MIS201 Final Exam Summer 2021 PDF
Document Details
Uploaded by FortunateAlbuquerque
Saudi Electronic University
2021
Tags
Summary
This document contains a MIS201 final exam from the summer 2021 term. The exam covers various business topics, including payment systems, supply chain management, customer relationship management (CRM), accounting, financial systems, and information security.
Full Transcript
MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 Hanan went to a furniture store and after finished her shopping, it was time to pay for her furniture. What is the most efficient way to pay using her phone? a. Radio frequency b. NFC (Near-Field Communication) c. Wi-Fi d. WiMA...
MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 Hanan went to a furniture store and after finished her shopping, it was time to pay for her furniture. What is the most efficient way to pay using her phone? a. Radio frequency b. NFC (Near-Field Communication) c. Wi-Fi d. WiMAX Hanan noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. Hanan begins collecting data about her customers by having them sign up for Promotional E-mails at her store. She collects their names and e-mail address on her form. How might she use the customer data? a. Marketing b. Gain insights into her products c. Perform customer profitability analysis d. Cross-sell Hanan noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. Hanan orders 40 ties in each of the school colors and 10 in each of four sports. Which of the following is true about Hanan’s supply chain? a. Hanan is using a push model. b. Hanan is experiencing the bull-whip effect. c. Hanan has an accurate demand forecast. d. Hanan is using a pull model. Hanan noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. Hanan orders 40 ties in each of the school colors and 10 in each of four sports. Which of the following is true about Hanan’s supply chain? a. Hanan is building inventories. b. Hanan is using a just-in-time inventory system. c. Hanan is using a vendor-managed inventory. d. Hanan is using a pull model. Hanan noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 store on her campus and offer sports themed ties as well as solid colored ties in her school colors. With the prime presentation time of the semester coming up, she decides to offer a sports tie and a colored tie as a set at a discounted price. This is called a. Customer intimacy b. Campaign c. Bundling d. Up-selling Hanan noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She started offering a “punch card” promotion -- buy three ties and get the fourth one for half off. This “punch card” promotion is a form of a. Up-selling b. Cross-selling c. loyalty program. d. Customer intimacy Hanan noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She has purchased blank receipt books to use when she makes a sale to gather the information about the transaction. This is part of her a. Operational CRM b. Transactional CRM c. Analytical CRM d. Collaborative CRM Norah is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She thinks it’s time to buy an accounting package. She makes a list of the features she thinks she will need from an accounting package. This document could be considered her a. The design she wants from the system. b. Economic feasibility c. User requirements. d. Shopping list. Norah is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 researched available accounting packages for a business like hers and has decided on Boutique Accounting. What is the best way for Norah to implement Boutique Accounting? a. Piecemeal b. Parallel c. Direct d. Pilot Norah is an information professional in Brightona accounting company. In the initial stage of developing new user interface for the existing Customer relationship management system (CRM); Norah conducted a study to address the business problem related to the user interface. Norah, as a result of this study, recommended to develop a new interface for the existing CRM system. What kind of studies that Norah conducted in this case? a. User requirement b. Agile development c. Feasibility d. Direct conversation Norah is the owner of a start-up boutique that specializes in hard-to-find dress sizes for women. She has been keeping her financial books by using Excel and by hand. She researched available accounting packages for a business like hers and has decided on Boutique Accounting. Boutique Accounting is offered from a SaaS vendor. Which of the following is true? a. Norah needs network access to the vendor’s location. b. Norah needs to buy hardware that the software can run on c. Norah will need to hire someone to maintain the software for her. d. Norah will purchase the software. _____ feasibility addresses the human issues of an information systems project. a. Economic b. Technical c. Organizational d. Behavioral _____are/is the underlying technology of the Internet of Things. a. Ultra-wideband b. WiMAX c. Wireless sensor d. Bluetooth MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 _____ portals automate the business processes involved in purchasing products between a single buyer and multiple suppliers. a. Affiliate b. Distribution c. Procurement d. Corporate _____ systems support the front-office business processes which directly interact with customers. a. Collaborative CRM b. Analytical CRM c. Transactional CRM d. Operational CRM _____ systems support the front-office business processes which directly interact with customers. a. Collaborative CRM b. Analytical CRM c. Transactional CRM d. Operational CRM ________can be read from any direction or angle and more resistant to damage a. Bar code b. QR code c. IoT d. RFID To utilize financial data from different countries to convert currencies using financial and accounting systems is under which category a. Financial Planning and Budgeting b. Control and Auditing c. Investment Management d. Managing Financial Transactions (CBIS) is an information system that uses computer technology to perform some tasks. This particular system has components include: a. Technology b. Interface c. Hardware d. Web-page MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 There is a library in the university and you want to use the internet to do research work, what type of network used at the library? a. WAN b. LAN c. PAN d. MAN Erratic shifts in orders up and down the supply chain are a. Demand effect b. Bullwhip effect c. Forecast effect d. Shifts effect __________ is the flow of materials, information, money, and services from raw material suppliers, through factories, to the end customers. a. Inventory b. Supply chain c. Velocity d. Supply chain visibility In a typical IS operational plan, what is a prioritized inventory of present applications and a detailed plan of projects to be developed of continued during the current year? a. Objective of the IS function b. Recourse allocation and project management c. Constraints on the IS function d. The application portfolio You are an owner of a company that produces customized jewelry for your customers. You often advise your customers about new trends and ideas that can be used for production of jewelry. You do not start making a jewelry item until you receive a customer order. This model is considered a. Push model b. Pull model c. Foresight model d. Hindsight model All of the following are Customer Touch Points except_______ a. Advertisement b. Visiting store MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Sending emails d. Phone calls When a software that causes pop-up advertisements to appear on your screen is know as? a. Spam b. Spamware c. Spyware d. Adware Managers need IT support because of: a. The need for support in sophisticated analysis b. The amount of information to analyze is small c. the lack of training for managers d. Analysis is easily done by IT The phases of decision making starts with: a. Intelligence b. Design c. Choice d. Implementation If you choose to custom-write an entire application, you are choosing to write _________ computer code. a. No b. Lots of c. Some d. All new What does it mean that Big Data is composed of high variety information assets? a. It means that Big Data include a huge diversity of different data in differing data formats. b. It means that Big Date stores data in more than two dimensions. c. It means that Big Data consists of vast quantities of data. d. It means that Big Data flows into and organization at incredible speeds. Communication media includes all of the following except. a. Modem b. Twisted pair wire c. Fiber optics d. Coaxial cable MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 Your programmers are really good at what they do, so you have them develop an ERP system that matches your company’s processes perfectly. This is a(n) _______ approach to on-premise ERP implementation. a. Best-of-breed b. Custom c. SaaS d. Vanilla One of the four common approaches to conduct a cost-benefit analysis. The system developers, in this approach, write the analysis to justify funding one or more specific applications of projects. IS professionals are a major source of input when this analysis is developed because this approach describes what you do, how you do it, and how a new system could better support you. Which approach is described here? a. Return on investment b. Net present value c. The business case approach d. Breakeven analysis Organizations face many pressures in the marketspace, one factor that cause high pressure is a. Legal pressure b. Accounting pressure c. Production pressure d. Human resources pressure Employees in two areas of the organization pose especially significant threats to information security, these areas are: a. Finance b. HR and IS c. Sales d. Marketing What does it mean that Big Data is composed of high velocity information assets? a. It means that Big Data flows into and organization at incredible speeds. b. It means that Big Date stores data in more than two dimensions. c. It means that Big Data consists of vast quantities of data. d. It means that Big Data include a huge variety of different data in differing data formats. Which type of satellite has the largest footprint? a. Medium-earth-orbit MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 b. Geostationary c. Polar orbit d. Low-earth-orbit Porter’s Five Forces Model includes: a. The threat of substitute products b. The threat of new employees c. The threat of new technology d. The threat of new complaints Database systems maximize the following: a. "Data security, data integrity, and data independence." b. "Data security, data isolation, and data independency." c. "Data redundancy, data isolations, and data consistency." d. "Data integrity, data isolation and data independency." Coca-Cola implemented enterprise software from Oracle that enabled it to achieve all of the following except: a. Reacting faster to market changes. b. Reducing the number of employees c. Improving its bargaining power with suppliers. d. Standardizing business processes worldwide. An information system that uses computer technology to perform one or more tasks. It is known as a computer-based information system which has components such as: a. Infrastructure b. Platform c. Network d. Application In the ________ component of SCM, supply chain managers must create a responsive and flexible network to support customers who have problems with delivered products. a. Sourcing b. Returning c. Planning d. Making IoT stands for: a. Internet of Things b. Introduction of Things MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Internet of Tracking d. Interaction of Things _____ feasibility addresses the human issues of an information systems project. a. Economic b. Technical c. Organizational d. Behavioral When a small amounts of information that Web sites store on your computer, temporarily or more or less permanently is know as? a. Spam b. Spam ware c. Spyware d. Cookies _____ portals support communities such as hobby groups or political parties. a. Affinity b. Corporate c. Commercial d. Industrywide _____ is a method of delivering software in which a vendor hosts the applications and customers access these applications over the Internet. a. Service-oriented architecture b. Prototyping c. Leasing the application d. Software-as-a-Service _____ rely entirely on readers for their power. a. Passive QR codes b. Active RFID tags c. Passive RFID tags d. Active QR codes Implementing controls to prevent identified threats from occurring is an one objective of: a. Risk analysis b. Risk mitigation c. Risk acceptance d. Risk transference MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 Vendor-Managed Inventory occurs when the _________, rather than the ________, manages the entire inventory process for a particular product or group of products. a. "Manager, supplier" b. "Supplier, manager " c. "Retailer, supplier" d. "supplier, retailer" What does it mean that Time variant is one of the basic characteristics of data warehouse and data marts? a. Time variant means that data warehouses and data marts maintain historical data. b. Time variant means that data are collected from multiple systems and then integrated around subjects. c. Time variant means that data warehouses and data marts users cannot change or update the data. d. Time variant means that data warehouse or data marts use a multidimensional data structure. The most common wireless technology for TV is a. Near-field communications b. WiMAX c. Infrared d. Hotspot Cisco has implemented many methods to control it’s employees access to the company itself and its systems. This include: biometrics, identification (ID), signature recognitions and passwords. This strategy is called: a. Certificate authority b. Multifactor authentication c. Demilitarized zone (DMZ) d. Asymmetric encryption What does it mean that Big Data is composed of high volume information assets? a. It means that Big Data consists of vast quantities of data. b. It means that Big Data flows into and organization at incredible speeds. c. It means that Big Data include a huge variety of different data in differing data formats. d. It means that Big Date stores data in more than two dimensions. Which one from below is NOT the disadvantages of Satellite a. Large coverage area b. Must have unobstructed line of sight MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Expensive d. Signals experience propagation delay The SugarCRM product implemented by Redglaze Group is a(n) ________ CRM system. a. Open-source b. Mobile c. Real-time d. On-demand In hybrid cars, including the Toyota Prius and Ford Fusion hybrid, display panels inform drivers of how efficiently they are driving at any given moment. The Prius plots this information on a bar graph that indicates current miles per gallon. The Fusion displays a virtual plant growing (or dying) on the dashboard screen as a person's driving efficiently increases or decreases. This explains the components of operational CRM systems which is: a. Customer Interaction Center b. Customer-facing applications c. Customer-touching applications d. On-demand CRM system Which of the following is not a part of systems analysis? a. Defining the business problem b. Gathering information about the existing system c. Identifying the causes of, and solutions to, the business problem d. Identifying the technical specifications of the solution In a typical IS operational plan, what is a listing of who is going to do what, how, and when in atypical IS operational plan? a. Constraints on the IS function b. Objective of the IS function c. Recourse allocation and project management d. The application portfolio _____ systems support the front-office business processes which directly interact with customers. a. Collaborative CRM b. Analytical CRM c. Transactional CRM d. Operational CRM Erratic shifts in orders up and down the supply chain are MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 a. Demand effect b. Bullwhip effect c. Forecast effect d. Shifts effect __________ is the flow of materials, information, money, and services from raw material suppliers, through factories, to the end customers. a. Inventory b. Supply chain c. Velocity d. Supply chain visibility __________ link business partners over the Internet by providing them access to certain areas of each other’s corporate intranets a. Internets b. WWW c. Extranets d. Intranets One of the roles of manager is Informational role which means to be a(n): a. Analyzer b. Negotiator c. Figurehead d. Handler Extranets use _____ technology to make communication over the Internet more secure. a. videoconferencing b. telepresence c. virtual private network d. anti-malware What is the difference between data and information? a. "Information is knowledge, data is not" b. Data is raw and is converted to information once it has been processed c. They are the same thing d. "Data must be numbers, information must be text" Which of the following statements is false? a. Insourcing refers to building IT applications in-house. b. Companies that use Software-as-a-Service are running applications on the vendor’s hardware. MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Outsourcing refers to acquiring IT applications from outside contractors. d. Companies that purchase open-source software cannot modify it. Which of the following statements is false? a. An application is a computer program designed to support a specific business process. b. Each functional area within an organization has only one application. c. A functional area information system is the same as a departmental information system. d. A functional area information system can obtain data from other functional area information systems. Knowledge workers a. Handle day-to-day operations within an organization. b. Make tactical decisions. c. Experts in a particular subject area d. make routine decisions Which of the following is the common internet protocol. a. TCP/IP b. HTML c. Net d. IPX/SPX You work for a restaurant as a food distributer. Sometimes this restaurant would order 40 boxes of corn, sometimes 20, and sometimes 60. You do not want to lose money by not selling them the amount they may need, so you keep in your storage up to 70 boxes of corn to make sure you can meet their demands. This is an example of: a. Just-In-Time inventory b. The bullwhip effect c. Vertical inventory d. The pull model Customer-touching CRM applications are also called ________ CRM applications. a. traditional b. analytical c. collaborative d. electronic The type of satellite that is used for Television signals a. LEO b. GEO MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. IoT d. MEO The CDC company has implemented a very strong security system. The company focuses on building the security system as of having access control, physical control, adding some encryption techniques and a firewall to protect its network. However, the company still receives a lot of attacks.What do you think the reason behind these threats which the company should have considered from the first time? a. Anti-malware Systems b. Employee training and education. c. Smart ID cards d. Business continuity Strategic Planning means a. Long-range goals b. Using resources to accomplish organizational goals c. Executing specific tasks d. The ratio between the inputs and outputs Database systems minimize the data redundancy. What does it mean? a. Data redundancy means that the same data are stored in multiple locations. b. Data redundancy means that data meet certain constraints. c. Data redundancy means that applications cannot access data associated with other applications. d. Data redundancy means that there is a risk of losing a lot of data at one time. Which of the following systems acquisition methods requires staff to systematically go through every step in the development process and has a lower probability of missing important user requirements? a. External acquisition b. Prototyping c. End-user development d. Systems development life cycle The transmission capacity of a network is called : a. Bandwidth b. Broadband c. Backbone d. Digital subscriber line (DSL) MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 The ______ considers as a component of CBIS that uses computer technology to perform multiple tasks a. Business b. Web-page c. Platform d. Software Business transactions that are processed as they occur is an example of a. Source data automation b. OLTP c. Batch processing d. ESS EDI increases _________. a. Message length b. Cycle time c. Productivity d. Paper usage Organizations spend a great deal of time and money protecting their information resources. Before doing so, they perform : a. Risk analysis b. Business continuity c. Risk management d. Audit You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-sized car of the same brand for you to drive. The salesperson is engaged in: a. Bundling b. Cross-selling c. Up-selling d. Customer relationship management In which step, on the Knowledge management systems cycle, new knowledge must be identified as valuable and be represented in a reasonable way? a. Capture knowledge. b. Refine knowledge. c. Store knowledge. d. Manage knowledge. MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 _____ occurs when applications cannot access data associated with other applications. a. Data isolation b. Data integrity c. Data consistency d. Data redundancy Authentication includes: a. Anti-malware Systems b. Biometrics c. Virtual private network (VPN) d. Encryption If there are _____ substitutes for an organization’s products or services, then the threat of substitutes is _____. a. "many, high" b. "few, low" c. "few, high" d. "many, low " One of the four common approaches to conduct a cost-benefit analysis. Analysts use this approach to convert future values of benefits to their present-value equivalent by “discounting” them at the organization's cost of funds. They can then compare the present value of the future benefits with the costs required to achieve those benefits to determine whether the benefits exceed the costs. Which approach is described here? a. Breakeven analysis b. Return on investment c. Net present value d. The business case approach In a typical IS operational plan, what is the best current estimate of the goals of the Information Systems (IS) functions? a. Recourse allocation and project management b. Constraints on the IS function c. The application portfolio d. Objective of the IS function What is deliberate acts that involve defacing an organization’s Web site, potentially damaging the organization’s image and causing its customers to lose faith. a. Espionage or Trespass b. Sabotage or Vandalism MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Information Extortion d. Identity theft _____ portals automate the business processes involved in purchasing products between a single buyer and multiple suppliers. a. Affiliate b. Distribution c. Procurement d. Corporate When the attacker copies someone else on telephone , such as a company manger or information system employee. This is example of________. a. Cookies b. Social engineering c. Human errors d. Spam Business transactions that are processed as they occur is an example of a. Source data automation b. OLTP c. Batch processing d. ESS EDI increases _________. a. Message length b. Cycle time c. Productivity d. Paper usage Organizations spend a great deal of time and money protecting their information resources. Before doing so, they perform : a. Risk analysis b. Business continuity c. Risk management d. Audit You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-sized car of the same brand for you to drive. The salesperson is engaged in: a. Bundling MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 b. Cross-selling c. Up-selling d. Customer relationship management Which type of decision requires a combination of standard solution procedures and individual judgment? a. Semistructured b. Unstructured c. Structured d. Undocumented What does "Data Rot" refer to? a. Data rot refers to problems with the media on which the data are stored b. Data rot refers to those data that visitors and customers produce when they visit a Web site and click on hyperlinks. c. "Data rot refers to an approach to manage information across an entire organization involving a formal set of unambiguous rules for creating, collecting, handling, and protecting its information." d. "Data rot refers to set of core data (e.g., customer, product, employee, vendor, geographic location, etc.) that span the enterprise information systems." __________ is a risk of open-source CRM systems. a. Quality control b. Customization c. Variety d. Cost Distribution Portal is considered _____________ in the supply chain a. Downstream b. Internal c. Upstream d. Uninvolved Walmart checkout point-of-sale business events, this is an example of: a. Transaction processing system b. Executive dashboard c. Electronic commerce system d. Office automation system _____ networks collect data from many points over an extended space. MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 a. Ultra-wideband b. WiMAX c. Wireless sensor d. Wi-Fi Workflow, groupware, and telepresence systems are examples of which network application? a. Collaboration b. Discovery c. Communications d. Web services Which of the following statements concerning technology pressures on modern businesses is true? a. New technologies offer alternative service options. b. Technology changes so rapidly that organizations should wait before they release new technology-based products. c. New technologies will never replace existing technologies. d. The amount of information on the Internet remains stable from year to year. In a supply chain, manufacturers typically are ________ a. Midstream b. Downstream c. Internal d. Upstream The choice phase of decision making a. Involves selecting a solution b. Involves selecting a problem c. Involves selecting an implementation tool d. Involves examining a situation _____ portals automate the business processes involved in selling products from a single supplier to multiple buyers. a. Affiliate b. Procurement c. Distribution d. Corporate The flow of decision making is: MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 a. "Intelligence, Design , Choice, Implementation" b. "Intelligence, Design, Implementation , Choice" c. "Intelligence, Choice, Design, Implementation" d. "Intelligence, Implementation, Choice, Design" There are five basic components of SCM, those include: Plan, Source, Make,_______, and________ a. "Order, flow" b. "Deliver, return" c. "Return, purchase" d. "Deliver, purchase" What is the name of the process to examine the business problem that organization plans to solve with an information system? a. User requirements b. Systems Design c. Deliverables d. Systems analysis Code X is a software development company, based on Dubai, was contacted by Brightona, an accounting company based on Riyadh Saudi Arabia, to develop a software to upgrade new user interface for their existing Customer relationship management system (CRM). What is the Brightona’s strategy for developing its CRM’s user interface? a. Use a software-as-a-services b. Use open-source software c. Use outsourcing d. Lease the application Faisal recently purchased lights that can be controlled wirelessly. His lights can change colors by voice or using an app on his phone. What is the technology that Faisal is using? a. Radio frequency b. WiMAX c. Wi-Fi d. IoT Porter’s Value Chain is essentially a tool for: a. Diagnosing and enhancing sources of competitive advantage within an organization. b. Identifying the competitive forces within an industry. c. Calculating what a firm is worth. d. Advising firms on how to price their products. MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 One of the various analytics tools and techniques used for data analysis is a. OLAP b. Word c. Dashboards d. Big data An agent of vendor who assemble the software needed by the enterprise and then packages it with services such as development, operations, and maintenance. The customer then access the applications via the Internet. What is the agent (or vendor) called? a. IT steering committee b. Technical specialists c. Systems stakeholders d. Application services provider (ASP) Procurement Portal is considered _____________ in the supply chain a. Upstream b. Uninvolved c. Downstream d. Internal One of the three basic roles of mangers in business analytics is: a. Interpersonal role b. Predictive role c. Prescriptive role d. Productive role Information is ________ a. a collection of data b. a processed data c. a text data d. a audio/video data To provide a cloud based solution in which the company rents the software from an ERP vendor who offers its products over the Internet and manages software updates is called a. Custom Approach b. On-Premise ERP Implementation c. Breed Approach d. Software-as-a-Service (SaaS) ERP MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 One of the four common approaches to conduct a cost-benefit analysis. This approach majors managements effectiveness in generating profits with its available assets. The measurement is calculated by dividing the net income generated by a project by the average assets invested in the project. Which approach is described here? a. Net present value b. The business case approach c. Breakeven analysis d. Return on investment What does it mean that integrated is one of the basic characteristics of data warehouse and data marts? a. Integrated means that data are collected from multiple systems and then integrated around subjects. b. Integrated means that data warehouses and data marts maintain historical data. c. Integrated means that data warehouses and data marts users cannot change or update the data. d. Integrated means that data warehouse or data marts use a multidimensional data structure. A _______ is a connecting system (wireline or wireless) that permits different computers to share resources. a. Software b. Roles c. Hardware d. Network Which one is an example of Physical Controls: a. smart ID cards b. Adware c. Authorization d. Doors _____ is a wireless standard that enables temporary, short-range connection between mobile devices. a. Bluetooth b. Short message service c. Wireless application protocol d. Wi-Fi Batch processing is used when a. all files are available on-line b. data should be entered without error c. data is to be processed periodically MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 d. transactions do not occur periodically _________is the processes and policies designed to protect an organization's information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction. a. Information security b. Customer relationship system c. Information System d. Supply chain Which of the following is correct? a. "Data leads to information, and information leads to knowledge" b. "Knowledge leads to information, and information leads to data" c. Data leads to knowledge and knowledge leads to information d. Data leads to Wisdom and knowledge leads to information CRM system that is hosted by an external vendor in the vendor's data center. a. On-demand CRM system b. Operational CRM system c. Real-time CRM system d. Open-source CRM system You work at a large company that has had a security breach. To prevent this from happening again in the future, you hire a contracting company to monitor the company’s network for any future attacks and to accept any financial burdens associated with an attack. This is an example of risk ______. a. Limitation b. Transference c. Management d. Acceptance The type of satellite that has longest orbital life a. LEO b. MEO c. GEO d. IoT Digital dashboards provide all of the following capabilities except: a. Transaction processing b. Drill-down MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Status access d. Exception reporting A __________to an information resource is any danger to which system may be exposed. a. Vulnerability b. Cybercrime c. Security d. Threat ________store information both horizontally and vertically. a. Bar code b. QR code c. IoT d. RFID The __________ known as make-to-stock, the production process begins with a forecast, which is simply an educated guess as to customer demand. a. Flow Model b. Pull Model c. Delivery Model d. Push Model _____________ is to combine the benefits of the standard approach and customized systems while avoiding the extra costs and risks. a. Customized ERP approach b. Vanilla Approach c. Software-as-a-Service (SaaS) ERP d. Breed Approach Globalization and powerful customers are types of a. Market pressure b. Technology pressure c. Political pressure d. Local pressure When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be: a. Unstructured b. Structured c. Undocumented MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 d. Semistructured Each site on the Internet gets an assigned address, which is a(n) _____. a. URL address b. TCP address c. IP address d. World Wide Web address What does "Data Governance" refer to? a. "Data governance refers to an approach to manage information across an entire organization involving a formal set of unambiguous rules for creating, collecting, handling, and protecting its information." b. Data governance refers to those data that visitors and customers produce when they visit a Web site and click on hyperlinks. c. "Data governance to set of core data (e.g., customer, product, employee, vendor, geographic location, etc.) that span the enterprise information systems." d. Data governance refers to problems with the media on which the data are stored TCP performs basic functions includes all of the following except. a. Massage are formulated how they are interpreted by their receivers. b. Manage the movement of data packet between computers by establishing connection between the computers c. Sequences the transfer of packets d. Acknowledges the packets that have been transmitted Ali has taken a job with his ideal company and is excited to start in their sales department. During orientation, he is told that the company is very proud of their ERP system from SAP. Which one of the modules listed below handled the data for Ali’s hire in the sales department? a. Customer relationship management b. Human resource management c. Business intelligence d. Operations management Walmart Retail Link system connecting suppliers to Walmart, this is an example of: a. Supply chain management system b. Decision support system c. Office automation system d. Expert system MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 The type of satellite that is used for Global Positioning Systems a. LEO b. GEO c. MEO d. IoT It is a development methodology that the delivers functionality and rapid iterations, which are usually measured in weeks. This methodology requires frequent communication, development, testing and delivery. What is the name of this development methodology? a. Direct conversion b. Scope creep c. Agile d. Feasibility Directly interact with customers for marketing, selling, and services a. Front-office processes b. Customer touch point c. Advertisement d. Customer-facing CRM applications You are the owner of a company that creates custom state of the art furniture. You do not know what your customers want, and therefore do not order raw material for furniture unless you will physically start using it for your creations. This kind of inventory is called: a. Make-to-order inventory b. Just-In-Time inventory c. Vertical inventory d. Sell-on-demand inventory The generic term for technologies that use radio waves to automatically identify individual items is _____ a. Bar codes b. Telemetry c. Radio-frequency identification d. Wireless access points One of the disadvantages of Twisted-pair wire is: a. Subject to interference b. Inexpensive c. Widely available MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 d. Easy to work with In 2012, Aramco was subjected to several cyber attacks on all its systems, which had led to much damage as nearly 30,000 employees' computers were affected. Despite that, Aramco returned to work within two weeks. How do you think Aramco managed to return back to normal work in such a short period of time? a. Audit b. By applying business continuity Plan c. Risk Management. d. Encryption To produce a report with very detailed information, this type of report is called a. Drill Down Report b. Routine Report c. Comparative Report d. Key Indicator Report _______is the instructions for combining the components of CBIS to process information and generate the desired output a. Procedure b. Hardware c. Software d. Network ERP stands for______ a. Enterprise Resource Planning Systems b. Enterprise Root Planning Systems c. Enterprise Research Planning Systems d. Enterprise Rough Planning Systems What is the most important function of an enterprise application a. Enabling business functions and departments to share information b. Enabling cost effective c. Increasing potential for security gaps d. Increasing data leakage Accept the potential risk, continue operating with no controls, and absorb any damages that occur is the process of: a. Risk analysis b. Risk acceptance MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Risk mitigation d. Risk transference Which of the following is not a mobile application in financial services? a. Transaction processing systems b. Wireless electronic payment systems c. Mobile banking d. Micropayment Which strategy for competitive advantage involves introducing new products and putting new features in existing products? a. Innovation b. Cost leadership c. Differentiation d. Customer-orientation Abdullah works in the sales organization of a mid-size company. The company is evaluating whether it should replace its existing sales support system. At what stage of the SDLC should Abdullah expect to participate? a. Systems analysis b. Programming c. Prototyping d. Systems design Defining the _____________ is the first stage in the information systems planning process. a. IT strategic plan b. IT architecture c. Organization’s operational plan d. Organization’s mission The _____ component of SCM is the most metric-intensive part of the supply chain, where organizations measure quality levels, production output, and worker productivity. a. Returning b. Making c. Planning d. Sourcing _____ feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project. MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 a. Behavioral b. Technical c. Organizational d. Economic Which of the following is not a response by organizations to business pressures? a. Delay releases of innovated products. b. Build strategic systems that enable an organization to increase market share or profits. c. Manufacture customized goods at a lower cost. d. Conduct business electronically with customers and business partners. _____ activities create value for which customers are willing to pay, whereas _____ activities do not add value directly to the firm’s products or services. a. "Primary, support" b. " Support, primary" c. "Procurement, operations" d. "Accounting, outbound logistics" FAQs is considered as_________ a. Customer-touching applications b. Customer-facing CRM applications c. Customer-facing CRM d. Customer Interaction Center Major advantage of Wi-Fi is a. Ability to provide simple Internet access b. Bluetooth c. Ultra-Wideband d. NFC In which step, on the Knowledge management systems cycle, Useful knowledge must then be saved in a reasonable format in a knowledge repository so that other people in the organization can access it.? a. Store knowledge. b. Refine knowledge. c. Capture knowledge. d. Manage knowledge. The _____ approach to systems development is a group-based tool for collecting user requirements. MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 a. Integrated computer-assisted software engineering b. Prototyping c. Rapid application development d. Joint application design during checkout at the supermarket, the cashier is scanning your products using the barcode scanner, which system is collecting your purchasing data? a. Customer Relationship Management System b. Supply Chain Management Systems c. Transaction Processing System d. Enterprise Resource Planning In a typical IS operational plan, what are the technological, financial, personnel, and other limitations on the information systems (IS) function? a. Recourse allocation and project management b. Objective of the IS function c. The application portfolio d. Constraints on the IS function What ensures IS security programs are cost effective? a. Risk analysis b. Risk mitigation c. Risk d. Risk management If your company purchases SAP and installs it "as is", this is a(n) ________ approach to on-premise ERP implementation. a. Custom b. Best-of-breed c. SaaS d. Vanilla A disadvantage of Electronic Data Interchange is a. Reduces cycle time b. Increases productivity c. Many standards d. Minimizes data entry errors Offering rewards to customers to influence future behavior. a. Loyalty program MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 b. Rewards program c. Sales program d. Tele sales program Predictive Analytics a. Utilize a variety of analytics techniques to examine recent and historical data in order to detect patterns b. Recommends one or more courses of action and showing the likely outcome of each decision. c. Summarize what has happened in the past and allow decision makers to learn from past behaviors. d. Displays results of analysis to decision makers If you choose the vanilla approach to ERP implementation, you are choosing to write _____ computer code. a. Some b. No c. Lots of d. All new Systems design answers the question, _____: a. How much will the information system cost? b. What is the effective operational life of the system? c. Who will benefit from use of the information system being developed? d. How will the information system resolve the business problem? In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem. a. Implementation b. Choice c. Design d. Intelligence Upper CASE tools handle the _______ stages of the SDLC. a. "Implementation, programming and testing, and operation and maintenance" b. Analysis and design c. Analysis and investigation d. "Design, programming and testing, and implementation" _____ is designed to support organization wide process coordination and integration a. SCM MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 b. CRM c. DSS d. ERP Abdullah works for a small consulting company. They want to do a better job of tracking their clients and the jobs they have bid on and either won or lost. There are no processes in place right now, and all users (consultants and managers) have different ideas. Their IT consultants have suggested they use JAD to design their application. The IT consultants will use agile development to deliver the application. Agile development _____________. a. delivers functionality in rapid interactions. b. uses the scrum approach to design the system. c. takes a longer time but the results are better. d. requires little user input. An Information resource's _________is the possibility that the system will suffer harm by threat. a. Security b. Cybercrime c. Threat d. Vulnerability To identify authorized users more efficiently and effectively, organizations should implement a. Audit b. Business continuity c. Risk management d. Multifactor authentication One of the roles of manager is interpersonal role which means to be a(n): a. Leader b. Negotiator c. Analyzer d. Handler customer focused and customer-driven organizational strategy that concentrates on addressing customers' requirements for products and services, and then providing high- quality, responsive services. a. CRM b. SFA c. CIC MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 d. e-CRM Ali and his friend, Ahmad, run a coffee shop, and they recently added Wi-Fi. Ahmad says he’s heard about people driving around trying to access data as it’s being transmitted on wireless networks. You tell him this is called a. Rogue access devices b. Cybersquatting c. RF jamming d. Eavesdropping ___________ are employees from all functional areas and levels of the organization who interact with the system, either directly or indirectly. a. Technical specialists b. Users c. Programmers d. Systems analysts You get a call from a telemarketer at dinner trying to sell life insurance. This is an example of a customer-__________ CRM application and ____________. a. facing; outbound telesales b. touching; inbound teleservice c. facing; inbound teleservice d. touching; outbound telesales Business partners who use the extranet as a vehicle for communication and collaboration are called a. Industries b. Businesses c. Joint Ventures d. collaborators Ali is an information specialist, and he is working in Brightona accounting firm. His manager asked him to create a list of the applications that have to be added or modified if they already exist. What is the list that Ali is generating could be called? a. Requirements b. Feasibility study c. System design d. Application portfolio MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 When a software that collects personal information about users without their consent is called? a. Spamware b. Spam c. Adware d. Spyware Has the smallest range of any short-range wireless networks, and is designed to be embedded in mobile devices such as cell phones and credit cards a. Bluetooth b. Near-Field Communications c. WiMAX d. Ultra-Wideband A(n) ________ performs and records the daily routine transactions necessary to conduct business. a. Customer Relationship Management System b. Decision Support System c. Supply Chain Management Systems d. Transaction Processing System What does it mean that nonvolatile is one of the basic characteristics of data warehouse and data marts? a. Nonvolatile means that data warehouses and data marts users cannot change or update the data. b. Nonvolatile means that data warehouses and data marts maintain historical data. c. Nonvolatile means that data are collected from multiple systems and then integrated around subjects. d. Nonvolatile means that data warehouse or data marts use a multidimensional data structure. You receive an e-mail from your bank informing you that they are updating their records and need your password. Which of the following statements is true? a. The message could be a denial-of-service attack. b. The message could be a phishing attack. c. The message could be a back door attack. d. The message could be a Trojan horse attack. _____ reports summarize the performance of critical activities. a. Routine b. Detailed c. Key indicator MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 d. Exception Management Control means a. Using resources to accomplish organizational goals b. Executing specific tasks c. Long-range goals d. The ratio between the inputs and outputs What does "Data Streams" refer to? a. Data streams refers to those data that visitors and customers produce when they visit a Web site and click on hyperlinks. b. Data streams refers to problems with the media on which the data are stored c. "Data streams refers to an approach to manage information across an entire organization involving a formal set of unambiguous rules for creating, collecting, handling, and protecting its information." d. "Data streams to set of core data (e.g., customer, product, employee, vendor, geographic location, etc.) that span the enterprise information systems." Descriptive Analytics a. Summarize what has happened in the past and allow decision makers to learn from past behaviors. b. Recommends one or more courses of action and showing the likely outcome of each decision. c. Utilize a variety of analytics techniques to examine recent and historical data in order to detect patterns d. Displays results of analysis to decision makers Which of the following is false? a. Data from TPS systems feeds ERP systems. b. Information systems are only used by large organizations. c. Information systems within an organization support internal and external processes. d. Reports from information systems are used in all levels of the organization What kind deliberate threat occurs when an unauthorized individual attempts to gain illegal access to organizational information. a. Sabotage b. Espionage or Trespass c. Information Extortion d. Identity theft MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 Google was processing more than 27 petabytes of data every day. This is the _____ characteristic of Big Data. a. Volume b. Veracity c. Variety d. Velocity ____________ is a benefit of ERP. a. Cost b. Employee acceptance c. Efficiency d. Complexity ______a global WAN that connects many organizational computer networks in different countries a. Internet b. Intranet c. Extranet d. World Wide Web The major limitation of GEO satellites is which of the following? a. Internet over Satellite b. Propagation delay c. Shortest orbital life d. Footprint CRM system where communications between the organization and its customers are integrated across all aspects of marketing, sales, and customer support processes. a. Interorganizational Information System b. Collaborative CRM system c. Analytical CRM applications d. Analytical CRM system The __________ process originates in the warehouse department and ends in the accounting department. a. Return b. Procurement c. Production d. Fulfillment MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 The Management Cockpit is a special kind of _________ for _______ managers. a. Dashboard; top-level b. Dashboard; mid-level c. ERP system; mid-level d. ERP system; top-level _____ reports are produced at scheduled intervals. a. Key indicator b. Detailed c. Routine d. Exception Interaction between customers and organizations. a. Customer touch point b. Customer-facing CRM c. Interorganizational Information System d. Customer Interaction Center A type of threats, that are acts performed without malicious intent a. Deliberate threats b. Unintentional threats c. Trade secret d. Alien Software In a supply chain, distributors typically are _________ a. Internal b. Upstream c. Downstream d. Uninvolved Managers need IT support because of: a. There are many alternatives to choose from b. The amount of information to analyze is small c. The lack of training for managers d. Analysis is easily done by IT Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices. a. " high, low" b. " low, high" MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. " low, the same" d. " high, the same" One of the disadvantages of Twisted-pair wire is: a. Low bandwidth b. Inexpensive c. Widely available d. Easy to work with The primary goal of extranets is to ______. a. Enable corporate employees to view inventory information for their companies b. Provide security for corporate intranets c. Foster collaboration between and among business partners d. Provide effective communications inside corporate intranets Which of the following is an advantage of buying a prewritten application? a. Modification b. Saving time c. Control d. Integration The type of satellite that is stationary relative to a point on Earth a. IoT b. GEO c. LEO d. MEO What is the name of the IS professionals who specialize in analyzing and designing information systems? a. Stakeholders b. Programmers c. Systems Analysts d. Technical Specialists The type of decision that can be made by following a definite procedure is called a(n) ______ decision. a. Structured b. Unstructured c. Undocumented d. Semistructured MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 What kind of errors are unintentional and represent a serious threat to information security. a. Social engineering b. Human errors c. System errors d. Computer errors In which step, on the Knowledge management systems cycle, new knowledge must be placed in context so that it is actionable? a. Refine knowledge. b. Capture knowledge. c. Store knowledge. d. Manage knowledge. Which of the following statements is false? a. IT ultimately decreases the number of managers and experts b. IT makes managers more productive. c. IT decreases the number of promotional opportunities. d. IT increases the number of middle managers A _____ is sent to potential vendors inviting them to describe their product and how it would meet the firm’s needs. a. Technical specification b. Prototype c. Request for requirements d. Request for proposal Unintentional threats to information systems include all of the following except: a. Power outage b. Malicious software c. Lack of user experience d. Tailgating The Saudi Central Bank has faced many threats. The institution has started to identify, control, and minimize the impact of these threats on it's information system. To ensure that their IS security programs are cost effective, the central bank takes concrete actions against risks such as implementing different types of controls. These are process of________.? a. Audit b. Risk Management. MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Business continuity d. Multifactor authentication The electricity company is collecting your electrical usage during the month and based on that the monthly bill is generated, which method has been used? a. Batch Processing b. Distributed Processing c. Online Transaction Processing d. Customer Relationship Management System _____ is the efficient and effective execution of specific tasks. a. Operational control b. Management control c. Strategic planning d. Expertise What are the problems that database systems minimize? a. "Data redundancy, data isolations, and data consistency." b. "Data independence, data consistency, and data redundancy." c. "Data integrity, data isolation and data independency." d. "Data redundancy, data isolation, and data independency." Which protocol that manages the movement of data packets: a. Transmission Control Protocol (TCP) b. Hypertext c. URL d. HTTP Form of cross-selling where an enterprise sells a group of products or services together at a lower price than the combined individual price of the products. a. Salesforce Automation b. Bundling c. Cross-selling d. Upselling _____ consist of data that are related to demand, shipments, orders, returns, and schedules. a. Information flows b. Material flows c. Reverse flows MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 d. Financial flows Inventory Velocity is the _____at which a company can deliver products and services after receiving the materials required to make them. a. speed b. efficiency c. quality d. effectivity All of the following are Components of a CBIS except_______ a. Hardware b. Software c. Mathematics d. Database _____ is the component of an operational CRM system that automatically records all the aspects in a sales transaction process. a. Inbound telesales b. Outbound telesales c. The customer help desk d. Sales team efforts Which one from below is NOT the disadvantages of microwave a. High bandwidth b. Susceptible to environmental c. Must have unobstructed line of sight d. interference If customers can communicate directly with the company to initiate a sales order, inquire about products and services before placing an order, and obtain information about a transaction they have already made, it is called _________. a. outbound telesales b. a configurator c. a contact management system d. inbound teleservice ___________ enable customers to model the product to meet their specific needs. a. Inbound teleservice b. A contact management system c. A sales lead tracking system MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 d. Configurators are working in the IT organization. You have to maintain the IS of the organization. Attacker try to records the keystrokes and record the internet web browsing history. Attacker purpose to range from criminals such like theft of passwords and sensitive personal information such as credit card no. What kind of software attack is ________? a. Spam b. Spyware c. Cookies d. Adware Value chain support activities includes: a. Procurement b. Services c. Marketing d. Operations In the _____ stage of the systems development life cycle, the design specifications are translated into computer code. a. Systems analysis b. Prototyping c. Systems design d. Programming Which network application(s) enable(s) users to access information located in databases all over the world? a. Discovery b. Communications c. Collaboration d. Web services A(n) _____ provides rapid access to timely information and direct access to management reports. a. Digital dashboard b. Data warehouse c. Expert system d. Decision support system Game companies do more than simply track customers' preferences and customize its offerings accordingly. To induce players to play longer and to try more games, the MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 company uses the data to watch for signs that players are tiring. By measuring how frequently and how quickly players press on their screens, GSN can predict when they are likely to lose interest. It then suggests other games before players reach that point. The games are free, but GSN displays ads and sells virtual items that are useful to players. Therefore, the longer the company can persuade someone to play, the more money it makes. In this case, to know customer behavior and perceptions, this case has used: a. Analytical CRM systems b. Customer-facing CRM applications c. Threat of entry of new competitors d. Interorganizational Information System CRM software whose source code is available to developers and users. a. Open-source CRM system b. Operational CRM system c. Real-time CRM system d. On-demand CRM system Any illegal activities conducted over computer networks is a definition of: a. Cybercrime b. Adware c. Audit d. Software Attacks Abdullah works in the sales organization of a mid-size company. The company has decided to replace its existing sales support system. Abdullah is working with the analysts in IS to understand the human issues of proposed software applications. This is called _______feasibility. a. Behavioral b. Technical c. Organizational d. Economic You are a company that makes plastic children toys and sell them in bulk to other businesses. Some times customers receive toys that are damaged or have missing parts and they end up returning those products to your company. This kind of flow is: a. technical flow b. reverse flow c. financial flow d. information flow MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 In _____, company representatives use multiple communication channels to support their customers’ communications preferences. a. Videoconferencing centers b. Group decision support rooms c. Telesales rooms d. Customer interaction centers Advantages of Radio wireless connection a. High bandwidth b. Electrical interference issues c. Snooping unless encrypted d. Expensive and hard to install CBIS stands for______ a. Counting-Based Information System b. Computer-Based Information System c. Caution-Based Information System d. Candidate-Based Information System Which of the following is not a goal of supply chain management? a. to increase cycle time b. to improve customer service c. to decrease inventory levels d. to improve business processes The characteristics of ERP systems include all of the following except: a. Integrating the planning, management, and use of all resources of the organization b. They are expensive and time-consuming c. Typically fitting an organization’s existing business processes d. Providing information necessary to control the business processes of the organization _________ the probability that a threat will impact an information resource. a. Risk mitigation b. Risk analysis c. Risk management d. Risk LinkedIn is an example of which system a. Recruiting system b. HR Development system c. Employee relationship management MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 d. HR Planning system Enterprise resource planning systems take a(n) _____ view of the overall organization. a. Transactional b. Functional c. Management d. Business process Which of the following is false? a. Information systems within an organization support internal and external processes. b. Data from TPS systems feeds ERP systems. c. Reports from information systems are used in all levels of the organization d. Information systems are only used by large organizations. In a supply chain, retailers typically are __________ a. Internal b. Upstream c. Downstream d. Uninvolved Data collected from hotel reservations, payroll, employee record, and shipping is an example of which system a. Customer Relationship Management System b. Decision Support System c. Supply Chain Management Systems d. Transaction Processing System _______analytics are the first step in data reduction. a. Descriptive b. Delineative c. Predictive d. Prescriptive _____ portals offer content for diverse communities and are intended for broad audiences. a. Commercial b. Corporate c. Affinity d. Industrywide What is the name of the experts on a certain type of technology, such as databases or MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 telecommunications? a. Stakeholders b. Systems Analysts c. Technical Specialists d. Programmers The phases of decision making ends with: a. Implementation b. Intelligence c. Design d. Choice Crowdsourcing is part of the __________ network application category. a. Collaboration b. Discovery c. Communications d. Education A protocol is: a. A standard set of rules and procedures for the control of communications in a network. b. A device that handles the switching of voice and data in a local area network. c. A communications service for the connection of devices in a local area network. d. The main communications channel in a wide-area network. The ________ function is responsible for making sure customers are aware of the company's products. a. Human Resource Management b. Production/Operations Management c. Marketing d. Accounting and Finance Combine models and data to analyze semistructured problems and some unstructured problems that involve extensive user involvement is the definition of a. Decision Support Systems b. Online Analytical Processing c. Multidimensional analysis d. Data Mining One of the advantages of Twisted-pair wire is: a. Inexpensive MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 b. Low bandwidth c. Low security d. Subject to interference Hanan received a SMS message from her bank claiming that her bank account needs to be updated To do so, they asked Hanan to send her account details to the mobile number attached with the SMS. Hanan respond to them with all her details but unfortunately she realized that this was an attack. This type of attack commonly known as: a. Software Attacks b. Social Engineering c. Deliberate threats d. Alien Software One of the advantages of Coaxial Cable is: a. Higher bandwidth than twisted-pair b. Easily tapped c. Inflexible d. Easy to work with You own a company that creates mobile phone accessories in Riyadh. You purchase raw materials like beads from another company in Jeddah. This means that your company is a part of the _______ segment of the supply chain, and the beads company is _________. a. "downstream, upstream" b. "internal, upstream" c. "upstream, downstream" d. "internal, downstream" The _________ known as make-to-stock, the production process begins with a forecast, which is simply an educated guess as to customer demand. a. Flow Model b. Push Model c. Delivery Model d. Pull Model The IT steering committee is comprised of __________. a. board members b. administrative assistants and other IT users c. "IT administrators, programmers, and analysts" d. managers and staff from the organizational units The following are benefits of Electronic Data Interchange except MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 a. Reduces cycle time b. Increases productivity c. Many standards d. Minimizes data entry errors The type of satellite that is least expensive to build and launch a. MEO b. GEO c. LEO d. IoT Hanan noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. Hanan orders 40 ties in each of the school colors and 10 in each of four sports. She almost instantly sells out of all the sportthemed ties. She decides to approach each of the sports teams on campus to see if they would be willing to buy ties “in bulk.” Which of the following is true about Hanan’s supply chain as it relates to her new idea of having bulk sales? a. Hanan is using a pull model. b. Hanan is experiencing the bull-whip effect. c. Hanan has an accurate demand forecast. d. Hanan is using a push model. ____________ is a business strategy in which a company purchases its upstream suppliers to ensure that its essential supplies are available as soon as the company needs them. a. Sell-on-demand inventory b. Make-to-order inventory c. Just-In-Time inventory d. Vertical integration Which of the following is NOT true of Big Data? a. Relational databases easily handle Big Data. b. It is generated at high velocity with an uncertain pattern. c. "It includes structured, unstructured, and semi-structured data." d. "Sophisticated information systems capture, process, transform, and analyze Big Data." Ali has a coffee shop and wants to share the menu that is available on his website with his customers. What kind of medium Ali would use to easily share the menu with his clients? a. IoT MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 b. QR code c. Bar code d. RFID CRM operation where organizational representatives use multiple communication channels to interact with customers in functions such. a. Customer Interaction Center b. Real-time CRM system c. Electronic CRM d. Mobile CRM system You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should start with a. Select the functions of the system you wish to use b. Consider quality c. The planning and development is only with the top management d. Consider cost cutting ______ provide computing services for user PCs, called _______. a. Servers; clients b. Clients; peers c. Clients; servers d. Servers; peers CRM system that analyzes customer behavior and perceptions in order to provide actionable business intelligence. a. Analytical CRM system b. Electronic CRM c. Mobile CRM system d. Collaborative CRM system Which of the following is not a basic role of managers? a. Processor b. Informational c. Interpersonal d. Decisional Transfer the risk by using other means to compensate for the loss, such as by purchasing insurance is the process of: a. Risk analysis MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 b. Risk mitigation c. Risk acceptance d. Risk transference If you accidently connect to someone else’s hotspot and they collect your usernames, passwords, and account numbers while you are online, this is called ________. a. Eavesdropping b. Rogue access devices c. Evil twin attack d. RF jamming Which of the following is Not the process of risk management? a. Risk control b. Control evaluation c. Risk analysis d. Risk mitigation The property created by individuals or corporations that is protected under trade secret, patent, and copyright laws are called. a. Trade secret b. Copyright c. Patent d. Intellectual property Porter’s Five Forces Model includes: a. The threat of new competitors b. The threat of new employees c. The threat of new technology d. The threat of new complaints Which of the following can help you choose a product a. Decision support system b. Transaction processing system c. Office automation system d. Dashboard System Which of the following is NOT a reason managing data is difficult? a. Data is usually structured but hard to identify. b. Data are generated from multiple sources. c. Data are scattered throughout organizations. MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 d. d. The amount of data increases exponentially over time. Customers directly interact with the organization, including customer service and support, sales force automation, marketing, and campaign management. a. Collaborative CRM applications b. Customer-facing CRM applications c. Customer-touching CRM applications d. Campaign management applications _________ refers to illegal activities conducted over computer networks, particularly the Internet. a. Vulnerability b. Security c. Threat d. Cybercrime In which step, on the Knowledge management systems cycle, the knowledge must be kept current. It must be reviewed regularly to verify that it is relevant and accurate.? a. Manage knowledge. b. Refine knowledge. c. Store knowledge. d. Capture knowledge. Which of the following is not an advantage of IoT? a. Security b. Improved Customer Engagement c. Reduced Waste d. Enhanced Data Collection Which of the organizational area pose the greater risk? a. Social engineering b. Human resources c. Hardware threats d. Human error _______ responsible for addressing, routing and packaging data packets. a. Internet Layer b. Transport Layer c. Application Layer d. Network Interface Layer MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 Which one is define the chain of events linking planning to protection and to recovery. a. Controls evaluation b. Business continuity c. Risk management d. Audit Game companies do more than simply track customers' preferences and customize its offerings accordingly. To induce players to play longer and to try more games, the company uses the data to watch for signs that players are tiring. By measuring how frequently and how quickly players press on their screens, GSN can predict when they are likely to lose interest. It then suggests other games before players reach that point. The games are free, but GSN displays ads and sells virtual items that are useful to players. Therefore, the longer the company can persuade someone to play, the more money it makes. This is: a. Advantages of persuasive technologies to consumers. b. Disadvantages of persuasive technologies to companies. c. Advantages of persuasive technologies to both companies and consumers. d. Disadvantages of persuasive technologies to consumers. CRM applications that help organizations plan marketing campaigns that send the right messages to the right people through the right channels. a. Analytical CRM applications b. Campaign management applications c. Customer-touching CRM applications d. Customer-facing CRM applications An intellectual work, such as a business plan, that is a company secret and is not based on public information is know as. a. Patent b. Trade secret c. Intellectual property d. Copyright __________ integrates all functional areas of the organization. a. Enterprise resource planning b. Supply chain management system c. Expert system d. Electronic commerce system MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 Which strategy for competitive advantage involves offering different products, services, or product features? a. Differentiation b. Cost leadership c. Operational effectiveness d. Innovation Which one is an example of communications control: a. Adware b. Firewall c. Authorization d. smart ID cards Lower CASE tools handle the _______ stages of the SDLC. a. "Design, programming and testing, and implementation" b. Analysis and design c. Analysis and investigation d. "Implementation, programming and testing, and operation and maintenance" _____ refers to efforts by unauthorized users to access data traveling over wireless networks. a. Telemetry b. War driving c. Eavesdropping d. Rogue access devices Producing a bill of materials is a business process in which of the following functional areas a. Human Resource Management b. Accounting and Finance c. Marketing d. Production/Operations Management Abdullah works in the sales organization of a mid-size company. The company has decided to replace its existing sales support system. Of the seven sales offices, only Abdullah’s is going to run it at first. What type of implementation is his company using? a. Pilot b. Direct c. Parallel d. Phased MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 _____use internal batteries for power, and they broadcast radio waves to a reader. a. Passive QR codes b. Passive RFID tags c. Active RFID tags d. Active QR codes Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a. Explicit b. Tacit c. Managerial d. Geographical When Danube supermarket sells a package of tissues, the company captures data on that sale at its point-of-sale terminal and transmits those data to the company that makes the tissues. When inventory gets too low, the tissue company ships more tissues in that Danube store. This process is called: a. Vendor-managed inventory b. Enterprise resource planning inventory c. Just-in-time inventory d. Demand chain management A _____ is an official document that grants the holder exclusive rights on an invention for a specified period of time a. Intellectual property b. Patent c. Trade secret d. Copyright Ali and his friend, Ahmad, run a coffee shop, and they recently added Wi-Fi. Ahmad says he’s heard people trying to interfere with other people’s wireless transmissions. You tell him this is called a. Rogue access devices b. Cybersquatting c. Eavesdropping d. RF jamming Which of the following statements is false? a. Competitive advantage enables a company to function ineffectively within a market. b. "Competitive advantage is based on some measurement such as cost, quality, or speed." MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Competitive advantage leads to higher-than-average profits. d. Competitive advantage applies to companies of all sizes. The _______ is a fixed report, regularly scheduled based on data extracted and summarized from the firm's underlying transaction processing systems. a. Comparative Report b. Drill Down Report c. Routine Report d. Key Indicator Report Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes? a. Operational effectiveness b. Cost leadership c. Differentiation d. Innovation One of the four common approaches to conduct a cost-benefit analysis. This analysis determines the point at which cumulative dollar value of the benefits from project equals the investment made in the project. Which approach is described here? a. Return on investment b. Net present value c. Breakeven analysis d. The business case approach Which of the following is the correct order of the KMS cycle? a. "create, capture, refine, store, manage, disseminate" b. " create, capture, refine, store, disseminate, manage" c. "capture, create, refine, store, disseminate, manage" d. "capture, create, refine, store, manage, disseminate" The Management Cockpit best exemplifies which type of system? a. Digital dashboard b. Expert system c. Decision support system d. Functional area information system If a company rents ERP software, this is called _________ ERP implementation. a. Vanilla b. SaaS MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. EaaS d. Best-of-breed Ali has taken a job with her ideal company and is excited to start in their sales department. Ali is going to be spending some of his time maintaining the Web site to promote the company’s products and increase online sales. During orientation, he is told that the company is very proud of their ERP system from SAP. Which one of the modules listed below will process the data from online sales? a. Customer relationship management b. E-Business c. Business intelligence d. Human resource management ________is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. a. Cybercrime b. Social Engineering c. Adware d. Software Attacks What does adding functions to the initiated project may cause? a. Scrum b. Agile c. Scope creep d. Feasibility The practice of marketing additional related products to customers based on a previous purchase. a. Down-selling b. Cross-selling c. Upselling d. Bundling The retailer chain for clothing named XYZ has noticed that one of its brands of clothes is not selling nearly as well as anticipated. which of the following systems will you use to determine the reason for the poor sales a. Transaction Processing System b. Customer Relationship Management System c. Supply Chain Management Systems d. Enterprise Resource Planning MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 Data types stored in _______ include numbers, text, and URLs a. QR code b. RFID c. Bar code d. IoT It is the primary task of the systems investigation initial stage of the traditional SDLC. The study is an analysis to find the best fit solution to address the business problem. The study provide rough assessment of the project’s technical, economical, and behavioral aspects. What is the name of described study? a. Agile b. Scrum c. Scope creep d. Feasibility Disadvantages of Radio connection a. Signals pass through walls b. Creates electrical interference problems c. High bandwidth d. Inexpensive and easy to install Electronic Data Interchange is a communication standard that enables business partners to __________ a. Access extranets b. Ship goods c. Access intranets d. Exchange routine documents The __________ component of SCM is also called logistics. a. Sourcing b. Delivering c. Returning d. Making __________ a strategy to minimize inventories deliver the precise number of parts. a. Sell-on-demand inventory b. Vertical inventory c. Make-to-order inventory d. Just-In-Time inventory MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 When the chief financial officer of a company wants a report on business units who have spent 10 percent more than their allotted budget, she would be requesting which type of report? a. Routine b. Exception c. Comparative d. Key indicator _____________ connects parts of the intranets of different organizations which enables business partners to communicate securely over the Internet using virtual private networks (VPNs). a. Extranet b. Internet c. Intranet d. World Wide Web Operational Control means a. Executing specific tasks b. Using resources to accomplish organizational goals c. Long-range goals d. The ratio between the inputs and outputs What is the name of the IS professionals who either modify existing computer programs or write new programs to satisfy user requirements? a. Stakeholders b. Systems Analysts c. Programmers d. Technical Specialists Which of the following is not an example of business IT alignment? a. The company views IT as a way to support the business but not as a way to create new revenue streams. b. The company goals are clear to every IT and business employee. c. The company ensures that IT employees understand how the company makes money. d. The company views customer service as extremely important. Dashboards are used to a. Visualize data b. Save results of analysis MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 c. Upload data to servers d. Analyze big data Which of the following is the right order of the System development life cycle stages? a. "Programming and testing, implementation, operation and maintenance, Systems investigation, systems analysis, and systems design" b. "Programming and testing, implementation, systems investigation, systems analysis, systems design, operation and maintenance" c. "Systems investigation, programming and testing, implementation, systems analysis, systems design, operation and maintenance" d. "Systems investigation, systems analysis, systems design, programming and testing, implementation, operation and maintenance" ___________ the degree of protection against criminal activity, danger, damage, and/or loss. a. Vulnerability b. Cybercrime c. Threat d. Security To make a good decision you will begin with answering which question? a. What is the problem? b. Which implementation of the solution should I choose? c. Which solution do I choose? d. what are my options? One of the three basic roles of mangers in business analytics is: a. Informational role b. Predictive role c. Productive role d. Prescriptive role Potential problems with on-demand CRM include all of the following except: a. Giving strategic data to a vendor is risky. b. The vendor could prove unreliable. c. It is difficult to modify hosted software. d. It increases costs for the organization A component of CRM that supports the front-office business processes that directly interact with customers. MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 a. Operational CRM system b. Open-source CRM system c. On-demand CRM system d. Real-time CRM system Which of the following is NOT consider the category of software attacks? a. Remote Attacks Requiring User Action b. Attacks by a Programmer Developing a System c. Remote Attacks Needing No User Action d. Alien software Prescriptive Analytics a. Recommends one or more courses of action and showing the likely outcome of each decision. b. Summarize what has happened in the past and allow decision makers to learn from past behaviors. c. Utilize a variety of analytics techniques to examine recent and historical data in order to detect patterns d. Displays results of analysis to decision makers A manager from an MNC was demonstrating to his team about a future technology which means accessing and controlling daily usable equipment’s and devices using Internet. Which of the technology he was talking about. a. Interaction of Things b. Introduction of Things c. Internet of Tracking d. Internet of Things The strategy that enables manufacturers to share product-related data that support product design and development and supply chain operations is the definition of a. Inventory Management b. Planning Production and Operations c. Computer-Integrated Manufacturing d. Product Lifecycle Management Maintaining the organization's financial records is a central purpose of which main business function a. Human Resource Management b. Marketing c. Accounting and Finance d. Production/Operations Management MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 If someone uses a Wi-Fi detector to search for an unprotected wireless network and then intrudes on that network, it is called _________. a. Eavesdropping b. Rogue access devices c. War driving d. RF jamming An examination of information systems, their inputs, outputs, and processing is referred as: a. Risk transference b. Audit c. Risk mitigation d. Risk acceptance The threat of competitors’ entering the automobile manufacturing industry is _____ because barriers to entry are so _____. a. " low, high" b. " high, low" c. " high, high" d. "low, low" Which one is an example of deliberate threats: a. Social Engineering b. Software Attacks c. Audit d. Human errors A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business. a. ERP b. CRM c. DSS d. SCM What is the name of the process that describes how the system will resolve the problem? a. User requirements b. Deliverables c. Systems analysis d. Systems Design MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 One of the roles of manager is Decisional role which means to be a(n): a. Negotiator b. Liaison c. Analyzer d. Monitor Demand for a product can be influenced by numerous factors such as competition, price, and weather conditions, this influence can be used to determine a. technology forecast b. Demand forecast c. Economic forecast d. Supply forecast A statutory grant that provides the creators or owners of intellectual property with ownership of the property, also for a designated period is called. a. Patent b. Trade secret c. Intellectual property d. Copyright Which of the following is not a process within an information system for Human Resource Management? a. Recruitment b. Firing decisions c. Training d. Benefits administration Your friend works in the risk management department for a mid-size financial institution. She said it’s an interesting job – she has to put a value on each asset (information included), determine a probability that it would get compromised, and compare that to the cost of protecting that asset. This process is called a. Risk acceptance b. Risk analysis. c. Risk limitation. d. Risk transference. The type of satellite that has shortest orbital life a. IoT b. LEO c. MEO d. GEO MIS201 – FINAL EXAM -SUMMER TERM 21 – REVIEWED BLUE 72 Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes a. DSS b. CRM c. ERP d. SCM CRM system enabling organizations to respond to customer product searches and requests immediately as it possible. a. Real-time CRM system b. On-demand CRM system c. Interorganizational Information System d. Mobile CRM system..вℓυє⁷².. Information Systems-mis201 Final exam MULTIPLE CHOICE QUESTIONS 1\ In practice, most people use the _______ to estimate the cost of equity if the result is going to be used in the discount rate for evaluating a project. 1. Capital Asset Pricing Model (CAPM) 2. Constant-Growth Dividend Model 3. Multistage-Growth Dividend Model 4. Weighted Average Cost of Capital 2\ Choose the correct answer. 1. State all project cash flows as nominal dollars and discount them using a nominal interest rate. 2. State all project cash flows as real dollars and discount them using a nominal interest rate. 3. State all project cash flows as nominal dollars and discount them using a real interest rate. 4. State all project cash flows as nominal dollars and multiply them using a real interest rate. 3\ Financial markets in which low-risk securities with maturities of less than one year are traded, are called: 1. Money markets 2. Capital markets 3. Commercial markets 4. Labor markets 4\ A project for which the decision to accept one project is simultaneously a decision to reject another project is a definition of 1. Independent projects 2. Mutually exclusive projects 3. Contingent projects 4. Real Estate projects 5\_________ the difference between the offering price and the closing price at the end of the first day of the IPO. 1. Underwriting spread 2. Out-of-pocket expenses 3. Underpricing 4. Syndication 6\ When a firm distributes value through a dividend, it ________ the value of the stockholders’ claims against the firm. 1. increases 2. doubles 3. reduces 4. eliminates 7\_________Uses accounting numbers to compute the return on a capital project rather than cash flow data 1. IRR 2. NPV 3. Payback 4. Accounting Rate of Return 8\ identify the incorrect statement. 1. Allocated costs such as corporate overhead should be not included in cash flow calculations. 2. The impact of a project on another project's cash flows should not be ignored. 3. Free cash flow equals cash flow from operations plus required investments. 4. Accounting earnings are a not reliable measure of the 9\ costs and benefits of a project. The Ordinary Payback Period 1. Takes Time Value of Money into account 2. Ignores Time Value of Money 3. Is applicable only on independent projects 4. Is applicable only on Contingent projects 10\ A bond with coupon payments fixed for the life of the bond and that repay principal and retire the bonds at maturity is called __________bond. 1. Zero-coupon 2. Callable 3. Vanilla 4. Convertible 11\ Faisal recently purchased lights that can be controlled wirelessly. His lights can change colors by voice or using an app on his phone. What is the technology that Faisal is using? 1. Radio frequency 2. WiMAX 3. Wi-Fi 4. IoT 12\ Customer-touching CRM applications are also called ____ CRM applications. 1. traditional 2. collaborative 3. analytical 4. electronic 13\ Which of the organizational area pose the greater risk? 1. Social engineering 2. Human error 3. Human resources 4. Hardware threats 14\ Has the smallest range of any short-range wireless networks, and is designed to be embedded in mobile devices such as cell phones and credit cards 1. Ultra-Wideband 2. Bluetooth 3. Near-Field Communications 4. WiMAX 15\______ is a risk of open-source CRM systems. 1. Customization 2. Variety 3. Cost 4. Quality control 16\ A ___ is a connecting system (wireline or wireless) that permits different computers to share resources. 1. Software 2. Roles 3. Hardware 4. Network 17\ The major limitation of GEO satellites is which of the following? 1. Internet over Satellite 2. Propagation delay 3. Footprint 4. Shortest orbital life 18\ Distribution Portal is considered _________ in the supply chain 1. Downstream 2. Internal 3. Uninvolved 4. Upstream 19\ Business partners who use the extranet as a vehicle for communication and collaboration are called 1. Industries 2. Joint Ventures 3. collaborators 4. Businesses 20\ In the _ stage of the systems development life cycle, the design specifications are translated into computer code. 1. Prototyping 2. Systems design 3. Systems analysis 4. Programming 21\_______analytics are the first step in data reduction. 1. Descriptive 2. Delineative 3. Predictive 4. Prescriptive 22\_ consist of data that are related to demand, shipments, orders, returns, and schedules. 1. Financial flows 2. Information flows 3. Reverse flows 4. Material flows 23\ A(n) _ provides rapid access to timely information and direct access to management reports. 1. Digital dashboard 2. Data warehouse 3. Expert system 4. Decision support system 24\ If customers can communicate directly with the company to initiate a sales order, inquire about products and services before placing an order, and obtain information about a transaction they have already made, it is called _____. 1. outbound telesales 2. a contact management system 3. inbound teleservice 4. a configurator 25\ To utilize financial data from different countries to convert currencies using financial and accounting systems is under which category 1. Financial Planning and Budgeting 2. Managing Financial Transactions 3. Investment Management 4. Control and Auditing 26\_______ enable customers to model the product to meet their specific needs. 1. A contact management system 2. Inbound teleservice 3. A sales lead tracking system 4. Configurators 27\ Procurement Portal is considered _________ in the supply chain 1. Uninvolved 2. Downstream 3. Upstream 4. Internal 28\ The type of satellite that is used for Television signals 1. GEO 2. LEO 3. IoT 4. MEO 29\ Inventory Velocity is the _____at which a company can deliver products and services after receiving the materials required to make them. 1. speed 2. efficiency 3. quality 4. effectivity 30\ The Management Cockpit best exemplifies which type of system? 1. Digital dashboard 2. Expert system 3. Decision support system 4. Functional area information system 31\ Defining the _________ is the first stage in the information systems planning process. 1. IT strategic plan 2. IT architecture 3. Organization’s operational plan 4. Organization’s mission 32\ The _ approach to systems development is a group-based tool for collecting user requirements. 1. Rapid application development 2. Integrated computer-assisted software engineering 3. Prototyping 4. Joint application design 33\ An intellectual work, such as a business plan, that is a company secret and is not based on public information is know as. 1. Trade secret 2. Intellectual property 3. Patent 4. Copyright 34\ The Saudi Central Bank has faced many threats. The institution has started to identify, control, and minimize the impact of these threats on it's information system. To ensure that their IS security programs are cost effective, the central bank takes concrete actions against risks such as implementing different types of controls. These are process of________.? 1. Business continuity 2. Audit 3. Multifactor authentication 4. Risk Management. 35\ Ali is an information specialist, and he is working in Brightona accounting firm. His manager asked him to create a list of the applications that have to be added or modified if they already exist. What is the list that Ali is generating could be called? 1. Application portfolio 2. System design 3. Requirements 4. Feasibility study 36\ The retailer chain for clothing named XYZ has noticed that one of its brands of clothes is not selling nearly as well as anticipated. which of the following systems will you use to determine the reason for the poor sales 1. Enterprise Resource Planning 2. Customer Relationship Management System 3. Transaction Processing System 4. Supply Chain Management Systems 37\ Systems design answers the question, _: 1. What is the effective operational life of the system? 2. How much will the information system cost? 3. Who will benefit from use of the information system being developed? 4. How will the information system resolve the business problem? 38\ The CDC company has implemented a very strong security system. The company focuses on building the security system as of having access control, physical control, adding some encryption techniques and a firewall to protect its network. However, the company still receives a lot of attacks. What do you think the reason behind these threats which the company should have considered from the first time? 1. Business continuity 2. Anti-malware Systems 3. Employee training and education. 4. Smart ID cards 39\ A(n) ____ performs and records the daily routine transactions necessary to conduct business. 1. Supply Chain Management Systems 2. Transaction Processing System 3. Decision Support System 4. Customer Relationship Management System 40\ Digital dashboards provide all of the following capabilities except: 1. Transaction processing 2. Drill-down 3. Status access 4. Exception reporting 41\ In a typical IS operational plan, what is a listing of who is going to do what, how, and when in atypical IS operational plan? 1. Constraints on the IS function 2. Recourse allocation and project management 3. The application portfolio 4. Objective of the IS function 42\ When the chief financial officer of a company wants a report on business units who have spent 10 percent more than their allotted budget, she would be requesting which type of report? 1. Exception 2. Routine 3. Comparative 4. Key indicator 43\ Which of the following is the right order of the System development life cycle stages? 1. "Programming and testing, implementation, systems investigation, systems analysis, systems design, operation and maintenance" 2. "Systems investigation, systems analysis, systems design, programming and testing, implementation, operation and maintenance" 3. "Systems investigation, programming and testing, implementation, systems analysis, systems design, operation and maintenance" 4. "Programming and testing, implementation, operation and maintenance, Systems investigation, systems analysis, and systems design" 44\ Ali has taken a job with his ideal company and is excited to start in their sales department. During orientation, he is told that the company is very proud of their ERP system from SAP. Which one of the modules listed below handled the data for Ali’s hire in the sales department? 1. Human resource management 2. Business intelligence 3. Operations management 4. Customer relationship management 45\ An examination of information systems, their inputs, outputs, and processing is referred as: 1. Risk transference 2. Risk acceptance 3. Risk mitigation 4. Audit 46\ Business transactions that are processed as they occur is an example of 1. Batch processing 2. ESS 3. Source data automation 4. OLTP 47\ Which of the following statem