Digital Business Management Textbook Exam Questions - 1723 Verified Questions

Page 1


Digital Business Management

Textbook Exam Questions

Course Introduction

Digital Business Management explores the strategies, tools, and processes necessary for organizations to thrive in the digital economy. This course covers topics such as e-commerce models, digital marketing, online customer engagement, digital transformation, and the impact of emerging technologies on business operations. Students will learn how to leverage digital platforms and data analytics to create value, enhance competitiveness, and manage digital projects effectively. By examining case studies and current trends, the course equips students with the skills to make informed decisions and lead organizations in a rapidly evolving digital landscape.

Recommended Textbook Information Technology for Management 11th Edition by Efraim Turban

Available Study Resources on Quizplus

14 Chapters

1723 Verified Questions

1723 Flashcards

Source URL: https://quizplus.com/study-set/2007

Page 2

Chapter 1: Disruptive IT Impacts Companies, competition, and Careers

Available Study Resources on Quizplus for this Chatper

96 Verified Questions

96 Flashcards

Source URL: https://quizplus.com/quiz/39884

Sample Questions

Q1) Mass migration to mobile devices from PCs has expanded the scope of IT beyond traditional organizational boundaries-making location practically irrelevant.

A)True

B)False

Answer: True

Q2) Using a combination of mobile and database technology,Pizza House keeps records of the pizza preferences of all its customers.When Sam orders from Pizza House,he only says "send me the usual" when he calls in his order;and hangs up.Accessing the database,the Pizza House worker knows his address,his usual order,and what credit card to bill.The streamlined ordering and fulfillment efficiency give the Pizza House

A)A strategic plan

B)A strategic model

C)A competitive advantage

D)A sustainably business edge

Answer: C

Q3) Machine-to-machine technology uses ________ embedded in products to share reliable real-time data via radio signals.

Answer: sensors

3

To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Information Systems, IT Architecture, Data

Governance, and Cloud Computing

Available Study Resources on Quizplus for this Chatper

168 Verified Questions

168 Flashcards

Source URL: https://quizplus.com/quiz/39885

Sample Questions

Q1) One of the federal regulations that require data governance is ______________.

Answer: Possible answers: Sarbanes-Oxley Act,Basel III,the Computer Fraud and Abuse Act (CFAA),the USA PATRIOT Act,or the Health Insurance Portability and Accountability Act (HIPAA)

Q2) The enterprise architecture (EA)needs to start with ________.

A)Databases and data warehouse capabilities.

B)Current business processes.

C)The organization's strategic direction.

D)The IT budget.

Answer: C

Q3) One way for larger companies to effectively manage information across an organization is to require each division or business unit to implement and manage its own IS because unit managers understand their information needs better than people in other parts of the organization.

A)True

B)False

Answer: False

Q4) Compared to transactional data,master data are quite________ because they change infrequently.

Answer: stable

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Data Management, Business Intelligence, and Data Analytics

Available Study Resources on Quizplus for this Chatper

123 Verified Questions

123 Flashcards

Source URL: https://quizplus.com/quiz/39886

Sample Questions

Q1) Which of the following is not a consequence of poor quality or dirty data?

A)The company loses sales or customers

B)Information workers are constrained in their jobs

C)Decision makers face too much uncertainty to make intelligent decisions

D)The company faces data ownership problems

Answer: D

Q2) With text analytics,information is extracted out of large quantities of various types of textual information.Which of the following is not one of the steps involved in text analytics described in your text?

A)Exploration of documents for preliminary categorization or identification of common topics

B)Preprocessing of documents to standardize content as much as possible

C)Categorization and modeling of document content using statistical models and business rules

D)Visualization - translating text data to graphic format (e.g.charts,graphs)for effective reporting

Answer: D

Q3) ___________ and judgment are needed to interpret the output of data analytics.

Answer: Human expertise

Page 5

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Networks, Collaborative Technology, and the Internet of Things

Available Study Resources on Quizplus for this Chatper

135 Verified Questions

135 Flashcards

Source URL: https://quizplus.com/quiz/39887

Sample Questions

Q1) VPNs consist of encryption software and hardware that encrypt,send,and decrypt network transmissions.

A)True

B)False

Q2) The type of switching that breaks signals up into small blocks,sends them over the Internet,and then reassembles them at the destination is called __________ switching.

Q3) To insure QoS of a network,an alternative to "prioritizing traffic" is to __________,which means holding back traffic from non-time sensitive apps so that apps like voice and video run more effectively.

A)Throttle traffic

B)Block traffic

C)Re-direct traffic

D)Filter traffic

Q4) Bandwidth is the capacity or throughput per ________ of a network.

Q5) One strategy for regulating network use is to ___________ traffic which means data and apps that are time-delay sensitive are given priority on the network

Page 6

Q6) List and explain the four factors to consider when evaluating a mobile network?

Q7) ___________ and LTE are two different standards used on 4G cellular networks.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Cybersecurity and Risk Management Technology

Available Study Resources on Quizplus for this Chatper

148 Verified Questions

148 Flashcards

Source URL: https://quizplus.com/quiz/39888

Sample Questions

Q1) Exploits are gaps,holes,weaknesses,or flaws in corporate networks,IT security defenses,user training,policy enforcement,data storage,software,operating systems,apps,or mobile devices that expose an organization to intrusions or other attacks.

A)True

B)False

Q2) In Cybersecurity terminology,a risk is defined as ________:

A)A weakness that threatens the confidentiality,integrity,or availability of data.

B)Something or someone that can damage,disrupt,or destroy an asset.

C)Estimated cost,loss,or damage that can result from an exploit.

D)The probability of a threat exploiting a vulnerability and the resulting cost.

Q3) Malware infected computers can be organized into networks called ________.

Q4) Hardware and software security defenses are important because they protect against irresponsible business practices.

A)True

B)False

Q5) __________ controls can verify a user's identity,which creates the problem of privacy invasion.

Q6) Explain internal fraud.Describe the most effective approach to preventing it.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Search, Semantic, and Recommendation Technology

Available Study Resources on Quizplus for this Chatper

122 Verified Questions

122 Flashcards

Source URL: https://quizplus.com/quiz/39889

Sample Questions

Q1) The most popular commercial search engines,Google and Bing,are based on ________ technology.

A)crawler

B)directory

C)meta-search

D)semantic

Q2) The semantic Web is one in which computers can interpret the meaning of content by using ________.

A)Data integration

B)Information retrieval

C)Metadata tags

D)Numerical information

Q3) ________ tools are used by employees to search for and retrieve information related to their work in a manner that complies with the organization's information-sharing and access control policies.

Q4) ________ search tools attempt to extract words from questions such as "How many countries are there in Europe?"

Q5) Low ________and long dwell times on a Web site correlate with high content quality.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Web 20 and Social Technology

Available Study Resources on Quizplus for this Chatper

111 Verified Questions

111 Flashcards

Source URL: https://quizplus.com/quiz/39890

Sample Questions

Q1) ________ is a social mention metric that measures the range of people discussing a particular topic

Q2) Diigo and Delicious are ________ tools.

A)Social bookmarking

B)Research

C)Discussion group

D)synchronous communication

Q3) Companies have created online communities for the purpose of identifying market opportunities through crowdsourcing.

A)True

B)False

Q4) ________ is a social mention metric that measures the tone of the conversation,which helps you understand if people are feeling positive,negative or neutral about the topic

Q5) All of the following are considered AJAX technologies for Web 2.0 except __________.

A)HTML

B)SDK

C)CSS

D)XML

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Retail, e-Commerce, and Mobile Commerce Technology

Available Study Resources on Quizplus for this Chatper

145 Verified Questions

145 Flashcards

Source URL: https://quizplus.com/quiz/39891

Sample Questions

Q1) Using Google Wallet,consumers can pay for goods in stores.At check out,mobile users simply pass or tap their phone on a merchant terminal and payment is transferred.Users receive an SMS text message confirmation.The Google Wallet and similar payment systems are based on ________ technology.

A)Bar code

B)QR code

C)Augmented reality

D)NFC

Q2) ________ exchanges are many-to-many e-marketplaces for indirect materials,such as office supplies,light bulbs,and cleaning materials used by any industry.

Q3) While many retailers are frustrated by the phenomenon of shoppers using smartphones to comparison shop in their stores,Macy's "Backstage Pass Program" actually encourages users to access product information and promotional videos using SMS and ________.

Q4) Two major B2B models are ________.

A)Auctions and social commerce

B)Catalogs and vertical markets

C)Sell-side marketplaces and e-sourcing

D)Outsourcing and horizontal markets

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Functional Business Systems

Available Study Resources on Quizplus for this Chatper

151 Verified Questions

151 Flashcards

Source URL: https://quizplus.com/quiz/182629

Sample Questions

Q1) Each level of management has its own data needs,decision making responsibilities,and time horizons.

A)True

B)False

Q2) Synchronizing inbound and outbound flows of materials or goods is an example of:________.

A)HR

B)Online transaction processing

C)Data accuracy

D)Logistics management

Q3) Data integrity with real-time systems involves the ACID test,which involves

A)Atomicity,communication,integrity,and data

B)Atomicity,consistency,isolation,and durability

C)Authenticity,currency,information,and design

D)Accuracy,clarity,information,and data

Q4) ________ data may be collected by sensors or RFID systems and interpreted in real time,or they can be stored in a database for future analysis.

Q5) __________ is a language for the electronic communication of business data.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Enterprise Systems

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/39893

Sample Questions

Q1) Why are ERP systems worth their cost? That is,how do companies justify ERP investments?

Q2) Intangible CRM benefits are measured using ROI or net present value (NPV).

A)True

B)False

Q3) A formal business plan must be in place before the CRM project begins.The plan must quantify the expected costs,tangible financial benefits,and intangible strategic benefits,and risks.

A)True

B)False

Q4) ________ customizes or adds features to a vendor's software or equipment and resells the enhanced product.

Q5) Enterprise social technology had made it easier for employees to connect and collaborate with others,stay informed,build relationships,and share documents and data A)True

B)False

Q6) Supply chains involve the flow of materials,data,and money.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Data Visualization and Geographic Information Systems

Available Study Resources on Quizplus for this Chatper

92 Verified Questions

92 Flashcards

Source URL: https://quizplus.com/quiz/39894

Sample Questions

Q1) With enterprise mashups and traditional BI,data sources have to be identified and some understanding of data requirements and data models is needed.

A)True

B)False

Q2) IBM's Watson Discovery Service is intended to decrease the amount of time analysts have to spend organizing and ________ data.

A)cleaning

B)querying

C)entering

D)mapping

Q3) With powerful data visualization tools,human expertise is generally not needed.

A)True

B)False

Q4) A disadvantage of dashboards is that users need to log into multiple applications to see how the business is performing.

A)True

B)False

Q5) Explain three benefits of data mashup technology to an enterprise.

Q6) Describe the functions and business value of GIS and geocoding.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: IT Strategy, Sourcing, and Strategic Technology Trends

Available Study Resources on Quizplus for this Chatper

130 Verified Questions

130 Flashcards

Source URL: https://quizplus.com/quiz/39895

Sample Questions

Q1) The balanced scorecard (BSC)is a strategic measurement and management methodology and a tool.

A)True

B)False

Q2) The SLA must be managed because it serves as both the blueprint and warranty for the outsourced arrangement.

A)True

B)False

Q3) The risk of opportunistic __________ occurs when a client enters into a long-term contract with a vendor,but the vendor changes financial terms at some point or over-charges for unanticipated enhancements.

Q4) Operational value drivers are medium-term factors that minimize the cost of capital incurred by the company to finance operations.

A)True

B)False

Q5) Cloud services-also referred to as ________ services-have to integrate back to core internal systems.

Q6) IT strategy needs to keep pace with ________.

Q7) ________ is the ability to get data into and out of the cloud service.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Systems Development and Project Management

Available Study Resources on Quizplus for this Chatper

112 Verified Questions

112 Flashcards

Source URL: https://quizplus.com/quiz/39896

Sample Questions

Q1) Enterprises face the challenge of deciding which investments to make and how to allocate scarce resources to competing projects.Typically,a senior manager composes a(n)________ that outlines the justification for the start-up and funding of a project.

A)Project portfolio

B)Business case

C)ROI analysis

D)Business impact statement

Q2) ________ is a presentation or document that outlines the justification for the start-up and funding of a project.

Q3) Postproject reviews,or postmortems,identify the reasons the project was successful or not,strengths and weaknesses of the project plan,how problems were detected and resolved,and how the project was successful in spite of them.

A)True

B)False

Q4) Not using a best practices project management approach is the biggest IT project mistake a business can make.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: IT Ethics, Privacy and Sustainability

Available Study Resources on Quizplus for this Chatper

66 Verified Questions

66 Flashcards

Source URL: https://quizplus.com/quiz/39897

Sample Questions

Q1) Accenture's Technology Vision 2017 analysis emphasized that a(n)________ approach to technology will allow organizations to improve performance.

A)data-centric

B)intelligent automation

C)people first

D)information architecture

Q2) Accenture's Technology Vision 2017 analysis recognized an organizational trend used by leading companies to replace traditional hierarchies with _____________.

A)flattened hierarchies

B)talent marketplaces

C)social media platforms

D)digital ecosystems

Q3) Privacy means we have freedom of choice and control over our personal information,including what we do not want shared with or used by others

A)True

B)False

Q4) Discuss two technologies that illustrate the trend toward a people first approach to technology.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.