________ refers to manually adding metadata to media or other content.
B) Tagging
24) Which of the following statements is true about tagging?
C) It is the process of adding metadata to pieces of information.
25) ________ refer(s) to a way of visualizing user generated tags or content on a site.
B) Tag clouds
26) Which of the following is one of the uses of geotagging?
C) to know the location of a person sending out a breaking news update
27) Which of the following is an example of synchronous communication?
D) videoconferencing
28) Which of the following is an example of asynchronous communication?
A) group calendars
29) Which of following factors differentiates asynchronous communication from synchronous communication?
C) coordination in time
30) In today's business environment, project teams comprise highly specialized members, many of whom are not colocated. ________ are comprised of members from different geographic areas.
B) Virtual teams
31) Which of the following is an electronic communication tool that allows users to files, documents, and pictures to each other and share information?
A) e-mail
32) Which of the following is an electronic conferencing tool that facilitates information sharing and rich interactions between users?
D) instant messaging
33) Which of the following is a collaboration management tool that is used to facilitate virtual or colocated meetings ?
E) intranets
34) Web-based collaboration tools ________.
A) allow for easy transferability from one person to another
35) Which of the following statements is true about Gmail
B) It allows users to select a custom domain name for an additional fee.
36) Which of the following Google Apps is an instant messaging client?
C) Google Talk
37) ________ is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application.
E) Google Docs
38) Which of the following statements is true about Google Sites?
A) It is an enterprise-level collaboration tool that allows users to create group Web sites and share team information.
39) A(n) ________ system allows users to publish, edit, version track, and retrieve digital information.
D) content management
40) Which of the following statements is true about content management systems?
C) It allows the assignment of different roles for different users.
41) Which of the following is the responsibility of an administrator in a content management system?
B) managing account access levels to the digital information
42) ________ is the creation of goods or services by self-organizing communities.
A) Peer production
44) Which of the following occurs during wiki wars?
E) contributors continuously edit or delete each others' posts
45) ________ is a phenomenon where companies use everyday people as a cheap labor force.
C) Crowdsourcing
46) ________ enables people to work in more flexible ways on a variety of Internet-related
D) E-lancing
47) ________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate.
C) Social networking
48) Which of the following statements is true about viral marketing?
A) It uses the network effect to increase brand awareness.
49) Which of the following is a critical factor in the success of a viral marketing campaign?
C) making sequels
50) ________ attempts to provide relevant search results by including content from blogs and microblogging services.
A) Social search
51) Which of the following statements is true about Real Simple Syndication (RSS)?
E) It is used to publish the most current blogs, podcasts, videos, and news stories.
52) For companies operating in the digital world, online collaboration with suppliers, business partners, and customers is crucial to being successful. ________ allow(s) data to be accessed without intimate knowledge of other organizations' systems, enabling machine-to-machine interaction over the Internet.
A) Web services
53) Android is a Web service hosted by Google to ________.
B) build mobile phone applications
54) Which of the following statements is true about widgets?
D) They are small interactive tools used for a single purpose.
55) Together, Web services and widgets enable the creation of ________.
B) mashups
56) Which of the following statements is true about a mashup?
E) It is an application or a Web site that integrates one or more Web services.
57) Which of the following is a reason for the development of semantic Web?
A) Web pages can be understood by people but not by computers.
58) Which of the followings is NOT true about an Enterprise 2.0 strategy?
E) Within organizations, the critical mass needed for an Enterprise 2.0 application is often easily achieved.
59) Enterprise 2.0 is likely to fail if ________.
A) an organization's workforce is dominated by baby boomers
68) ________ is a computer networking model in which multiple types of computers are networked together to share data and services.
D) Distributed computing
69) A(n) ________ is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data and peripheral devices, such as printers.
D) local area network
70) A(n) ________ is a wide area network connecting disparate networks of a single organization into a single network.
C) enterprise network
71) ________ are private, third-party-managed medium-speed WANs that are shared by multiple organizations.
A) Value-added networks
72) A(n) ________ is an emerging technology that uses wireless communication to exchange data between computing devices using short-range radio communication, typically within an area of 10 meters.
C) personal area network
73) ________ are network services that include the storing, accessing, and delivering of text, binary, graphic, and digitized video and audio data across a network.
C) Message services
74) The high-speed central networks to which many smaller networks can be connected are known as ________.
E) backbones
75) Which of the following wireless communication technologies uses high-frequency light waves to transmit data on an unobstructed path between nodes—computers or some other device such as a printer—on a network at a distance of up to 24.4 meters?
D) infrared line of sight
76) WLANs based on a family of standards called 802.11 are also referred to as ________.
B) wireless fidelity
77) Which of the following is a characteristic of terrestrial microwave communication?
D) high susceptibility to eavesdropping
78) ________ is the set of rules that governs how a given node or workstation gains access to the network to send or receive data.
A) Media access control
79) ________ is a commonly used method of random access control, in which each workstation "listens" to traffic on the transmission medium (either wired or wireless) to determine whether a message is being transmitted.
B) Carrier sense multiple access
80) In a(n) ________ network all nodes or workstations are connected to a central hub, or concentrator, through which all messages pass.
C) star
81) Which of the following network topologies is capable of covering the largest distance?
C) ring network
82) Which of the following statements is true of a bus network topology?
C) A bus network topology enables all network nodes to receive the same message through the network cable at the same time.
83) As per the Open Systems Interconnection (OSI) model, which of the following layers defines the way data is formatted, converted, and encoded?
C) presentation layer
84) According to the OSI model, the ________ layer defines the protocols for structuring messages.
C) transport
85) According to the OSI model, the physical layer defines ________.
C) the mechanism for communicating with the transmission media and interface hardware
86) A ________ is a device that converts digital signals from a computer into analog signals so that telephone lines may be used as a transmission medium to send and receive electronic data.
A) modem
87) A ________ is a PC expansion board that plugs into a computer so that it can be connected to a network.
D) network interface card
88) A(n) ________ is a piece of networking hardware that manages multiple access points and can be used to manage transmission power and channel allocation to establish desired coverage throughout a building and minimize interference between individual access points.
B) wireless controller
89) Which of the following entities is responsible for managing global and country code top-level domains, as well as global IP number space assignments?
C) Internet Assigned Numbers Authority (IANA)
90) Which of the following Internet connectivity technologies enables data to be sent over existing copper telephone lines by sending digital pulses in the high-frequency area of telephone wires?
B) digital subscriber line technology
91) Computers working as servers on the Internet are known as ________.
E) Internet hosts
92) A(n) ________ is a unique identifier that should be created and used when designing a database for each type of entity, in order to store and retrieve data accurately.
C) primary key
93) In which of the following database models does the DBMS view and present entities as two-dimensional tables, with records as rows, and attributes as columns?
A) relational database model
94) ________ is a technique to make complex databases more efficient and more easily handled by the DBMS.
C) Normalization
1) Which of the following statements is true about business intelligence?
C) It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.
2) "Backward looking" budgets are typically based on ________.
D) historical data
3) Responding to threats and opportunities and continuous planning is based on analyzing data from the ________ level of the organization.
A) operational
4) Taking entities as tables, each row is a ________.
B) record
5) Taking entities as tables, each column is a(n) ________.
A) attribute
6) An attribute is also referred to as a(n) ________.
C) field
7) A(n) ________ is a collection of related attributes about a single instance of an entity.
E) record
8) In DBMS, data are kept separate from the applications' programming code. This means that ________.
D) database does not need to be changed if a change is made to an application
9) A common way to represent a data model is a(n) ________.
A) entity-relationship diagram
10) Data type helps the DBMS ________.
C) allocate storage space
11) To finalize the data model in order to actually build the database, a process called ________ is used to make sure the database will operate efficiently.
B) normalization
12) In DBMS, normalization helps to ________.
A) eliminate data duplication
13) Once the data model is created, the format of the data is documented in a(n) ________.
E) data dictionary
14) A data dictionary is also known as ________.
C) metadata repository
15) Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having problems tracking the inventory levels for its stores. It is planning to implement Oracle database systems to replace this legacy system. Which of the following most supports Bringes' decision to replace its legacy system with an Oracle database system?
D) Bringes' channel partners use a database system that supports the Oracle database system.
16) Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company's internal (employees) and external (customers and channel partners) communication. Treston is planning to pursue a just-in-time inventory system soon after the database system is implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following, if true, can be cited as a reason for the failure of Treston's database system?
C) Treston's new database system was not supported by the database system of its suppliers and distributors.
17) Business rules are captured by the designers of the database and included in the data dictionary to ________.
B) prevent illegal or illogical entries from entering the database
18) ________ are used to capture data to be added, modified, or deleted from the database.
A) Forms
19) A(n) ________ is a compilation of data from the database that is organized and produced in printed format.
E) report
20) A query is used to ________.
D) retrieve information from a database
21) Which of the following statements is true about query by example capabilities in a database?
A) It helps to create a query quickly and easily.
22) The systems that are used to interact with customers and run a business in real time are called ________.
C) operational systems
23) ________ is the data that is deemed most important in the operation of a business.
B) Master data
24) Which of the following statements is true about an operational system?
D) It consists of narrow and simple updates and queries.
25) Which of the following statements is true about informational systems?
E) Its goal is to enhance ease of access and use.
26) ________ integrates data from various operational systems.
A) Data warehouse
27) The purpose of a data warehouse is to ________.
D) put key business information into the hands of more decision makers
28) ________ refers to the process of standardizing the format of data retrieved from different systems.
A) Data cleansing
29) A ________ is a data warehouse that is limited in scope.
E) data mart
30) Which of the following statements is true about a data mart?
B) It contains selected information from the data warehouse.
31) Information and knowledge discovery tools are used primarily to ________.
C) extract information from existing data
32) ________ are produced at predefined intervals to support routine decisions.
D) Scheduled reports
33) Which of the following statements is true about key-indicator reports?
A) They provide a summary of critical information on a recurring schedule.
34) Which of the following statements is true about exception reports?
E) They highlight situations that are out of the normal range.
35) ________ help analyze why a key indicator is not at an appropriate level or why an exception occurred.
C) Drill-down reports
36) Which of the following statements is true about ad hoc queries
D) They answer unplanned information requests to support a nonroutine decision.
37) ________ refers to the process of quickly conducting complex, multidimensional analyses of data stored in a database that is optimized for retrieval, typically using graphical software tools.
B) Online analytical processing
38) Online analytical processing tools enable users to ________.
C) analyze different dimensions of data beyond simple data summaries
39) Which of the following statements is true about online analytical processing server?
E) It understands how data is organized in the database and has special functions for analyzing the data.
40) How do online analytical processing systems improve performance?
A) They preaggregate data so that only the subset of the data necessary for the queries is extracted.
41) In online analytic processing systems, ________ are the values or numbers the user wants to analyze.
C) measures
42) In online analytic processing systems, ________ provide a way to summarize the data.
E) dimensions
43) Which of the following statements is true about the online analytic processing cube?
D) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.
44) Data mining complements online analytic processing in that it ________.
B) provides capabilities for discovering "hidden" predictive relationships in the data
45) ________ can be achieved by rolling up a data cube to the smallest level of aggregation
D) Data reduction
46) Which of the following statements is true about association discovery?
A) It is a technique used to find correlations among sets of items.
47) ________ is the process of grouping related records together on the basis of having similar
C) Clustering
48) Which of the following is a recording of a user's path through a Web site?
D) clickstream data
49) ________ is the ability to attract and keep visitors.
C) Stickiness
50) Which of the following analysis are you conducting to make hypothetical changes to the data associated with a problem and observe how these changes influence the results?
D) what-if analysis
51) Which of the following statements is true about expert systems?
C) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.
52) Which of the following statements is true about a rule in expert systems?
D) It is typically expressed using an "if––then" format.
53) ________ allows expert system rules to be represented using approximations or subjective values in order to handle situations where information about a problem is incomplete.
A) Fuzzy logic
54) The processing in an ES is called ________.
B) inferencing
55) Which of the following statements is true about neural networks?
C) It attempts to approximate the functioning of the human brain and can learn by example.
56) Which of the following statements is true about user agents?
D) They are agents that automatically perform a task for a user.
57) Which of the following is a role of monitoring and sensing agents?
A) tracking inventory levels
58) Which of the following is a role of data mining agents?
D) analyzing data warehouses to detect changes deemed important to a user
59) Which of the following statements is true about explicit knowledge assets?
C) It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.
60) Which of the following is the primary goal of a knowledge management system?
A) Identifying how to recognize, generate, store, share, and manage tacit knowledge.
61) Social network analysis is a technique that attempts to ________.
E) find experts in particular subject areas
62) ________ refers to the display of complex data relationships using a variety of graphical
B) Visualization
63) Which of the following statements is true about digital dashboards?
B) It supports usage models like push reporting, exception reporting and alerts, and pull reporting.
64) Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational statistics and trends. This usage model is known as ________.
E) push reporting
65) While using digital dashboards, pull reporting is conducted to ________.
D) analyze the root causes of an exception
66) Which of the following statements is true about hard data?
E) It includes facts and numbers.
67) Which of the following explains the phrase "data is geocoded"?
A) It is transformed into coordinates.
1) Traditionally, companies are organized around four distinct functional areas. Which of the
A) supply chain management
2) Which of the following is a core business process?
B) make-to-stock
3) Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the customer's credit card. This process of selling a product or service is known as the ________ process.
C) order-to-cash
4) For most businesses, the ________ process entails subprocesses such as creating a customer record; checking the customer's creditworthiness; creating an order; checking and allocating stock; picking, packing, and shipping; invoicing; and collecting the payment.
A) order-to-cash
5) An online retailer has finished creating a customer record. What should the retailer do next in an order-to-cash process?
E) check customer credit
6) In the order-to-cash process, once "checking credit" is done, it is followed by ________.
B) creating an order
7) An online retailer has just finished creating an order for a customer. In an order-to-cash
process what should the retailer do next?
C) allocate stock
8) The processes associated with the acquiring of goods from external vendors are together referred to as the ________ process.
E) procure-to-pay
9) Which of the following is typically the first step in the procure-to-pay process?
A) negotiate price and terms
10) In the procure-to-pay process, the negotiation of price and terms is followed by ________.
C) issuing the purchase order
11) ________ immediately after the purchase order is issued in the procure-to-pay process.
D) Goods are received
12) Receiving the goods is immediately followed by ________ in the procure-to-pay process.
E) receiving the invoice
13) In the ________ process, goods are produced based on forecasts and are stored in a warehouse and sales orders are then fulfilled from the inventory.
B) make-to-stock
14) Which of the following uses a push-based approach?
D) make-to-stock
15) In the ________ process, raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received.
E) make-to-order
16) Which of the following uses a pull-based approach?
A) make-to-order
17) Which of the following is typically the first step in the make-to-stock process?
B) procuring inputs
18) Which of the following goods are typically produced under a make-to-order approach?
C) very expensive low-volume goods
19) Which of the following goods are produced using the make-to-order approach?
A) commercial aircraft
20) ________ are performed by the functional areas that process inputs and produce outputs.
B) Core activities
21) Which of the following is a core activity?
C) operations and manufacturing
22) Inbound logistics involves business activities associated with ________.
D) receiving and stocking raw materials, parts, and products
23) Assembly processes are ________ activities.
E) operations and manufacturing
24) Outbound logistics activities focus on the ________.
D) transformation of raw materials into end products
25) Administrative activities focus on the ________.
D) processes and decision making to orchestrate the day-to-day operations of an organization
26) The hardware and software that must be implemented to support the applications that the primary activities use are a part of the ________ activities.
E) infrastructure
27) Which of the following is a support activity?
C) technology development activities
28) Human resource activities ________.
A) is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them
29) Designing and developing applications that support the primary business activities are a part of the ________ activities.
C) technology development
30) A(n) ________ information flow consists of information that is received from another organization.
D) upstream
31) A(n) ________ information flow relates to the information that is produced by a company and sent along to another organization.
E) downstream
32) Systems that focus on the specific needs of individual departments and are not designed to communicate with other systems in the organization are referred to as ________.
C) stand-alone applications
33) Stand-alone systems are also known as ________.
D) legacy systems
34) Legacy systems can prove problematic when information from multiple departmental systems is required to support business processes and decision making. Which of the following is most similar to the above scenario?
A) Chuck's is a retail chain that has an inventory management system which is tied to an RFID system. This system notifies Chuck's managers when the inventory in its stores fall below a certain level.
35) A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database.
E) enterprise system
36) An internally focused system helps an organization coordinate with ________.
D) its departments
37) A(n) ________ coordinates business processes with customers, suppliers, and business partners of an organization.
E) externally focused system
38) A system that communicates across organizational boundaries is sometimes referred to as a(n) ________.
B) interorganizational system
39) ________ are applications written by third-party vendors for the needs of many different users and organizations.
A) Packaged software
40) Applications that are designed and developed exclusively for a specific organization are known as ________.
B) custom software
41) Customers can purchase ________ software off the shelf to help them with their personal documents and communications.
C) packaged
42) Packaged software is ________.
A) used for standardized, repetitive tasks
43) Which of the following software is very cost effective since the vendor that builds the application spreads out the development costs by selling them to a large number of users?
A) packaged software
44) Which type of software is best suited for tasks that are unique to a particular business?
B) custom
45) Which of the following is true regarding packaged software and custom software?
B) The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design and develop them.
46) The features and modules that an enterprise system comes with out of the box are referred to as the ________.
C) vanilla version
47) ________ is a systematic, structured improvement approach by all or part of an organization whereby people critically examine, rethink, and redesign business processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle time, or cost.
A) Business process management
48) In the 1990s, business process management was known as ________.
B) business process reengineering
49) After deciding to focus on business process management, the management of a company has just finished developing a vision for the organization. This vision specifies the company's business objectives. Typically, what should be the management's next step?
D) They should identify the critical processes that are to be redesigned.
50) After identifying the ways in which information systems can be used to improve the processes, which of the following is the next step in business process management?
B) understanding and measuring the existing processes as a baseline for future improvements
51) How is business process management similar to total quality management?
A) They are intended to be cross-functional approaches to improve an organization.
52) Applications that integrate business activities across departmental boundaries are often referred to as ________ systems.
D) enterprise resource planning
53) Which of the following is true regarding enterprise resource planning (ERP)?
E) It makes the process of sharing information between business activities easier.
54) ________ support the important internal activities of the organization for producing their products and services.
B) ERP core components
55) Financial management, operations management, human resource management, and other important internal activities require the support of ________.
C) ERP core components
56) ________ support the primary external activities of the organization for dealing with suppliers and customers.
D) ERP extended components
57) Specifically, ERP extended components focus primarily on ________.
E) customer relationship management and supply chain management
58) Which of the following is true regarding the formula for success of an enterprise system?
A) Enterprise systems implementations should include personnel from different departments.
59) In service-oriented architecture, ________.
A) business processes are broken down into individual components or services
60) By breaking down business processes into individual services, organizations can react more swiftly to changing business needs. To achieve these benefits, services have to follow three main principles:
C) reusability, interoperability, and componentization