1. ______ are self-contained, self-describing business and consumer modular applications, delivered over the Internet, that users can select and combine through almost any device, ranging from personal computers to mobile phones. a) XML b) Web Services c) Object Services d) Information Services e) HTML
2. The most traditional model of client server computing uses the ______ to act as a database server providing data for analysis done by the PC clients using spreadsheets, database management systems, and application software. a) personal computer b) mainframe c) mini computer d) super computer e) micro computer
3. The ______ part of the supply chain includes the activities of a manufacturing company with its first-tier suppliers (which can be manufacturers and/or assemblers) and their connection to their second-tier suppliers. a) downstream b) midstream c) upstream d) internal e) none of the above
4. The part of the supply chain which is mainly concerned with production management, manufacturing, and inventory control is: a) downstream. b) midstream. c) upstream. d) internal. e) cross stream.
5. ______ is the high-level map or plan of the information requirements of an organization, which is used to guide current operations and plan future ones. a) Information infrastructure b) Conceptual data model c) Logical data model d) Information technology architecture e) Tele-Info architecture
6. ______ includes the system hardware, development software, networks and communications facilities, databases, and information systems personnel. a) Physical data model b) Information infrastructure c) Systems architecture d) Information architecture e) Logical data model
7. A ______ handles the day-to-day, routine, repetitive tasks that are essential to the operation of the organization. Activities supported include the monitoring, collection, storage, processing and dissemination of the organization’s basic business transactions. a. transaction processing system b. management information system c. knowledge management system d. office automation system
8. ____ was the dominant computing architecture until the mid-1980s. Very few organizations use this type of architecture exclusively today due to its inflexibility and poor price-to-performance ratio. a) Mainframe computing environment b) PC computing environment c) Client/Server computing environment d) Distributed computing environment e) Network
9. In a ____computing environment, processing work is divided between two or more computers. The participating computers can be all mainframes, all PCs, or as in most cases, a combination of the two types. They can be in one location or in several. a) Mainframe b) PC c) Hybrid D) Distributed e) Network
10. Technically, what distinguishes the Internet is its use of a set of protocols called: a) TCP/IP. b) MCP/IR. c) PCP/IP. d) TKP/IR. e) TCP/ITP.
11. The purpose of the ______ architecture is to maximize the use of computer resources. It provides a way for different computing devices to work together, each doing the job for which it is best suited. a) mainframe computing b) client/server computing c) PC computing d) centralized computing e) network computing
12. A well-known grid-computing project is the ______ project. In this project, PC users worldwide donate unused processor cycles to help the search for signs of extraterrestrial life by analyzing signals coming from outer space. a) BETI project b) RETI project c) SETI @ Home project d) CETI @ Home project e) JETI project
13. ______ architecture is the basis of file sharing over the Web and the basis on which companies such as Napster, Kazaa, and Gnutella operate. a) Mainframe computing b) P2P c) B2B d) P2C e) G2G
14. A ______ provides periodic information about such topics as operational efficiency, effectiveness and productivity by extracting information from databases and processing it according to the needs of the user. a. transaction processing system b. management information system c. executive information system d. office automation system e. management system
15. Which of the following is the most accurate definition of an extranet? a. It allows remote users to securely connect over the Internet or via private networks to the enterprise’s main intranet. b. It allows remote users to securely connect over the Internet to the enterprise’s main intranet. c. It allows remote users to securely connect via private networks to the enterprise’s main intranet. d. It allows remote users to connect via private networks to the enterprise’s main intranet. e) It allows remote users to securely connect via private networks to the Internet.
16. Which of the following statements about Legacy systems is NOT true? a. Legacy systems are usually transaction processing systems. b. Legacy systems are usually housed in a secure location. c. Legacy systems are usually pure mainframe systems or distributed systems in which the mainframe plays the major role. d. Interfacing newer systems with legacy systems is so complicated that it is entirely avoided during systems integration efforts. e) Legacy Systems are those with which a company has great affinity.
17. The function of corporate portals is often described as “______,” since they support decisions central to particular goals of the enterprise. a) casting b) broadcasting c) corecasting d) webcasting e) webtransmit
18. Which of the following statements is NOT true about the changing role and structure of the IS department (ISD)? a) The role of ISD is changing from purely technical to more managerial and strategic. b) The ISD is creating business alliances with vendors and IS departments in other organizations. c) The ISD is educating the IS staff about business and educating non-IS managers about information technology (IT). d) The ISD is becoming more centralized for better coordination and control. e) The ISD is in control.
19. Which of the following statements is NOT true about the utility computing concept? a) The vision behind utility computing is to have computing resources flow like electricity from virtual utilities around the globe. b) Preparing for this era of utility computing, IBM is moving aggressively into the application services provider area. c) Some experts believe that all software will become a service and be sold as a utility one day. d) The utility computing concept works equally well for all types of applications. e) Distributed computing concept is best.
20. Which of the following statements is MOST true about the utility computing concept? a) A major commercial application of grid computing is Sony’s attempt to link online thousands of Sony video-game consoles. b) A well-known grid computing project is the SETI @ Home project. c) The grid does the computing very efficiently but at a higher cost. d) According to this concept, unused processing cycles of all computers in a given network can be harnessed to create powerful computing capabilities. e) The grid does the computing less efficiently but at a lower cost.
21. The ______ describes organizational plans, visions, objectives and problems, and the information required to support them. a) business architecture b) client/server architecture c) information infrastructure d) service-oriented architecture e) none of the above
22. A ______ supports the monitoring, collection, storage, processing, and dissemination of the organization’s basic business transactions. a) transaction processing system (TPS) b) web based system (WBS) c) enterprisewide information system (EIS) d) decision support system e) none of the above
23. ______ architecture is a special client/server architecture that provides some additional new and useful functionalities. a) Mainframe b) Legacy c) Distributed d) Peer-to-peer e) Client/server
24. A ______ is a computer such as a PC attached to a network, which is used to access shared network resources. A ______ is a machine that is attached to this same network and provides services. a) client, client b) client, server c) server, client d) server, server e) all of the above
25. ______ connect several intranets via the Internet, by adding to the Internet a security mechanism and possibly some functionalities. a) Extranets b) Intranets c) Internets d) ISP e) ASP
26. FedEx’s business model supports ______ hour delivery to anywhere in the world. a) 9 – 18 b) 12 – 24 c) 24 – 48 d) 48 – 96 e) 97-110
27. ____ is a computer program designed to support a specific task or business process (such as execute the payroll). a) Application Program b) Data Items c) Information d) Database e) Data warehouse
28. ____ consists of stored data items organized for retrieval. a) Data Base b) Information c) Data Item d) Knowledge e) Software
29. ____ are data that have been organized so that they have meaning and value to the recipient. a) Data items b) Information c) Knowledge d) Network e) Internet
30. ____ consists of data and/or information that have been organized and processed to convey understanding. a) Knowledge b) Data Items c) Network d) Internet e) Binary
31. Information systems that connect two or more organizations are called: a) IOSs. b) EIS . c) TPS. d) DDS. e) ICP.
32. Information systems that serve several departments or the entire enterprise are called: a) IOSs. b) TPS. c) DDS. d) EIS. e) ESS.
33. The first type of IT system that was developed in the 1980’s to improve communications with business partners was: a) IOS’s. b) EIS. c) TPS. d) EDI. e) ESS.
34. ____ supports the monitoring, collection, storage, processing, and dissemination of the organizations basic business transactions. a) TPS b) EIS c) EDI d) DDS e) ESS
35. ____ deal with day-to-day operations of an organization. a) Operational activities b) Managerial activities c) Decisional Activities d) Organizational Activities e) Decision Systems