DAC1-
Practice Assessment from Connect-
1. Which of the following is not included as one of Friedman's 10 forces that flattened the world?
-Systems thinking.
2. According to Porter, companies that wish to dominate broad markets should operate using a ________ strategy.
-cost leadership with a low cost
3. Which of the following offers an example where Porter's five forces are mostly weak and competition is low?
-An international hotel chain purchasing milk.
4. Which of the following represents the different information granularities?
-Detail, summary, aggregate
5. Which of the following is not a valid way that a CRM system can collect information?
- Customer's personal computer.
6. What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time) as a partnership?
-Limited liability corporation
7. ___________ software provides additional functionality to an operating system.
-Utility
8. What part of the CPU performs all arithmetic operations and all logic operations?
- Control unit RAM Speed
None of the above (Answer)
9. What is equipment used to capture information and commands?
-Input device
10. Which type of software supports the application software and manages how the hardware devices work together?
-Operating system software
11. Why do relational databases use primary keys and foreign keys?
-To create logical relationships.
12. What type of website is best to build for a general informational website with static information?
-Static website
13. What types of BI decisions include predicting sales, determining correct inventory levels, and distribution schedules among outlets, and loss prevention?
-Retail and sales BI decisions
14. When does information cleansing occur in the data warehouse?
-During the ETL process and once it is in the data warehouse.
15. What allows web browsers and servers to send and receive web pages?
-Hypertext transfer protocol (HTTP)
16. A(n) ____________ is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together.
-network
17. A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness?
-Researching products to find the lowest price and visiting the store to purchase the item.
18. Which company is expected to gain the majority of its returns on existing investments?
Dell
Johnson & Johnson
Procter & Gamble
Phillips Petroleum* (Answer)
19. Which of the following is the example of consumer-to-government (C2G) highlighted in the figure Extended Ebusiness Models?
-egov.com
20. What refers to any type of electrical or electronic operation that is accomplished without the use of a "hard-wired" connection?
-Wireless
21. Which of the following is a potential business impact from the world’s population doubling in the next 40 years?
-Developed nations will begin to increase immigration limits.
Developed nations will find that retirees will have to remain on the job to remain competitive.
Global agriculture will be required to supply as much food as has been produced during all of human history. All of these are correct.* (Answer)
22. What caused Polaroid to go bankrupt?
-One-hour film processing and digital cameras stole its market share.
23. What is the difference between ecommerce and ebusiness?
-Ecommerce is buying and selling of goods or service online. Ebusiness includes ecommerce and all activities related to internal and external business operations.
24. Ben Schultz decides to purchase an iPad on eBay. After the transaction completes and the money is withdrawn from Ben's PayPal account, the iPad never shows up and the email address of the seller bounces. What issue has Ben encountered?
-The physical separation of buyer and seller
25. John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on Priceline, where they are allowed to set their own price they are willing to pay for the airline tickets. What form of ebusiness model are John and Jenny using?
-C2B
26. eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called a(n) ____________.
-reputation system
27. What can a model accomplish?
-Calculate risks
Understand uncertainty
Manipulate time
All of these* (Answer)
28. What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?
-Genetic algorithm
29. What is slice-and-dice capability?
-The ability to look at information from different perspectives.
30. What is the study of the effect that changes in one (or more) part of the model has on other parts of the model?
-Sensitivity analysis
31. Which of the following is an incorrect enterprise view of information technology?
-Processing is OLTP for executives and OLAP for analysts.
32. What is the systems development life cycle?
-The overall process for developing information systems from planning and analysis through implementation and maintenance.
33. Which of the following represents the phases in the SDLC?
-Plan, analyze, design, develop, test, implement, maintain
34. Which phase of the SDLC gathers business requirements?
-Analysis
35. Which of the following is a business-related consequence of software failure?
-Decreased productivity
Damage to brand reputation
Incurred liabilities
All of these* (Answer)
36. Which gate in the RUP methodology includes building and developing the product?
-Construction
37. Which of the following is not one of the tenets in the Agile Alliance's manifesto?
-Do not allow changing requirements, especially late in development.
38. Which of the following is the least common function outsourced?
-Marketing/sales
39. What is a backup?
-An exact copy of a system’s information
40. What is virtualization?
-The creation of multiple “virtual” machines on a single computing device
41. What type of metrics includes number of prospective customers, number of new customers, and number of retained customers?
-CRM metrics
42. What type of metrics includes number of marketing campaigns, new customer retention rates, and number of feedbacks by marketing campaign?
-CRM metrics
43. What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?
-Outsourcing
44. What is the act of conforming, acquiescing, or yielding?
-Compliance
45. What is a method for confirming users’ identities?
-Authentication
46. _________ engineering is using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker.
-Social
47. Information security __________ identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.
-policies
48. Which of the following is a program or device that can monitor data traveling over a network?
-Sniffer
49. What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
-Content filtering
50. Nonrepudiation is a contractual stipulation to ensure that ebusiness participants do not deny their ___________ actions.
-online
Drag and Matching------
51.
Nonrepudiation- A contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions.
Internet use policy- Contains general principles to guide the proper use of the Internet.
Cybervandalism- The electronic defacing of an existing website.
Typosquatting- A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Website name stealing- The theft of a website’s name that occurs when someone, posing as a site’s administrator, changes the ownership of the domain name assigned to the website to another website owner.
Internet censorship- Government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens.
52.
Information management- Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
Information governance- A method or system of government for information management or control.
Information compliance- The act of conforming, acquiescing, or yielding information.
Information property- An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
Ediscovery- Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
53.
Cookie : A small file deposited on a hard drive by a website containing information about customers and their web activities.
Clickstream : Records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased.
Key logger, or key trapper, software : A program that records every keystroke and mouse click.
Adware software : Generates ads that install themselves on a computer when a person downloads some other program from the Internet.
Web log : Consists of one line of information for every visitor to a website and is usually stored on a web server.
Spyware (sneakware or stealthware): Software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer’s CPU and storage for some task the user knows nothing about.
Hardware key logger : A hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
54.
Email privacy policy- Details the extent to which email messages may be read by others.
Opt-Out- Choosing to deny permission to incoming emails.
Anti-Spam policy- Simply states that email users will not send unsolicited emails (or spam)
Spam- Unsolicited email
Teegrubing- An anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
55. Which act allows any person to examine government records unless it would cause an invasion of privacy?
-Freedom of Information Act
56. Which of the following is an example of acting unethically?
-Which of the following is an example of acting unethically?
Individuals copy, use, and distribute software.
Employees search organizational databases for sensitive corporate and personal information.
Individuals hack into computer systems to steal proprietary information.
All of these are correct.* (Answer)