Solved by a verified expert :1. Question
:
Defenders-of-belief communities facilitate activities like:

customer service functions.
manufacturing and operations.
inbound logistics.
sales and marketing.

Question 2. Question
:
If the content posted on a social networking site represents
reasonable criticism of the organization’s products or services, the best
response would most likely be to:
leave it.
edit it.
delete it.
report it.

Question 3. Question
:
According to Gossieaux and Moran, which of the following
activities are seekers of the truth most likely to facilitate?

Human resources
Operations
Marketing
Sales

Question 4. Question
:
Which of the following is one of the principal means that
companies implementing Web 2.0 are most likely to use to attract viewers?

Controlled releases
Fixed product value
Free content
Fixed interface

Question 5. Question
:
According to Gossieaux and Moran, which of the following
observations is true about a hyper-social organization?

It uses social media in an
organization-centric manner.
It creates relationships in which only one of
the parties perceives and gains value.
It is characterized by a transformation of
thinking from market segments to tribes.
It is an organization that transitions from a
dynamic process to a structured one.

Question 6. Question
:
Which of the following is a risk associated with human
resources when using social media to form conclusions about employees?

Loss of
privacy of the employees
Loss of control over the employees
Decrease in efficiency of the evaluation
process
Possibility of error on the site

Question 7. Question
:
Which of the following is a significant risk of using social
media for inbound and outbound logistics?

Loss of control
Loss of credibility
Loss of privacy
Loss of effectiveness

Question 8. Question
:
According to Gossieaux and Moran, a(n) ________ is an
organization that uses social media to transform its interactions with
customers, employees, and partners into mutually satisfying relationships with
them and their communities.

SM application provider
hyper-social organization
Enterprise 2.0
nonprofit organization

Question 9. Question
:
When a student attends a business function for the purpose
of meeting people and reinforcing relationships, he or she is investing in his
or her:

human capital.
process capital.
social capital.
structural capital.

Question 10. Question
:
Which of the following components of McAfee’s Enterprise 2.0
Model involves the creation of enterprise content via blogs, wikis, discussion
groups, presentations, etc.?

Search
Authoring
Extensions
Signals

Question 11. Question
:
The primary risk of peer-to-peer support in the context of
social media and customer service is:
loss of control.
loss of credibility.
lack of privacy.
increase in expenses.

Question 12. Question
:
________ is the use of information technology to support the
sharing of content among networks of users.
Social media
Content publishing
Multimedia
Programming

Question 13. Question
:
Being linked to a network of highly regarded contacts is a form
of:

social credential.
viral marketing.
crowdsourcing.
human capital.

Question 14. Question
:
Which of the following is an SM application provider?

Oracle
SAP
McAfee
LinkedIn

Question 15. Question
:
Social capital, unlike traditional capital:

appreciates with time and never depreciates.
depreciates with time and never appreciates.
sometimes depreciates and at other times
appreciates with time.
remains constant with time.

Question 16. Question
:
Tasks in the ________ phase of the SDLC include building and
testing system components and converting users to the new system.

system definition
component design
system maintenance
system implementation

Question 17. Question
:
Which of the following can be represented using the Business
Process Modeling Notation?

Gantt charts
As-is models
Scatter plots
PERT charts showing the critical path

Question 18. Question
:
The situation where addition of resources creates
inefficiencies is known as:
diseconomies of scale.
marginal utility.
marginal returns.
break-even.

Question 19. Question
:
In a Business Process Modeling Notation (BPMN) diagram, a
________ symbol represents an activity.

dotted arrow
rectangle
diamond
solid arrow

Question 20. Question
:
A ________ is a sequence of activities that determine the
earliest date by which a project can be completed.

Venn diagram
Pareto chart
critical path
scatter plot

Question 21. Question
:
In a business process, a role refers to:

a physical repository.
the movement of data.
a collection of data.
a collection of activities.

Question 22. Question
:
In a business process, resources are:
people or computer applications that are
assigned to roles.
collections of procedures and activities.
the total number of points of work that can be
accomplished in each scrum period.
collections of related tasks that receive
inputs and produce outputs.

Question 23. Question
:
Which of the following is true of paired programming?

Two team members write the same program by
coordinating from different locations.
Two programs are run simultaneously on one
device.
Two processors are required to run one
program.
Two team members share the same computer to
write a computer program together.

Question 24. Question
:
Which of the following are the steps in the business process
management (BPM) cycle?

Model processes; implement processes; assess
results; create components
Create components; model processes; implement
processes; assess results
Implement processes; create components; model
processes; assess results
Model processes; create components; implement
processes; assess results

Question 25. Question
:
The term ________ refers to a set of management policies,
practices, and tools that developers use to maintain control over the SDLC
project’s resources.
swim-lane layout
trade-off
transmission control protocol
configuration control

Question 26. Question
:
The first step in the system definition phase of the systems
development life cycle (SDLC) is to:

plan the project.
conduct a feasibility study.
determine the goals and scope.
form the project team.

Question 27. Question
:
The traditional process for developing information systems
is:
the spiral approach.
the systems development life cycle.
rapid application development cycle.
the V-model.

Question 28. Question
:
The first phase of the systems development life cycle (SDLC)
is:
defining the system.
implementing the system.
determining the requirements.
maintaining the system.

Question 29. Question
:
A ________ is a person who is well versed in an organization’s
strategy and focuses on ensuring that business processes and information
systems meet the organization’s competitive strategies.

business analyst
business application programmer
business administrator
business supervisor

Question 30. Question
:
According to Brooks’ Law, adding more people to a late
project will:

guarantee efficiencies.
speed
up the project.
create diseconomies of scale.
reduce the need for coordination.

Question 31. Question
:
Which of the following is considered a computer crime?

Deletion of records by an employee who is
unaware of operating procedures
Poorly written programs resulting in data
losses
Loss of data as a result of flooding
Hacking of information systems

Question 32. Question
:
Mark is transferring funds online through the Web site of a
reputed bank. Which of the following will be displayed in the address bar of
his browser that will let him know that the bank is using the SSL protocol?

ftp
www
https
.com

Question 33. Question
:
Which of the following systems procedures is specifically
the responsibility of operations personnel?

Writing software program codes
Using
systems to perform job tasks
Creating back up of system databases
Knowing whom to contact when a security breach
occurs

Question 34. Question
:
A ________ examines each part of a message and determines
whether to let that part pass.

packet-filtering firewall
private key
mail server
drive-by sniffer

Question 35. Question
:
In asymmetric encryption, each site has a ________ for
encoding messages.

Student Answer: botnet
private
key
public key
cookie

Question 36. Question
:
Firewalls produce ________ which include lists of all
dropped packets, infiltration attempts, and unauthorized access attempts from
within the firewall.

honeypots
blogs
activity logs
RSS
feeds

Question 37. Question
:
Which of the following is likely to be accepted by a poorly
designed application, leading to improper disclosure of data?

Public key
Asymmetric encryption
Key escrow
SQL injection

Question 38. Question
:
________ is the type of security loss that involves computer
criminals invading a computer system and replacing legitimate programs with
their own unauthorized ones that shut down legitimate applications and
substitute their own processing to spy, steal, and manipulate data.

Encryption
Spoofing
Phishing
Usurpation

Question 39. Question
:
Which of the following is considered a threat caused by
human error?

An
employee inadvertently installs an old database on top of the current one
An employee intentionally destroys data and
system components
A virus and worm writer infects computer
systems
A hacker breaks into a system to steal for
financial gain

Question 40. Question
:
________ involve the people and procedure components of
information systems.

Firewalls
Technical safeguards
Human
safeguards
Payloads

Question 41. Question
:
________ involves accomplishing job tasks during failure.

Authentication
Hardening
Usurpation
Recovery

Question 42. Question
:
A ________ is a number used to encrypt data.

key
honeypot
cookie
cache

Question 43. Question
:
With ________, the sender and receiver transmit a message
using different keys.

asymmetric encryption
block cipher
symmetric encryption
stream cipher

Question 44. Question
:
Removing and disabling ________, which may contain sensitive
security data, presents an excellent example of the trade-off between improved
security and cost.

bookmarks
pop-ups
cookies
toolbars

Question 45. Question
:
When an employee is terminated, IS administrators should
receive advance notice so that they can:

destroy the employee’s records.
plan for new recruitment.
disseminate information.
remove the user account and password.

Question 46. Question
:
The bullwhip effect:

is not related to erratic consumer demand.
forces distributors, manufacturers, and
suppliers to carry smaller inventories that do not have the capacity to meet
requirements.
increases the overall profitability of the
supply chain.
can be eliminated by restricting access to
consumer-demand information to only a few participants in the supply chain.

Question 47. Question
:
Which of the following statements is true of a supply chain?

All members of the supply chain of a firm must
have close geographical proximity.
Every supply chain should include suppliers,
manufacturers, distributors, retailers, and customers.
Each organization in a chain is connected to
just one company up and down the chain.
A supply chain includes transportation
companies, warehouses, and inventories.

Question 48. Question
:
An order processing functional system located in the United
States operates in English and reflects the practices and culture of the United
States. Its manufacturing systems business partner located in Taiwan, operates
in Chinese and reflects the business practices and culture of Taiwan. They do
not accommodate language, business, or their cultural differences into a single
system. From the above scenario, which of the following statements is true
about the functional systems?

The order processing functional system will
eventually be forced to operate in Chinese to reflect the business practices
and culture of Taiwan.
The use of enterprise systems, such as ERP,
would complicate the existing situation and thus increase data isolation.
Lack of integration will be extremely
disadvantageous to the manufacturing systems unit but not to the order
processing unit.
The systems can operate independently as long
as there is an adequate data interface between them.

Question 49. Question
:
The principal planning task for an international IS
organization is to:
localize software packages to focus on
quantity more than quality.
setup IS departments for every process in all
of its branches.
integrate the organization’s information
systems with the outsourced vendors’ information systems.
align IT and IS resources with the
organization’s competitive strategy.

Question 50. Question
:
Which of the following components of an IS is the easiest to
adapt to internationalization?

Hardware
User interfaces
Procedures
Data