Which activity is an example of how information systems support business functions of human resource departments? - correct answer An employee processes
... [Show More] monthly payroll checks and benefits using an open-source software.
There are six major components of a computer-based information system, four of which are also in the information technology component. Which two components are only parts of the information system?
Choose 2 answers - correct answer People
&
Processes
A police department at a large metropolitan city implemented an information system that analyzes historical crime data, including date and locations as well as other external, environmental, and city-related data. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention. The police department uses the reports to plan the officers' patrol routes, targeting the areas that the system predicted to have high likelihood of incidents.
Which type of computer-based information system provides a competitive advantage based on the described scenario? - correct answer A decision support system (DSS) that improves decision-making
A police department at a large metropolitan city implemented an information system that integrates historical crime data, including date and locations to other external, environmental, and city-related data. The system then produces daily predictive reports of the major locations around the city that are likely to require additional police attention. The police department uses the reports to plan the officers' patrol routes, targeting the areas that the system predicted to have high likelihood of incidents.
Which two strategies does the information system at the police department aim to accomplish?
Choose 2 answers - correct answer Improving decision-making
&
Operational efficiency
Which business function is primarily the responsibility of production and operations information systems? - correct answer Quality control
A small company that is growing quickly into a medium-sized company is facing the challenge of consolidating and storing information received from multiple sources from the ground up in order to ensure that operations run efficiently. The company needs to hire an expert who will, in addition to the above, maintain security and apply upgrades as needed.
Which IT professional does the company need to hire in order to address this challenge? - correct answer Database administrator
A university is looking for ways to customize its courses to the unique needs of its students by creating various levels of hybrid online courses, such as 80% online for one student, whereas only 30% online for another.
Which IT management challenge is addressed in this scenario? - correct answer Develop new products and services
A ride-sharing cab company is looking for ways to generate more business by attracting more customers, both on the supply (driver) and demand (passenger) side, via a strategy of tracking their monthly miles and offering "frequent flier" bonuses, just like airline companies have done.
Which IT management challenge is addressed in this scenario? - correct answer Promote competitive advantage
An automobile manufacturer is considering equipping the engines of its new models with the capability of detecting early symptoms of an imminent mechanical or electric failure, automatically transmitting that warning to the dealership from which the customer purchased the car, and the dealership automatically contacting the customer to schedule a repair appointment. It is facing the challenge of whether all this is technically feasible and operationally viable.
Who needs to address this challenge of value creation through technology use? - correct answer Chief technology officer
A car dealership has been receiving complaints from its customers about its inflexible repair system in which customers who drop off their cars the previous evening are not properly placed in the queue and tend to be placed behind those who drop off their cars the morning of the scheduled repair. It needs technical staff members who understand the scheduling/drop-off operation so it can determine and articulate precise customer needs to the programmers who would then build the code behind the system.
What type of challenge is this? - correct answer User requirements
An international company is facing the challenge of its software development team working on a specific application spread across the globe in 16 countries in 12 different time zones. Flying them to the same location once a week or even once a month for coordination purposes would be prohibitively expensive. Moreover, the issues that arise tend to be urgent and in need of almost immediate resolution in communication with team members in other countries.
Which communication style is necessary to resolve the issues in the given scenario? - correct answer Synchronous
What business strategy relies heavily on efficient and secure software implementations? - correct answer Web sales
What business function benefits from both wireless networks and cellular technologies? - correct answer Product sales support
In 1965, computers had .092 MIPS, and today's computer have about 238,000 MIPS.
What business practices have taken advantage of this massive increase in computer speed?
Choose 2 answers - correct answer Network management systems
&
Database management systems
A marketing manager uses a desktop publishing software to create advertising brochures that will be mailed to potential customers.
To which major software category does the desktop publishing software in this scenario belong? - correct answer Application software
A company needs to allow multiple computers to have access to a shared printer.
Which type of computer is required to manage the print requests to a shared printer? - correct answer A server computer
A large online retail store needs a computer system that can quickly process sales orders, inventory, payment, and shipping.
Which computer system is required to accomplish these tasks? - correct answer Mainframe computer
Which development methodologies respond to a need to expedite and scale software development, with concepts that are concerned with the reuse of one or many software objects?
Choose 2 answers - correct answer Object-oriented development
&
Component-based development
Which approach to systems development has a limited emphasis on the planning process and uses prototypes in lieu of predetermined specifications? - correct answer Rapid application development
A company has many separate departments that focus on different business aspects and uses data warehouse subsets to hold data specific to each individual department. The company started a new department and created a new subset.
What is this new subset called? - correct answer Data mart
An auto parts manufacturer is creating a new relational database to more accurately identify their customers and vendors. The manufacturer's database design team decided to use "vendorID" to link a given vendor to a specific product, as illustrated in the diagram shown.
What type of attribute is "vendorID"? - correct answer Primary key in record "Vendor"
Which database type, used frequently in early style databases but much less frequently today, contained inflexible data relationships that formed a treelike structure? - correct answer Hierarchical database
Amanda has been asked to regularly extract and process databases from many sources into a data warehouse, which will be used by several divisions within the company.
Which data type should Amanda recognize is prevented by her data warehouse design? - correct answer Variable
A national publisher of newspapers wants to mine its data warehouse (including inputs from social media) to identify which of its publications customers believe provides reliable reporting.
Which tool is used for this initiative? - correct answer Sentiment analysis
A marketing research firm is planning a study involving consumer preferences toward new coffee flavors. The company needs to analyze coffee data from the coffee manufacturer, as well as preference data from consumers in order to discover whether certain flavors are more or less popular among certain segments of the population.
Which database technology would help the company conduct this research project? - correct answer Business intelligence system utilizing data mining technology
A fast food restaurant chain is in the process of adding more restaurants in an overseas market. One of the requirements is to have a reliable and scalable database technology that allows the local restaurants, as well as the corporate office, data access regardless of the platforms and locations.
Which database technology supports these business data requirements? - correct answer Cloud-based database
Which aspect of data governance is used to ensure that once an online payment transaction is successfully processed, the credit card information is removed from the company servers? - correct answer Data are properly destroyed.
Which aspect of data governance is used to ensure that the customer data and payment information saved in the company server are properly encrypted? - correct answer Data are properly stored.
A marketing manager would like to study customer behavior and how it relates to customer's purchase products from its online store. Specifically, she would like to know which website page the majority of customers spent the most time on, when and where they decided to abandon the shopping cart, and how long (on average) a customer takes to complete a sales transaction.
Which database technology supports this study? - correct answer Clickstream analysis
Which telecommunication protocol is used to connect devices in a wireless local area network (LAN)? - correct answer Wi-Fi
Which telecommunication protocol is used to retrieve email from a mail server? - correct answer Post Office Protocol (POP)
With technology trends such as the Internet of Things (IoT), Big Data, Cloud Computing, eCommerce, and mCommerce, the Internet has become a very important and useful aspect of society. To prepare for these trends and aid in technology evolution, a necessary and critical change in telecommunications was the conversion from IPv4 to IPv6.
What was the primary reason to convert to IPv6? - correct answer To increase the number of available IP addresses
Which tactic defeats a war driver by barring access to your secured wireless network? - correct answer Configuring the access point to accept only specific MAC addresses
A food truck wants to connect with its customers using a site that enables users and businesses to use public messages to create informed commerce.
Which concept describes service to consumers and businesses in closing the feedback loop? - correct answer Social networking
Interactions between buyers and sellers are often more effective when sellers intimately understand the needs of their customers, and when customers have more information to make important decisions. Thanks to the variety of beneficial resources, information, and services made possible by the Internet, such interactions may be highly individualized, and tailored to the buyer's purchasing capacity, and relative influence.
What is another important advantage of a digital market over a traditional market, from a buyer's perspective? - correct answer Improved transparency
Fred is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer. Recently, the company has discovered that the many Bluetooth headsets, cordless telephones, and regular usage of the breakroom microwaves are causing long-standing intermittent micro-outages at often predictable times of the day.
Which solution to this problem will avoid disruption to the work environment? - correct answer Change the wireless access points to other another frequency
Sasha is an IT engineer at a small online news agency, where 35 employees carry laptops and print to the wireless printer. Several wireless access points are installed in the ceiling at appropriate points throughout the office space, though they share the same Service Set Identifier (SSID). In fact, an employee can start a large download, and then carry her laptop from one end of the office space to the other without losing her connection.
Which network topology configuration supports this scenario? - correct answer Mesh topology
Which two network devices boost Wi-Fi strength for wireless devices in areas of low signal quality?
Choose 2 answers - correct answer Wireless bridge
&
Wireless repeater
Broadband has enabled data, voice, and video to be combined and transmitted over one network.
What is the name of the standard that allows this convergence between voice and data networks? - correct answer VoIP
Although WPA has been a secure encryption protocol for wireless networks, it is being replaced by a standard that offers even stronger security as the latest Wi-Fi encryption protocol.
What is the name of this new standard? - correct answer WPA2
The traditional systems development lifecycle (SDLC) consists of six formal phases. Which phase of the SDLC involves developing the plan for capturing data and producing the output? - correct answer System design
A hotel experiences relatively long checkout lines on Sundays when the majority of its customers check out. Replacing the hotel's existing checkout system with an expensive state-of-the-art system has crossed the mind of top management, and yet, due to its relative monopoly in that region, the hotel's customers tend to be rather loyal. The management is wondering whether the costs involved in installing a new system would be recouped by the new system in the long run.
Which type of feasibility is presented in this scenario? - correct answer Economic feasibility
A bowling center has implemented a new expensive system in hopes of increasing its clientele. The system stores and tracks patrons' bowling performance over time and displays for them the extent to which their performance has been improving over time. However, this new system has failed to attract more patrons.
During which phase of systems development is this failure discovered? - correct answer Evaluation
A large hotel chain needs to develop a system that would coordinate its airport shuttle service with its customers' needs. This requires that their systems analysis staff interacts with both customers and shuttle drivers to identify and document the necessary requirements.
In which role would a systems analyst assume to address this issue? - correct answer Communicator
Which tool is appropriate for use in the design phase of information systems development to specify the detailed logic of a business process in narrative form in a manner easily translatable into any programming language? - correct answer Pseudocode
A company is exploring the possibility of a merger with another company and decides to create a system model of the merged companies.
In which step of the model will the company create a functional flow diagram? - correct answer Process
A corporation wishes to modify its current distribution system. The management team asks the information systems (IS) team to analyze the proposed distribution change. Upon approval of the proposed IS project, the IS team must choose the project implementation method.
Which method allows the old system to operate while the new system is developed and tested? - correct answer Parallel adoption
An organization is planning its yearly budgeting cycle. Management has requested the information systems team to validate current hardware and software performance.
Which type of evaluation can the team use to perform this validation? - correct answer Function-oriented
A business requires large amounts of data that are processed into information and used to maintain a competitive advantage over their competitors. As the business grows, the data storage and processing capabilities are becoming extremely challenging and costly.
What external technological environment can be used to help address these issues? - correct answer Cloud computing
A company is considering an expansion into a new target market. The company's management team develops a decision process to analyze current market strengths and to predict needs for the proposed new target market.
Which benefit does the company gain by developing this target market decision process? - correct answer The company becomes data-centric.
An online mail order company decides to create its own Customer Relationship Management (CRM) system to help management analyze customer's purchasing patterns. To be successful at managing relationships with customers, the CRM system must have access to large amounts of customer purchasing data for analysis and report generation.
Which MIS tool is also useable by the company's CRM system? - correct answer Decision support system
A decades-old company has several hundred employees and a modern IT infrastructure. An IT security analyst has been hired to provide a layered defense structure and must take measures to ensure confidential information remains confidential.
Which activities will help the IT security analyst accomplish this goal?
Choose 3 answers - correct answer Enforcing document retention and destruction policies
&
Requiring the use of ID badges at building access points
&
Mandating annual information security training for all employees
A company has issued smartphones to its employees with a policy that the devices may not be used off of the company's campus. An IT analyst has been tasked with finding a way to enforce this policy.
Which solution provides a fitting solution to this problem? - correct answer Proximity authentication access control
Hostile or intrusive software with harmful intent can take the form of executable code and greatly damage a user's computer.
Which technology can be used to minimize the chances of this happening? - correct answer Anti-malware
A regional manager has received an important financial document seemingly sent by a branch manager, but he doubts whether the report was actually sent by that manager.
Which technology could be used to verify that the report was indeed sent by the branch manager? - correct answer Digital signature
A corporation needs to improve its security policies and has decided to limit physical access to corporate computers.
What value will the corporation realize with this policy? - correct answer System protection
A business wished to extend the use of its virus scanning software to the business' customers. This requires the business to allow customers enough access to the internal network so virus scanning software can be downloaded to a customer's computer.
Which two security measures will the business have to take to ensure customer access for virus scanning downloads, yet protect internal systems from possible unauthorized access?
Choose 2 answers - correct answer Take steps to detect any presences of malware.
&
Require a username and password for network access.
An investment banking corporation utilizes employee passwords as a data privacy measure to secure sensitive data. The IT security team has been tasked with ensuring the data is produced and modified in the correct way.
Which data privacy goal is the IT security team tasked with accomplishing in this scenario? - correct answer Integrity
The information systems support team is asked to perform an analysis of corporate privacy measurers regarding a centralized relational database. The database is interconnected to several business groups via the internal data network that also supports connectivity to outside organizations.
Which ethical risk is identified after a secondary analysis? - correct answer The financial system introduces unwanted liabilities.
A corporation is using the encryption illustrated in the diagram below to protect business-sensitive information.
What type of encryption is the corporation using? - correct answer Character shifting
Interactive online communications, such as instant messaging, email, and video teleconferencing, have allowed managers at a large retailer to boost efficiency by enabling collaboration between geographically separate employees. However, such technologically assisted interactions have led to inappropriate conduct by employees, requiring the employer to implement processes or technological controls to reduce risk and encourage professionalism, but potentially invade employee privacy.
Which technological action, if used, will represent an ethical challenge for this large retailer? - correct answer Reviewing instant message logs
Widespread use of the Internet caused disruption and quick evolution within the music industry. Responses to widespread Internet usage included technological evolutions, such as uniquely identifiable digitally tagged files, and the passage of laws that penalized file sharing.
Which type of e-commerce put music industry artists, publishers, and retailers at risk of losing potential revenue due to widespread use of the Internet? - correct answer Peer to peer
Large established businesses often have networks of other businesses within their supply chains in order to maintain the flow of information and materials. Company A is an organization that hosts its own marketplace of suppliers in order to facilitate the pursuit of its own interests.
Which network describes Company A's example of e-commerce? - correct answer Private industrial
To help facilitate business in areas without traditional infrastructure, some companies offer devices that allow businesses to accept credit cards with their tablets and cell phones.
Which business model category do these companies fall in? - correct answer Service provider
Mary purchased a digital camera from an online store for her upcoming road trip.
What is the e-commerce model of the online store? - correct answer Business to Consumer (B2C)
Company A ordered printer toner cartridges from Company B. Company B ships the products to Company A every two months.
What is the e-commerce model described in this scenario? - correct answer Business to Business (B2B)
Although printed catalogues are still produced and mailed by specialty retailers, for most of these retailers a customer can place an order immediately at the website instead of mailing an order form.
Which specific feature of e-business enables this opportunity? - correct answer Online order entry
Customers wish to have the capability of performing tasks anytime, anywhere, without being tethered to a desktop computer.
Which term describes computer programs designed specifically for this purpose? - correct answer Mobile apps
Which two benefits can a business realize by using social media to connect to customers?
Choose 2 answers - correct answer Detailed marketing research
&
Targeted sales promotions
A candidate is applying for a job at a local company. His resume listed the most recent position as a supervisor at XYZ Corp. However, his social media profile indicated the position during the same time period as a manager at XYZ Corp.
Which aspect of the job candidate's qualification can negatively affect his hiring potential? - correct answer Inconsistent experience
Which feature of social media websites can a job seeker use to convince prospective employers that the job seeker's talents are real and are already valued by a number of other individuals and organizations? - correct answer Profile recommendation [Show Less]