Top Banner
MIS Essentials, 2e (Kroenke) Chapter 7: Business Process Management Multiple Choice 1) ________ occur(s) when data are isolated in separated information systems. A) Walled garden B) Information silos C) Scheduling D) System integration Answer: B Page Ref: 156 Difficulty: Easy AACSB: Use of IT Study Question: Study Question 1 2) Which of the following is true for personal information systems? A) Personal information systems that support a particular department are sometimes called departmental information systems. B) Because one is the sole user of the new system, if new procedures are required, one needs professional help to get the job done. C) Such systems have only one user and hence procedures need not be documented or formalized in any way. D) The solutions to problems in a personal information system usually involve more than one department. Answer: C Page Ref: 156 Difficulty: Easy AACSB: Use of IT Study Question: Study Question 1 3) Which of the following is an example of a personal information system? A) scheduling of groundskeeping B) contact manager C) charging of membership fees D) ordering of restaurant supplies from suppliers 1 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
107
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Exam 3

MIS Essentials, 2e (Kroenke) Chapter 7: Business Process Management

Multiple Choice

1) ________ occur(s) when data are isolated in separated information systems.A) Walled gardenB) Information silosC) SchedulingD) System integrationAnswer: BPage Ref: 156Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2) Which of the following is true for personal information systems?A) Personal information systems that support a particular department are sometimes called departmental information systems.B) Because one is the sole user of the new system, if new procedures are required, one needs professional help to get the job done.C) Such systems have only one user and hence procedures need not be documented or formalized in any way.D) The solutions to problems in a personal information system usually involve more than one department.Answer: CPage Ref: 156Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

3) Which of the following is an example of a personal information system?A) scheduling of groundskeepingB) contact managerC) charging of membership feesD) ordering of restaurant supplies from suppliersAnswer: BPage Ref: 156Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

1Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 2: Exam 3

4) Which of the following statements of enterprise information systems is true?A) Its users do not require any formal training.B) It leads to data duplication among employees.C) It supports 100 to 1000 users.D) It is easy to manage change to enterprise information systems.Answer: CPage Ref: 156Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

5) Which of the following is true for workgroup information systems?A) Workgroup information systems that support a particular department are sometimes called functional information systems.B) Workgroup information systems that support a particular business function are called departmental information systems.C) Workgroup information systems include categories of procedures, and users are defined according to levels of expertise with the system as well as by levels of security authorization.D) Typically workgroup systems support 10 to 100 users.Answer: DPage Ref: 157Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 1

6) Which of the following is an example of a workgroup information system?A) charging of membership feesB) contact managerC) accounts payable systemD) ordering of restaurant supplies from suppliersAnswer: CPage Ref: 157Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

7) A Web store front is an example of a(n) ________.A) interenterprise information systemB) collaborative information system C) functional information systemD) departmental information systemAnswer: CPage Ref: 157Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 3: Exam 3

8) Which of the following stands true for enterprise information systems?A) Enterprise information systems are information systems that are shared by two or more independent organizations.B) The solutions to problems in an enterprise system usually involve more than one department. C) Typically enterprise information systems support 10 to 100 users.D) Enterprise information systems that support a particular business function are called functional information systems.Answer: BPage Ref: 157Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

9) ________ are information systems that are shared by two or more independent organizations.A) Interenterprise information systemsB) Workgroup information systemsC) Enterprise information systemsD) Personal information systemsAnswer: APage Ref: 158Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

10) ________ is an example of an interenterprise information system.A) Scheduling of groundskeepingB) Contact managerC) Ordering of restaurant supplies from suppliersD) Charging of membership fees Answer: CPage Ref: 158Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

11) Information silos arise as a result of ________.A) the individual users of personal information systemsB) interenterprise information system's involvement to find solutions to problems arising within two or more enterprisesC) an organization's plan to create themD) an organization's growth and increasing use of information systemsAnswer: DPage Ref: 158Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

3Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 4: Exam 3

12) An information silo is also known as a(n) ________.A) walled gardenB) island of automationC) business process modeling notationD) metadataAnswer: BPage Ref: 159Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

13) Which of the following applications falls under the common departmental information system of sales and marketing?A) order trackingB) general ledgerC) lead generationD) assessmentAnswer: CPage Ref: 160Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

14) As a common departmental information system, ________ includes order management.A) accountingB) operationsC) human resourcesD) manufacturingAnswer: BPage Ref: 160Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

15) Planning and scheduling are applications that fall under ________.A) manufacturingB) salesC) accountingD) customer serviceAnswer: APage Ref: 160Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

4Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 5: Exam 3

16) Order tracking and account tracking are applications of ________.A) operationsB) manufacturingC) marketingD) customer serviceAnswer: DPage Ref: 160Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

17) ________ is an application of the human resources department.A) CompensationB) PlanningC) Financial reportingD) Lead trackingAnswer: APage Ref: 160Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

18) The summation of all the problems of information silos leads to ________.A) diseconomies of scopeB) increased costs for the organizationC) diminishing marginal returnsD) reduced organizational innovationAnswer: BPage Ref: 161Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

19) Which of the following is a consequence of isolated information systems?A) Data cannot get duplicated.B) Business processes are coherent and efficient.C) Decision are made is union with other systems.D) There is a lack of integrated enterprise information.Answer: DPage Ref: 162Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

5Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 6: Exam 3

20) ________ is the activity of altering and designing business processes to take advantage of new information systems.A) Business process managementB) Business process reengineeringC) Business process improvementD) Business process interoperabilityAnswer: BPage Ref: 165Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

21) Which of the following is true for business process reengineering?A) Business process reengineering is efficient, fast, and economical.B) Business process reengineering, when combined with ERP, has a 100 percent success rate.C) In the process of business process reengineering, systems analysts need to interview key personnel throughout the organization to determine how best to use the new technology.D) Because of its streamlined process, business process reengineering requires very little time and or expertise.Answer: CPage Ref: 165Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

22) Inherent processes are ________.A) time-consuming business processes and involve substantial investment.B) predesigned procedures for using the software productsC) the activity of altering and designing business processes to take advantage of new information systems.D) preferred by employees because of the ease and structure they bring to functional applications.Answer: BPage Ref: 165Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

23) Which of the following is true for inherent processes?A) Inherent processes are almost always a perfect fit.B) Organizations cannot license the software that is used in various inherent processes. C) Inherent processes are an expensive and time-consuming practise.D) Inherent processes are predesigned procedures for using software products.Answer: DPage Ref: 165Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

6Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 7: Exam 3

24) A customer relationship management system is ________.A) a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer serviceB) a web application that allows businesses to manage customer suggestions and complaints in a structured fashionC) a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platformD) a suite of software applications that integrates existing systems by providing layers of software that connect applications togetherAnswer: APage Ref: 166Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

25) Which of the following sentences is true about customer relationship management system (CRM)?A) CRM is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.B) CRM systems vary in the degree of functionality they provide.C) CRM incorporates accounting, manufacturing, inventory, and human resources applications.D) CRM systems are not for every organization.Answer: BPage Ref: 168Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

26) The first step of the customer life cycle is marketing which involves ________.A) sending messages to the target audience to attract customer prospectsB) attempting to win-back high value customersC) converting prospects into customers who need to be supportedD) increasing the value of existing customersAnswer: APage Ref: 166Difficulty: EasyStudy Question: Study Question 4

27) When prospects become customers who need to be supported, the organization is in the ________ stage of the customer life cycle.A) lossB) marketingC) customer acquisitionD) relationship managementAnswer: CPage Ref: 166Difficulty: EasyStudy Question: Study Question 4

7Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 8: Exam 3

28) Which of the following is a component of relationship management?A) converting prospects into customers who need to be supportedB) increasing the value of existing customers by selling them more productC) losing customers D) sending messages to the target audience to attract customer prospectsAnswer: BPage Ref: 166Difficulty: EasyStudy Question: Study Question 4

29) During which stage of the customer life cycle do win-back processes categorize customers according to value?A) customer acquisitionB) marketingC) relationship managementD) lossAnswer: DPage Ref: 166Difficulty: EasyStudy Question: Study Question 4

30) ________ is the last stage of the customer life cycle.A) MarketingB) Customer acquisitionC) ChurningD) Relationship managementAnswer: CPage Ref: 166Difficulty: EasyStudy Question: Study Question 4

31) Enterprise resource planning is ________.A) a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platformB) a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer serviceC) a suite of software applications that integrates existing systems by providing layers of software that connect applications togetherD) a web application that allows businesses to manage customer suggestions and complaints in a structured fashionAnswer: APage Ref: 168Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

8Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 9: Exam 3

32) Which of the following is true about enterprise resource planning (ERP)?A) ERP is a suite of software applications that integrates existing systems by providing layers of software that connect applications together.B) ERP, though unable to incorporate functions of CRM, includes accounting, manufacturing, inventory, and human resources applications.C) The layers of ERP software enable existing applications to communicate with each other and to share data.D) ERP systems are used to forecast sales and to create manufacturing plans and schedules to meet those forecasts.Answer: DPage Ref: 168Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

33) ________ is the worldwide leader of ERP vendors.A) MicrosoftB) EpicorC) SAPD) SASAnswer: CPage Ref: 168Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

34) ________ is a suite of software applications that integrates existing systems by providing layers of software that connect applications together.A) ERPB) EAIC) CRMD) SAPAnswer: BPage Ref: 169Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

9Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 10: Exam 3

35) Which of the following is a function of EAI?A) It is used to forecast sales and to create manufacturing plans and schedules to meet those forecasts.B) It posts activities in the general ledger and other accounting applications.C) It consolidates business operations into a single, consistent, computing platform.D) It enables a gradual move to ERP.Answer: DPage Ref: 169Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

36) Which of the following statements is true of EAI?A) The process of converting from a current system to an EAI system is a daunting task.B) The layers of EAI software prevent existing applications from communicating with each other.C) EAI makes use of a centralized database.D) EAI leverages existing systems—leaving functional applications as is, but providing an integration layer over the top.Answer: DPage Ref: 169Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

37) When implementing new enterprise systems, the only solution for resolving process issues and providing enterprise process management is ________.A) communicating the need for the change to the employeesB) developing committees and steering groupsC) establishing clear and absolute contractual guidelinesD) reinforcing employees' sense of self-efficacyAnswer: CPage Ref: 170Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

38) ________ is a major task when implementing enterprise systems.A) Process blueprintingB) EncapsulationC) Module developmentD) Gap identificationAnswer: DPage Ref: 170Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

10Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 11: Exam 3

39) Which of the following is true about the challenges of requirements gaps?A) To specify a gap, an organization must know both what it needs and what the new product does.B) The first challenge is to find a licensed enterprise product that is a perfect fit for the organization.C) While identifying the gaps is easy, deciding what to with them is a major challenge. D) While resolving gaps, changing the way an organization adapts to a new application is easier than altering an application to match what the organization does.Answer: APage Ref: 170Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

40) ________ is a person's belief that he or she can be successful at his or her job.A) HopeB) ArroganceC) FaithD) Self-efficacyAnswer: DPage Ref: 170Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

True or False

1) The existence of information silos helps resolve any problems that may arise due to isolated information systems.Answer: FALSEPage Ref: 156Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2) Scheduling of groundskeeping is an example of a personal information system. Answer: FALSEPage Ref: 156Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

11Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 12: Exam 3

3) A workgroup information system is an information system that is shared by a group of people for a particular purpose.Answer: TRUEPage Ref: 157Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

4) Workgroup information systems that support a particular department are sometimes called functional information systems.Answer: FALSEPage Ref: 157Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

5) The accounts payable system that is used by the accounts payable department is an example of departmental information systems.Answer: TRUEPage Ref: 157Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

6) The solutions to problems in an enterprise system usually involve more than one enterprise.Answer: FALSEPage Ref: 157Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

7) Interenterprise information systems are information systems that are shared by two or more independent departments.Answer: FALSEPage Ref: 158Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

8) Information silos arise as a consequence of an organization's growth and increasing use of information systems and do not pose any serious threat.Answer: FALSEPage Ref: 158Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

12Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 13: Exam 3

9) Information silos are not a problem until they begin to share data about the same entities.Answer: TRUEPage Ref: 159Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

10) Information systems for both manufacturing and operations department of an organization will process data related to finished goods and can therefore cause duplication and lead to problems.Answer: TRUEPage Ref: 160Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

11) Contrary to popular belief, isolation of departmental applications cannot be held responsible for disjointed business processes.Answer: FALSEPage Ref: 162Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

12) Information silos can result in increased cost for an organization.Answer: TRUEPage Ref: 162Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

13) One way to fix informational silos is to eliminate data that are duplicated and storing a single copy of the data in a shared database and revise business processes to use that database.Answer: TRUEPage Ref: 162Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

14) When eliminating duplicate data by storing a single copy of data in a shared database, the first step is to alter business processes to use the shared database.Answer: FALSEPage Ref: 162Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

13Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 14: Exam 3

15) When allowing the duplication to go on, each department must be mindful that they are processing a shared resource.Answer: TRUEPage Ref: 163Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

16) Business process management is the activity of altering and designing business processes to take advantage of new information systems.Answer: FALSEPage Ref: 165Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

17) Business process reengineering is efficient and economical.Answer: FALSEPage Ref: 165Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

18) Inherent processes are predesigned procedures for using software products, saving organizations from expensive and time - consuming business process reengineering.Answer: TRUEPage Ref: 165Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

19) An enterprise resource planning system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.Answer: FALSEPage Ref: 165Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

20) The first step of the customer life cycle is marketing.Answer: TRUEPage Ref: 166Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

14Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 15: Exam 3

21) Connecting system “islands” via a new layer of software/system is the function of enterprise application integration.Answer: TRUEPage Ref: 169Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

22) Unlike departmental systems in which a single department manager is in charge, enterprise systems have no clear boss.Answer: TRUEPage Ref: 170Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

23) A lot of organizations today create their own enterprise systems from scratch.Answer: FALSEPage Ref: 170Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

24) Transitioning from one system to a new enterprise system is fairly easy due to the integrated steps involved.Answer: FALSEPage Ref: 171Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

25) One of the reasons why people fear change is because it threatens self-efficacy.Answer: TRUEPage Ref: 171Difficulty: EasyStudy Question: Study Question 5

15Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 16: Exam 3

Essay

1) What are personal information systems?Answer: Personal information systems are information systems used by a single individual. The contact manager in an iPhone or in an email account is an example of a personal information system. Because such systems have only one user, procedures are simple and probably not documented or formalized in any way.

It is easy to manage change to personal information systems. Because there is a sole user of the new system, if new procedures are required, only one person needs to adapt. And, if there are problems, he/ she can solve the problems themselves.Page Ref: 156-157Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2) Explain workgroup information systems.Answer: A workgroup information system is an information system that is shared by a group of people for a particular purpose. For example, the personnel who maintain golf courses, club lawns, and gardens share a workgroup information system for scheduling tasks and employees to accomplish those tasks.

Workgroup information systems that support a particular department are sometimes called departmental information systems. An example is the accounts payable system that is used by the accounts payable department. Other workgroup information systems support a particular business function and are called functional information systems. An example of a functional system is a Web storefront.

Typically workgroup systems support 10 to 100 users. The procedures for using them must be understood by all members of the group. Often, procedures are formalized in documentation, and users are sometimes trained in the use of those procedures. When problems occur, they almost always can be solved within the group.Page Ref: 157Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

16Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 17: Exam 3

3) What are enterprise information systems?Answer: Enterprise information systems are information systems that span an organization and support activities in multiple departments. For example, at a country club resort, the restaurant, the golf courses, the wedding events departments all use the same enterprise information system to record sales.

Enterprise information systems typically have hundreds to thousands of users. Procedures are formalized and extensively documented; users undergo formal procedure training. Sometimes enterprise systems include categories of procedures, and users are defined according to levels of expertise with the system as well as by levels of security authorization.

The solutions to problems in an enterprise system usually involve more than one department. Because enterprise systems span many departments and involve potentially thousands of users, they are very difficult to change. Changes must be carefully planned, cautiously implemented, and users given considerable training. Sometimes users are given incentives and other inducements to motivate them to change.Page Ref: 157-158Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 1

4) Explain interenterprise information systems.Answer: Interenterprise information systems are information systems that are shared by two or more independent organizations. At a club house, for example, the information system that a restaurant uses to order supplies and ingredients from its suppliers is an interorganizational system. Because such systems are used by employees of different organizations, procedures are formalized and user training is mandatory.

Such systems typically involve thousands of users, and solutions to problems require cooperation among different, usually independently owned, organizations. Problems are resolved by meeting, contract, and sometimes by litigation.

Data are often duplicated between organizations, but such duplication is carefully managed. Because of the wide span, complexity, and multiple companies involved, such systems can be exceedingly difficult to change. The interaction of independently owned and operated information systems is required.Page Ref: 158Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 1

17Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 18: Exam 3

5) What are information silos?Answer: Information silos are a condition that exists when data are isolated in separated information systems. Isolated systems are referred to as silos, because when drawn in diagrams they appear as long vertical columns–like grain silos.

Information silos are created over time, as information systems are implemented to support personal and workgroup applications. As organizations grow, however, at some point such silos will duplicate data and become a source of potentially serious problems.Page Ref: 158Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

6) What are common departmental applications?Answer: Common departmental applications are systems created to support a given department's information processing needs. They work fine for those departments. For example, the sales and accounting department of a company handles applications like lead generation and sales forecasting and the manufacturing department of an organization handles applications like inventory, planning, scheduling, etc. However, functional applications duplicate large amounts of data and are likely to cause problems.Page Ref: 159-160Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

18Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 19: Exam 3

7) What problems do information silos cause?Answer: As organizations grow, information silos will eventually duplicate data and become a source of potentially serious problems. First, data are duplicated because each application has its own database. If, for example, accounting and sales/marketing applications are separated, customer data will be duplicated and may become inconsistent. Changes to customer data made in the sales/marketing application may take days or weeks to reach the accounting application's database. During that period, shipments will reach the customer without delay, but invoices will be sent to the wrong address.

Next, when applications are isolated, business processes are disjointed. A consequence of such disjointed systems is the lack of integrated enterprise information. For example, suppose sales and marketing wants to know if XYZ is still a preferred customer. Suppose that determining whether this is so requires a comparison of order history and payment history data. However, with information silos, that data will reside in two different databases and, in one of them, XYZ is known by the name of the company that acquired it. Data integration will be difficult. Making the determination will require manual processes and days, when it should be readily answered in seconds.

This leads to the fourth consequence: inefficiency. When using isolated functional applications, decisions are made in isolation. Without integration, the left hand of the organization doesn't know what the right hand of the organization is doing.Finally, information silos can result in increased cost for the organization. Duplicated data, disjointed systems, limited information, and inefficiencies all mean higher costs.Page Ref: 161-162Difficulty: HardAACSB: Use of ITStudy Question: Study Question 2

8) What are the ways of eliminating duplicate data?Answer: The fundamental problem of information silos is data that are duplicated and stored in isolated systems. The most obvious fix is to eliminate that duplicated data by storing a single copy of data in a shared database and revising business processes (and applications) to use that database. For this, a database should be created. Then each department should alter its business processes (and applications) to use the shared database. Another remedy is to allow the duplication, but to manage it to avoid problems.Page Ref: 162Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

19Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 20: Exam 3

9) What is business process reengineering?Answer: Business process reengineering is the activity of altering and designing business processes to take advantage of new information systems. Unfortunately, business process reengineering is difficult, slow, and exceedingly expensive. Systems analysts need to interview key personnel throughout the organization to determine how best to use the new technology. Because of the complexity involved, such projects require high-level and expensive skills and considerable time. Many early projects stalled when the enormity of the project became apparent. This left some organizations with partially implemented systems that had disastrous consequences. Personnel didn't know if they were using the new system, the old system, or some hacked-up version of both.Page Ref: 165Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

10) What are inherent processes?Answer: Inherent processes are predesigned procedures for using software products. They save organizations from expensive and time-consuming business process reengineering. Organizations could license the software and obtain, as part of the deal, prebuilt procedures. There are three categories of such inherent processes: customer relationship management; enterprise resource planning, and enterprise application integration.Page Ref: 165Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

11) Write a short note on customer relationship management system (CRM).Answer: A customer relationship management system (CRM) is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. Every contact and transaction with the customer is recorded in the CRM database. Vendors of CRM software claim using their products makes the organization customer-centric. Though that term reeks of sales hyperbole, it does indicate the nature and intent of CRM packages.Page Ref: 166Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

20Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 21: Exam 3

12) Explain the four phases of the customer life cycle.Answer: The four phases of the customer life cycle are marketing, customer acquisition, relationship management, and loss/churn. Marketing sends messages to the target market to attract customer prospects. When prospects order, they become customers who need to be supported. Additionally, relationship management processes increase the value of existing customers by selling them more product. Inevitably, over time the organization loses customers. When this occurs, win-back processes categorize customers according to value and attempt to win back high-value customers.Page Ref: 166Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

13) What is ERP?Answer: Enterprise resource planning (ERP) is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. ERP includes the functions of CRM, but also incorporates accounting, manufacturing, inventory, and human resources applications.

ERP systems are used to forecast sales and to create manufacturing plans and schedules to meet those forecasts. Manufacturing schedules include the use of material, equipment, and personnel and thus need to incorporate inventory and human resources applications. Because ERP includes accounting, all of these activities are automatically posted in the general ledger and other accounting applications.Page Ref: 168Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

14) Describe enterprise application integration.Answer: Companies for which enterprise resource planning is inappropriate still have the problems of information silos, however, and some choose to use enterprise application integration (EAI) to solve those problems. EAI is a suite of software applications that integrates existing systems by providing layers of software that connect applications together.

Although there is no centralized EAI database, the EAI software keeps files of metadata that describe where data are located. Users can access the EAI system to find the data they need. In some cases, the EAI system provides services that provide a "virtual integrated database" for the user to process.

The major benefit of EAI is that it enables organizations to use existing applications while eliminating many of the serious problems of isolated systems. Converting to an EAI system is not nearly as disruptive as converting to ERP, and it provides many of the benefits of ERP. Some organizations develop EAI applications as a steppingstone to complete ERP systems.Page Ref: 169Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

21Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 22: Exam 3

15) What cause the challenges that occur while implementing new enterprise systems?Answer: Implementing new enterprise systems is challenging, difficult, expensive, and risky. It is not unusual for enterprise system projects to be well over budget and a year or more late in delivery. The expense and risks arise from four primary factors: collaborative management, requirements gaps, transition problems, and employee resistance.

Unlike departmental systems in which a single department manager is in charge, enterprise systems have no clear boss. Even the discharge process is a collaborative effort among many departments (and customers). Hence, the enterprise should develop committees and steering groups for providing enterprise process management. Although this can be an effective solution, and in fact may be the only solution, the work of such groups is both slow and expensive.

Few organizations today create their own enterprise systems from scratch. Instead, they license an enterprise product that provides specific functions and features and that includes inherent procedures. But, such licensed products are never a perfect fit. Almost always there are gaps between the requirements of the organization and the capabilities of the licensed application. Identifying these gaps and deciding what to do with these gaps can be very challenging.

Transitioning to a new enterprise system is also difficult. The organization must somehow change from using isolated departmental systems to using the new enterprise system, while continuing to run the business. Transitions require careful planning and substantial training. Inevitably, problems will develop. Knowing this will occur, senior management needs to communicate the need for the change to the employees and then stand behind the new system as the kinks are worked out. It is an incredibly stressful time for all involved employees.

People resist change for various reasons. Change requires effort and it engenders fear. Hence, senior-level management needs to communicate the need for the change to the organization and must reiterate that, as necessary, throughout the transition process. To enhance confidence, employees need to be trained and coached on the successful use of the new system. Also, employees may need to be given extra inducement to change to the new system.Implementing new enterprise systems can solve many problems and bring great efficiency and cost savings to an organization, but it is not for the faint of heart.Page Ref: 170-171Difficulty: HardAACSB: Use of ITStudy Question: Study Question 5

MIS Essentials, 2e (Kroenke) Chapter 8: E-Commerce, Web 2.0, and Social Networking

Multiple Choice

1) E-commerce is the buying and selling of goods and services ________.A) over private and public computer networksB) in restricted markets using cyber intermediariesC) using intermediaries such as dealer and agentsD) that cannot be sold via traditional distribution channels

22Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 23: Exam 3

Answer: APage Ref: 184Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2) Which of the following has enabled thin-client applications to have considerable functionality?A) increase in the number of usersB) increase in user-generated contentC) increased capabilities of browsersD) increased communication between client and serverAnswer: CPage Ref: 184Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

3) Which of the following is true of Web 2.0?A) It is a primitive interorganizational information system.B) It is supported by telephones, faxes, and EDIs.C) Its supporting technologies include HTTP and HTML.D) It makes use of user-generated content and is flexible.Answer: DPage Ref: 184Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 1

23Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 24: Exam 3

4) Which of the following was a supporting technology of pre-Internet systems?A) EDIB) SOAC) HTMLD) FlashAnswer: APage Ref: 184Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

5) ________ is the application of Web 2.0 technologies, collaboration systems, social networking, and related technologies to facilitate the cooperative work of intellectual workers in organizations. A) Enterprise architectureB) Enterprise resource planningC) Enterprise 2.0D) Enterprise application integrationAnswer: CPage Ref: 185Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

6) ________ is a key principle of Enterprise 2.0.A) TranscendenceB) DivergenceC) EmergenceD) DependenceAnswer: CPage Ref: 185Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

7) Which of the following is true of Social CRM?A) Relationships between vendors and buyers are predefined.B) Customers control their relationships with the company.C) Organizations offer very few customer touch points.D) Service-oriented architecture has impeded Social CRM.Answer: BPage Ref: 185Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 1

24Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 25: Exam 3

8) What is service-oriented architecture?A) It is the structure of an organization that heavily emphasizes the importance of superior customer service.B) It is a software design methodology related to interorganizational program-to-program communication.C) It is the investment in vendor-customer relationships with the expectation of returns in the marketplace.D) It is a content structure that has emerged from the processing of many user tags.Answer: BPage Ref: 185Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 1

9) The U.S. Census Bureau defines ________ as companies that take title to the goods they sell.A) merchant companiesB) electronic exchangesC) clearinghousesD) auctionsAnswer: APage Ref: 186Difficulty: EasyStudy Question: Study Question 2

10) Nonmerchant companies ________.A) take title to the goods they sellB) sell services that they provideC) include B2C, B2B, and B2G transactionsD) arrange for the purchase and sale of goodsAnswer: DPage Ref: 186Difficulty: ModerateStudy Question: Study Question 2

11) Sales between a supplier and a retail consumer are ________ transactions. A) B2CB) B2BC) B2GD) C2CAnswer: APage Ref: 186Difficulty: EasyStudy Question: Study Question 2

25Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 26: Exam 3

12) Jackson Enterprises sells products online to the state-run Environmental Protection Agency. This is a ________ transaction.A) B2BB) B2CC) B2GD) C2CAnswer: CPage Ref: 186Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

13) Amazon.com, REI.com, and LLBean.com are examples of companies that use ________ information systems.A) B2EB) B2BC) B2GD) B2CAnswer: DPage Ref: 186Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

14) In a typical distribution system, raw material suppliers sell to manufacturers, manufactures sell to distributors, and distributors sell to retailers. All these transactions are categorized as ________ transactions.A) B2CB) B2BC) C2CD) B2EAnswer: BPage Ref: 186Difficulty: ModerateStudy Question: Study Question 2

15) Traditional B2C information systems rely on a(n) ________ that customers use to enter and manage their orders.A) auction forumB) electronic exchangeC) clearinghouseD) Web storefrontAnswer: DPage Ref: 186Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

26Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 27: Exam 3

16) Which of the following nonmerchant e-commerce companies supports a competitive bidding process?A) auctionsB) clearinghousesC) B2C firmsD) mashupsAnswer: APage Ref: 187Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

17) fA) AuctionsB) E-marketsC) CyberstoresD) ClearinghousesAnswer: DPage Ref: 187Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

18) Using e-commerce to buy directly from the manufacturer eliminates the middlemen in the supply chain. Which of the following terms best explains this elimination?A) deliberationB) mashupC) clearinghouseD) disintermediationAnswer: DPage Ref: 187Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

19) ________ measure(s) the amount that demand rises or falls with changes in price. A) Price ceilingsB) Price fixingC) Price per earning ratioD) Price elasticityAnswer: DPage Ref: 187Difficulty: EasyStudy Question: Study Question 2

27Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 28: Exam 3

20) When a business engages in e-commerce, the manufacturer may be able to offer a lower price and still make a profit, which may cause price conflicts with its traditional channel members. The ability of the manufacturer to offer a lower price and still make a profit is largely attributed to ________.A) emergenceB) price elasticityC) disintermediationD) channel conflictAnswer: CPage Ref: 188Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

21) When HP Computers began to sell directly to the public, some retailers resented the competition and stopped carrying HP products in their stores. This is an example of ________.A) reintermediationB) channel conflictC) mashupsD) the bullwhip effectAnswer: BPage Ref: 188Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

22) Which of the following expenses are likely to increase for manufacturers who use e-commerce to sell directly to consumers?A) procurement expensesB) advertising expensesC) production expensesD) customer-service expensesAnswer: DPage Ref: 188Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

23) Web 2.0 companies ________.A) sell software licensesB) offer their software as a productC) provide software as a free serviceD) lock down all the legal rights they canAnswer: CPage Ref: 189Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

28Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 29: Exam 3

24) Web 2.0 applications ________.A) must be installed on users' computersB) are thick clientsC) have infrequent, controlled releasesD) are downloaded as Silverlight codeAnswer: DPage Ref: 189Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

25) Traditional software companies rely on ________ for revenueA) software license feesB) advertising C) interestD) commissionsAnswer: APage Ref: 190Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

26) In the Web 2.0 world, the value of a site increases ________.A) over timeB) exponentiallyC) as the investments in it increaseD) with users and useAnswer: DPage Ref: 190Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

27) In the Web 2.0 world, no marketing is done. New product features are released and vendors wait for users to spread the news to one another, one friend sending a message to many friends; most of whom send that message, in turn, to their friends; and so forth, in a process called ________.A) affiliate marketingB) viral marketingC) co-marketingD) network marketingAnswer: BPage Ref: 190Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

29Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 30: Exam 3

28) On some sites, users can provide customer support to one another, or even participate in the creation of product specifications, designs, and complete products in a process called ________. A) social capitalizationB) mashing upC) crowdsourcingD) electronic exchangingAnswer: CPage Ref: 191Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

29) Traditional sites are about ________; Web 2.0 is about ________. A) publishing; participationB) mash ups; crowdsourcingC) organic experiences; controlled experiencesD) B2C e-commerce; B2B e-commerceAnswer: APage Ref: 191Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

30) When the output from two or more Web sites is combined into a single user experience it is called a(n)________. A) social networkB) mashupC) crowdsourceD) electronic exchangeAnswer: BPage Ref: 191Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

31) Google pioneered Web 2.0 advertising. With its ________ software, vendors pay Google a certain amount for particular search words.A) AdSenseB) AdwareC) AdWordsD) AdCapAnswer: CPage Ref: 192Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

30Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 31: Exam 3

32) A(n) ________ is a structure of individuals and organizations that are related to each other in some way. A) folksonomyB) electronic exchangeC) social networkD) crowdsourceAnswer: CPage Ref: 193Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

33) Karl Marx defined ________ as the investment of resources for future profit. A) capitalB) businessC) equityD) returnsAnswer: APage Ref: 193Difficulty: EasyStudy Question: Study Question 4

34) Which of the following is an example of human capital?A) time and energyB) factories and machinesC) knowledge and skillsD) social relationshipsAnswer: CPage Ref: 193Difficulty: ModerateStudy Question: Study Question 4

35) Being linked to a network of highly regarded contacts is a form of social ________.A) credentialB) consciousnessC) mobilityD) commerceAnswer: APage Ref: 194Difficulty: EasyStudy Question: Study Question 4

31Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 32: Exam 3

36) Which of the following is true about social capital?A) Social capital is the investment in human knowledge and skills for future profit.B) The people you know the least contribute the most connections to your network.C) Social capital can be gained by limiting ones friends but strengthening the relationships with them.D) Strong relationships contribute the most to the growth of social capital.Answer: BPage Ref: 195Difficulty: ModerateStudy Question: Study Question 4

37) A ________ is a content structure that has emerged from the processing of many user tags.A) metalanguageB) mashupC) folksonomyD) bookmarkAnswer: CPage Ref: 198Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

38) Which of the following are the characteristics of Enterprise 2.0, according to McAfee?A) search, links, authoring, tags, extensions, signalsB) speed, LAN, auctions, tags, e-commerce, social capitalC) SOA, LAN, advertising, tags, electronic-exchange, SAASD) UGC, SOA, tags, extensions, signals, social CRMAnswer: APage Ref: 198Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

39) According to McAfee, Enterprise 2.0 workers want applications that enable them to rate tagged content and to use the tags to predict content that will be of interest to them. This refers to which of the following characteristics of Enterprise 2.0?A) search B) authoringC) signalsD) extensionsAnswer: DPage Ref: 198Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

32Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 33: Exam 3

40) In Enterprise 2.0, pushing enterprise content to users based on subscriptions and alerts is part of ________, according to McAfee's Enterprise 2.0 model. A) signalingB) authoringC) taggingD) searchingAnswer: APage Ref: 198Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 5

True or False

1) E-commerce is the buying and selling of goods and services exclusively over public computer networks.Answer: FALSEPage Ref: 184Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2) Merchant companies sell services provided by others.Answer: FALSEPage Ref: 186Difficulty: EasyStudy Question: Study Question 2

3) In B2C e-commerce, sales are made between companies.Answer: FALSEPage Ref: 186Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

4) An electronic exchange is an example of a merchant company.Answer: FALSEPage Ref: 187Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

33Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 34: Exam 3

5) Gateway Corp. eliminated all its channel members and now sells directly to the public over the Internet. This is an example of disintermediation.Answer: TRUEPage Ref: 187Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

6) Disintermediation reduces market efficiency.Answer: FALSEPage Ref: 187Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

7) Managing prices by direct interaction with the customer yields better information than managing prices by watching competitors' pricing.Answer: TRUEPage Ref: 187Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

8) Without distribution and retailing partners, manufacturer who engages in e-commerce will have the increased logistics expense of entering and processing orders in small quantities.Answer: TRUEPage Ref: 188Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

9) Customer service expenses are likely to decrease for manufacturers that use e-commerce to sell directly to consumers.Answer: FALSEPage Ref: 188Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

10) Google, Amazon.com, and eBay exemplify Web 2.0. because they sell software licenses instead of providing software as a free service.Answer: FALSEPage Ref: 189Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

34Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 35: Exam 3

11) In the case of traditional software vendors, extensive testing and true beta programs precede every product release.Answer: TRUEPage Ref: 190Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

12) Traditional software companies use the term software as a service to mean that they will provide their software products via the cloud.Answer: TRUEPage Ref: 190Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

13) Reviews form the bulk of user-generated content.Answer: TRUEPage Ref: 191Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

14) Crowdsourcing combines social networking, viral marketing, and open-source design, saving considerable cost while cultivating customers. Answer: TRUEPage Ref: 191Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

15) Web 2.0 companies lock down all the legal rights they can.Answer: FALSEPage Ref: 192Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

16) Not all business information systems benefit from flexibility and organic growth offered by Web 2.0.Answer: TRUEPage Ref: 193Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

35Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 36: Exam 3

17) Social capital is the investment in social relations with the expectation of returns in the marketplace.Answer: TRUEPage Ref: 193Difficulty: EasyStudy Question: Study Question 4

18) Social capital adds value through information, influence, social credentials, and personal reinforcement.Answer: TRUEPage Ref: 193Difficulty: EasyStudy Question: Study Question 4

19) Strong relationships contribute the most to the growth of social networks.Answer: FALSEPage Ref: 194Difficulty: EasyStudy Question: Study Question 4

20) According to Henk Flap, the value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related. Answer: TRUEPage Ref: 194Difficulty: ModerateStudy Question: Study Question 4

21) Historically, organizations have created social capital via salespeople, via customer support, and via public relations.Answer: TRUEPage Ref: 195Difficulty: EasyStudy Question: Study Question 4

22) With Social CRM, business control the messages, offers, and support that customers receive based on the value of the customer.Answer: FALSEPage Ref: 197-198Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

36Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 37: Exam 3

23) According to McAfee, Enterprise 2.0 workers want to be able to navigate content structures such as lists and tables of content.Answer: FALSEPage Ref: 198Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

24) Enterprise 2.0 content is tagged differently from the content on the Web.Answer: FALSEPage Ref: 198Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

25) In Social CRM, relationships between organizations and customers are predefined.Answer: FALSEPage Ref: 199Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

Essay

1) What is e-commerce?Answer: E-commerce is the buying and selling of goods and services over public and private computer networks. E-commerce became feasible with the creation and widespread use of HTTP, HTML, and server applications such as Web storefronts that enabled browser-based transactions. E-commerce was not only faster than pre-Internet commerce, it also brought vendors closer to their customers, and in the process changed market characteristics and dynamics.Page Ref: 184Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2) What is Enterprise 2.0?Answer: Enterprise 2.0 is the application of Web 2.0 technologies, collaboration systems, social networking, and related technologies to facilitate the cooperative work of intellectual workers in organizations. Emergence is a key principle of Enterprise 2.0. Neither relationships nor ideas nor projects are predefined. Instead, they emerge as a result of collaboration via social networking. Page Ref: 185Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

37Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 38: Exam 3

3) What is meant by service-oriented architecture (SOA)?Answer: Enterprise 2.0 and Social CRM have given a boost to service-oriented architecture (SOA), which is a software design methodology and set of program communication standards that greatly improve the flexibility and adaptability of interorganizational program-to-program communication. SOA standards are meta, metadata. They are standards for defining how interprogram communication metadata are to be created.Page Ref: 185Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 1

4) What is an e-commerce auction? Give an example of an e-commerce company.Answer: E-commerce auctions match buyers and sellers by using an e-commerce version of a standard auction. This e-commerce application enables the auction company to offer goods for sale and to support a competitive-bidding process. The best-known auction company is eBay, but many other auction companies exist; many serve particular industries.Page Ref: 187Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

5) What is a clearinghouse? Explain with the help of an example.Answer: Clearinghouses provide goods and services at a stated price and arrange for the delivery of the goods, but they never take title. As a clearinghouse, Amazon.com matches the seller and the buyer and then takes payment from the buyer and transfers the payment to the seller, minus a commission. eBay operates in the same manner. Another type of clearinghouse is an electronic exchange that matches buyers and sellers; the business process is similar to that of a stock exchange. Sellers offer goods at a given price through the electronic exchange, and buyers make offers to purchase over the same exchange. Price matches result in transactions from which the exchange takes a commission.Page Ref: 187Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

6) What is disintermediation?Answer: Disintermediation is the elimination of the middle layers within a supply chain. This means that the manufacturer eliminates the distributors, wholesalers, and retailer by selling directly to the consumers. This eliminates inventory-carrying costs, shipping overhead, and handling activity. Because the distributor and associated inventories have become unnecessary waste, disintermediation increases market efficiency.Page Ref: 187Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

38Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 39: Exam 3

7) How is e-commerce related to price elasticity?Answer: From the seller's side, e-commerce produces information about price elasticity that has not been available before. Price elasticity measures the amount that demand rises or falls with changes in price. Using an auction, a company can learn not just what the top price for an item is, but also the second, third, and other prices from the losing bids. In this way, the company can determine the shape of the price elasticity curve. Similarly, e-commerce companies can learn price elasticity directly from experiments on customers. Page Ref: 187Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

8) What kind of marketing is used for Web 2.0 applications?Answer: In the Web 2.0 world, new product features are released and vendors wait for users to spread the news to one another, one friend sending a message to many friends; most of whom send that message, in turn, to their friends; and so forth, in a process called viral marketing. Users carry the message to one another. In fact, if a product requires advertising to be successful, then it is not a Web 2.0 product.Page Ref: 190Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

9) What are mashups? Explain with the help of an example?Answer: Web 2.0 encourages mashups, which result when the output from two or more Web sites is combined into a single user experience. Google's My Maps is an excellent mashup example. Google publishes Google Maps and provides tools for users to make custom modifications to those maps. Thus, users mash the Google map product with their own knowledge. In Web 2.0 fashion, Google provides users a means for sharing their mashed-up map over the Internet and then indexes that map for Google search.Page Ref: 191Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

10) How does social capital add value?Answer: Relationships in social networks can provide information about opportunities, alternatives, problems, and other factors important to business professionals. They also provide an opportunity to influence decision makers in one's employer or in other organizations who are critical to your success. Such influence cuts across formal organizational structures such as reporting relationships. Third, being linked to a network of highly regarded contacts is a form of social credential. Finally, being linked into social networks reinforces a professional's image and position in an organization or industry.Page Ref: 193-194Difficulty: ModerateStudy Question: Study Question 4

39Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 40: Exam 3

11) How is the value of social capital determined? Answer: The value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.Page Ref: 194Difficulty: EasyStudy Question: Study Question 4

12) What are the six characteristics of Enterprise 2.0?Answer: McAfee defined six characteristics of Enterprise 2.0, which he refers to by the acronym SLATES acronym. Workers want to be able to search for content inside the organization just like they do on the Web. Most workers find that searching is more effective than navigating content structures such as lists and tables of content. Workers want to access organizational content by link, just as they do on the Web. They also want to author organizational content using blogs, wikis, discussion groups, published presentations, and so forth. Enterprise 2.0 content is tagged, just like content on the Web, and tags are organized into structures. Additionally, Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as extensions. Finally, Enterprise 2.0 workers want relevant content pushed to them; they want to be signaled when something of interest to them happens in organizational content.Page Ref: 198Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 5

13) What is a folksonomy?Answer: Enterprise 2.0 content is tagged, just like content on the Web, and tags are organized into structures. These structures organize tags as a taxonomy does, but, unlike taxonomies, they are not preplanned; they emerge. A folksonomy is a content structure that has emerged from the processing of many user tags.Page Ref: 198Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

14) What is Social CRM?Answer: Social CRM is customer relationship management done in the style of Enterprise 2.0. The relationships between organizations and customers emerge as both parties create and process content. In addition to the traditional forms of promotion, employees in the organization create wikis, blogs, discussion lists, FAQs, sites for user reviews and commentary, and other dynamic content. Customers search this content, contribute reviews and commentary, tag content, ask more questions, create user groups, and so forth. With Social CRM, each customer crafts its own relationship with the company.Page Ref: 199Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

40Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 41: Exam 3

15) What is the difference between traditional CRM and Social CRM?Answer: In Social CRM, because relationships emerge from joint activity, customers have as much control as companies. This characteristic is anathema to traditional sales managers who want control over what the customer is reading, seeing, and hearing about the company and its products. Further, traditional CRM is centered on lifetime value; customers who are likely to generate the most business get the most attention and have the most impact on the organization. But, with Social CRM, the customer who spends 10 cents but who is an effective reviewer, commentator, or blogger can have more influence than the quiet customers who purchase $10 million a year. Such imbalance is incomprehensible to traditional sales managers.Page Ref: 199Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 5

MIS Essentials, 2e (Kroenke) Chapter 9: Business Intelligence and Information Systems for Decision Making

Multiple Choice

1) ________ is information containing patterns, relationships, and trends.A) Technical writingB) Raw dataC) Business intelligenceD) Internal communicationAnswer: CPage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2) One ________ is equal to 103 bytes.A) petabyteB) gigabyteC) megabyteD) kilobyteAnswer: DPage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

3) A type written page is about 2 ________.A) megabytesB) kilobytesC) terabytesD) petabytesAnswer: B

41Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 42: Exam 3

Page Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

4) One megabyte is equal to ________ bytes.A) 1,000B) 1,000,000,000C) 1,000,000,000,000D) 1,000,000Answer: DPage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

5) How many bytes make up 1 gigabyte?A) 109

B) 1012

C) 1015

D) 1018Answer: APage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

6) ________ bytes equal one terabyte.A) 1,000B) 1,000,000C) 1,000,000,000,000D) 1,000,000,000Answer: CPage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

7) A petabyte consists of ________ bytes.A) 109

B) 1012

C) 1015

D) 1018Answer: CPage Ref: 210Difficulty: Easy

42Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 43: Exam 3

AACSB: Use of ITStudy Question: Study Question 1

43Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 44: Exam 3

8) One ________ is equal to 1018 bytesA) megabyteB) gigabyteC) exabyteD) terabyteAnswer: CPage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

9) ________ systems integrate data from multiple sources, and they process that data by sorting, grouping, summing, averaging, and comparing.A) Knowledge managementB) Data-miningC) ExpertD) ReportingAnswer: DPage Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

10) Reporting systems improve decision making by ________.A) providing the right information to the right user at the right timeB) discovering patterns and relationships in data to predict future outcomesC) fostering innovation and improving customer serviceD) encoding, saving, and processing expert knowledgeAnswer: APage Ref: 211Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 2

11) Decision tree analysis is a technique used by ________ systems.A) knowledge managementB) data-miningC) reportingD) expertAnswer: BPage Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

44Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 45: Exam 3

12) ________ systems improve decision making by using the discovered patterns and relationships to anticipate events or to predict future outcomes.A) Knowledge managementB) ExpertC) ReportingD) Data-miningAnswer: DPage Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

13) ________ compute(s) the correlation of items on past orders to determine items that are frequently purchased together.A) Market-basket analysisB) Knowledge management systemsC) Expert systemsD) Clickstream dataAnswer: APage Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

14) The advantage that ________ have over the other systems is that these foster innovation, improve customer service, increase organizational responsiveness, and reduce costs.A) reporting systemsB) expert systemsC) data mining systemsD) knowledge management systemsAnswer: DPage Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

15) Which of the following systems use If/Then rules?A) data-mining systemsB) knowledge-management systemsC) expert systemsD) reporting systemsAnswer: CPage Ref: 212Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

45Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 46: Exam 3

16) If Patient_Temperature > 103, Then Initiate High_Fever–Procedure. This sort of a rule is most likely to be found in a(n) ________ system.A) expertB) knowledge managementC) operationalD) reportingAnswer: APage Ref: 212Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

17) Problematic data are termed as ________.A) rough dataB) clickstream dataC) granular dataD) dirty dataAnswer: DPage Ref: 212Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

18) [email protected] is an example of ________.A) dirty dataB) coarse dataC) inconsistent dataD) fine dataAnswer: APage Ref: 212Difficulty: EasyAACSB: Reflective ThinkingStudy Question: Study Question 3

19) Which of the following is a problem commonly associated with operational data that have been gathered over time?A) too fineB) nonintegratedC) inconsistentD) missing valuesAnswer: CPage Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

46Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 47: Exam 3

20) ________ refer(s) to the degree of summarization or detail.A) Data abstractionB) Data granularityC) Gross dataD) Data aggregationAnswer: BPage Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

21) ________ data is highly summarized.A) CoarseB) MissingC) ClickstreamD) DirtyAnswer: APage Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

22) Clickstream data is ________.A) inconsistentB) too coarseC) too fineD) dirty dataAnswer: CPage Ref: 213Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

23) Generally, it is better to have data that is ________ than data that is ________.A) random; specificB) inconsistent; unintegratedC) too fine; too coarseD) problematic; dirtyAnswer: CPage Ref: 213Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

47Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 48: Exam 3

24) The more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor. Which of the following best explains this phenomenon?A) the free rider problemB) the curse of dimensionalityC) the tragedy of the commonsD) the zero-sum gameAnswer: BPage Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

25) A ________ is a company that obtains data from public and private sources and stores, combines, and publishes it in sophisticated ways.A) data aggregatorB) data harvesterC) data centerD) date warehouseAnswer: APage Ref: 214Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

26) The purpose of a ________ is to extract and clean data from operational systems and other sources, and to store and catalog that data for processing by BI tools.A) data harvesterB) data centerC) data aggregatorD) data warehouseAnswer: DPage Ref: 214Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

27) Which of the following is true for data warehouses?A) Data are stored in a data warehouse database using a data warehouse DBMS.B) Data warehouses are prohibited from purchasing data from outside sources.C) User-generated content applications generate potentially large amounts of data.D) Purchased data is more accurate than data collected directly from clients.Answer: APage Ref: 214-215Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 4

48Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 49: Exam 3

28) The facts about data, such as its source, format, assumptions, constraints, and the like, are called ________.A) metadataB) folksonomiesC) microdataD) data packetsAnswer: APage Ref: 215Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

29) A ________ is a data collection that is created to address the needs of a particular business function, problem, or opportunity.A) data martB) data harvesterC) data mineD) data warehouseAnswer: APage Ref: 216Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

30) ________ are comparable to distributors in a supply chain because they take data from the data manufacturers, clean and process the data, and locate the data on the disks of its computers.A) Database serversB) Data martsC) Data warehousesD) Data harvestersAnswer: CPage Ref: 216Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 5

31) ________ is the application of statistical techniques to find patterns and relationships among data and to classify and predict.A) Data encryptionB) Data warehousingC) Data miningD) Data compressionAnswer: CPage Ref: 217Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

49Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 50: Exam 3

32) Which term is used as a synonym for data mining?A) OLAPB) neural networksC) market-basket analysisD) knowledge discovery in databasesAnswer: DPage Ref: 217Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

33) In unsupervised data mining ________.A) analysts do not create a model or hypothesis before running the analysisB) analysts apply statistical techniques to data to estimate parameters of a modelC) analysts use tools such as regression analysisD) analysts fit data to suggested hypothesesAnswer: APage Ref: 217-218Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 6

34) In ________, statistical techniques identify groups of entities that have similar characteristics. A) cluster analysisB) neural networksC) regression analysisD) curve fittingAnswer: APage Ref: 218Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 6

35) Which of the following is a common unsupervised data-mining technique?A) cluster analysisB) regression analysisC) neural networkingD) market-basket analysisAnswer: APage Ref: 218Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

50Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 51: Exam 3

36) With ________ data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.A) clusterB) supervisedC) clickstreamD) unsupervisedAnswer: BPage Ref: 218Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 6

37) Regression analysis is used in ________.A) expert systemsB) knowledge management systemsC) data-mining systemsD) reporting systemsAnswer: CPage Ref: 218Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

38) ________ measures the impact of a set of variables on another variable.A) Cluster analysisB) Neural networkingC) GranularityD) Regression analysisAnswer: DPage Ref: 218Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

39) Which of the following data-mining techniques is used to predict values and make classifications, such as "good prospect" or "poor prospect" customers?A) cluster analysisB) neural networksC) market basket analysisD) regression analysisAnswer: BPage Ref: 218Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

51Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 52: Exam 3

True or False

1) 1,000,000 bytes equal one gigabyte.Answer: FALSEPage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2) One kilobyte consists of 1,000 bytes.Answer: TRUEPage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

3) A terabyte is larger than a petabyte in terms of computer storage.Answer: FALSEPage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

4) A typical low-resolution photograph is equal to 1 terabyte.Answer: FALSEPage Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

5) Data-mining systems integrate data from multiple sources, processing it by sorting, grouping, and averaging, and delivering reports on the results.Answer: FALSEPage Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

6) Reporting systems compute correlations of items on past orders in order to determine items that were frequently purchased together.Answer: FALSEPage Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

52Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 53: Exam 3

7) Market-basket analysis is a data mining system.Answer: TRUEPage Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

8) Knowledge-management systems follow If/Then rules.Answer: FALSEPage Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

9) Expert systems encapsulate the knowledge of human experts in the form of If/Then rules.Answer: TRUEPage Ref: 212Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

10) Raw operational data is seldom suitable for more sophisticated reporting or data mining. Answer: TRUEPage Ref: 212Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

11) Data that are critical for successful operations must be complete and accurate, however data that are only marginally necessary do not need to be.Answer: TRUEPage Ref: 212Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

12) Data granularity refers to the degree of detail of the data.Answer: TRUEPage Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

53Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 54: Exam 3

13) Generally, it is better to have data that is too coarse a granularity than data that is too fine. Answer: FALSEPage Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

14) The curse of dimensionality states that the more attributes there are, the more difficult it is to build a model that fits the sample data but the more relevant it is as a predictor.Answer: FALSEPage Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

15) Data warehouses extract and clean data from operational systems.Answer: TRUEPage Ref: 214Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

16) An organization's data warehouse DBMS cannot be different from the organization's operational DBMS.Answer: FALSEPage Ref: 214Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

17) Data warehouses cannot purchase external data from outside resources.Answer: FALSEPage Ref: 215Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

18) Data from social networking and user-generated content applications are likely be more accurate than purchased data. Answer: TRUEPage Ref: 215Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

54Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 55: Exam 3

19) Data marts are data collections that address a particular business problem or opportunity.Answer: TRUEPage Ref: 216Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

20) Data marts are usually larger than data warehouses.Answer: FALSEPage Ref: 216Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

21) Data warehouses and data marts are expensive to create, staff, and operate.Answer: TRUEPage Ref: 217Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 5

22) KDD is synonymous with data mining.Answer: TRUEPage Ref: 217Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

23) With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis.Answer: TRUEPage Ref: 217Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

24) Regression analysis is used to find groups of similar customers from customer order and demographic data.Answer: FALSEPage Ref: 218Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

55Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 56: Exam 3

25) Cluster analysis measures the impact of one set of variables on another variable.Answer: FALSEPage Ref: 218Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

26) Cluster analysis and neural networks are examples of supervised data mining techniques.Answer: FALSEPage Ref: 218Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 6

Essay

1) What is the difference between a megabyte and a gigabyte?Answer: A gigabyte is a bigger than a megabyte. A megabyte is equal to 1,000,000 bytes while a gigabyte equals 1,000,000,000 bytes. Page Ref: 210Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 1

2) What is a business intelligence system?Answer: A business intelligence (BI) system is an information system that provides information for improving decision making. BI systems vary in their characteristics and capabilities and in the way they foster competitive advantage. There are four categories of BI systems: reporting systems, data mining systems, knowledge management systems, and expert systems. Page Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

3) Describe the characteristics and advantages of reporting systems.Answer: Reporting systems integrate data from multiple sources, and they process that data by sorting, grouping, summing, averaging, and comparing. Such systems format the results into reports and deliver those reports to users. Reporting systems improve decision making by providing the right information to the right user at the right time.Page Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

56Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 57: Exam 3

4) Explain the characteristics and advantages of data mining systems.Answer: Data mining systems process data using sophisticated statistical techniques, such as regression analysis and decision tree analysis. Data mining systems find patterns and relationships that cannot be found by simpler reporting operations, such as sorting, grouping, and averaging. Data mining systems improve decision making by using the discovered patterns and relationships to anticipate events or to predict future outcomes.Market-basket analysis is a data mining system, which computes correlations of items on past orders to determine items that are frequently purchased together.Page Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

5) What are the characteristics and advantages of knowledge management systems?Answer: Knowledge management (KM) systems create value from intellectual capital by collecting and sharing human knowledge of products, product uses, best practices, and other critical knowledge with employees, managers, customers, suppliers, and others who need it. It improves decisions by publishing employee and others' knowledge. This system creates value from existing intellectual capital and fosters innovation, improves customer service, increases organizational responsiveness, and reduces costs.Page Ref: 211Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

6) Write a brief note on the characteristics and advantages of expert system.Answer: Expert systems encapsulate the knowledge of human experts in the form of If/Then rules and process those rules to make a diagnosis or recommendation. These systems improve decision making by nonexperts by encoding, saving, and processing expert knowledge. Although few expert systems have demonstrated a capability equivalent to a human expert, some are good enough to considerably improve the diagnosis and decision making of nonexperts.Page Ref: 212Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 2

57Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 58: Exam 3

7) What is dirty data?Answer: Data from transaction processing and other operational systems can be processed to create basic reports without problem. However, raw operational data is seldom suitable for more sophisticated reporting or data mining. First, although data that are critical for successful operations must be complete and accurate, data that are only marginally necessary do not need to be. For example, some systems gather demographic data in the ordering process. But because such data are not needed to fill, ship, and bill orders, their quality suffers. Such problematic data is known as dirty data.Examples of dirty data are values of B for customer gender and of 213 for customer age. Other examples are a value of 999-999-9999 for a U.S. phone number, a part color of green, and an email address of [email protected]. All of these values can be problematic for data mining purposes.Page Ref: 212Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 3

8) What is data granularity?Answer: Data can be too fine or too coarse. Data granularity refers to the degree of summarization or detail. Coarse data are highly summarized; fine data express precise details. Generally, it is better to have too fine a granularity than too coarse. If the granularity is too fine, the data can be made coarser by summing and combining. If the granularity is too coarse, however, there is no way to separate the data into constituent parts.Page Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

9) Explain clickstream data.Answer: Clickstream data is that data which is captured from customers' clicking behavior. These data are very fine and include everything a customer does at the Web site. Because the data are too fine, the data analysts must throw away millions and millions of clicks.Page Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

10) Explain the curse of dimensionality.Answer: The curse of dimensionality is associated with the problem of data having too many attributes. Suppose there are too many attributes from the internal customer data as well as the customer data that has been purchased. To be able to select among them, the curse of dimensionality says that the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor. Page Ref: 213Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 3

58Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 59: Exam 3

11) What is the purpose of a data warehouse?Answer: The purpose of a data warehouse is to extract and clean data from operational systems and other sources, and to store and catalog that data for processing by BI tools. The prepared data are stored in a data warehouse database using a data warehouse DBMS, which can be different from the organization's operational DBMS.Page Ref: 214Difficulty: EasyAACSB: Use of ITStudy Question: Study Question 4

12) How is a data warehouse different from a data mart?Answer: The purpose of a data warehouse is to extract and clean data from operational systems and other sources, and to store and catalog that data for processing by BI tools. In a way, one can think of a data warehouse as a distributor in a supply chain. The data warehouse takes data from the data manufacturers (operational systems, other internal systems, etc.), cleans and processes the data, and locates the data on its shelves, so to speak—that is, on the disks of the data warehouse computers. The people who work with a data warehouse are experts at data management, data cleaning, data transformation, metadata design, and the like. Data warehouse business analysts know the general needs of the business, but they are not experts in a given business function.

A data mart is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business. If the data warehouse is the distributor in a supply chain, then a data mart is like a retail store in a supply chain. Users in the data mart obtain data that pertain to a particular business function from the data warehouse. Such users do not have the data management expertise that data warehouse employees have, but they are knowledgeable analysts for a given business function.Page Ref: 216Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 5

13) What is data mining?Answer: Data mining is the application of statistical techniques to find patterns and relationships among data and to classify and predict. Data mining techniques emerged from statistics and mathematics and from artificial intelligence and machine-learning fields in computer science. As a result, data mining terminology is an odd blend of terms from these different disciplines. Sometimes people use the term knowledge discovery in databases (KDD) as a synonym for data mining. Most data mining techniques are sophisticated, and many are difficult to use. Data mining techniques fall into two broad categories: unsupervised and supervised.Page Ref: 217Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 6

59Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Page 60: Exam 3

14) What is unsupervised data mining? Answer: Unsupervised data mining is where analysts do not create a model or hypothesis before running the analysis. Instead, they apply the data mining technique to the data and observe the results. With this method, analysts create hypotheses after the analysis to explain the patterns found. Findings are obtained solely by data analysis.One common unsupervised technique is cluster analysis. With it, statistical techniques identify groups of entities that have similar characteristics. A common use for cluster analysis is to find groups of similar customers from customer order and demographic data.Page Ref: 217-218Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 6

15) Explain supervised data-mining and list the techniques used in it.Answer: With supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. For example, suppose marketing experts in a communications company believe that cell phone usage on weekends is determined by the age of the customer and the number of months the customer has had the cell phone account. A data mining analyst would then run an analysis that estimates the impact of customer and account age.One technique which measures the impact of a set of variables on another variable is called a regression analysis. Neural networks are another popular supervised data mining technique used to predict values and make classifications, such as “good prospect” or “poor prospect” customers.Page Ref: 218Difficulty: ModerateAACSB: Use of ITStudy Question: Study Question 6

60Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall