Management Information Systems 7th Edition by Kenneth J. Sousa - Test Bank

Management Information Systems 7th Edition by Kenneth J. Sousa - Test Bank   Instant Download - Complete Test Bank With Answers     Sample Questions Are Posted Below   Domain names always start with www. True False   ANSWER:  False   File Transfer Protocol (FTP) is a common way of transmitting files from one computer …

$19.99

Management Information Systems 7th Edition by Kenneth J. Sousa – Test Bank

 

Instant Download – Complete Test Bank With Answers

 

 

Sample Questions Are Posted Below

 

  1. Domain names always start with www.
    1. True
    2. False

 

ANSWER:  False

 

  1. File Transfer Protocol (FTP) is a common way of transmitting files from one computer to another.
    1. True
    2. False

 

ANSWER:  True

 

  1. RSS software called an aggregator or feed reader automatically checks for new content and downloads files from a designated site in the same way as is done for text files from online newspapers.
    1. True
    2. False

 

ANSWER:  True

 

  1. Instant messaging (IM) offers users real-time online interactivity.
    1. True
    2. False

 

ANSWER:  True

 

  1. Cookies are always temporary; they are installed only for one session, and are removed when the user leaves the
    1. True
    2. False

 

ANSWER:  False

 

  1. Third-party cookies can collect users’ browsing and shopping habits across many websites.
    1. True
    2. False

 

ANSWER:  True

 

  1. Consumers of the final goods and services are involved in B2B trading.
    1. True
    2. False

 

ANSWER:  False

 

 

 

  1. Traditional retailers, often called brick­and­mortar businesses, have extended their “storefront” by launching an e­ tailing arm.
    1. True
    2. False

 

ANSWER:  True

 

  1. An exchange is an extranet for organizations that offer for sale and bid on products and services of a particular type.
    1. True
    2. False

 

ANSWER:  True

 

  1. Companies in the same industry competitors often collaborate in establishing a website for one or several purposes.
    1. True
    2. False

 

ANSWER:  True

 

  1. An important element of online retailing is the absence of a selection facility similar to a brick-and-mortar store.
    1. True
    2. False

 

ANSWER:  False

 

  1. Affiliates are compensated in many ways such as pay per sale, pay per click, and pay per lead.
    1. True
    2. False

 

ANSWER:  True

 

  1. Similar to auctions among companies, some Web sites serve as auction hubs for individuals.
    1. True
    2. False

 

ANSWER:  True

 

  1. The electronic bill presentment and payment allows bills to be presented automatically, directly from the companies’ information systems to payers’ email addresses, and therefore save labor, paper, and postage.
    1. True
    2. False

 

ANSWER:  True

 

  1. Mobile commerce allows people to use their mobile devices to experience an event and react immediately.
    1. True
    2. False

 

ANSWER:  True

  1. Mirror servers run unique applications that are unavailable on any other server.
    1. True
    2. False

 

ANSWER:  False

 

  1. In dedicated hosting the host dedicates a server to the client, and the client can fully control the content on the server’s disks.
    1. True
    2. False

 

ANSWER:  True

 

  1. Renters of dedicated servers usually have root access, which means they act as unrestricted administrators of that
    1. True
    2. False

 

ANSWER:  True

 

  1. Technical support involves the quality of the equipment that the hosting company provides, security measures it maintains the sophistication of server and load management, and the technical skills of its personnel.
    1. True
    2. False

 

ANSWER:  True

 

  1. Few hosting firms provide subscribers with e-mail addresses.
    1. True
    2. False

 

ANSWER:  False

 

  1.          is a secured protocol used for confidential transactions.
    1. HTTPS HTTP
    2. FTP d. VOIP

 

ANSWER:  a

 

  1.          determines the look and location of text, pictures, animations, and other elements on a Web page.
    1. Uniform Resource Locator (URL) Hypertext Markup Language (HTML)
    2. Extensible Markup Language (XML) d. Hypertext Transfer Protocol (HTTP)

 

ANSWER:  b

 

 

 

  1. Every time you download a file from a Web site or attach files to e-mail, you are using a(n)
    1. TCP NNTP
    2. FTP d. POP

 

ANSWER:  c

 

  1.          software notifies bloggers when their posts have been mentioned elsewhere on the Web, so they and their readers can extend the discussion beyond the original blog.
    1. RSS Spyware
    2. Clickstream d. Trackback

 

ANSWER:  d

 

  1. While blogging is publishing text and other visual material, is publishing sound and video.
    1. hosting posting
    2. crowdsourcing d. podcasting

 

ANSWER:  d

 

  1.          might be thought of as “real­time e­mail,” because, unlike e­mail, it is synchronous in exchanging information.
    1. RSS feeds Podcasting
    2. Instant messaging d. E-Tailing

 

ANSWER:  c

 

  1.          often help ensure that a user does not receive the same unsolicited information multiple times.
    1. Phishing Cookies
    2. Hosting d. Podcasts

 

ANSWER:  b

 

  1.          includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.
    1. Spyware Honeypot
    2. Groupware d. Honeytoken

 

ANSWER:  a

 

  1. In the context of B2B trading, online advertising is done mainly in two ways: through and through banners.
    1. e-mail search engines
    2. spam d. newsgroups

 

ANSWER:  b

 

 

 

  1.         , which is any form of advertising through an online search site, is regarded by businesses as highly effective.
    1. Search advertising Location-based advertising
    2. Near-field advertising d. Reach advertising

 

ANSWER:  a

 

  1. The most basic metric that can be measured at a site is the number of .
    1. impressions podcasts
    2. servers d. cookies

 

ANSWER:  a

 

  1. A(n) is a network used only by the employees of an organization.
    1. extranet intranet
    2. internet d. supranet

 

ANSWER:  b

 

  1. An extranet might be viewed as connecting of business partners.
    1. usenets internets
    2. intranets d. supernets

 

ANSWER:  c

 

  1. Companies that sell online maintain large warehouses and pay for picking, packing, and shipping, three activities known as _____.
    1. auctioning pure play
    2. profiling d. fulfillment

 

ANSWER:  d

 

  1. While might sound benign, many privacy advocates claim that it violates privacy rights.
    1. cookie profiling reverse auctioning
    2. load balancing d. consumer profiling

 

ANSWER:  d

 

  1. Businesses such as Amazon.com and Buy.com that transact business only through an online environment are called

          retailers.

  1. big data pure play
  2. brick-and-mortar d. structured

 

ANSWER:  b

 

 

 

  1.          is a process for outsourcing a variety of tasks to a distributed group of people, both online or offline.
    1. Crowdsourcing Debugging
    2. Consumer profiling d. Load balancing

 

ANSWER:  a

 

  1.          is the term for any unsolicited commercial email.
    1. Spam Phishing
    2. Adware d. Spyware

 

ANSWER:  a

 

  1. The purpose of a(n) is to create the impression that the client maintains its own server.
    1. proxy server virtual private server
    2. dynamic server d. mirror server

 

ANSWER:  b

 

  1.          enables business partners to set standards for data formats in Web pages.
    1. Perl CGI
    2. XML d. SQL

 

ANSWER:  c

 

  1.          transfers visitor inquiries from a busy server to a less busy server for identical information and services.
    1. Load balancing Shared hosting
    2. Pure playing d. Co-location

 

ANSWER:  a

 

  1. In , the hosting company owns the server and the server management software.
    1. virtual private server hosting shared hosting
    2. dedicated hosting d. co-location

 

ANSWER:  b

 

  1. Some companies might want to use entire physical servers all for themselves and therefore can opt for .
    1. shared hosting progressive hosting
    2. dedicated hosting d. virtual private server hosting

 

ANSWER:  c

 

  1. A service is usually the most expensive of hosting options.
    1. Co-location Virtual private server hosting
    2. Shared Hosting d. Dedicated hosting

 

ANSWER:  a

 

 

 

  1. The customer’s ability to determine the timing and services of their needs from a business organization through a website is referred to as .
    1. customer profiling fulfillment
    2. customer impression d. self-service

 

ANSWER:  d

 

  1. Some hosting companies charge extra fees for shared hosting if the site experiences activity above a predetermined amount of data that is transferred, or number of visits from Web surfers, known as .
    1. spots deals
    2. hits d. stops

 

ANSWER:  c

 

  1. On the Web, includes identifying the sites your audience frequently visits.
    1. hosting phishing
    2. spamming d. targeting

 

ANSWER:  d

 

  1. By using cookies and recording shoppers’ movements, software can create electronic consumer profiles for each shopper and buyer.
    1. SQL CRM
    2. XML d. CGI

 

ANSWER:  b

 

  1. Organizations can leverage to communicate with consumers immediately.
    1. newspapers radio
    2. social media d. television

 

ANSWER:  c

 

  1.          has fewer restrictions on storage space and transactions, and since only one site resides on the disks, no other site can affect its functionality.
    1. Dedicated hosting Shared hosting
    2. Virtual private server hosting d. Co-location

 

ANSWER:  a

 

  1. The protocol used to transfer and download Web information is .

ANSWER:  HTTP

Hypertext Transfer Protocol Hypertext Transfer Protocol (HTTP)

 

 

  1.          is the most common programming language for creating Web pages and other information viewable in a Web

ANSWER:  HTML

Hypertext Markup Language

Hypertext Markup Language (HTML)

 

  1. A(n) is a Web page that invites surfers to post opinions and artistic work, as well as links to sites of interest.

 

ANSWER:  blog

 

  1. To is to make a digital audio recording, usually of voice, and post the file on the Web so that people can download it and listen to it.

 

ANSWER:  podcast

 

  1. A(n) is a small file that a Web site places on a visitor’s hard disk so that the Web site can remember something about the surfer later.

 

ANSWER:  cookie

 

  1. Software designed to trace and report your online behavior without your knowledge is called .

 

ANSWER:  spyware

 

  1. Web-enabled business is often classified by the parties involved in the interaction: business-to-business (B2B), business-to-consumer (B2C), and .

 

ANSWER:  B2G

business-to-government

business-to-government (B2G)

 

  1.          are images placed on a Web site that link to the site of the company selling the product or service.

 

ANSWER:  Banners

 

  1. A(n) limits site access to the employees of particular organizations, usually business partners.

 

ANSWER:  extranet

 

  1.          technology enables one server to be virtually split into many addressable servers, each for a different client and with its own domain name.

 

ANSWER:  Virtual private server

 

 

 

  1. Online retailing, called , continues to grow throughout the world for several reasons: greater availability of faster communication lines to households, growing confidence in online purchases, and the increasing ability to find the item one searches and rich information about it.

ANSWER:  e-tailing

 

  1. The purpose of is to know the consumers better so the business can serve them better, while streamlining its marketing and sales operations.

 

ANSWER:  consumer profiling

 

  1. The ability of websites to serve as prompt exchanges of information has supported another popular business model, the or name-your-own-price auction.

 

ANSWER:  reverse auction

 

  1.          is a cyberattack tactic used to trick Internet users into giving up personal information such as PINs and account numbers.

 

ANSWER:  Phishing

 

  1. Wireless technologies enable what some people call mobile commerce, or .

 

ANSWER:  m-commerce

 

  1. The usage of in web technologies ensures that data exchanged between the SCM systems of two organizations are interpreted correctly.

 

ANSWER:  XML

Extensible Markup Language Extensible Markup Language (XML)

 

  1. In , the client’s website is stored on the host’s same physical server along with the sites of other clients.

 

ANSWER:  shared hosting

 

  1.          enables one server to be virtually split into many addressable servers, each for a different client and with its own domain name.

 

ANSWER:  Virtual private server

 

  1.          webpages can be built with several programming tools: CGI, Java servlets, PHP, and ASP (Active Server Pages).

 

ANSWER:  Dynamic

 

  1. Organizations make proactive initiatives to keep their products from becoming a , which is any product that is sold for about the same price by a multitude of vendors in a highly competitive market, usually with a thin margin of

 

ANSWER:  commodity

 

 

 

  1. Describe HTML and XML.

 

ANSWER:  Hypertext Markup Language (HTML) is the most common programming language for creating webpages and other information viewable in a web browser. It determines the look and location of text, pictures, animations, and other elements on a webpage. Extensible Markup Language (XML) enables the creation of various types of data. It is most often used not for determining the appearance of visual elements on a webpage but to convey the meaning or content of the data. The World Wide Web Consortium (W3C), the organization responsible for web standards, has combined the two markup languages HTML and XML into a standard called Extensible Hypertext Markup Language (XHTML).

 

Every file displayed on the Web is coded with a markup language such as HTML or XML. Simply put, markup languages provide a system of standardized “tags” that format elements of a document, including text, graphics, and sound. Formatting includes opening and closing tags preceding and following a part of the document, such as <b> at the start of bold text, and </b> at the end of bold text. Some tags are marked to link to another page either at the same site or another site, and others create links to e-mail addresses. Browsers interpret HTML and XML tags and display the text in the fashion defined by the tags, or allow other software to pick up data from the page and process it or copy it into the proper place in a database.

 

As in HTML, tags are used in XML to mark data elements. However, XML tags define “what it is,” as opposed to “how it looks.”

 

  1. Discuss File Transfer Protocol.

 

ANSWER:  File Transfer Protocol (FTP) is a common way of transmitting files from one computer to another. Every time you download a file from a website or attach files to e-mail, you are using an FTP application. The file transmitted can be of any type: text, graphics, animation, or sound. FTP is embedded in browsers and therefore is “transparent” to the users. A separate FTP utility can also be used, with many available as shareware, to manage transmitting files.

 

Businesses use FTP to place files on a server for sharing among professionals. FTP is also useful for placing files on a server that hosts a website. It’s also convenient for retrieving large files that might exceed an e­mail system’s size limits. For example, authors can place large chapter and figure files in a folder on a server maintained by their publisher. Manufacturers often place full assembly and maintenance manuals or videos at their Web site so customers can download them any time. New methods have replaced FTP sites such as cloud drives, online backup tools (such as Carbonite), and groupware productivity products (such as Wiggio). However, FTP sites still remain popular due to the inexpensive and simple nature of file transfers.

 

  1. Explain the importance of blogs to commercial organizations.

 

ANSWER:  The importance of blogs to commercial organizations is primarily to find out what blog participants think and say about the organizations. Many organizations use special software that combs blogs for postings that mention the organizations’ names. PR people then read the content and relay feedback to others in the organization as needed. For example, an anonymous blogger boasted that he could break Kryptonite bicycle locks with a pen. Within a week the posted item was mentioned in The New York Times, and Kryptonite recalled the locks. Some companies offer blog mining applications, which is software that combs blogs, identifies company names, and automatically tracks discussions. Such tools can turn blog data into useful market research information.

 

 

  1. How is advertising done on the web?

 

ANSWER:  Online advertising is done mainly in two ways: through search engines and through banners. Although advertising on the web is not aimed just at consumers, most of it is directed to them. However, selling and buying web ads occurs between businesses: the website operators sell advertising “real estate” to another business. Regardless of media, advertisers are interested in reaching as many people who might buy their goods or services as possible. On the web, advertisers are interested in what they call “traffic volume,” that is, the number of people who come across their messages. As the number of people who log on to the web increases, so does advertiser interest in this medium. Internet World Stats estimated that of the 7 billion people in the world today, 2.4 billion—34.3 percent—used the Internet in 2012 (“Internet Usage Statistics,” 2012). With this traffic volume, advertisers are willing to spend a lot of money on web advertising. The research firm GroupM estimated that about $84.8 billion was spent on web advertising in 2011, a 16 percent increase from 2010 (Hof, 2012; O’Leary, 2012). They also predicted web advertising spending will grow to $98.2 billion in 2012, accounting for 19 percent of all measured media spending (O’Leary, 2012).

 

  1. Explain the purpose of a virtual private server.

 

ANSWER:  The purpose of a virtual private server is to create the impression that the client maintains its own server. Virtual private server technology enables one server to be virtually split into many addressable servers, each for a different client and with its own domain name. This option is usually less expensive than renting a dedicated server, while enjoying the same benefits, including full control of the content of the virtual server.

Additional information

Add Review

Your email address will not be published. Required fields are marked *