BUS/365 E-Business Security and Controls Week 2 Quiz (Chapter 1 – 2) – Strayer

BUS 365 Week 2 Quiz – Strayer 

Chapter 1 Information Systems in the 2010s


Multiple Choice


1. The importance of being an agile enterprise has increased significantly because of _________ and _________. 

a) competition; slowed population growth

b) social networks; rapid economic recovery

c) slow economic recovery; advances in mobile technology

d) rapid population growth; corporate strategy


2. _________ are valuable to businesses because they can connect, communicate, collaborate, and do commerce on-demand, in real-time, and at a distance.

a) Multimedia networks

b) Interactivity applications

c) Broadband infrastructures

d) Podcasts


3. Which of the following is not an impact of the mass migration of users from PCs to mobile devices?

a) It has improved the privacy of users and security of corporate networks.

b) It has expanded the scope of information systems beyond traditional organizational boundaries.

c) It has torn down the walls between business, professional, and personal lives.

d) It has made location irrelevant to a large extent.


4. Which of the following is a characteristic of competitive advantage?

a) It is a long lasting edge over competitors if based on IT.

b) It is short-lived if competitors quickly duplicate it.

c) It requires the use of social media and networks.

d) It provides a big strategic payoff.


5. While of the following statements about mobile market opportunities is false?

a) Mobiles are replacing computers as the primary way to connect with public and private networks and to get work done. 

b) Mobile gadgets are starting to look and feel like handheld computers, able to run all sorts of software.

c) Desktop and laptop computers are taking on more and more nontraditional duties, like streaming media to TV sets, stereos, and other household appliances.

d) Touch-navigate devices running on 3G and 4G networks create business opportunities and eliminate business threats.


6. According to Pew Research, newspapers have seen ad revenue __________ during the time between 2007 to 2010.

a) rise 10%

b) remain constant

c) fall 43%

d) fall 75%


7. Facebook’s rapid growth and its ranking as number one is an interesting and informative business case because:

a) it shows the power of IT to disrupt the status quo and transform industries.

b) it is a public company with an immensely-profitable business model.

c) it has positioned itself solely as a social network.

d) all of the above


8. In March 2010, __________ pulled in more Internet traffic in North America than Google.

a) eBay

b) Facebook

c) Microsoft

d) Apple


9. Innovation leads to profitable growth if that innovation:

a) generates new profit pools.

b) increases demand for products and services.

c) attracts new competitors.

d) Both a and b


10. How a company generates revenue from its assets is referred to as its __________.

a) asset infrastructure

b) business model

c) corporate culture

d) organizational structure


11. Nokia makes and sells cell phones and generates profit from these sales. This statement defines Nokia’s business __________.

a) model

b) processes

c) supply chain

d) value proposition


12. According to McKay and Marshall, a comprehensive business model is composed includes each of the following elements except:

a) A description of all products and services the business will offer.

b) A description of the business process required to make and deliver the products and services.

c) A description of the customers to be served.

d) A description of competitive forces in the industry.


13. Basic functions of an IS are:

a) input, processing, and output.

b) input, processing, output, and feedback.

c) user interfaces, data sources, processing, and reporting.

d) hardware, software, data, and procedures.


14. Which of the following is not a component of an information system?

a) input

b) hardware

c) network

d) people


15. A company believes that superb customer service and on-time delivery are valuable and critical to their success. Their beliefs and values form the __________ that influences the company’s IT investments.

a)  feedback

b) business functions

c) social context

d) inputs


16. __________ are shaking-up or disrupting the ways companies do business, the jobs of managers and workers, the design of business processes, and the structure of markets.

a) IT innovations

b) Wireless networks

c) Social media

d) Social networks


17. Performance improved significantly at 1-800-Contacts after the company invested in __________ that enabled call center operators to monitor their performance as often as every 15 minutes.

a) semiautomatic business processes

b) dashboard reporting tools

c) private networks

d) social networks


18. IS capabilities support all of the following business objectives except:

a) improving productivity.

b) reducing waste.

c) facilitating collaboration.

d) automating decision making.


19. The value of an information system is determined by the relationships among ISs, people, and business processes—which are influenced strongly by: 

a) fast, accurate communication and collaboration.

b) huge amounts of information that is accessible via networks.

c) organizational culture..

d) automation of decision making


20. Widespread adoption of new technology is going to __________ the usual way business is done.

a) disrupt

b) cause minor changes in

c) destroy

d) have little effect on


21. What has made location practically irrelevant to doing business?

a) social media

b) social networks

c) widespread use of mobile devices

d) Google


22. The 1-800-CONTACTS case study showed the importance of __________ on performance.

a) daily reports

b) feedback

c) IT departments

d) training


23. Information bottleneck can create __________ that keep managers from knowing what is going on as it is going on.

a) information overload

b) blindspots

c) windows

d) dashboards


24. A negative ethical impact of mobile marketing efforts is that they can be __________.

a) invasive

b) expensive

c) innovative

d) pervasive


25. Critical business processes are those that improve employee performance and __________.

a) strategic planning

b) commodities

c) profit margins

d) business models


26. Business models include a __________, which is an analysis of the benefits of using the specific model.

a) revenue model

b) supply chain

c) value proposition

d) profit margin


27.  Managers decide to increase the number of new accounts by 4.0% within the next quarter. This is an example of:

a) an objective.

b) a strategy.

c) customer loyalty.

d) qualitative metric.


28. A company’s goals are increased sales and improved customer loyalty. Which of the following is correct?

a) Sales revenue is a rather easy-to-calculate quantitative metric.

b) Customer loyalty is a quantitative metric with a longer time dimension. 

c) Sales revenue is a quantitative metric with a longer time dimension. 

d) Customer loyalty is a qualitative metric with a shorter time dimension. 


29. In order to manage performance, a fundamental requirement is __________.

a) using real-time dashboards and reporting tools

b) being able to measure

c) knowing that the indicator is measuring the right thing

d) b and c


30. Measuring performance requires each of the following except:

a) comparing results to competitors.

b) identifying the most meaningful measures of performance.

c) being able to measure them correctly.

d) selecting the set of measures that provides a holistic indicator of performance.


31. Concern about environmental damage and reducing a company’s carbon and energy footprints on the planet has triggered efforts for __________.

a) data centers

b) EPA

c) green IT



32. __________ are a measure of the impact a business’ activities have on the environment, and in particular climate change.

a) Carbon footprints

b) Hydrogen footprints

c) Toxic wastes

d) Greenhouse emissions


33. Why are companies, such as Monsanto and Wells Fargo, willing to invest in the building of new data centers?

a) To stop wasting capital maintaining outdated energy-inefficient data centers.

b) To comply with government energy regulations.

c) To develop new computing capabilities.

d) To improve business process performance.


34. Ethical issues can be challenging because:

a) there are no standards of right and wrong.

b) security is more important than privacy.

c) all countries agree on what is ethical.

d) what is considered ethical by one person may seem unethical to another.




35. KD Company is looking to expand its business operations into a developing country. As part of SWOT analysis, KD needs to investigate that country’s:

a) political stability

b) economic stability

c) critical infrastructure

d) All of the above


36. __________ is a series of processes in which an organization selects and arranges its businesses or services to keep the organization viable even when unexpected events disrupt its businesses, markets, products, or services.

a) Strategic planning


c) Value proposition

d) Threat analysis


37. An organization’s __________ addresses questions such as, “What is the long-term direction of our business?”

a) operations

b) critical infrastructure

c) strategy

d) opportunities


38. __________ is the scanning and review of the political, social, economic and technical environment of the organization.

a) Strategic analysis

b) Business performance

c) Operational planning

d) Value analysis


39.  __________ involves the evaluation of strengths and weaknesses, which are internal factors; and opportunities and threats, which are external factors. 

a) Strategic analysis

b) Business performance

c) Operational planning

d) SWOT analysis


40. Price wars or other fierce reactions by competitors are examples of:

a) strengths.

b) weaknesses.

c) opportunities.

d) threats.


41. According to Porter’s competitive forces model, there are five major forces in an industry that affect the degree of competition. Those five forces impact:

a) sales.

b) profit margins.

c) marketing.

d) expenses.


42. FedEx and UPS have ISs that are difficult to duplicate and very expensive. Those ISs: 

a) create barriers that reduce the threat of entry.

b) increase the threat of substitute services.

c) decrease bargaining power of customers.

d) increase bargaining power of suppliers.


43. __________ involve the purchase of materials, the processing of materials into products, and delivery of products to customers.

a) Supply chains

b) Logistics

c) Primary activities

d) Support activities


44. For most organizations, if their computer networks go down, __________.

a) social networks are used

b) data centers are used to store data

c) so does the business

d) business continues as usual


45. According to Occupational Outlook Handbook, 2010-11 Edition published by the U.S. Bureau of Labor Statistics, what is the outlook for Computer and Information Systems Manager?

a) Employment is expected to grow faster than the average for all occupations.

b) A master’s degree in a computer-related field is required for entry-level positions.

c) Employment is expected to grow slower than the average for all occupations.

d) Job prospects are uncertain.






46. During the last decade, Facebook, LinkedIn, YouTube, Twitter and blogs became extensions of businesses to reach customers, prospects, and business partners.


47. The massive adoption of smart devices has created a huge base of multi-tasking users, and a market for companies to tap and target.


48. Facebook created an entirely new market and changed the game for industries who were not its usual competitors--namely, music, media, and consumer electronics companies.


49. Some types of IT, such as databases and network services, are commodities, which do not provide a special advantage.



50. A SWOT model spells out how a company creates or adds value in terms of the goods or services it produces.





51. An IS can be as small as a smartphone with a software app that can snap tags to load a Web site. Or it may include several thousand computers of various types, scanners, printers, and other devices connected to databases via wired and wireless telecommunication networks.


52. ISs have a purpose and a social or organizational context.


53. Discarded PCs and other computer equipment are waste disposal problems.


54. IT no longer creates challenging ethical issues because practices such as employee e-mail monitoring and unrestricted use of customer data are accepted as necessary or legal.


55. Strategy planning is critical for all organizations, including government agencies, healthcare, education, military, and other nonprofit and not-for-profit ones.


56. During SWOT analysis, there is usually agreement among managers because SWOT analysis is objective, forward-looking, and data-driven.


57. According to Porter’s competitive forces model, Apple, Microsoft, and auto manufacturers have strong bargaining power as suppliers because their brands are powerful.


58. Rivalry among existing firms in the industry is a competitive force that is most likely to be weak when entry barriers are low; threat of substitute products is high, and suppliers and buyers in the market attempt to control.


59. Sabermetrics is the mathematical analysis of baseball player batting and pitching performances.


60. A batch system is an IS that provides fast enough access to information or data so that an appropriate decision can be made, usually before data or situation changes.


Chapter 2 Infrastructure and Support Systems

Multiple Choice




1. __________ is the collection of hardware, software, processes, networks, and users.

a) IT infrastructure

b) IT function

c) Transaction processing system

d) MIS


2. A transaction processing system (TPS):

a) processes raw data.

b) does reporting.

c) extracts, transforms, and loads data.

d) does advanced data analysis.


3. The number of hours an employee worked in a certain week is an example of:

a) information.

b) a transaction.

c) knowledge.

d) data.


4. __________ is data that has been processed, organized, or put into context so that it has meaning and value to the person receiving it.

a) Information

b) A transaction

c) Knowledge

d) A report



5. __________ consists of data that have been processed, organized, and put into context to be meaningful, and to convey understanding, experience, accumulated learning, and expertise.

a) Information

b) A transaction

c) Knowledge

d) Wisdom


6. Managing a product recall in a way that minimizes negative impacts on sales of other products and profits is an example of:

a) data.

b) information.

c) knowledge.

d) decision.


7. A __________ consists of stored data organized for access, search, retrieval, and update. 

a) file

b) database

c) TPS

d) system


8. Why are TPSs critical systems?

a) Data need to be analyzed and reported to managers to support their decision making processes.

b) Manual systems are subject to too much human error.

c) Transactions that do not get captured can result in lost sales, dissatisfied customers, and other types of data errors. 

d) They are essential components of process control systems.


9. Processing of transactions is done in one of two modes:

a) batch and real-time.

b) online and offline.

c) manual and computerized.

d) online and real-time.


10. Which of the following is an advantage of batch processing over online transaction processing?

a) higher data quality

b) costs less

c) more up-to-date data

d) a and b


11. If a customer sets up an account with REI.com to purchase from their Web site, the __________ will validate that the address, city, and postal code are consistent and valid in order to improve __________.

a) OLTP; data storage

b) OLTP: data visibility

c) TPS; data quality

d) TPS; data transfer




12. Data errors:

a) are difficult to correct the later they are detected.

b) expose the company to legal action.

c) may never be detected and corrected.

d) all of the above


13. Victims of identity theft face enormous challenges and frustration because:

a) data errors detected later are difficult to correct.

b) data processing does not improve data quality.

c) data processing is done in real-time.

d) data processing cannot detect obvious data errors.


14. Which of the following is not an example of a routine business transaction for a manufacturing company?

a) purchase orders

b) payroll

c) consolidation

d) billing


15. General purpose reporting systems are referred to as __________ systems.

a) management information

b) decision support

c) operational

d) transactional


16. Which of the following is not an objective of MIS?

a) to provide reports to managers for tracking operations

b) to provide reports to managers for monitoring

c) to provide reports to managers for control

d) to provide reports to managers for strategic planning


17. __________ reports are created or run according to a pre-set schedule, such as daily, weekly, or quarterly.

a) Periodic

b) Exception

c) Ad hoc

d) Functional


18. Sales of fresh produce drop during an E. coli food contamination crisis. What type of reports would be generated in this unique situation?

a) Periodic

b) Exception

c) Ad hoc

d) Functional


19. Sony’s managers notice a significant change in demand for the company’s eReaders. They request that reports be generated so they can learn more about this situation. What is this type of report?

a) Periodic

b) Exception

c) Ad hoc

d) Functional


20. Decision support systems are __________ that support unstructured and semi-structured decision making.

a) interactive applications

b) reporting applications

c) operations support systems

d) process control systems


21. Deciding which new products to develop or which new markets to enter are examples of __________ decisions because they depend on human intelligence, knowledge, and/or experience. 

a) structured

b) semistructured

c) unstructured

d) routine


22. Decision makers manipulate models in a DSS to perform __________ analysis, which refers to changing assumptions or data in the model to see the impacts of those changes on the outcome. 

a) goal seeking

b) experimental

c) structured

d) what-if


23. A __________ is a visual presentation of critical data, such as the results of a report or analysis, to more quickly understand data.

a) dashboard

b) GUI

c) touch screen

d) KPI


24. __________ is a computerized process for conducting searches in large amounts of data and information in order to discover unknown valuable relationships in the data.

a) Drill down

b) Data mining

c) Business mining

d) Data analytics


25.  __________ is the science concerned with managing material and information flows to optimize supply chain operations.

a) Database management

b) Process control

c) Logistics

d) Sourcing






26. A company’s competitive advantage, such as low cost, quality, and/or speed to market, depends on:

a) how well its supply chain is aligned and managed.

b) minimizing the physical flows of its products.

c) how well it maximizes its global sourcing.

d) its ability to recycle.


27. Because Wal-Mart has thousands of suppliers to manage and is constantly looking for new ones worldwide, they invested in a new __________ strategy.

a) mobile networking

b) global sourcing

c) global support

d) mobile support


28. Wal-Mart’s global sourcing strategy is designed:

a) to reduce costs of goods, increase speed to market, and improve the quality of products.

b) to identify and evaluate marketing opportunities.

c) to increase production efficiency.

d) to process transactions in real-time.


29. By linking a company with its suppliers, vendors, and customers, the supply chain creates __________.

a) logistics inefficiencies

b) automated distribution centers

c) an extended enterprise

d) a warehouse control system


30. RFID is a technology that uses __________ instead of __________ to identify products or pallets.

a) electronic tags; bar codes

b) electronic tags; chips

c) bar codes; PINs

d) PINs; EPC tags


31. Which of the following best describes RFID implementation?

a) RFID systems are frequently implemented as stand-alone systems.

b) RFID implementation has been slow due to costs, privacy, and security concerns.

c) RFID implementations are used only to track products and pallets.

d) RFID implementation has been rapid and widespread for security reasons.


32. When employees log into the company network or e-mail accounts, or access data or documents to perform their jobs, two critical factors impacting their productivity are:

a) password strength and availability of mobile networks.

b) cloud computing and software applications.

c) virtualization and private clouds.

d) speed of the response and the reliability of the hardware.





33. A company’s __________ determines the workload that its ISs, apps, and mobile computing devices can handle and their speed.

a) TPS

b) network access point

c) IT infrastructure

d) firewall


34. IT infrastructure is the collection of:

a) hardware and software.

b) hardware, software, and networks.

c) hardware, software, networks, and mobile devices.

d) hardware, software, processes, networks, and users.


35. To improve the performance and ability to store, protect, and manage data at lower up-front costs, companies are turning to __________ options. 

a) cloud computing

b) mainframe

c) visualization

d) data center


36. __________ is the term used to refer to the Internet.

a) Shadow

b) Cloud

c) Tag

d) Chain


37. The general name for Internet-based infrastructures is __________. 

a) social networking

b) cloud computing

c) Web 1.0

d) Web 2.0



38. The U.S. Department of Defense implemented __________ to service many military agencies in order to reduce IT infrastructure costs while protecting its sensitive data.


b) cloud computing

c) a private cloud

d) virtualization


39. Which of the following represents the evolution to Internet-based infrastructure?    

a) public cloud computing; private cloud computing; virtualization

b) wired; wireless; mobile computing

c) virtualization; cloud computing; enterprise computing

d) virtualization; private cloud computing; cloud computing




40. Which of the following statements about virtualization is false?

a) Virtualization is primarily about cost-cutting.

b) Virtualization is often a key part of an enterprise’s disaster recovery plan.

c) Virtualization separates business applications and data from hardware resources to pool hardware resources.

d) Virtualization increases the flexibility of IT assets, allowing companies to consolidate IT infrastructure. 

  • Item #: 329

BUS 365 Week 2 Quiz - Strayer

Price: $9.00
* Marked fields are required.
Qty: *
Reviews (0) Write a Review
No Reviews. Write a Review