1. Which of the following statements is true about a public cloud?
It gives the organization a high degree of customizability over their data and applications.
It can be used by any interested party on a pay-per-use basis.
It is internal to an organization.
It does not free an organization from the issues associated with managing the cloud infrastructure.
It gives the organization a high degree of control over their data and applications.
2. Within the context of international business strategies, companies pursuing a(n) ________ strategy attempt to achieve economies of scale by producing identical products in large quantities for a variety of different markets.
global
international
export
multidomestic
home-replication
3. Which of the following is an implication for firms that have a threat of new entrants in their market?
increased cost
reduced quality
increased demand for services
increased price
decreased market share
4. ImmuneEarth, a research and development company, has a motto to "eradicate all diseases." It has numerous departments that research the cure of various diseases. One of its largest departments includes the AIDS department where more than 500 scientists are researching the cure for AIDS. ImmuneEarth has numerous computers that have been grouped into a cohesive system for this purpose. Recently, one of its computers was updated because it had low performance which had slowed the entire system. Which of the following is ImmuneEarth using to research the cure for AIDS?
grid computing
green computing
trusted computing
edge computing
IP convergence
5. Wikipedia is a free, Web-based, collaborative, multilingual encyclopedia project supported by the non-profit Wikimedia Foundation. Its 17 million articles have been written collaboratively by volunteers around the world, and almost all of its articles can be edited by anyone with access to the site. This allows people to participate and create something of value for everyone. Wikipedia is pursuing a(n) ________ approach to applying freeconomics.
gift economy
zero marginal cost
labor exchange
cross subsidies
freemium
6. Data centers managed by a third party that rents out space to multiple organizational customers are known as ________.
collocation facilities
multi-bay stations
serial port facilities
data ease facilities
datahub stations
7. Operating systems are often written in ________, a very low level computer programming language that allows the computer to operate quickly and efficiently.
structured query language
hyper text markup language
assembly language
extensible markup language
practical extraction and report language
8. Which of the following is used to describe the issues and standards of conduct as they pertain to the use of information systems?
virtual ethics
social informatics
cyber security
cloud computing
computer ethics
9. Knowledge workers are professionals who ________.
use knowledge to perform their jobs, but do not create knowledge
create, modify, and/or synthesize knowledge as a fundamental part of their jobs
lack the ability to solve non-routine problems at work
modify knowledge created by others, but do not create knowledge themselves
work in a monotonous workplace and lack innovation
10. ________ are private, third-party-managed WANs typically used for B2B communications.
Value-added networks
Enterprise networks
Global networks
Local area networks
Personal area networks
11. Organizations use the IS function and technology as the lever for simultaneously shrinking the organization by reducing personnel head count and making the organization more productive (i.e., doing more with less). Identify the term which defines this activity carried out within an organization.
offshoring
downsizing
outsourcing
liquidating
networking
12. With respect to the five general classes of computers, a ________ is typically used for scientific research.
mainframe
workstation
supercomputer
microcomputer
server
13. Which of the following statements is true of a bus network topology?
A bus network is configured in the shape of a closed loop or circle with each node connecting to the next node.
In a bus network, messages move in one direction around a circle.
A bus network topology enables all network nodes to receive the same message through the network cable at the same time.
The configuration of bus networks facilitates easy diagnosis and isolation of network faults.
In a bus network, all nodes or workstations are connected to a central hub through which all messages pass.
14. Which of the following statements is true about firms pursuing a home-replication strategy?
They attempt to achieve economies of scale by producing identical products in large quantities for a variety of different markets.
They view their home operations as secondary to international operations thus providing a minor role to information systems in facilitating this strategy.
They focus on their domestic customers' needs and wants and merely export their products to generate additional sales.
They have a need to create integrated networks between the home office and the multiple local subsidiaries.
They leverage the flexibility offered by a decentralized organization while at the same time reaping economies of scale enjoyed by centralization.
15. A ________ allows you to use Ethernet connections to connect to broadband modems, home networks, or work networks.
transceiver
multiport repeater
cable router
network interface card
modular connector
16. The protocol used by the Internet is called the ________.
Transmission Control Protocol (TCP)
Dynamic Host Configuration Protocol (DHCP)
Address Resolution Protocol (ARP)
Trivial File Transfer Protocol (TFTP)
TOC protocol
17. Which of the following core competencies is part of an IS personnel's business knowledge and skills?
cloud computing
technological communication and presentation
systems development life cycle
integrating subsystems and systems
virtualization
18. In 1994, a company called ________ released the first mainstream Web browser thereby opening up the possibilities of the Internet for the general public.
Netscape
Microsoft
Oracle
Google
Mozilla
19. ________ is located on the motherboard and is used to store the data and programs currently in use.
Primary storage
A cache
A flash drive
A smart card
A port
20. Which of the following functions do scripting languages perform?
creating Web pages that load quickly compared to HTML-developed Web pages
developing applications in high-speed arcade graphics
checking the accuracy of user-entered information on Web pages
automating or supporting activities throughout the information systems development process
laying out or formatting Web pages
21. The ________ business strategy allows companies to leverage the flexibility offered by a decentralized organization while at the same time reaping economies of scale enjoyed by centralization.
international
global
multidomestic
transnational
home-replication
22. ________ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard.
Adware
Malware
Stealware
Hardware
Spyware
23. Which of the following statements reflects the difference between Java and JavaScript most accurately?
Java can be used across multiple platforms and operating systems, while JavaScript cannot be used similarly.
JavaScript is used to check accuracy of user-entered information, which Java does not support.
Java is used to supply interactive components to Web pages, while JavaScript is not.
JavaScript can be used as a useful component tool for creating Web pages, while Java is used to create word files.
Java allows users to create or add applets that lend dynamic content to Web pages, while JavaScript does not.
24. A(n) ________ provides a hardware interface, such as plugs and sockets, for connecting to computers.
input device
primary storage device
removable storage device
motherboard
port
25. With respect to the types of information systems used in organizations, a word processor is an example of a(n) ________ system.
electronic commerce
supply chain management
office automation
geographic information
data mining and virtualization
26. The operating system of a computer is an example of ________ software.
systems
open source
transitory
peripheral
application
27. The ________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides users with a simple, consistent interface to access a wide variety of information.
private branch exchange
World Wide Web
point to point protocol
Media Access Control Address
parameter random access memory
28. Which of the following can be cited as an example of a supply chain management system?
procurement planning
market analysis
knowledge portal
sales force automation
product demand forecasting system
29. Which of the following is the highest-ranking IS personnel responsible for strategic planning and IS use throughout a firm?
chief information officer
IS security manager
IS auditor
Webmaster
IS manager
30. According to the OSI model, which of the following layers defines the protocols for structuring messages?
physical
session
transport
data link
network
31. Information systems at the ________ level are designed to automate repetitive activities, such as sales transaction processing, and to improve the efficiency of business processes and the customer interface.
tactical
executive
strategic
managerial
operational
32. Connecting host computers and their networks together to form even larger networks is called ________.
data mining
internetworking
ethernet framing
network simulation
queuing
33. With respect to the types of information systems used in organizations, a product demand forecasting system is an example of a(n) ________ system.
visualization
geographic information
decision support
social software
electronic commerce
34. In an e-business innovation cycle, after an organization scans the environment for new emerging and enabling technologies, the next step is to ________.
create jobs, groups, and processes that are all devoted to scanning the environment
select the database and data storage advances
address the current opportunity to grab customers and market share
match the most promising new technologies with current economic opportunities
assess the value of the use of technology for customers and internal clients
35. Within the context of international business strategies, a global strategy is associated with ________.
low degree of global integration and high degree of local responsiveness
low degree of global integration and lack of local responsiveness
high degree of global integration and high degree of local responsiveness
low degree of global integration and low degree of local responsiveness
high degree of global integration and low degree of local responsiveness
36. Which of the following is a cultural challenge of operating in the digital world?
conducting videoconferences across different time zones
aging populations in the United States and Western Europe
differences in power distance and uncertainty avoidance
availability of labor force and salary differences
differences in academic degrees and measurement units
37. Jane Estroisch works as a manager in a multidomestic firm. She focuses on the long-term questions facing the organization such as which countries to compete in and what organizational policies to follow. Jane is in the ________ level of the organization.
operational
tactical
executive
functional
managerial
38. The ability to independently learn new technologies as they emerge and assess their impact on your work and life is called ________.
computer networking
computer adaptation
computer fluency
computer compatibility
computer assembling
39. Which of the following statements is true about knowledge?
It has no meaning in and of itself.
It is raw materialrecorded, unformatted words and numbers.
It is the ability to understand information.
It assists in converting information into raw data.
It has little value in comparison with raw data.
40. Which of the following is an example of a visual programming language?
Visual Basic.NET
XML
HTML
Microsoft.NET
CSS
41. Which of the following statements accurately reflects a difference between compilers and interpreters?
Interpreters translate assembly language to machine language, while compilers translate machine language to assembly language.
Compilers convert a program's entire source code into an executable, while interpreters translate source code on the fly, i.e., one statement at a time.
Compiled programs run much slower than interpreted programs.
Compiling programs is a slower process and errors are often not prompted whereas with interpreters, the translation and error-correction happens concurrently.
Compared to interpreters, it is easier to quickly evaluate the effects of any changes made to a program's source code when using a compiler.
42. At the ________ level of an organization, managers focus on long-term strategic questions facing the organization, such as which products to produce, which countries to compete in, and what organizational strategy to follow.
managerial
tactical
operational
executive
illusory
43. Financial, operations, and human resource management is an example of a(n) ________ system, with respect to the types of information systems used in organizations.
social software
data mining and visualization
geographic information
enterprise resource planning
electronic commerce
44. Which of the following core competencies are part of an IS personnel's technical knowledge and skills?
systems analysis and design
integrating subsystems and systems
interpersonal skills and group dynamics
network operating systems
technological communication and presentation
45. Which of the following is a geoeconomic challenge of operating in the digital world?
differences in network infrastructures
differences in the concept of time and life focus
differences in measurement units
differences in export and import regulations
differences in languages
46. Which of the following statements is true about the companies operating in the online world and a customer's online privacy?
The vendor cannot track the Web pages a customer looks at.
The vendor cannot track what products a customer examines in detail.
The vendor is not capable of knowing the method of payment a customer chooses to use.
The vendor is not required by law to respect a customer's privacy.
The vendor cannot know where a customer is having the product delivered.
47. A ________ is any computer on the network, or any software application that uses only the services provided by the server.
peer
client
host
console
port
48. Which of the following is a difference between a server and a workstation?
A workstation has fast network connectivity in comparison with a server.
A workstation is used primarily as the main, central computing system for major corporations.
A workstation has high reliability in comparison with a server.
A workstation has more memory and more disk storage in comparison with a server.
A workstation is typically used by one user at a time.
49. A ________ is a software application that can be used to locate and display Web pages, including text, graphics, and multimedia content.
Webcam
keylogger
proxy server
Web browser
Webmaster
50. TransCorp is a medium-sized IT firm that is looking to outsource its payroll processes. Which of the following statements, if true, would most strengthen the decision to outsource?
Companies in other countries can do the same amount of work at a comparable cost.
Outsourcing has become a trend among most firms in developed nations.
Companies in other countries are more efficient in all aspects of work, along with lower cost.
Firms across the globe are adopting cloud computing systems.
The firm is enjoying good profit margins.