Skip to main content

Test Bank For Principles of Information Systems 15th Edition by Ralph Stair, Mark Perew, Lakeisha Ma

Page 1


Test Bank For

Principles of Information Systems 15th Edition

Copyright 2025

Chapter1 -14

Ch 01 Information Systems: People, Technology, Processes, and Structure

1. A well-designed information system includes some form of to monitor and control its operation.

a. feedback mechanism

b. data analysis

c. information component

d. software processing

ANSWER: a

RATIONALE: A well-designed information system includes some form of feedback mechanism to monitor and control its operation. This feedback ensures that the system continues to operate in an effective and efficient manner. Data and software are components of an information system but by themselves monitor or control an information system.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:31 PM

DATE MODIFIED: 10/22/2024 1:31 PM

2. The component of an information system makes the difference between success and failure in all organizations.

a. procedures

b. people

c. data

d. software

ANSWER: b

RATIONALE: People are involved in many aspects of information systems. You can have the right data, software, hardware, and procedures in place, but without the right people to build, maintain, interpret, and get the right results from an information system, the information system will not be successful.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information

system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:31 PM

DATE MODIFIED: 10/22/2024 1:31 PM

3. A is a set of related activities that takes input, adds value, and creates output for the customer.

a. standard

b. procedure

c. process

d. model

ANSWER: c

RATIONALE: A process is a set of related activities that takes input, adds value, and creates output for the customer. A procedure defines the steps to follow to achieve a specific end result; a model is a representation (or diagram) of something such as a process or procedure; a standard is an acceptable level of quality for a process.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

4. An organization's data center, servers, software applications, and databases are an example of its _______________________________.

a. technology infrastructure

b. five-component model

c. software

d. hardware

ANSWER: a

RATIONALE: An organization's technology infrastructure includes all of its hardware, software, databases, networks, facilities (such as data centers and server rooms), and services provided by third parties (such as outside consultants, leased hardware, third-party software, and outside storage).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

5. Which of the following is NOT an example of a process?

a. A chef makes spaghetti and serves it to a customer.

b. A salesperson takes a customer order for a truck.

c. A university student turns on a computer in the lab.

d. A porter checks in and cleans a vehicle to be re-rented.

ANSWER: c

RATIONALE: A process is a set of related activities that takes input, adds value, and creates output for the customer. An employee turning on a computer could be a step within a process, but it in itself is not a process. All of the other choices the chef, salesperson, and porter take input, add value, and create output for the customer.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 1/17/2025 4:37 AM

6. A series of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased is a ____________.

a. process

b. procedure

c. supply chain

d. value chain

ANSWER: d

RATIONALE: The value chain is a series of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased. The supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service. An organization's supply chain encompasses the processes required to get the right product or service into the right consumer's hands in the right quantity at the right time and at the right cost.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.3 - Describe the role of information systems in the value chain of a business.

TOPICS: 1.2: Value Chain

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

7. Which of the following is NOT true about Amazon's proprietary information systems?

a. They were created to manage products, vendor partners, and fulfillment centers, which enabled the company to surpass their competitors.

b. They are now a product that Amazon has sold to other companies looking to support their own supply chains.

c. They are not fully integrated into the value chain and supply chain processes and can easily be separated from their integral components.

d. They were created to allow Amazon to create, build, and maintain a strong competitive advantage in the marketplace.

ANSWER: c

RATIONALE: Amazon holds that its information systems are so intimately involved that they are part of the process itself. From the company's perspective, the information system is an integral component in the process and cannot be separated from it, whether providing input, aiding product transformation, or producing output.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.3 - Describe the role of information systems in the value chain of a business.

TOPICS: 1.2: Value Chain

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

8. Which of the following is NOT true about information systems?

a. Information systems use information technology components and apply them to solve problems.

b. Information systems create business value and perform other business tasks.

c. Good information systems can enable people to produce extraordinary results.

d. An information system's most important component is its data component.

ANSWER: d

RATIONALE: While data is an important component, all five components must function collaboratively to complete a task.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

9. Which of the following is NOT an example of a business using information systems to create a competitive advantage?

a. Home Depot uses a vendor-managed inventory system to streamline product flow and better manage its store inventories, which reduce holding costs and out-of-stocks.

b. A roofing company employs an information system to track and analyze the movement and tasks of employees on job sites to speed up the process and reduce labor costs.

c. Panera uses kiosks and online ordering so that customers place their own orders, so employees can focus more on producing the order and speeding up the ordering process.

d. A marketing firm uses an information system to keep track of its customer email list to provide monthly newsletters about its offerings and to keep track of those who wish to unsubscribe.

ANSWER: d

RATIONALE: The marketing firm may add customers using its newsletter, but it is not using its information system to create an advantage over its competitors.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.2 - Identify four benefits of creating a strategic plan.

TOPICS: 1.3: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

10. Jordan White is a new employee at your company. He introduces himself and describes his new role in the Information Systems department at the company. He says he will be responsible for collecting and analyzing finance information to solve problems and address challenges within the finance area. What is most likely his role at the company?

a. business analyst

b. systems analyst

c. chief information officer

d. data science analyst

ANSWER: a

RATIONALE: Business analysts are responsible for evaluating and solving business challenges. They must collect, review, and analyze information that enables them to make sound recommendations. They often specialize in a particular functional area, such as supply chain management, marketing, finance, or product development or, in an industry like healthcare, consumer products, or transportation, among others.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.1 - Identify two key leadership responsibilities in implementing successful information systems.

TOPICS: 1.4: Information Systems Careers

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

11. An information system is a combination of hardware and software components, along with _________, processes, and people, that function collaboratively to complete a task.

a. feedback

b. data

c. information

d. transactions

ANSWER: b

RATIONALE: Data is the missing component. By definition, an information system is a combination of hardware and software components, along with data, processes, and people, that function collaboratively to complete a task.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

12. Strategic planning is a process that helps leaders identify initiatives and projects that will achieve objectives.

a. organizational

b. communication

c. information

d. management

ANSWER: a

RATIONALE: Strategic planning is a process that helps leaders identify initiatives and projects that will achieve organizational objectives. Strategic planning provides the ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.2 - Identify four benefits of creating a strategic plan.

TOPICS: 1.3: Strategic Planning

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

13. Which of the following is NOT a benefit of strategic planning?

a. Focuses the organization's resources on agreed-on key priorities.

b. Allows the organization to take advantage of opportunities and trends.

c. Improves communication among the organization's customers.

d. Provides direction to guide decision making across all organizational units.

ANSWER: c

RATIONALE:

Strategic planning provides the following benefits: A framework and a clearly defined direction to guide decision making at all levels and across all organizational units; the most effective use of the organization's resources by focusing those resources on agreed-on key priorities; the ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them; and improved communication among management, employees, the board of directors, shareholders, and other interested parties.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.2 - Identify four benefits of creating a strategic plan.

TOPICS: 1.3: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

14. An organization develops an overall strategic plan, which then sets the direction for of the organization.

a. the customers

b. data applications

c. supplier analysts

d. other business units

ANSWER: d

RATIONALE: An organization develops an overall strategic plan, which sets the direction for all the other business units of the organization. Leaders of the various business units also develop a strategic plan that is consistent with the overall organizational plan.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.2 - Identify four benefits of creating a strategic plan.

TOPICS: 1.3: Strategic Planning

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

15. Three-One-Three Restaurants has asked a software company to create a program within their online app in which customers can create an account and earn points for dining at the restaurant. Once customers have earned enough points, they can redeem them for free items such as appetizers and meals. Which strategic theme is the restaurant using?

a. increase market share

b. attract and retain new customers

c. increase customer loyalty

d. reduce time required to deliver products

ANSWER: c

RATIONALE:

Common themes in setting strategies include increasing customer loyalty. In this example, the restaurant wanted to increase its customer loyalty through the use of a loyalty program built into their app. Customers would be motivated to earn points so they could redeem them for free food.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.2 - Identify four benefits of creating a strategic plan.

TOPICS: 1.3: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

16. To maintain ________________, organizations and their products and services must continually evolve to account for changes in customer needs, market conditions, industry conditions, and competitor actions.

a. an information system

b. a consolidation strategy

c. competitive advantage

d. Leavitt's Diamond

ANSWER: c

RATIONALE: Organizations must recognize that considerable effort may be required to sustain a competitive advantage. Organizations and their products and services must continually evolve to account for changes in customer needs, market and industry conditions, and competitor actions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.2 - Identify four benefits of creating a strategic plan.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

17. XiaoJing is the vice president of marketing for Three-One-Three Restaurants. The company has implemented a new marketing information system and, according to Leavitt's Diamond, XiaoJing now has the key responsibility to ensure that the people, _________________, and structure components are fully addressed.

a. processes

b. data

c. hardware

d. software

ANSWER: a

RATIONALE: In the model known as Leavitt's Diamond, an organization's information systems operate within the context of people, technology infrastructure, structure, and processes. Organizations use this model to introduce new systems into the workplace in a manner that lowers stress, encourages teamwork, and increases the probability of a successful implementation.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.2 - Identify four benefits of creating a strategic plan.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

18. are people who work directly with information systems and can include anyone in the organization such as receptionists, financial managers, salespeople, executives, and manufacturing line operators.

a. Chief information officers

b. Software developers

c. End users

d. Business analysts

ANSWER: c

RATIONALE: End users are people who work directly with information systems to get results. They can include anyone in the organization receptionists, financial managers, product development personnel, salespeople, human resource managers, marketing representatives, warehouse workers, executives, and manufacturing line operators.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 1/16/2025 4:02 AM

19. Jane is training a new employee and is detailing the steps she takes to create an order in the company's information system. She is discussing the __________________.

a. process

b. procedure

c. technology infrastructure

d. hardware

ANSWER: b

RATIONALE: A procedure defines the steps to follow to achieve a specific end result, such as how to enter a customer order, pay a supplier invoice, or request a current inventory report. This is different from a process, which is a structured set of related activities that takes input, adds value, and creates output for the customer of that process.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

20. is one of the five components of an information system and includes programs and applications you use, such as Microsoft Word, and the operating systems that run your devices.

a. Procedures

b. Software

c. Technology infrastructure

d. Hardware

ANSWER: b

RATIONALE: Software includes the programs and applications that you use, such as Microsoft Word, the Safari browser, Instagram, or the texting or camera app on your phone. Software also includes the operating systems that run your devices, such as Microsoft Windows or macOS on your laptop or workstation and Android or iOS on your smartphone.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 1/16/2025 4:11 AM

21. Complete the sentence about the Five-Component Model. is all the technology components you can touch, whereas is intangible and includes the programs that you interact with to perform tasks and functions.

a. software, hardware

b. hardware, data

c. hardware, software

d. technology infrastructure, data

ANSWER: c

RATIONALE:

Hardware is all the technology components you can touch. The keyboard you type on, the mouse you use to move the pointer, the screen where you view information, and your smartphone, for example. Software includes the programs and applications that you use, such as Microsoft Word, the Safari browser, Instagram, the texting or camera app on your phone. Software also includes the operating systems that run your devices, such as Microsoft Windows or macOS on your laptop or workstation and Android or iOS on your smartphone.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

22. is/are the central component(s) of the Five-Component Model and includes information about customers, products, inventories, orders, vendors, and employees.

a. Data

b. Hardware

c. Software

d. Processes

ANSWER: a

RATIONALE: Data is the central component of the Five-Component Model. The software provides the functionality for you to input, manipulate, or retrieve data and includes information about customers, products, inventories, orders, vendors, and employees.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 1/16/2025 4:16 AM

23. The Five-Component Model states that changes to the side are easier to make than those to the side.

a. technology, human

b. hardware, software

c. human, processes

d. software, hardware

ANSWER: a

RATIONALE: The Five-Component Model states that changes to the technology side are easier to make than those to the business or human side. For example, hardware, such as a monitor, can be replaced in minutes. Software can be changed in minutes to days. However, changing the behavior of people, teaching them new processes or new methods, can take days, months, or even years.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

24. The Five-Component Model also shows that information systems move work away from and into ____________.

a. technology, people

b. people, technology

c. people, processes

d. software, hardware

ANSWER: b

RATIONALE: The Five-Component Model also shows that information systems move work away from people and into technology.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.4 - Describe each of the five elements that make up an information system.

TOPICS: 1.1: What Is an Information System?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

25. The encompasses the processes required to get the right product or service into the right consumer's hands in the right quantity at the right time and at the right cost.

a. value chain

b. supply chain

c. technology infrastructure

d. structure

ANSWER: b

RATIONALE: The supply chain encompasses the processes required to get the right product or service into the right consumer's hands in the right quantity at the right time and at the right cost.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.3 - Describe the role of information systems in the value chain of a business.

TOPICS: 1.2: Value Chain

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

26. The is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing, and sales.

a. hardware

b. strategic planning

c. technology infrastructure

d. supply chain

ANSWER: d

RATIONALE:

The supply chain is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing, and sales.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.3 - Describe the role of information systems in the value chain of a business.

TOPICS: 1.2: Value Chain

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

27. The supply chain includes four main support processes: technology infrastructure, human resource management, accounting and finance, and ________________.

a. procurement

b. marketing

c. service providers

d. eCommerce

ANSWER: a

RATIONALE: The supply chain includes four main support processes: technology infrastructure, human resource management, accounting and finance, and procurement.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.3 - Describe the role of information systems in the value chain of a business.

TOPICS: 1.2: Value Chain

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

28. Which information systems career employs the department's resources (including equipment, budgets, and personnel) in a manner that best achieves the goals of the organization?

a. chief information officer

b. software developer

c. business analyst

d. systems analyst

ANSWER: a

RATIONALE: The role of the CIO is to employ an information systems department's resources (including equipment, budgets, and personnel) in a manner that best achieves the goals of the organization.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.1 - Identify two key leadership responsibilities in implementing successful information systems.

TOPICS: 1.4: Information Systems Careers

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

29. Which information systems career frequently consults with management and users to define the scope of and requirements for new information systems and conveys system requirements to software developers and network architects for implementation?

a. chief information officer

b. software developer

c. business analyst

d. systems analyst

ANSWER: d

RATIONALE: The systems analyst frequently consults with management and users to define the scope of and requirements for new information systems and conveys system requirements to software developers and network architects for implementation.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.1 - Identify two key leadership responsibilities in implementing successful information systems.

TOPICS: 1.4: Information Systems Careers

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

30. Which information systems career is responsible for improving a company's competitiveness and performance across a broad spectrum of criteria, often specializing in a particular functional area?

a. chief information officer

b. software developer

c. business analyst

d. systems analyst

ANSWER: c

RATIONALE: A business analyst is responsible for improving a company's competitiveness and performance across a broad spectrum of criteria, often specializing in a particular functional area.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.1.1 - Identify two key leadership responsibilities in implementing successful information systems.

TOPICS: 1.4: Information Systems Careers

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:32 PM

DATE MODIFIED: 10/22/2024 1:32 PM

1. A is a widely accepted principle that guides how people behave and make decisions in the organization.

a. vision

b. core value

c. mission

d. strategy

ANSWER: b

RATIONALE: A core value is a widely accepted principle that guides how people behave and make decisions in the organization.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.1 - Describe why a business needs to create values, mission, and vision statements.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

2. Which phase of the strategic planning process involves written descriptions of what the business wants to achieve?

a. set objectives and key results

b. define strategies

c. deploy the plan

d. analyze the situation

ANSWER: a

RATIONALE: Strategic planning can be divided into four phases: analyze the situation, set objectives and key results, define strategies, and deploy the plan. The set objectives and key results phase involves defining the objectives of the organization and the key results for measuring success in achieving those objectives.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

3. During the phase of the strategic planning process, the strategic plan (i.e., the mission, vision, values, objectives, key results, and strategies) is communicated from which organizational units' managers can develop detailed plans.

a. set objectives and key results

b. define strategies

c. deploy the plan

d. analyze the situation

ANSWER: c

RATIONALE: Strategic planning can be divided into four phases: analyze the situation, set objectives and key results, define strategies, and deploy the plan. The deploy the plan phase includes communicating the organization's mission, vision, values, objectives, key results, and strategies so that everyone can help define the actions required to meet organizational objectives.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

4. is the process of significantly modifying existing services, products, and procedures using information systems, especially in the expanded use of connectivity.

a. Business process reengineering

b. Digital transformation

c. Innovation

d. SWOT analysis

ANSWER: b

RATIONALE: Digital transformation is the process of significantly modifying existing services, products, and procedures using information systems, especially in the expanded use of connectivity.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.3 - Describe how IT planning is tied to organizational strategic planning.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

5. McDonald's has introduced mobile ordering through its app where customers order and pay for their meals as well as earn points for future products. Mobile ordering through the app has increased the efficiency of the company's ordering and order fulfillment processes, reducing customer wait times and increasing loyalty. Mobile ordering is an example of ________________.

a. disruptive innovation

b. digital transformation

c. strategic planning

d. organizational change

ANSWER: b

RATIONALE: Digital transformation (DTX) is the process of significantly modifying existing services, products, and procedures using information systems, especially in the expanded use of connectivity. The objective of DTX is to bring new value and efficiency to the customer experience by modernizing processes that may be slow, manual, disconnected, or otherwise inefficient.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.3 - Describe how IT planning is tied to organizational strategic planning.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

6. A significant contributor to IT project failures is overlooking how the project deals with ___________.

a. organizational change

b. digital transformation

c. strategy

d. the change model

ANSWER: a

RATIONALE: It is estimated that 20 percent of all IT projects fail and only 35 percent achieve their full objectives. There are many reasons for these failures, but often failure is caused by not managing the organizational change, the people and their expectations, or the processes and technology.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.4 - Outline the drivers and obstacles for users adopting new technology.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

7. consists of the major understandings and assumptions for an organization. The understandings, which can include common beliefs, values, and approaches to decision making, are often neither stated nor documented as objectives or formal policies.

a. Organizational change

b. The soft side of implementing change

c. Strategic planning

d. Organizational culture

ANSWER: d

RATIONALE: Organizational culture consists of the major understandings and assumptions for an organization. The understandings, which can include common beliefs, values, and approaches to decision making, are often neither stated nor documented as objectives or formal policies.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.4 - Outline the drivers and obstacles for users adopting new technology.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

8. The following are examples of the benefits of strategic planning EXCEPT:

a. ensures the organization is proactive and takes advantage of opportunities and trends

b. enables all organizational units to work together toward a common set of objectives

c. provides a set of measures for IT spending on organizational projects

d. provides a framework and a clearly defined direction to guide decision making

ANSWER: c

RATIONALE: Strategic planning does include steps for creating measures, but they are not necessarily specific to any one department of the organization. All the remaining options are benefits of strategic planning.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.1 - Describe why a business needs to create values, mission, and vision statements.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

9. Together, the values, vision, and mission create the fundamental of a company.

a. OKRs

b. culture

c. objectives

d. core values

ANSWER: b

RATIONALE: Together, the values, vision, and mission create the fundamental culture of a company through the establishment of the most basic priorities, direction, and expectations.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.1 - Describe why a business needs to create values, mission, and vision statements.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

10. The are temporary and will change constantly, whereas the values, __________, and vision will often not change.

a. mission, projects

b. initiatives, mission

c. objectives, mission

d. key results, projects

ANSWER: b

RATIONALE: The initiatives, programs, and projects selected to achieve those objectives and key results are all temporary and will change constantly. Because they are the basis for an organization's reason to exist, the values, mission, and vision will not often change. The objectives and key results defined to fulfill the mission and vision, while staying true to the values, will change on a regular basis after careful consideration.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.1 - Describe why a business needs to create values, mission, and vision

statements.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

11. The most frequently used model or framework for assessing the nature of industry competition is _________, which determines the level of competition and long-term profitability of an industry.

a. Porter's Five Forces Model

b. strategic planning

c. objectives and key results

d. total cost of ownership

ANSWER: a

RATIONALE: The most frequently used model for assessing the nature of industry competition is Porter's Five Forces Model, which identifies the bargaining power of suppliers and buyers, the threat of new entrants and substitute products, and the existing industry competitors, which determine the level of competition and long-term profitability of an industry.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

12. Adobe Systems products are widely used in creative industries, such as graphic design, photography, and multimedia production. Two of its well-known products are Adobe Photoshop and Acrobat. These products have come to be known as the industry standard in many creative fields and make it hard for individuals and organizations to switch to another software program. In terms of Porter's Five Forces Model, this is an example of what force?

a. the bargaining power of suppliers

b. the threat of new entrants

c. the bargaining power of buyers

d. rivalry among existing competitors

ANSWER: b

RATIONALE: In this example, Adobe has been the industry standard for so long that it would be very hard for a new competitor to take over. Users and organizations have spent much time and money investing in Adobe software. It would be hard, and costly (in terms of both time and money), to switch to an alternative software program.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.4 - Outline the drivers and obstacles for users adopting new technology.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

13. You were recently given a digital camera and are considering starting a photography business. You decide to evaluate the industry in terms of Porter's Five Forces Model. Which of the following statements is true?

a. The bargaining power of buyers is very low.

b. The threat of new entrants is very low.

c. Rivalry among existing competitors is very low.

d. The threat of new entrants is very high.

ANSWER: d

RATIONALE: In this example, anyone with some skill and a camera can start a photography business. Therefore, the threat of new entrants is very high. Also, rivalry among competitors would be high because there are many full-time and part-time photographers. Because there is so much competition, buyers have much bargaining power.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

14. Which of the statements below is NOT true about the United States domestic airline industry based on analyzing the industry with Porter's Five Forces Model?

a. The bargaining power of buyers is high.

b. The threat of new entrants is low.

c. Rivalry among existing competitors is high.

d. The threat of new entrants is high.

ANSWER: d

RATIONALE: The threat of new entrants is low. To enter the aviation market requires a lot of capital (i.e., buying expensive planes) as well as access to airport gates and numerous regulatory approvals. The bargaining power of buyers is high. Although unable to demand a specific price, buyers can easily switch to the lowest-cost carrier. The rivalry among competitors is high. Many airlines compete to fly the same routes, and most offer similar services and experiences (a basic seat to your destination).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

15. is an internal assessment that identifies most of the strengths and weaknesses for an organization, while the analysis of the external environment uncovers most of the opportunities and threats.

a. SWOT analysis

b. OKRs

c. Strategic planning

d. TCO

ANSWER: a

RATIONALE: The analysis of an organization's internal assessment and study of its external environment is summarized into a Strengths, Weaknesses, Opportunities, Threats (SWOT) analysis.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

16. is a system for creating alignment and engagement around measurable and ambitious goals.

a. SWOT analysis

b. OKRs

c. Strategic planning

d. TCO

ANSWER: b

RATIONALE: Objectives and key results (OKRs) is a system for creating alignment and engagement around measurable and ambitious goals.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

17. A(n) is a specific, measurable result that must be achieved to reach an objective.

a. strategy

b. key result

c. program

d. initiative

ANSWER: b

RATIONALE: A key result is a specific, measurable result that must be achieved to reach an objective.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

18. A(n)____________ is a temporary endeavor that creates an actionable plan, allowing organizations to achieve their objectives and key results.

a. strategy

b. project

c. program

d. initiative

ANSWER: b

RATIONALE: A project is a temporary endeavor that creates an actionable plan, allowing organizations to achieve their objectives and key results.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

19. Which of the following should NOT be considered when evaluating information systems projects?

a. the tangible benefits of the project

b. the intangible benefits of the project

c. the rate of return of the project

d. the stakeholder communication plan for the project

ANSWER: d

RATIONALE: The communication plan should be an important part of the project plan, but it is not important when evaluating whether to initiate a project.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.2 - Create meaningful and measurable objectives and key results.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

20. is the application of new ideas to the products, processes, and activities of a firm, leading to increased value.

a. Strategy

b. Reengineering

c. Innovation

d. Continuous improvement

ANSWER: c

RATIONALE: Innovation is the application of new ideas to the products, processes, and activities of a firm, leading to increased value.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.3 - Describe how IT planning is tied to organizational strategic planning.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

21. is/are the catalyst for the growth and success of any organization. It can build and sustain profits, create new challenges for the competition, and provide added value for customers.

a. Initiatives

b. Continuous improvement

c. Innovation

d. Reengineering

ANSWER: c

RATIONALE: Innovation is the application of new ideas to the products, processes, and activities of a firm, leading to increased value. It is the catalyst for the growth and success of any organization. It can build and sustain profits, create new challenges for the competition, and provide added value for customers.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.3 - Describe how IT planning is tied to organizational strategic planning.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

22. Organizations must occasionally change how they do business to stay competitive. involves radical process redesign, while seeks to improve processes and add value to products and services.

a. Innovation, Kaizen

b. Continuous Improvement, Total Quality Management

c. Reengineering, Continuous Improvement

d. Kaizen, Total Quality Management

ANSWER: c

RATIONALE: Reengineering, also called process redesign, involves the radical redesign of business processes, organizational structure, information systems, and values of the organization to achieve a breakthrough in business results. Continuous Improvement, also known as Kaizen, involves constantly seeking ways to improve business processes and add value to products and services.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.3 - Describe how IT planning is tied to organizational strategic planning.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

23. When first introduced in 1973, handheld cell phones were a(n) innovation; Apple disrupted this market in 2007. Since then, Apple has relied on innovation of the iPhone.

a. disruptive, continuous

b. disruptive, sustaining

c. continuous, catalytic

d. engineering, incremental

ANSWER: b

RATIONALE:

Several high-tech companies, e.g., Apple and Microsoft, have become industry powerhouses by using sustaining innovation. Apple disrupted the cellular phone market in 2007 when it released the first iPhone, but since then, it has continually improved on the same technology. The cell phone is a good example of a disruptive innovation. The first commercial handheld cell phone was invented in 1973; it weighed 2.5 pounds, sold for $3,000, and had poor sound quality. Over time, the cell phone has evolved into today's ubiquitous smartphone with one-fifteenth the weight, one-third the cost, and over 40 times longer battery life than the first cell phone.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.4 - Outline the drivers and obstacles for users adopting new technology.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 1/16/2025 4:21 AM

24. Blondeaut Electronics Supply has shifted from a paper-based inventory system to one that uses automated RFID (radio-frequency identification), which eliminated unnecessary steps that did not add value and changing the process by which inventory is counted. The company employed ____________, resulting in a reduction of costs and improved inventory tracking.

a. strategic planning

b. continuous improvement

c. innovation

d. reengineering

ANSWER: d

RATIONALE: Business process reengineering involves the radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES:

TOPICS:

PerVa.POIS5E.25.2.3 - Describe how IT planning is tied to organizational strategic planning.

2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

25. Popular methods include Lean, Six Sigma, and Total Quality Management.

a. strategic planning

b. continuous improvement

c. innovation

d. reengineering

ANSWER: b

RATIONALE: Popular continuous improvement methods include Lean, Six Sigma, and Total Quality Management.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.3 - Describe how IT planning is tied to organizational strategic planning.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

26. involves top-down change driven by senior executives, whereas involves bottom-up change driven by workers.

a. Continuous improvement, strategic planning

b. Continuous improvement, reengineering

c. Strategic planning, reengineering

d. Reengineering, continuous improvement

ANSWER: d

RATIONALE:

Reengineering involves top-down change driven by senior executives, whereas continuous improvement involves bottom-up change driven by workers.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.3 - Describe how IT planning is tied to organizational strategic planning.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

27. Which of the following is a theoretical framework that assesses the perceived usefulness and perceived ease of use for a technology or information system?

a. Six Sigma

b. technology acceptance model

c. diffusion of innovation theory

d. change model

ANSWER: b

RATIONALE: The technology acceptance model specifies the factors that can lead to better attitudes about the use of a new information system, along with its higher acceptance and usage. In this model, "perceived usefulness" is defined as the degree to which individuals believe that using the system will improve their performance. The "perceived ease of use" is the degree to which individuals believe that the system will be easy to learn and use.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.4 - Outline the drivers and obstacles for users adopting new technology.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

28. A key point of a/the is that adoption of any innovation does not happen all at once for all members of the targeted population; rather, it is a drawn-out process, with some people quicker to adopt the innovation than others.

a. Six Sigma

b. technology acceptance model

c. diffusion of innovation theory

d. change model

ANSWER: c

RATIONALE: A key point of the diffusion of innovation theory is that adoption of any innovation does not happen all at once for all members of the targeted population; rather, it is a drawn-out process, with some people quicker to adopt the innovation than others.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.4 - Outline the drivers and obstacles for users adopting new technology.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

29. The CIO of Rose Inc. is an opinion leader whom others listen to and follow. She is aware of the need for change in adopting a new AI technology to help grow her business but needs assistance getting started. According to the diffusion of innovation theory, the CIO is an example of a(n) innovation adopter.

a. early adopter

b. innovator

c. laggard

d. early majority

ANSWER: a

RATIONALE: The CIO is an early adopter, characterized by being an opinion leader and someone who is aware of the need for change. Early adopters need assistance getting started with new technologies.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.4 - Outline the drivers and obstacles for users adopting new technology.

TOPICS: 2.2: Innovation and Change in the Organization

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

30. A karate dojo has the following statement for their business on their website: "To cultivate disciplined martial artists who exemplify strength, respect, and personal growth." This is likely its .

a. strategy

b. core value

c. mission

d. vision

ANSWER: d

RATIONALE: The organization's vision is a concise statement of what the organization intends to achieve in the future. This may include how the organization, its stakeholders, and the community will benefit. The following are the earmarks of a good vision: it motivates and inspires; it is easy to communicate, simple to understand, and memorable; it is challenging and yet achievable and moves the organization toward

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.2.1 - Describe why a business needs to create values, mission, and vision statements.

TOPICS: 2.1: Strategic Planning

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

1. A(n) is a temporary endeavor undertaken to create a unique product, service, or result.

a. project

b. project requirement

c. technical resource

d. work breakdown structure (WBS)

ANSWER: a

RATIONALE: A project is a temporary endeavor undertaken to create a unique product, service, or result.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

2. Projects must align with _____________.

a. IT projects

b. business objectives

c. customer goals

d. budget overruns

ANSWER: b

RATIONALE: It is important that projects align with business objectives. Doing a project that does not align with the business strategy, goals, and mission of the organization would be a wasted effort.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

3. Approximately percent of all IT projects fail or face major challenges such as a lack of required features, schedule overruns, and budget overruns.

a. 33

b. 90

c. 61

d. 15

ANSWER: c

RATIONALE: Approximately 61 percent of all IT projects fail or face major challenges such as a lack of required features, schedule overruns, and budget overruns.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

4. The main reason for project failure is:

a. a lack of customer service satisfaction.

b. inconsistent project human resources.

c. a lack of alignment between the company's strategic plan and the project.

d. software and hardware failures.

ANSWER: c

RATIONALE: The main reason for project failure is a lack of alignment between the company's strategic plan and the project.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

5. are routine, day-to-day activities performed by a business to fulfill its mission and vision.

a. Projects

b. Work breakdown structures

c. Scope management

d. Operations

ANSWER: d

RATIONALE: Operations are routine, day-to-day activities performed by a business to fulfill its mission and vision. A project is a temporary endeavor undertaken to create a unique product, service, or result. Projects have a definite start and end, whereas operations are ongoing.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

6. is/are temporary, while is/are ongoing.

a. Projects; operations

b. Work breakdown structures; scope management

c. Scope management; operations

d. Operations; projects

ANSWER: a

RATIONALE: A project is temporary endeavor undertaken to create a unique product, service, or result. Operations are routine, day-to-day activities performed by a business to fulfill its mission and vision.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

7. Which of the following is not an example of a project for an automotive supplier that manufactures auto parts?

a. integration of two organizations following a merger

b. manufacturing of tires to sell to a customer

c. upgrade of plant software to incorporate new robots

d. plan to launch a new HR initiative

ANSWER: b

RATIONALE: The manufacturing of tires by an automotive supplier is essentially that company's day-to-day operations and is not a project. Recall a project is a temporary endeavor. The integration of two organizations after a merger, the upgrade of software, and the planning of a new initiative are all temporary and thus are projects.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

8. is something a firm can do well and provides customer benefits, is hard for customers to imitate, and can be leveraged widely to many products and markets.

a. Project management

b. Scope management

c. Integration management

d. Core competency

ANSWER: d

RATIONALE: Core competency is something a firm can do well and provides customer benefits, is hard for customers to imitate, and can be leveraged widely to many products and markets.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

9. Because the Project Charter recognizes the project and contains ____________, ___________, and __________; it is the most critical project management tool.

a. Project Objectives; Assumptions; Core Competencies

b. Project Description; Project Objectives; Assumptions

c. Project Objectives; Assumptions; Roles and Responsibilities

d. Project Description; Assumptions; Core Competencies

ANSWER: c

RATIONALE: The project charter contains the project objectives, key results to show how the objectives were being met, and other relevant details. As one project participant stated, "The most critical tool that requires greater attention and quality is the project charter. This document should be used throughout the project lifecycle."

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 1/17/2025 4:37 AM

10. Project management is part ________, which involves communication and psychology in convincing others to change, and part __________, which uses time-tested, repeatable processes and techniques to achieve project objectives.

a. art; science

b. science; art

c. integration management; knowledge management

d. knowledge management; science

ANSWER: a

RATIONALE: Project management is part art, which involves communication and psychology in convincing others to change, and part science, which uses time-tested, repeatable processes and techniques to achieve project objectives.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

11. requires coordinating all the appropriate people, assets, plans, knowledge, and efforts to complete a project successfully.

a. Scope management

b. Project integration management

c. Knowledge management

d. Work breakdown structure

ANSWER: b

RATIONALE: Project integration management requires coordinating all the appropriate people, assets, plans, knowledge, and efforts to complete a project successfully. Scope management includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon scope. Knowledge management is the process of sharing collective knowledge within an organization.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

12. management includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon requirements that were decided at the initiation of the project.

a. Scope

b. Project integration

c. Knowledge

d. Schedule

ANSWER: a

RATIONALE: Scope management includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon requirements that were decided at the initiation of the project. Project integration management requires coordinating all the appropriate people, assets, plans, knowledge, and efforts to complete a project successfully. Knowledge management is the process of sharing collective knowledge within an organization. Schedule management includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

13. Which of the following is false regarding a project when there is a change in project scope?

a. The project manager and key business leaders should decide whether they will allow scope changes.

b. Once the change is requested, a formal scope change process document will need to be updated.

c. The affected team members should discuss and accept the change.

d. Time and effort must be allowed to assess how the scope change will affect the project variables of cost, schedule, quality, and expectations.

ANSWER: c

RATIONALE: Changes should be made to a project when, for example, a new law or regulation is put in place that affects the project. The project manager and key business leaders should discuss and decide whether they will allow scope changes. Affected team members should be part of the discussion, but they alone should not accept a change. A formal scope process change document should be completed when a change has been requested. Time and effort must be allowed to assess how the scope change will affect the project variables of cost, schedule, quality, and expectations.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

14. A identifies the project activities that must be completed, the expected start and end dates, and what resources are assigned to each task.

a. project milestone

b. critical path

c. work breakdown structure

d. project schedule

ANSWER: d

RATIONALE: A project schedule identifies the project activities that must be completed, and includes the expected start and end dates, and what resources are assigned to each task. A work breakdown structure is an outline of the work to be done to complete the project. It does not include the timeline. The work breakdown structure is created first and from there a project schedule can be created. A project milestone is a critical date for completing a major part of the project, such as program design, coding, testing, and release (for a programming project). The critical path of a project consists of the set of project activities that, if delayed, would delay the entire project. They are only a subset of activities, not all of the activities to complete the project.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

15. The of a project consists of the set of project activities that, if delayed, would delay the entire project. These activities have zero slack time.

a. project milestones

b. critical path

c. work breakdown structure

d. project schedule

ANSWER: b

RATIONALE: The critical path of a project consists of the set of project activities that, if delayed, would delay the entire project. A delay in any of these activities causes the schedule to shift for all subsequent activities, i.e., these activities have zero slack time. Critical path tasks are a subset of tasks found in the work breakdown structure and project schedule. A project milestone is a critical date for completing a major part of the project, such as program design, coding, testing, and release (for a programming

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 1/17/2025 4:38 AM

16. The is an outline of the work to be done to complete the project. It consists of various stages or groups of activities that need to be performed. The detailed tasks associated with each project stage are identified.

a. project milestones

b. critical path

c. work breakdown structure

d. project schedule

ANSWER: c

RATIONALE: A work breakdown structure is an outline of the work to be done to complete the project. You start by breaking the project into various stages or groups of activities that need to be performed. Then, you identify the detailed tasks associated with each project stage. The schedule is the sequence in which the work will be performed; the work is organized into stages or groups. It must contain all work tasks in the WBS. A project milestone is a critical date for completing a major part of the project, such as program design, coding, testing, and release (for a programming project). The critical path of a project consists of the set of project activities that, if delayed, would delay the entire project. They are only a subset of activities, not all of the activities to complete the project.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

17. A design document, an implementation plan, completion of a portion of software coding, testing results, an end-user training plan, or post-implementation validation are all examples of ___________.

a. project objective

b. a critical path

c. a work breakdown structure

d. deliverables

ANSWER: d

RATIONALE: A deliverable is a tangible output such as a design document, an implementation plan, completion of a portion of software coding, testing results, an end-user training plan, or post-implementation validation. The work breakdown structure is an outline of the work to be done to complete the project. You start by breaking the project into various stages or groups of activities that need to be performed. Then, you identify the detailed tasks associated with each project stage. A task produces a specific deliverable. The critical path of a project consists of the set of project activities that, if delayed, would delay the entire project.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

18. The document that displays the dependencies among all the project's tasks and helps determine the length of the project is the _________________.

a. project milestone

b. network diagram

c. work breakdown structure

d. analysis matrix

ANSWER: b

RATIONALE: A network diagram is a document that displays the dependencies among all the project's tasks and helps determine the length of the project. A Gantt chart provides this same information. The work breakdown structure is an outline of the work to be done to complete the project, however, it does not display project dependencies. A project milestone is a critical date for completing a major part of the project. A project milestone can be made up of many tasks. It is not a document itself and does not display dependencies or determine the length of the project. An analysis matrix is a diagram that is used to compare alternatives.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 1/17/2025 4:39 AM

19. Quality management is:

a. an outline of the work to be done to complete the project.

b. consists of the set of project activities that, if delayed, would delay the entire project.

c. a set of activities designed to ensure that a project will meet the needs for which it was undertaken.

d. includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon scope.

ANSWER: c

RATIONALE: Quality management is a set of activities designed to ensure that a project will meet the needs for which it was undertaken.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

20. involves evaluating the progress of the project on an ongoing basis to ensure that it meets the identified quality standards, whereas involves checking project results to ensure that they meet identified quality standards.

a. Quality planning; quality assurance

b. Quality assurance; quality planning

c. Quality control; quality assurance

d. Quality assurance; quality control

ANSWER: d

RATIONALE: Quality assurance involves evaluating the progress of the project on an ongoing basis to ensure that it meets the identified quality standards. Quality control involves checking project results to ensure that they meet identified quality standards. In many IS-related systems development projects, the source of most defects uncovered in system testing can be traced back to an error in specifying requirements. Quality planning involves determining which quality standards are relevant to the project and determining how they will be met.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

21. Acquiring equipment, materials, and staff; improving team communication and competencies; tracking team performance; and resolving team issues are some of the activities related to management.

a. scope

b. project integration

c. knowledge

d. project resource

ANSWER: d

RATIONALE: Acquiring equipment, materials, and staff; improving team communication and competencies; tracking team performance; and resolving team issues are some of the activities related to project resource management.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

22. Which of the following is true?

a. The project team and the sponsoring business unit should take equal responsibility in making the project a success.

b. The project team should take more responsibility than the sponsoring business unit in making the project a success.

c. The sponsoring business unit should take more responsibility than the project team in making the project a success.

d. The project stakeholders and the sponsoring business unit should take equal responsibility in making the project a success.

ANSWER: a

RATIONALE: The project team and the sponsoring business unit should take equal responsibility for making the project a success.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

23. What are the five highly interrelated parameters of a project?

a. Scope, schedule, quality, stakeholders, and deliverables

b. Cost, schedule, quality, user requirements, and scope

c. Quality, cost, services, schedule, and stakeholders

d. Schedule, user requirements, quality, Gantt chart, and cost

ANSWER: b

RATIONALE: The five highly interrelated parameters of a project are cost, schedule, quality, user requirements, and scope.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.4 - Identify the five highly interrelated parameters that define a project.

TOPICS: 3.2: Interconnected Project Attributes

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

24. A __________is a subject-matter expert in an information system topic of value to the project.

a. project champion

b. technical resource

c. project sponsor

d. project stakeholder

ANSWER: b

RATIONALE: A technical resource is a subject-matter expert in an information system topic of value to the project. A project sponsor is a senior manager from the business unit most affected by the project. A project champion is a well-respected leader with a passion to see the project succeed and who removes barriers to the success of the project. A project stakeholder is a person involved in the project or someone affected by its outcome. The project sponsor, champion, or stakeholder may not always possess subject-matter expertise.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 1/17/2025 4:40 AM

25. management is a set of activities related to the acquisition of goods and/or services for a project from sources outside the performing organization.

a. Project resource

b. Project integration

c. Scope

d. Procurement

ANSWER: d

RATIONALE: Procurement management specifically addresses the acquisition of goods and/or

services from external resources. Project integration management requires coordinating all aspects of the project such as appropriate people, assets, plans, knowledge, and efforts to complete a project successfully. Scope management includes defining the work that must be done as part of the project and then controlling the work to stay within the agreed-upon scope. Project resource management is a set of activities designed to identify, acquire, and manage resources for a project. These are resources that are internal to the organization.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 1/17/2025 4:40 AM

26. The triple constraint consists of which components?

a. project management, scope management, and integration management

b. time/schedule, cost, and scope

c. earned value, time/schedule, and scope

d. project management, procurement management, and scope management

ANSWER: b

RATIONALE: The triple constraint refers to the critical project aspects of scope, schedule/time, and cost. These three project components are the central focus of the project manager.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.3 - Describe the Triple Constraint and its role in projects.

TOPICS: 3.2: Interconnected Project Attributes

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

27. You are a project manager who will be managing a project with 15 team members, a project champion, a project sponsor, 25 key users, an information system manager, and one team lead-all of whom are at three different locations. What is the type of communication as well as the frequency with which to communicate for each of these groups?

a. Create a communications plan for the project using a stakeholder analysis matrix.

b. Create a communications plan for the project with a work breakdown structure.

c. Create an earned value, time/schedule, and scope.

d. Provide project management, procurement management, and scope management.

ANSWER: a

RATIONALE: The best approach to manage communication in this scenario is to create a

communications plan for the project using a stakeholder analysis matrix. This matrix identifies the interests of the stakeholders, their information needs, and important facts for managing communications with the champion, sponsor, project team members, and key end users associated with the project. Based on analysis of this data, the preferred form and frequency of communication is identified for each stakeholder.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.2 - Explain the role of a project manager and the skills required for that role.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

28. The ________________are statements of what an information system will do, the features and functionality it will present, the needs it will satisfy, and the aspects it must not have.

a. project requirements

b. scope document

c. work breakdown structure

d. quality assurance document

ANSWER: a

RATIONALE: The project requirements are a collection of statements of what an information system will do, the features and functionality it will present, the needs it will satisfy, and the aspects it must not have. A scope document defines the "what" of the project whereas the project requirements document the functionality (in other words, the "why" and the "how"). The work breakdown structure focuses on breaking down the work into workable parts (tasks) and does not discuss in detail the features and functionality of the information system project. A quality assurance document focuses on the quality of the project.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.3 - Describe the Triple Constraint and its role in projects.

TOPICS: 3.1: Interconnected Project Attributes

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 1/16/2025 4:34 AM

29. Project risks are assessed by determining the and of the identified risk.

a. probability; classification

b. contingency; impact

c. contingency; classification

d. probability; impact

ANSWER: d

RATIONALE: After each risk is identified and defined the group should attempt to classify the risk by the probability that it will occur and the impact on the project if the risk does occur.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.1 - Define the 10 knowledge areas associated with the science of project management.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

30. The project manager is in the planning phase of a new project and wants to perform a risk assessment. Which of the following statements is NOT true about risk assessment?

a. The project team then needs to consider which risks need to be addressed.

b. Risk assessment is an ongoing event and should be done throughout the project.

c. The team only considers risks that are assessed to have a high impact.

d. The project manager can close out risks once a phase is complete if those risks pertain only to that phase.

ANSWER: c

RATIONALE: Risk assessment is not a one-time event in the life of a project. The project context, the conditions both internal and external to the project and the organization, are constantly changing. Regular reviews of all risks must be performed. Some risks disappear as work is completed. Some new risks arise as circumstances change. Some existing risks can become greater or lesser as the project team.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.3.2 - Explain the role of a project manager and the skills required for that role.

TOPICS: 3.1: What is Project Management?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:34 PM

DATE MODIFIED: 10/22/2024 1:34 PM

1. The three fundamental computer system hardware components include the _____________, memory, and input/output devices.

a. central processing unit

b. keyboard

c. monitor

d. graphics card

ANSWER: a

RATIONALE: The three fundamental computer system hardware components include the central processing unit, memory, and input/output devices.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

2. The is also considered the "brain" of the computer. It receives instructions and performs calculations and other actions based on those instructions.

a. random access memory (RAM)

b. read-only memory (ROM)

c. central processing unit (CPU)

d. software

ANSWER: c

RATIONALE: The central processing unit (CPU) is also considered the "brain" of the computer. It receives instructions and performs calculations and other actions based on those instructions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

3. When a computer loses its power, memory does not lose its contents while does.

a. RAM; ROM

b. volatile; RAM

c. nonvolatile; ROM

d. ROM; RAM

ANSWER: d

RATIONALE: Random-access memory (RAM) chips are volatile storage devices that lose their contents when the power is turned off or disrupted. Read-only Memory (ROM) chips permanently store content, meaning nothing is lost when the power is disrupted or turned off.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

4. The is a fundamental computer hardware system component that provides the processor with a working area to store program instructions and data.

a. memory

b. input/output device

c. secondary storage

d. central processing unit (CPU)

ANSWER: a

RATIONALE: The memory is a fundamental computer hardware system component that provides the processor with a working area to store program instructions and data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

5. A(n) is one of the three fundamental computer hardware system components. Examples include devices such as the monitor, mouse, keyboard, speakers, and printer.

a. memory

b. input/output device

c. secondary storage

d. central processing unit (CPU)

ANSWER: b

RATIONALE: An input/output device is one of the three fundamental computer hardware system components. Examples include devices such as the monitor, mouse, keyboard, speakers, and printer.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

6. Compared to main memory (RAM and ROM), secondary storage has advantages, including ____, ____, and ____.

a. higher reliability; accessibility; lower cost

b. nonvolatility; greater capacity; greater economy

c. improved volatility; faster access; content variety

d. external capacity; lower cost; higher reliability

ANSWER: b

RATIONALE: Compared with memory, secondary storage offers the advantages of nonvolatility, greater capacity, and greater economy.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

7. Dr. Chiu and her team of climatologists need to run a detailed simulation of global climate patterns. This type of analysis requires massive amounts of computing power due to the complex calculations that need to be performed. Dr. Chiu and her team should utilize to complete the research.

a. redundant array of independent/inexpensive disks

b. multiple-user computers

c. secondary storage

d. grid computing

ANSWER: d

RATIONALE: Because Dr. Chiu's simulation requires a lot of computing power, she and her team should use grid computing. Grid computing is the use of a collection of computers, often owned by organizations, that work in a coordinated manner to solve a common problem.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

8. Memory holds data in groupings of _____, which store either a 0 or a 1.

a. binary bits

b. paired bytes

c. single characters

d. letters and numerals

ANSWER: a

RATIONALE: Memory stores data in a grouping of binary bits, either a 0 or a 1.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

9. A is equal to 1 million bytes.

a. kilobyte (KB)

b. megabyte (MB)

c. gigabyte (GB)

d. terabyte (TB)

ANSWER: b

RATIONALE: A megabyte (MB) is equal to 1 million bytes.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

10. Which of the following is true about random access memory (RAM)?

a. RAM content is lost if the power is turned off or disrupted.

b. RAM provides permanent storage for data and instructions.

c. RAM and cache memory are both fast forms of memory.

d. RAM content is not lost if the power is turned off or disrupted.

ANSWER: a

RATIONALE: As currently designed, RAM chips are volatile storage devices, meaning they lose their contents if the power is turned off or disrupted. ROM provides permanent storage for data and instructions that do not change, such as programs and data from the computer manufacturer, including the instructions that tell the computer how to

start up when the power is turned on. Cache memory is a type of high-speed memory that a processor can access more rapidly than main memory to help ease this bottleneck. Frequently used data is stored in easily accessible cache memory instead of slower memory, such as RAM.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

11. Which of the following is false about secondary storage?

a. Compared with memory, secondary storage offers the advantages of nonvolatility and greater capacity.

b. On a cost-per-megabyte basis, secondary storage is considerably more expensive than primary memory.

c. The selection of secondary storage media requires understanding their primary characteristics: access method, capacity, and portability.

d. Secondary data storage is not directly accessible by the central processing unit.

ANSWER: b

RATIONALE: On a cost-per-megabyte basis, secondary storage is considerably less expensive, not more, than primary memory. Compared with memory, secondary storage offers the advantages of nonvolatility and greater capacity. The selection of secondary storage media requires understanding their primary characteristics: access method, capacity, and portability. Secondary data storage is not directly accessible by the central processing unit.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

12. A is a direct access storage device used to store and retrieve data from rapidly rotating disks coated with magnetic material, whereas a stores data in memory chips that provide much faster data access than magnetic data storage devices.

a. hard disk drive; solid-state storage device

b. solid-state storage; solid-state storage device

c. virtual tape; redundant array of independent/inexpensive disks

d. magnetic tape; virtual tape

ANSWER: a

RATIONALE: A hard disk drive is a direct access storage device used to store and retrieve data from rapidly rotating disks coated with magnetic material, whereas a solid-state storage device stores data in memory chips that provide much faster data access than magnetic data storage devices.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/17/2025 1:44 AM

13. Which of the following is not an example of an input device?

a. bar code scanner

b. optical data reader

c. QR code scanner

d. plotter

ANSWER: d

RATIONALE: Bar code scanners, optical data readers, and QR code scanners are all examples of input devices that assist in getting data onto a computer. A plotter is a type of hardcopy output device.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.1 - Describe the functions of the three fundamental hardware components of every computer.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

14. A is a specialized computer employed by many users to perform a specific task, such as running a web site, email, or application.

a. nettop

b. mainframe computer

c. server

d. supercomputer

ANSWER: c

RATIONALE: A server is a computer employed by many users to perform a specific task, such as running a network or web applications.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.2 - Explain how each of the three primary classes of computers is used within an organization.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

15. XV Sneaker, Inc. found itself caught in a viral video and customers to the company's website increased by 2000%. The web server was and thus was able to increase the processing power and was able to handle the increase in users, data, and transactions.

a. scalable

b. backward compatible

c. middleware

d. software as a service ANSWER: a

RATIONALE: The web server was scalable and thus was able to increase the processing power and was able to handle the increase in users, data, and transactions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.2 - Explain how each of the three primary classes of computers is used within an organization.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 3:58 AM

16. A is a high-power computer shared by dozens, hundreds, or even thousands of concurrent users connected to the machine over a network.

a. server

b. mainframe computer

c. middleware

d. nettop

ANSWER: b

RATIONALE: A mainframe computer is a high-power computer shared by dozens, hundreds, or even thousands of concurrent users connected to the machine over a network.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.2 - Explain how each of the three primary classes of computers is used within an organization.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

17. The ability in newer models of computer hardware or newer releases of an operating system to continue to support software written for previous versions of the hardware or operating system, even if the software was created years or decades ago, is considered ______________.

a. software as a service

b. scalability

c. backward compatibility

d. server virtualization

ANSWER: c

RATIONALE: The ability in newer models of the hardware or newer releases of the operating system to continue to support software written for previous versions of the hardware or operating system, even if the software was created years or decades ago, is considered backward compatibility.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.2 - Explain how each of the three primary classes of computers is used within an organization.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

18. are the most powerful computers with the fastest processing speed and highest performance and are often used for applications like complex simulations, computer-aided design, medical imaging, and video editing.

a. Servers

b. Mainframes

c. Nettops

d. Supercomputers

ANSWER: d

RATIONALE: Supercomputers are the most powerful computers with the fastest processing speed and highest performance and are often used for applications like artificial intelligence, complex simulations, computer-aided design, medical imaging, and video editing.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.2 - Explain how each of the three primary classes of computers is used within an organization.

TOPICS: 4.1: Anatomy of a Computer

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/17/2025 1:44 AM

19. The approach requires less physical space than the traditional because it shares a common power supply and air-cooling source within a single chassis.

a. data center; server farm

b. blade server; server farm

c. server farm; mainframe

d. supercomputer; blade server

ANSWER: b

RATIONALE: The blade server approach requires less physical space than the traditional server farm because it shares a common power supply and air-cooling source within a single chassis.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.3 - Describe the advantages of green computing.

TOPICS: 4.2: Server Farms, Data Centers, and Green Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

20. Data centers are classified by tiers. Tier 3 or 4 data centers provide ______, ______, and compared to Tier 1 or 2 data centers.

a. much more downtime; no fault tolerance; no power protection

b. much less downtime; fault tolerance; no power protection

c. much less downtime; fault tolerance; power protection

d. much more downtime; no fault tolerance; power protection

ANSWER: c

RATIONALE: Tiers 3 and 4 are for large organizations where a business disruption of a few hours would have serious financial consequences due to the inability to process customer orders, plan product shipments, manage manufacturing operations, and perform other critical activities.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.3 - Describe the advantages of green computing.

TOPICS: 4.2: Server Farms, Data Centers, and Green Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:04 AM

21. Which of the following is not a goal of green computing?

a. to reduce the use of hazardous waste material

b. to allow companies to lower their power-related costs

c. to focus exclusively on eliminating toxic components

d. to enable the safe disposal of computer-related equipment

ANSWER: c

RATIONALE: Green computing has three goals: (1) reduce the use of hazardous material, (2) allow companies to lower their power-related costs, and (3) enable the safe disposal or recycling of computers and computer-related equipment. The best practice would be for them to eliminate the use of toxic substances; however, focusing on that exclusively would not allow companies to also focus on reducing power consumption a major green computing issue.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.3 - Describe the advantages of green computing.

TOPICS: 4.2: Server Farms, Data Centers, and Green Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:09 AM

22. The two basic kinds of software are software, which includes operating systems, utilities, and middleware that coordinate the activities and functions of the hardware and other programs throughout the computer system and software, which consists of programs that help users solve problems by using a computer.

a. system; application

b. system; server

c. multi-user; multiprocessing

d. software as a service; application as a service

ANSWER: a

RATIONALE: Software can be divided into two types: system software and application software. System software includes operating systems, utilities, and middleware that coordinate the activities and functions of the hardware and other programs throughout the computer system. Application software consists of programs that help users solve problems by using a computer.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.4 - List the two basic kinds of software and their associated subclasses.

TOPICS: 4.3: System Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/17/2025 1:44 AM

23. A spreadsheet program such as Microsoft Excel is an example of what kind of software?

a. software suite

b. enterprise application software

c. application software

d. system software

ANSWER: c

RATIONALE: A spreadsheet program such as Microsoft Excel is an example of application software. It is part of a software suite, but it is not the entire suite. System software includes the operating system and utilities and does not include application software such as spreadsheet software.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.4 - List the two basic kinds of software and their associated subclasses. TOPICS: 4.3: System Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

24. The following are examples of proprietary operating systems except:

a. UNIX

b. Linux

c. IBM zOS

d. Windows

ANSWER: b

RATIONALE: Linux is an example of an open-source operating system. UNIX, IBM zOS, and Windows are all proprietary software.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.4 - List the two basic kinds of software and their associated subclasses. TOPICS: 4.3: System Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

25. India Specialties Corporation has reduced the number of servers by 90%, which lowered its hardware capital costs and, by not running so many servers, has significantly lowered its energy costs. Which of the following is most likely to have happened?

a. India Specialties uses software as a service to host their applications in-house.

b. India Specialties uses an embedded system that works at the thin client terminals.

c. India Specialties employed server virtualization to run fewer servers in its data center.

d. India Specialties implemented an enterprise operating system to support its users.

ANSWER: c

RATIONALE: India Specialties employed server virtualization to run fewer servers in their data center. Individual physical servers often operate at low levels of resource usage. With server virtualization, the server can run several server applications concurrently and operate at a much higher level of total capacity perhaps 80 percent or more. As a result, a data center with 400 physical servers could be converted to a virtualized environment with as few as 24 virtualized servers. The savings in capital costs for hardware are significant. Because the data center is running fewer servers, it gains additional ongoing savings in energy costs to power the servers and cool the physical premises. Software as a service would most likely be purchased from an outside vendor who would host it off-site. Neither an embedded system nor an enterprise operating system would provide a lowered number of servers or savings.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.4 - List the two basic kinds of software and their associated subclasses.

TOPICS: 4.3: System Software

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:15 AM

26. What type of software program can check the hard disk's boot sector, file allocation tables, and directories and analyze them to ensure that the hard disk is not damaged?

a. embedded system

b. utility program

c. application software

d. middleware

ANSWER: b

RATIONALE: A type of software program that can check the hard disk's boot sector, file allocation tables, and directories and analyze them to ensure that the hard disk is not damaged is called a utility program.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.4 - List the two basic kinds of software and their associated subclasses.

TOPICS: 4.3: System Software

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

27. software can give a company a competitive advantage by providing services or solving problems in a new way that is better than methods used by a competitor.

a. Embedded system

b. Middleware

c. Enterprise

d. Proprietary

ANSWER: d

RATIONALE: Proprietary software can give a company a competitive advantage by providing services or solving problems in a new way that is better than methods used by a competitor.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.5 - Identify different advantages of commercial off-the-shelf software, proprietary software, and open-source software.

TOPICS: 4.4: Application Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

28. ABCXYZ, Inc. is a sales software provider that hosts applications, platforms, and infrastructure, making it available to subscribers over the internet. Subscribers pay a fee for the use of the software. What type of software is ABCXYZ most likely providing to its customers?

a. embedded system

b. middleware

c. software as a service

d. system software

ANSWER: c

RATIONALE:

ABCXYZ, Inc. is a cloud service provider providing software as a service because it is hosting applications, platforms, and infrastructure over the internet on its own servers.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.5 - Identify different advantages of commercial off-the-shelf software, proprietary software, and open-source software.

TOPICS: 4.4: Application Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

29. What is the main advantage of software as a service (SaaS)?

a. SaaS applications allow you to get exactly what you need in terms of features and functionality.

b. SaaS applications have a larger upfront cost in terms of hardware but have lower ongoing maintenance costs.

c. SaaS applications are available from any computer or any device anytime, anywhere.

d. SaaS application providers can lock their customers into an ongoing agreement.

ANSWER: c

RATIONALE: The main advantage of SaaS is that the applications are available from any computer or any device anytime, anywhere. SaaS applications do not always allow you to get

exactly what you need in terms of features and functionality, although some customization may be possible. Providers can lock their customers into an ongoing agreement, making it costly to switch providers.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.5 - Identify different advantages of commercial off-the-shelf software, proprietary software, and open-source software.

TOPICS: 4.4: Application Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:18 AM

30. is a type of software that supports processes in logistics, manufacturing, human resources, marketing and sales, order processing, accounting, inventory control, customer relationship management, and other essential business functions.

a. Software suite

b. Enterprise application

c. Middleware

d. System software

ANSWER: b

RATIONALE: Enterprise application is a type of software that supports processes in logistics, manufacturing, human resources, marketing and sales, order processing, accounting, inventory control, customer relationship management, and other essential business functions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.4.5 - Identify different advantages of commercial off-the-shelf software, proprietary software, and open-source software.

TOPICS: 4.4: Application Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/17/2025 1:45 AM

1. A(n) is a well-designed, organized, and carefully managed collection of data.

a. database

b. model

c. schema

d. entity

ANSWER: a

RATIONALE: A database is a well-designed, organized, and carefully managed collection of data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.1 - Identify the benefits of quality data and information.

TOPICS: 5.1: Benefits of Quality Data and Information

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

2. One characteristic of a relational database is that each row in a table is uniquely identified by a

a. foreign key

b. primary key

c. entity

d. attribute

ANSWER: b

RATIONALE:

One characteristic of a relational database is that each row in a table is uniquely identified by a primary key. An entity is a person, place, or thing (object) for which data is collected, stored, and maintained. An attribute is a characteristic of an entity. A foreign key is a field in one table that refers to the primary key in another table. It serves as a cross-reference, enabling the data in the two tables to be related.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.4 - Identify the characteristics of a relational database.

TOPICS: 5.4: Relational Databases

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:24 AM

3. consists of raw facts, such as employee numbers and sales figures, whereas is a collection of data organized and processed so that it has additional value beyond the value of the individual facts.

a. Information; data

b. Data; information

c. Data; fields

d. Fields; data

ANSWER: b

RATIONALE: Data consists of raw facts, such as employee numbers and sales figures, whereas information is a collection of data organized and processed so that it has additional value beyond the value of the individual facts.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.1 - Identify the benefits of quality data and information.

TOPICS: 5.1: Benefits of Quality Data and Information

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

4. Data is essential to accurate and informed decision making.

a. quality

b. accessibility

c. cost

d. intelligence

ANSWER: a

RATIONALE: Data quality is essential to make accurate and informed decisions. Any organization that stresses the use of advanced information systems and sophisticated data analysis before data quality is doomed to make wrong decisions.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.1 - Identify the benefits of quality data and information.

TOPICS: 5.1: Benefits of Quality Data and Information

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:26 AM

5. A positive flu test result was reported to the doctor one month after the patient was fully recovered. This is an example of which characteristic of quality data and information?

a. accessible

b. accurate

c. relevant

d. timely

ANSWER: d

RATIONALE: The example of a test result that is too delayed is an example of untimely data. The data was not delivered when needed.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.1 - Identify the benefits of quality data and information.

TOPICS: 5.1: Benefits of Quality Data and Information

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

6. A student can view their current grades for the course to determine the score they will need on the final exam. This is an example of which characteristic of quality data and information?

a. accessible

b. secure

c. economical

d. verifiable

ANSWER: a

RATIONALE: The example demonstrates the accessibility characteristic of data and information. Data and information should be easily accessible by authorized users so they can obtain it to meet their needs. If students cannot access their grades, they will not know how they are doing in the class or the score needed for the final exam. Timeliness is a secondary concern; i.e., without access to the data, a student cannot view it; once accessed, its timeliness becomes essential.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.1 - Identify the benefits of quality data and information.

TOPICS: 5.1: Benefits of Quality Data and Information

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

7. A marketing company sales representative stops by a local bakery and asks the owner if they would be interested in a software program that will allow them to track important sales-related information about customers, products, and trends. The salesperson explained that this information is available immediately after every customer's purchase without additional effort from the bakery's staff. The cost of the program is more than the company's revenues for three months. This is an example of which characteristic of quality data and information?

a. accessible

b. economic

c. relevant

d. timely

ANSWER: b

RATIONALE: The example demonstrates the economic characteristics of data and information. Data and information should be economical to produce. In this example, the sales data and information are produced by the program as a by-product of the bakery's sales; the only cost is the program's initial fee. Decision-makers must always balance the value of data and information with the cost of producing and managing it. While data should be accessible, relevant, and timely, this example best fits the economical characteristics of data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.1 - Identify the benefits of quality data and information.

TOPICS: 5.1: Benefits of Quality Data and Information

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

8. The following statements best describe the benefits of quality data, except:

a. High-quality data and information can increase sales by enabling more accurate consumer targeting and communications.

b. The better the quality of your data and information, the easier it is to deliver the personalized approach your customers require.

c. Guesswork and risk taking in decision making are reduced with high-quality data and information.

d. Low-quality data and information increase innovation and lead to customer satisfaction.

ANSWER: d

RATIONALE:

High-quality data and information can increase sales by enabling more accurate consumer targeting and communications. The better the quality of your data and information, the easier it is to deliver the personalized approach your customers require. With high-quality data and information, the guesswork and risk taking in decision making are reduced. High-quality data and information might increase company costs but would lead to customer satisfaction rather than dissatisfaction. Customers are usually dissatisfied with inaccurate billing and other inaccurate information.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.1 - Identify the benefits of quality data and information.

TOPICS: 5.1: Benefits of Quality Data and Information

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/17/2025 1:03 AM

9. is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users in an organization.

a. Data management

b. Relational database model

c. Transaction control language

d. Metadata

ANSWER: a

RATIONALE: Data management is an integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed to ensure that the accessibility, reliability, and timeliness of the data meet the needs of an organization's data users.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.2 - Distinguish between data management and data governance.

TOPICS: 5.2: Data Management

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

10. is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data.

a. Data management

b. Data governance

c. Database management system

d. Data lifecycle management

ANSWER: b

RATIONALE: Data governance is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.2 - Distinguish between data management and data governance.

TOPICS: 5.2: Data Management

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

11. Among the responsibilities of a are protecting the database from attack or other forms of failure as well as using security software, preventive measures, and redundant systems to keep data safe and accessible.

a. data steward

b. governance team

c. database management system

d. database administrator

ANSWER: d

RATIONALE: A database administrator's responsibilities include protecting the database from attack or other forms of failure and using security software, preventive measures, and redundant systems to keep data safe and accessible.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.2 - Distinguish between data management and data governance.

TOPICS: 5.2: Data Management

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

12. A(n) consists of software used to access and manage a database as well as provide an interface between the database and its users and application programs.

a. schema

b. structured query language

c. database management system

d. enterprise data model

ANSWER: c

RATIONALE: A database management system consists of software used to access and manage a database and provide an interface between the database, its users, and application programs.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 11:13 AM

13. A bakery database stores data about employees, products, customers, and orders. These are all examples of ________.

a. a schema

b. structured query language

c. attributes

d. entities

ANSWER: d

RATIONALE: A bakery database stores data about employees, products, customers, and orders. These are all examples of entities. In a database, an entity is a person, place, or thing (object) for which data is collected, stored, and maintained. An attribute is a characteristic of an entity. For example, the attributes of a bakery product might be the type of bakery item (e.g., croissant), its price, and the quantity on hand.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

14. A transactional or operational database should be designed to reflect the of the organization.

a. business processes

b. structured query language

c. schema

d. data hierarchy

ANSWER: a

RATIONALE: A transactional or operational database should be designed to reflect the business processes of the organization.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

15. Which question below should not be considered when designing a database?

a. What data should be collected and at what cost?

b. Where should data be physically located?

c. What is the data modeling software that will be used?

d. How long must this data be stored?

ANSWER: c

RATIONALE: A database should be designed to focus on the data collected, the cost of collection, and how it will be stored and where. The data modeling software will be helpful in creating the schema for the design but it should not be a consideration in the overall design.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:36 AM

16. Which statement below is not a benefit of an enterprise data model?

a. It provides a roadmap of the organization's current and future data that serves as an initial starting point for the development of new applications that will be able to integrate and exchange data.

b. It avoids costly and inefficient data redundancy, where the same data entities or data attributes are captured in more than one application or stored in more than one database.

c. It identifies gaps in the data needed to support the organization so that plans can be made to capture or acquire the needed data.

d. It provides a benchmark against the competitor's database software package and identifies any gaps in how it helps to meet the competitor organization's data needs.

ANSWER: d

RATIONALE:

An enterprise data model has the following benefits: It provides a roadmap of the organization's current and future data that serves as an initial starting point for the development of new applications that will be able to integrate and exchange data. It avoids costly and inefficient data redundancy where the same data entities or attributes are captured in more than one application or stored in more than one database. It identifies gaps in the data needed to support the organization so that plans can be made to capture or acquire the needed data. It does provide a benchmark to evaluate vendor software and how it meets the competitor organization's data needs, but it does not provide a benchmark against competitor database software programs.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

17. ensure(s) that the relationships among the data entities in a database are correctly structured so that any application programs developed are consistent with business operations and user needs.

a. Entity-relationship diagrams

b. Database governance

c. Structured Query Language

d. Primary keys

ANSWER: a

RATIONALE: An entity-relationship (ER) diagram is a data model used to analyze and communicate data needs at the individual project or application level using graphical symbols to identify data entities and their associated data attributes as well as the relationships among the entities of interest. ER diagrams ensure that the relationships among the data entities in a database are correctly structured so that any application programs developed are consistent with business operations and user needs.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

18. A collection of fields about a specific entity is a __________.

a. record

b. primary key

c. attribute

d. field

ANSWER: a

RATIONALE: A collection of fields about a specific entity is a record.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

19. Vinnie's auto repair shop database uses vehicle identification numbers (VINs), which are unique to each vehicle, to identify a vehicle that comes in for a repair. This is an example of a(n) ____________.

a. record

b. primary key

c. compound key

d. entity

ANSWER: b

RATIONALE: A primary key is a field or set of fields that uniquely identifies the record in a database table. No other record can have the same primary key, and a VIN is a good example of a primary key.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:39 AM

20. A(n) field in one table refers to the primary key in another table. It serves as a crossreference, enabling the data in the two tables to be related.

a. record

b. attribute

c. foreign key

d. entity

ANSWER: c

RATIONALE: A foreign key field in one table refers to the primary key in another table. It serves as a cross-reference, enabling the data in the two tables to be related.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

21. is a special-purpose programming language for accessing and manipulating data stored in a database.

a. Structured Query Language (SQL)

b. Data Manipulation Language (DML)

c. Data Definition Language (DDL)

d. Data Control Language (DCL)

ANSWER: a

RATIONALE: SQL is a special-purpose programming language for accessing and manipulating data stored in a database.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:41 AM

22. A defines the tables, the fields in each table, and the relationships between fields and tables. It can be represented in a visual diagram showing database objects and their relationship with one another.

a. Structured Query Language (SQL)

b. data steward

c. record

d. schema

ANSWER: d

RATIONALE: A schema defines the tables, the fields in each table, and the relationships between fields and tables. It can be represented in a visual diagram showing database objects and their relationship with one another.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

23. A database schema can also be defined using a _______________, which is a collection of instructions and commands used to define and describe data and relationships in a database.

a. Structured Query Language (SQL)

b. Data Manipulation Language (DML)

c. Data Definition Language (DDL)

d. Data Control Language (DCL)

ANSWER: c

RATIONALE: A database schema can also be defined using a DDL, which is a collection of instructions and commands used to define and describe data and relationships in a database.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:46 AM

24. A data dictionary is a collection of that describes the data, format, structure, and relationships in a database.

a. metadata

b. records

c. fields

d. data control language (DCL)

ANSWER: a

RATIONALE: A data dictionary is a collection of metadata that describes the data, format, structure, and relationships in a database.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

25. A data dictionary may contain the following data for each field, except:

a. name of the data attribute

b. aliases or other names that may be used to describe an item

c. type of data (such as alphanumeric or numeric)

d. number of foreign keys needed for an item

ANSWER: d

RATIONALE: Metadata is data that describes other data. Among other details, the data dictionary contains the following metadata for each field: • Name of the data attribute • Aliases

or other names that may be used to describe the item • Range of values that can be used (domain) • Type of data (such as alphanumeric or numeric) • Number of bytes of storage needed for the item. It does not contain the foreign key information for a field.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/17/2025 1:03 AM

26. is a language that allows a database administrator to manage user privileges.

a. Transaction control language (TCL)

b. Data control language (DCL)

c. Data definition language (DDL)

d. Data manipulation language (DML)

ANSWER: b

RATIONALE: DCL, a subset of SQL, allows a database administrator to manage user privileges. DML allows users, administrators, and applications to modify database data. DDL is a collection of instructions and commands used to define and describe data and relationships in a database. TCL is used to maintain the integrity and accuracy of data by committing changes to the database or rolling back changes that were made in error.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

27. Standardizing data so that data such as Michigan, MI, and Mich. all use the same format is a process called _____________.

a. data washing

b. backup and recovery

c. data cleansing

d. data analysis

ANSWER: c

RATIONALE: Data cleansing is the process of detecting and then correcting or deleting incomplete, inaccurate or irrelevant records that reside in a database and may also involve standardizing data, such as converting abbreviations (MI, Mich.) to one standard

name (Michigan).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.3 - Explore the fundamentals of databases.

TOPICS: 5.3: Database Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

28. A relational database model uses to enable relationships between the tables.

a. primary keys and foreign keys

b. data manipulation language and data query language

c. selecting and projecting

d. fields and attributes

ANSWER: a

RATIONALE: A relational database model uses primary keys and foreign keys to enable relationships between the tables to be defined.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.4 - Identify the characteristics of a relational database.

TOPICS: 5.4: Relational Databases

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

29. Which statement below is not a characteristic of relational databases?

a. Each row in a table is uniquely identified by a foreign key.

b. Data is organized into collections of two-dimensional tables called relations.

c. Each row in the table represents an entity, and each column represents an attribute of that entity.

d. The type of data a table column can contain can be specified as integer number, text, etc.

ANSWER: a

RATIONALE: A relational database has the following characteristics, among others: Data is organized into collections of two-dimensional tables called relations. Each row in the table represents an entity, and each column represents an attribute of that entity. The type of data a table column can contain can be specified as an integer number, text, etc. Each row in a table is uniquely identified by a primary key, not a foreign key.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.4 - Identify the characteristics of a relational database.

TOPICS: 5.4: Relational Databases

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

30. Amazon offers ____________, where customers can store data on Amazon's servers and access it over the internet with database administration managed by Amazon.

a. data governance

b. database approach to data management

c. enterprise data model

d. database as a service (DaaS)

ANSWER: d

RATIONALE: Amazon offers DaaS, where customers can store data on Amazon's servers and access it over the internet with database administration managed by Amazon.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.5.4 - Identify the characteristics of a relational database.

TOPICS: 5.4: Relational Databases

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

1. is the term used to describe data collections that are so enormous and complex that traditional data management software, hardware, and analysis processes are incapable of dealing with them.

a. Analytics

b. Big data

c. Business intelligence

d. Data visualization

ANSWER: b

RATIONALE: Big data is the term used to describe data collections that are so enormous and complex that traditional data management software, hardware, and analysis processes are incapable of dealing with them.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.1 - Explain how business intelligence supports decision making.

TOPICS: 6.1: Business Intelligence Overview

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

2. The extensive use of data and quantitative analysis to support fact-based decision making within organizations is known as ____________.

a. analytics

b. big data

c. data transformation

d. data visualization

ANSWER: a

RATIONALE: The extensive use of data and quantitative analysis to support fact-based decision making within organizations is called analytics.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.1 - Explain how business intelligence supports decision making.

TOPICS: 6.1: Business Intelligence Overview

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

3. By combining with __________, organizations learn to operate more efficiently, provide valuable benefits to their stakeholders, meet customer needs, identify new opportunities, and gain a competitive advantage.

a. information; data

b. big data; analytics

c. data visualization; big data

d. analytics; data visualization

ANSWER: b

RATIONALE: By combining big data with analytics, organizations learn to operate more efficiently, provide valuable benefits to their stakeholders, meet customer needs, identify new opportunities, and gain a competitive advantage.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.1 - Explain how business intelligence supports decision making.

TOPICS: 6.1: Business Intelligence Overview

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

4. Which of the following statements is true?

a. Data used by organizations for business intelligence purposes comes only from internal sources.

b. Data sources cannot include employees due to privacy regulations.

c. Data sources often need to be transformed into a usable format.

d. Decision-makers use business intelligence analysis for short-term operational goals.

ANSWER: c

RATIONALE: Because data can come from a variety of sources, those data often need to be transformed into a usable format. Data used by organizations for business intelligence purposes comes from internal as well as external sources. Data sources do sometimes

include employees. Decision-makers use business intelligence analysis for short-term and long-term strategic goals.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.1 - Explain how business intelligence supports decision making.

TOPICS: 6.1: Business Intelligence Overview

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

5. Five key characteristics of big data are volume, __________, value, variety, and _______.

a. velocity; veracity

b. accuracy; relevance

c. validity; accuracy

d. timeliness; validity

ANSWER: a

RATIONALE: Five key characteristics are associated with big data: volume, velocity, value, variety, and veracity.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.2 - Describe the characteristics of big data.

TOPICS: 6.2: Big Data

KEYWORDS: Bloom's: Remember

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:53 AM

6. is a characteristic of the format of big data, in which some of the data is structured and some is unstructured.

a. Validity

b. Velocity

c. Variety

d. Veracity

ANSWER: c

RATIONALE: Data today comes in a variety of formats. Some of the data is structured data its format is known in advance, and it fits nicely into traditional databases. However, most of the data that an organization must deal with is unstructured data, meaning that it is not organized in any predefined manner. Validity is not a characteristic of big data. Velocity refers to the rate at which new data is being generated. Veracity is a measure of the quality of the data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.2 - Describe the characteristics of big data.

TOPICS: 6.2: Big Data

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:57 AM

7. is a measure of the quality of data, and its level is higher when data is gathered from credible sources, cleaned to remove inaccuracies, and regularly updated to remain current.

a. Validity

b. Velocity

c. Variety

d. Veracity

ANSWER: d

RATIONALE: Veracity is a measure of the quality of data. The veracity of data required for a decision varies based on the level of risk and reward associated with a decision. A decision with high risk or reward requires higher-quality data than one with low risks or rewards. Veracity is higher when data is gathered from credible sources, cleaned to remove inaccuracies, and regularly updated to remain current.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.2 - Describe the characteristics of big data.

TOPICS: 6.2: Big Data

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

8. The following statements best describe big data sources, except:

a. Big data may come from social media, historical records, and communications.

b. Big data may come from public sources such as government websites.

c. Big data may come from physical documents such as books, newspapers, and letters.

d. Big data may come from sensor data and process control devices.

ANSWER: c

RATIONALE: Physical documents cannot be stored in a computer. They must be transformed into a digital representation, i.e., scanned, which can be placed in big data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.2 - Describe the characteristics of big data.

TOPICS: 6.2: Big Data

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

9. A_______________ is a large database that holds business information from many sources in an enterprise, covering all aspects of the company's processes, products, and customers.

a. data warehouse

b. data mart

c. data lake

d. NoSQL database

ANSWER: a

RATIONALE:

A data warehouse is a large database that holds business information from many sources in an enterprise, covering all aspects of the company's processes, products, and customers. A data mart is a subset of a data warehouse. A data lake saves data in its raw and unaltered form. A NoSQL ("not only" SQL) database stores data in a nonrelational data model.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.3 - Explain the steps in the extract, load, and transform process.

TOPICS: 6.3: Extract, Transform, Load

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 4:59 AM

10. The following are characteristics of a data warehouse, except:

a. A data warehouse holds billions of records and petabytes of data.

b. A data warehouse holds recent data, meaning two months or less.

c. Data warehouse data comes from many sources, both internal and external.

d. Data warehouses support various types of analysis and reporting.

ANSWER: b

RATIONALE: A data warehouse typically contains historical data, typically five years of data or more. All the remaining characteristics are true.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.3 - Explain the steps in the extract, load, and transform process.

TOPICS: 6.3: Extract, Transform, Load

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

11. is considered one of the biggest issues in data warehousing.

a. Data quality

b. Data extraction

c. Data transformation

d. Data variability

ANSWER: a

RATIONALE: Due to the wide range of possible data inconsistencies and the sheer data volume, data quality is considered one of the biggest issues in data warehousing. Data extraction and data transformation are part of the process of ensuring the quality of data. Data variability is not considered one of the biggest issues.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.3 - Explain the steps in the extract, load, and transform process.

TOPICS: 6.3: Extract, Transform, Load

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

12. In the stage of the ETL process, data that fails to meet expected patterns or values may be rejected from further processing (e.g., blank or nonnumeric data).

a. extract

b. evaluation

c. transform

d. load

ANSWER: a

RATIONALE: In the extract stage of the ETL process, data that fails to meet expected patterns or values (e.g., blank or nonnumeric data) may be rejected from further processing. Evaluation is not a stage of the process. In the transform stage, a series of rules or algorithms are applied to the extracted data. In the load stage, the extracted and transformed data are loaded into the data warehouse

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.3 - Explain the steps in the extract, load, and transform process.

TOPICS: 6.3: Extract, Transform, Load

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

13. A major retailer stores pharmacy sales data, a subset of data warehouse data, which is most likely a

a. data mart

b. data lake

c. relational database

d. NoSQL database

ANSWER: a

RATIONALE: A major retailer stores pharmacy sales data, a subset of data warehouse data, which is most likely a data mart. Data marts bring the data warehouse concept lots of data

from many sources to small and medium-sized businesses and to departments within larger companies. Rather than store all enterprise data in one monolithic database, data marts contain a subset of the data for a single aspect of a company's business for example, finance, inventory, or personnel. A data lake saves raw and unaltered data. A NoSQL ("not only" SQL) database stores data in a nonrelational data model.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.3 - Explain the steps in the extract, load, and transform process.

TOPICS: 6.3: Extract, Transform, Load

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 5:03 AM

14. A takes a "store-everything" approach to big data, saving all the data in its raw and unaltered form. Its contents can include business transactions, clickstream data, sensor data, server logs, social media, videos, and more.

a. data mart

b. data lake

c. data warehouse

d. NoSQL database

ANSWER: b

RATIONALE: A data lake takes a "store-everything" approach to big data, saving all the data in its raw and unaltered form. Its contents can include business transactions, clickstream data, sensor data, server logs, social media, videos, and more. Data marts and data warehouses do not store raw data. A NoSQL ("not only" SQL) database stores data in a nonrelational data model.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.3 - Explain the steps in the extract, load, and transform process.

TOPICS: 6.3: Extract, Transform, Load

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

15. An open-source software that includes several modules for storing and processing extremely large datasets is known as ____________.

a. Hadoop

b. Document NoSQL

c. Cross-Industry Process for Data Mining

d. extract, transform, and load (ETL) process

ANSWER: a

RATIONALE: An open-source software that includes several modules for storing and processing extremely large datasets is known as Hadoop. Document NoSQL is a database program. Cross-Industry Process for Data Mining and ETL are not software programs.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.3 - Explain the steps in the extract, load, and transform process.

TOPICS: 6.3: Extract, Transform, Load

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 5:06 AM

16. What is data visualization?

a. the presentation of data in a pictorial or graphical format to see trends, patterns, and relationships

b. an open-source software that includes several modules for storing and processing extremely large datasets

c. a graph NoSQL database that is used to understand the relationships among data such as events, people, and transactions

d. a database that stores data in a nonrelational, visual, and graphical data model

ANSWER: a

RATIONALE: Data visualization is the presentation of data in a pictorial or graphical format to see trends, patterns, and relationships. Hadoop is an open-source software that includes several modules for storing and processing extremely large datasets. A graph NoSQL database is not data visualization.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

17. Which of the four common types of business analytics analyzes historical data to analyze what happened?

a. descriptive

b. predictive

c. diagnostic

d. prescriptive

ANSWER: a

RATIONALE: Descriptive analytics is the analysis of historical data to describe what happened. Diagnostic analytics is the analysis of data to determine why an event or outcome occurred. Predictive analytics is the analysis of current data to identify future probabilities and trends. Prescriptive analytics is the analysis of data to determine what needs to happen to achieve an organization's goals.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

18. Stella's Bakery wants to track progress toward reaching its strategic business goals. One such goal is to increase the average transaction value by 15% within the next year. The CEO and management should use which of the following to track this goal?

a. key performance indicators

b. decision tree analysis

c. scenario analysis

d. linear programming

ANSWER: a

RATIONALE: Key performance indicators track progress toward reaching strategic business goals.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

19. The following describe descriptive statistics, except:

a. Descriptive statistics are measures that describe the characteristics of quantitative data, which fall into three primary categories: distribution, central tendency, and variability.

b. Descriptive statistics provide context for the dataset and can be used to organize data for visualization and further analysis.

c. The context provided by descriptive statistics is used to guide diagnostic, predictive, and prescriptive analytics.

d. Descriptive statistics involves understanding why by forming a hypothesis, looking for relationships, and performing analysis.

ANSWER: d

RATIONALE: The statement "Descriptive statistics involves understanding why by forming a hypothesis, looking for relationships, and performing analysis" is incorrect. Descriptive statistics involve the what rather than the why of an outcome. Diagnostic analytics is more concerned with the why.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

20. Which of the following statements about correlation for two variables is true?

a. A positive correlation indicates a relationship where the two variables move in the same direction.

b. A positive correlation indicates a relationship between an increase in one variable and a decrease in another variable.

c. A negative correlation indicates a relationship where the two variables increase together.

d. A negative correlation indicates a relationship where the two variables decrease together.

ANSWER: a

RATIONALE: A positive correlation indicates a relationship in which the variables move in the same direction, whereas a negative correlation indicates that the variables move in opposite directions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

21. can analyze the relationship between variables. It is a proven method for determining which variables have an impact on the dependent variable.

a. Descriptive analytics

b. Diagnostic analytics

c. Monte Carlo simulation

d. Regression analysis

ANSWER: d

RATIONALE: Regression analysis can analyze the relationship between variables. It is a proven method for determining which variables have an impact on the dependent variable. Monte Carlo simulation enables you to see a spectrum of thousands of possible outcomes, considering not only the many variables involved but also the range of potential values for each of those variables. Descriptive analytics is the analysis of historical data to describe what happened. Diagnostic analytics is the analysis of data to determine why an event or outcome happened.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

22. Predictive analytics combines statistical modeling techniques, __________, and to make predictions.

a. data mining; machine learning

b. machine learning; time-series analysis

c. decision analysis; machine learning

d. data mining; computer simulation

ANSWER: a

RATIONALE: Predictive analytics combines statistical modeling techniques, data mining, and machine learning to make predictions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

23. An algorithm used to create and visualize classification and regression modeling tasks is known as _________.

a. data mining

b. machine learning

c. time-series analysis

d. decision tree

ANSWER: d

RATIONALE: A decision tree is an algorithm used to create and visualize classification and regression modeling tasks.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

24. The following statements about data mining are true, except:

a. The patterns discovered using data mining are used to predict future trends and behaviors.

b. Data mining tools enable organizations to make predictions that allow leaders to capitalize on

opportunities and avoid potential problems.

c. Three commonly used data mining techniques are association analysis, neural computing, and casebased reasoning.

d. With data mining, the system adapts predictions and decisions without specific programming instructions.

ANSWER: d

RATIONALE: With machine learning, not data mining, the system adapts predictions and decisions without specific programming instructions. The other statements about data mining are true.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/16/2025 5:08 AM

25. Which of the following best illustrates the use of machine learning for business?

a. Uber uses a dynamic pricing model to analyze real-time data about user demand, traffic, driver availability, route distance, and more.

b. Walmart examines retail sales data market basket analysis to identify seemingly unrelated products that are frequently purchased together.

c. Amazon uses association analysis in their Amazon Go and Amazon Fresh stores to improve promotion and advertising strategies.

d. Hyatt uses time-series data to adjust room rates to maximize revenue.

ANSWER: a

RATIONALE: Uber using a dynamic pricing model to analyze real-time data about user demand, traffic, driver availability, route distance, and more is an example of machine learning. In this example, the system is trained on the Uber data to learn patterns to make predictions. The other examples demonstrate data mining techniques.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Analyze

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

26. Which business intelligence tool enables you to see a spectrum of thousands of possible outcomes, considering not only the many variables involved but also the range of potential values for each of those variables?

a. Monte Carlo simulation

b. neural network computing

c. data mining

d. regression analysis

ANSWER: a

RATIONALE: Monte Carlo simulation is a business intelligence tool that enables you to see a spectrum of thousands of possible outcomes, considering not only the many variables involved but also the range of potential values for each of those variables. Regression analysis is a statistical method that determines the relationship between a dependent variable and one or more independent variables. Neural network computing utilizes computers to process data the way the human brain processes data. Data mining is the exploration of large amounts of data to identify hidden patterns.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.5 - Explain how data-driven decisions benefit organizations. TOPICS: Decision Making

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 1/17/2025 1:46 AM

27. The following statements are true about decision making and business intelligence, except:

a. Companies should create an analytics culture that shows a commitment to data-driven decision making.

b. Companies should identify the right tools and strategies to support their business intelligence goals.

c. Companies should engage and train professionals with either business expertise or analytical skills to analyze data effectively and make decisions.

d. Company leaders must identify key skills and knowledge needed across the organization so that everyone in the firm will be committed to data-driven decision making.

ANSWER: c

RATIONALE: Professionals should have business expertise and analytical skills. Both are important for success.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.5 - Explain how data-driven decisions benefit organizations.

TOPICS: Decision Making

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

28. Jenna uses Microsoft Excel Solver to find the optimal price for tickets to a school dance. The expenses of the hall rental, food, and linens, maximum number of attendees, and ticket price are entered into the program to help solve the problem. What type of business intelligence technique is Jenna most likely using?

a. Monte Carlo simulation

b. neural network computing

c. decision tree analysis

d. linear programming

ANSWER: d

RATIONALE:

Jenna is using linear programming, which is a technique for finding the optimum value of a linear expression that is calculated based on the value of a set of decision variables that are subject to a set of constraints. Monte Carlo simulation is a business intelligence tool that enables you to see a spectrum of thousands of possible outcomes, considering not only the many variables involved but also the range of potential values for each of those variables. Neural network computing utilizes computers to process data the way the human brain processes data. A decision tree is an algorithm used to create and visualize classification and regression modeling tasks.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

29. Which data mining technique includes the following steps: business understanding, data understanding, data preparation, modeling, evaluation, and deployment?

a. case-based reasoning

b. Cross-Industry Process for Data Mining

c. association analysis

d. neural network computing

ANSWER: b

RATIONALE: The Cross-Industry Process for Data Mining is a six-phase structured approach for the planning and execution of a data mining project. Its phases include the following steps: business understanding, data understanding, data preparation, modeling, evaluation, and deployment. Case-based reasoning is a process that uses historical ifthen-else cases to recognize patterns. Association analysis uses a specialized set of algorithms to sort through data and form statistical rules about relationships among the items. Neural network computing utilizes computers to process data the way the human brain processes data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

30. Which of the following best describes a genetic algorithm?

a. a technique that employs a natural selection-like process to find approximate solutions to optimization and search problems

b. a specialized set of algorithms to sort through data and form statistical rules about relationships among the items

c. a technique that utilizes computers to process data the way the human brain processes data

d. a technique that enables you to see a spectrum of thousands of possible outcomes, considering not only the many variables involved but also the range of potential values for each of those variables

ANSWER: a

RATIONALE: A genetic algorithm is a technique that employs a natural selection-like process to find approximate solutions to optimization and search problems.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.6.4 - Describe the four types of analytics.

TOPICS: 6.4: Business Analytics and Data

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:35 PM

DATE MODIFIED: 10/22/2024 1:35 PM

1. Which of the following best describes a computer network?

a. a device that directs data packets to other devices until each packet reaches its destination

b. material substance that carries an electronic signal to support communications between a sending and a receiving device

c. computing devices communicating with each other, sharing data and other resources

d. the shape or arrangement of the communication links and hardware devices

ANSWER: c

RATIONALE: A computer network exists when connected computing devices can communicate with each other, sharing data and other resources. Communication can occur over physical communication media or over radio-frequency transmissions. The network topology is the shape or structure of a network, including the arrangement of the communication links and hardware devices. Communications media are any material substance that carries an electronic signal to support communications between a sending and a receiving device. The router is a network hardware device that directs data packets to other networks until each packet reaches its destination.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

2. Which of the following best describes a bus network topology?

a. All network devices are connected to a common backbone that serves as a shared communications medium.

b. All network devices connect to one another through a single central device called the hub node.

c. Each network device is connected to two other network devices, creating a loop pathway.

d. Each network device connects to one of many access points that link them to each other to form a robust network connection across a large area.

ANSWER: a

RATIONALE: The network topology is the shape or structure of a network, including the arrangement of the communication links and hardware devices. In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium. In a star network, all network devices connect to one another through a single central device called the hub node. In ring networks, each device is connected to two other devices. Mesh networks use multiple access points to link a series of devices that connect to each other to form a network connection across a large area.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

3. In a network topology, all network devices connect to one another through a single central device called the hub node.

a. mesh

b. ring

c. bus

d. star

ANSWER: d

RATIONALE: The network topology is the shape or structure of a network, including the arrangement of the communication links and hardware devices. In a star network, all network devices connect to one another through a single central device called the hub node. In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium. In ring networks, each device is connected to two other devices. Mesh networks use multiple access points to link a series of devices that connect to each other to form a network connection across a large area.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

4. In a network topology, each device is connected to two other devices. This creates a loop pathway that routes network signals from device to device until the signal reaches the target devices.

a. mesh

b. ring

c. bus

d. star

ANSWER: b

RATIONALE: The network topology is the shape or structure of a network, including the arrangement of the communication links and hardware devices. In ring networks, each device is connected to two other devices. In a star network, all network devices connect to one another through a single central device called the hub node. In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium. Mesh networks use multiple access points to link a series of devices that connect to each other to form a network connection across a large area.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

5. A network uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area. Communications are routed among network nodes by allowing for continuous connections and by bypassing blocked paths by "hopping" from node to node until a connection can be established.

a. mesh

b. ring

c. bus

d. star

ANSWER: a

RATIONALE: The network topology is the shape or structure of a network, including the arrangement of the communication links and hardware devices. Mesh networks use multiple access points to link a series of devices that connect to each other to form a network connection across a large area. In ring networks, each device is connected to

two other devices. In a star network, all network devices connect to one another through a single central device called the hub node. In a bus network, all network devices are connected to a common backbone that serves as a shared communications medium.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

6. A network is a network that connects large geographic regions.

a. WAN

b. PAN

c. LAN

d. peer-to-peer

ANSWER: a

RATIONALE: A wide area network (WAN) is a network that connects large geographic regions. A personal area network (PAN) is a wireless network that connects information technology (IT) devices close to one person. A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building, is a local area network (LAN). A basic type of LAN is a simple peer-topeer network that a small business might use to share files and hardware devices, such as printers.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

7. What type of network uses a smartphone and connected devices such as a heart monitor, calorie tracker, or glucose monitor?

a. WAN

b. PAN

c. LAN

d. peer-to-peer

ANSWER: b

RATIONALE:

A PAN (personal area network) is a wireless network that connects IT devices close to one person, such as a heart monitor, calorie tracker, or glucose monitor. A WAN (wide area network) is a network that connects large geographic regions. A LAN (local area network) is a network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building. A basic type of LAN is a simple peer-to-peer network that a small business might use to share files and hardware devices, such as printers.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

8. All network users in a large, multi-floored office building can connect to each other's devices for rapid communication. For instance, a user in research and development could send a document from their computer to a printer in the desktop publishing center. What type of network is described in this scenario?

a. WAN

b. PAN

c. LAN

d. VPN

ANSWER: c

RATIONALE: A LAN (local area network) connects computer systems and devices within a small area, such as an office, home, or several floors in a building. A PAN (personal area network) is a wireless network that connects IT devices close to one person, such as a heart monitor, calorie tracker, or glucose monitor. A WAN (wide area network) connects large geographic regions. A VPN (virtual private network is a secure connection between two points on the internet.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

9. A person working on a device connected to a small, home network can use data stored on another device on the network. In addition, a printer connected to the network can be used by the other devices on the network. What type of network is described in this scenario?

a. WAN

b. PAN

c. VPN

d. peer-to-peer

ANSWER: d

RATIONALE: A basic type of LAN (local area network) is a simple peer-to-peer network that a small business might use to share files and hardware devices, such as printers. A PAN (personal area network) is a wireless network that connects IT devices close to one person, such as a heart monitor, calorie tracker, or glucose monitor. A WAN (wide area network) is a network that connects large geographic regions. A virtual private network (VPN) is a secure connection between two points on the internet.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

10. The capacity of a communications channel to carry traffic is known as ______, e.g., Mbps (one million bits per second), Gbps (one billion bits per second).

a. network latency

b. Wi-Fi

c. TCP/IP

d. bandwidth

ANSWER: d

RATIONALE: Bandwidth is the capacity of a communications channel to carry traffic, usually measured in Mbps or Gbps. The higher the bandwidth, the more traffic that can be carried. Network latency measures how long it takes for a unit of data to get to its destination and back again. It is typically measured in milliseconds (ms), or thousandths of a second. A Wi-Fi wireless network and the user's computer, smartphone, or other device has a wireless adapter that translates data into a radio signal and transmits it using an antenna. The Transmission Control Protocol/Internet Protocol (TCP/IP) provides the foundation for the Internet.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

11. Edith is looking to increase web traffic to her pool maintenance company's website by having her website be

higher on the search results listings when potential customers search for pool maintenance. What should Edith invest in to improve her search results ranking?

a. geo-fencing

b. SEO

c. internet service provider

d. near-field communication

ANSWER: b

RATIONALE:

Many businesses invest in search engine optimization (SEO) a process for driving traffic to a website by using techniques that improve the site's ranking in search results. Normally, when a user receives a list of results from a web search, the links listed highest on the first page of the results have a far greater chance of being selected.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.3 - Describe the opportunities and risks that are created by the use of networks.

TOPICS: 7.2: The Internet and World Wide Web

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 4:37 AM

12. Network latency is affected by all the following factors except:

a. the distance between the sender and receiver.

b. the transmission medium used.

c. the speed of the CPU in the devices connected to the network.

d. the number and speed of intermediate switches or routers through which the communications must pass.

ANSWER: c

RATIONALE:

The speed of the central processing unit (CPU) does not directly affect the network latency, which measures how long it takes for a unit of data to get to its destination and back again. All the other answers are factors that can affect network latency.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

13. Each of the following factors affects the communications media chosen for a task except:

a. the amount of information to be exchanged.

b. the speed at which data must be exchanged.

c. whether the users are stationary or mobile.

d. the ISP that will be selected.

ANSWER: d

RATIONALE: The communications media selected for a network depends on the amount of information to be exchanged, the speed at which data must be exchanged, the level of concern about data privacy, whether the users are stationary or mobile, and a variety of other business requirements. The internet service provider (ISP) is not a factor in the selection of the communications media.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

14. Transmission media can be divided into two broad categories: and _________.

a. mesh and Wi-Fi

b. client-server and Bluetooth

c. physical and wireless

d. network topology and network protocol

ANSWER: c

RATIONALE: Transmission media can be divided into two broad categories: physical (also called wired) transmission media, in which communications signals are sent along a solid medium, and wireless, in which the communications signal is broadcast over airwaves as a form of electromagnetic radiation (e.g., radio, infrared, or microwave).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

15. The following are examples of wired communication media except:

a. twisted-pair wire

b. Ethernet cable

c. fiber-optic cable

d. infrared

ANSWER: d

RATIONALE: Infrared, radio, and microwave are the frequency ranges used by wireless media. All the other choices are examples of wired (physical) communication media.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

16. The following are examples of wireless communication media except:

a. twisted-pair wire

b. Bluetooth

c. near-field communication

d. Wi-Fi

ANSWER: a

RATIONALE: Twisted-pair wire is a wired communication media. Bluetooth, near-field communication, and Wi-Fi are examples of wireless communication.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

17. Wireless signal strength depends on all the following factors except:

a. the distance from the source to the receiver

b. obstacles such as buildings and mountains

c. the frequency of the transmitted signal

d. the level of encoded data

ANSWER: d

RATIONALE: The level of encoded data is not a factor in wireless signal strength. Depending on the distance involved, the frequency of the transmitted signal, obstacles such as buildings and mountains, and other conditions, the received signal can be incredibly weak.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common

use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

18. Point-of-sale terminals to pay for purchases, such as Apple Pay, mobile payment, and digital wallet services, are examples of _____________.

a. Bluetooth

b. NFC

c. mesh network

d. IoT

ANSWER: d

RATIONALE: Point-of-sale terminals to pay for purchases, such as Apple Pay, mobile payment, and digital wallet services, are examples of near-field communication (NFC). Bluetooth is a different protocol for wireless communications and supports longer distances than NFC. NFC is more secure than Bluetooth. A mesh network is a type of network topology. The Internet of Things (IoT) are devices embedded with the components of a computer. Examples of these devices are Ring cameras, smart appliances, robot vacuums, and more.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

19. For which is the term Wi-Fi an acronym?

a. The term Wi-Fi is not an abbreviation or acronym.

b. wireless fidelity

c. wireless high-speed internet access

d. wireless internet framework interoperability

ANSWER: a

RATIONALE: The term Wi-Fi is not an abbreviation or acronym. It is a wireless network brand owned by the Wi-Fi Alliance, which consists of about 300 technology companies, including AT&T, Dell, Microsoft, Nokia, and Qualcomm. The alliance exists to improve the interoperability of wireless LAN products based on the IEEE 802.11 series of communications standards.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

20. The retailer Walmart tracks its inventory levels by using tags placed on each carton. The tag transmits data about itself to a reader. What type of wireless technology is Walmart using for its inventory?

a. Bluetooth

b. Wi-Fi

c. RFID

d. geo-fencing

ANSWER: c

RATIONALE: Walmart is using radio-frequency identification (RFID), which uses an antenna embedded in a small tag. When the passive tag senses the pulse from an RFID reader, it is activated and returns an electrical signal.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

21. A(n) is systems software that controls the computer systems and devices on a network and allows them to communicate with each other.

a. network operating system

b. client-server network

c. internet service provider

d. mobile device management software

ANSWER: a

RATIONALE: A network operating system is systems software that controls the computer systems and devices on a network and allows them to communicate with each other.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

22. The following are true of network management software, except:

a. It can monitor the use of individual computers and shared hardware.

b. It can scan for viruses.

c. It can locate communication errors and potential network problems.

d. It can perform memory and task management.

ANSWER: d

RATIONALE: A network operating system, not network management software, can perform memory and task management.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 4:51 AM

23. manages and troubleshoots mobile devices remotely, pushing out applications, data, patches, and settings. With the software, a central control group can maintain group policies for security, control system settings, ensure malware protection is in place for mobile devices used across the network, and make it mandatory to use passwords to access the network.

a. MDM software

b. Network management software

c. TCP/IP

d. Network operating system

ANSWER: a

RATIONALE: Mobile device management (MDM) software manages and troubleshoots mobile devices remotely, pushing out applications, data, patches, and settings. With the software, a central control group can maintain group policies for security, control system settings, ensure malware protection is in place for mobile devices used across the network, and make it mandatory to use passwords to access the network.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.1 - Describe four network topologies and four network types in common use today.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

24. The consists of websites that require some form of login credentials or that may be isolated

through network firewalls and other protections, whereas the is accessed only by special software that allows users and operators a significant degree of anonymity and untraceability and is where people buy cybercrime tools and stolen data, conduct human trafficking, and more.

a. surface web; dark web

b. dark web; deep web

c. deep web; dark web

d. deep web; intranet

ANSWER: c

RATIONALE: The deep web consists of websites that require some form of login credentials or that may be isolated through network firewalls and other protections. The dark web is accessed only by special software that allows users and operators a significant degree of anonymity and untraceability. It is where people buy cybercrime tools and stolen data, conduct human trafficking, and more.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.3 - Describe the opportunities and risks that are created by the use of networks.

TOPICS: 7.4: The Dark Web

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

25. is a protocol that tells other computers how to find your computer or device.

a. HTTP

b. IP address

c. TCP/IP

d. FTP

ANSWER: c

RATIONALE:

An IP address is an internet standard that assigns an address to each device on the Internet. TCP/IP are the protocols that enable the movement of data through the Internet. FTP (file transfer protocol) enables the movement of files between devices over the Internet. HTTP (Hypertext Transfer Protocol) is the standard that provides information and services for the World Wide Web (i.e., web pages) over the Internet.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.2 - Describe how the networks function, including the roles of the TCP/IP protocol, IP addresses, switches, and routers.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

26. A is a network device that keeps a record of the MAC address of all the devices

a. switch

b. router

c. blockchain

d. client-server network

ANSWER: a

RATIONALE:

A switch is a network device that keeps a record of the media access control (MAC) address of all the devices connected to it so it can determine to which port a packet of data should be sent. A router is a network device that directs data packets to other networks until each packet reaches its destination. Blockchain is an online ledger (a set of recorded transactions) shared among multiple computers and constructed so that the transactions are immutable (cannot be altered). Client-server architecture is a networking approach wherein many clients (end-user computing devices) request and receive services from servers (host computers) on the network.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES:

PerVa.POIS5E.25.7.2 - Describe how the networks function, including the roles of the TCP/IP protocol, IP addresses, switches, and routers.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

27. A(n) is a network device that directs data packets to other networks until each packet reaches its destination.

a. switch

b. router

c. ISP

d. VPN

ANSWER: b

RATIONALE: A router is a network device that directs data packets to other networks until each packet reaches its destination. A switch is a network device that sends data packets to the appropriate port using the MAC address of the device connected to it. A VPN (virtual private network) is a secure connection between two points on the internet. An internet service provider (ISP) is an organization that provides internet access.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.2 - Describe how the networks function, including the roles of the TCP/IP protocol, IP addresses, switches, and routers.

TOPICS: 7.1: Network Fundamentals

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

28. is a networking approach wherein many end-user computing devices request and receive services from host computers on the network.

a. HTTP

b. Mesh network

c. World Wide Web

d. Client/server architecture

ANSWER: d

RATIONALE:

Client/server architecture is a networking approach wherein many end-user computing devices (clients) request and receive services from host computers (servers) on the network. HTTP (Hypertext Transfer Protocol) is the standard that provides information and services for the World Wide Web (i.e., web pages) over the Internet. Mesh networks use multiple access points to link a series of devices that connect to each other to form a network connection across a large area. The World Wide Web consists of server and client software, Hypertext Transfer Protocol (http), standards, and markup languages that combine to deliver information and services over the internet.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.3 - Describe the opportunities and risks that are created by the use of networks.

TOPICS: 7.2: The Internet and World Wide Web

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

29. www.target.com is the for the Target company website, and 161.225.136.0 is the

a. DNS; IP address

b. URL; DNS

c. IP address; URL

d. URL; IP address

ANSWER: d

RATIONALE: www.target.com is the uniform resource locator (URL) for the Target company website, and 161.225.136.0 is the IP address.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.3 - Describe the opportunities and risks that are created by the use of networks.

TOPICS: 7.2: The Internet and World Wide Web

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

30. is an online ledger shared among multiple computers constructed so that the transactions are immutable. Examples of this technology include Bitcoin and GameFi.

a. Blockchain

b. Domain name system

c. Network management software

d. Uniform resource locator

ANSWER: a

RATIONALE: Blockchain is an online ledger (a set of recorded transactions) shared among multiple computers constructed so that the transactions are immutable (cannot be altered).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.7.3 - Describe the opportunities and risks that are created by the use of networks.

TOPICS: 7.2: The Internet and World Wide Web

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

1. Which of the following best describes a B2B e-commerce transaction?

a. A student buys a textbook from Cengage.com.

b. A tax accounting firm buys paper from an office supply retailer.

c. A person buys their mother a handmade gift directly from a seller on Etsy.com.

d. A municipal fire department buys equipment from a fire equipment wholesaler.

ANSWER: b

RATIONALE: A tax accounting firm buying paper from an office supply retailer is an example of a business buying directly from another business (B2B). A student who buys a textbook online is an example of business to consumer (B2C). A person who buys a gift from another person directly is an example of consumer to consumer (C2C). A fire department buying equipment is an example of government to business (G2B).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.1 - Describe the types of e-commerce.

TOPICS: 8.1: Introduction to E-Commerce

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

2. Ramandeep purchases concert tickets from a ticket app on her cell phone. Which of the following best describes this type of transaction?

a. m-commerce

b. social commerce

c. omnichannel

d. brick and mortar

ANSWER: a

RATIONALE: Because Ramandeep purchased tickets on an app on her cell phone (that was not a social media app), it is best described as m-commerce or mobile commerce. Mobile commerce involves business transactions conducted using mobile devices such as cell phones and tablets. Social commerce encompasses business transactions conducted using social networking sites, such as Instagram and Facebook. Omnichannel refers to an integrated strategy for engaging current and potential customers across multiple platforms and channels of communication to provide a seamless experience. In other words, a customer can use many channels to interact with a business. Brick and mortar is a term that is used to describe business conducted in a physical building.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.1 - Describe the types of e-commerce.

TOPICS: 8.1: Introduction to E-Commerce

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

3. An organization that aspires to have multiple interconnected channels of communication available to customers is aspiring to what type of strategy?

a. m-commerce

b. social commerce

c. omnichannel

d. brick and mortar

ANSWER: c

RATIONALE: The company is aspiring to an omnichannel strategy. Omnichannel refers to an integrated strategy for engaging current and potential customers across multiple platforms and channels of communication to provide a seamless experience. In other words, a customer can use many channels to interact with a business. Brick and mortar is a term that is used to describe business conducted in a physical building. Mobile commerce involves business transactions conducted using mobile devices such as cell phones and tablets. Social commerce encompasses business transactions conducted using social networking sites, such as Instagram and Facebook. An omnichannel strategy would aspire to use all of these options and more.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.1 - Describe the types of e-commerce.

TOPICS: 8.1: Introduction to E-Commerce

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

MODIFIED: 10/22/2024 1:36 PM

4. Which of the following statements is true?

a. Both e-commerce and social commerce are part of m-commerce.

b. Digital commerce refers to e-commerce that involves the purchase of digital-only products.

c. Tablets are the most rapidly growing segment of m-commerce.

d. E-commerce allows businesses to reach more prospects, reduce costs, scale easily, and provide around-the-clock access to customers.

ANSWER: d

RATIONALE: E-commerce allows businesses to reach more prospects, reduce costs, scale easily, and provide around-the-clock access to customers. Both mobile commerce and social commerce are part of e-commerce. Digital commerce refers to e-commerce that involves digital transmission. Products can be goods and services that are physical or digital. Cell phones are the most rapidly growing segment of m-commerce.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.1 - Describe the types of e-commerce.

TOPICS: 8.1: Introduction to E-Commerce

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

5. describes an organization's ability to control costs while maintaining performance and quality as demand changes.

a. Scalability

b. Omnichannel

c. Market segmentation

d. Sell-side e-commerce

ANSWER: a

RATIONALE: Scalability describes an organization's ability to control costs while maintaining performance and quality as demand changes.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.2 - Summarize the advantages of e-commerce.

TOPICS: 8.2: E-Commerce Advantages

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

6. The following are advantages of e-commerce except:

a. scalability

b. 24/7 availability

c. limited market reach

d. lower overhead costs

ANSWER: c

RATIONALE: E-commerce allows businesses to reach more markets, reduce costs, scale easily, and provide around-the-clock (24/7) access to customers.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.2 - Summarize the advantages of e-commerce.

TOPICS: 8.2: E-Commerce Advantages

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

7. What is a key advantage of e-commerce over physical, "brick-and-mortar" stores?

a. immediate product availability for purchase

b. ability to touch and try on products

c. limited market reach

d. lower overhead costs

ANSWER: d

RATIONALE: E-commerce allows businesses to reach more markets, reduce costs, scale easily, and provide around-the-clock (24/7) access to customers. Their costs are lower because they don't have to pay for physical stores, real-estate taxes, building insurance, and more.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.2 - Summarize the advantages of e-commerce.

TOPICS: 8.2: E-Commerce Advantages

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

8. E-commerce reduces costs in the following ways except:

a. reducing time-consuming and labor-intensive tasks throughout the order and delivery process

b. increasing accuracy thereby lowering costs for rework

c. increasing the need for inventory

d. lower overhead and fulfillment costs

ANSWER: c

RATIONALE: With increased speed and accuracy of customer order information, companies can reduce the need for inventory from raw materials to safety stocks and finished goods at all the intermediate manufacturing, storage, and transportation points. Ecommerce allows businesses to reach more markets, reduce costs, scale easily, and

provide around-the-clock (24/7) access to customers. Their costs are lower because they don't have to pay for physical stores, other overhead associated with physical stores, and employees. They also have lower fulfillment costs.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.2 - Summarize the advantages of e-commerce.

TOPICS: 8.2: E-Commerce Advantages

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 4:56 AM

9. Which statement is not true about scalability as it relates to e-commerce?

a. If more shoppers visit a company's site, the company can increase the bandwidth and computing power at a relatively low cost.

b. Scaling up requires some increases in operational expenses.

c. E-commerce can increase product offerings quickly and easily.

d. Scaling down can be costly because cloud service providers lock companies in to long-term commitments.

ANSWER: d

RATIONALE: Scaling down is not very costly. If demand drops, the costs drop. Most cloud service providers do not lock companies in to long-term commitments. If more shoppers visit a company's site, the company can increase the bandwidth and computing power at a relatively low cost. Scaling up does require some increases in operational expenses because the company is using more storage and/or bandwidth to account for the increased demand. Unlike physical stores, e-commerce can increase product offerings relatively quickly and easily.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.2 - Summarize the advantages of e-commerce.

TOPICS: 8.2: E-Commerce Advantages

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

10. The following pose challenges to e-commerce except:

a. omnichannel management

b. cybersecurity

c. competition

d. scalability

ANSWER: d

RATIONALE: Scalability is not a major challenge to e-commerce and is an advantage. Most service providers allow their customers to easily scale up or down. Omnichannel

management poses a challenge because it requires significant automation and coordination. Because a lot of personal data is shared in e-commerce transactions, cybersecurity is a very real challenge. Because e-commerce can reach customers anywhere at any time, customers have more purchasing options and companies have more competition.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.3 - Summarize the challenges of e-commerce.

TOPICS: 8.3: E-Commerce Challenges

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

11. E-commerce companies need to consider ______________, which is the protection against unauthorized and illegal use of digital data.

a. omnichannel management

b. cybersecurity

c. shopping cart abandonment

d. scalability

ANSWER: b

RATIONALE: E-commerce companies need to consider cybersecurity, which is the protection against unauthorized and illegal use of digital data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.3 - Summarize the challenges of e-commerce.

TOPICS: 8.3: E-Commerce Challenges

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

12. Which of the following is not one of the five National Institute of Standards and Technology (NIST) Framework functions?

a. identify

b. respond

c. govern

d. examine

ANSWER: d

RATIONALE: Examine is not a NIST Framework function. The five Framework functions are: Identify: Determine the current cybersecurity risk to the organization. Protect: Use safeguards to prevent or reduce cybersecurity risk. Detect: Find and analyze possible cybersecurity attacks and compromises. Respond: Take action regarding a detected cybersecurity incident. Recover: Restore assets and operations that were impacted by

a cybersecurity incident. Govern: Establish and monitor the organization's cybersecurity risk management strategy, expectations, and policy.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.3 - Summarize the challenges of e-commerce.

TOPICS: 8.3: E-Commerce Challenges

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

13. Compromise of personal data on e-commerce platforms can lead to _________, the use of a person's without their permission.

a. identity theft; PII

b. PII; apps

c. phishing; email address

d. cyberattacks; PII

ANSWER: a

RATIONALE: Compromise of personal data on e-commerce platforms can lead to identity theft, which is using a person's personally identifiable information (PII) without their permission. Phishing is spam email that entices you to provide an identity thief with your PII. Cyberattacks are activities that can compromise an e-commerce platform to obtain PII.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.3 - Summarize the challenges of e-commerce.

TOPICS: 8.3: E-Commerce Challenges

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

14. What is the most significant challenge with e-commerce shopping cart abandonment?

a. Abandoned carts reserve items that can't be sold to other customers, tying up inventory.

b. Abandoned carts require immediate technical assistance from online employees.

c. Abandoned carts increase company costs.

d. Abandoned carts result in increased fees to the customer.

ANSWER: a

RATIONALE: The most significant challenge is that abandoned carts reserve items that can't be sold to other customers, tying up inventory and thus reducing sales for the company. They don't require technical assistance from employees, and they don't directly increase company costs, nor do they result in increased fees to the customer. However, customers often abandon the carts because of fees that were outlined only at checkout.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.3 - Summarize the challenges of e-commerce.

TOPICS: 8.3: E-Commerce Challenges

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

15. What are the steps in the order fulfillment process?

a. warehouse processing, order placement, order completion

b. order placement, warehouse processing, order shipping, order delivery

c. warehouse processing, order placement, order fulfillment

d. order placement, warehouse processing, order delivery, quality check

ANSWER: b

RATIONALE: The steps in the order fulfillment process are order placement, warehouse processing, order shipping, and order delivery.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.3 - Summarize the challenges of e-commerce.

TOPICS: 8.3: E-Commerce Challenges

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

16. Francesca's Home Décor is a small online business that sells pictures, candles, and other home products. The company is having a tough time competing with other, larger online retailers with respect to fulfillment. What can Francesca do to better compete in order fulfillment?

a. To fulfill orders quickly and economically, smaller e-commerce retailers like Francesca's can contract with a service such as Amazon Fulfillment Services to perform order fulfillment.

b. Small organizations like Francesca's cannot compete with the order fulfillment of larger organizations.

c. Francesca's should offer order pickup at multiple physical locations.

d. Francesca's should implement quality checks to reduce order fulfillment errors.

ANSWER: a

RATIONALE: To fulfill orders quickly and economically, smaller e-commerce retailers can contract with a service such as Amazon Fulfillment Services to perform order fulfillment. This allows small organizations to compete with larger ones. Offering order pickup at physical locations would not be cost-effective. Francesca's should implement quality checks, but it will not allow the company to better compete with larger organizations on order fulfillment.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.3 - Summarize the challenges of e-commerce.

TOPICS: 8.3: E-Commerce Challenges

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 5:02 AM

17. Competition in e-commerce is a challenge because of the following factors except:

a. lack of geographic boundaries

b. customers can easily compare products and prices between sites

c. difficult entry into the e-commerce market due to website development and hosting expenses

d. low setup cost

ANSWER: c

RATIONALE: It is not difficult for businesses to enter the e-commerce market. The ease of entry for e-commerce increases competition. For a relatively low setup cost, a company can create a website and start selling products online. An e-commerce business can reach customers anywhere at any time through their website and social media presence. The lack of geographic boundaries also provides customers with more purchasing options. Customers often move from one website to the next to find options for purchasing products and services.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.3 - Summarize the challenges of e-commerce TOPICS: 8.3: E-Commerce Challenges

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

18. Three Feathers Furniture can evaluate its e-commerce business using SWOT analysis. Which of the following is an example of a threat to Three Feathers Furniture?

a. A competitor can deliver its products to the customer in two days four days faster than Three Feathers Furniture.

b. Three Feathers Furniture requires four days to make a product before it is shipped to the warehouse.

c. Competitors of Three Feathers Furniture offer the same product for $15 more.

d. Three Feathers Furniture has a strong reputation.

ANSWER: a

RATIONALE: Threat: A competitor can deliver its products to the customer in two days four days faster than Three Feathers Furniture. This is a threat because it is negative and external. Weakness: Three Feathers Furniture requires four days to make a product before it is shipped to the warehouse. This is a weakness and is not a threat because it is internal. Strengths: Competitors of Three Feathers Furniture offer the same product for $15 more, and Three Feathers Furniture has a strong reputation.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.3 - Summarize the challenges of e-commerce.

TOPICS: 8.3: E-Commerce Challenges

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 5:05 AM

19. What is the approach to automate and streamline operations and communications with trading partners?

a. omnichannel

b. digital commerce

c. scalability

d. electronic data interchange

ANSWER: d

RATIONALE: Electronic data interchange is the approach to automate and streamline operations and communications with trading partners.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

20. Which electronic data interchange (EDI) platform is managed by a group of traditionally competing companies with common procurement needs?

a. international

b. private

c. independent

d. consortium-operated

ANSWER: d

RATIONALE: Electronic data interchange (EDI) is the approach to automate and streamline operations and communications with trading partners. EDI functionality is integrated into web-based B2B e-commerce platforms. There are three types of platforms: private, consortium-operated, and independent. Private platforms are owned and operated by a single company. The owner uses the platform to trade exclusively with established business partners. Consortium-operated platforms are managed by a group of traditionally competing companies with common procurement needs. Independent platforms are open to any set of buyers and sellers within a given market. They provide services and common technology to their members and are open, usually for a fee, to any company that wants to use them.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

21. is a labor market where work is performed by temporary, part-time, and independent contract workers.

a. Gig economy

b. Social commerce

c. Affiliate marketing

d. Digital commerce

ANSWER: a

RATIONALE: The gig economy is a labor market where work is performed by temporary, part-time, and independent contract workers. Social commerce encompasses business transactions conducted using social networking sites, such as Instagram and Facebook. Affiliate marketing is a technique that involves paying a third party to drive traffic to a company's website and generate sales. Digital commerce refers to ecommerce that involves digital transmission.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

22. The choice of which electronic data interchange (EDI) platform to use depends on the following main factors except:

a. data-sharing requirements

b. budget

c. functionality

d. scalability

ANSWER: d

RATIONALE: Scalability is not one of the main factors. Manufacturers engaged in e-commerce must create an EDI strategy that works best for their organization. The choice of a private, consortium-operated, or independent platform depends on data-sharing requirements, budget, and functionality Companies must evaluate each option against their business requirements to determine the best fit.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

23. Web and social media advertisers use e-commerce data for to identify specific markets and target them with tailored advertising messages.

a. market segmentation

b. buy-side e-commerce

c. gamification marketing

d. electronic data interchange

ANSWER: a

RATIONALE: Web and social media advertisers use e-commerce data for market segmentation to identify specific markets and target them with tailored advertising messages. Market segmentation divides the pool of potential customers into subgroups, usually defined in terms of demographic characteristics, such as age, gender, marital status, income level, and geographic location.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

24. tools allow e-commerce businesses to gather and analyze data from a variety of online sources.

a. Market segmentation

b. Affiliate marketing

c. Marketing analytics

d. Electronic data interchange

ANSWER: c

RATIONALE: Marketing analytics tools allow e-commerce businesses to gather and analyze data from a variety of online sources.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

25. Target has a reward program in its mobile app where customers can earn a $10 gift card if they spend $75 or more in each of three separate transactions. A progress "sticker" is placed in the app to show progress toward the goal. What type of marketing technique is Target using?

a. market segmentation

b. affiliate marketing

c. marketing analytics

d. gamification marketing

ANSWER: d

RATIONALE: Target is using gamification marketing. Gamification marketing is a marketing technique that uses design elements from games to attract and retain customers. Through gamification marketing, consumers are directed to perform actions for competition or reward.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

26. Huda Kattan uses various social media platforms, including Instagram, YouTube, and her own cosmetics blog, to promote her own brands as well as the brands of others with which she has strategic partnerships. She earns commissions for sales generated through links to the products she promotes. What type of marketing technique is she using?

a. market segmentation

b. affiliate marketing

c. marketing analytics

d. gamification marketing

ANSWER: b

RATIONALE: Huda uses affiliate marketing to promote her cosmetics line and the products of her strategic partners. Affiliate marketing is a marketing technique that involves paying a third party to drive traffic to a company's website and generate sales. The third party can be a company that specializes in this process or social media influencers, who are people with expertise in an area and have a curated audience that engages with their social media channels. Affiliate marketing allows companies to reach their target audience in places where the audience naturally engages.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

27. Mobile ad impressions are generally purchased using one of four major models. Which of the following best describes when organizations are charged for every click on their ad?

a. cost per mile (CPM)

b. cost per click (CPC)

c. cost per view (CPV)

d. cost per action (CPA)

ANSWER: b

RATIONALE: In CPC, organizations are charged for every click on their ad. In CPM, organizations are charged for every 1,000 times an ad is shown. In CPA, organizations are charged when a user makes a specific action, such as an in-app purchase, subscription signup, or form submission. And in CPV, organizations are charged each time a mobile video ad is viewed.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

28. What metric is a main measure of success for the number of users reached by an online advertisement?

a. cost per mile (CPM)

b. cost per click (CPC)

c. cost per view (CPV)

d. click-through rate (CTR)

ANSWER: d

RATIONALE: The main measures of success are the number of users reached, the CTR, and the number of actions users take. Other measures such as CPM, CPC, and CPV do not measure the effectiveness that drives a user to take action.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.4 - Discuss common e-commerce applications.

TOPICS: 8.4: E-Commerce Applications

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

29. The most successful e-commerce models have which three basic components?

a. community, content, commerce

b. content, analytics, scalability

c. communication, content, advertising

d. analytics, communication, advertising

ANSWER: a

RATIONALE: The most successful e-commerce models include three basic components: community, content, and commerce.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.5 - Identify strategies for successful e-commerce.

TOPICS: 8.5: Strategies for Successful E-Commerce

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

30. What technique optimizes a website's content, structure, and relevance to improve its visibility and ranking to draw customers to the website?

a. search engine optimization

b. web analytics

c. market segmentation

d. click per view

ANSWER: a

RATIONALE: Search engine optimization effectively leverages social media, provides fresh content, and uses targeted advertising to draw customers to a site.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.8.5 - Identify strategies for successful e-commerce.

TOPICS: 8.5: Strategies for Successful E-Commerce

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

1. Many organizations employ ______________, which capture and process the detailed data necessary to update records about the fundamental business operations of an organization.

a. transaction processing systems

b. enterprise systems

c. decision support systems

d. customer relationship management systems

ANSWER: a

RATIONALE: Many organizations employ transaction processing systems, which capture and process the detailed data necessary to update records about the fundamental business operations of an organization. An enterprise system is central to individuals and

organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the running and managing of a business. A customer relationship management system focuses on managing aspects of customer interactions and relationships.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

2. A is a set of business activities that cannot be subdivided.

a. transaction

b. data streaming

c. source data automation

d. computer-aided manufacturing

ANSWER: a

RATIONALE: A transaction is a set of business activities that cannot be subdivided.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

3. A(n) is a form of data processing where each transaction is processed immediately without the delay of accumulating transactions.

a. online transaction processing system

b. batch processing system

c. customer relationship management system

d. enterprise system

ANSWER: a

RATIONALE: An online transaction processing system is a form of data processing where each transaction is processed immediately without the delay of accumulating transactions as opposed to a batch processing system, which is a form of data processing where business transactions are accumulated over a period of time and prepared for processing as a single unit or batch. An enterprise system is central to individuals and organizations of all sizes and ensures that information can be shared with authorized users across all business functions and at all levels of management to support the

running and managing of a business. A customer relationship management system focuses on managing aspects of customer interactions and relationships.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/17/2025 1:49 AM

4. Transaction processing systems should accomplish the following objectives except:

a. ensure that the data is processed accurately and completely.

b. produce batch user responses and reports.

c. avoid processing fraudulent transactions.

d. reduce clerical and other labor requirements.

ANSWER: b

RATIONALE: Transaction processing systems (TPSs) should produce real-time, timely responses and reports. Because of the importance of transaction processing, organizations expect their TPSs to accomplish a number of specific objectives, including the following: Capture, process, and update business databases; data required to support routine business activities; ensure that the data is processed accurately and completely; avoid processing fraudulent transactions; produce timely user responses and reports; reduce clerical and other labor requirements; help improve customer service; and achieve competitive advantage.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

5. Each of the systems below is a type of transaction processing system except:

a. order processing systems.

b. accounting systems.

c. customer relationship management systems.

d. purchasing systems.

ANSWER: c

RATIONALE: An order processing system, accounting system, and purchasing system process transactions (i.e., a TPS), whereas a customer relations management system is an

enterprise system that provides information about customers (much of which comes from the organization's transaction processing systems).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

6. Select the activity list below with the activities in the transaction processing cycle.

a. data collection, data editing, data correction, data processing, data storage, output production

b. data editing, data collection, data streaming, data processing, data storage, output production

c. data streaming, data collection, data processing, data storage, output processing

d. input processing, data processing, data storage, data editing, output processing

ANSWER: a

RATIONALE: The activities in the transaction processing cycle include data collection, data editing, data correction, data processing, data storage, and output production.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

7. Which of the following statements is not true about transaction processing systems (TPSs)?

a. For small and medium-sized enterprises (SMEs), TPSs are typically easy to install.

b. For SMEs, TPSs have a low cost of total ownership.

c. For SMEs, TPSs are not cloud-based.

d. TPSs perform a common set of basic data processing functions.

ANSWER: c

RATIONALE: All the statements are true, except that many transaction processing systems are cloud-based.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 9:51 AM

8. Kroger, a large grocery retailer in the United States, uses UPC codes read by a scanner picked up at the register to scan products a customer is buying. What approach to data collection is Kroger using?

a. data streaming

b. source data automation

c. input data processing

d. Radio frequency identification processing

ANSWER: b

RATIONALE: Kroger is using source data automation in which the data is captured at its source and recorded accurately in a timely fashion, with minimal manual effort, and in an electronic or digital form that can be directly entered into the collecting information system. Data streaming focuses on real-time processing and analysis of data as it flows in, whereas source data automation aims to automate and improve the accuracy of data capture at the point of origin.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

9. is the best choice when organizations are using the data to become more agile, innovative, and responsive to threats and opportunities.

a. Data streaming

b. Data correction

c. Data editing

d. Batch processing

ANSWER: a

RATIONALE: Data streaming focuses on real-time processing and analysis of data as it flows in, whereas source data automation aims to automate and improve the accuracy of data capture at the point of origin. It is the best choice when organizations are using the data to become more agile, innovative, and responsive to threats and opportunities. Batch processing is not real-time processing of data and would not be the best choice in this instance. Data correction and editing, while important, will not directly assist the company in becoming more agile, innovative, or responsive.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all

transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

10. A Target associate scans a product, but the product is not found in the database. Therefore, the transaction is rejected. Which activity in the transaction processing cycle is this?

a. data streaming

b. data correction

c. data editing

d. data processing

ANSWER: c

RATIONALE: Data editing checks data for validity and completeness to detect any problems, which is what is happening in this scenario. Data correction involves reentering data that was not typed or scanned properly. In the scenario, we are told that the product is not found in the database. Data streaming focuses on real-time processing and analysis of data as it flows in. Data processing performs calculations and other data transformations related to business transactions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

11. A Petco associate scans a partially ripped UPC code on a dog toy. The UPC scanned does not match the master table and an error message appears instructing the associate to rescan the item or type the information into the system manually. Which activity in the processing transaction data cycle is this?

a. data streaming

b. data correction

c. data editing

d. data processing

ANSWER: b

RATIONALE: Data correction involves reentering data that was not typed or scanned properly. In the scenario, we are told that the product was not properly scanned, and the associate is instructed to rescan or manually enter in the data. This is an example of data correction. Data editing checks data for validity and completeness to detect any problems, but it does not instruct the associate to try again. Data streaming focuses on real-time processing and analysis of data as it flows in. Data processing performs calculations and other data transformations related to business transactions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

12. An employee runs a report in which an employee's pay is calculated by multiplying the hours worked by the hourly pay rate. Overtime pay, federal and state tax withholdings, and deductions are also calculated. Which activity in the processing transaction cycle is this?

a. data streaming

b. data correction

c. data editing

d. data processing

ANSWER: d

RATIONALE:

Data processing performs calculations and other data transformations related to business transactions. In this scenario, the employee's compensation is calculated. Data correction involves reentering data that was not typed or scanned properly. Data editing checks data for validity and completeness to detect any problems, but it does not instruct the associate to try again. Data streaming focuses on real-time processing and analysis of data as it flows in.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

13. Which activity in the processing transaction cycle involves generating records such as documents, reports, and files containing important data elements?

a. data streaming

b. data processing

c. output production

d. online transaction processing

ANSWER: c

RATIONALE: Output production is the last step in the processing data transaction cycle and involves generating output records such as documents, reports, and files containing important data elements. Data correction involves reentering data that was not typed or scanned properly. Data streaming focuses on real-time processing and analysis of data as it flows in. Data processing performs calculations and other data

transformations related to business transactions. Online transaction processing is a form of data processing where each transaction is processed immediately without the delay of accumulating transactions into a batch.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.1 - Identify the basic activities and business objectives common to all transaction processing systems.

TOPICS: 9.1: Transaction Processing Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

14. Which system shares information across all business functions and at all levels of management to support the running and managing of the business?

a. enterprise system

b. product lifecycle management software

c. transaction processing system

d. online transaction processing

ANSWER: a

RATIONALE: An enterprise system shares information across all business functions and at all levels of management to support the running and managing of the business. Online transaction processing is a form of data processing where each transaction is processed immediately without the delay of accumulating transactions into a batch. Transaction processing systems capture and process the detailed data necessary to update records about the fundamental business operations of an organization. Product lifecycle management software provides a means for managing the data and processes associated with the various phases of the product lifecycle.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

15. Which of the following systems is not an example of an enterprise system?

a. enterprise resource planning

b. asset management

c. customer relationship management

d. online transaction processing

ANSWER: d

RATIONALE: An enterprise system shares information across all business functions and at all levels of management to support the running and managing of the business and includes enterprise resource planning, customer relationship management, and asset management systems. Online transaction processing is a form of data processing where each transaction is processed immediately without the delay of accumulating transactions into a batch.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

16. What is the ultimate goal of enterprise systems?

a. to satisfy customers and provide significant benefits by reducing costs and improving service

b. to provide the processing of business payroll transactions

c. to produce order processing and inventory management

d. to support social media marketing and other sales- and marketing-related processes

ANSWER: a

RATIONALE: The ultimate goal of enterprise systems is to satisfy customers and provide significant benefits by reducing costs and improving service. The other options are each only a piece of this ultimate goal.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

17. A(n) system manages a company's vital business operations for an entire organization even a complex, multisite, global organization. A(n) system helps a company manage all aspects of customer encounters, including marketing, sales, distribution, accounting, and customer service.

a. enterprise resource planning; customer relationship management

b. customer relationship management; enterprise resource planning

c. enterprise resource planning; asset management

d. transaction processing; customer relationship management

ANSWER: a

RATIONALE: An enterprise resource planning system manages a company's vital business operations for an entire organization even a complex, multisite, global organization. A customer relationship management system helps a company manage all aspects of customer encounters, including marketing, sales, distribution, accounting, and customer service.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 9:55 AM

18. The following are the advantages of enterprise resource planning systems except:

a. improved access to quality data for operational decision making.

b. opportunity to upgrade and standardize technology infrastructure.

c. improvement of work processes.

d. inclusion of legacy systems.

ANSWER: d

RATIONALE: The primary benefits of implementing enterprise resource planning (ERP) include improved access to quality data for operational decision making, improvement of work processes, and the opportunity to upgrade and standardize technology infrastructure. With ERP systems, the elimination of costly, inflexible legacy systems was a major advantage.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 10:02 AM

19. What type of system includes planning, executing, and controlling with the goal of improving customer service while decreasing costs?

a. supply-chain management

b. transaction processing

c. customer relationship management

d. computer-aided manufacturing

ANSWER: a

RATIONALE:

An organization can use an ERP system within a manufacturing organization to support what is known as supply-chain management (SCM). SCM includes planning, executing, and controlling all activities involved in sourcing and procuring raw materials, converting raw materials to finished products, and warehousing and delivering finished products to customers. The goal of SCM is to decrease costs and improve customer service while reducing the overall investment in inventory in the supply chain.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

20. A supply-chain management (SCM) system involves managing materials, information, and finances as they move from to to wholesaler to retailer to consumer.

a. supplier; manufacturer

b. manufacturer; producer

c. producer; manufacturer

d. supplier; engineering

ANSWER: a

RATIONALE: SCM involves managing materials, information, and finances as they move from supplier to manufacturer to wholesaler to retailer to consumer.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

21. Which activity is not included in supply-chain management (SCM) systems?

a. sourcing and procuring finished materials

b. converting raw materials to finished products

c. warehousing products

d. delivering finished products to customers

ANSWER: a

RATIONALE: SCM includes planning, executing, and controlling all activities involved in sourcing

and procuring raw materials, converting raw materials to finished products, and warehousing and delivering finished products to customers. It does not source and procure finished materials but, rather, it sources raw materials or other components that go into finished products.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

22. The key features of a(n) system include contact management, sales management, customer support, and marketing automation.

a. customer relationship management

b. supply-chain management

c. transaction processing

d. online transaction processing

ANSWER: a

RATIONALE: The key features of a customer relationship management system include contact management, sales management, customer support, and marketing automation.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

23. system vendors include Zoho, Pipedrive, and Salesforce.

a. Customer relationship management

b. Supply-chain management

c. Transaction processing

d. Online transaction processing

ANSWER: a

RATIONALE: The key features of a customer relationship management (CRM) system include contact management, sales management, customer support, and marketing automation. Zoho, Pipedrive, and Salesforce provide CRM systems to customers such as Amazon, Dell, and Netflix.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 10:04 AM

24. is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information.

a. Customer relationship management

b. Supply-chain management

c. Product lifecycle management

d. Computer-aided engineering

ANSWER: c

RATIONALE: Product lifecycle management is an enterprise business strategy that creates a common repository of product information and processes to support the collaborative creation, management, dissemination, and use of product and packaging definition information. Supply-chain and customer relationship management are information systems that focus on their respective business functions. Computer-aided engineering is the use of software to analyze the robustness and performance of components and assemblies.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/17/2025 1:49 AM

25. Brose is a supplier to major automotive manufacturers. The company works with its customer, Nissan, and uses to manage the initial design stages for its products.

a. customer relationship management systems

b. supply-chain management systems

c. product lifecycle management software

d. online transaction processing

ANSWER: c

RATIONALE: Product lifecycle management software provides a means for managing the data and

processes associated with the various phases of the product lifecycle. In this case, Brose collaborates with Nissan during the design stages. Supply-chain and customer relationship management are information systems that focus on their respective business functions. Online transaction processing is a form of data processing where each transaction is processed immediately without the delay of accumulating transactions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

26. is the use of software to assist in creating, analyzing, and modifying the design of a component or product, whereas is the use of software to analyze the robustness and performance of components and assemblies.

a. CAD; CAE

b. CAE; CAD

c. CAM; CAE

d. CAE; CAM

ANSWER: a

RATIONALE: Computer-aided design (CAD) is the use of software to assist in creating, analyzing, and modifying the design of a component or product, whereas computer-aided engineering (CAE) is the use of software to analyze the robustness and performance of components and assemblies Computer-aided manufacturing (CAM) is the use of software to control machine tools and related machinery in the manufacture of components and products.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

27. The following are the benefits of a product lifecycle management system except:

a. reduced time to market.

b. reduced costs.

c. ensuring regulatory compliance.

d. increased marketing reach.

ANSWER: d

RATIONALE: A product lifecycle management system can benefit a company by reducing time to market and costs and ensuring regulatory compliance. However, it cannot directly assist with increasing marketing reach.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

28. Toby, an information technology manager, has just notified his manager that a server has failed and is unrecoverable; it needs to be replaced. What process can help with the tracking and disposal of the old server and the acquisition of the new server?

a. asset management

b. source data automation

c. product lifecycle management

d. best practices

ANSWER: a

RATIONALE: The company can employ asset management, which refers to a systematic process of developing, operating, maintaining, upgrading, and disposing of assets in the most cost-effective manner (including all costs, risks, and performance attributes). Source data automation is the process where data is captured at its source and recorded accurately in a timely fashion, with minimal manual effort, and in an electronic or digital form that can be directly entered into the collecting information system. Product lifecycle management software provides a means for managing the data and processes associated with the various phases of the product lifecycle. While it is best practice to track company equipment, asset management is a more applicable answer.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

29. The following are challenges to the successful implementation of an ERP except:

a. cost of disruption of upgrades.

b. long implementation lead time.

c. simplification of business processes.

d. difficulty managing change.

ANSWER: c

RATIONALE: Challenges to a successful ERP implementation include the cost of disruption of upgrades, long implementation lead time, difficulty managing change, management of software customization, and user frustration with the new system. An advantage, but not disadvantage, of an ERP implementation ideally would be the simplification of business processes.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 1/16/2025 10:08 AM

30. The following are the advantages of a hosted software model for an ERP except:

a. decreased total cost of ownership.

b. faster system start-up.

c. reduced availability and reliability issues.

d. lower implementation risk.

ANSWER: c

RATIONALE: The advantages of a hosted software model are decreased total cost of ownership, faster system start-up, lower implementation risk, and using outsourced experts to manage the system. A disadvantage is that there may be potential availability and reliability issues.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.9.2 - Identify the basic functions performed and the benefits derived from the implementation of an enterprise resource planning system, customer resource management, product lifecycle management system, and asset management system.

TOPICS: 9.2: Enterprise Systems

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:36 PM

DATE MODIFIED: 10/22/2024 1:36 PM

1. Opportunities and problems that frequently trigger the initiation of an information system project include the following except:

a. to pursue opportunities to use information systems to support a key organization strategy.

b. to establish and maintain a strong competitive advantage in a challenging industry.

c. to upgrade core tools a company uses to deliver products and services to its customers.

d. to reduce the number of employees that deliver services to the organization's customers.

ANSWER: d

RATIONALE: While IT projects may end up automating tasks that ultimately reduce the number of employees, this isn't a frequent trigger or common motivation for initiating an information systems project. The main opportunities and problems are to pursue opportunities, create competitive advantage, and upgrade core tools.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

2. Which of the following is an advantage of building a custom information system over buying or subscribing?

a. provides a better match to the current work processes

b. less expensive to implement

c. faster to implement

d. less of a need for internal expertise

ANSWER: a

RATIONALE: The advantage to building a custom information system can provide a better match to the current work processes along with a potential competitive advantage. On the other hand, software development can be extremely costly; it can take months or even years to develop custom software, and the company will be dependent on internal employees for expertise.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 5:36 AM

3. permits access to the source code so that it can be studied, changed, and improved by the organization's own software professionals with no maintenance charges.

a. Software as a Service (SaaS)

b. Free and open-source software

c. Commercial off-the-shelf (COTS) software

d. Platform as a Service

ANSWER: b

RATIONALE: Free and open-source software permits access to the source code so that it can be studied, changed, and improved by the organization's own software professionals with no maintenance charges. SaaS, platform as a service, and COTS software do not allow the source code to be studied and most often incur maintenance charges.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/21/2025 2:37 AM

4. is a software distribution model under which a third-party provider hosts an application and makes it available over the internet to subscribers who typically pay a monthly fee based on factors such as number of users, network use, or storage used.

a. Software as a Service (SaaS)

b. Free and open-source software

c. Commercial off-the-shelf (COTS)

d. Custom-built software

ANSWER: a

RATIONALE: SaaS is a software distribution model under which a third-party provider hosts an application and makes it available over the internet to subscribers who typically pay a monthly fee based on factors such as number of users, network use, or storage used. Free and open-source software permits access to the source code so that it can be studied, changed, and improved by the organization's own software professionals with no maintenance charges. COTS software is an existing product available for purchase or license. Custom-built software is tailored specifically to a company's unique requirements and is not hosted in such a manner by a third party.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.4 - Explain the advantages and disadvantages of the Software as a Service (SaaS) model.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 12:35 AM

5. Kiswe provides cloud-based interactive video solutions, enabling organizations to create live and on-demand video content with interactive features. The company is building new features for its customers. The set of activities involved in building information systems to meet users' needs is called __________.

a. functional decomposition

b. software development

c. system maintenance

d. progressive elaboration

ANSWER: b

RATIONALE: A set of activities involved in building information systems to meet users' needs is called software development. System maintenance is done after the software development has been completed. Functional decomposition is a technique that involves breaking down a complex problem or system into smaller parts that are more manageable and easier to understand. This process can also be called progressive elaboration, which is defined by the Project Management Institute as "the iterative process of increasing the level of detail in a project management plan as greater amounts of information and more accurate estimates become available."

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 5:53 AM

6. is the phase of system acquisition that focuses on gathering data on the existing system, determining the requirements for the new system, considering alternatives within identified constraints, and investigating the feasibility of alternative solutions.

a. Systems analysis

b. Functional decomposition

c. Requirements elicitation

d. Progressive elaboration

ANSWER: a

RATIONALE:

Systems analysis is the phase of system acquisition that focuses on gathering data on the existing system, determining the requirements for the new system, considering alternatives within identified constraints, and investigating the feasibility of alternative solutions. Part of the systems analysis process is requirements elicitation, or the practice of researching and discovering the requirements of a system from users, customers, and other stakeholders. Functional decomposition is a technique that involves breaking down a complex problem or system into smaller parts that are more manageable and easier to understand. This process can also be called progressive elaboration, which is defined by the Project Management Institute as "the iterative process of increasing the level of detail in a project management plan as greater amounts of information and more accurate estimates become available."

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 5:55 AM

7. What is a requirement as it relates to software development?

a. a condition or capability that must be met or possessed by a system or system element to satisfy an agreement, standard, specification, or other formally imposed document

b. a document that examines whether a project is feasible within the current limits of available technology

c. a document that determines whether the expected benefits associated with the project outweigh the expected costs sufficiently to make the project financially attractive

d. a process of determining how a system will be accepted by people and how well it will meet system performance expectations

ANSWER: a

RATIONALE: A requirement is a condition or capability that must be met or possessed by a system or system element to satisfy an agreement, standard, specification, or other formally imposed document.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 5:59 AM

8. The following are major outcomes of joint application development sessions except:

a. analyze existing systems.

b. define problems.

c. propose and evaluate possible solutions.

d. reduced need for stakeholder involvement.

ANSWER: d

RATIONALE: The major outcomes of joint application development sessions are analyzing existing systems, defining problems, and proposing and evaluating possible solutions. Stakeholder involvement is important, and this process should not reduce the need for it.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

9. What is a technique that involves breaking down a complex problem or system into smaller parts that are more manageable and easier to understand?

a. systems analysis

b. functional decomposition

c. requirements elicitation

d. joint application development

ANSWER: b

RATIONALE: Functional decomposition is frequently used during the systems analysis phase and is a technique that involves breaking down a complex problem or system into smaller parts that are more manageable and easier to understand. It can also be called progressive elaboration. Joint application development is a structured meeting process that can accelerate and improve the efficiency and effectiveness of not only the systems analysis phase but also the design phase of a system development project. Systems analysis is the phase of system acquisition that focuses on gathering data on the existing system, determining the requirements for the new system, considering alternatives within identified constraints, and investigating the feasibility of alternative solutions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

10. Systems analysis includes the following stages except:

a. study the existing system.

b. determine requirements for the new system.

c. buy or develop the new system.

d. consider alternatives within identified constraints.

ANSWER: c

RATIONALE: The systems analysis phase does not include buying or development of the new system. It does include considering various solutions and the feasibility of those solutions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and

subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

11. feasibility examines whether a project is feasible within the current limits of available technology.

a. Technical

b. Economic

c. Legal

d. Operational

ANSWER: a

RATIONALE: Technical feasibility examines whether a project is feasible within the current limits of available technology. Economic feasibility determines whether the expected benefits associated with the project outweigh the expected costs sufficiently to make the project financially attractive. Legal feasibility is the process of determining whether laws or regulations may prevent or limit a system development project. Operational feasibility is the process of determining how a system will be accepted by people and how well it will meet system performance expectations.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.1 - Identify the pros and cons associated with building, buying, and subscribing to software.

TOPICS: 10.1: Build, Buy, or Subscribe

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 12:36 AM

12. is a sequential, multistage process in which the work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary. This is different from __________, which is an iterative process that develops the system in sprint increments lasting two to four weeks.

a. Waterfall system development; Scrum

b. Scrum; Waterfall system development

c. Agile development; Scrum

d. Scrum; Agile development

ANSWER: a

RATIONALE: Waterfall system development is a sequential, multistage process in which the work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary. This is different from Scrum, which is an iterative process that develops the system in sprint increments lasting two to four weeks. Scrum is an Agile development framework.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES:

PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/21/2025 2:41 AM

13. The following statements are true of the Waterfall process except:

a. The process is iterative and multiple phases can be completed simultaneously.

b. The approach allows for a high degree of management control.

c. Users often do not interact with the solution until the system is nearly complete.

d. Requirements must be fully defined before any coding begins.

ANSWER: a

RATIONALE: Waterfall system development is a sequential, multistage process, not an iterative one in which the work of the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary. The other statements are true.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES:

PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

14. Which of the following is not a disadvantage of the Waterfall system development process?

a. Changes to the design can be disruptive and expensive.

b. Participants must create considerable system documentation so that system requirements can be traced back to stated business needs.

c. Excessive time can be spent eliciting the requirements and building the design ("analysis paralysis").

d. The project team often focuses on delivering only the final product and not on incremental deliverables.

ANSWER: b

RATIONALE: Participants must create considerable system documentation so that system requirements can be traced back to stated business needs. This is an advantage of Waterfall system development. The system will be well documented.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:02 AM

15. What phase of software development creates a complete set of technical specifications that can be used to construct an information system?

a. systems analysis

b. system design

c. technical feasibility

d. functional decomposition

ANSWER: b

RATIONALE: The system design phase creates a complete set of technical specifications that can be used to construct an information system. Technical feasibility and functional decomposition typically take place during the systems analysis phase, which is primarily focused on understanding and defining the requirements and functionalities of a system to effectively meet business needs.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

16. A is used during both the analysis phase to document the processes of the current system and the design phases to provide a model of a proposed new system.

a. data-flow diagram

b. user acceptance test

c. functional decomposition

d. system design

ANSWER: a

RATIONALE: A data-flow diagram is used during both the analysis phase to document the processes of the current system and the design phases to provide a model of a proposed new system.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 12:37 AM

17. is a type of documentation that includes written details that computer operators follow to execute a program and that analysts and programmers use to solve problems or modify a program. is a type of documentation that shows how a program can and should be used to perform user tasks.

a. Technical documentation; User documentation

b. User documentation; Technical documentation

c. System design; Technical documentation

d. Functional decomposition; System design

ANSWER: a

RATIONALE: Technical documentation is a type of documentation that includes written details that computer operators follow to execute a program and that analysts and programmers use to solve problems or modify a program. User documentation is a type of documentation that shows how a program can and should be used to perform user tasks. These documents are part of the system design phase. Functional decomposition is part of the systems analysis phase.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 12:27 AM

18. A local university is developing an updated version of its course enrollment system. The university is asking a small group of faculty and staff to use the system to verify that it can complete the required tasks in a realworld operating environment and perform according to the system design specifications. This process is performed before accepting the final product from the development team. What type of testing is this?

a. user acceptance testing

b. system testing

c. integration testing

d. unit testing

ANSWER: a

RATIONALE: Unlike system testing, which ensures that the system itself works, user acceptance testing determines whether the system meets its intended business objectives. Integration testing involves linking individual components together and testing them as a group to uncover any defects in the interface between one component and another (e.g., component 1 fails to pass a key parameter to component 2).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.5 - Identify the purpose and activities of software integration, implementation,.

TOPICS: 10.5: Integration, Implementation, and Operations

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

19. Which of the following best describes integration testing?

a. involves linking individual components together and testing them as a group to uncover any defects in the interface between one component and another

b. involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that the information system meets all specified requirements

c. involves trained users to test the information system to verify that it can complete required tasks in a real-world operating environment

d. involves evaluating the performance of the information system under varying work volume and operating conditions

ANSWER: a

RATIONALE:

Integration testing involves linking individual components together and testing them as a group to uncover any defects in the interface between one component and another. System testing involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that the information system meets all specified requirements. User acceptance testing involves trained users to test the information system to verify that the information system can complete required tasks in a real-world operating environment. Volume testing involves evaluating the performance of the information system under varying work volumes and operating conditions.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.5 - Identify the purpose and activities of software integration, implementation,.

TOPICS: 10.5: Integration, Implementation, and Operations

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

20. is the process of finding and preparing a location for the hardware associated with a new system. is the process of physically placing the computer equipment on-site and making it operational.

a. Site preparation; Installation

b. Installation; Site preparation

c. Installation; Cutover

d. Integration testing; Installation

ANSWER: a

RATIONALE: Site preparation is the process of finding and preparing a location for the hardware

associated with a new system. Installation is the process of physically placing the computer equipment on-site and making it operational.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.5 - Identify the purpose and activities of software integration, implementation,.

TOPICS: 10.5: Integration, Implementation, and Operations

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

21. Hershey, the chocolate manufacturer, cut over from an old system to a newer one during one of its busiest months. The process was disastrous and cost the company more than $100 million when the new system failed. What cutover strategy did Hershey most likely employ?

a. direct conversion

b. phase-in approach

c. pilot start-up

d. parallel start-up

ANSWER: a

RATIONALE: Hershey's failure was in part due to the type of cutover it chose to implement. The company chose a direct conversion, the highest-risk approach, which involves stopping the old system and starting the new system. There is a high potential for problems and errors when the old system is shut off and the new system is turned on at the same time. Since the new system has new processes and will update data differently than the old system, reverting back to the old system may not be a simple matter. The other approaches, if possible, are much less risky.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.5 - Identify the purpose and activities of software integration, implementation,.

TOPICS: 10.5: Integration, Implementation, and Operations

KEYWORDS: Bloom's: Analyze

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

22. Which of the following is not a step that takes place after cutover has taken place?

a. operation

b. maintenance

c. disposal

d. user training

ANSWER: d

RATIONALE: All of these are steps except user training. The majority of user training should take

place before cutover.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.5 - Identify the purpose and activities of software integration, implementation,.

TOPICS: 10.5: Integration, Implementation, and Operations

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

23. Which of the following best describes system maintenance?

a. a stage that involves changing and enhancing the system to make it more useful in achieving user and organizational goals

b. the process of analyzing a system to make sure it is operating as intended

c. the process of measuring system performance by tracking the number of errors encountered, the amount of memory required, the amount of processing or CPU time needed, and other performance indicators

d. the stage of system development that involves using a new or modified system under all kinds of operating conditions

ANSWER: a

RATIONALE: System maintenance is a stage of system development that involves changing and enhancing the system to make it more useful in achieving user and organizational goals.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.5 - Identify the purpose and activities of software integration, implementation,.

TOPICS: 10.5: Integration, Implementation, and Operations

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:04 AM

24. The following are steps for purchasing a new commercial off-the-shelf information system except:

a. evaluate potential packages.

b. select top contenders.

c. sign a multiyear contract and implement testing.

d. make selection.

ANSWER: c

RATIONALE: Testing should take place before any major commitments are made. The other steps are correct.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.3 - Explain the advantages and disadvantages of purchasing commercial off-the-shelf (COTS) software.

TOPICS: 10.3: System Acquisition: Purchasing a New System

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

25. The following are advantages of Software as a Service except:

a. avoids costly hardware installation.

b. companies more quickly realize a return on their investment.

c. scalability of the software and hardware.

d. greater control and oversight of company data.

ANSWER: d

RATIONALE: All of these are advantages except that the company does not have direct oversight of its own data and who has physical access to the servers and how well they are managed and maintained.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.4 - Explain the advantages and disadvantages of the Software as a Service (SaaS) model.

TOPICS: 10.4: System Acquisition: Software as a Service (SaaS)

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 11:16 AM

26. The following are disadvantages of Software as a Service (SaaS) except:

a. limited customization.

b. dependence on internet connectivity.

c. automatic software updates.

d. lack of control and oversight of company data.

ANSWER: c

RATIONALE: Automatic updates are an advantage of SaaS.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.4 - Explain the advantages and disadvantages of the Software as a Service (SaaS) model.

TOPICS: 10.4: System Acquisition: Software as a Service (SaaS)

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

27. What type of software development promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements and also includes programming in pairs, performing extensive code reviews, unit testing of all code, putting off the programming of system features until they are actually needed, use of a flat project management structure, simplicity and clarity in code, expecting changes in system requirements as the project progresses and the desired solution is better understood, and frequent communication with the customer and among programmers?

a. extreme programming

b. Scrum

c. DevOps

d. Waterfall

ANSWER: a

RATIONALE: Extreme programming (XP) is a form of Agile software development that, like Scrum, promotes incremental development of a system using short development cycles to improve productivity and accommodate new customer requirements. Unlike Scrum, XP includes programming in pairs, performing extensive code reviews, unit testing of all code, putting off the programming of system features until they are actually needed, use of a flat project management structure, simplicity and clarity in code, expecting changes in system requirements as the project progresses and the desired solution is better understood, and frequent communication with the customer and among programmers. These qualities make XP compatible with Agile software development. Waterfall is a linear type of software development. DevOps is the practice of blending the tasks performed by the development staff (who are typically responsible for design, coding, and testing) and the IT operations groups (who typically handle operational deployment tasks, such as server provisioning and job scheduling) to enable faster and more reliable software releases.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:47 AM

28. is an approach to system development that prioritizes small increments of work called a that are typically done in a two- to four-week period.

a. Agile development; sprint

b. Waterfall development; Scrum

c. Agile development; cutover

d. Scrum; minimally viable product

ANSWER: a

RATIONALE: Agile development, as opposed to Waterfall system development, is an approach to system development that prioritizes small increments of work called a sprint that is typically done in a two- to four-week period. Scrum is a form of Agile development. Cutover is when the old system is replaced with the new system.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

29. What is the practice of blending tasks performed by the development staff and the IT operations groups?

a. DevOps

b. Scrum

c. extreme programming

d. Waterfall

ANSWER: a

RATIONALE: DevOps is the practice of blending the tasks performed by the development staff (who are typically responsible for design, coding, and testing) and the IT operations groups (who typically handle operational deployment tasks, such as server provisioning and job scheduling) to enable faster and more reliable software releases. Agile development, as opposed to Waterfall system development, is an approach to system development that prioritizes small increments of work called a sprint, which is typically a two- to four-week period. Scrum is a form of Agile development. Extreme programming is a form of Agile software development that, like Scrum, promotes incremental development of a system using short development cycles to improve productivity and accommodate new customer requirements.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

30. What is the difference between a business continuity plan (BCP) and a disaster recovery plan (DRP)?

a. A BCP includes the organization's DRP. The DRP focuses on maintaining business operations during a disaster.

b. A BCP includes a plan for recovering IT infrastructure and systems and is a component of the organization's DRP.

c. A BCP includes the DRP, an occupant emergency plan, a continuity of operations plan, and an incident management plan.

d. Both plans focus on technology recovery and identify the people or the teams responsible for acting in the event of a disaster, what exactly these people will do when a disaster strikes, and the

information system resources required to support critical business processes.

ANSWER: c

RATIONALE: A BCP includes the DRP, an occupant emergency plan, a continuity of operations plan, and an incident management plan.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.10.2 - Identify the advantages and disadvantages of the Waterfall and Scrum development methodologies.

TOPICS: 10.2: System Acquisition: Building Custom Software

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

1. Cloud services include the following characteristics except:

a. on-demand self-service.

b. high availability.

c. resource pooling.

d. rapid elasticity.

ANSWER: b

RATIONALE: While important, high availability is not one of the characteristics of cloud computing. The U.S. National Institute of Standards and Technology defines cloud services as having five essential characteristics: (1) On-demand self-service: Computer resources can be allocated automatically based on defined parameters without human action. (2) Broad network access: Resources are available over a network and employ standard methods that can be used by various end-user devices. (3) Resource pooling: Multiple consumers of system resources can access the infrastructure without regard to where the resources are physically located. (4) Rapid elasticity: Resources can be added or removed based on demand at any time. (5) Measured service: Resource use is monitored, controlled, and reported for the benefit of both the cloud service provider and the resource user.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:17 AM

2. Which of the following cloud computing services is an information systems model in which users are provided with an operating system, programming language execution environment, database services, and a web server?

a. Software as a Service (SaaS)

b. Platform as a Service (PaaS)

c. Infrastructure as a Service (IaaS)

d. Internet of Things (IoT)

ANSWER: b

RATIONALE: PaaS is an information systems model in which users are provided with a computing platform, typically including operating system, programming language execution environment, database services, and a web server. SaaS is a software delivery approach that provides users with access to software remotely as a web-based service. The cloud service provider handles necessary software maintenance and upgrades. Another advantage of SaaS is that because the software is hosted remotely, users do not need to purchase and install additional hardware to provide increased capacity. IaaS is an information systems model in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components. The IoT is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

3. Google Workspace (formerly the G Suite), which includes Google Docs, Sheets, and Presentations, is an example of which type of cloud service?

a. Software as a Service (SaaS)

b. Platform as a Service (PaaS)

c. Infrastructure as a Service (IaaS)

d. Internet of Things (IoT)

ANSWER: a

RATIONALE: Google Workspace is an example of SaaS. SaaS is a software delivery approach that provides users with access to software remotely as a web-based service. The cloud service provider handles necessary software maintenance and upgrades. IaaS is an information systems model in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components. PaaS is an information systems model in which users are provided with a computing platform, typically including operating system, programming language execution environment, database services, and a web server. The IoT is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

4. Consider the metaphor of "Pizza as a Service" as compared to cloud computing services. If the dining table and drinks were provided by you, but the restaurant provided everything else, including the oven, ingredients, and preparing the pizza, what type of cloud service would this be most like?

a. Software as a Service (SaaS)

b. Platform as a Service (PaaS)

c. Infrastructure as a Service (IaaS)

d. Internet of Things (IoT)

ANSWER: b

RATIONALE: To help clarify the similarities and differences among the concepts of SaaS, PaaS, and IaaS, consider the metaphor of "Pizza as a Service." When you want to eat pizza, you can get it in several ways: make your own at home, buy a prepared pizza that you cook at home, have a cooked pizza delivered to your home, or go to a pizzeria. Each of these can be compared, respectively, to on-premises systems, IaaS, PaaS, and SaaS. Having pizza delivered means that you enjoy your pizza in your home. Similarly, in the PaaS model, the cloud service provider (CSP) does all the preparation, except for the actual application software and any database it may use. When you make pizza at home, you are responsible for purchasing and preparing all the ingredients, cooking the pizza in your own oven, and finally enjoying a dinner of your creation. This is similar to having your own system on-premises. Purchasing a prepared pizza at the store means someone else has done the work to get the ingredients and build the pizza. You get to cook it at home and enjoy it. This is comparable to IaaS where the CSP manages the underlying resources (the raw ingredients), such as hardware, networks, and storage, while you are responsible for putting them to use through your choice of an operating system, security, and so on. Going out to a pizzeria gives you the luxury of doing none of the work but still having a good pizza. Likewise, in the most common cloud model, SaaS, the CSP does all of the building, preparing, and serving. All you need to do is use the services provided.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 7:00 AM

5. The following are types of cloud computing deployment except: a. public cloud computing.

b. private cloud computing.

c. hybrid cloud computing.

d. flex cloud computing.

ANSWER: d

RATIONALE: Cloud computing can be deployed in several different ways, including public cloud computing, private cloud computing, and hybrid cloud computing.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:17 AM

6. In a cloud computing environment, a third-party service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel), with cloud user organizations (called tenants) accessing slices of shared resources via the internet.

a. public

b. private

c. hybrid

d. flex

ANSWER: a

RATIONALE: In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel), with cloud user organizations (called tenants) accessing slices of shared resources via the internet. A private cloud computing environment is a singletenant cloud. Resources are dedicated to that tenant and are not shared with other tenants. A hybrid cloud computing environment is composed of both public and private clouds integrated through a private network.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:57 AM

7. HydroDinkware Inc. is concerned that its data could be compromised using cloud computing and would like to have control over its data. What type of cloud computing environment would be best for this situation?

a. public

b. private

c. open

flex

ANSWER: b

RATIONALE:

A private cloud computing environment is a single-tenant cloud. Resources are dedicated to that tenant and are not shared with other tenants. This type of environment is ideal for companies that want absolute control over their data. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel), with cloud user organizations (called tenants) accessing slices of shared resources via the internet.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:53 AM

8. Allied Health would like to take advantage of basic software applications that run in the cloud such as web conferencing and email, but the company must also meet Health Insurance Portability and Accountability Act compliance by providing a secure connection for its patient data. What type of cloud computing environment would be best for their situation?

a. public

b. private

c. hybrid

d. flex

ANSWER: c

RATIONALE: A hybrid cloud computing environment is composed of both public and private clouds integrated through a private network and would be best for Allied Health. It will allow it to take advantage of public cloud applications with less sensitive security requirements as well as use more sensitive applications on the private portion of the hybrid cloud. A private cloud computing environment is a single-tenant cloud. Resources are dedicated to that tenant and are not shared with other tenants. This type of environment is ideal for companies that want absolute control over their data. In a public cloud computing environment, a service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel), with cloud user organizations (called tenants) accessing slices of shared resources via the internet.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:51 AM

9. The following statements are true for a public cloud computing environment except:

a. a service provider owns and manages the infrastructure, including computing, networking, storage devices, and support personnel.

b. tenants of a cloud service provider access slices of shared resources via the internet.

c. a service provider can deliver increasing amounts of computing, network, and storage capacity on demand.

d. a service provider can deliver decreased redundancy in the event of a disaster.

ANSWER: d

RATIONALE: All the statements are true except that a service provider can deliver increased, not decreased, redundancy in the event of a disaster.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:18 AM

10. Which of the following are the three benefits that public cloud computing offers to organizations that use them?

a. reduced costs, flexible computing capacity, and increased redundancy

b. reduced costs, flexible redundancy, and increased security

c. full data control, cost savings, and physical server ownership

d. flexible computing capacity, hardware and software control, and cost savings

ANSWER: a

RATIONALE: Public cloud computing offers three key benefits to organizations: reduced costs, flexible computing capacity, and increased redundancy in the event of a disaster. Organizations do not have full data control, physical server ownership, or hardware and software control because the cloud service provider has control over the data, servers, hardware, and software. Security is in the control of the cloud service provider.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

11. Organizations can request just the right type and capacity of information system resources from their cloud computing provider, pay for it on an ongoing basis, and let the service provider handle the system support and maintenance. Should an organization's computing needs change, it can request its cloud service provider to

deliver more or less capacity, with a corresponding increase or decrease in monthly charges. This ability to quickly increase or decrease available cloud resources is called ______________.

a. elasticity

b. customization

c. hardware control

d. operational feasibility

ANSWER: a

RATIONALE:

This ability to quickly increase or decrease available cloud resources is called elasticity. While this allows the organization to customize the capacity at will, the term used in cloud computing is elasticity. While this increase or decrease in capacity does affect the hardware used by the cloud service provider, it is not hardware control in this case. Operational feasibility refers to the measure of how well a proposed system or solution can be successfully integrated and function within the existing operational framework of an organization.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

12. The following statements about elasticity are true except:

a. the elastic nature of cloud resources avoids lengthy delays (possibly months) that can occur when an organization tries to acquire its own resources.

b. elasticity can increase the speed of new product and service launches.

c. an organization can quickly acquire the increased computing capacity required to test a new product or service offering sooner.

d. elasticity requires prior long-term planning for future growth.

ANSWER: d

RATIONALE: All the statements are true except that elasticity does not require long-term planning for future growth. Organizations can increase or decrease capacity quickly and do not have to plan ahead for the future. Moreover, a company can run a test of a new product or service and, if that test fails, it can decrease capacity at will. If it is a success, it can increase capacity.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:19 AM

13. The following statements are true of public cloud service providers (CSPs) except:

a. most public CSPs operate multiple data centers distributed geographically.

b. continuity of operations can be guaranteed even if a natural disaster strikes a certain region.

c. if a local hardware or software failure occurs at one of the CSP's data centers, the service will be unavailable until the issue is resolved.

d. a CSP can deliver more or less capacity with a corresponding increase or decrease in monthly charges.

ANSWER: c

RATIONALE: If a local hardware or software failure occurs at one of the CSP's data centers, the service will be available because the provider will continue operations from one of its backup locations.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:19 AM

14. Which of the following is not a potential disadvantage of public cloud computing?

a. complex pricing arrangements

b. wide variations in performance over time

c. inadequate data security

d. higher upfront costs

ANSWER: d

RATIONALE: The one main advantage of public cloud computing is that costs are reduced. The remaining are potential disadvantages, including complex pricing arrangements, wide variations in performance over time, and inadequate data security.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

15. Sahara Inc. moved its infrastructure and data to a public cloud provider. It was a time-consuming process to move over to its current cloud service provider (CSP). Sahara is unhappy with its CSP and would like to switch to another but is reluctant to go through the migration process again. The issue Sahara is experiencing is called

a. vendor lock-in

b. multicloud

c. scalability

d. redundancy

ANSWER: a

RATIONALE: Sahara is experiencing vendor lock-in. Scalability and redundancy are qualities that a company should look for in a CSP, and vendor lock-in could potentially be overcome by Sahara using multicloud.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

16. An organization can overcome vendor lock-in with _____________.

a. elasticity

b. multicloud

c. autonomic computing

d. redundancy

ANSWER: b

RATIONALE: Multicloud, the use of more than one cloud service provider to support applications, is a solution to both the disaster recovery and vendor lock-in challenges. Scalability, autonomic computing, and redundancy are qualities or features that a company should look for in a cloud service provider.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

17. When moving to a multicloud environment, organizations must consider the expected performance of its applications, security concerns, ____________, availability requirements, and ____________.

a. regulatory compliance; total cost savings

b. 5G connectivity; regulatory compliance

c. advanced artificial intelligence algorithms; limited scalability of resources

d. total cost savings; enhanced customer engagement

ANSWER: a

RATIONALE: When moving to a multicloud environment, organizations must consider the expected performance of its applications, security concerns, regulatory compliance, availability

requirements, and total cost savings.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

18. Autonomic computing addresses which four key functions?

a. self-configuring, self-healing, self-optimizing, and self-protecting

b. self-diagnosing, self-configuring, self-optimizing, and self-protecting

c. self-awareness, self-diagnosing, self-configuring, and self-healing

d. self-recovery, self-awareness, self-diagnosing, and self-optimizing

ANSWER: a

RATIONALE: Autonomic computing addresses four key functions: self-configuring, self-healing, self-optimizing, and self-protecting.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

19. When a deviation from cloud policies or from normal configuration occurs, tools are able to restore the system back to the defined baseline without interrupting the workload.

a. elasticity

b. multicloud

c. autonomic system

d. redundancy

ANSWER: c

RATIONALE: When a deviation from cloud policies or a deviation from normal configuration occurs, autonomic system tools are able to restore the system back to the defined baseline without interrupting the workload. Multicloud is the use of more than one cloud service provider (SCP) to support applications. Elasticity and redundancy are qualities that a company should look for in a CSP but won't restore the system back to baseline.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:48 AM

20. According to security researcher Sounil Yu, a secure, stable, and reliable cloud computing information system must have which of the following three characteristics?

a. distributed, immutable, and ephemeral

b. scalable, elastic, and redundant

c. customizable, redundant, and scalable

d. authentication, integrity, and confidentiality

ANSWER: a

RATIONALE: According to security researcher Sounil Yu, a secure, stable, and reliable cloud computing information system must have the following three characteristics: distributed, immutable, and ephemeral. Distributed: The workload must be spread across multiple physical devices and have the ability to be moved seamlessly from one device to another. Immutable: Systems must be incapable of being changed unless the existing environment is erased and a new environment (container) is installed. Ephemeral: The infrastructure must be short-lived. When a new container is available, the workload is moved to that environment and the previous system is erased pending the installation of a new container.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:44 AM

21. The following statements are true of the Internet of Things (IoT) except:

a. IoT devices do not need an Internet protocol (IP) address.

b. IoT devices connect to the internet.

c. data is transmitted to a database that stores data from sensors.

d. updates and automatic adjustments can be sent to IoT-connected devices.

ANSWER: a

RATIONALE: For an IoT device to transmit and receive data over the internet, it must have an IP address.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.2 - Discuss four applications of the Internet of Things and associated connected devices.

TOPICS: 11.2: The Internet of Things (IoT)

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:19 AM

22. A uses data from smart devices combined with artificial intelligence to improve its infrastructure and efficiently manage traffic lights, power plants, water supplies, networks, energy usage, and other resources.

a. smart city

b. Platform as a Service (PaaS)

c. multicloud

d. cloud repatriation

ANSWER: a

RATIONALE: A smart city uses data from smart devices combined with artificial intelligence to improve its infrastructure and efficiently manage traffic lights, power plants, water supplies, networks, energy usage, and other resources. Cloud repatriation is the process of an organization moving its workloads out of the cloud and back to onpremises infrastructure. PaaS is an information systems model in which users are provided with a computing platform, typically including operating system, programming language execution environment, database services, and a web server. Multicloud is the use of more than one cloud service provider to support applications.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.2 - Discuss four applications of the Internet of Things and associated connected devices.

TOPICS: 11.2: The Internet of Things (IoT)

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

23. is the process of an organization moving its workloads out of the cloud and back to onpremises infrastructure.

a. Integration

b. Cloud repatriation

c. Infrastructure as a Service (IaaS)

d. Hybrid cloud

ANSWER: b

RATIONALE: Cloud repatriation is the process of an organization moving its workloads out of the cloud and back to on-premises infrastructure. Integration deals with combining two information systems. A hybrid cloud computing environment is composed of both public and private clouds, integrated through a private network. IaaS is an information systems model in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

24. Which of the following is not a key business benefit of the Internet of Things (IoT)?

a. reduce costs to achieve a competitive advantage

b. deepen the organization's understanding of consumer preferences and behaviors

c. improve customer service and experience

d. increased data security

ANSWER: d

RATIONALE: IoT devices have typically introduced data security issues.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.2 - Discuss four applications of the Internet of Things and associated connected devices.

TOPICS: 11.2: The Internet of Things (IoT)

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

25. The following are advantages of Software as a Service except:

a. avoids costly hardware installation.

b. companies more quickly realize a return on their investment.

c. scalability of the software and hardware.

d. greater control and oversight of company data.

ANSWER: d

RATIONALE: All of these are advantages except that the company does not have direct oversight of its own data, who has physical access to the servers, and how well they are managed and maintained.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:20 AM

26. A faulty sensor or a bad network connection can result in or Internet of Things (IoT) sensor

data that lacks a time stamp indicating when the reading occurred.

a. missing data

b. hacking

c. privacy risks

d. cloud repatriation

ANSWER: a

RATIONALE: A faulty sensor or a bad network connection can result in missing data or IoT sensor data that lacks a time stamp indicating when the reading occurred. A faulty sensor does not usually result in hacking or privacy risks. Cloud repatriation is the process of an organization moving its workloads out of the cloud and back to on-premises infrastructure.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.1 - Identify three key benefits associated with cloud computing.

TOPICS: 11.1: Cloud Computing

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 12:29 AM

27. Internet of Things (IoT) developers should focus on building in from the start.

a. security

b. user interface design

c. cost controls

d. battery life

ANSWER: a

RATIONALE: IoT developers should focus on building in security from the start as it should be one of the most important considerations.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.2 - Discuss four applications of the Internet of Things and associated connected devices.

TOPICS: 11.2: The Internet of Things (IoT)

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 12:28 AM

28. Automated monitoring and remote control with trend analysis and reporting is related to which type of Internet of Things (IoT) application?

a. connect and monitor

b. predict and adapt

c. control and react

d. transform and explore

ANSWER: a

RATIONALE: Automated monitoring and remote control with trend analysis and reporting are related to the connect and monitor type of IoT applications.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.2 - Discuss four applications of the Internet of Things and associated connected devices.

TOPICS: 11.2: The Internet of Things (IoT)

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:38 AM

29. Using data to perform predictive analytics and initiate preemptive action is related to which type of Internet of Things (IoT) applications?

a. connect and monitor

b. predict and adapt

c. control and react

d. transform and explore

ANSWER: b

RATIONALE: Using data to perform predictive analytics and initiate preemptive action is related to the predict-and-adapt type of IoT applications.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.2 - Discuss four applications of the Internet of Things and associated connected devices.

TOPICS: 11.2: The Internet of Things (IoT)

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:48 AM

30. Using sensor data combined with external data to provide new insights, enabling the creation of new business models, products, and services, is related to which type of Internet of Things (IoT) applications?

a. connect and monitor

b. predict and adapt

c. control and react

d. transform and explore

ANSWER: d

RATIONALE: Using sensor data combined with external data to provide new insights, enabling the creation of new business models, products, and services, is related to the transform and explore type of IoT applications.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.11.2 - Discuss four applications of the Internet of Things and associated connected devices.

TOPICS: 11.2: The Internet of Things (IoT)

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

1. An artificial intelligence (AI) system includes the following except:

a. intuition.

b. procedures.

c. software.

d. people.

ANSWER: a

RATIONALE: An AI system includes the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios); AI does not use intuition.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:20 AM

2. Which of the following is not an example of using Artificial intelligence (AI)?

a. DeepHealth, a tool to identify suspicious areas of a mammogram

b. ABIe, a chatbot that assists Allstate's customers

c. LaserWeeder, a crop weeding robot

d. MindTap, a student learning tool

ANSWER: d

RATIONALE: All the answers are correct except MindTap, which is a traditional Information System.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are

used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

3. Select from the choices below to complete this sentence: "Artificial intelligence is the ability of a or computer-controlled to perform tasks commonly associated with ________."

a. digital computer; robot; intelligent beings

b. machine; algorithm; intelligent beings

c. digital computer; systems; people

d. person; algorithm; sentience

ANSWER: a

RATIONALE: Encyclopedia Britannica defines artificial intelligence (AI) as "the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings." The definition does not limit AI to machines consuming vast repositories of data or producing human speech. It merely says that a computer or computer-controlled robot does things that appear to be intelligent.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

4. Which of the following best describes supervised learning?

a. The machine is given a training dataset and examples are provided so the machine can memorize and store correct answers.

b. The machine is given a training dataset with no written directions, and the machine is expected to figure out the answer to the problem.

c. The machine is given a training dataset and uses a trial-and-error method of learning that emulates the human approach to learning.

d. The machine is given a dataset that is passed to an input layer where it is processed by the first layer of artificial neurons, which then analyze the data.

ANSWER: a

RATIONALE: Supervised learning begins with a known set of data in a training environment. The data does not have to reside in a structured database, but each piece of data must be labeled or have a tag applied to it. After the data is provided, examples are entered into the system, and the machine runs through different scenarios. In unsupervised learning, the dataset is not labeled, and the machine must learn from observing the correct answer. Reinforced learning begins with the same type of training dataset as used in unsupervised learning. The data is not labeled, and the algorithms must run

through multiple iterations to restructure the data into a format that can be used in the next sample. The difference comes in the feedback that is received in reinforced learning. When a solution is returned, it comes with either positive or negative feedback from the program, and the machine learns to keep the process as-is or to try again with a new method. The machine also uses input from the environment in the decision-making process. Deep learning is a subfield of machine learning inspired by the structure and function of the human brain. Data is first passed to an input layer, where it's processed by the first layer of artificial neurons. These neurons analyze the data to identify fundamental features like lines, curves, and edges. The processed information is then passed on to subsequent layers, each containing more complex neurons.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:30 AM

5. uses a trial-and-error method of learning that emulates the human approach to learning. Machine learning using this method may result in multiple errors until the machine learns how to navigate the data for ultimate success. Each failure is recorded, and the machine learns which path not to take in the future. After each successful test, a new scenario is given, and the testing resumes.

a. Reinforced learning

b. Deep learning

c. Supervised learning

d. Natural language processing (NLP)

ANSWER: a

RATIONALE: Supervised learning begins with a known set of data in a training environment. The data does not have to reside in a structured database, but each piece of data must be labeled or have a tag applied to it. After the data is provided, examples are entered into the system, and the machine runs through different scenarios. In unsupervised learning, the dataset is not labeled, and the machine must learn from observing the correct answer. Reinforced learning begins with the same type of training dataset as used in unsupervised learning. The data is not labeled, and the algorithms must run through multiple iterations to restructure the data into a format that can be used in the next sample. The difference comes in the feedback that is received in reinforced learning. When a solution is returned, it comes with either positive or negative feedback from the program, and the machine learns to keep the process as-is or to try again with a new method. The machine also uses input from the environment in the decision-making process. Deep learning is a subfield of machine learning inspired by the structure and function of the human brain. Data is first passed to an input layer, where it's processed by the first layer of artificial neurons. These neurons analyze the data to identify fundamental features like lines, curves, and edges. The processed information is then passed on to subsequent layers, each containing more complex

neurons. NLP focuses on enabling computers to understand and manipulate human language. NLP techniques are used in applications like chatbots, virtual assistants, machine translation, text recognition, and sentiment analysis tools.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 12:29 AM

6. Virtual assistants such as Alexa, Siri, and Google voice search are examples of __________.

a. natural language processing (NLP)

b. supervised learning

c. artificial neural networks

d. unsupervised learning

ANSWER: a

RATIONALE: NLP focuses on enabling computers to understand and manipulate human language. NLP techniques are used in applications like chatbots, virtual assistants (such as Siri, Google, and Alexa), machine translation, text recognition, and sentiment analysis tools. Supervised learning begins with a known set of data in a training environment. The data does not have to reside in a structured database, but each piece of data must be labeled or have a tag applied to it. After the data is provided, examples are entered into the system, and the machine runs through different scenarios. In unsupervised learning, the dataset is not labeled, and the machine must learn from observing the correct answer. Deep learning algorithms use artificial neural networks, which are complex, interconnected nodes that process information similar to how neurons work in the brain.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 12:30 AM

7. John Deere is a U.S. company that manufactures agricultural equipment. The company has a product, See & Spray technology, which uses cameras and machine learning to detect and differentiate between crops and weeds to provide precise herbicide application. What type of artificial intelligence (AI) use is this?

a. computer vision

b. natural language processing (NLP)

c. generative AI

d. unsupervised learning

ANSWER: a

RATIONALE: John Deere uses computer vision, which deals with enabling computers to interpret and understand visual information from the real world. Computer vision applications include facial recognition, image classification, and self-driving cars. Enabling an AI system with vision capability allows it to "see" the world the way that humans view it and to assist humans in better seeing the world. NLP focuses on enabling computers to understand and manipulate human language. NLP techniques are used in applications like chatbots, virtual assistants, machine translation, text recognition, and sentiment analysis tools. In unsupervised learning, the dataset is not labeled, and the machine must learn from observing the correct answer. Generative AI refers to artificial intelligence systems capable of creating new data, such as images, text, or audio, that mimic or resemble human-generated content, often through techniques like deep learning and predictive modeling.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

8. Farhan asked DALL-E to create an image to help emphasize his message for a presentation. The image resembles human-generated content and uses deep learning and predictive modeling. What type of artificial intelligence (AI) program did Farhan most likely use?

a. generative AI

b. natural language processing (NLP)

c. computer vision

d. unsupervised learning

ANSWER: a

RATIONALE: Farhan most likely used generative AI, which refers to artificial intelligence systems capable of creating new data, such as images, text, or audio, that mimic or resemble human-generated content, often through techniques like deep learning and predictive modeling. Generative AI does include natural language processing to understand the user's request. Computer vision applications include facial recognition, image classification, and self-driving cars. Enabling an AI system with vision capability allows it to "see" the world the way that humans view it and to assist humans in better seeing the world. In unsupervised learning, the dataset is not labeled, and the machine must learn from observing the correct answer.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are

used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

9. is a statistical technique that aims to forecast future events or outcomes by analyzing relevant historical data.

a. Predictive modeling

b. Generative artificial intelligence (AI)

c. Natural language processing (NLP)

d. Computer vision

ANSWER: a

RATIONALE: Predictive modeling is a statistical technique that aims to forecast future events or outcomes by analyzing relevant historical data. Generative AI refers to artificial intelligence systems capable of creating new data, such as images, text, or audio, that mimic or resemble human-generated content, often through techniques like deep learning and predictive modeling. Computer vision applications include facial recognition, image classification, and self-driving cars. Enabling an AI system with vision capability allows it to "see" the world the way that humans view it and to assist humans in better seeing the world. Natural language processing (NLP) focuses on enabling computers to understand and manipulate human language. NLP techniques are used in applications like chatbots, virtual assistants, machine translation, text recognition, and sentiment analysis tools.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:27 AM

10. are intelligent systems designed to work alongside humans, acting as virtual assistants to enhance efficiency, safety, and decision making.

a. Co-pilots

b. Natural language processing (NLP)

c. Predictive modeling

d. Explainable artificial intelligence (XAI)

ANSWER: a

RATIONALE: Co-pilots are intelligent systems designed to work alongside humans, acting as virtual assistants to enhance efficiency, safety, and decision making. Predictive modeling is a statistical technique that aims to forecast future events or outcomes by analyzing relevant historical data. NLP focuses on enabling computers to understand and

manipulate human language. NLP techniques are used in applications like chatbots, virtual assistants, machine translation, text recognition, and sentiment analysis tools. XAI research focuses on developing methods for understanding how AI models arrive at their outputs to find and correct potential biases and improve trust in the systems and the models they produce.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:24 AM

11. is the application of technology, programs, robotics, or processes to achieve outcomes with minimal human input.

a. Automation

b. Predictive modeling

c. Co-pilot

d. Explainable artificial intelligence (XAI)

ANSWER: a

RATIONALE: Automation is the application of technology, programs, robotics, or processes to achieve outcomes with minimal human input. Co-pilots are intelligent systems designed to work alongside humans, acting as virtual assistants to enhance efficiency, safety, and decision making. Predictive modeling is a statistical technique that aims to forecast future events or outcomes by analyzing relevant historical data. Explainable AI research focuses on developing methods for understanding how AI models arrive at their outputs to find and correct potential biases and improve trust in the systems and the models they produce.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.2 - Discuss the role of automation and robotics in business.

TOPICS: 12.2: Automation

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

12. is a combination of mechanical engineering, computer science, artificial intelligence (AI), and machine learning used to create a device that can perform tasks with a high degree of precision.

a. Robotics

b. Artificial narrow intelligence

c. Selective Compliance Assembly Robot Arm (SCARA)

d. Artificial superintelligence

ANSWER: a

RATIONALE: Robotics is a combination of mechanical engineering, computer science, AI, and machine learning used to create a device that can perform tasks with a high degree of precision.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.2 - Discuss the role of automation and robotics in business.

TOPICS: 12.2: Automation

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

13. A(n) robot is designed to function with rotary joints that can move up and down and twist like a human elbow. These robots are frequently used in industrial manufacturing settings, such as on automotive lines, as they can move quickly and with precision.

a. articulated

b. Selective Compliance Assembly Robot Arm (SCARA)

c. cartesian

d. cobot

ANSWER: a

RATIONALE: An articulated robot is made to function like a human arm. These robots may have 10 or more rotary joints that can move up and down like an elbow and can also twist. Selective Compliance Assembly Robot Arm (SCARA) robots have both lateral movement and rotary movement and are often used in the biomedical field because they are fast and have a wide field of movement. Collaborative robots, or cobots, are advanced systems with sensors and the capability to safely react to people in their workspace. Cartesian robots are typically stationary but have one or more attachments that can move in straight lines along the x, y, and z axes. One of the most common applications for Cartesian robots is for automated pick-and-place systems for industrial assembly tasks.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.2 - Discuss the role of automation and robotics in business.

TOPICS: 12.2: Automation

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:21 AM

14. An artificial intelligence (AI) system with the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence includes _________________, _________________, and _________________.

a. learning; reasoning; self-correction

b. artificial intelligence (AI); robotics; automation

c. supervised learning; unsupervised learning; reinforced learning

d. machine learning; natural language processing (NLP); deep learning

ANSWER: a

RATIONALE: An AI system with the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence includes learning, reasoning, and self-correction.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:49 AM

15. Current artificial intelligence (AI) is defined as _________________, also known as weak AI. This type of AI excels at performing specific, well-defined tasks and is typically trained on large datasets of labeled data.

a. artificial narrow intelligence

b. explainable AI

c. generative AI

d. automation

ANSWER: a

RATIONALE: Current AI is defined as artificial narrow intelligence, also known as weak AI. This type of AI excels at performing specific, well-defined tasks and is typically trained on large datasets of labeled data. Explainable AI research focuses on developing methods for understanding how AI models arrive at their outputs to find and correct potential biases and improve trust in the systems and the models they produce. Generative AI refers to AI systems capable of creating new data, such as images, text, or audio, that mimic or resemble human-generated content, often through techniques like deep learning and predictive modeling. Automation is the application of technology, programs, robotics, or processes to achieve outcomes with minimal human input.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

16. The following statements about artificial intelligence (AI) are true except:

a. AI can feel emotions and have consciousness.

b. AI can infer answers from data even without a set of rules to help govern that data.

c. AI systems can continuously learn and adapt based on new data they encounter.

d. AI can create visual art and music with complete human-like creativity.

ANSWER: a

RATIONALE: AI can do all of these except it cannot feel emotions or have consciousness.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:21 AM

17. Which of the following is most likely an application of computer vision?

a. detection of pedestrians in the use of an autonomous vehicle

b. fraudulent credit card purchases in the financial industry

c. cybersecurity threat detection

d. a website support chat bot

ANSWER: a

RATIONALE: Computer vision deals with enabling computers to interpret and understand visual information from the real world. Computer vision applications include facial recognition, image classification, and self-driving cars. Enabling an AI system with vision capability allows it to "see" the world the way that humans view it and to assist humans in better seeing the world. Other answers do not include visual data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

18. What type of artificial intelligence (AI) uses chatbots that can engage in natural conversations with customers by answering questions and resolving issues?

a. large language model (LLM)

b. predictive modeling

c. edge AI

d. cartesian robots

ANSWER: a

RATIONALE: LLMs can power chatbots that engage in natural conversations with customers by

answering questions and resolving issues. Predictive modeling is a statistical technique that aims to forecast future events or outcomes by analyzing relevant historical data. Edge AI refers to processing data at the source, on devices at the network's edge. Cartesian robots are typically stationary but have one or more attachments that can move in straight lines along the x, y, and z axes. One of the most common applications for Cartesian robots is for automated pick-and-place systems for industrial assembly tasks.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

19. What is the purpose of a neural network in artificial intelligence (AI)?

a. to simulate the workings of the human brain

b. to interact with a human's neural structure and translate neural signals into activity

c. to process data at the source, on devices at the network's edge

d. to develop methods for understanding how AI models arrive at their outputs

ANSWER: a

RATIONALE: A neural network in AI simulates the workings of the human brain, whereas the brain-computer interface is technology that actually interacts with a human's neural structure (brain) and translates the information (neural signals) into activity (actions). Explainable AI research focuses on developing methods for understanding how AI models arrive at their outputs to find and correct potential biases and improve trust in the systems and the models they produce. Edge AI processes data at the source, on devices at the network's edge.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:18 AM

20. What is the main advantage of using robotic surgical systems such as da Vinci in surgeries?

a. They provide greater precision and control.

b. They prevent surgical errors.

c. They are more cost-effective.

d. They eliminate the need for a surgeon.

ANSWER: a

RATIONALE: Surgical robots provide greater precision and control. They do not eliminate the need for a surgeon. They do not prevent surgical errors because the surgeon controlling the robot may still make an error with the robotic surgical system.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.2 - Discuss the role of automation and robotics in business.

TOPICS: 12.2: Automation

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

21. robots often handle work dangerous to humans and use technology to allow them to safely react to people in their workspace.

a. Collaborative; sensor

b. Selective Compliance Assembly Robot Arm (SCARA); machine vision

c. Cartesian; predictive modeling

d. Surgical; batch processing

ANSWER: a

RATIONALE: Collaborative robots often handle work dangerous to humans and use sensor technology to allow them to safely react to people in their workspace.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.2 - Discuss the role of automation and robotics in business.

TOPICS: 12.2: Automation

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/21/2025 1:06 AM

22. The following statements about artificial intelligence (AI) and decision making are true except:

a. AI can be programmed with ethical guidelines, and it will fully understand and apply these considerations.

b. AI can be trained using datasets that contain biases, potentially leading to biased outcomes in decision making.

c. It is often hard to understand the reasoning for certain AI models due to their intricate decisionmaking processes.

d. AI algorithms can produce AI hallucinations, which pose a significant challenge to system developers and users alike.

ANSWER: a

RATIONALE: AI cannot be programmed with ethical guidelines, and it will not fully understand and apply these considerations.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/16/2025 6:15 AM

23. The following statements about artificial intelligence (AI) and privacy are true except:

a. AI systems can ensure complete anonymity of user data without risk of reidentification.

b. Surveillance tools powered by AI systems, such as facial recognition, can track and analyze people's actions in public without their permission.

c. The data AI uses may have personal details and could be accessed by the wrong people.

d. Data retained by AI systems could be retained longer than it should be, increasing the risk of misuse and in violation of privacy laws.

ANSWER: a

RATIONALE: AI systems cannot ensure complete anonymity of user data without risk of reidentification. All other statements are true.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:21 AM

24. Which of the following is not a key driver in the use of edge artificial intelligence (AI)?

a. decreased bandwidth optimization

b. the need for lower latency

c. growth in the number of Internet of Things (IoT) devices

d. advancements in edge AI hardware accelerators

ANSWER: a

RATIONALE: Edge AI provides increased bandwidth optimization. By processing data at the edge, only essential information needs to be sent to the cloud, reducing the amount of data transmitted over networks. This helps manage bandwidth more effectively and lowers data transmission costs. Key drivers include the growth in the number of IoT devices and the ever-increasing amount of data they produce, the need for lower latency (faster response times), and advancements in edge AI hardware accelerators.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

25. Which of the following is not an application of natural language processing?

a. image recognition

b. search engine searches

c. online translators

d. co-pilots

ANSWER: a

RATIONALE: All of these use natural language processing (NLP) except image recognition.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

26. Which of the following is not a characteristic of artificial intelligence (AI)?

a. simulating human emotion

b. acquisition of information and rules for using the information

c. simulating human intelligence

d. self-correction

ANSWER: a

RATIONALE: AI cannot simulate human emotion.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

27. is excellent at tasks such as image recognition, natural language processing (NLP), and speech recognition.

a. Deep learning

b. Reinforced learning

c. Predictive analytics

d. Edge artificial intelligence (AI)

ANSWER: a

RATIONALE: Deep learning is excellent at tasks such as image recognition, NLP, and speech recognition.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

28. Training artificial neural networks requires and _________.

a. sizable computational power; large datasets

b. natural language processing (NLP); diverse training data

c. rules; large language models

d. machine vision; automation

ANSWER: a

RATIONALE: Training artificial neural networks requires sizable computational power and large datasets.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

29. The following statements are true about natural language processing (NLP) except:

a. NLP can accurately interpret all cultural references and sarcasm.

b. In addition to the collection of words, syntax and semantics are important to NLP.

c. NLP can consider sentiment and context.

d. NLP can convert text into spoken words.

ANSWER: a

RATIONALE: NLP cannot accurately interpret all cultural references and sarcasm.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:21 AM

30. What are large language models (LLMs)?

a. complex algorithms and system architectures that have been trained on massive datasets of text and code

b. the application of technology, programs, robotics, or processes to achieve outcomes with minimal human input

c. intelligent systems designed to work alongside humans, acting as virtual assistants to enhance efficiency, safety, and decision making

d. statistical techniques that aim to forecast future events or outcomes by analyzing relevant historical data

ANSWER: a

RATIONALE: LLMs are complex algorithms and system architectures that have been trained on massive datasets of text and code. Automation is the application of technology, programs, robotics, or processes to achieve outcomes with minimal human input. Copilots are intelligent systems designed to work alongside humans, acting as virtual assistants to enhance efficiency, safety, and decision making. Predictive modeling is a statistical technique that aims to forecast future events or outcomes by analyzing relevant historical data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.12.1 - Explain the basic types of artificial intelligence and how they are used in business.

TOPICS: 12.1: Overview of Artificial Intelligence

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

1. covers all the hardware, software, networks, databases, and related digital components of security, whereas is the discipline of protecting information (either digital or physical), information systems, facilities, and other resources against threats to confidentiality, integrity, and availability.

a. Cybersecurity; information security

b. Information security; cybersecurity

c. Cybersecurity; encryption

d. Information security; nonrepudiation

ANSWER: a

RATIONALE: Cybersecurity covers all the hardware, software, networks, databases, and related digital components of security, whereas information security is the discipline of protecting information (either digital or physical), information systems, facilities, and other resources against threats to confidentiality, integrity, and availability. Encryption is the process of converting plain text into cipher text. Nonrepudiation is the inability to deny being the sender, since only the sender could have created the encrypted data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

2. Most cybersecurity events are caused by:

a. simple human error.

b. organized crime groups.

c. foreign governments.

d. disgruntled employees.

ANSWER: a

RATIONALE: Most cybersecurity events are caused by simple human error.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

3. All information security is based on the principles of the CIA triad: __________, _____________, and ____________.

a. confidentiality; integrity; availability

b. confidentiality; identity; authority

c. control; integrity; authenticity

d. control; identity; authentication

ANSWER: a

RATIONALE: All information security is based on the principles of confidentiality, integrity, and availability, known as the CIA triad.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

4. is the practice of ensuring that data is only accessible by those who have appropriately approved access.

a. Confidentiality

b. Control

c. Authority

d. Integrity

ANSWER: a

RATIONALE: Confidentiality is the practice of ensuring that data is only accessible by those who have appropriately approved access. Integrity ensures that data is not changed without appropriate permission.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

5. Medical Health Systems of Arizona must ensure that patient data, such as medical records, are only able to be accessed by authorized personnel such as doctors, nurses, and other medical staff. This is an example of which element of the CIA triad?

a. confidentiality

b. integrity

c. authentication

d. availability

ANSWER: a

RATIONALE: Medical Health Systems of Arizona is ensuring that the data remains confidential, which is the confidentiality element of the CIA triad. Integrity ensures that data is not changed without appropriate permission. Availability seeks to ensure that data is accessible without interruption or delay.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

6. EasyR-flowers.com processes online orders for its customers. When an order is placed, the system logs any changes, including what was altered and by whom. This audit log would reveal unauthorized modification, and the data could be rolled back to its original state. This is an example of which element of the CIA triad?

a. confidentiality

b. integrity

c. authentication

d. availability

ANSWER: b

RATIONALE: This is an example of integrity. Integrity ensures that data is not changed without appropriate permission. Confidentiality is the practice of ensuring that data is only accessible by those who have appropriately approved access. Availability seeks to ensure that data is accessible without interruption or delay.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

7. In July 2024, an update to the CrowdStrike software that many corporations rely on for security contained a critical error resulting in the outage of devices and systems worldwide. This included information systems for several airlines. This is an example of which element of the CIA triad?

a. confidentiality

b. integrity

c. authentication

d. availability

ANSWER: d

RATIONALE: This is an example of availability. Availability seeks to ensure that data is accessible without interruption or delay. Integrity ensures that data is not changed without appropriate permission. Confidentiality is the practice of ensuring that data is only accessible by those who have appropriately approved access.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to

safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

8. A violation of confidentiality is ___________, and if data integrity is compromised, it is ___________.

a. disclosure; alteration

b. denial of service; disclosure

c. exploit; usurpation

d. disclosure; nonrepudiation

ANSWER: a

RATIONALE: A violation of confidentiality is disclosure, and if data integrity is compromised, it is alteration. An exploit is a method of taking advantage of a vulnerability. If data is not accessible, it is called a denial of service. Nonrepudiation is the inability to deny being the sender since only the sender could have created the encrypted data.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

9. The following are examples of vulnerabilities except:

a. data encryption.

b. weak passwords.

c. unpatched software.

d. phishing attacks.

ANSWER: a

RATIONALE: Data encryption is a way to mitigate against the vulnerability of data being captured in transit. With data encryption, even if the data is captured on its way to its destination, it can't easily be decoded. Weak passwords, unpatched software, and phishing attacks are all vulnerabilities of which organizations should be aware.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:05 AM

10. The main purpose of the is to identify and prioritize the organization's essential business activities and determine the effects of disruptions.

a. business impact assessment

b. System and Organization Controls

c. defense-in-depth

d. CIA triad

ANSWER: a

RATIONALE: The main purpose of the business impact assessment is to identify and prioritize the organization's essential business activities and determine the effects of disruptions. System and Organization Controls are audit standards and a means for service providers to demonstrate their compliance with those standards. Defense-in-depth is using multiple layers of mitigation to maximize the protection of an asset. All information security is based on the principles of confidentiality, integrity, and availability, known as the CIA triad.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:46 AM

11. The following are steps in conducting a business impact assessment (BIA) except:

a. quantify the amount of time to restore information technology (IT) services.

b. identify potential risks.

c. determine recovery requirements.

d. identify critical functions and processes.

ANSWER: a

RATIONALE: Quantifying the amount of time to restore IT services is not a step in the BIA. Conducting a comprehensive BIA involves the following seven steps: 1. Identify critical functions and processes. 2. Identify potential risks. 3. Assess likelihood. 4. Analyze potential impacts. 5. Determine a risk response. 6. Budget for risk. 7. Determine recovery requirements.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:05 AM

12. During a business impact assessment (BIA), organizations should consider which of the following?

a. operational dependencies

b. information system (IS) software development costs

c. number of IT employees

d. type of hardware

ANSWER: a

RATIONALE: Organizations should consider factors such as revenue generation, customer impact, legal and regulatory requirements, and operational dependencies when identifying critical functions and processes during the first step of the BIA. Software development costs, the number of IT employees, and the type of hardware are considerations for the day-to-day operation of an IT department and are not as important when conducting the BIA.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

13. What is the difference between a mission-critical system and a business-critical system?

a. Mission-critical systems are tied directly to the core mission of the organization; business-critical systems are needed for day-to-day operations and profitability.

b. Mission-critical systems are needed for day-to-day operations and profitability; business-critical systems allow an organization to conduct basic operations and maintain a minimum level of functionality.

c. Mission-critical systems allow an organization to conduct basic operations and maintain a minimum level of functionality; business-critical systems are needed for day-to-day operations and profitability.

d. Mission-critical systems support key business activities; business-critical systems allow an organization to conduct basic operations and maintain a minimum level of functionality.

ANSWER: a

RATIONALE: Mission-critical systems are tied directly to the core mission of the organization; business-critical systems are needed for day-to-day operations and profitability.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

14. Which of the following is an example of a mission-critical system?

a. a manufacturing system that monitors product quality

b. a Human Resources (HR) system for hiring new employees

c. a reporting dashboard for executives

d. an accounts payable system

ANSWER: a

RATIONALE: Mission-critical systems may include order fulfillment, accounts receivable, sales, and manufacturing. Business-critical systems could include management reporting, regulatory compliance, and ordering. Essential functions might include payroll, hiring, training, and accounts payable. (Payroll is a vital system. Everyone deserves to be paid correctly and in a timely manner. However, maintaining the revenuegenerating systems may be key to ensuring the cash flow needed to meet payroll.)

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

15. When assigning an asset value, the following questions should be asked except:

a. What employees work on this system?

b. What is the value of this information system to the company?

c. What would it cost to rebuild or replace the system?

d. What benefit does this information system bring?

ANSWER: a

RATIONALE: While it is important to know what employees would be impacted by an inoperable system, it is not important when assessing an asset value. The questions to ask are: What is the value of this information system to the company? What benefit does this information system bring? What would it cost to rebuild or replace the system?

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:06 AM

16. The ability to identify critical functions and processes and assigning them an asset value is predicated on having an accurate _______________. The success of this system directly supports the business impact assessment process.

a. asset management system

b. annualized loss expectancy

c. exposure factor

d. annualized rate of occurrence (ARO)

ANSWER: a

RATIONALE:

The ability to identify critical functions and processes and assigning them an asset value is predicated on having an accurate asset management system. The success of this system directly supports the business impact assessment process. If you don't know what you have, you can't quantify it. The ARO (the number of times that a business expects to experience that type of disruptive event in any given year), the annualized loss expectancy (the financial impact that can be expected in a given year from a particular disaster), and the exposure factor (which measures the degree of impact that a given risk would have on a specific information system) are related to risk assessment.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

17. The recovery point objective:

a. places a limit on how much data loss the business can experience without experiencing harm from an outage event.

b. sets the limit on how long it will take to recover the system after an outage event.

c. is the total time that an information system can be down before the business suffers irreparable harm.

d. measures the degree of impact that a given risk would have on a specific information system.

ANSWER: a

RATIONALE: The recovery point objective places a limit on how much data loss the business can experience without experiencing harm from an outage event. The recovery time objective sets the limit on how long it will take to recover the system after an outage event. The maximum tolerable downtime is the total time that an information system can be down before the business suffers irreparable harm. The exposure factor measures the degree of impact that a given risk would have on a specific information system.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

18. Which principle of the CIA triad is affected by a DOS attack?

a. availability

b. accessibility

c. integrity

d. confidentiality

ANSWER: a

RATIONALE: A denial-of-service (DOS) attack occurs when a system is rendered incapable of responding to normal requests. The information available on that system is no longer available, thereby affecting the availability principle of the CIA triad. DOS attacks don't affect confidentiality or integrity but can potentially have a significant impact on business because systems are unavailable.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.3 - Describe common cybersecurity threats.

TOPICS: 13.3: Cybersecurity Threats

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

19. What type of attack sends tailored messages to a recipient, often with accurate information that helps lend credibility to the message?

a. spear phishing

b. QRishing

c. social engineering

d. denial of service (DOS)

ANSWER: a

RATIONALE: In a spear phishing attack, the messages are tailored to the recipient, referring to them by name and perhaps adding some accurate information that is germane to the context. This helps to lend credibility to the message and lower the defenses of the victim. Social engineering is the act of using manipulative techniques to persuade individuals to disclose confidential information or perform actions that compromise security. In a social engineering attack, the target is encouraged to provide log-on credentials, personal information such as Social Security numbers or birthdates, bank account details, proprietary information, network information, or simply the names of influential leaders in an organization. A DOS attack occurs when a system is rendered incapable of responding to normal requests. QRishing is the use of quick-response (QR) codes to direct victims to malicious websites.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.3 - Describe common cybersecurity threats.

TOPICS: 13.3: Cybersecurity Threats

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

20. The purpose of an is to confirm that security policies are adequate and effective.

a. information security audit

b. incident response

c. authentication

d. asymmetric encryption

ANSWER: a

RATIONALE: The purpose of an information security audit is to confirm that security policies are adequate and effective. Incident responses ensure that organizations have a structured approach to managing an incident after it has occurred. Audits aim to reveal gaps to minimize security incidents. Authentication is proof of the identity of the user. Authentication methods are often one element of an audit. Asymmetric encryption uses a matched pair of keys that are designed to work together.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.4 - Explain the role of information security policy audits.

TOPICS: 13.4: Security Policies, Audits, and Compliance

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

21. The following statements are true of audits and compliance except:

a. Auditors will not request evidence that the security policy is actively used and followed.

b. Periodic audits by regulators and other entities will test the security policies that have been created.

c. Organizations must comply with frameworks and regulations such as the Health Insurance Portability and Accountability Act, the European Union General Data Protection Regulation, and the Payment Card Industry Data Security Standard.

d. Compliance ensures that the organization meets minimum standards set by external organizations.

ANSWER: a

RATIONALE: To determine if an audit is adequate and effective, auditors will request evidence that a policy is actively used and followed.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.4 - Explain the role of information security policy audits.

TOPICS: 13.4: Security Policies, Audits, and Compliance

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/17/2025 1:08 AM

22. A structured approach to handling and managing an incident with the aim of limiting damage, reducing recovery time and costs, and mitigating the effect on business operations is a(n):

a. incident response.

b. access control.

c. defense-in-depth.

d. information security.

ANSWER: a

RATIONALE: An incident response is a structured approach to handling and managing an incident with the aim of limiting damage, reducing recovery time and costs, and mitigating the effect on business operations. Access controls restricting who has permission to read, write, alter, or delete data can prevent unauthorized parties from reading the data whether it is encrypted. Defense-in-depth is using multiple layers of mitigation to maximize the protection of an asset. Information security is the discipline of protecting information (either digital or physical), information systems, facilities, and other resources against threats to confidentiality, integrity, and availability.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.5 - Discuss how organizations respond to security incidents.

TOPICS: 13.5: When, Not if, Things Go Wrong

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/15/2025 4:30 AM

23. What occurs in the remediation step of an incident response?

a. The technical teams devise a plan to prevent the incident from occurring again.

b. The affected systems are restored to a functional state.

c. A report is compiled that analyzes what went well and identifies opportunities to improve the incident response.

d. Trained experts investigate the incident and assess impacts.

ANSWER: a

RATIONALE: During the remediation step (after understanding the root cause of the incident), the technical teams must devise ways to prevent the incident from occurring again. In the response step, trained experts investigate the incident and assess the impacts. During the recovery step, the affected systems are restored to a functional state. In the lessons learned step, a report about the event is compiled, analyzing what went well and identifying opportunities to improve the incident response.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.5 - Discuss how organizations respond to security incidents.

TOPICS: 13.5: When, Not if, Things Go Wrong

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

24. What is the main purpose of digital forensics?

a. to collect and protect evidence, ensuring it can be used for legal purposes

b. to place blame on the person or persons that let an incident occur

c. to create security policies for an organization

d. to create additional security measures to prevent future incidents

ANSWER: a

RATIONALE: The main purpose of digital forensics is to collect and protect the evidence and ensure it can be used for legal purposes.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.5 - Discuss how organizations respond to security incidents.

TOPICS: 13.5: When, Not if, Things Go Wrong

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/15/2025 4:27 AM

25. allows authorized users to access information but prevents unauthorized parties from making sense of the data.

a. Cryptography

b. Nonrepudiation

c. Decryption

d. Authentication

ANSWER: a

RATIONALE: Cryptography allows authorized users to access information but prevents unauthorized parties from making sense of the data. Nonrepudiation is the inability to deny being the sender, since only the sender could have created the encrypted data. Authentication is proof of the identity of the sender. Decryption is the process of converting cipher text back into plain text. It is one part of the process of cryptography.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.6 - Describe the function of symmetrical and asymmetrical encryption.

TOPICS: 13.6: Cryptography

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

26. Which of the following statements is false with respect to asymmetric encryption?

a. In asymmetric encryption, one key is a public key that will be shared with anyone who needs it.

b. In asymmetric encryption, securing the key in transit is a challenge, making it less secure.

c. In asymmetric encryption, one key encrypts the data and another, different key decrypts the data.

d. In asymmetric encryption, each key pair is unique.

ANSWER: b

RATIONALE: Asymmetric encryption is generally more secure because two keys are needed. Asymmetric encryption requires a matched pair of keys that are designed to work together. One key is labeled the private key and is never shared with anyone. The other key is the public key, which will be shared with anyone who needs it. Each key pair is unique.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.6 - Describe the function of symmetrical and asymmetrical encryption.

TOPICS: 13.6: Cryptography

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

27. Which of the following is not a type of malware?

a. denial of service (DOS) attack

b. worm

c. ransomware

d. trojan horse

ANSWER: a

RATIONALE: A DOS attack is not a type of malware. It is an attack that inundates a service with so much traffic that it renders the service unavailable.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.3 - Describe common cybersecurity threats.

TOPICS: 13.3: Cybersecurity Threats

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

28. means taking steps to eliminate a specific risk, is the act of taking steps to minimize the impact of a risk, and is the overt or tacit decision to do nothing about a risk.

a. Risk avoidance; risk mitigation; risk rejection

b. Risk acceptance; risk avoidance; risk transference

c. Risk rejection; risk transference; risk avoidance

d. Risk mitigation; risk transference; risk rejection

ANSWER: a

RATIONALE: Risk avoidance means taking steps to eliminate a specific risk, risk mitigation is the act of taking steps to minimize the impact of a risk, and risk rejection is the overt or tacit decision to do nothing about a risk. Risk transference is shifting the operational responsibility of the risk to another party. Risk acceptance is the acknowledgment that a risk exists but that the response to the risk is too expensive.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

29. The maximum tolerable downtime (MTD) is the sum of which two metrics?

a. recovery point objective (RPO) and recovery time objective (RTO)

b. annualized loss expectancy (ALE) and annualized rate of occurrence (ARO)

c. single loss expectancy (SLE) and exposure factor (EF)

d. exposure factor (EF) and recovery time objective (RTO)

ANSWER: a

RATIONALE:

The MTD is the total time that an information system can be down before the business suffers irreparable harm. The MTD is the sum of the RPO and RTO. An RPO places a limit on how much data loss the business can experience without experiencing harm from an outage event, whereas RTO sets the limit on how long it will take to recover the system after an outage event. The EF measures the degree of impact that a given risk would have on a specific information system. The ALE is the financial impact that can be expected in a given year from a particular disaster. The SLE is the amount of financial impact that will be experienced if that particular disaster occurs. The ARO is the number of times that a business expects to experience that type of disruptive event in any given year.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 1/15/2025 4:26 AM

30. A(n) is the method to take advantage of a(n) ____________, which is a weakness in an information system that can result in a failure of any one or all elements of the CIA triad.

a. exploit; vulnerability

b. vulnerability; exploit

c. remediation; alteration

d. exploit; advanced persistent threat

ANSWER: a

RATIONALE: A vulnerability is a weakness in an information system that can result in a failure of confidentiality, integrity, and/or availability. An exploit is the method with which to take advantage of a vulnerability. Remediation is the change necessary to remediate or address the vulnerability. Alteration is when data integrity is compromised. Advanced persistent threats are groups with the knowledge, skills, and computer

resources necessary to conduct cybercrime campaigns.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.1 - Discuss how the CIA security triad can be implemented to safeguard against cyberattacks and non-cyber incidents.

TOPICS: 13.1: What is Information Security?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

31. Firebook is a software company that produces reading tablets. It identified the risk of a data breach and its impact on the business. Firebook estimates this could occur once every two years with an expected loss of $500,000 per incident. What is the annualized loss expectancy (ALE) for this disaster?

a. $250,000

b. $125,000

c. $1,000,000

d. $500,000

ANSWER: a

RATIONALE: The single loss expectancy (SLE) is $500,000 and the annualized rate of occurrence (ARO) is once every two years or 0.5. Therefore, the ALE is 0.5 x $500,000 = $250,000.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.13.2 - Describe the process of creating a business impact assessment.

TOPICS: 13.2: Business Impact Assessment

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/22/2024 1:37 PM

DATE MODIFIED: 10/22/2024 1:37 PM

1. is/are the set of principles about what is right and wrong that individuals use to make choices to guide their decisions, whereas is/are principles or standards of right and wrong behavior that govern an individual's or society's beliefs, values, and actions.

a. Ethics; morals

b. Morals; ethics

c. Law; morals

d. Ethics; law

ANSWER: a

RATIONALE: Ethics is the set of principles about what is right and wrong that individuals use to make choices to guide their decisions, whereas morals are principles or standards of right and wrong behavior that govern an individual's or society's beliefs, values, and actions. Law is a system of rules that tells us what we may and may not do. Business

leaders need to understand that economic systems are shaped, influenced, and regulated by the legal frameworks in which they exist.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

2. conform(s) to generally accepted norms, which may change over time to meet the evolving needs of society or a group of people who share similar laws, traditions, and values that provide structure for living in an organized manner.

a. Ethical behavior

b. Morals

c. Laws

d. Rules

ANSWER: a

RATIONALE: Ethical behavior conforms to generally accepted norms, which may change over time to meet the evolving needs of society or a group of people who share similar laws, traditions, and values that provide structure for living in an organized manner. Individual views of what behavior is ethical may be affected by a person's age, cultural group, racial-ethnic background, religion, life experiences, education, and gender, along with other factors. Laws are not static; new laws are constantly being introduced and existing laws repealed or modified. As a result, the precise interpretation of a particular law may be different in the future from what it is today, which could be different from how the law was understood in the past.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 1/15/2025 4:24 AM

3. are enforced by a set of institutions (the police, courts, and law-making bodies).

a. Laws

b. Ethics

c. Codes of ethics

d. Morals

ANSWER: a

RATIONALE: Laws are enforced by a set of institutions (the police, courts, and law-making bodies).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

4. The statements Deliver value to customers, Invest in employees, Deal fairly and ethically with suppliers, Support the communities in which they work, and Generate long-term value for shareholders make up the ___________, a synergistic environment in which all stakeholders benefit.

a. virtuous cycle

b. environmental, social, and governance (ESR) framework

c. corporate social responsibility

d. Business Roundtable statement

ANSWER: a

RATIONALE: The statements: Deliver value to customers, Invest in employees, Deal fairly and ethically with suppliers, Support the communities in which they work, and Generate long-term value for shareholders make up the virtuous cycle, a synergistic environment in which all stakeholders benefit. ESR is a framework for evaluating a company's ethical business practices. The Business Roundtable calls out fair compensation, benefits, training and education, diversity and inclusion, and dignity and respect as important aspects in how employees are treated. Corporate social responsibility is a company's commitment to operate in a way that benefits society and the environment, alongside making profits.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

5. is a framework for evaluating a company's ethical business practices.

a. Environmental, social, and governance (ESR)

b. Virtuous cycle

c. Corporate social responsibility

d. Business Roundtable statement

ANSWER: a

RATIONALE: ESR is a framework for evaluating a company's ethical business practices. The virtuous cycle is a synergistic environment in which all stakeholders benefit. The Business Roundtable calls out fair compensation, benefits, training and education, diversity and inclusion, and dignity and respect as important aspects in how

employees are treated. Corporate social responsibility is a company's commitment to operate in a way that benefits society and the environment, alongside making profits.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

6. Corporate social responsibility is:

a. a company's commitment to operate in a way that benefits society and the environment, alongside making profits.

b. a framework for evaluating a company's ethical business practices.

c. intended to promote fair compensation, benefits, training and education, diversity and inclusion, and dignity and respect as important aspects in how employees are treated.

d. a synergistic environment in which all stakeholders benefit.

ANSWER: a

RATIONALE: Corporate social responsibility is a company's commitment to operate in a way that benefits society and the environment, alongside making profits. The virtuous cycle is a synergistic environment in which all stakeholders benefit. Environmental, social, and governance is a framework for evaluating a company's ethical business practices. The Business Roundtable calls out fair compensation, benefits, training and education, diversity and inclusion, and dignity and respect as important aspects in how employees are treated.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

7. The following statements regarding ethical behavior are true except:

a. social responsibility and profits should be in opposition.

b. employees are key stakeholders in the virtuous cycle.

c. ethical considerations should apply to decision making.

d. ethical behavior extends into which suppliers are selected as partners.

ANSWER: a

RATIONALE: Within a corporate social responsibility (CSR) perspective and the framework published by the Business Roundtable, social responsibility and profits are not in opposition. Instead, being a positive contributor to the community can increase

goodwill and contribute to higher profits.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 1/17/2025 1:08 AM

8. The virtuous cycle includes the following commitments except:

a. deal fairly and ethically with customers.

b. invest in employees.

c. deliver value to customers.

d. support the communities in which they work.

ANSWER: a

RATIONALE: The correct answer is that organizations should deal fairly and ethically with suppliers. They should also deal fairly and ethically with customers, but it is not officially a commitment in the virtuous cycle. The five commitments that make up the virtuous cycle are: Deliver value to customers. Invest in employees. Deal fairly and ethically with suppliers. Support the communities in which they work. Generate long-term value for shareholders.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 1/17/2025 1:08 AM

9. Morals are __________, whereas ethics is ____________.

a. individual; for everyone

b. for everyone; individual

c. laws; generally accepted norms

d. customs; individual

ANSWER: a

RATIONALE: Morals are individual, and ethics is for everyone.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

10. Which of the following scenarios would be legal but could be considered unethical?

a. laying off workers just to turn a profit

b. stealing customer data for personal use

c. evading taxes

d. stealing another company's engineering specifications

ANSWER: a

RATIONALE: All of these would be considered unethical; however, laying off workers just to turn a profit would not be illegal.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.1 - Explain the difference between morals, ethics, and laws.

TOPICS: 14.1: What Is Ethics?

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

11. Which of the following statements about the General Data Protection Regulation (GDPR) is false?

a. GDPR does not apply to US companies even though they may process personal data of European Union (EU) citizens.

b. It applies to EU companies that process non-EU citizens' personal data.

c. GDPR obligates organizations to obtain the consent of people they collect information about and to better manage this data.

d. It requires organizations to provide training for employees to ensure they are aware of their responsibilities related to personal data and to have written documentation explaining how data is processed.

ANSWER: a

RATIONALE: The GDPR is a data privacy and protection framework that applies to all companies that process the personal data of EU citizens, regardless of where the processing takes place and even when EU citizens are outside of its borders. All other statements are true.

POINTS: 1

QUESTION TYPE: Multiple Choice HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.2 - Describe the steps companies can take to protect customer data.

TOPICS: 14.2: Information Systems and Privacy

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

12. Which of the following is not a surveillance-enabling law?

a. General Data Protection Regulation (GDPR)

b. Foreign Intelligence Surveillance Act (FISA)

c. US PATRIOT Act

d. Investigatory Powers Act

ANSWER: a

RATIONALE:

GDPR is a privacy law in the European Union. The other laws are surveillanceenabling laws. In the United States, several federal laws state how the government may conduct surveillance. One law is the FISA. This law establishes a special Foreign Intelligence Surveillance Court where federal intelligence agencies can submit requests for warrants. Another law is the US PATRIOT Act, which was passed shortly after the September 11, 2001, terrorist attacks. One effect of this law is the expanded use of National Security Letters (NSLs), especially by the FBI. An NSL allows a federal investigation agency to issue an order to provide information as directed in the specific NSL. The NSL does not have to be reviewed and approved by a judge. In the United Kingdom, the Investigatory Powers Act allows for private and/or secret judicial oversight hearings for a search warrant for national security purposes.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.2 - Describe the steps companies can take to protect customer data.

TOPICS: 14.2: Information Systems and Privacy

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

13. Which of the following statements about corporate and private surveillance is false?

a. The U.S. Fourth Amendment prevents private citizens from recording activities in public places.

b. In general, property owners have the right to record activity on their property.

c. Countries within the EU have restrictions on how automated license plate reader data can be collected.

d. Since activity on roadways is in full public view, there is no reasonable expectation of privacy.

ANSWER: a

RATIONALE: The U.S. Fourth Amendment applies only to the government (i.e., law enforcement). If a private citizen or private company mounts a camera in a public place where there is no reasonable expectation of privacy, they can record all the activity in that area.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.3 - Outline the similarities and differences between government surveillance versus private and corporate surveillance.

TOPICS: 14.3: Information Systems and Surveillance

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

14. Which of the following is not a core principle of Privacy by Design?

a. Privacy does not need to be a default setting. Users may opt-in to privacy.

b. Privacy must be enabled from the user device all the way to the point where data is used and stored.

c. Privacy is proactive, not reactive.

d. There should be clear information about what is and is not covered under privacy protections.

ANSWER: a

RATIONALE: Privacy by Design holds that privacy must be actively engaged by default. The user must choose to disable some or all privacy protections that were included as a core requirement when information systems are designed.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.2 - Describe the steps companies can take to protect customer data.

TOPICS: 14.3: Information Systems and Surveillance

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

15. The is a data privacy and protection framework that applies to all companies that process data of EU citizens.

a. General Data Protection Regulation (GDPR)

b. Health Insurance Portability and Accountability Act (HIPAA)

c. Family Educational Rights and Privacy Act (FERPA)

d. California Consumer Privacy Act (CCPA)

ANSWER: a

RATIONALE: GDPR applies to EU citizens. HIPAA is a US regulation that applies to health data. FERPA is a US regulation that applies to student data. The CCPA is a California regulation that is closely modeled after the GDPR.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.3 - Outline the similarities and differences between government surveillance versus private and corporate surveillance.

TOPICS: 14.2: Information Systems and Privacy

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

16. Which privacy regulation is concerned with the privacy of patient data in the United States?

a. Health Insurance Portability and Accountability Act (HIPAA)

b. General Data Protection Regulation (GDPR)

c. Family Educational Rights and Privacy Act (FERPA)

d. California Consumer Privacy Act (CCPA)

ANSWER: a

RATIONALE: HIPAA requires healthcare organizations in the US to employ standardized electronic transactions, codes, and identifiers to fully digitize patient medical records, making it possible to electronically exchange medical data safely. FERPA is a US regulation that applies to student data. The CCPA is a California regulation that is closely modeled after the GDPR.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.3 - Outline the similarities and differences between government surveillance versus private and corporate surveillance.

TOPICS: 14.2: Information Systems and Privacy

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

17. A parent emails a college professor demanding to see their daughter's grades for a course. The student is 18 years old. The parents are paying for it. What should the professor do?

a. The professor should provide the information only if the student has consented to it.

b. The parents are paying for the course so the professor must provide this information.

c. The professor can never provide the parent with the grade information because doing so would violate the Family Educational Rights and Privacy Act (FERPA).

d. The professor should provide the parent with the grade information because the student is only 18.

ANSWER: a

RATIONALE: FERPA is a federal law that assigns certain rights to parents regarding their children's educational records. These rights transfer to the student when the student reaches the age of 18, or earlier, if the student attends a school beyond the high school level. Included is the right to demand that educational records be disclosed only with student consent.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.3 - Outline the similarities and differences between government surveillance versus private and corporate surveillance.

TOPICS: 14.2: Information Systems and Privacy

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 1/21/2025 11:53 PM

18. Which US regulation stipulates that if a government agency intends to obtain a consumer's financial records, the customer must receive written notice?

a. Right to Financial Privacy Act (RFPA)

b. Family Educational Rights and Privacy Act (FERPA)

c. Fair and Accurate Credit Transactions Act (FACTA)

d. Fair Credit Reporting Act (FCRA)

ANSWER: a

RATIONALE: RFPA protects the records of financial institution customers from unauthorized scrutiny by the federal government. FCRA regulates the operations of creditreporting bureaus, including how they collect, store, and use credit information. FACTA is an amendment to the FCRA that allows consumers to request and obtain a free credit report once a year. FERPA is a federal law that assigns certain rights to parents regarding their children's educational records.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES:

PerVa.POIS5E.25.14.3 - Outline the similarities and differences between government surveillance versus private and corporate surveillance.

TOPICS: 14.2: Information Systems and Privacy

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

19. Corporate privacy policies should address each of the following except:

a. choice (how customer data is being used to generate revenue).

b. access (how a customer can review what data has been collected and change/correct it if necessary).

c. redress (what a customer can do if the privacy policy is not met).

d. notice (what personal information is being collected on the site).

ANSWER: a

RATIONALE: Choice is not a recommended element. The Better Business Bureau recommends that a privacy notice should be based on the following five elements: (1) Notice (what personal information is being collected on the site), (2) Choice (what options the customer has about how/whether personal data is collected and used), (3) Access (how a customer can review what data has been collected and change/correct it if necessary), (4) Security (state how any data that is collected is stored/protected), and (5) Redress (what a customer can do if the privacy policy is not met).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.3 - Outline the similarities and differences between government surveillance versus private and corporate surveillance.

TOPICS: 14.2: Information Systems and Privacy

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 1/17/2025 1:09 AM

20. Select the type of speech below that is protected by the First Amendment.

a. anonymous speech

b. fraudulent speech

c. perjury

d. incitement of panic

ANSWER: a

RATIONALE: The Supreme Court has ruled that the First Amendment protects the right to speak anonymously as part of the guarantee of free speech. The Supreme Court has held that the following types of speech are not protected by the First Amendment and may be forbidden by the government: perjury, fraud, defamation, obscene speech, incitement of panic, incitement to crime, "fighting words," and sedition (incitement of discontent or rebellion against a government).

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.4 - Describe measures to protect freedom of expression.

TOPICS: 14.4: Information Systems and Freedom of Expression

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

21. A country that blocks access to independent news websites and blogs critical of the government is an example of _____________.

a. internet censorship

b. Privacy by Design

c. surveillance capitalism

d. an internet filter

ANSWER: a

RATIONALE: Internet censorship is the control or suppression of the publishing or accessing of information on the internet and is typically done for ideological reasons. Censorship can involve blocking access to content or intimidating those who would publish content that others seek to suppress.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.4 - Describe measures to protect freedom of expression.

TOPICS: 14.4: Information Systems and Freedom of Expression

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

22. Parents can implement software that can be used to block access to certain websites that contain material deemed inappropriate or offensive. This is an example of the use of a(n) _____________.

a. internet filter

b. access control

c. Children's Internet Protection Act (CIPA)

d. Children's Online Privacy Protection Act (COPPA)

ANSWER: a

RATIONALE: This is an example of the use of an internet filter. Access controls restricting who

has permission to read, write, alter, or delete data can prevent unauthorized parties from reading the data whether it is encrypted or not. CIPA and COPPA are regulatory acts aimed at protecting children from pornography and obscene material, respectively.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.4 - Describe measures to protect freedom of expression.

TOPICS: 14.4: Information Systems and Freedom of Expression

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 1/15/2025 4:11 AM

23. A soccer athlete sued a media company because it claimed the athlete had an affair. The athlete sued the media company for $25 million, saying that the allegations were false and damaged the athlete's reputation. This is an example of ___________, in which either an oral or written statement of alleged fact is false and harms another person.

a. defamation

b. fake news

c. a whistleblower

d. slander

ANSWER: a

RATIONALE: This is an example of defamation. Fake news is a false story presented as factually accurate and appears to be news. A whistleblower is a person who reports illegal, unethical, or unsafe behavior within an organization, typically by reporting the wrongdoing to a legal or regulatory authority or the media. Slander is a type of defamation but in spoken form. In the case of this soccer star, it was libel, the written form of defamation.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.4 - Describe measures to protect freedom of expression.

TOPICS: 14.4: Information Systems and Freedom of Expression

KEYWORDS: Bloom's: Apply

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 1/15/2025 4:13 AM

24. A threatening private message sent over the internet to a person, a public message displayed on a website describing intent to commit acts of hate-motivated violence against specific individuals, and libel directed at a specific person are all examples of _____________.

a. hate speech

b. slander

c. fake news

d. defamation

ANSWER: a

RATIONALE: These are examples of hate speech. Slander is oral defamation. Fake news is a false story presented as factually accurate and appears to be news. Defamation is making either an oral or a written statement of alleged fact that is false and that harms another person.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.4 - Describe measures to protect freedom of expression.

TOPICS: 14.4: Information Systems and Freedom of Expression

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

25. is a false story presented as factually accurate and appears to be news.

a. Fake news

b. Slander

c. Hate speech

d. Defamation

ANSWER: a

RATIONALE: Fake news is a false story presented as factually accurate and appears to be news. Slander is oral defamation. Fake news is a false story presented as factually accurate and appears to be news. Defamation is making either an oral or a written statement of alleged fact that is false and that harms another person. Persistent or malicious harassment aimed at a specific person because of their membership in a protected class is generally defined as hate speech.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.4 - Describe measures to protect freedom of expression.

TOPICS: 14.4: Information Systems and Freedom of Expression

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

26. Which of the following US regulations includes strong privacy provisions for electronic health records, which include banning the sale of health information, promoting the use of audit trails and encryption, providing rights of access for patients, and mandating that everyone whose health information has been exposed be notified within 60 days after discovery of a data breach?

a. Health Information Technology for Economic and Clinical Health Act (HITECH)

b. Health Insurance Portability and Accountability Act (HIPAA)

c. Children's Online Privacy Protection Act (COPPA)

d. Family Educational Rights and Privacy Act (FERPA)

ANSWER: a

RATIONALE: HITECH includes strong privacy provisions for electronic health records (EHRs).

These provisions include banning the sale of health information, promoting the use of audit trails and encryption, providing rights of access for patients, and mandating that each individual whose health information has been exposed be notified within 60 days after discovery of a data breach. HIPAA requires healthcare organizations in the US to employ standardized electronic transactions, codes, and identifiers to fully digitize patient medical records, making it possible to electronically exchange medical data safely. FERPA is a US regulation that applies to student data. COPPA was implemented to give parents more control over the collection, use, and disclosure of their children's personal information.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.3 - Outline the similarities and differences between government surveillance versus private and corporate surveillance.

TOPICS: 14.2: Information Systems and Privacy

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

27. A is a system whose failure may cause human injury or death; the safe operation of these systems often relies on the performance of software.

a. safety-critical system

b. high-quality information systems

c. Health Information Technology for Economic and Clinical Health Act (HITECH)

d. Health Insurance Portability and Accountability Act (HIPAA)

ANSWER: a

RATIONALE: A safety-critical system is a system whose failure may cause human injury or death; the safe operation of these systems often relies on the performance of software. Highquality information systems are systems that perform reliably and efficiently, meet their users' needs, maintain high security, are easily maintainable and extensible, handle increasing workloads, and are compliant with appropriate laws and regulations. HITECH and HIPAA are regulations that control privacy and use of health information.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.5 - Describe high-quality information systems and safety-critical systems.

TOPICS: 14.5: Ethical Issues in Developing Quality Information Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

28. In 1999, NASA sent a $125 million orbiter to Mars. The spacecraft was lost because the teams who wrote the code used incompatible units of measurement (metric and imperial), which led to an incorrect trajectory. This is an example of a ______________.

a. software defect

b. high-quality information system

c. safety-critical system

d. problem statement

ANSWER: a

RATIONALE: This is an example of a software defect. High-quality information systems are systems that perform reliably and efficiently, meet their users' needs, maintain high security, are easily maintainable and extensible, handle increasing workloads, and are compliant with appropriate laws and regulations. A safety-critical system is a system whose failure may cause human injury or death; the safe operation of these systems often relies on the performance of software. (Luckily, this was not that type of system!) A problem statement is a clear and concise description of the issue that needs to be addressed.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.5 - Describe high-quality information systems and safety-critical systems.

TOPICS: 14.5: Ethical Issues in Developing Quality Information Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

29. What is the role of a whistleblower?

a. to report illegal, unethical, or unsafe behavior within an organization, typically by reporting the wrongdoing to a legal or regulatory authority or the media

b. to create profiles on people based on (supposedly) aggregated data from multiple sources, including arrest records, business directories, social media networks, websites (including browsing and search histories), etc

c. to call for fair compensation, benefits, training, and education to promote positive employee engagement

d. to commit to operate an organization in a way that benefits society and the environment, alongside making profits

ANSWER: a

RATIONALE: A whistleblower is a person who reports illegal, unethical, or unsafe behavior within an organization, typically by reporting the wrongdoing to a legal or regulatory authority or the media.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.5 - Describe high-quality information systems and safety-critical systems.

TOPICS: 14.5: Ethical Issues in Developing Quality Information Systems

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 1/15/2025 4:16 AM

30. Increasing government may lead to reduced because data collection and surveillance can infringe on individual freedom.

a. surveillance; privacy

b. privacy; security

c. surveillance; security

d. anonymity; censorship

ANSWER: a

RATIONALE: Increasing government surveillance may lead to reduced privacy because data collection and surveillance can infringe on individual freedom.

POINTS: 1

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

LEARNING OBJECTIVES: PerVa.POIS5E.25.14.3 - Outline the similarities and differences between government surveillance versus private and corporate surveillance.

TOPICS: 14.3: Information Systems and Surveillance

KEYWORDS: Bloom's: Understand

DATE CREATED: 10/24/2024 11:36 AM

DATE MODIFIED: 10/24/2024 11:36 AM

Turn static files into dynamic content formats.

Create a flipbook