Self Test: Multiple Choice

You can find the answers on the last page of this text.

  1. 10-1 A database management system (DBMS)

    1. is another term for Big Data.

    2. is a set of tables of data.

    3. assesses the performance of employees for management.

    4. is the result of electronic monitoring of employees.

  2. 10-2 MIS differs from IT because

    1. MIS focuses on applying IT to solve business problems.

    2. MIS is the branch of IT focused on Internet usage.

    3. IT focuses on hardware, and MIS focuses on software.

    4. MIS is theoretical, and IT is applied.

  3. 10-3 DSSs are used most often by

    1. managers who make decisions based on current data.

    2. employees who decide how to solve technical problems.

    3. clerical staff who organize and format documents and reports.

    4. trainers who teach staff and employees new software products.

  4. 10-4 Data warehousing is

    1. the storing of terabytes of transaction data.

    2. not used when DBMSs are in place.

    3. is not used now because data marts have replaced it.

    4. is the management of large quantities of paper records.

  5. 10-5 Tools used to analyze data include

    1. DBMSs, ERP, and ROI.

    2. DSSs, OLAPs, and executive information systems.

    3. OSHAs and C2Cs.

    4. PPCs, ISs, and B2Bs.

  6. 10-6 Pay-per-click advertising

    1. cost the advertiser only if a reader actually clicks on the ad.

    2. is offered by programs like Google AdSense.

    3. are highly effective because they are associated with keywords customers are using.

    4. All of the above.

  7. 10-7 Social media monitoring is best described as

    1. planning events where the sales force mingles with potential clients.

    2. regulating the use of e-mail and messaging in the workplace.

    3. staying aware of the messages posted about your products in cyberspace.

    4. eavesdropping on personal communications.

  8. 10-8 Phishing can be used to

    1. minimize the taxes owed to the federal government.

    2. steal identity information from unsuspecting clients.

    3. record the keystrokes typed in when someone is logging into a password-protected site.

    4. help save storage space on mobile devices.

  9. 10-9 Business-to-business transactions include

    1. brokering sites.

    2. social networking sites.

    3. specialized industry portals.

    4. Both a and c.

  10. 10-10 Technology has forced businesses to focus on security issues like

    1. phishing.

    2. adware and spyware.

    3. disruption by hackers.

    4. All of the above.

True/False

You can find the answers on the last page of this text.

  1. 10-11 Contextual advertising means that the advertisement is related to the search just made.

    1. □ True or □ False

  2. 10-12 Business intelligence software supports decision making by presenting visual, interactive views of the state of a business.

    1. □ True or □ False

  3. 10-13 Viral marketing can be prevented by using the proper spyware.

    1. □ True or □ False

  4. 10-14 Enterprise social networking is the application of social network tools to education.

    1. □ True or □ False

  5. 10-15 Crowdsourced funding is the use of social networking to acquire capital for a new venture.

    1. □ True or □ False

Critical Thinking Questions

  1. An image shows a star blue icon.10-16 Businesses have experienced several major data breaches in the last few years. How do you see these lapses in corporate security affecting consumers? Does it make you less likely to purchase from certain companies or to purchase certain products? Has it changed how you protect your identity information?

  2. 10-17 What responsibilities accompany the new volume of information we can collect with information technologies? If airlines can cross-reference travel data with bank records and identify suspicious patterns, do they have a responsibility to alert authorities? Or should it be illegal for companies to look for patterns in data to “profile” people (extrapolate data about their psychological and physical characteristics, spending patterns, and so forth in order to make judgments about them)? What if a college IT department finds a threatening message that has been sent from a student ­e-mail account? What if it is not “threatening” but in bad taste? Where is the boundary of the college’s responsibility?

  3. 10-18 The growth in online and mobile shopping has forced many businesses to dramatically adjust their sales and marketing strategies. What kind of brick-and-mortar bookstores have survived the move to electronic media and online shopping? What unique qualities have they focused on to demonstrate the value their products have in the digital age? Has Amazon.com promoted interest in reading, which helps brick-and-mortar stores, or has it eliminated them?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset