Using Technology To Manage | Test Questions & Answers Ch.11 - Contemporary Business 19e | Practice Test Bank by Louis E. Boone. DOCX document preview.
Package Title: Chapter 11, Testbank
Course Title: Boone, Contemporary Business, 19th Edition
Chapter Number: 11
Question type: Multiple Choice
1) The purpose of a(n) _____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
a) firewall
b) application service provider
c) virtual private network
d) botnet
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
2) A secure connection between two points on the Internet is known as a(n) _____.
a) firewall
b) virtual private network
c) intranet
d) local area network
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
3) A company network that links employees via Internet tools is called a(n) _____.
a) virtual private network
b) intranet
c) local area network
d) information system
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
4) _____ is causing revolutionary growth across businesses and industries.
a) Knowledge management
b) Data
c) Information technology
d) Disruptive innovations
Difficulty: Easy
Learning Objective 1: 11-08: Discuss information technology trends.
Section Reference 1: Information Technology Trends
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
5) Malicious software programs such as worms, viruses, and Trojan horses designed to infect computer systems are known as _____.
a) malware
b) spyware
c) botnet
d) unicorns
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
6) _____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
a) Virtual private network
b) Wi-Fi
c) Intranet
d) Local area network
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
7) A computer network that connects machines within a limited area is called a(n) _____.
a) virtual private network
b) intranet
c) local area network
d) information system
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
8) A centralized integrated collection of data resources is known as a(n) _____.
a) intranet
b) local area network
c) database
d) information system
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
9) _____ consist of raw facts and figures that may or may not be relevant to business decisions.
a) Knowledge management
b) Decision support system
c) Data
d) Executive support system
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
10) _____ is a discipline that promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise’s information assets.
a) Knowledge management
b) Decision support system
c) Intranet
\
d) Cloud computing
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
11) A(n) _____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
a) application service provider
b) intranet
c) digital workforce
d) expert system
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
12) A(n) _____ is an executive responsible for managing a company's information system and related computer technologies.
a) CIO
b) application service provider
c) digital manager
d) CFO
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
13) A(n) _____ is an information system that provides direct assistance to businesspeople to make decisions and choose courses of action.
a) decision support system
b) expert system
c) executive support system
d) information system
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
14) _____ provides access to applications software and databases for users to access via the Web with proper passcodes.
a) Application service provider
b) Virtual private network
c) Intranet
d) Cloud computing
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
15) A(n) _____ is a computer program that imitates human thinking through complicated sets of if-then rules.
a) knowledge management
b) decision support system
c) expert system
d) executive support system
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
16) A system that allows top managers to access a company's primary databases is called a(n) _____.
a) knowledge management
b) decision support system
c) expert system
d) executive support system
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
17) _____ software secretly gathers user information through the user's Internet connection without the user's knowledge.
a) Firewall
b) Malware
c) Spyware
d) Botnet
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
18) A(n) _____ is a network of PCs that have been infected with one or more data-stealing viruses.
a) firewall
b) malware
c) spyware
d) botnet
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
19) The _____ of a company is an organized method for collecting, storing, and communicating past, present, and projected data on internal operations and external intelligence.
a) decision support system
b) expert system
b) executive support system
d) information system
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
20) Less expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders, are known as _____.
a) knowledge managers
b) botnets
c) disruptive innovations
d) unicorns
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
21) Wikipedia and other online sources replacing traditional print encyclopedias are examples of _____.
a) knowledge management
b) botnetb
c) disruptive innovations
d) unicorns
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
22) The term _____ refers to startup companies worth $1 billion or more.
a) CIO
b) digital workforce
c) disruptive innovations
d) unicorns
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
23) Uber and Airbnb, worth billions of dollars each, are examples of companies referred to as _____, which use innovative business models to bring about disruption in a particular industry.
a) knowledge managers
b) digital workforce
c) disruptive innovations
d) unicorns
Difficulty: Medium
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
24) Which of the following everyday items has been replaced by the present smart phone?
a) Answering machine
b) Printer
c) Photocopier
d) Weighing balance
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Comprehension
25) Online retail stores such as Amazon and Blue Nile are slowly replacing brick-and-mortar stores as more people realize that online purchases save time and provide a wider choice of products. In this scenario, Amazon and Blue Nile are examples of _____.
a) a promotional mix
b) disruptive innovations
c) guerilla marketing strategies
d) institutional advertising strategies
Difficulty: Medium
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
26) Which of these refer to less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders?
a) A promotional mix
b) Disruptive innovations
c) Guerilla marketing strategies
d) Institutional advertising
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
27) Which of the following is an example of disruptive innovation?
a) Light bulbs
b) Typewriters
c) Digital cameras
d) Cable-operated excavators
Difficulty: Medium
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
28) Why is Netflix considered a disruptive innovation?
a) It offers a new range of products to consumers.
b) It has more competitors.
c) It targets an entirely new customer base.
d) It has high subscription charges.
Difficulty: Medium
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
29) The term _____ refers to start-up companies worth $1 billion or more.
a) promotional mix
b) unicorn
c) disruptive innovations
d) hardware
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
30) Which of the following is an example of a unicorn, a company that uses innovative business models to bring about disruption in a particular industry?
a) Walmart
b) Uber
c) Netflix
d) Amazon
Difficulty: Medium
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
31) Raw facts and figures are _____.
a) data
b) information
c) a management information system
d) a decision support system
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
32) _____ is knowledge gained from processing facts and figures.
a) Data
b) Information
c) A management information system
d) A decision support system
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
33) A(n) _____ is an organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence.
a) data warehouse
b) information system
c) virtual network
d) firewall
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
34) Which of the following is true of an effective chief information officer (CIO)?
a) Not all large companies relying on information systems need a CIO.
b) He or she is closely connected to the company’s overall business strategies and marketing efforts.
c) The CIO of today is focused on installation and design of software.
d) He or she is an independent asset of a company and does not report to anyone.
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Comprehension
35) Which of these refers to large or complex structured or unstructured sets of information that traditional processing applications are unable to analyze?
a) Marketing mix
b) Big data
c) Promotional mix
d) Database
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
36) Which of the following is true of big data?
a) It is constantly changing.
b) It originates from one primary source.
c) It is always structured.
d) It requires traditional processing applications.
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Comprehension
37) The CEO of TalkTime, a fashion start-up, is looking to establish the company as foremost in the online retail marketplace. To do so, the CEO must use data-driven decision making to manipulate, analyze, evaluate, and format data from multiple sources such as social media, mobile devices, online sales, and customer service feedback. Which of the following would help the CEO carry out the tasks ahead?
a) Business analytics
b) Promotional mix
c) Big data
d) Marketing mix
Difficulty: Medium
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
38) Data mining is the process of _____.
a) searching and analyzing the amount of complex data a business gathers using standard tools and procedures
b) using computer-based technology to evaluate information in a database to identify useful trends
c) collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence
d) promoting an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise’s information assets
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Comprehension
39) Jasmine is a television executive whose team conducted demographic research for new programs. Jasmine will be expected to write a detailed ________ report about the impact of this study and the effect of the network’s marketing strategy.
a) data
b) groupware
c) database
d) information
Difficulty: Medium
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
40) The person who directs a company's management information systems and related computer operations is often called the _____.
a) financial advisor
b) chief information officer
c) executive information manager
d) chief executive officer
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
41) A database can best be described as _____.
a) data that has been converted into information
b) data gathered at random from a variety of sources
c) a centralized integrated collection of an organization's data resources
d) a loose collection of ideas
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
42) One of the largest online databases is owned by _____.
a) IBM
b) the U.S. Census Bureau
c) the Federal Trade Commission (FTC)
d) Microsoft
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
43) The purpose of a management information system can best be described by which of the following statements?
a) It assists the human resources department with research on employee benefit costs.
b) It provides management with feedback from sales meetings.
c) It is designed to produce reports for managers and others within the organization.
d) It assists the accounting department with budget information.
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Comprehension
44) An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n) _____.
a) decision support system
b) expert system
c) executive information system
d) database management system
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
45) Ron is a salesperson and is visiting one of his largest clients. Before the visit, he reviewed the client's past purchases. Ron used the company's ________ system.
a) executive information
b) management information system
c) database management
d) enterprise resource planning
Difficulty: Medium
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
46) Federico, the VP of sales, is trying to close a particularly difficult sale. He uses his laptop and a special program to access information within his company's database on pricing. Federico is using an _____.
a) expert system
b) enterprise resource planning system
c) executive support system
d) application service provider
Difficulty: Medium
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
47) Penelope, a chief executive officer, reviews the internal performance of her company's stock, as well as market trends for the industry. To access this information, Penelope uses a(n) _____.
a) enterprise planning resources
b) executive support system
c) expert system
d) decision support system
Difficulty: Medium
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
48) A computer program that imitates human thinking is a(n) _____.
a) information interface
b) decision support system
c) enterprise resource planning system
d) expert system
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
49) Antonio works in the mortgage loan department of a bank. He enters information on credit applications into the bank's computer system. The system has a program that evaluates the loan application and gives it a score. Antonio is using a(n) _____.
a) expert system
b) enterprise resource planning system
c) decision support system
d) information interface
Difficulty: Medium
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
50) An expert system would most likely be used to _____.
a) retrieve sales data
b) determine the status of a customer's order
c) determine the optimal layout of a plant
d) access relevant data from the company's database
Difficulty: Medium
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
51) On Homex.com, homebuyers enter information about their preferred home location, price, and features. Using a(n) ________, the website automatically displays real estate properties that match the homebuyer’s criteria.
a) executive information system
b) encryption
c) application service provider
d) expert system
Difficulty: Medium
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
52) Which of the following devices is NOT a computer hardware?
a) Monitor
b) Printer
c) MS Word
d) Mouse
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
53) A _____ is a storage device.
a) thumb drive
b) modem
c) CRT monitor
d) scanner
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
54) The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a _____.
a) hand held device
b) personal computer
c) mainframe computer
d) midrange system
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
55) Which of the following is a reason for the increasing popularity of notebook computers?
a) More computing capacity than midrange systems
b) Limited displays
c) Faster processing speeds
d) Higher prices
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
56) Many consumers are now treating _____ as replacements for personal computers.
a) smart phones
b) tablets
c) chromebooks
d) netbooks
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
57) The software which controls the basic workings of the computer system is called a(n) _____.
a) expert
b) executive information system
c) database
d) operating system
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
58) Mario purchases a new game for his computer. He loads the program onto the computer's hard drive. Mario has purchased a(n) _____.
a) output device
b) processing device
c) application software
d) operating system
Difficulty: Medium
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
59) A program that performs specific tasks that the user wants to carry out is called _____.
a) financial software
b) the operating system
c) an information management system
d) application software
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
60) Which of the following is application software?
a) Unix
b) Java
c) Microsoft Windows
d) Microsoft Excel
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
61) Javier is sitting at his computer preparing a new sales brochure. What is Javier using to create the brochure?
a) Output device
b) Processing device
c) Application software
d) Operating system
Difficulty: Medium
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
62) Electronic spreadsheets _____.
a) are a type of special software
b) can replace managerial judgment in decision making
c) are a form of hardware
d) are very difficult to use
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
63) Sarah is sitting at her computer, analyzing the financial impact of an increase in her company's sales growth rate. Sarah is probably using a ________ program.
a) operating
b) software
c) mainframe
d) hardware
Difficulty: Medium
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
64) Nicholas is putting together a presentation for senior management analyzing a potential new market. He is using his computer to create charts and graphs that he will then show as slides. Which of the following is Nicholas using?
a) Operating system
b) Hardware program
c) Software program
d) Mainframe program
Difficulty: Medium
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
65) Salma would like her company to fund a worthwhile project and has accumulated valuable charts and graphs on market shares, territories, and projected sales. In order to achieve maximum impact, Salma created her information using _____.
a) software
b) hardware
c) a mainframe program
d) an operating system
Difficulty: Medium
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
66) Which of these tie geographical regions together using long-distance telephone lines or satellite transmissions?
a) Local area networks
b) Executive information systems
c) Database systems
d) Wide area networks
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
67) All Walmart stores have satellite dishes that link stores together with the company's headquarters. Walmart is using a(n) _____.
a) wide area network
b) enterprise resource system
c) expert system
d) local area network
Difficulty: Medium
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
68) Juanita is on a business trip. From her hotel, she uses her computer to access her company's network, checking her e-mail and calendar. Juanita’s company has a(n) _____.
a) Internet
b) botnet
c) intranet
d) extranet
Difficulty: Medium
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Tehcnology
Standard 2: Bloom’s || Application
69) What is the primary role of the Internet Corporation for Assigned Names and Numbers (ICANN)?
a) To provide data storage and management services to other companies
b) To analyze knowledge management using the Internet
c) To preserve the operational stability of the Internet
d) To enable sharing and exchange of virtual information
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
70) Which of the following statements is true about intranets?
a) Intranets require a Windows operation system.
b) Intranets can be accessed by anyone with an Internet connection.
c) Intranets provide secure connections between two points on the Internet.
d) Intranets allow information sharing within a company network.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
71) Denzel’s company has installed a system to make data transmission secure. Therefore, he can use the Internet to send and receive sensitive data. Denzel’s company has installed a(n) _____.
a) virtual private network
b) wide area network
c) intranet
d) extranet
Difficulty: Medium
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
72) William purchased a company and discovered that his employees were using different operating systems. Instead of spending considerable time and expense getting everyone on the same system, William established a(n) ________ to create company bulletin boards, share documents, and conduct online conferences.
a) extranet
b) intranet
c) botnet
d) Internet
Difficulty: Medium
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
73) Which of the following is true of a virtual network?
a) It only consists of links that are physical connections.
b) It reduces the cost of maintaining costly hardware and software.
c) It can integrate computers running all kinds of operating systems.
d) It nurtures innovation and the development of creative ideas.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
74) A program that attaches itself to other programs and changes programs or destroys data is a(n) _____.
a) computer virus
b) purge program
c) inoculation program
d) operational program
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
75) Kandyse belongs to several online card clubs. When she downloaded a recommended bridge game, she unknowingly received a ________, which ultimately damaged the hard drive on her computer.
a) cloud program
b) software application
c) Trojan horse
d) network firewall
Difficulty: Medium
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
76) Gavin downloaded some company information into a spreadsheet so that he could work on it at home. When he returned to work, he inserted his memory card into his company computer. Within minutes, all of his hard drive files were corrupted. The most likely cause of this was a(n) _____.
a) malfunctioning computer
b) intranet failure
c) computer virus
d) bad operating system
Difficulty: Medium
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
77) Deciding how to prevent system failures along with the ability to continue operations if computer systems fail is called _____.
a) disaster recovery planning
b) information systems management
c) advanced computer security
d) virus protection
Difficulty: Easy
Learning Objective 1: 11-07: Explain disaster recovery and backup systems.
Section Reference 1: Disaster Recovery and Backup
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
78) Why is it essential for organizations to keep an off-site data backup in a separate physical or virtual location?
a) Keeping multiple backup locations reduces the time required for the initial backup.
b) A single data backup location is vulnerable to threats from both natural and human-caused disasters.
c) Multiple data backup locations is the most cost-effective method of managing important organizational data.
d) Federal law requires all organizations, large or small, to have more than one data backup location.
Difficulty: Easy
Learning Objective 1: 11-07: Explain disaster recovery and backup systems.
Section Reference 1: Disaster Recovery and Backup
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
79) Tammin’s office in south Florida was destroyed by a hurricane last year, and she lost numerous company documents. After relocating, Tammin took no chances and implemented a(n) ________, in which she backed up her data in a secure online storage service.
a) enterprise resource planning
b) firewall
c) encryption
d) disaster recovery planning
Difficulty: Medium
Learning Objective 1: 11-07: Explain disaster recovery and backup systems.
Section Reference 1: Disaster Recovery and Backup
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
80) An outside supplier used for providing computer and program support for managing an information system is known as _____.
a) an application service provider
b) an application maintenance provider
c) utility maintenance provider
d) on-demand service provider
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
81) Marius, a software engineer at Frensen Inc. needs to develop a presentation for delivery at his next team meeting. In the context of application software, he must use _____ software to accomplish this.
a) presentation
b) spreadsheet
c) database
d) word processing
Difficulty: Medium
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
82) Musetta, a computer science student at Grand University, purchases a new computer for her software programming needs. She must install _____ on her computer to make it work.
a) Linux
b) Adobe InDesign
c) Intuit QuickBooks
d) Quicken
Difficulty: Medium
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
83) Trevor, an information technology manager at Baron Inc. needs intranet in the new building that the company has purchased. Instead of spending money on a wired network, Trevor decides that he will use a wireless intranet service. He needs intranet with around 300-feet radius. Trevor can provide wireless intranet using _____ in the building.
a) botnet
b) Wi-Fi
c) Wi-Max
d) VoiP
Difficulty: Medium
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
84) Raxstock.com, an online retailer, desires to find shopping trends of its customers to make advertising campaigns more effective. Therefore, it uses a special type of program that works through the Internet and gathers this information secretly from customer’s browsing history. In the context of security and ethical issues affecting information systems, Raxstock.com is using a _____.
a) worm
b) botnet
c) spyware
d) bug
Difficulty: Medium
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
85) Elena works as a software engineer at Teloxel Ltd., a medium-sized company. While evaluating her company’s information systems infrastructure, she finds that the current systems do not have the ability to process the company’s growing information and data infrastructure. Elena plans to suggest the use of powerful servers that will store applications, software, and databases for all employees to access via the web using either a laptop or a smart phone. Which of the following is Elena most likely to suggest?
a) On-demand computing
b) Distributed computing
c) Grid computing
d) Cloud computing
Difficulty: Medium
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
86) Which of the following is true of enterprise computing?
a) It is an alternative to traditional telecommunication services.
b) It allows networking of a single type of hardware.
c) It disrupts data flow in an organization.
d) It allows an organization to integrate different types of networks.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
87) Which of the following involves the process of identifying, capturing, evaluating, retrieving, and sharing all of a company’s databases, documents, policies, procedures, and previously un-captured expertise and experience of individual workers?
a) Business analytics
b) Data mining
c) Knowledge management
d) Enterprise computing
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
88) All troubleshooting can be performed on remote machines from a single location if a company has a(n) _____.
a) grid computing
b) virtual network
c) disruptive innovation
d) artificial intelligence
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
89) Siri, the personal virtual assistant for the iOS platform, helps users find information using voice recognition. This application not only finds information but also relays information from the user’s phone and sends commands to other applications. Siri is an example of _____.
a) artificial intelligence
b) cloud computing
c) computer hardware
d) virtual network
Difficulty: Medium
Learning Objective 1: 11-08: Discuss information technology trends.
Section Reference 1: Information Technology Trends
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
90) The _____ is a web-connected ecosystem of everyday objects with network connectivity, including TVs, cars, household appliances, and wearable tech devices.
a) disruptive innovation model
b) world wide web
c) Internet of things
d) expert system
Difficulty: Easy
Learning Objective 1: 11-08: Discuss information technology trends.
Section Reference 1: Information Technology Trends
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
Question type: True/False
91) Disruptive innovations refer to less-expensive and simpler versions of existing pro ducts and services that target entirely new customers, many times replacing industry leaders.
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
92) The term big data refers to start-up companies worth $1 billion or more.
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
93) Data alone are of limited value to a company.
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
94) A virtual network is an organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence.
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
95) An example of data are sales figures.
Difficulty: Medium
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Application
96) Data is the result of processed information.
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
97) Business analytics refers to standard tools and procedures designed to search and analyze the amount of complex data a business gathers.
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
98) The software is the heart of a management information system.
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
99) Operational support systems are different from transaction processing systems.
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Knowledge
100) Decision support systems provide support to people making business decisions.
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
101) Executive support systems are computer programs that imitate human thinking through complicated sets of “if-then” rules.
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
102) Operational support systems are the information systems that are designed to provide support for effective decision making.
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
103) An expert system is a computer program that imitates human thinking.
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
104) Credit card applications are often evaluated using executive systems.
Difficulty: Medium
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
105) Computer monitors are examples of computer input devices.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
106) An especially powerful midrange computer is called a mainframe computer.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
107) Mainframe computers have more storage capacity and are faster than personal computers.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
108) As artificial intelligence matures, thanks to a machine learning chip, a new wave of demand is anticipated for AI smart phones.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
109) Interestingly, desktop computers are still sold more than notebook computers.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
110) Application software controls the basic workings of a computer system.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
111) Adobe Acrobat is an example of hardware.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
112) Local area networks allow computers to share the same printers, documents, and information.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
113) A familiar example of wide area networks is long-distance telephone service.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
114) In the context of wireless local networks, there are only a select number of hot spots in public locations today.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
115) An intranet links a company to its suppliers and customers.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
116) A firewall scrambles data and makes it difficult for unauthorized users to view the data.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
117) An intranet blocks outsiders without valid passwords from entering its network by incorporating both software and hardware.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
118) A virtual private network provides secure communication connections between two points on the Internet.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
119) Virtual private networks are more expensive to install than wide area networks.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
120) In the context of security and ethical issues affecting information system, theft of equipment is a type of malware.
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
121) A virus can remain dormant for a period of time on a computer.
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
122) Viruses don’t need host programs to damage computer systems.
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
123) A handful of users click on a link that reads “free unlimited Tetris game” to reveal a blank screen. They later find that information on their hard drive was also erased. The page that falsely advertised a free game is an example of a Trojan horse.
Difficulty: Medium
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Application
124) Cloud-computing services often make off-site backup more complicated.
Difficulty: Easy
Learning Objective 1: 11-07: Explain disaster recovery and backup systems.
Section Reference 1: Disaster Recovery and Backup
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
125) One basic form of disaster prevention is routinely backing up software and data.
Difficulty: Easy
Learning Objective 1: 11-07: Explain disaster recovery and backup systems.
Section Reference 1: Disaster Recovery and Backup
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
126) On-site data backup involves storing software and data in a separate physical location or online on the Internet.
Difficulty: Easy
Learning Objective 1: 11-07: Explain disaster recovery and backup systems.
Section Reference 1: Disaster Recovery and Backup
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
127) Cloud computing allows users to access software and databases via an intranet.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
Question type: Essay
128) Differentiate between data and information.
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Analytic
Standard 2: Bloom’s || Comprehension
129) Define databases and describe how they are obtained and their uses.
Difficulty: Easy
Learning Objective 1: 11-03: List components and types of information systems.
Section Reference 1: Components and Types of Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
130) Differentiate between hardware and software. Give examples of both.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
131) Discuss the responsibilities of a computer systems analyst.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
132) Identify and briefly explain the types of computer software.
Difficulty: Easy
Learning Objective 1: 11-04: Discuss computer hardware and software.
Section Reference 1: Computer Hardware and Software
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
133) Describe a wide area network and explain how companies use it.
Difficulty: Easy
Learning Objective 1: 11-05: Describe computer networks, cloud computing, and the future of the Internet.
Section Reference 1: Networks, the Internet, and Cloud Computing
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
134) Explain at least two ways in which common cybercrimes occur.
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
135) Explain the difference between a virus and a Trojan horse.
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
136) Offer examples of ethical concerns surrounding information technology and information systems.
Difficulty: Easy
Learning Objective 1: 11-06: Outline the security, ethical, and privacy issues affecting information systems.
Section Reference 1: Security and Ethical Issues Affecting Information Systems
Standard 1: AACSB || Ethics
Standard 2: Bloom’s || Comprehension
137) Identify the five important tasks for off-site data storage.
Difficulty: Easy
Learning Objective 1: 11-07: Explain disaster recovery and backup systems.
Section Reference 1: Disaster Recovery and Backup
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
138) What information technology trends currently exist?.
Difficulty: Easy
Learning Objective 1: 11-08: Discuss information technology trends.
Section Reference 1: Information Technology Trends
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
139) Explain the concept of disruptive innovations using examples.
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
140) Discuss using examples how technology is changing businesses today.
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Knowledge
141) Describe how smart phones have become the most important innovation in the technological revolution impacting businesses today.
Difficulty: Easy
Learning Objective 1: 11-01: Outline the ways technology has forever changed business.
Section Reference 1: Technology Has Forever Changed Business
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
142) Explain the concept of big data.
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
143) Describe and illustrate the concept of business analytics.
Difficulty: Easy
Learning Objective 1: 11-02: Distinguish between data and information, and discuss information systems and the role of big data.
Section Reference 1: Data, Information Systems, and Big Data
Standard 1: AACSB || Technology
Standard 2: Bloom’s || Comprehension
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Chapter 9 Empowerment, Teams, Communication
DOCX Ch. 9
Chapter 10 Production And Operations Management 255
DOCX Ch. 10
Chapter 11 Using Technology To Manage Information 282
DOCX Ch. 11 Current
Chapter 12 Customer-driven Marketing 310
DOCX Ch. 12
Chapter 13 Product And Distribution Strategies 340
DOCX Ch. 13