Test Bank Chapter 14 Using Technology To Manage Information - Contemporary Business 18e | Test Bank by Louis E. Boone by Louis E. Boone. DOCX document preview.

Test Bank Chapter 14 Using Technology To Manage Information

Package Title: Chapter 14, Testbank

Course Title: Boone, 18e

Chapter Number: 14

Question type: Multiple Choice

1) The purpose of a(n) _____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Easy

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

2) A secure connection between two points on the Internet is known as a(n) _____.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Easy

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

3) A company network that links employees via Internet tools is called a(n) _____.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Easy

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

4) A _____ refers to a company’s ability to invest in and keep pace with constant changes in the age of technology.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Easy

Learning Objective 1: 14.8

Section Reference 1: Discuss information technology trends.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

5) Malicious software programs such as worms, viruses, and Trojan horses designed to infect computer systems are known as _____.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Easy

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

6) _____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

7) A computer network that connects machines within a limited area is called a(n) _____.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

8) A centralized integrated collection of data resources is known as a(n) _____.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

9) _____ consist of raw facts and figures that may or may not be relevant to business decisions.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

10) _____ is a discipline that promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise’s information assets.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

11) A(n) _____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.8

Section Reference 1: Discuss information technology trends.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

12) A(n) _____ is an executive responsible for managing a company's information system and related computer technologies.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

13) A(n) _____ is an information system that provides direct assistance to businesspeople to make decisions and choose courses of action.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

14) _____ uses powerful servers to store applications software and databases for users to access via the Web.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.8

Section Reference 1: Discuss information technology trends.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

15) A(n) _____ is a computer program that imitates human thinking through complicated sets of if-then rules.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

16) A system that allows top managers to access a company's primary databases is called a(n) _____.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

17) _____ software secretly gathers user information through the user's Internet connection without the user's knowledge.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

18) A(n) _____ is a network of PCs that have been infected with one or more data-stealing viruses.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

19) The _____ of a company is an organized method for collecting, storing, and communicating past, present, and projected data on internal operations and external intelligence.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

20) Less expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders, are known as _____.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

21) Wikipedia and other online sources replacing traditional print encyclopedias are examples of _____.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

22) The term _____ refers to startup companies worth $1 billion or more.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

23) Uber and Airbnb are examples of companies referred to as _____, which use innovative business models to bring about disruption in a particular industry.

a) CIO

b) Knowledge management

c) decision support system

d) firewall

e) application service provider

f) virtual private network

g) Wi-Fi

h) intranet

i) malware

j) local area network

k) data

l) digital workforce

m) expert system

n) executive support system

o) spyware

p) database

q) cloud computing

r) botnet

s) information system

t) disruptive innovations

u) unicorns

Difficulty: Medium

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

Question type: Essay

24) Differentiate between data and information.

Solution: Data consists of raw facts and figures that may or may not be relevant to a business decision. Information, on the other hand, is the knowledge gained from processing those facts and figures. While a business may need to gather data about the demographic characteristics of a target market or the specifications of a certain product, the data are useless unless they are transformed into relevant information that can be used to make a competitive decision.

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

25) Define databases and describe how they are obtained and their uses.

Solution: The heart of any information system is its database, a centralized integrated collection of data resources. A company designs its databases to meet particular information processing and retrieval needs of its workforce. Businesses obtain databases in many ways. They can hire a staff person to build them on site, hire an outside source to do so, or buy packaged database programs from specialized vendors, such as Oracle. A database serves as an electronic filing cabinet, capable of storing massive amounts of data and retrieving it within seconds. A database should be continually updated; otherwise, a company may find itself with data that are outdated and possibly useless.

Difficulty: Hard

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

26) Differentiate between hardware and software. Give examples of both.

Solution: Hardware consists of all the tangible elements of a computer system—input devices, machines that store and process data and perform required calculations, and output devices that present results to information users. Examples of input devices include the keyboard, mouse, and scanner. Storage and processing devices include the DVD drives and flash memory devices. Output devices include printers and monitors. Software refers to the sets of instructions that tell the computer hardware what to do. There are two general types of software—operating systems (software that controls the basic workings of the computer system) and applications software (programs that perform specific tasks such as word processing). An example of operating systems is Windows 8. An example of application software is MS Word.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

27) Discuss the responsibilities of a computer systems analyst.

Solution: Computer systems analysts consult with managers to determine information technology (IT) needs, research existing and emerging technologies, analyze and prepare cost benefits analyses, and determine ways to add additional functionality to existing systems. Testing is often conducted and end users are trained on the system. In an effort to design an efficient and effective computer system (taking into consideration both memory and speed), an analyst is concerned with data modeling, which studies the processes and data flows within an organization. Depending upon the type of organization or the industry, a systems analyst will create a financial or production system, for example. A systems analyst works closely with business leaders and managers to explain how the system can best serve the organization’s internal and external customers.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

28) Identify and briefly explain the most widely used applications of computers.

Solution: The most widely used business applications of computers include word processing, spreadsheets, desktop publishing, e-mail, financial, presentation, personal information managers, and enterprise resource planning. Word processing is software that uses a computer to type, store, retrieve, edit, and print various types of documents. A spreadsheet is a software package that creates the computerized equivalent of an accountant's worksheet, allowing the user to manipulate variables and see the impact of alternative decisions on operating results. Desktop publishing extends word processing capabilities to create sophisticated documents that combine high-quality type and graphics to create output that can look as attractive as documents produced by professional publishers and printers. Financial software compiles accounting and financial data to create financial statements, reports, and budgets. Presentation programs allow users to create slide presentations, handouts, etc. for effective reports and proposals. Personal information systems are specialized database programs used to track communications with contacts. Enterprise resource planning involves integrated cross-functional software that controls business activities such as distribution, finance, and human resources.

Difficulty: Hard

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

29) Describe a wide area network and explain how companies use it.

Solution: Wide area networks (WANs) tie larger geographical regions together by using telephone lines and microwave and satellite transmission. One familiar WAN is long-distance telephone service. Companies such as AT&T and Verizon provide WAN services to businesses and consumers. Companies also use WANs to conduct their own operations. Typically, companies link their own network systems to outside communications equipment and services for transmission across long distances.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

30) Explain at least two ways in which common cybercrimes occur.

Solution: Employees or outsiders may modify computer programs to create false information or illegal transactions or to insert viruses.

Unauthorized people can access computer systems for their own benefit or knowledge or just to see if they can get in.

Difficulty: Easy

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

31) Explain the difference between a virus and a Trojan horse.

Solution: A virus is a program that secretly attaches itself to host programs and changes the host program or destroys data. Viruses can be programmed to become active immediately or to remain dormant for a period of time, after which the infections suddenly activate themselves and cause problems. A virus can reproduce by copying itself onto other programs stored in the same drive. A Trojan horse is a program that claims to do one thing but in reality does something else, usually something malicious. When an unsuspecting user clicks on the Trojan horse to launch it, the program might erase the hard drive or steal any personal data stored on the computer.

Difficulty: Medium

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

32) Offer examples of ethical concerns surrounding information technology and information systems.

Solution: Ethical concerns include standards and policies regarding the use of information systems by employees and vendors. In addition, ethical concerns involve the obligation of organizations to protect the privacy and confidentiality of data about employees and customers. Ethical issues also involve organizational use of information systems. Organizations have an obligation to protect the privacy and confidentiality of data about employees and customers. Employment records contain sensitive personal information, such as bank account numbers, which, if not protected, could lead to identity theft.

Difficulty: Easy

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

33) Identify the five important tasks for off-site data storage.

Solution: First is planning. The organization needs to decide what data need to be protected. Priority should be given to data having severe legal or business consequences should they be lost. Second, a backup schedule must be established and closely adhered to. Third, when data are transmitted off site, they must be protected by the highest level of security possible. Fourth, care should be taken in selecting the right security vendor. There are dozens of vendors offering different services and having different areas of expertise. Finally, the backup system should be continually tested and evaluated.

Difficulty: Medium

Learning Objective 1: 14.7

Section Reference 1: Explain disaster recovery and backup systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

34) List the four significant trends about information systems.

Solution: Significant trends regarding information systems include the growing demands of the so-called distributed workforce, the increased use of application service providers, on-demand computing, and cloud and grid computing.

Difficulty: Easy

Learning Objective 1: 14.8

Section Reference 1: Discuss information technology trends.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

35) Explain the concept of disruptive innovations using examples.

Solution: Disruptive innovations refer to less expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders. Examples include smart phones replacing personal computers; downloadable digital media replacing CDs and DVDs; Wikipedia and other online sources replacing traditional print encyclopedias; and retail medical clinics replacing traditional doctors’ offices. Uber and Airbnb are examples of companies referred to as “unicorns,” which use innovative business models to bring about disruption in a particular industry.

Difficulty: Easy

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

36) Discuss using examples how technology is changing businesses today.

Solution: Today, every business is a technology business, and the development of technology over the last few decades has been the impetus for powerful and less-expensive growth options for companies. Sophisticated technology now allows artists to record music, build websites, crowd fund, upload music videos, create and sell merchandise, and release their own music online. No longer is a record label deal a prerequisite to success as a musical artist. Technology has forever changed the face of many businesses and industries including music, entertainment, automobiles, health care, hospitality, and retail.

Difficulty: Easy

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

37) Describe how smart phones have become the most important innovation in the technological revolution impacting businesses today.

Solution: Businesses both large and small have felt the impact of the technological revolution. On a global basis and at lightning speed, smart phones have contributed to an increased flow of ideas and improved knowledge exchange resulting in growth and productivity for both businesses and the global economy. They are the best examples of the disruptive innovation model, a theory that describes the impact an innovation has when a new market and value are created, which “disrupts” an existing market and its value. They have replaced most everyday items such as calculators, answering machines, video cameras, personal computers, watches etc.

Difficulty: Easy

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

38) Explain the concept of big data.

Solution: Big data refers to large or complex structured or unstructured sets of information that traditional processing applications are unable to analyze. It changes on an ongoing basis and can be structured or unstructured—due mainly to the many sources from which it originates. Usually large or complex data sets, traditional processing applications are usually inadequate to analyze big data. Sources of big data, to name a few, may include social media, mobile devices, online sales, and customer service feedback. Because there is so much data, it can be difficult to process with existing database and software processing capacity. However, the promise of data-driven decision making is great. When captured, formatted, manipulated, stored, analyzed, and evaluated, the data can lead a company to see trends, providing greater insight to make better, more informed decisions. Ultimately, the hope is that a company will gain new customers, increase revenues and efficiencies, and set itself apart from the competition.

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

39) Describe and illustrate the concept of business analytics.

Solution: Business analytics refers to standard tools and procedures designed to search and analyze the amount of complex data a business gathers. In an effort to deal with rising healthcare costs and to get employees to become healthier, companies are working with outside data analytic firms to mine data about employees’ use of prescription drugs and how they shop to predict their health needs and to recommend treatments. Walmart is working with Castlight Healthcare to collect and evaluate employee data to identify, for example, workers who are at risk for diabetes or those who might get sick. Using the data, the employees can be targeted with personalized messages that encourage weight-loss programs or doctor’s services.

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

Question type: Multiple Choice

40) Which of the following everyday items has been replaced by the present smart phone?

a) Answering machine

b) Printer

c) Photocopier

d) Weighing balance

Difficulty: Easy

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

41) Online retail stores such as Amazon and Blue Nile are slowly replacing brick-and-mortar stores as more people realize that online purchases save time and provide a wider choice of products. In this scenario, Amazon and Blue Nile are examples of

a) a promotional mix

b) disruptive innovations

c) guerilla marketing strategies

d) institutional advertising strategies

Difficulty: Medium

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Analytic

Bloomcode: Application

42) Which of these refer to less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders?

a) A promotional mix

b) Disruptive innovations

c) Guerilla marketing strategies

d) Institutional advertising

Difficulty: Medium

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

43) Which of the following is an example of disruptive innovation?

a) Light bulbs

b) Typewriters

c) Digital cameras

d) Cable-operated excavators

Difficulty: Easy

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Analytic

Bloomcode: Application

44) Why is Netflix considered a disruptive innovation?

a) It offers a new range of products to consumers.

b) It has more competitors.

c) It targets an entirely new customer base.

d) It has high subscription charges.

Difficulty: Hard

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Analytic

Bloomcode: Analysis

45) The term _____ refers to start-up companies worth $1 billion or more.

a) promotional mix

b) unicorn

c) disruptive innovations

d) hardware

Difficulty: Easy

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

46) Which of the following is an example of a unicorn, a company that uses innovative business models to bring about disruption in a particular industry?

a) Walmart

b) Uber

c) Netflix

d) Amazon

Difficulty: Medium

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

47) Raw facts and figures are

a) data

b) information

c) a management information system

d) a decision support system

Difficulty: Easy

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

48) _____ is knowledge gained from processing the facts and figures.

a) Data

b) Information

c) A management information system

d) A decision support system

Difficulty: Easy

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

49) A(n) _____ is an organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence.

a) data warehouse

b) information system

c) virtual network

d) firewall

Difficulty: Easy

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

50) Which of the following is true of an effective chief information officer (CIO)?

a) Not all large companies relying on information systems need a CIO.

b) He or she is closely connected to the company’s overall business strategies and marketing efforts.

c) The CIO of today is focused on installation and design of software.

d) He or she is an independent asset of a company and does not report to anyone.

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Comprehension

51) Which of these refers to large or complex structured or unstructured sets of information that traditional processing applications are unable to analyze?

a) Marketing mix

b) Big data

c) Promotional mix

d) Database

Difficulty: Easy

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

52) Which of the following is true of big data?

a) It is constantly changing.

b) It originates from one primary source.

c) It is always structured.

d) It requires traditional processing applications.

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Comprehension

53) The CEO of TalkTime, a fashion start-up, is looking to establish the company as foremost in the online retail marketplace. To do so, the CEO must use data-driven decision making to manipulate, analyze, evaluate, and format data from multiple sources such as social media, mobile devices, online sales, and customer service feedback. Which of the following would help the CEO carry out the tasks ahead?

a) Business analytics

b) Promotional mix

c) Big data

d) Marketing mix

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Application

54) Data mining is the process of

a) searching and analyzing the amount of complex data a business gathers using standard tools and procedures.

b) using computer-based technology to evaluate information in a database to identify useful trends.

c) collecting, storing, and communicating past, present, and projected information on internal

operations and external intelligence.

d) promoting an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise’s information assets.

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

55) Jasmine is a television executive whose team conducted demographic research for new programs. Jasmine will be expected to write a detailed ________ report about the impact of this study and the effect of the network’s marketing strategy.

a) data

b) groupware

c) database

d) information

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Application

56) The person who directs a company's management information systems and related computer operations is often called the

a) financial advisor

b) chief information officer

c) executive information manager

d) chief executive officer

Difficulty: Easy

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

57) A database can best be described as

a) data that has been converted into information.

b) data gathered at random from a variety of sources.

c) a centralized integrated collection of an organization's data resources.

d) a loose collection of ideas.

Difficulty: Easy

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

58) One of the largest online databases is owned by

a) IBM.

b) the U.S. Census Bureau.

c) the Federal Trade Commission (FTC).

d) Microsoft.

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

59) The purpose of a management information system can best be described by which of the following statements?

a) It assists the human resources department with research on employee benefit costs.

b) It provides management with feedback from sales meetings.

c) It is designed to produce reports for managers and others within the organization..

d) It assists the accounting department with budget information.

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

60) An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n)

a) decision support system.

b) expert system.

c) executive information system.

d) database management system.

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

61) Ron is a salesperson and is visiting one of his largest clients. Before the visit, he reviewed the client's past purchases. Ron used the company's ________ system.

a) executive information

b) decision support

c) database management

d) enterprise resource planning

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Analytic

Bloomcode: Application

62) Federico is trying to close a particularly difficult sale. He uses his PDA (personal digital assistant) and a special program to access information within his company's database on pricing. Federico is using an

a) expert system.

b) enterprise resource planning system.

c) executive support system.

d) application service provider.

Difficulty: Hard

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Analytic

Bloomcode: Application

63) Penelope, a chief executive officer, reviews the internal performance of her company's stock, as well as market trends for the industry. To access this information, Penelopeuses a(n)

a) enterprise planning resources.

b) executive support system.

c) expert system.

d) decision support system.

Difficulty: Hard

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Analytic

Bloomcode: Application

64) A computer program that imitates human thinking is a(n)

a) information interface.

b) decision support system.

c) enterprise resource planning system.

d) expert system.

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

65) Antonio works in the mortgage loan department of a bank. He enters information on credit applications into the bank's computer system. The system has a program that evaluates the loan application and gives it a score. Antonio is using a(n)

a) expert system.

b) enterprise resource planning system.

c) decision support system.

d) information interface.

Difficulty: Hard

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

66) An expert system would most likely be used to

a) retrieve sales data.

b) determine the status of a customer's order.

c) determine the optimal layout of a plant.

d) access relevant data from the company's database.

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

67) On Homex.com, homebuyers enter information about their preferred home location, price, and features. Using an ________, the website automatically displays real estate properties that match the homebuyer’s criteria.

a) executive information system

b) encryption

c) application service provider

d) expert system

Difficulty: Hard

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Analytic

Bloomcode: Application

68) Which of the following devices is NOT a computer hardware?

a) Monitor

b) Printer driver

c) Fax machine

d) Mouse

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

69) _____ is a storage device.

a) Thumb drive

b) Modem

c) CRT monitor

d) Scanner

Difficulty: Easy

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

70) The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a

a) hand held device.

b) personal computer.

c) mainframe computer.

d) midrange system.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

71) Which of the following is a reason for the increasing popularity of notebook computers?

a) More computing capacity than midrange systems

b) Limited displays

c) Faster processing speeds

d) Higher prices

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

72) Many consumers are now treating _____ as replacements for personal computers.

a) smart phones

b) tablets

c) chromebooks

d) netbooks

Difficulty: Easy

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

73) The software which controls the basic workings of the computer system is called a(n)

a) expert.

b) executive information system.

c) database.

d) operating system.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

74) Mario purchases a new game for his computer. He loads the program onto the computer's hard drive. Mario has purchased a(n)

a) output device.

b) processing device.

c) application software.

d) operating system.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Analytic

Bloomcode: Application

75) A program that performs specific tasks that the user wants to carry out is called

a) financial software.

b) the operating system.

c) an information management system.

d) application software.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

76) Which of the following is an application program?

a) Unix

b) Java

c) Microsoft Windows

d) Microsoft Excel

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

77) Javier is sitting at his computer preparing a new sales brochure. The brochure combines high-quality type, graphics, and photographs. What type of software is Javier likely using to create the brochure?

a) Word processing program

b) Desktop publishing program

c) Presentation graphics program

d) Spreadsheet program

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

78) Electronic spreadsheets

a) are special software used to create graphics

b) can replace managerial judgment in decision making

c) are used for numerical and statistical data

d) are very difficult to use

Difficulty: Easy

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

79) Sarah is sitting at her computer, analyzing the financial impact of an increase in her company's sales growth rate. Sarah is probably using a ________ program.

a) spreadsheet

b) presentation

c) word processor

d) desktop publishing

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

80) Nicholas is putting together a presentation for senior management analyzing a potential new market. He is using his computer to create charts and graphs that he will then show as slides. Which of the following software programs is Nicholas most likely using?

a) Microsoft Word

b) Microsoft Excel

c) Microsoft Windows

d) Microsoft PowerPoint

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

81) Salma would like her company to fund a worthwhile project and has accumulated valuable charts and graphs on market shares, territories, and projected sales. In order to achieve maximum impact, Salma should communicate her information to the company’s senior executives using a

a) staging software.

b) desktop publishing.

c) presentation software.

d) production software.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

82) Which of these tie geographical regions together using long-distance telephone lines or satellite transmissions?

a) Local area networks

b) Executive information systems

c) Database systems

d) Wide area networks

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

83) All Walmart stores have satellite dishes that link stores together with the company's headquarters. Walmart is using a(n)

a) wide area network.

b) enterprise resource system.

c) expert system.

d) local area network.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Application

84) Juanita is on a business trip. From her hotel, she uses her computer to access her company's network, checking her e-mail and calendar. Juanita’s company has a(n)

a) internet.

b) botnet.

c) intranet.

d) extranet.

Difficulty: Easy

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

85) What is the primary role of the Internet Corporation for Assigned Names and Numbers (ICANN)?

a) To provide data storage and management services to other companies

b) To analyze knowledge management using the Internet

c) To preserve the operational stability of the Internet

d) To enable sharing and exchange of virtual information

Difficulty: Easy

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

86) Which of the following statements is true about intranets?

a) Intranets require a Windows operation system.

b) Intranets can be accessed by anyone with an Internet connection.

c) Intranets provide secure connections between two points on the Internet.

d) Intranets allow information sharing within a company network.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

87) Denzel’s company has installed a system to make data transmission secure. Therefore, he can use the Internet to send and receive sensitive data. Denzel’s company has installed a(n)

a) virtual private network.

b) wide area network.

c) intranet.

d) extranet.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

88) William purchased a company and discovered that his employees were using different operating systems. Instead of spending considerable time and expense getting everyone on the same system, William established a(n) ________ to create company bulletin boards, share documents, and conduct online conference.

a) extranet

b) intranet

c) botnet

d) Internet

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

89) Which of the following is true of a virtual network?

a) It only consists of links that are physical connections.

b) It reduces the cost of maintaining costly hardware and software.

c) It can integrate computers running all kinds of operating systems.

d) It nurtures innovation and the development of creative ideas.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

90) A program that attaches itself to other programs and changes programs or destroys data is a(n)

a) computer virus

b) purge program

c) inoculation program

d) operational program

Difficulty: Medium

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

91) Kandyse belongs to several online card clubs. When she downloaded a recommended bridge game, she unknowingly received a ________, which ultimately damaged the hard drive on her computer.

a) cloud program

b) software application

c) Trojan horse

d) network firewall

Difficulty: Medium

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

92) Gavin downloaded some company information into a spreadsheet so that he could work on it at home. When he returned to work, he inserted his memory card into his company computer. Within minutes, all of his hard drive files were corrupted. The most likely cause of this was a(n)

a) malfunctioning computer.

b) intranet failure.

c) computer virus.

d) bad operating system.

Difficulty: Medium

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

93) Deciding how to prevent system failures along with the ability to continue operations if computer systems fail is called

a) disaster recovery planning.

b) information systems management.

c) advanced computer security.

d) virus protection.

Difficulty: Easy

Learning Objective 1: 14.7

Section Reference 1: Explain disaster recovery and backup systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

94) Why is it essential for organizations to keep an off-site data backup in a separate physical or virtual location?

a) Keeping multiple backup locations reduces the time required for the initial backup.

b) A single data backup location is vulnerable to threats from both natural and human-caused disasters.

c) Multiple data backup locations is the most cost-effective method of managing important organizational data.

d) Federal law requires all organizations, large or small, to have more than one data backup location.

Difficulty: Medium

Learning Objective 1: 14.7

Section Reference 1: Explain disaster recovery and backup systems.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

95) Tammin’s office in south Florida was destroyed by a hurricane last year, and she lost numerous company documents. After relocating, Tammin took no chances and implemented ________, in which she backed up her data in a secure online storage service.

a) enterprise resource planning

b) firewall

c) encryption

d) disaster recovery planning

Difficulty: Medium

Learning Objective 1: 14.7

Section Reference 1: Explain disaster recovery and backup systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

96) An outside supplier used for providing computer and program support for managing an information system is known as

a) an application service provider.

b) an application maintenance provider.

c) utility maintenance provider.

d) on-demand service provider.

Difficulty: Medium

Learning Objective 1: 14.8

Section Reference 1: Discuss information technology trends.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

97) Marius, a software engineer at Frensen Inc. needs to develop high-quality graphic illustrations for presentation at his next team meeting. In the context of application software, he must use _____ software to accomplish this.

a) desktop publishing

b) spreadsheet

c) database

d) word processing

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Analytic

Bloomcode: Application

98) Musetta, a computer science student at Grand University, purchases a new computer for her software programming needs. She must install _____ on her computer to make it work.

a) Linux

b) Adobe InDesign

c) Intuit QuickBooks

d) Quicken

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Analytic

Bloomcode: Application

99) Trevor, an information technology manager at Baron Inc. needs intranet in the new building that the company has purchased. Instead of spending money on wired network, Trevor decides that he will use a wireless intranet service. He needs intranet around 300-feet radius. Trevor can provide wireless intranet using _____ in the building.

a) botnet

b) Wi-Fi

c) Wi-Max

d) VoiP

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Analytic

Bloomcode: Application

100) Raxstock.com, an online retailer, desires to find shopping trends of its customers to make advertising campaigns more effective. Therefore, it uses a special type of program that works through the Internet and gathers this information secretly from customer’s browsing history. In the context of security and ethical issues affecting information systems, Raxstock.com is using a

a) worm.

b) botnet.

c) spyware.

d) bug.

Difficulty: Medium

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Analytic

Bloomcode: Application

101) Elena works as a software engineer at Teloxel Ltd., a medium-sized company. While evaluating her company’s information systems infrastructure, she finds that the current systems do not have the ability to process the company’s growing information and data infrastructure. Elena plans to suggest the use of powerful servers that will store applications, software, and databases for all employees to access via the web using either a laptop or a smart phone. Which of the following is Elena most likely to suggest?

a) on-demand computing

b) distributed computing

c) grid computing

d) cloud computing

Difficulty: Medium

Learning Objective 1: 14.8

Section Reference 1: Discuss information technology trends.

Standard 1: AACSB || Analytic

Bloomcode: Application

102) Which of the following is true of enterprise computing?

a) It is an alternative to traditional telecommunication services.

b) It allows networking of a single type of hardware.

c) It disrupts data flow in an organization.

d) It allows an organization to integrate different types of networks.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Analytic

Bloomcode: Comprehension

103) Which of the following involves the process of identifying, capturing, evaluating, retrieving, and sharing all of a company’s databases, documents, policies, procedures, and previously un-captured expertise and experience of individual workers?

a) Business analytics

b) Data mining

c) Knowledge management

d) Enterprise computing

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

104) Microsoft Azure is an example of

a) grid computing.

b) a virtual network.

c) a disruptive innovation.

d) artificial intelligence .

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Analytic

Bloomcode: Application

105) Siri, the personal virtual assistant for the iOS platform, helps users find information using voice recognition. This application not only finds information but also relays information from the user’s phone and sends commands to other applications. Siri is an example of

a) artificial intelligence.

b) cloud computing.

c) computer hardware.

d) virtual network.

Difficulty: Medium

Learning Objective 1: 14.8

Section Reference 1: Discuss information technology trends.

Standard 1: AACSB || Analytic

Bloomcode: Application

106) The _____ is a web-connected ecosystem of everyday objects with network connectivity, including TVs, cars, household appliances, and wearable tech devices.

a) disruptive innovation model

b) world wide web

c) Internet of things

d) expert system

Difficulty: Medium

Learning Objective 1: 14.8

Section Reference 1: Discuss information technology trends.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

Question type: True/False

107) Disruptive innovations refer to less-expensive and simpler versions of existing pro ducts and services that target entirely new customers, many times replacing industry leaders.

Difficulty: Easy

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

108) The term big data refers to start-up companies worth $1 billion or more.

Difficulty: Easy

Learning Objective 1: 14.1

Section Reference 1: Outline the ways technology has forever changed business.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

109) Data alone are of limited value to a company.

Difficulty: Easy

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

110) A virtual network is an organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence.

Difficulty: Easy

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

111) An example of data are sales figures.

Difficulty: Medium

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

112) Data is the result of processed information.

Difficulty: Easy

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

113) Business analytics refers to standard tools and procedures designed to search and analyze the amount of complex data a business gathers.

Difficulty: Easy

Learning Objective 1: 14.2

Section Reference 1: Distinguish between data and information, and discuss information systems and the role of big data.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

114) The software is the heart of a management information system.

Difficulty: Easy

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

115) Operational support systems are different from transaction processing systems.

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Analytic

Bloomcode: Knowledge

116) Decision support systems provide support to people making business decisions.

­­

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

117) Executive support systems are computer programs that imitate human thinking through complicated sets of “if-then” rules.

Difficulty: Easy

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

118) Operational support systems are the information systems that are designed to provide support for effective decision making.

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

119) An expert system is a computer program that imitates human thinking.

Difficulty: Easy

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

120) Credit card applications are often evaluated using executive systems.

Difficulty: Medium

Learning Objective 1: 14.3

Section Reference 1: List the components and types of information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

121) DVD drives and monitors are examples of computer input devices.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

122) An especially powerful midrange computer is called a supercomputer.

Difficulty: Easy

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

123) Mainframe computers have more storage capacity and are faster than personal computers.

Difficulty: Easy

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

124) In addition to making and receiving calls and text messages, smart phones allow users to surf the Internet, receive and send e-mail, check their schedules, and open and edit documents.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

125) Interestingly, desktop computers are still sold more than notebook computers.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

126) Application software controls the basic workings of a computer system.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

127) Adobe Acrobat is an example of a decision-support system.

Difficulty: Medium

Learning Objective 1: 14.4

Section Reference 1: Discuss computer hardware and software.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

128) Local area networks allow computers to share the same printers, documents, and information.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

129) A familiar example of wide area networks is long-distance telephone service.

Difficulty: Easy

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

130) In the context of wireless local networks, there are only a select number of hot spots in public locations today.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

131) An intranet links a company to its suppliers and customers.

Difficulty: Easy

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

132) A firewall scrambles data and makes it difficult for unauthorized users to view the data.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

133) An intranet blocks outsiders without valid passwords from entering its network by incorporating both software and hardware.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

134) A virtual private network provides secure communication connections between two points on the Internet.

Difficulty: Easy

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

135) Virtual private networks are more expensive to install than wide area networks.

Difficulty: Medium

Learning Objective 1: 14.5

Section Reference 1: Describe computer networks, cloud computing, and the future of the Internet.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

136) In the context of security and ethical issues affecting information system, theft of equipment is a type of malware.

Difficulty: Easy

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

137) A virus can remain dormant for a period of time on a computer.

Difficulty: Medium

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

138) Unlike viruses, worms don’t need host programs to damage computer systems.

Difficulty: Medium

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Technology

Bloomcode: Comprehension

139) A handful of users click on a link that reads “free unlimited Tetris game” to reveal a blank screen. They later find that information on their hard drive was also erased. The page that falsely advertised a free game is an example of a Trojan horse.

Difficulty: Easy

Learning Objective 1: 14.6

Section Reference 1: Outline the security, ethical, and privacy issues affecting information systems.

Standard 1: AACSB || Analytic

Bloomcode: Application

140) Cloud-computing services often make off-site backup more complicated.

Difficulty: Medium

Learning Objective 1: 14.7

Section Reference 1: Explain disaster recovery and backup systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

141) One basic form of disaster prevention is routinely backing up software and data.

Difficulty: Medium

Learning Objective 1: 14.7

Section Reference 1: Explain disaster recovery and backup systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

142) On-site data backup involves storing software and data in a separate physical location or online on the Internet.

Difficulty: Medium

Learning Objective 1: 14.7

Section Reference 1: Explain disaster recovery and backup systems.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

143) Cloud computing allows users to access software and databases via an intranet.

Difficulty: Medium

Learning Objective 1: 14.8

Section Reference 1: Discuss information technology trends.

Standard 1: AACSB || Technology

Bloomcode: Knowledge

Document Information

Document Type:
DOCX
Chapter Number:
14
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 14 Using Technology To Manage Information
Author:
Louis E. Boone

Connected Book

Contemporary Business 18e | Test Bank by Louis E. Boone

By Louis E. Boone

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party