BZ400 STRATEGIC INFORMATION TECHNOLOGY Question 1 of 20 5 0 Points

BZ400 (STRATEGIC INFORMATION TECHNOLOGY)
Question 1 of 20 5.0 Points
The information systems projects of both the U.S. Navy and FedEx were __________ in nature.

A. tactical

B. strategic

C. operational

D. large-scale
Reset Selection

Mark for Review What’s This?

Question 2 of 20 5.0 Points
A global information systems strategy is characterized by __________ systems.

A. centralized

B. decentralized

C. distributed

D. homogeneous
Reset Selection

Mark for Review What’s This?

Question 3 of 20 5.0 Points
The business competency area for IS professionals:

A. is more strategic than technical.

B. sets them apart from others who have only technical skills.

C. is the easiest to outsource.

D. None of the above
Reset Selection

Mark for Review What’s This?

Question 4 of 20 5.0 Points
Information systems are combinations of __________ that people build and use to collect, create, and distribute useful data, typically in organizational settings.

A. hardware

B. software

C. telecommunications networks

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 5 of 20 5.0 Points
Which type of information system enables customers to buy goods and services from a firm’s Web site?

A. Customer Relation Management System

B. Electronic Commerce System

C. Office Automation System

D. Transaction Processing System
Reset Selection

Mark for Review What’s This?

Question 6 of 20 5.0 Points
Which of the following is considered to be one of the more traditional categories that are used to describe information systems?

A. Transaction processing systems

B. Management information systems

C. Decision support systems

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 7 of 20 5.0 Points
Which of the following is NOT true about knowledge?

A. Knowledge is accumulated wisdom.

B. Knowledge is needed to understand relationships between different pieces of information.

C. Knowledge is used to organize or manipulate data.

D. All of the above are true.
Reset Selection

Mark for Review What’s This?

Question 8 of 20 5.0 Points
Knowledge is a body of governing procedures. Which of the following American outsourcing destination countries has the highest English proficiency?

A. Argentina

B. Brazil

C. Costa Rica

D. Mexico
Reset Selection

Mark for Review What’s This?

Question 9 of 20 5.0 Points
Which of the flowing is NOT a product marketed by Apple?

A. iPod

B. iTunes

C. iDrive

D. Newton
Reset Selection

Mark for Review What’s This?

Question 10 of 20 5.0 Points
Which executive-level person is responsible for overseeing and managing the organization’s information systems?

A. Chief Knowledge Officer

B. Chief Technology Officer

C. Chief Information Officer

D. Chief Operations Officer
Reset Selection

Mark for Review What’s This?

Question 11 of 20 5.0 Points
Which IS manager is responsible for coordinating and managing the entire voice and data network?

A. Operations manager

B. Database administrator

C. Telecommunications manager

D. Network manager
Reset Selection

Mark for Review What’s This?

Question 12 of 20 5.0 Points
Which of the following events interrupted Globalization 2.0?

A. The Great Depression

B. World War I

C. World War II

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 13 of 20 5.0 Points
__________ is a cultural characteristic related to the risk-taking nature of a culture.

A. Risk aversion

B. Uncertainty avoidance

C. Fear of future consequences

D. Risk seeking
Reset Selection

Mark for Review What’s This?

Question 14 of 20 5.0 Points
The first mainstream Web browser was called:

A. Netscape.

B. Opera.

C. Firefox.

D. Internet Explorer.
Reset Selection

Mark for Review What’s This?

Question 15 of 20 5.0 Points
Which of the following is a weakness of the multidomestic business strategy?

A. Differing product offerings limit economies of scale

B. Inability to react to local market conditions

C. Difficult to manage

D. Personnel overhead
Reset Selection

Mark for Review What’s This?

Question 16 of 20 5.0 Points
__________ enables you to apply concepts from one domain to a new situation or problem.

A. Information

B. Wisdom

C. Data

D. Knowledge
Reset Selection

Mark for Review What’s This?

Question 17 of 20 5.0 Points
De facto standards contributing to Globalization 3.0 include all of the following EXCEPT:

A. Microsoft Word.

B. Adobe Acrobat.

C. PayPal.

D. eBay.
Reset Selection

Mark for Review What’s This?

Question 18 of 20 5.0 Points
Which of the following is NOT considered a geoeconomic challenge of operating in a digital world?

A. Demographic

B. Expertise

C. Time zone differences

D. Internet access
Reset Selection

Mark for Review What’s This?

Question 19 of 20 5.0 Points
A __________ information systems strategy is characterized by local databases.

A. global

B. transnational

C. multinational

D. hybrid
Reset Selection

Mark for Review What’s This?

Question 20 of 20 5.0 Points
The EU data protection directive limits:

A. Internet freedom.

B. personal rights to access data.

C. transborder data flows.

D. electronic commerce.
Reset Selection

Mark for Review What’s This?

Question 1 of 20 5.0 Points
__________ is the operating system of choice for Web servers, embedded system, and supercomputers alike.

A. Tux

B. Pengu-ware

C. Linux

D. Unix
Reset Selection

Mark for Review What’s This?

Question 2 of 20 5.0 Points
When merging transaction and analytical processing a problem occurs. Real-time analytical processing diminishes the performance of transaction processing. What is the solution to this problem that many companies use?

A. Pause transaction processing while analytical processing is occurring.

B. Only allow transaction processing during off-peak hours.

C. Replicate all transactions on a second database server and run analytical processing off of the second server.

D. None of the above
Reset Selection

Mark for Review What’s This?

Question 3 of 20 5.0 Points
Which of the following is NOT considered a core business process?

A. Manufacture goods

B. Hire employees

C. Sell products

D. Provide service
Reset Selection

Mark for Review What’s This?

Question 4 of 20 5.0 Points
Software asset management includes all of the following EXCEPT:

A. performing a software inventory.

B. matching installed software with licenses.

C. creating a software asset management plan.

D. All of these are part of software asset management.
Reset Selection

Mark for Review What’s This?

Question 5 of 20 5.0 Points
The Windows Update Service is an example of a __________ system.

A. bug-fixing

B. patch management

C. software asset management

D. online help and repair
Reset Selection

Mark for Review What’s This?

Question 6 of 20 5.0 Points
__________ is a set of best practices that help organizations maximize the benefits from their information systems infrastructure while at the same time establishing appropriate controls.

A. CMMS

B. CAAT

C. S-OX

D. COBIT
Reset Selection

Mark for Review What’s This?

Question 7 of 20 5.0 Points
Systems for gaining business intelligence __________ data in order to better manage the organization.

A. gather

B. process and analyze

C. store

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 8 of 20 5.0 Points
__________ can increase the reliability of an organization’s information systems infrastructure.

A. On-demand computing

B. Grid computing

C. Autonomic computing

D. Pay-per-use computing
Reset Selection

Mark for Review What’s This?

Question 9 of 20 5.0 Points
Graphical software tools that provide complex analysis of stored data are:

A. OLTP.

B. OLAP.

C. OLST.

D. OLIP.
Reset Selection

Mark for Review What’s This?

Question 10 of 20 5.0 Points
__________ is the use of the Internet Protocol for transporting voice, video, fax, and data traffic.

A. IP conveyance

B. IP integration prefer dis answer

C. IP communication

D. IP convergence THIS ONE MIGHT BE D ANSWER TOO
Reset Selection

Mark for Review What’s This?

Question 11 of 20 5.0 Points
Systems designed to perform specific, predefined tasks such as a digital video recorder (TiVo) or a network router are referred to as __________ systems.

A. integrated

B. specific

C. embedded

D. special-purpose
Reset Selection

Mark for Review What’s This?

Question 12 of 20 5.0 Points
A __________ backup site is a backup facility consisting of an empty warehouse with all necessary connections for power and communication, but nothing else.

A. hot

B. cold

C. empty

D. dormant
Reset Selection

Mark for Review What’s This?

Question 13 of 20 5.0 Points
Application service providers offer:

A. on-demand computing.

B. on-demand software.

C. utility computing.

D. utility software.
Reset Selection

Mark for Review What’s This?

Question 14 of 20 5.0 Points
In a __________ grid, the computers are just there to perform the grid’s computing tasks.

A. homogeneous

B. dedicated

C. pure

D. uniform
Reset Selection

Mark for Review What’s This?

Question 15 of 20 5.0 Points
A(n) __________ ASP offers services for small businesses within a limited geographical area.

A. specialist or functional

B. vertical market

C. enterprise

D. local
Reset Selection

Mark for Review What’s This?

Question 16 of 20 5.0 Points
An autonomic computing system must know its:

A. configuration.

B. capacity.

C. current status.

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 17 of 20 5.0 Points
The Linux operating system is an example of:

A. public domain software.

B. nonprotective open source software.

C. protective open source software.

D. proprietary software.
Reset Selection

Mark for Review What’s This?

Question 18 of 20 5.0 Points
A __________ is a facility in which businesses can rent space for servers or other information systems equipment.

A. collocation facility

B. server room

C. data warehouse

D. server warehouse
Reset Selection

Mark for Review What’s This?

Question 19 of 20 5.0 Points
__________ refers to the use of Internet technologies for placing telephone calls.

A. VoIP

B. IPT

C. IPP

D. PoIP
Reset Selection

Mark for Review What’s This?

Question 20 of 20 5.0 Points
__________ are controls helping to ensure the reliability of information, consisting of policies and their physical implementation, access restrictions, or recordkeeping of actions and transactions.

A. Information systems controls

B. Audit controls

C. Infrastructure controls

D. Access controls
Reset Selection

Mark for Review What’s This?

Question 1 of 20 5.0 Points
The Internet and the World Wide Web are extremely well-suited for:

A. conducting business electronically.

B. marketing products.

C. consumer service and support.

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 2 of 20 5.0 Points
The telecommunications networks that enable EDI are termed:

A. LANs.

B. VANs.

C. WANs.

D. CANs.
Reset Selection

Mark for Review What’s This?

Question 3 of 20 5.0 Points
__________ allows for the tracking of illegal copies of music to be tracked to the original purchaser.

A. Tracker technology

B. Reverse download technology

C. DRM

D. Counterfeit technology
Reset Selection

Mark for Review What’s This?

Question 4 of 20 5.0 Points
The textbook relates a three-stage model of EC. Which of the following is NOT one of the stages?

A. E-initiation

B. E-information

C. E-integration

D. E-transaction
Reset Selection

Mark for Review What’s This?

Question 5 of 20 5.0 Points
Web technologies allow integration of information via Web sites, which can be linked to corporate __________ to provide real-time access to information.

A. headquarters

B. databases

C. executives

D. warehouses
Reset Selection

Mark for Review What’s This?

Question 6 of 20 5.0 Points
Click-only companies are also referred to as __________ companies.

A. click-thru

B. pure play

C. pure click

D. click-click
Reset Selection

Mark for Review What’s This?

Question 7 of 20 5.0 Points
A __________ model describes how the firm will generate profits and produce a superior return on invested capital.

A. revenue

B. business

C. profit

D. virtual
Reset Selection

Mark for Review What’s This?

Question 8 of 20 5.0 Points
Web-based B2B systems range from simple __________ applications to complex trading exchanges where multiple buyers and sellers can congregate to conduct business online.

A. Internet

B. intranet

C. extranet

D. Web ring
Reset Selection

Mark for Review What’s This?

Question 9 of 20 5.0 Points
One particular limitation associated with EDI is its:

A. lack of utility across many businesses.

B. monetary expense.

C. lack of need for skilled employees.

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 10 of 20 5.0 Points
E-integration, the second stage of EC, is focused on accommodating requests for:

A. general information.

B. legal information.

C. customized information.

D. products.
Reset Selection

Mark for Review What’s This?

Question 11 of 20 5.0 Points
A(n) __________ is a vehicle for communicating proprietary information with authorized users outside organizational boundaries.

A. Internet

B. extranet

C. intranet

D. Web ring
Reset Selection

Mark for Review What’s This?

Question 12 of 20 5.0 Points
__________ automate the business processes involved in selling or distributing products from a single supplier to multiple buyers.

A. Distribution portals

B. Procurement portals

C. Enterprise portals

D. Resource portals
Reset Selection

Mark for Review What’s This?

Question 13 of 20 5.0 Points
__________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a buyer and multiple suppliers.

A. Procurement portals

B. Resource portals

C. Enterprise portals

D. Distribution portals
Reset Selection

Mark for Review What’s This?

Question 14 of 20 5.0 Points
Another term for an electronic marketplace is:

A. trading exchange.

B. trading floor.

C. electronic exchange.

D. multimedia marketplace.
Reset Selection

Mark for Review What’s This?

Question 15 of 20 5.0 Points
Intranets and extranets provide many benefits to organizations including:

A. low-cost deployment.

B. information timeliness and accuracy.

C. positive return on investment.

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 16 of 20 5.0 Points
The Internet provides a set of interconnected __________ for individuals and businesses to complete transactions electronically.

A. platforms

B. networks

C. Web rings

D. communication technologies
Reset Selection

Mark for Review What’s This?

Question 17 of 20 5.0 Points
Which network is an unrestricted public network?

A. Internet

B. Intranet

C. Extranet

D. E-Net
Reset Selection

Mark for Review What’s This?

Question 18 of 20 5.0 Points
The concept of __________ refers to a focus on niche markets, rather than purely on mainstream products:

A. dissemination

B. the long tail

C. e-tailers

D. m-commerce
Reset Selection

Mark for Review What’s This?

Question 19 of 20 5.0 Points
Click-and-mortar businesses continue to operate their physical locations, but they have also added a(n) __________ component to their business strategy.

A. strategic

B. security

C. EC

D. marketing
Reset Selection

Mark for Review What’s This?

Question 20 of 20 5.0 Points
EDI began in the:

A. 1940s.

B. 1950s.

C. 1960s.

D. 1970s.
Reset Selection

Mark for Review What’s This?

Question 1 of 20 5.0 Points
Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.

A. boot sector

B. file infector

C. file destroyer

D. file command
Reset Selection

Mark for Review What’s This?

Question 2 of 20 5.0 Points
According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.

A. 25 percent or less

B. 50 percent

C. 75 percent

D. nearly 90 percent
Reset Selection

Mark for Review What’s This?

Question 3 of 20 5.0 Points
__________ invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.

A. Johann Gutenberg

B. Phil Zimmerman

C. William (Bill) Gates

D. Tim Burners-Lee
Reset Selection

Mark for Review What’s This?

Question 4 of 20 5.0 Points
Which of the following is NOT an example of a computer crime as listed in the textbook?

A. Data diddling

B. Salami slicing

C. Piggybacking

D. Cold calling
Reset Selection

Mark for Review What’s This?

Question 5 of 20 5.0 Points
One common way to gain access to a password-protected system is to use a __________ approach.

A. back-door

B. “sneak peek”

C. brute-force

D. social engineering
Reset Selection

Mark for Review What’s This?

Question 6 of 20 5.0 Points
Persons who plant viruses are called:

A. computer hackers.

B. cyberterrorists.

C. vandals.

D. predators.
Reset Selection

Mark for Review What’s This?

Question 7 of 20 5.0 Points
A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:

A. authentication.

B. privacy/confidentiality.

C. nonrepudiation.

D. integrity.
Reset Selection

Mark for Review What’s This?

Question 8 of 20 5.0 Points
The global reach of computer networks has raised concerns over:

A. copyrights.

B. privacy.

C. security.

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 9 of 20 5.0 Points
__________ is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.

A. Access control software

B. Computer security software

C. Application restriction software

D. Data protection software
Reset Selection

Mark for Review What’s This?

Question 10 of 20 5.0 Points
Encryption software allows users to ensure:

A. authentication.

B. privacy/confidentiality.

C. nonrepudiation.

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 11 of 20 5.0 Points
The slang term for stolen software is:

A. hackerware.

B. warez.

C. vaporware.

D. discountware.
Reset Selection

Mark for Review What’s This?

Question 12 of 20 5.0 Points
__________ are the least used security technology.

A. Passwords

B. Biometrics

C. Encrypted files

D. Firewalls
Reset Selection

Mark for Review What’s This?

Question 13 of 20 5.0 Points
The Computer Fraud and Abuse Act of 1986 prohibited:

A. stealing or compromising data about national defense and foreign relations.

B. breaking into any electronic communications service.

C. monitoring voice communications.

D. stealing trade secrets.
Reset Selection

Mark for Review What’s This?

Question 14 of 20 5.0 Points
A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.

A. information systems security plan

B. disaster recovery plan

C. infrastructure management

D. risk assessment plan
Reset Selection

Mark for Review What’s This?

Question 15 of 20 5.0 Points
Crimes committed against telephone company computers are an example of:

A. phreaking.

B. spoofing.

C. social engineering.

D. data diddling.
Reset Selection

Mark for Review What’s This?

Question 16 of 20 5.0 Points
ECPA is an acronym that refers to the:

A. Electronic Controls Privacy Act.

B. Electronic Communications Privacy Act.

C. E-Commerce Customer Protection Association.

D. Electric Computer Protection Agency.
Reset Selection

Mark for Review What’s This?

Question 17 of 20 5.0 Points
To execute denial of service attacks, intruders often use __________ computers.

A. zombie

B. monster

C. robot

D. android
Reset Selection

Mark for Review What’s This?

Question 18 of 20 5.0 Points
Examples of the ethical conundrum include all EXCEPT:

A. using computer time at work to read personal e-mail.

B. organizations compiling personal information about shopping habits.

C. the government regulating computer crimes.

D. using technology to rearrange photographs.
Reset Selection

Mark for Review What’s This?

Question 19 of 20 5.0 Points
Futurist author Alvin Toffler describes three “waves of change.” The third, and biggest, wave of change to occur is the:

A. Information Age.

B. Industrial Revolution.

C. Agriculture and Handwork Age.

D. Modern Age.
Reset Selection

Mark for Review What’s This?

Question 20 of 20 5.0 Points
Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.

A. freaking

B. tricking

C. phishing

D. luring
Reset Selection

Mark for Review What’s This?

Question 1 of 20 5.0 Points
Companies use information systems to support their various business processes and activities for internal operations, which does NOT include:

A. manufacturing.

B. interaction with suppliers.

C. human resource management.

D. order processing.
Reset Selection

Mark for Review What’s This?

Question 2 of 20 5.0 Points
__________ refers to systems for providing effective and efficient communication with the customer from the entire organization.

A. Operational CRM

B. Analytical CRM

C. Collaborative CRM

D. Executional CRM
Reset Selection

Mark for Review What’s This?

Question 3 of 20 5.0 Points
The emergence of the Internet and Web has resulted in __________, opening up new opportunities and methods for conducting business.

A. the globalization of customer and supplier networks

B. the integration of customer and supplier networks

C. delineating the customer and supplier networks

D. the integration of all business processes within an organization
Reset Selection

Mark for Review What’s This?

Question 4 of 20 5.0 Points
__________ are operated by third-party vendors, meaning that they are built and maintained by a particular company.

A. Electronic exchanges

B. Trading exchanges

C. Multimedia marketplaces

D. Resource marketplaces
Reset Selection

Mark for Review What’s This?

Question 5 of 20 5.0 Points
Support activities include infrastructure, human resources, __________, and procurement.

A. operations and management

B. marketing and sales

C. customer service

D. technology development
Reset Selection

Mark for Review What’s This?

Question 6 of 20 5.0 Points
A value system is formed when:

A. a company creates additional value by integrating internal applications with suppliers, business partners, and customers.

B. companies connect their internal value chains.

C. information flows from one company’s value chain to another company’s value chain.

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 7 of 20 5.0 Points
__________ applications are systems that focus on the specific needs of individual departments and are not designed to communicate with other systems of the organization.

A. Packaged

B. Custom

C. Stand-alone

D. Internally focused
Reset Selection

Mark for Review What’s This?

Question 8 of 20 5.0 Points
__________ involves the business activities associated with receiving and stocking raw materials, parts, and products.

A. Inbound logistics

B. Operations and manufacturing

C. Outbound logistics

D. Marketing and sales
Reset Selection

Mark for Review What’s This?

Question 9 of 20 5.0 Points
The key purpose of a(n) __________ system is to streamline the flow of information from one company’s operations to another’s.

A. intraorganizational

B. operational

C. management information

D. interorganizational
Reset Selection

Mark for Review What’s This?

Question 10 of 20 5.0 Points
Data warehouses are databases that store information:

A. related to a specific department.

B. required for a specific business activity.

C. related to the various business activities of an organization.

D. that is outdated.
Reset Selection

Mark for Review What’s This?

Question 11 of 20 5.0 Points
__________ can be accomplished by integrating multiple business processes in ways that enable firms to meet a wide range of unique customer needs.

A. Competitive advantage

B. Economies of scale

C. Process reengineering

D. Strategic information planning
Reset Selection

Mark for Review What’s This?

Question 12 of 20 5.0 Points
__________ is a corporate-level strategy concentrating on the downstream information flows.

A. Business Process Management

B. Supply Chain Management

C. Customer Relationship Management

D. Enterprise Resource Planning
Reset Selection

Mark for Review What’s This?

Question 13 of 20 5.0 Points
An Enterprise Marketing Automation system provides a comprehensive view of the:

A. competitors.

B. industry trends.

C. environmental factors.

D. All of the above
Reset Selection

Mark for Review What’s This?

Question 14 of 20 5.0 Points
The term __________ is commonly used to refer to the producers of supplies that a company uses.

A. supply network

B. value system

C. supply chain

D. value chain
Reset Selection

Mark for Review What’s This?

Question 15 of 20 5.0 Points
Customer Relationship Management applications concentrate on the __________ integrating the value chains of a company and its distributors.

A. upstream information flows

B. legacy systems

C. externally focused systems

D. downstream information flows
Reset Selection

Mark for Review What’s This?

Question 16 of 20 5.0 Points
Like ERP and CRM applications, SCM packages are delivered in the form of __________, which companies select and implement according to their business requirements.

A. components

B. solutions

C. modules

D. systems
Reset Selection

Mark for Review What’s This?

Question 17 of 20 5.0 Points
The supply chain __________ module in SCM packages reports key measurements in the supply chain.

A. collaboration

B. event management

C. exchange

D. performance management
Reset Selection

Mark for Review What’s This?

Question 18 of 20 5.0 Points
__________ is often the most overlooked, underestimated, and poorly budgeted expense involved in planning enterprise system implementations.

A. Customization

B. Training

C. Executive sponsorship

D. Help from outside experts
Reset Selection

Mark for Review What’s This?

Question 19 of 20 5.0 Points
__________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a supplier and multiple customers.

A. Resource portals

B. Procurement portals

C. Distribution portals

D. Enterprise portals
Reset Selection

Mark for Review What’s This?

Question 20 of 20 5.0 Points
__________ allows Web page designers to create customized tags that specify how the document should be formatted.

A. HTML

B. XBRL

C. XML

D. W3C
Reset Selection

Mark for Review What’s This?

Part 1 of 1 –

Question 1 of 20 5.0 Points
Which of the following are personal computing tools?

A. SQL

B. Database management systems

C. CASE

D. DSS
Reset Selection

Mark for Review What’s This?

Question 2 of 20 5.0 Points
The goal of systems identification and selection is:

A. to identify a project from all possible projects that could be performed.

B. to identify and purchase a project from all possible projects that could be performed.

C. to identify and select a project from all possible projects that could be performed.

D. None of the above
Reset Selection

Mark for Review What’s This?

Question 3 of 20 5.0 Points
__________ is/are important to discover issues, policies, and rules, as well as concrete examples of the use of data and information in the organization.

A. Interviews

B. Document analysis

C. Observations

D. Questionnaires
Reset Selection

Mark for Review What’s This?

Question 4 of 20 5.0 Points
__________, a systems development methodology, uses a trial and error approach for discovering how a system could operate.

A. Prototyping

B. RAD

C. JAD

D. Object-oriented analysis and design
Reset Selection

Mark for Review What’s This?

Question 5 of 20 5.0 Points
Which of the following is most likely NOT purchased as a prepackaged IT system?

A. Human resources

B. Payroll

C. Accounting

D. Company Web page
Reset Selection

Mark for Review What’s This?

Question 6 of 20 5.0 Points
The four types of software conversion strategies include:

A. parallel, direct, phased, and pilot.

B. identification, analysis, implementation, and maintenance.

C. reference, discontinued, installation, and single location.

D. reuse, discontinued, implementation, and single location.
Reset Selection

Mark for Review What’s This?

Question 7 of 20 5.0 Points
The types of outsourcing relationships identified are:

A. basic, preferred, and strategic.

B. incidental, preferred, and strategic.

C. basic, incidental, and strategic.

D. basic, preferred, and incidental.
Reset Selection

Mark for Review What’s This?

Question 8 of 20 5.0 Points
__________ is the process of gathering and organizing information form users, managers, business processes, and documents to understand how a proposed information system should function.

A. Design analysis

B. Requirements collection

C. System identification

D. None of the above
Reset Selection

Mark for Review What’s This?

Question 9 of 20 5.0 Points
End-user development is usually reserved for:

A. systems that span organizational boundaries.

B. perform complex operations.

C. developing corporate databases.

D. None of the above
Reset Selection

Mark for Review What’s This?

Question 10 of 20 5.0 Points
__________ represent(s) the way in which data are transformed.

A. Processing logic

B. System design

C. System logic

D. Data flows
Reset Selection

Mark for Review What’s This?

Question 11 of 20 5.0 Points
SDLC is short for:

A. systems development learning cycle.

B. systems deployment learning cycle.

C. systems development life cycle.

D. systems deployment life cycle.
Reset Selection

Mark for Review What’s This?

Question 12 of 20 5.0 Points
__________ is testing the overall system to see whether it meets design requirements.

A. Alpha testing

B. Beta testing

C. Developmental testing

D. Systems testing
Reset Selection

Mark for Review What’s This?

Question 13 of 20 5.0 Points
Which of the following is NOT a commonly used criteria for evaluating software?

A. Memory requirements

B. Training and documentation

C. Access time

D. Maintenance and repair
Reset Selection

Mark for Review What’s This?

Question 14 of 20 5.0 Points
A __________ is a business document containing only predefined data.

A. form

B. report

C. dialogue

D. file
Reset Selection

Mark for Review What’s This?

Question 15 of 20 5.0 Points
Which of the following is a type of development methodology that analysts use to identify common modules that combine the data and the operations to be performed?

A. Prototyping

B. RAD

C. JAD

D. Object-oriented analysis and design
Reset Selection

Mark for Review What’s This?

Question 16 of 20 5.0 Points
The five phases of the SDLC in order from first to last are:

A. identification, analysis, design, implementation, and maintenance.

B. analysis, identification, design, implementation, and maintenance.

C. identification, design, analysis, implementation, and maintenance.

D. analysis, design, identification, implementation, and maintenance.
Reset Selection

Mark for Review What’s This?

Question 17 of 20 5.0 Points
Projects identified by top management tend to have a:

A. strategic organizational focus.

B. financial focus.

C. production focus.

D. diverse focus.
Reset Selection

Mark for Review What’s This?

Question 18 of 20 5.0 Points
The collection and structuring of __________ is arguably the most important activity in systems development.

A. system requirements

B. system design

C. system implementation

D. system identification
Reset Selection

Mark for Review What’s This?

Question 19 of 20 5.0 Points
Interfaces that enable the user to select pictures, icons, and menus to send instructions to the computer are referred to as:

A. database systems.

B. GUIs.

C. information system software.

D. files.
Reset Selection

Mark for Review What’s This?

Question 20 of 20 5.0 Points
__________ are criteria used by organizations to evaluate whether to accept or reject a project.

A. Strategic alignments and risks

B. Potential benefits and project size

C. Potential costs and resource availability

D. All of the above
Reset Selection

Mark for Review What’s This?

Order now