Kinh doanh quốc tế - CKD 6/1
Thứ Sáu, 19 tháng 10, 2012
Giao nhận
Bước 1 : Nhận và xử lí thông tin khách hàng đăng ký dịch vụ:
Sau khi nhận được thông tin từ khách hàng thì nhân viên kinh doanh sẽ tiếp nhận từ khách hàng những thông tin như sau:
* Loại hàng: Căn cứ vào loại hàng, số lượng hàng mà công ty sẽ tư vấn cho khách hàng loại container phù hợp ( nếu hàng tươi sống , rau quả tươi sẽ chọn cont lạnh:20’RF,40’RH tùy vào số lượng hàng; hàng bách hóa hoặc nông sản thì chọn cont khô: 20’DC, 40’DC hoặc 40’HC “đối với hàng cồng kềnh”).Cũng như các quy định của nước nhập khẩu về mặt hàng đó.
Ví dụ như: hàng thực phẩm thì phải có giấy kiểm dịch vệ sinh an toàn thực phẩm, hàng gỗ thì phải khử trùng….
* Cảng đi, cảng đến: Đây là yếu tố quyết định giá cước vận chuyển vì khoảng cách vận chuyển càng gần, thời gian vận chuyển càng ngắn thì cước phí càng thấp và ngược lại.
* Hãng tàu: Tùy vào nhu cầu của khách hàng đến cảng nào mà nhân viên kinh doanh sẽ tư vấn cho khách hàng chọn dịch vụ của hãng tàu uy tín với giá cước phù hợp.Tuy nhiên cũng có một số khách hàng quen sử dụng dịch vụ của một hãng tàu cho hàng hóa của mình thì công ty thì xét báo giá cước cho khách hàng đó biết.
* Thời gian dự kiến xuất hàng để công ty tìm một lịch trình tàu chạy phù hợp.
Bước 2: Liên hệ với các hãng tàu để hỏi cước và lịch trình vận chuyển:
Căn cứ vào những thông tin mà khách hàng cung cấp nhân viên kinh doanh sẽ liên hệ với hãng tàu để hỏi giá và lịch trình tàu chạy phù hợp vì mỗi hãng tàu có lịch trình tàu chạy, tuyến chạy tàu cũng như có thế mạnh riêng trên các tuyến đường.
Ví dụ: Hãng tàu Hanjin, OOCL, ZIM line… có thế mạnh trên các tuyến đi Châu Âu và Mỹ. Trong khi đó hãng tàu TS line, Wanhai, Evergeen, NYK lại có thế mạnh trên các tuyến đi Châu Á.
Bước 3:Chào giá cho khách hàng và được chấp nhận giá:
Nhân viên kinh doanh căn cứ vào giá chào của các hãng tàu, tính toán chi phí và tiến hành chào giá cho khách hàng. Các giao dịch liên quan đến giá cả và lịch trình tàu đều phải lưu lại để đối chứng khi cần thiết.
Nếu giá cước và lịch trình tàu chạy đưa ra được khách hàng chấp nhận thì khách hàng sẽ gởi booking request ( yêu cầu dặt chổ) cho bộ phận kinh doanh. Booking request này xác nhận lại thông tin hàng hóa liên quan: Người gửi hàng, người nhận hàng, tên hàng, trọng lượng, loại container, nơi đóng hàng (đóng kho người gửi hàng hay đóng tại bãi container của cảng), cảng hạ container có hàng để thông quan xuất khẩu (hạ container ở
cảng nào thì thông quan tại cảng đó), cảng đến (nước nhập khẩu), ngày tàu chạy…
Bước 4: Liên hệ với hãng tàu để đặt chỗ:
Bộ phận kinh doanh sẽ căn cứ trên booking request của khách hàng và gửi booking request đến hãng tàu để đặt chổ. Sau đó hãng tàu sẽ xác nhận việc đặt chỗ đã thành công cho bộ phận kinh doanh bằng cách gởi booking confirmation hay còn gọi là Lệnh cấp container rỗng.Lệnh cấp container rỗng này chứa đựng những thông tin cần thiết sau: Số booking, tên tàu, cảng xếp hàng (port of loading), cảng giao hàng ( port of delivery), cảng chuyển tải ( port of discharge (nếu có)), bãi duyệt lệnh cấp container rỗng, giờ cắt máng( losing time)…
Sau khi có booking confirmation của hãng tàu, nhân viên kinh doanh sẽ gởi booking này cho khách hàng để họ sắp xếp đóng hàng và làm thủ tục thông quan xuất khẩu.
Trường hợp khách hàng sử dụng dịch vụ thuê khai hải quan và vận chuyển nội địa của công ty thì khách hàng sẽ gởi lệnh cấp container rỗng, thông tin chi tiết lô hàng xuất khẩu thời gian đóng hàng cho bộ phận giao nhận của công ty. Sau khi tiếp nhận nhân viên phòng giao nhận sẽ theo dõi và phối hợp với khách hàng để sắp xếp đưa container rỗng đến đóng hàng và vận chuyển ra cảng hoặc vận chuyển hàng đến đóng vào container ở cảng. Sau đó tiến hành làm thủ tục thông quan cho lô hàng xuất khẩu đó.
> Lập booking profile
Nhân viên kinh doanh sẽ lập booking profile để kê khai sơ lược thông tin về lô hàng và chuyển cho bộ phận chứng từ theo dõi tiếp. Những thông tin trên booking profile như sau:
* Tên người gửi hàng (công ty xuất khẩu), người phụ trách, số điện thoại/fax
* Tên hãng tàu
* Cảng đi, cảng đến, ngày tàu chạy
* Điều khoản thanh toán cước: trả trước (freight prepaid) hay trả sau
( freight collect)
* Giá mua, giá bán, các phụ phí liên quan…
Thứ Ba, 26 tháng 6, 2012
MIS trắc nghiệm
CHƯƠNG I:
CHƯƠNG IV
CHƯƠNG V
CHƯƠNG VI
CHƯƠNG VII
CHƯƠNG VIII
CHƯƠNG IX
CHƯƠNG X
| The key factor in building a knowledge society is the Internet.
| ||||||
Incorrect | |||||||
| The digital divide separates Europe from America.
| ||||||
Incorrect | |||||||
| Data and information are the same thing.
| ||||||
Incorrect | |||||||
| Knowledge is needed to understand the relationships between different pieces of information.
| ||||||
Correct | |||||||
| "Information Technology" is any mechanical and/or electrical means to supplement, extend, or replace human, manual operations or devices.
| ||||||
Incorrect | |||||||
| Information systems provide useful data to the users.
| ||||||
Correct | |||||||
| The highest-ranking manager in an IT department is the COO.
| ||||||
Incorrect | |||||||
| A DBA is responsible for developing new software.
| ||||||
Incorrect | |||||||
| A systems analyst is responsible for maintaining system software.
| ||||||
Incorrect | |||||||
| IBM went from being a hardware company to also being a consulting company.
| ||||||
Correct | |||||||
| Most information systems include people.
| ||||||
Incorrect | |||||||
| A decision support system can be used in the process of product demand forecasting.
| ||||||
Correct | |||||||
| A transaction processing system is used to capture and record business events.
| ||||||
Correct | |||||||
| A decision support system helps analysts create models of business situations.
| ||||||
Incorrect | |||||||
| A knowledge management system is intended to provide expert advice.
| ||||||
Incorrect | |||||||
| Microsoft Office is an example of a functional area information system.
| ||||||
Incorrect | |||||||
| IS personnel always reports only to the IS function.
| ||||||
Incorrect | |||||||
| When a firm downsizes, it is common that staff is reassigned or leaves.
| ||||||
Correct | |||||||
| Information systems that are built to gain competitive advantage are said to be tactic.
| ||||||
Incorrect | |||||||
| The term "knowledge worker" was coined by Nicholas Carr.
| ||||||
Incorrect |
| The term "knowledge worker" was invented in 1959 by:
| ||||||
The term "knowledge worker" was invented in 1959 by Peter Drucker. | |||||||
| The contrast between people who have and who don't have access to technology is called:
| ||||||
The contrast between people who have and who don't have access to technology is called the digital divide. | |||||||
| Which of the following changes are brought about by globalization?
| ||||||
Globalization brings about cultural, economic, and technical changes. | |||||||
| A worker who creates, modifies, and/or synthesizes knowledge as a fundamental part of their job is a:
| ||||||
A worker who creates, modifies, and/or synthesizes knowledge as a fundamental part of their job is a systems analyst. | |||||||
| A computer-based information system includes:
| ||||||
A computer-based information system includes data, hardware and software, people, and telecommunications. | |||||||
| ________ is raw material and has no meaning in and of itself.
| ||||||
Data is raw material and has no meaning in and of itself. | |||||||
| ________ is a representation of reality.
| ||||||
Information is a representation of reality. | |||||||
| ________ is needed to understand relationships between different pieces of information.
| ||||||
Correct | |||||||
| A programmable robot on a shop floor is an example of ________.
| ||||||
A programmable robot on a shop floor is an example of information technology. | |||||||
| Which of these is NOT a core IS professional competency?
| ||||||
Technical knowledge, business knowledge, and systems integration skills are all IS core IS professional competencies. | |||||||
| Which of these is NOT an element of technical knowledge and skill?
| ||||||
System integration is a not component of technical knowledge and skills. | |||||||
| The IT professional that is responsible for obtaining business requirements from the user and translating them into technical specifications is the:
| ||||||
The IT professional that is responsible for obtaining business requirements from the user and translating them into technical specifications is the systems analyst. | |||||||
| The IT professional that is responsible for the information systems function of an organization is the:
| ||||||
The IT professional that is responsible for the information systems function of an organization is the CIO. | |||||||
| Senior managers' information needs are often met by special information systems called:
| ||||||
Senior managers' information needs are often met by special information systems called executive information systems. | |||||||
| Which application family represents groupware or collaboration systems?
| ||||||
Correct | |||||||
| Day-to-day business events are captured and tracked by:
| ||||||
Day-to-day business events are captured and tracked by transaction processing systems. | |||||||
| A system that supports and integrates all facets of the business is a(n) ________ system.
| ||||||
Correct | |||||||
| A modern trend in the IS function in many firms involves a shift to a consulting or service mentality. In this case users are often referred to as:
| ||||||
A modern trend in the IS function in many firms involves a shift to a consulting or service mentality. In this case users are often referred to as clients or customers. | |||||||
| The process of reinventing an organization so that it is smaller and more productive is called:
| ||||||
The process of reinventing an organization so that it is smaller and more productive is called either downsizing or rightsizing. | |||||||
| When a firm develops a system that it hopes will achieve an advantage in the market, the effort is said to be:
| ||||||
When a firm develops a system that it hopes will achieve an advantage in the market, the effort is said to be strategic. |
CHƯƠNG II
| The 1961 Federal Wire Wager Act outlawed the transmissions of funds to pay gambling fees.
| ||||||
Correct | |||||||
| During Globalization 1.0 mainly Asian countries were globalizing.
| ||||||
| Internet Explorer was the first mainstream web browser.
| ||||||
Incorrect | |||||||
| The term blog refers to Web sites allowing users to add, remove, or edit content.
| ||||||
Incorrect | |||||||
| One country that benefited greatly from the dot-com boom was India.
| ||||||
Correct | |||||||
| In-sourcing is the delegation of a company's core operations to a subcontractor that specializes in that operation.
| ||||||
Correct | |||||||
| The "anabolics" are technologies that make the different forms of collaboration "digital, mobile, virtual, and personal".
| ||||||
Incorrect | |||||||
| Whether a country's economy is a market or a planned economy is an example of a geoeconomic challenge.
| ||||||
Incorrect | |||||||
| Time zone differences are an example of geoeconomic challenges.
| ||||||
Correct | |||||||
| The aging population in the United States and Western Europe is a political challenge.
| ||||||
Incorrect | |||||||
| Export regulations are limiting trade with one particular country.
| ||||||
Incorrect | |||||||
| Many people argue that the emerging "global village" is only superficial.
| ||||||
Correct | |||||||
| Power distance is a cultural characteristic related to how different societies view authority and hierarchical structures.
| ||||||
Correct | |||||||
| Belongingness reflects the extent to which a society values the position of an individual versus the position of a group.
| ||||||
Incorrect | |||||||
| Concept of time is a cultural characteristic that reflects the extent to which a culture has a longer- or shorter-term orientation.
| ||||||
Correct | |||||||
| Most of today's large companies have some international business strategy for competing in different global markets.
| ||||||
Correct | |||||||
| The global business strategy is particularly suited for operations in markets differing widely.
| ||||||
Incorrect | |||||||
| Companies using a transnational business strategy selectively decide which aspects of the organization should be under central control and which should be decentralized.
| ||||||
Correct | |||||||
| In a multinational information systems strategy, a centralized infrastructure and tight controls are utilized to support the centralized nature of the decision-making.
| ||||||
Incorrect | |||||||
| In a transnational information systems strategy, integrated networks between the home office and the multiple local subsidiaries enable different degrees of integration.
| ||||||
Correct |
| Casinos now use ________ technology to track players' gaming chips.
| ||||||
Casinos now use RFID technology to track players' gaming chips. | |||||||
| "The world is flat" was written by which author?
| ||||||
"The world is flat" was written by which author Thomas Friedman. | |||||||
| During Globalization 1.0, power came from:
| ||||||
During Globalization 1.0, power came from horses, steam, and wind. | |||||||
| During Globalization 2.0, ________ were the primary entities globalizing.
| ||||||
During Globalization 2.0, companies were the primary entities globalizing. | |||||||
| During Globalization 2.0, there was a huge overinvestment in:
| ||||||
Correct | |||||||
| Which of the following is NOT an example of open sourcing?
| ||||||
The Solaris operating system is not an example of open sourcing. | |||||||
| ________ is the ability of individuals to create their own personal supply chain.
| ||||||
In-forming is the ability of individuals to create their own personal supply chain. | |||||||
| All of the following are examples of "steroids" EXCEPT:
| ||||||
Fashionable cell phone designs is not an example of "steroids". | |||||||
| Which of the following countries is declining in popularity as an outsourcing destination?
| ||||||
Singapore is declining in popularity as an outsourcing destination. | |||||||
| Which of the American outsourcing destination countries has the highest relative geopolitical risk?
| ||||||
Of the American outsourcing destination countries, Brazil has the highest relative geopolitical risk. | |||||||
| Which of the following is NOT a reason for companies to outsource business activities?
| ||||||
Companies outsource business activities to free up internal resources, gain access to world-class capabilities, and increase the revenue potential for the organization. | |||||||
| Which of the following is NOT considered a governmental challenge of operating in a digital world?
| ||||||
Differences in welfare is NOT considered a governmental challenge of operating in a digital world. | |||||||
| Taxes and Tariffs are an example of which type of challenge?
| ||||||
Taxes and Tariffs are an example of regulatory challenges. | |||||||
| The cultural characteristic that reflects the extent to which a culture has a longer- or shorter-term orientation is called:
| ||||||
The cultural characteristic that reflects the extent to which a culture has a longer- or shorter-term orientation is called concept of time. | |||||||
| Which of the following is NOT considered an international business strategy?
| ||||||
Global, transnational, and multinational strategies are all considered international business strategies. | |||||||
| A ________ business strategy is best suited for operation in homogeneous markets.
| ||||||
A global business strategy is best suited for operation in homogeneous markets. | |||||||
| A ________ business strategy is best suited for operation in integrated global markets.
| ||||||
A transnational business strategy is best suited for operation in integrated global markets. | |||||||
| A ________ information systems strategy is characterized by direct communication between the home office and the subsidiaries.
| ||||||
A multinational information systems strategy is characterized by direct communication between the home office and the subsidiaries. | |||||||
| A ________ information systems strategy is characterized by enterprise-wide linkages.
| ||||||
A transnational information systems strategy is characterized by enterprise-wide linkages. | |||||||
| A ________ information systems strategy is characterized by common global data resources.
| ||||||
Correct |
CHƯƠNG III
| Learning mentality can build upon automating mentality when it recognizes that information systems can be a vehicle for organizational learning and change as well as automation.
| ||||||
Correct | |||||||
| In a corporate setting, strategic planning involves forming a vision of where the organization needs to head, setting objectives and performance targets, and crafting a strategy to achieve the desired results.
| ||||||
Correct | |||||||
| Companies like Porsche, Nordstrom, and IBM, which offer better products or services than their competitors, are examples of the best-cost provider strategy.
| ||||||
Incorrect | |||||||
| Low-cost leadership strategy, differentiation strategy, and best-cost provider strategy are examples of organizational learning.
| ||||||
Incorrect | |||||||
| A value chain is the process of adding value throughout an organization.
| ||||||
Correct | |||||||
| A system that uses the Internet for business-to-business interaction is called an Intranet.
| ||||||
Incorrect | |||||||
| Making the business case is the process of building and presenting the set of arguments that show that an information system is adding value to the organization.
| ||||||
Correct | |||||||
| Disruptive Innovations are based on technology that cannot be commercialized.
| ||||||
Incorrect | |||||||
| When making a successful business case, "Arguments based on data, quantitative analysis, and/or indisputable factors" is known as an argument based on faith.
| ||||||
| A cost-benefit analysis is one way to present a business case based on fact.
| ||||||
Correct | |||||||
| Tangible costs are one-time costs that are not expected to continue after the system is implemented.
| ||||||
Incorrect | |||||||
| The largest recurring costs are usually computer equipment costs.
| ||||||
Incorrect | |||||||
| One might present a business case to any of these: the IS manager, company executives, or a steering committee.
| ||||||
Correct | |||||||
| A company is said to have a monopoly when it has gained an edge over its rivals.
| ||||||
Incorrect | |||||||
| One of the best ways to make a business case for a new system is to convert benefits to monetary terms.
| ||||||
Correct | |||||||
| The four consecutive stages of Choosing, Matching, Executing, and Assessing make up the System Development Life Cycle.
| ||||||
Incorrect | |||||||
| To be successful in e-business it is important to match new technologies with economic opportunities.
| ||||||
Correct | |||||||
| The IS manager has overall responsibility for managing IS development, implementation, and maintenance.
| ||||||
Correct | |||||||
| Competitive advantage gained by using information systems is usually short-lived because competitors can copy emerging information systems.
| ||||||
Correct | |||||||
| The prediction that the number of transistors that could be squeezed onto a silicon chip (which correlates to microchip processing speed) doubles every 18 months is called Moore's Law.
| ||||||
Correct |
| Technology is said to _____________ when we take a manual process (done by hand) and use computers to perform the task.
| ||||||
Correct | |||||||
| __________ are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market.
| ||||||
Correct | |||||||
| Technology is said to ___________ when it provides information about its operation and the underlying work process that it supports.
| ||||||
Technology is said to informate when it provides information about its operation and the underlying work process that it supports. | |||||||
| A _____________ organization is defined as an organization that is "skilled at creating, acquiring, and transferring knowledge, and at modifying its behavior to reflect new knowledge and insights."
| ||||||
A learning organization is defined as an organization that is "skilled at creating, acquiring, and transferring knowledge, and at modifying its behavior to reflect new knowledge and insights." | |||||||
| The Innovator's Solution called the disruptive growth engine, which all organizations can follow to more effectively respond to disruptive innovations in their industry includes all EXCEPT.
| ||||||
The Innovator's Solution called the disruptive growth engine, which all organizations can follow to more effectively respond to disruptive innovations in their industry includes all EXCEPT. E-Business Innovation | |||||||
| The most effective approach is the:
| ||||||
The most effective approach is the combination of the automating and learning approaches. | |||||||
| The e-Business Innovation Cycle includes all the steps EXCEPT:
| ||||||
The e-Business Innovation Cycle includes all the steps EXCEPT: Total Quality Management | |||||||
| In a corporate setting, "_________________" involves forming a vision of where the organization needs to head, setting objectives and performance targets, and crafting a strategy to achieve the desired results.
| ||||||
Correct | |||||||
| Low cost leadership strategy, differentiation strategy, and best-cost provider strategy are examples of strategic planning for:
| ||||||
Low cost leadership strategy, differentiation strategy, and best-cost provider strategy are examples of strategic planning for competitive advantage. | |||||||
| Companies like Target and Dell Computers, which offer the best prices for goods and/or services, are using a(n):
| ||||||
Companies like Target and Dell Computers, which offer the best prices for goods and/or services, are using a low-cost leadership strategy. | |||||||
| Companies like Porsche, Nordstrom, and IBM, which offer better products or services than their competitors, are using a(n):
| ||||||
Companies like Porsche, Nordstrom, and IBM, which offer better products or services than their competitors, are using a differentiation strategy. | |||||||
| __________ can be used to measure changes in terms of their perceived value to the organization.
| ||||||
Proxy variables can be used to measure changes in terms of their perceived value to the organization. | |||||||
| Which of the following is NOT a source of competitive advantage?
| ||||||
Which of the following is NOT a source of competitive advantage? Achieving higher costs than rivals | |||||||
| In order to be successful, an organization needs to:
| ||||||
In order to be successful, an organization needs to: All of the above | |||||||
| _____________ is the concept that innovations are not customer driven but rather driven by disruptive innovations that are unforeseen.
| ||||||
Innovator’s Dilemma is the concept that innovations are not customer driven but rather driven by disruptive innovations that are unforeseen. | |||||||
| The five phases of value chain analysis include all of the following EXCEPT:
| ||||||
The five phases of value chain analysis include all of the following EXCEPT: computer technology. | |||||||
| A system that uses the Internet for business-to-business interaction is called a(n):
| ||||||
Correct | |||||||
| Which of the following is NOT improving the value chain?
| ||||||
Increasing operating costs | |||||||
| What is a computer-aided design system?
| ||||||
The use of computers to design state-of-the-art, high-quality products. | |||||||
| Making the ________ is the process of building and presenting the set of arguments that show that an information system is adding value to the organization.
| ||||||
Making the business case is the process of building and presenting the set of arguments that show that an information system is adding value to the organization. | |||||||
| "Making the business case" for an information system means:
| ||||||
"Making the business case" for an information system means identifying the value provided by an information system to the organization or its constituents. | |||||||
| In the last few decades, it has often been observed that while IS expenditures (salaries, number of IS staff, etc.) have risen, productivity has not increased at the same rate. This observation is referred to as:
| ||||||
In the last few decades, it has often been observed that while IS expenditures (salaries, number of IS staff, etc.) have risen, productivity has not increased at the same rate. This observation is referred to as the "productivity paradox." |
| Core business processes are the processes that are needed to manufacture goods, sell the products, or provide service.
| ||||||
Correct | |||||||
| Information gathered from different business processes to improve organizational decision-making is referred to as business intelligence.
| ||||||
Correct | |||||||
| External sources for business intelligence include marketing research and production figures.
| ||||||
Incorrect | |||||||
| Facilities housing a vast number of servers to support the information processing needs of a large organization are referred to as server farms.
| ||||||
Correct | |||||||
| Using edge computing, resources are allocated on a(n) as-needed basis.
| ||||||
Incorrect | |||||||
| Using on-demand computing, tasks are often performed during the computers' idle time.
| ||||||
Incorrect | |||||||
| As a grid evolves and new nodes are added, dedicated grids become more heterogeneous over time.
| ||||||
Correct | |||||||
| Free software refers to software the source code is freely available for use and/or modification.
| ||||||
Incorrect | |||||||
| Systems designed to perform specific, predefined task such as a digital video recorder (TiVo) or a network router are referred to as embedded systems.
| ||||||
Correct | |||||||
| The Windows Update Service is an example of a patch management system.
| ||||||
Correct | |||||||
| Non-protected licenses are primarily used in consumer products.
| ||||||
Incorrect | |||||||
| Application service providers offer grid computing solutions.
| ||||||
Incorrect | |||||||
| IP convergence is the use of the Internet Protocol for transporting voice, video, fax, and data traffic.
| ||||||
Correct | |||||||
| Data warehousing is a method used by companies to improve their business by analyzing data for business trends in a way that allows the user to drill down from summary data to more detailed data.
| ||||||
Incorrect | |||||||
| The purpose of an OLAP server is to put key business information into the hands or more decision makers.
| ||||||
Incorrect | |||||||
| Tacit knowledge is located in an expert's mind.
| ||||||
Correct | |||||||
| A server farm is a facility in which businesses can rent space for servers or other information systems equipment.
| ||||||
Incorrect | |||||||
| The most important aspect of preparing for disaster is creating a disaster recovery plan.
| ||||||
Correct | |||||||
| Recovery time objectives specify how current the most recent backup should be.
| ||||||
Incorrect | |||||||
| COBIT is a set of best practices that help organizations to both maximize the benefits from their information systems infrastructure, while at the same time establishing appropriate controls.
| ||||||
Correct |
| The infrastructure of a city includes all EXCEPT:
| ||||||
The infrastructure of a city includes streets, power, telephone, water, and sewage lines, and retail stores. | |||||||
| Which of the following is NOT considered a core business process?
| ||||||
Conducting a financial audit is NOT considered a core business process. | |||||||
| Internal sources for gathering business intelligence include all EXCEPT:
| ||||||
Internal sources for gathering business intelligence include sales figures, customer demographics, and performance indicators. | |||||||
| Server farms have tremendous demands for reliable electricity and:
| ||||||
| Facilities housing a vast number of servers to support the information processing needs of an organization are called:
| ||||||
Correct | |||||||
| ________ can help to solve large-scale computing problems.
| ||||||
Grid computing can help to solve large-scale computing problems. | |||||||
| Using ________, resources are allocated on an as-needed basis.
| ||||||
Correct | |||||||
| Many grids perform on the speed of the ________ computer.
| ||||||
Many grids perform on the speed of the slowest computer. | |||||||
| As the grid evolves and new nodes are added, dedicated grids become more ______ over time.
| ||||||
Correct | |||||||
| By knowing which resources it can draw on, an autonomic computing system can be:
| ||||||
By knowing which resources it can draw on, an autonomic computing system can be self-optimizing. | |||||||
| Linux is the operating system of choice for:
| ||||||
Linux is the operating system of choice for Web servers, embedded systems, and supercomputers alike. | |||||||
| ________ licensing is primarily used in consumer products.
| ||||||
Correct | |||||||
| The FreeBSD operating systems is an example of:
| ||||||
The FreeBSD operating systems is an example of nonprotective open source software. | |||||||
| A(n) ___________ ASP offers a single application, such as payroll processing software.
| ||||||
Correct | |||||||
| _________ refers to the use of Internet technologies for conducting videoconferences.
| ||||||
Videoconferencing over IP refers to the use of Internet technologies for conducting videoconferences. | |||||||
| ___________ is a method used by companies to improve their business by analyzing data for business trends in a way that allows the user to drill down from summary data to more detailed data.
| ||||||
Data mining is a method used by companies to improve their business by analyzing data for business trends in a way that allows the user to drill down from summary data to more detailed data. | |||||||
| ____________ can provide time series and trend analysis views of data.
| ||||||
OLAP can provide time series and trend analysis views of data. | |||||||
| Knowledge assets consist of:
| ||||||
Knowledge assets consist of underlying skills, routines, and practices; databases, manuals, books, and diagrams; and stored facts and procedures. | |||||||
| A _____ backup site is a fully equipped backup facility.
| ||||||
Correct | |||||||
| Software designed to test applications and data, using test data or simulations is called:
| ||||||
Software designed to test applications and data, using test data or simulations is called CAAT. |
| The Internet and the World Wide Web are extremely well suited for conducting business electronically.
| ||||||
Correct | |||||||
| The Web enables interactive (two-way) communication, which is called collaboration.
| ||||||
Correct | |||||||
| A brick-and-mortar business strategy does not include electronic commerce.
| ||||||
Correct | |||||||
| Prior to the Internet, B2B Electronic Commerce was conducted using EDI.
| ||||||
Correct | |||||||
| An extranet is a vehicle for communicating public information with authorized users outside organizational boundaries.
| ||||||
Incorrect | |||||||
| Enterprise portals come in two basic forms, the distribution portal and the production portal.
| ||||||
Incorrect | |||||||
| Distribution portals automate the business processes involved in selling or distributing products from a single supplier to multiple customers.
| ||||||
Correct | |||||||
| Tailoring products and services to particular companies creates a horizontal market.
| ||||||
Incorrect | |||||||
| Another term for an electronic marketplace is a trading exchange.
| ||||||
Correct | |||||||
| B2C electronic commerce focuses on retail transactions between a company and wholesalers.
| ||||||
Incorrect | |||||||
| E-information is one of the three stages in the three-stage model of EC.
| ||||||
Correct | |||||||
| A Web site should be easy to use and fast.
| ||||||
Correct | |||||||
| Successful Web sites present a brief summary of their information along with hyperlinks that allow users to drill down for the information they are seeking.
| ||||||
Correct | |||||||
| Push marketing is an advertising strategy that attempts to draw visitors to companies' Web sites.
| ||||||
Incorrect | |||||||
| DRM technology is used by EC companies to prevent deceptive pricing.
| ||||||
Incorrect | |||||||
| Menu-driven pricing occurs when the customers set the prices for products and services.
| ||||||
Incorrect | |||||||
| A "browser wall" prevents the general public from viewing information on an intranet that is available to employees.
| ||||||
Incorrect | |||||||
| Procurement portals are designed to automate the business processes that occur before, during and after sales have been transacted between a buyer and multiple suppliers.
| ||||||
Correct | |||||||
| Click-only companies are also referred to as "pure click" companies.
| ||||||
Incorrect | |||||||
| Firms that operate in both the physical and virtual (online) arenas are termed brick-and-mortar companies.
| ||||||
Incorrect |
| The chapter's opening case relates that eBay.com business model. eBay's profit possibly foretells:
| ||||||
Correct | |||||||
| The Internet provides a set of interconnected ________ for individuals and businesses to complete transactions electronically.
| ||||||
The Internet provides a set of interconnected Networks for individuals and businesses to complete transactions electronically. | |||||||
| The combination of the Internet and Web technologies has given rise to a global platform where firms across the world can compete for customers and gain access to new:
| ||||||
The combination of the Internet and Web technologies has given rise to a global platform where firms across the world can compete for customers and gain access to new Markets. | |||||||
| Interactive communication via the Web enables firms to build ________ by providing immediate communication and feedback to and from customers.
| ||||||
Correct | |||||||
| By providing ways for customers and firms to conduct business online without assistance from humans, the Internet and Web have significantly reduced ________ costs.
| ||||||
By providing ways for customers and firms to conduct business online without assistance from humans, the Internet and Web have significantly reduced Transaction costs. | |||||||
| A ____________ model describes how the firm will generate profits and produce a superior return on invested capital.
| ||||||
Correct | |||||||
| Electronic Data Interchange (EDI) is the forerunner of modern ____ EC, as it was used to facilitate transactions between large corporations and their suppliers.
| ||||||
Electronic Data Interchange (EDI) is the forerunner of modern B2B EC, as it was used to facilitate transactions between large corporations and their suppliers. | |||||||
| EDI allows companies to have up-to-date information at their command, which enables these companies to make more accurate Forecasts.
| ||||||
EDI allows companies to have up-to-date information at their command, which enables these companies to make more accurate: | |||||||
| Web-based technologies are _________, which means that disparate computing systems can communicate with each other, provided that standard Web protocols have been implemented.
| ||||||
Web-based technologies are Cross-platform, which means that disparate computing systems can communicate with each other, provided that standard Web protocols have been implemented. | |||||||
| _____ automate the business processes involved in selling or distributing products from a single supplier to multiple buyers.
| ||||||
Correct | |||||||
| _______ are operated by third-party vendors, meaning that they are built and maintained by a particular company.
| ||||||
Trading exchanges are operated by third-party vendors, meaning that they are built and maintained by a particular company. | |||||||
| While an intranet looks and acts like a publicly accessible Web site, there are Firewalls that secure proprietary information from the public.
| ||||||
While an intranet looks and acts like a publicly accessible Web site, there are _____ that secure proprietary information from the public. | |||||||
| Which network is a private network restricted to authorized employees?
| ||||||
Intranet | |||||||
| The book relates a three-stage model of EC. Which of the following is not one of the stages?
| ||||||
Correct | |||||||
| The goal of the e-information stage is to achieve:
| ||||||
The goal of the e-information stage is to achieve: Global dissemination of non-customized information | |||||||
| In the term m-commerce, the "m" refers to:
| ||||||
Correct | |||||||
| __________ actively pushes information at the consumer whether it is wanted or not.
| ||||||
Push marketing actively pushes information at the consumer whether it is wanted or not. | |||||||
| The concept of the ____________ refers to a focus on niche markets, rather than purely on mainstream products:
| ||||||
The concept of the Long tail refers to a focus on niche markets, rather than purely on mainstream products: | |||||||
| Organizations can use ___________ to facilitate team efforts.
| ||||||
All of the above. | |||||||
| An extranet allows two or more firms to use the ______ to conduct business together.
| ||||||
An extranet allows two or more firms to use the Internet to conduct business together. |
| One common way to gain access to a password-protected system is to use a brute-force approach.
| ||||||
Correct | |||||||
| Denial of service attacks occur when someone accesses electronic information and then changes the information in some way.
| ||||||
Incorrect | |||||||
| Zombie computers are created when computer users who connect to the Internet don't use firewalls and antivirus software and are, therefore, open to attacks.
| ||||||
Correct | |||||||
| Worms consist of destructive code that can erase a hard drive, seize control of a computer, or otherwise do damage.
| ||||||
Incorrect | |||||||
| Freeware collects information about a person in order to customize Web browser banner advertisements.
| ||||||
Incorrect | |||||||
| Spim is electronic junk mail or junk newsgroup postings, usually for the purpose of advertising some product and/or service.
| ||||||
Incorrect | |||||||
| Another term for phishing is spoofing.
| ||||||
Correct | |||||||
| An identifier is a message passed to a Web browser on a user's computer by a Web server, that is then stored in a text file by the browser; that message is sent back to the server each time the user's browser requests a page from that server.
| ||||||
Incorrect | |||||||
| Any good approach to securing information systems begins first with a quarantining of all aspects of those systems.
| ||||||
Incorrect | |||||||
| One critical components of a good information systems audit is a thorough risk analysis.
| ||||||
Correct | |||||||
| Risk acceptance is a computer system security policy in which no countermeasures are adopted, and any damages that occur are simply absorbed.
| ||||||
Correct | |||||||
| Risk transference is a computer system security policy in which someone else absorbs the risk, as with insurance.
| ||||||
Correct | |||||||
| A common way to enforce physical access restrictions is the use of biometrics.
| ||||||
Incorrect | |||||||
| Encryption is a technology used by VPNs to encapsulate, encrypt, and transmit data over the Internet infrastructure, enabling business partners to exchange information in a secured, private manner between organizational networks.
| ||||||
Incorrect | |||||||
| Packet filtering is the prevention of unauthorized access to a computer network by a firewall at the data packet level; data packets are accepted or rejected based on predefined rules.
| ||||||
Correct | |||||||
| A firewall topology is the manner in which a firewall is implemented such as hardware only, software only, or a combination of hardware and software.
| ||||||
Incorrect | |||||||
| A symmetric key system is an encryption system where both the sender and recipient use the same key for encoding (scrambling) and decoding the message.
| ||||||
Correct | |||||||
| Secure sockets layer (SSL), developed by Netscape, is a popular public-key encryption method used on the Internet.
| ||||||
Correct | |||||||
| The record showing who has used a computer system and how it was used is called electronic footprints.
| ||||||
Incorrect | |||||||
| According to the CSI/FBI Cyber Crime Survey, only 20 percent of the organizations utilize cyberinsurance.
| ||||||
Correct |
| Information systems security refers to:
| ||||||
Information systems security refers to securing personal computers, precautions taken to keep all aspects of information systems secure, and securing gateways between the network and the outside world. | |||||||
| Unauthorized access can be achieved by:
| ||||||
Unauthorized access can be achieved by physically stealing computers, stealing storage media, and opening files on a computer that has not been set up to limit access. | |||||||
| Software that covertly monitors your activity and transmits that information in the background to someone else is called:
| ||||||
Software that covertly monitors your activity and transmits that information in the background to someone else is called spyware. | |||||||
| Different reactions to a risk analysis include:
| ||||||
Different reactions to a risk analysis include reducing the risk, implementing no countermeasures, and transferring the risk to someone else. | |||||||
| A good way to begin to assess risk is to do a(n):
| ||||||
A good way to begin to assess risk is to do a risk analysis. | |||||||
| Common forms of authentication are:
| ||||||
Passwords, security code sequences, and physical devices restricting access to the computer are common forms of authentication are. | |||||||
| Which of these is employed in user authentication and may employ scans of fingerprints, irises, or voices?
| ||||||
Biometrics is employed in user authentication and may employ scans of fingerprints, irises, or voices. | |||||||
| ________ is the unauthorized access to an unsecured wireless network.
| ||||||
Drive-by hacking is the unauthorized access to an unsecured wireless network. | |||||||
| A technology that can help safeguard an internal network from intruders breaking in from the Internet is a:
| ||||||
A technology that can help safeguard an internal network from intruders breaking in from the Internet is a firewall. | |||||||
| A firewall that can be used to detect when a certain type of connection has been made between specified users on either side of the firewall uses (a):
| ||||||
A firewall that can be used to detect when a certain type of connection has been made between specified users on either side of the firewall uses circuit-level control. | |||||||
| A firewall that might perform certain security measures only on specific applications uses (a):
| ||||||
Correct | |||||||
| A technique whereby data are encoded with a special secret key (to make unauthorized viewing more difficult) is called:
| ||||||
A technique whereby data are encoded with a special secret key (to make unauthorized viewing more difficult) is called encryption. | |||||||
| Netscape developed _________________, a popular public-key encryption method used on the Internet.
| ||||||
Netscape developed SSL, a popular public-key encryption method used on the Internet. | |||||||
| A network connection that is constructed dynamically through a secure tunnel is called a(n):
| ||||||
A network connection that is constructed dynamically through a secure tunnel is called a VPN. | |||||||
| A technology used to foil data snooping when the entire network does not consist of a secure channel is called:
| ||||||
A technology used to foil data snooping when the entire network does not consist of a secure channel is called encryption. | |||||||
| Effective management is a(n) _________ to help safeguard information systems.
| ||||||
Correct | |||||||
| Detailed procedures for recovering from systems-related disasters are called ______________.
| ||||||
Detailed procedures for recovering from systems-related disasters are called disaster recovery plans. | |||||||
| Information systems security-related policies and procedures include all EXCEPT:
| ||||||
Information policies, use policies, and security policies should be included in information systems security-related policies and procedures. | |||||||
| A mechanism to ensure that a message did originate from the claimed sender is called:
| ||||||
Correct | |||||||
| A ________ knows that each computer is who it says it is and provides public keys to each computer.
| ||||||
A certificate authority knows that each computer is who it says it is and provides public keys to each computer. |
| Because structured decisions are relatively complex, they can be programmed directly into operation information systems.
| ||||||
Incorrect | |||||||
| For semi-structured decisions, some procedures to follow can be specified in advance, but not to the extent where a specific recommendation can be made.
| ||||||
Correct | |||||||
| Transaction processing systems reside close to customers at the operational level of the organization.
| ||||||
Correct | |||||||
| Online processing of transactions occurs when transactions are collected and then processed together at some later time.
| ||||||
Incorrect | |||||||
| Examples of processes carried out in a transaction processing system include recording, summarizing and merging.
| ||||||
Correct | |||||||
| A drill-down report provides a summary of critical information on a recurring schedule.
| ||||||
Incorrect | |||||||
| To assist executive-level decision making, information systems are used to obtain aggregate summaries of trends and projections of the future.
| ||||||
Correct | |||||||
| An executive information system provides information to executives in a very simple form so that they can scan information quickly for trends and anomalies.
| ||||||
Incorrect | |||||||
| A DSS is designed to be an interactive decision aid whereas TPS, MIS and EIS are used primarily in a passive way.
| ||||||
Correct | |||||||
| The outputs of an office automation system include documents, reports and schedules.
| ||||||
Incorrect | |||||||
| Desktop videoconferencing products are relatively large, expensive units that have video quality similar to that of broadcast television.
| ||||||
Incorrect | |||||||
| Groupware refers to a class of software that enables people to work together more effectively.
| ||||||
Correct | |||||||
| One of the most intriguing new technologies for stand-alone videoconferencing is the omni-directional camera, which offers high-quality panoramic view.
| ||||||
Incorrect | |||||||
| Functional area information systems are managerial-level information systems designed to support a specific functional area.
| ||||||
Incorrect | |||||||
| Examples of processes carried out in a transaction processing system include recording, summarizing and merging.
| ||||||
Correct | |||||||
| At the executive level, managers focus on short-term strategic issues facing the organization.
| ||||||
Incorrect | |||||||
| Online processing of transactions occurs when transactions are collected and then processed together at some later time.
| ||||||
Incorrect | |||||||
| A drill-down report provides a summary of critical information on a recurring schedule.
| ||||||
Incorrect | |||||||
| The Internet has made it much easier to gather hard data to support executive decision making.
| ||||||
Incorrect | |||||||
| The user interface is the way in which the DSS interacts with the user by collecting inputs and displaying output and results.
| ||||||
Correct |
| Routine, day-to-day business processes and interaction with customers occur at the ____________ level of a firm.
| ||||||
Correct | |||||||
| An example of a(n) ____________ information system is an inventory management system for a shoe store that keeps track of inventory and issues an order for additional inventory when levels drop below a specified level.
| ||||||
An example of an operational information system is an inventory management system for a shoe store that keeps track of inventory and issues an order for additional inventory when levels drop below a specified level. | |||||||
| For unstructured decisions, information systems are used to:
| ||||||
For unstructured decisions, information systems are used to obtain aggregate summaries of trends and projections of the future. | |||||||
| The goal of a management information system is to:
| ||||||
Correct | |||||||
| A drill-down report provides ____________ information as to why a key indicator is not at an appropriate level.
| ||||||
A drill-down report provides detailed information as to why a key indicator is not at an appropriate level. | |||||||
| A DSS is created to be a(n) ____________ decision aid.
| ||||||
Correct | |||||||
| __________________ systems are used to mimic human expertise by manipulating knowledge rather than simply information.
| ||||||
Intelligent systems are used to mimic human expertise by manipulating knowledge rather than simply information. | |||||||
| Examples of the types of activities that can be supported by expert systems include:
| ||||||
Examples of the types of activities that can be supported by expert systems include medical diagnosis and computer user help desk. | |||||||
| The output from an expert system includes:
| ||||||
The output from an expert system includes recommendations. | |||||||
| The inputs to an office automation system include:
| ||||||
Correct | |||||||
| Examples of asynchronous groupware include:
| ||||||
Correct | |||||||
| Groupware supports:
| ||||||
Groupware supports: All of the above. | |||||||
| Examples of typical information systems in production and operations include:
| ||||||
Examples of typical information systems in production and operations include customer problem tracking. | |||||||
| Are of the following are benefits to knowledge management systems EXCEPT:
| ||||||
Are of the following are benefits to knowledge management systems EXCEPT: Getting employee buy-in | |||||||
| Rules in an expert system are typically expressed using a ________ format.
| ||||||
Rules in an expert system are typically expressed using a what-if format. | |||||||
| A(n) ____________ is a way of encoding knowledge after collecting information from a user.
| ||||||
Correct | |||||||
| Common DSS models in accounting do NOT include:
| ||||||
Common DSS models in accounting do NOT include payroll and deductions. | |||||||
| The processing aspect of an executive information system focuses on:
| ||||||
The processing aspect of an executive information system focuses on data summaries and graphical interpretations. | |||||||
| ___________ systems consist of technology and the people needed to consolidate information and to support managers at the highest level of the organization.
| ||||||
Executive information systems consist of technology and the people needed to consolidate information and to support managers at the highest level of the organization. | |||||||
| ____________ reports are produced daily, weekly or monthly to support the routine informational needs of managerial-level decision making.
| ||||||
Scheduled reports are produced daily, weekly or monthly to support the routine informational needs of managerial-level decision making. |
| Enterprise-wide information systems are information systems that allow companies to integrate information across operations on a company-wide basis.
| ||||||
Correct | |||||||
| Internally focused systems could be used to coordinate the flow of information from a company to its potential or existing customers who exist outside the organization.
| ||||||
Incorrect | |||||||
| Technology development includes the design and development of applications that support the primary business activities.
| ||||||
Correct | |||||||
| An upstream information flow relates to the information that is produced by a company and sent along to another organization.
| ||||||
Incorrect | |||||||
| Given that older systems are not designed to communicate with other applications beyond departmental boundaries, they are classified as legacy systems.
| ||||||
Correct | |||||||
| Human Resource Management components are considered ERP core components.
| ||||||
Correct | |||||||
| CRM applications come in the form of custom software that is purchased from software vendors.
| ||||||
Incorrect | |||||||
| Operational CRM systems automate the fundamental business processes for interacting with customers.
| ||||||
Correct | |||||||
| Cooperative CRM components are used for providing effective and efficient communication with the customer from the entire organization.
| ||||||
Incorrect | |||||||
| A customer interaction center uses multiple communication channels to support the communication preferences of customers.
| ||||||
Correct | |||||||
| The further out in the supply chain one looks, the more and more suppliers are involved.
| ||||||
Correct | |||||||
| Supply chain execution is the execution of supply chain management.
| ||||||
Incorrect | |||||||
| Effectively processing returns and customer refunds is a critical part of supply chain management.
| ||||||
Incorrect | |||||||
| Supply chain effectiveness focuses on maximizing customer service.
| ||||||
Correct | |||||||
| Enterprise portals come in two basic forms, the distribution portal and the procurement portal.
| ||||||
Correct | |||||||
| SCM uses RFID technology to replace standard bar codes.
| ||||||
Correct | |||||||
| Passive RFID tags include a battery and can transmit hundreds of feet.
| ||||||
Incorrect | |||||||
| Virtually all major retailers are adopting RFID to better manage their supply chains.
| ||||||
Correct | |||||||
| It is not uncommon to have enterprise system implementation projects that run over budget.
| ||||||
Correct | |||||||
| Once enterprise systems go live, companies usually experience immediate increases in productivity.
| ||||||
Incorrect |
| Internally focused systems support ____________ areas, processes or activities within the organization.
| ||||||
Internally focused systems support functional areas, processes or activities within the organization. | |||||||
| The functional area of ____________________ mirrors that of inbound logistics.
| ||||||
The functional area of outbound logistics mirrors that of inbound logistics. | |||||||
| __________ focus(es) on the processes and decision making to orchestrate the day-to-day operations of an organization.
| ||||||
Correct | |||||||
| Externally focused systems can be used to coordinate a company's value chain with another company's value chain or with consumers, such as in:
| ||||||
Correct | |||||||
| Legacy systems and their associated ____________ applications can prove problematic when information from multiple departmental systems is required to make decisions.
| ||||||
Correct | |||||||
| Each function in an ERP system is classified as a component, and components are often bundled together to form software:
| ||||||
Each function in an ERP system is classified as a component, and components are often bundled together to form software modules. | |||||||
| It is critical for managers to be careful with ______________________ as subsequent software releases may not contain the necessary embedded logic and may require continual upgrades.
| ||||||
It is critical for managers to be careful with customizations as subsequent software releases may not contain the necessary embedded logic and may require continual upgrades. | |||||||
| ________ is a systematic, structured improvement approach whereby people critically examine, rethink, and redesign business processes.
| ||||||
Correct | |||||||
| The most important feature of an ERP is that it:
| ||||||
The most important feature of an ERP is that it allows information flow throughout the organization. | |||||||
| ERP systems are ____________ applications that are purchased from software vendors.
| ||||||
ERP systems are packaged applications that are purchased from software vendors. | |||||||
| Companies that have successfully implemented ________ can experience greater customer satisfaction and increase productivity in their sales and service personnel.
| ||||||
Companies that have successfully implemented CRM can experience greater customer satisfaction and increase productivity in their sales and service personnel. | |||||||
| All systems that are NOT accessible or visible to the customer are referred to as _________ systems.
| ||||||
All systems that are NOT accessible or visible to the customer are referred to as back-office systems. | |||||||
| ________ focuses on providing the business intelligence necessary to identify new opportunities and to provide superior customer service.
| ||||||
Analytical CRM focuses on providing the business intelligence necessary to identify new opportunities and to provide superior customer service. | |||||||
| ____________ applications are commonly integrated with ERP to leverage internal and external information to collaborate with suppliers.
| ||||||
SCM applications are commonly integrated with ERP to leverage internal and external information to collaborate with suppliers. | |||||||
| __________ flow refers to the movement of financial assets throughout the supply chain.
| ||||||
Financial flow refers to the movement of financial assets throughout the supply chain. | |||||||
| Supply chain __________ is the extent to which a company's supply chain is focusing on minimizing costs.
| ||||||
Supply chain efficiency is the extent to which a company's supply chain is focusing on minimizing costs. | |||||||
| Enterprise portals come in two basic forms, the distribution portal and the:
| ||||||
Enterprise portals come in two basic forms, the distribution portal and the procurement portal. | |||||||
| ________ offers advantages over standard bar-code technology in that it eliminates the need for line-of-sight reading.
| ||||||
RFID offers advantages over standard bar-code technology in that it eliminates the need for line-of-sight reading. | |||||||
| ________ tags include a battery and can transmit hundreds of feet.
| ||||||
Correct | |||||||
| Using ____________ tends to move companies through the enterprise system implementation more quickly and tends to help companies train their personnel on the applications more effectively.
| ||||||
Using consultants tends to move companies through the enterprise system implementation more quickly and tends to help companies train their personnel on the applications more effectively. |
| Software development has moved from a science to an art.
| ||||||
Incorrect | |||||||
| Systems analysis is the first phase of the SDLC.
| ||||||
Incorrect | |||||||
| Information systems development projects identified by top management have a broad strategic focus.
| ||||||
Correct | |||||||
| A key activity in systems analysis is modeling organizational data.
| ||||||
Correct | |||||||
| JAD is a good way of increasing system acceptance and quality.
| ||||||
Correct | |||||||
| JAD does not require high-level sponsorship.
| ||||||
Incorrect | |||||||
| During system design, the program code is designed.
| ||||||
Incorrect | |||||||
| A key activity in system design is the layout of forms and reports.
| ||||||
Correct | |||||||
| Interfaces that enable the user to select pictures, icons, and menus to send instructions to the computer are called graphical user interfaces.
| ||||||
Correct | |||||||
| Beta tests are performed by programmers.
| ||||||
Incorrect | |||||||
| Alpha tests are performed by software testers.
| ||||||
Correct | |||||||
| System conversion is conducted in the implementation phase.
| ||||||
Correct | |||||||
| During phased conversion, old and new systems are used at the same time.
| ||||||
Incorrect | |||||||
| Adaptive maintenance is conducted to correct errors.
| ||||||
Incorrect | |||||||
| Corrective maintenance typically receives the highest amount of attention of all maintenance.
| ||||||
Correct | |||||||
| Prototyping uses a trial and error technique.
| ||||||
Correct | |||||||
| Rapid application development closely follows the SDLC.
| ||||||
Incorrect | |||||||
| A drawback of object-oriented analysis and design is that programmers have to re-create common modules.
| ||||||
Incorrect | |||||||
| Organizations should strive to have as many strategic outsourcing relationships as possible.
| ||||||
Incorrect | |||||||
| End-user development is not well suited for large-scale systems.
| ||||||
Correct |
| The discipline of developing information systems is called:
| ||||||
The discipline of developing information systems is called software engineering. | |||||||
| The act of breaking down large, complex problems into many small, simple problems is called:
| ||||||
The act of breaking down large, complex problems into many small, simple problems is called decomposition. | |||||||
| The first phase in the SDLC is:
| ||||||
Correct | |||||||
| The SDLC phase that links implementation and initiation is called system:
| ||||||
The SDLC phase that links implementation and initiation is called system maintenance. | |||||||
| Information systems development projects identified by a steering committee have a ________ focus.
| ||||||
Information systems development projects identified by a steering committee have a cross-functional focus. | |||||||
| Data modeling is associated with system:
| ||||||
Correct | |||||||
| Designing forms and reports is part of system:
| ||||||
Designing forms and reports is part of system design. | |||||||
| Identification of data flows is part of modeling:
| ||||||
Identification of data flows is part of process modeling. | |||||||
| Which of the following is NOT a criterion for ranking projects?
| ||||||
Strategic alignment, project duration, and technical difficulty are all criteria for ranking projects. | |||||||
| Which of these is NOT considered to be a new approach to requirements collection?
| ||||||
Correct | |||||||
| Data models are expressed as which type of diagram?
| ||||||
Correct | |||||||
| Which of the following is NOT designed during the system design phase?
| ||||||
Program code is created during system implementation. | |||||||
| Which of these represents the type of test conducted by end users?
| ||||||
Beta testing is conducted by end users. | |||||||
| Which of these represents the type of test conducted by programmers?
| ||||||
Correct | |||||||
| Which type of system conversion does NOT involve simultaneous operation of old and new systems?
| ||||||
Using direct conversion, the old system is turned off one day, and the new system is started the next day. | |||||||
| The type of software maintenance that addresses bugs is:
| ||||||
Corrective maintenance is conducted to address software bugs. | |||||||
| The type of software maintenance that is associated with evolving business needs is:
| ||||||
Correct | |||||||
| The form of development that uses a trial and error approach is called:
| ||||||
Correct | |||||||
| Under which situation is end-user development considered?
| ||||||
End-user development is considered when IT staff is limited, overworked, or has limited skill sets. | |||||||
| Which of the following is NOT a type of outsourcing relationship?
| ||||||
Contractual outsourcing is not a type of outsourcing relationship. |
| Futurist Alvin Toffler wrote a book, The Third Wave, which refers to the Information Age.
| ||||||
Correct | |||||||
| The "digital divide" refers to those with high-speed Internet access compared with those who have only slow (dial-up) Internet connections.
| ||||||
No, it's the gap between those with computer access and those who do not. | |||||||
| Information privacy, accessibility, accuracy, and technology are central to most ethical concerns about information systems.
| ||||||
The central issues are information privacy, accessibility, accuracy, and property. | |||||||
| The term "computer literacy" refers to one's ability to read content from Web pages.
| ||||||
Computer literacy refers to one's ability to use a computer. | |||||||
| Identity theft is an issue in the computer ethics debates.
| ||||||
Correct | |||||||
| Information privacy is concerned with what information an individual should have to reveal to others through the course of employment.
| ||||||
Correct | |||||||
| You can improve your online shopping experience by accepting cookies.
| ||||||
Avoid having them left on your computer. | |||||||
| Web cramming is free access to material on the Web through downloading a viewer.
| ||||||
It is a free custom-designed Web site that makes unauthorized telephone charges, even though the consumer did not accept or agree to continue services. | |||||||
| With the increase of both computer-based communication between individuals and online databases, the individual(s) who has the right to collect, access and monitor this information has raised many IS ethical concerns.
| ||||||
Correct | |||||||
| Spim has decreased dramatically in use since the US government passed a law banning it.
| ||||||
There are no laws banning the use of spim. | |||||||
| Cybersquatting is a term used to describe a virus that infects a target computer, but lays dormant until triggered on a preset date.
| ||||||
| ECPA offers far stronger support for voice mail than e-mail.
| ||||||
Correct | |||||||
| According to the Computer Security Institute, the overall trend for computer crime has been declining over the past few years.
| ||||||
Correct | |||||||
| Uncensored access means that the person who has gained entry to a computer system has no authority to the access.
| ||||||
This is unauthorized access. | |||||||
| The Computer Fraud and Abuse Act of 1986 prohibits stealing and compromising data about national defense, foreign relations, and atomic energy.
| ||||||
Correct | |||||||
| True hackers are motivated by curiosity and do not desire to intend to do any harm.
| ||||||
Correct | |||||||
| Salami slicing is a form of identity theft where a cracker intends to extract money from another's bank account without the person's knowledge or consent.
| ||||||
Salami slicing is the shaving of small amounts from financial accounts. | |||||||
| Cloning refers to the use of scanners to steal the electronic serial numbers of cellular phones.
| ||||||
Correct | |||||||
| Piggybacking is the sending of an executable virus as an attachment to an e-mail message.
| ||||||
Piggybacking is looking over another's shoulder to get another's PIN number. | |||||||
| E-mail viruses send copies of themselves to everyone in the victim's address book.
| ||||||
Correct |
| During the Third Wave, _______________ became the common currency.
| ||||||
Correct | |||||||
| _______________ is an attribute possessed by someone who knows how to use a computer.
| ||||||
Computer literacy is an attribute possessed by someone who knows how to use a computer. | |||||||
| The digital divide in the United States is:
| ||||||
The digital divide in the United States is shrinking rapidly. | |||||||
| An issue central to the debate on computer ethics is:
| ||||||
Correct | |||||||
| One of the fastest growing "information" crimes in recent years has been:
| ||||||
One of the fastest growing "information" crimes in recent years has been identity theft. | |||||||
| The new dot-cons include:
| ||||||
The new dot-cons include: All of the above. | |||||||
| _____________________ focuses on who owns information about individuals and how information can be sold and exchanged.
| ||||||
Information property focuses on who owns information about individuals and how information can be sold and exchanged. | |||||||
| Companies collect psychographic data about their customers, which includes:
| ||||||
Companies collect psychographic data about their customers, which includes tastes and preferences. | |||||||
| _________________ is a small text file on your computer that stores information about your Web-browsing activity at a particular site.
| ||||||
Cookies is a small text file on your computer that stores information about your Web-browsing activity at a particular site. | |||||||
| ________________ is a term that describes what information a person or an organization has the right to obtain about others and how this information can be accessed and used in the future.
| ||||||
Correct | |||||||
| When the FBI employs the use of Carnivore, the federal agency must obtain ___________________ to install an online wiretap and monitor the suspect's online activity.
| ||||||
Correct | |||||||
| The term __________________ describes the practice of registering a domain name, and then trying to sell the domain name for large sums of money to the person, the company, or the organization most likely to want it.
| ||||||
The term cybersquatting describes the practice of registering a domain name, and then trying to sell the domain name for large sums of money to the person, the company, or the organization most likely to want it. | |||||||
| According to the Computer Security Institute, the overall trend for computer crime has __________ over the past several years.
| ||||||
According to the Computer Security Institute, the overall trend for computer crime has declined over the past several years. | |||||||
| Most organizations _____________ report their incidents of computer crimes.
| ||||||
Most organizations do not report their incidents of computer crimes. | |||||||
| A particular difficulty in combating cybercrime is that cybercriminals often attack across ____________.
| ||||||
A particular difficulty in combating cybercrime is that cybercriminals often attack across international borders. | |||||||
| The majority of unlawful intrusions into computer systems are made by:
| ||||||
Correct | |||||||
| Persons who plant viruses are called:
| ||||||
Persons who plant viruses are called vandals. | |||||||
| Spoofing is a type of computer crime, and it is a scam that is used to steal the _____________ of legitimate users' computer accounts.
| ||||||
Spoofing is a type of computer crime, and it is a scam that is used to steal the passwords of legitimate users' computer accounts. | |||||||
| The slang term for stolen software is:
| ||||||
The slang term for stolen software is warez. | |||||||
| Worms are another virulent type of computer infection, and their primary purpose is to ___________ memory space with its outlaw code, thus bringing computers to a halt.
| ||||||
Worms are another virulent type of computer infection, and their primary purpose is to clog memory space with its outlaw code, thus bringing computers to a halt. |
Đăng ký:
Bài đăng (Atom)