Grading Summary These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below. Date Taken: 6/2/2013 Time Spent: 1 h , 16 min , 28 secs Points Received: 115 / 150 (76.7%) Question Type: # Of Questions: # Correct: Multiple Choice 5 4 Essay 4 N/A Grade Details - All Questions 1. Question : (TCO A) Cloud computingStudent Answer: is the same as e-commerce. reduces the size of IT organizations. increases business costs. requires special software, other than a browser, to be installed on each computer. Instructor Explanation: Week 1 LecturePoints Received: 0 of 10 Comments: 2. Question : (TCO A) Maintaining the organization's financial records is a central purpose of which main business function? Student Answer: manufacturing and accounting finance and accounting (Correct answer) sales and manufacturing finance and sales Instructor Explanation: p. 19 Points Received: 10 of 10 Comments: 3. Question : (TCO B) The value chain model Student Answer: categorizes five related advantages for adding value to a firm's products or services. sees the supply chain as the primary activity for adding value.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
viewed as a way of implementation and management of computerinformation systems. Information systems on the other hand are a
bit more challenging and complex in comparison to IT. Information
systems are a set of interrelated components responsible for
collecting, storing and distributing information that directly impacts
decision-making and control within an organization. Aninformation system helps employees analyze problems, helps create
new products, supports decision-making and control in anorganization, and also helps employees visualize complex subjects.
(Management Information Systems, 12/e- Pg 15-16)
InstructorExplanation:
Information technology (IT) consists of all the hardware and software that afirm needs to use to achieve its business objectives. Information systems aremore complex. An information system can be defined technically as a set ofinterrelated components that collect (or retrieve), process, store, anddistribute information to support decision making and control in anorganization. An information system:• supports decision making, coordination, and control• helps employees analyze problems• helps employees visualize complex subjects• helps create new products@ pp. 15 –16
Points Received: 15 of 25
Comments: While you cited this properly, I mentioned that DeVry does not
want straight "Copy and Paste" in answers...
7. Question : (TCO B)"Knowledge increases exponentially" is a phrase with which weare all familiar. How does this concept apply to electronic business andthe emergence of the digital firm? Support your contentions.
Student Answer: To put the quote into perspective, I think one way to interpret is to break down how the use of data affects knowledge/wisdom. Dataarranged in a certain manner leads to information, and information
leads to knowledge and knowledge leads to wisdom. As one
becomes wiser and more experienced, then it can be said that their
knowledge increases exponentially because of the continualdiscovery of new information. Everything we know today can be
tracked down practically in a chain/pyramid type of history. Today,
the internet enables us to feed our minds and expand our
knowledge; so much information is at our finger tips. And withthat, all human knowledge can be connected to anyone with access
to a computer. Businesses in turn take advantage of the humanknowledge to increase electronic business.
Instructor
Explanation:
Student answers will vary. A sample answer is: The exponential increases ofknowledge refer to shared information. For example, once the concept of awheel is established, inheritors of that knowledge do not have to reinvent thewheel. The Internet is a tool similar to the wheel: it is based on sharedstandards and universal tools. The Internet and shared networkingtechnologies are allowing new techniques for attracting customers andselling customers to be developed and adapted very quickly. For example,
although early Internet retailers had difficulty setting up secure credit cardtransactions and payment systems, today there are many systems in placeas vendors step in to create shared tools for doing this. The Internet isfostering shared knowledge and, as such, propagating ever greaterincreases in that knowledge.@ pp. 373 –405
Points Received: 25 of 25
Comments:
8. Question : (TCO C) What types of relationships are possible in a relationaldatabase? Describe and give an example of each.
Student Answer: In a relational database, there are three basic operations used todevelop sets of useful data: select join and project. The select
operation creates a subset of records in the file that meet the
criteria. Select creates a subset of rows in a table to meet certain
criteria. The join operation combines relational tables to provide theuser with additional information that is not directly available in
individual tables. The project operation creates a subset consisting
of columns in a table. The columns would allow the user to create atable using only the required information. For example in a table,
one would need to extract information in columns that they need to
create the new table. (Management Information Systems, 12/e- Pg
215)Instructor
Explanation:
A one-to-one relationship occurs when each record in one table has only onerelated record in a second table. An example might be a table of salespeopleand a separate table of company cars. Each salesperson can only have onecar, or be related to the one car in the database. A one-to-many relationshipoccurs when a record in one table has many related records in a secondtable. An example might be a table of salespeople and clients. Each
salesperson may have several clients. A many-to-many relationship occurswhen records in one table have many related records in a second table, andthe records in the second table have many related records in the first table. An example might be a clients table and a products table. Clients may buymore than one product, and products are sold to more than one client.@ p. 221
Points Received: 10 of 25
Comments:
9. Question : (TCO D) Describe the effect of cloud computing on traditional ITinfrastructure.
Student Answer: The biggest effect of cloud computing on traditional ITinfrastructure is that the user no longer needs to own their owninfrastructure. The fact that ownership of the infrastructure is not
needed, allows the user capital expenditure by renting usage of
infrastructure from a third party provider. By doing that, the useronly consumes resources as a service and pays for what he/she uses.
Based on that, the user can be billed monthly or quarterly based on
the amount of service used. With resources on the cloud, multiple
users can share computing power amongst themselves and alsoimprove utilization rates so services aren't left stagnant/idle. Cloud
computing in turn helps reduce and cut costs.
Instructor
Explanation:
Because websites, applications, and databases have been moved to a cloudvendor, the corporation does not need infrastructure, such as Web,application, and database servers, as part of its in-house computinginfrastructure. It is replaced by a network infrastructure that providesemployees with Internet access to the cloud services.@ Week 4 Lecture
Points Received: 25 of 25
Comments:
Week 1
1. Question : Which of the following choices may lead to competitive advantage (1) newproducts, services and business models; (2) charging less for superiorproducts; (3) responding to customers in real time?
Student Answer:1 only
1 and 2
2 and 3
1, 2, and 3
InstructorExplanation:
p. 15
Points Received: 1 of 1
Comments:
2. Question : An information system can be defined technically as a set of interrelatedcomponents that collect (or retrieve), process, store, and distributeinformation to support
Student Answer:decision making and control in an organization.
communications and data flow.
manager's analysis of the organization’s raw data.
10. Question : Engineers, scientists, or architects who design new products or servicesfor a firm belong to which level of a business hierarchy? Student Answer:
Middle management
Production workers
Knowledge workers
Data workers
Instructor
Explanation:
p. 18
Points Received: 1 of 1
Comments:
11. Question : What is the difference between the Internet and cloud computing?
Student Answer:None – they are the same.
They are not related.
In cloud computing, both information and function are moved to theInternet.
Cloud computing applications do not use browsers.
Instructor
Explanation:
Week 1 Lecture
Points Received: 1 of 1
Comments:
12. Question : An exponential rate of innovation means that
Student Answer:the number of new innovations increases linearly.
innovation occurs as described by Moore's law.
as much progress is made in 10 years as the previous 20.
All of the above
Instructor
Explanation:
Week 1 Lecture
Points Received: 1 of 1
Comments:
13. Question : In a business hierarchy, the level that is responsible for monitoring thedaily activities of the business is
17. Question : Decisions that are unique, rapidly changing, and not easily specified inadvance are best suited to which type of system?
Student Answer:Management
Transaction processing
Executive support
Decision-support
InstructorExplanation:
p. 48
Points Received: 1 of 1
Comments:
18. Question : Which systems are especially suited to situations in which the procedurefor arriving at a solution may not be fully predefined in advance?
Student Answer:Management information systems
Transaction processing systems
Decision-support systems
Knowledge management systems
InstructorExplanation:
p. 48
Points Received: 1 of 1
Comments:
19. Question : Which systems are designed to span functional areas and focus onexecuting business processes across the firm?
20. Question : Today's companies need fewer levels of management because
Student Answer:workers need less supervision.
information systems make daily management decisions.
the average worker has more extensive training.
the increased flow of information throughout the organizationsupplants one of the traditional roles of management.
Instructor
Explanation:
Week 1 Lecture
Points Received: 1 of 1
Comments:
WEEK 2
1. Question : A characteristic or quality describing an entity is called a(n)
Student Answer:field.
tuple.
key field.
attribute.
InstructorExplanation:
p. 210
Points Received: 1 of 1
Comments:
2. Question : The confusion created by _____ makes it difficult for companies to createcustomer relationship management, supply chain management, orenterprise systems that integrate data from different sources.
users to view both logical and physical views of data.
programmers to quickly diagram data relationships.
programmers to normalize data.
InstructorExplanation:
p. 224
Points Received: 1 of 1
Comments:
Week 3
1. Question : A characteristic or quality describing an entity is called a(n)
Student Answer:field.
tuple.
key field.
attribute.
InstructorExplanation:
p. 210
Points Received: 1 of 1
Comments:
2. Question : The confusion created by _____ makes it difficult for companies to createcustomer relationship management, supply chain management, orenterprise systems that integrate data from different sources.
Student Answer:batch processing
data redundancy
data independence
online processing
Instructor
Explanation:
p. 211
Points Received: 1 of 1Comments:
3. Question : Duplicate data in multiple data files is called
7. Question : A field identified in a table as holding the unique identifier of the table'srecords is called the
Student Answer:primary key.
key field.
primary field.
unique ID.
Instructor
Explanation:
p. 213
Points Received: 1 of 1
Comments:
8. Question : The data dictionary serves as an important data management tool by Student Answer:assigning attributes to the data.
creating an inventory of data contained in the database.
presenting data as end users or business specialists would perceivethem.
maintaining data in updated form.
Instructor
Explanation:
p. 217
Points Received: 1 of 1
Comments:
9. Question : An automated or manual file that stores information about data elementsand data characteristics such as usage, physical representation,ownership, authorization, and security is the
Student Answer:data dictionary.
data definition diagram.
entity-relationship diagram.
relationship dictionary.
InstructorExplanation:
p. 217
Points Received: 1 of 1
Comments:
10. Question : Which is the type of database management approach that can handle alarge number of pages or documents?
1. Question : A device that acts as a connection point between computers and that canfilter and forward data to a specified destination is called a
Student Answer:hub.
switch.
router. NIC.
Instructor
Explanation:
p. 248
Points Received: 1 of 1
Comments:
2. Question : Which device sends data packets to all connected devices in a network?
Student Answer:Network interface card
Hub
Router
None of the above
InstructorExplanation:
p. 248
Points Received: 1 of 1
Comments:
3. Question : The method of slicing digital messages into parcels, transmitting themalong different communication paths, and reassembling them at theirdestination is called
18. Question : Cost reductions in using cloud based services stem from
Student Answer: reductions in staff.
reductions in energy usage.
reductions in servers.
All of the above
Instructor
Explanation:
Week 4 Lecture
Points Received: 1 of 1
Comments:
19. Question : In an RFID system, a(n) _____ is electronically programmed withinformation that can uniquely identify an item, such as an electronic code.
Student Answer:reader
antenna
microchip
tag
Instructor
Explanation:
p. 279
Points Received: 1 of 1
Comments:
20. Question : The cloud computing model described in the lecture is an example ofwhich cloud computing model?
1. Question : Which type of infrastructure services provides voice and videoconnectivity to employees, customers, and suppliers?
Student Answer:Networking
Telephone
VOIP
Telecommunications
Instructor
Explanation:
p. 165
Points Received: 1 of 1
Comments:
2. Question : Specifications that establish the compatibility of products and the ability tocommunicate in a network are called
Student Answer:network standards.
telecommunications standards.
technology standards.
Internet standards.
Instructor
Explanation:
p. 174
Points Received: 1 of 1
Comments:
3. Question : _____ unleash powerful economies of scale and result in declines inmanufactured computer products.
Student Answer:Internet and web technologies
Technology standards
Linux and open-source software
Client/server technologies
Instructor
Explanation:
p. 174
Points Received: 1 of 1
Comments:
4. Question : Which model can be used to analyze the direct and indirect costs to helpfirms determine the actual cost of specific technology implementations?
8. Question : Which best describes a suite of integrated software modules for financeand accounting, human resources, manufacturing and production, andsales and marketing that allows data to be used by multiple functions andbusiness processes?
Student Answer:Process management software
ERP systems
Groupware
Application software
Instructor
Explanation:
p. 338
Points Received: 1 of 1
Comments:
9. Question : Which type of software enables data to be used by multiple functions andbusiness processes for organization coordination and control?
Student Answer:Groupware
Application software
Collaboration software
Enterprise software
Instructor
Explanation:
pp. 339 –340
Points Received: 1 of 1
Comments:
10. Question : Which type of software is built around thousands of predefined businessprocesses?
18. Question : _____ integrate(s) multiple applications from multiple business functions,business units, or business partners to deliver a seamless experience forthe customer, employee, manager, or business partner and provide(s) agreater degree of cross-functional integration than the traditionalenterprise applications.
Student Answer:PRM software
SFA software
ERP suites
Service platforms
Instructor
Explanation:
p. 360
Points Received: 1 of 1
Comments:
19. Question : Which metric is based on the relationship between the revenue producedby a specific customer, the expenses incurred in acquiring and servicingthat customer, and the expected life of the relationship between thecustomer and the company?
Student Answer:Churn rate
CLTV
Cost per lead
Cost per sale InstructorExplanation:
p. 355
Points Received: 1 of 1
Comments:
20. Question : Operational CRM applications include tools for
1. Question : What will you need to understand and measure for an effectivereengineering project?
Student Answer:Cost and risk
Performance of existing processes for a baseline
Strategic analysis and workflow
Inputs and outputs
Instructor
Explanation:
p. 492
Points Received: 1 of 1Comments:
2. Question : Enabling organizations to make continual improvements to manybusiness processes and to use processes as the fundamental buildingblocks of corporate information systems is the goal of
Student Answer:BPM.
BPR.
reengineering.
workflow management.InstructorExplanation:
p. 492
Points Received: 1 of 1
Comments:
3. Question : The _____ is directly responsible for the individual systems project.
Student Answer:project management group
project team
IS steering committee corporate strategic planning committee
18. Question : Using a strategic analysis approach, an organization's informationrequirements are known through a small number of
Student Answer:milestones and dates.
critical success factors.
key management decisions.
organizational changes.
Instructor
Explanation:
p. 506
Points Received: 1 of 1
Comments:
19. Question : In which approach to systems building are the development stagesorganized so that tasks in one stage are completed before the tasks in thenext stage have begun?
Student Answer:Traditional
Prototyping
RAD
All of the above
Instructor
Explanation:
p. 514
Points Received: 1 of 1
Comments:
20. Question : The process of building an experimental system quickly and inexpensivelyfor demonstration and evaluation so that users can better determineinformation requirements.
1. Question : Social media sites result in loss of personal information because
Student Answer:sites lack appropriate tools to prevent security fraud.
hackers spend more time working to penetrate the sites. users are not careful and share inappropriate business or personal
information.
Wikileaks is publishing social media site information. InstructorExplanation:
Week 7 Lecture
Points Received: 1 of 1
Comments:
2. Question : Information systems
Student Answer:pose traditional ethical situations in new manners.
raise new ethical questions.
raise the same ethical questions created by the Industrial Revolution.
raise ethical questions primarily related to information rights andobligations.
Instructor
Explanation:
p. 124
Points Received: 1 of 1
Comments:
3. Question : The feature of social institutions that means mechanisms are in place todetermine responsibility for an action is called
Student Answer:due process.
accountability.
courts of appeal.
the judicial system.
Instructor
Explanation:
p. 129
Points Received: 1 of 1
Comments:
4. Question : The process in law-governed societies in which laws are known andunderstood and there is an ability to appeal to higher authorities to ensurethat the laws are applied correctly is called
Personal Security and Confidentiality Act of 1986.
Instructor
Explanation:
p. 306
Points Received: 1 of 1
Comments:
18. Question : Automated data are more susceptible to destruction, fraud, error, andmisuse because information systems concentrate data in computer filesthat
Student Answer:are usually embedded in legacy systems that are easy to access.
are not secure because the technology to secure them did not existat the time the files were created.
have the potential to be accessed by large numbers of people and bygroups outside of the organization.
are frequently available on the Internet.
Instructor
Explanation:
p. 293
Points Received: 1 of 1
Comments:
19. Question : The vulnerability inherent in wireless networking is due to
Student Answer:use of the SSIDs.
broken encryption or users who do not set up secure systems.
the lack of robust encryption capabilities.
the lack of protection against war driving.
Instructor
Explanation:
p. 317
Points Received: 1 of 1
Comments:
20. Question : Statement ranking information risks are included in a(n)