Fiber-optic cable is more expensive and harder to install than wire media.
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.
Web browser software requests Web pages from the Internet using which protocol?
A network that spans a city, and sometimes its major suburbs as well, is called a:
Based on your reading of the examples in the chapter, what would be the best use of RFID for a business?
Managing the supply chain
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.
In a bus network:
signals are broadcast in both directions to the entire network.
Mobile search makes up 15% of all Internet searches.
Which process is used to protect transmitted data in a VPN?
A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network.
A network that covers entire geographical regions is most commonly referred to as a(n):
wide area network.
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):
uniform resource locator.
________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
What are the four layers of the TCP/IP reference model?
Application, transport, Internet, and network interface
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
Telephone networks are fundamentally different from computer networks.
Passive RFID tags:
have a range of several feet.
Today, most Americans connect to the Internet through broadband connections at speeds up to 15 Mbps.
Which of the following statements is not true about search engines?
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.
A LAN would be used to connect all of the following except:
all of the computers in a city.
What service converts IP addresses into more recognizable alphanumeric names?
Which organization helps define the overall structure of the Internet?
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
The Domain Name System (DNS) converts IP addresses to domain names.
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
A ________ is special software that routes and manages communications on the network and coordinates networks resources.
network operating system/NOS
Which type of network is used to connect digital devices within a half-mile or 500-meter radius?
Digital subscriber lines:
operate over existing telephone lines to carry voice, data, and video.
Prior to the development of ________, computer networks used leased, dedicated telephone circuits to communicate with other computers in remote locations.
All network components connect to a single hub in a ________ topology.
The telephone system is an example of a ________ network.
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
Central large mainframe computing has largely replaced client/server computing.
The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.
The trunklines of the Internet are typically owned by network service providers.
IPv6 is being developed in order to:
create more IP addresses.
To create a computer network, you must have at least two computers.
Components or parts of finished products are referred to as:
Enterprise application vendors are now including ________ features, such as tools for data visualization, flexible reporting, and ad hoc analysis, as part of the application.
________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation.
You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?
Select the functions of the system you wish to use.
Which supply chain planning function determines how much product is needed to satisfy all customer demands?
Which of the following statements about enterprise applications is not true?
Enterprise applications are best implemented when few changes in business processes are required.
CRM software can help organizations identify high-value customers for preferential treatments.
Selling a customer with a checking account a home improvement loan is an example of:
In a ________ strategy, components arrive exactly at the moment they are needed, and finished goods are shipped as they leave the assembly line.
________ software deals with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training.
Analytical CRM uses a customer data warehouse and tools to analyze customer data collected from the firm's customer touch points and from other sources.
A company having difficulty with timely delivery of parts to its manufacturing plants should look to implementing a supply chain planning system.
A company's supply chain describes how raw materials are transformed into finished products and shipped to retailers and customers.
Which of the following is not an example of next-generation enterprise applications?
Solutions incorporating SCM
Uncertainties arise in any supply chain because of:
Customer relationship management systems typically provide software and online tools for sales, customer service, and:
________ consists of a set of interdependent software modules that support basic internal business processes for finance and accounting, human resources, manufacturing and production, and sales and marketing.
Capabilities of supply chain execution systems would not include:
identifying the optimal transportation mode.
From your reading of the chapter's opening case, Cannondale implemented new information systems in order to achieve which of the main six business objectives?
When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with:
Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?
Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.
The bullwhip effect is countered by:
reducing information uncertainty.
Major CRM application software vendors include Siebel Systems, PeopleSoft, SAP, and Salesforce.com.
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.
Marketing modules in CRM systems would provide tools for:
identifying profitable and unprofitable customers.
Why is overstocking warehouses not an effective solution for a problem of low availability?
It increases inventory costs.
To model its existing supply chain and make better decisions about managing inventory, a firm would implement the type of SCM called supply chain execution systems.
From your reading of the Southwest Airlines case study, the company implemented which type of system to reduce aircraft groundings?
Which of the following would not be considered a contact point?
________ management is an important capability for customer service processes that is found in most major CRM software products.
Enterprise systems include analytical tools.
The downstream portion of the supply chain includes retailers and customers.
________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners.
Which of the following is an important capability for sales processes that is found in most major CRM software products?
________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation.
The business value of an effective supply-chain management system includes all of the following except:
increased inventory levels.
Supply chain complexity and scale increases when firms:
produce products and services that coordinate with hundreds or more firms and suppliers.
Operational CRM applications include tools for:
Which of the following is not true about enterprise systems?
Enterprise software is expressly built to allow companies to mimic their unique business practices.
Supply chain planning systems:
identify the transportation mode to use for product delivery.
Supply chain management systems are a type of enterprise system.
Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers.
A company's organizations and processes for distributing and delivering products to the final customers is the:
downstream portion of the supply chain.
Enterprise software is built around thousands of predefined business processes that reflect:
The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.
A build-to-order supply-chain model is also called a ________ model.
Analyzing customer buying patterns is an example of:
Analytical CRM applications:
are based on data warehouses consolidated from operational CRM applications.
Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.
A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy.
Inefficiencies in a supply chain are primarily caused by inaccurate information.
The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
With new flows of information made possible by Web-based tools, supply chain management can more easily follow a push-based model.
Concurrent supply chains are made possible by which technology?
Customer service modules in CRM systems provide tools for:
assigning and managing customer service requests.
Total supply chain costs represent the majority of operating expenses for many businesses and in some industries approach 75 percent of the total operating budget.
Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.
Cross-selling markets complementary products to customers.
Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.
Enterprise systems require fundamental changes in the way the business operates.
In the pre-Internet environment, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes.
In a push-based model of SCM systems, actual customer orders or purchases trigger events in the supply chain.
Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain.
Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems.
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a:
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
The measurement of the number of customers who stop using or purchasing products or services from a company is called:
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
Dell Inc. is an example of a push-based model.
SFA modules in CRM systems would provide tools for:
managing sales prospect and contact information.
A ________ is a method of interaction with a customer, such as telephone or customer service desk.
All CRM packages contain modules for PRM and ERM.
________ modules in CRM systems help sales staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services.
A supply chain driven by actual customer orders or purchases follows a ________ model.
Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications.
In order to achieve maximum benefit from an enterprise software package, a business:
changes the way it works to match the software's business processes.
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products.
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the:
upstream portion of the supply chain.
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
Computer worms spread much more rapidly than computer viruses.
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
The most common type of electronic evidence is:
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
An acceptable use policy defines the acceptable level of access to information assets for different users.
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
Redirecting a Web link to a different address is a form of:
High-availability computing is also referred to as fault tolerance.
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
can use a person's voice as a unique, measurable trait.
Public key encryption uses two keys.
SSL is a protocol used to establish a secure connection between two computers.
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:
To secure mobile devices, a company will need to implement special mobile device management software.
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.
Smartphones have the same security flaws as other Internet-connected devices.
An example of phishing is:
setting up a fake medical Web site that asks users for confidential information.
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
Most antivirus software is effective against:
only those viruses already known when the software is written.
Specific security challenges that threaten clients in a client/server environment include:
unauthorized access; errors; spyware.
Viruses can be spread through e-mail.
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
Authorization refers to the ability to know that a person is who he or she claims to be.
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
DoS attacks are used to destroy information and access restricted areas of a company's information system.
A walkthrough is a type of software testing used before software is even written.
Packet filtering catches most types of network attacks.
Large amounts of data stored in electronic form are ________ than the same data in manual form.
vulnerable to many more kinds of threats
The Internet poses specific security problems because:
it was designed to be easily accessible.
The term cracker is used to identify a hacker whose specialty is breaking open security systems.
Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
Intrusion detection systems
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
1) A structured decision involves processing a certain kind of information in a specified way so that you will always get a clear-cut answer.
2) Management information systems provide information on the firm's performance.
3) DSS primarily address structured problems.
4) The earliest DSS were heavily data-driven.
5) What-if analysis works forward from known or assumed conditions.
6) Executive support systems focus on using OLAP and data mining to analyze large pools of data in major corporate systems.
7) GDSS are designed to display data in the form of digitized maps.
8) Web-based tools for videoconferencing and electronic meetings are the primary tools for GDSS.
9) Expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization.
10) Case-based reasoning describes a particular phenomenon or process linguistically and then represents that description in a small number of flexible rules.
11) CBR is used in diagnostic systems in medicine.
12) Fuzzy logic is used to express relationships very generally.
13) Unlike genetic algorithms, neural networks are not suited to finding patterns and relationships in massive amounts of data.
14) Because genetic algorithms produce generalized solutions, they are best used as aids or guides to human decision makers instead of substitutes for them.
15) Genetic algorithms are used for generating solutions to problems that are too large and complex for human beings to analyze on their own.
16) Shopping bots are a form of intelligent agent.
17) Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents.
18) Enterprise-wide knowledge management systems deal with structured and semistructured knowledge, while other systems are used for unstructured knowledge.
19) Structured knowledge includes just that knowledge that exists in formal documents.
20) Knowledge network systems seek to turn unstructured knowledge of some employees into explicit knowledge that can be stored or accessed by other individuals.
21) Neural network applications in medicine, science, and business address problems in all of the following except: A) pattern classification. B) prediction. C) control and optimization. D) generalization.
22) Which of the following is a key problem in managing knowledge? A) Classifying knowledge B) Storing knowledge C) Distributing knowledge D) Locating knowledge
23) According to your reading of the text, Procter & Gamble's use of DSS illustrates the use of information systems to implement which common business strategy? A) Low-cost leadership B) Product differentiation C) Focus on market niche D) Strengthen customer and supplier intimacy
24) Why does improving a small, routine decision have business value for a company? A) A small decision may have a great economic impact on the company. B) Even a routine decision may have a "ripple" effect through a corporation. C) A single decision has business value when added with all the other decisions made in the company. D) Small, routine decisions typically do not have any business value for a company.
25) Where there is no well-understood or agreed-on procedure for making a decision, it is said to be: A) undocumented. B) unstructured. C) documented. D) semistructured.
26) The type of decision that can made by following a definite procedure is called a(n) ________ decision. A) structured B) unstructured C) semistructured D) procedural
27) Which types of decisions are more prevalent at lower organizational levels? A) Procedural decisions B) Unstructured decisions C) Structured decisions D) Semistructured decisions
28) ________ decisions are most common at higher levels of management. A) Semistructured B) Unstructured C) Structured D) Undocumented
29) Operational management typically makes which type of decisions? A) Semistructured B) Documented C) Structured D) Procedural
30) Deciding whether to introduce a new product line is an example of a(n): A) unstructured decision. B) semistructured decision. C) procedural decision. D) nonprocedural decision.
31) Estimating the number of direct goods to reorder falls into which category of decision-making? A) Structured B) Documented C) Unstructured D) Procedural
32) Which phase of decision making finds or recognizes a problem? A) Design B) Intelligence C) Choice D) Implementation
33) Simon's four different stages in decision making are, in order from first to last: A) identification, choice, design, and implementation. B) identification, design, choice, and finalization. C) intelligence, choice, design, and implementation. D) intelligence, design, choice, and implementation.
34) Which dimension of quality means that a decision should reflect a rational process? A) Comprehensiveness B) Accuracy C) Fairness D) Coherence
35) Which dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties? A) Due process B) Justice C) Fairness D) Coherence
36) Which dimension of quality means that a decision is the result of a known process and can be appealed to a higher authority? A) Due process B) Justice C) Fairness D) Accuracy
37) MIS typically produce: A) New ways of looking at data that emphasize change, flexibility, and rapid response. B) Fixed, regularly scheduled reports based on data extracted from the organization's TPS. C) Solutions to semistructured problems appropriate for middle management decision-making. D) Responses to ad hoc queries, and graphic representations of existing data.
38) Which systems help managers monitor and control the business by providing information on the firm's performance? A) MIS B) DSS C) ESS D) GDSS
39) Which systems support decision-making by enabling users to extract useful information that was previously buried in large quantities of data? A) GSS B) ESS C) TPS D) DSS
40) The components of a DSS are the: A) database, data query language, and user interface. B) data visualization tools, software, and graphics capabilities. C) database, data mining tools, and analysis tools. D) user interface, software system, and database.
41) A DSS database is a collection of: A) historical data extracted from transaction-processing systems. B) current or historical data from several applications or groups. C) external data typically mined from the Internet and other third-party sources. D) the corporations current transaction data.
42) Which type of model is used to help managers estimate future conditions and sales figures resulting from these conditions? A) Forecasting B) Predictive C) Statistical
43) Optimization models are often used to: A) project future conditions and predict the effect of these conditions on sales. B) determine the proper mix of products within a given market to maximize profits. C) determine the price of a product given fluctuating sales and advertising budget. D) establish the best relationship between price and sales and marketing budgets.
44) What type of model asks what-if questions repeatedly to determine the impact on outcomes of changes in one or more factors? A) Optimization B) Sensitivity analysis C) Goal seeking D) Forecasting
45) Backward sensitivity analysis software is used for: A) supply chain optimization. B) historical what-if analysis. C) goal seeking. D) reverse forecasting.
46) Which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitized maps? A) GIS B) DSS C) GSS D) TPS
47) GDSS are designed to: A) allow meeting attendees to share their thoughts in real-time with their peers. B) manage knowledge using a global perspective. C) enable collaboration among geographically dispersed participants.D) implement structured methods for organizing and evaluation ideas.
48) Automobile companies would implement a(n) ________ to allow Web site visitors to configure their desired car. A) customer decision support (CDSS) B) model-driven DSS C) CAD system D) GDSS
49) Which of the following are types of intelligent techniques? A) Knowledge management systems B) Expert systems C) Computer-aided design D) Sensitivity analysis
50) Which of the following would not be classified as a type of intelligent technique? A) Genetic algorithms B) Case based reasoning C) Neural networks D) Virtual reality
51) Expert systems: A) solve problems too difficult for human experts. B) are based on DO WHILE rules. C) work in very limited domains. D) share characteristics with mainframe computing.
52) Expert systems model human knowledge as a set of rules that collectively are called the: A) knowledge base. B) knowledge database C) inference engine D) inference base
53) An inference engine is: A) a data mining strategy used by intelligent agents. B) the programming environment of an expert system. C) a method of organizing expert system knowledge into chunks. D) a strategy used to search through the rule base in an expert system.
54) Virtually all expert systems deal with problems of: A) associative data. B) classification. C) logic and control. D) unstructured decision-making.
55) ________ are designed to have a generalize capability to learn. A) Knowledge-based systems. B) Neural networks. C) Fuzzy logic systems. D) Expert systems.
56) Intelligent techniques that parallel some aspects of the processing patterns of the biological brain best describes: A) neural networks. B) genetic algorithms. C) case-based reasoning. D) fuzzy logic.
57) Genetic algorithms: A) represent knowledge as groups of characteristics. B) are software programs that work in the background to carry out specific, repetitive tasks. C) develop solutions to particular problems using techniques such as fitness, crossover, and mutation. D) "learn" patterns from large quantities of data by sifting through data.
58) To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management a firm would most likely use: A) CAD systems. B) genetic algorithms. C) fuzzy logic systems. D) intelligent agents.
59) Expertise and experience of organizational members that has not been formally documented best describes: A) wisdom. B) information. C) data.D) tacit knowledge.
60) What are the two major types of knowledge management systems? A) Management information systems and decision support systems B) Enterprise-wide knowledge management systems and knowledge work systems C) Enterprise systems and knowledge management systems D) Expert systems and knowledge work systems
61) ________ systems help organizations manage both structured and semistructured knowledge. A) Digital asset management B) Knowledge network C) Enterprise content management D) Knowledge work
62) In order to search for and retrieve knowledge objects in an enterprise content management system, the objects themselves must be: A) tagged with a classification. B) linked to their original sources. C) organized into relevant directories. D) referenced by appropriate indices.
63) Tools for the management, delivery, tracking, and assessment of various types of employee learning best describes: A) knowledge work systems. B) employee relationship systems. C) employee management systems. D) learning management systems.
64) ________ help media firms store and manage unstructured digital data such as photographs, images, videos, and audio files. A) Digital asset management systems B) Knowledge networks C) LMS D) CAD
65) ________ are an essential component of a knowledge work system. A) Computer-aided design tools B) Three-dimensional modeling tools C) Tagging and classification tools D) Links to external knowledge bases
66) Which of the following would not be classified as a knowledge work system? A) Computer-aided design B) 3D visualization system C) Investment workstations D) Digital asset management system
67) CAD workstations: A) provide design engineers with precise, three-dimensional representations of their models. B) provide an important source of expertise for organizations. C) allow groups to work together on documents. D) are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management.
68) Virtual reality applications for the Web use a standard called: A) CAD B) VRML C) VML D) TCP/IP
69) Virtual reality systems: A) provide design engineers with precise, three-dimensional representations of their models. B) provide an important source of expertise for organizations. C) allow groups to work together on documents. D) provide simulations of walking through or manipulating a three-dimensional model or programmed real-world environment.
70) Based on your reading of the chapter case discussing the HSBC, which type of information system was used to establish the policies for lending subprime mortgages? A) Data-driven DSS B) Model-driven DSS C) Model-driven ESS D) GIS
71) A(n) ________ is an abstract representation illustrating the components or relationships of a phenomenon.
72) ________ helps users see patterns and relationships in large amounts of data by presenting the data in graphical form.
Answer: Data visualization
73) A(n) ________ is a table that displays two or more dimensions of data in a convenient format.
Answer: pivot table
74) ________ use easy-to-understand displays to provide management with a comprehensive view of firm performance on a single screen
75) ESS have are able to ________, or move from summary data to lower and lower levels of detail.
Answer: drill down
76) ________ technology consists of computer-based systems that attempt to emulate human behavior and thought patterns.
Answer: Artificial intelligence/AI
77) Decision making is enhanced by a diverse group of ________ techniques, such as data mining, expert systems, neural networks, fuzzy logic, genetic algorithms, and intelligent agents.
78) In ________ descriptions of past experiences of human specialists, represented as cases, are stored in a database for later retrieval when the user encounters a new case with similar parameters.
Answer: case-based reasoning/CBR,
79) ________ is a rule-based technology that can represent the imprecise categories by creating rules that use approximate or subjective values.
Answer: Fuzzy logic
80) ________ systems are also known as expertise location and management systems.
Answer: Knowledge network
Want to see the other 269 Flashcards in Final - Chapters 5-8?JOIN TODAY FOR FREE!