MIS Chapter 5-8

It is easy to manage all the data coming into an organization.
Answer: False
The best way to capture the data in an organized format is to use a database.
Answer: True
Increasing amounts of external data need to be considered in making organizational decisions.
Answer: True
Data rot refers to the quality of the data itself.
Answer: False
It is important for applications and data to be dependent on each other.
Answer: False
A negative value for a student’s grade point average is an example of a data integrity problem.
Answer: True
An entity is a person, place, thing, or event about which information is maintained.
Answer: True
An attribute is any characteristic or quality that describes a particular entity.
Answer: True
The secondary key is a field that identifies a record with complete uniqueness.
Answer: False
Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model.
Answer: False
You would be an instance of your university’s STUDENT class.
Answer: True
The relational database model is based on the concept of three-dimensional tables.
Answer: False
Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements.
Answer: True
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.
Answer: True
When data are normalized, attributes in the table depend on the primary key and any secondary keys.
Answer: False
In a data warehouse, existing data are constantly purged as new data come in.
Answer: False
An organization’s data warehouse generally maintains its operational data.
Answer: False
Online analytical processing (OLAP) involves the analysis of accumulated data by end users.
Answer: True
Data marts are designed for the end-user needs in a strategic business unit or department.
Answer: True
Master data are generated and captured by operational systems.
Answer: False
Tacit knowledge is the more objective, rational, and technical types of knowledge.
Answer: False
Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize.
Answer: False
Which of the following has (have) the broadest impact on an organization?

a) Decisions about hardware.
b) Decisions about software.
c) Decisions about data.
d) Both “decisions about hardware” and “decisions about software.”
e) All of these have an equal impact.

c) Decisions about data.
24) Which of the following is not a source for external data?

a) Commercial databases
b) Corporate databases
c) Sensors
d) Satellites
e) Government reports

b) Corporate databases
Which of the following is not a reason why managing data is difficult over time?

a) New systems are developed.
b) The media the data are stored on becomes problematic.
c) New sources of data are created.
d) The amount of data increases exponentially.
e) All of these are reasons why managing data is difficult over time.

e) All of these are reasons why managing data is difficult over time.
Not including alphabetic characters in a Social Security Number field is an example of _____ .

a) Data isolation.
b) Data integrity.
c) Data consistency.
d) Data redundancy.
e) Application/data dependence

b) Data integrity.
_____ occurs when applications cannot access data associated with other applications.

a) Data isolation
b) Data integrity
c) Data consistency
d) Data redundancy
e) Application/Data dependence

a) Data isolation
_____ occurs when the same data are stored in many places.

a) Data isolation
b) Data integrity
c) Data consistency
d) Data redundancy
e) Application/Data dependence

d) Data redundancy
_____ occurs when various copies of the data agree.

a) Data isolation
b) Data integrity
c) Data consistency
d) Data redundancy
e) Application/Data dependence

c) Data consistency
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management?

a) Data redundancy
b) Data inconsistency
c) Data isolation
d) Data security
e) Data dependence

b) Data inconsistency
Place the following members of the data hierarchy in their correct order:

a) Bit – byte – field – record – database – file
b) Bit – field – byte – record – file – database
c) Byte – bit – record – field – database
d) Bit – byte – field – record – file – database
e) Bit – record – field – byte – file — database

d) Bit – byte – field – record – file – database
In the data hierarchy, the smallest element is the _____.

a) Record.
b) Bit.
c) Byte.
d) Character.
e) File.

b) Bit.
A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number.

a) Byte
b) Field
c) Record
d) File
e) Database

b) Field
A(n) _____ is a logical grouping of related fields.

a) Byte
b) Field
c) Record
d) File
e) Database

c) Record
A(n) _____ is a logical grouping of related records.

a) Byte
b) Field
c) Record
d) File
e) Database

d) File
A(n) _____ represents a single character, such as a letter, number, or symbol.

a) Byte
b) Field
c) Record
d) File
e) Database

a) Byte
In a database, the primary key field is used to _____.

a) specify an entity
b) create linked lists
c) identify duplicated data
d) uniquely identify a record
e) uniquely identify an attribute

d) uniquely identify a record
_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy.

a) Primary keys
b) Secondary keys
c) Duplicate keys
d) Attribute keys
e) Record keys

b) Secondary keys
As an individual student in your university’s student database, you are a(n) _____ of the STUDENT class.

a) instance
b) individual
c) representative
d) entity
e) relationship

a) instance
At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship?

a) one-to-one
b) one-to-many
c) many-to-one
d) many-to-many
e) some-to-many

d) many-to-many
In a university’s relational database, the student record contains information regarding the student’s last name. The last name is a(n):

a) attribute.
b) entity.
c) primary key.
d) object.
e) file.

a) attribute.
A database management system is primarily a(n) _____.

a) file-handling program
b) data-modeling program
c) interface between applications and a database
d) interface between data and a database
e) interface between queries and a database

c) interface between applications and a database
In the relational database model, related tables can be joined when they contain common _____.

a) primary keys
b) rows
c) records
d) columns
e) files

d) columns
_____ tell the database management system which records are joined with others in related tables.

a) Primary keys
b) Secondary keys
c) Common attributes
d) Common files
e) Common fields

a) Primary keys
Data dictionaries perform all of the following functions except:

a) Providing information on each record.
b) Providing information on why attributes are needed in the database.
c) Defining the format necessary to enter data into the database.
d) Providing information on the name of each attribute.
e) Providing information on how often attributes should be updated.

a) Providing information on each record.
In a relational database, every row represents a(n) _____.

a) file
b) record
c) attribute
d) primary key
e) secondary key

b) record
A standardized language used to manipulate data is _____.

a) MS-Access
b) Oracle
c) query-by-example language
d) structured query language
e) data-manipulation language

d) structured query language
Data dictionaries provide which of the following advantages to the organization?

a) They reduce data inconsistency.
b) They enable faster program development.
c) They make it easier to modify data and information.
d) Both “They enable faster program development.” and “They make it easier to modify data and information.”
e) All of these

e) All of these
_____ is a method for analyzing and reducing a relational database to its most streamlined form.

a) Structured query
b) Normalization
c) Query by example
d) Joining
e) Relational analysis

b) Normalization
When data are normalized, attributes in the table depend only on the _____.

a) secondary key
b) common attribute
c) primary key
d) common row
e) common record

c) primary key
The data in a data warehouse have which of the following characteristics?

a) They are organized by subject.
b) They are coded in different formats.
c) They are updated in real time.
d) They are typically retained for a defined, but limited, period of time.
e) They are organized in a hierarchical structure.

a) They are organized by subject.
The data in a data warehouse:

a) are updated constantly in real time.
b) are updated in batch mode, approximately once per day.
c) are not updated.
d) are purged constantly as new data enter.
e) are available for MIS analysts, but not users

c) are not updated.
The process of moving data from various sources into the data warehouse is called:

a) uploading.
b) extracting, transforming, and loading.
c) online transaction processing.
d) master data management.
e) online analytical processing.

b) extracting, transforming, and loading.
Compared to data warehouses, data marts have which one of the following characteristics?

a) They cost less.
b) They have longer lead times for implementation.
c) They provide for central rather than local control.
d) They contain more information.
e) They are more difficult to navigate

a) They cost less
_____ is a formal approach to managing data consistently across an entire organization.

a) Database management
b) Enterprise information management
c) Data warehousing
d) Data governance
e) Data mart

d) Data governance
_____ provide(s) companies with a single version of the truth for their data.

a) Data warehouses
b) Data marts
c) Databases
d) Master data management
e) Enterprise information management

d) Master data management
Organizations are turning to data governance for which of the following reasons?

a) They have too little data.
b) They are responding to federal regulations.
c) Their data are typically structured.
d) Their data are usually located in the organization’s databases.
e) Data across their organizations are generally consistent.

b) They are responding to federal regulations
_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization’s activities.

a) Transaction data, master data
b) Source data, transaction data
c) Operational data, master data
d) Master data, source data
e) Business dimensional data, databases

a) Transaction data, master data
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization’s memory and typically reside inside the organization in an unstructured manner.

a) Discovery
b) Knowledge management
c) Decision support
d) Online analytical processing
e) Data mining

b) Knowledge management
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem.

a) Knowledge, information
b) Data, information
c) Information, data
d) Information, knowledge
e) Data, knowledge

a) Knowledge, information
Explicit knowledge has which of the following characteristics?

a) objective
b) personal
c) slow
d) costly to transfer
e) ambiguous

a) objective
Tacit knowledge has which of the following characteristics?

a) codified
b) objective
c) unstructured
d) rational
e) technical

c) unstructured
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge.

a) tacit
b) explicit
c) managerial
d) geographical
e) cultural

b) explicit
The most important benefit of knowledge management systems is:
a) They improve customer service.
b) They make best practices available to employees.
c) They enable the organization to retain scarce knowledge when employees retire.
d) They improve employee morale.
e) They make product development more efficient.
b) They make best practices available to employees.
Refer to IT’s About Business 5.2 – Cell phone owners in Mexico: The cell phone registry is useless because:

a) data for some cell phones are missing.
b) data for some cell phones are inaccurate.
c) very few Mexicans can afford cell phones.
d) All of these
e) Both “data for some cell phones are missing” and “data for some cell phones are inaccurate.”

e) Both “data for some cell phones are missing” and “data for some cell phones are inaccurate.”
Refer to IT’s About Business 5.3 – Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except:

a) to process transactions faster.
b) to provide a complete view of the customer.
c) to enhance its marketing campaigns
d) to provide business users access to business-wide data.
e) to determine where to place its slot machines.

a) to process transactions faster.
Refer to Opening Case – Big Data. Which of the following is not a problem created by “Big Data”?

a) The data is not reliable.
b) The amount of data exceeds the available storage.
c) The existing networks can’t handle the volume.
d) It is more difficult to protect the data.
e) The vast amounts of data make decision making more complicated.

a) The data is not reliable.
Refer to Closing Case – CoStar Group. The target audience for CoStar’s aggregated commercial real estate data was

a) banks.
b) building owners.
c) real estate agents.
d) builders.
e) All these

e) All these
In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions.

What would the business dimensions be for Walmart’s sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis?

a) Customer, product, and month
b) Customer, product, store
c) Customer, product, store, and month
d) Customer, product, store, and week
e) Product, store, and week

e) Product, store, and week
Today, large corporations are able to process big data but only at great expense.
False
A local area network connects two or more communicating devices in a limited geographical area.
Answer: True
Network interface cards are special adapters that link an individual device to the communications medium on a local area network.
Answer: True
The network interface card typically houses the LAN’s network operating system.
Answer: False
Wide-area networks have a large capacity, and they typically use a single communications channel.
Answer: False
Digital signals are continuous waves that transmit information by altering the characteristics of the waves.
Answer: False
Digital signals have two parameters: frequency and amplitude.
Answer: False
The U.S. public telephone system was designed as an analog network to carry voice signals.
Answer: True
Cable media use wires or cables to transmit data and information.
Answer: True
Twisted-pair wire is the least-used form of communications wiring.
Answer: False
Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber.
Answer: True
Systems that use digital subscriber lines (DSL) do not require modems.
Answer: False
Currently, ATM networks operate only on fiber-optic cable.
Answer: True
The Internet is a global network of computer networks.
Answer: True
An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.
Answer: True
Intranets support discovery, communication, and collaboration inside an organization.
Answer: True
An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.
Answer: False
Extranets offer limited accessibility to the intranets of participating companies.
Answer: True
An Internet service provider is a company that offers Internet connections for a fee.
Answer: True
Internet kiosks are computer terminals located in public places like libraries and airports.
Answer: True
A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site.
Answer: True
The rightmost part of an Internet name is the top-level specification, or the zone.
Answer: True
The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture.
Answer: True
Uniform resource locators (URLs) point to the address of a specific resource or site on the Web.
Answer: True
Uniform resource locators (URLs) are software applications through which users access the Web.
Answer: False
The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet.
Answer: True
A major problem of the discovery applications of networks is the huge amount of information available.
Answer: True
Metasearch engines search several engines at once and integrate the findings of the various search engines.
Answer: True
The quality of automatic translation of Web pages is usually just as good as human translation.
Answer: False
Commercial portals are intended for broad audiences and offer fairly routine content.
Answer: True
Industrywide portals are intended for broad audiences and offer fairly routine content.
Answer: False
Electronic mail is the largest-volume application running over the Internet.
Answer: True
With Voice-over-IP, every call opens up a dedicated circuit for the duration of the call.
Answer: False
E-learning is conducted only in virtual classrooms, where all coursework is completed online.
Answer: False
Virtual universities are online universities from which students take classes from home or at an off-site location, via the Internet.
Answer: True
Employees who telecommute have generally found that the experience enhances their careers.
Answer: False
_____ refers to the range of frequencies available in any communications channel.

a) Protocol
b) Broadband
c) Capacity
d) Narrowband
e) Bandwidth

e) Bandwidth
Which of the following are advantages of computer networks?

a) They enable organizations to be more flexible.
b) They enable companies to share hardware, computer applications, and data.
c) They enable geographically dispersed employees to work together.
d) They provide a critical link between businesses and their customers.
e) All of these

e) All of these
The components of a local area network include which of the following?

a) File server
b) Client computers
c) Wireline or wireless communications media
d) Network interface cards
e) All of these

e) All of these
Which of the following is not a component of a local area network?

a) File server
b) Client computers
c) Bridge
d) Network interface cards
e) All of these

c) Bridge
A _____ connects dissimilar networks.

a) Router
b) Network interface card
c) Bridge
d) Gateway
e) File server

d) Gateway
A(n) _____ connects two or more devices in a limited geographical area.

a) Local area network
b) Wide-area network
c) Personal area network
d) Enterprise network
e) Value added network

a) Local area network
A _____ sends messages through several connected LANs or to a wide-area network.

a) Router
b) Network interface card
c) Bridge
d) Gateway
e) File server

a) Router
A _____ allows a device to physically connect to a local area network’s communications medium.

a) File server
b) Network interface card
c) Network operating system
d) Communications channel
e) Gateway

b) Network interface card
All of the following statements concerning wide-area networks are true except:

a) They are provided by individual companies.
b) They have large capacity.
c) They cover large geographical areas.
d) They combine multiple communications channels.
e) The Internet is an example of a wide-area network.

a) They are provided by individual companies.
The function of _____ is to convert digital signals to analog signals and vice-versa.

a) Modems
b) Multiplexers
c) Front-end processors
d) Servers
e) Clients

a) Modems
_____ signals convey information in wave form, whereas _____ signals convey information in binary form.

a) Analog, packet
b) Analog, digital
c) Digital, packet
d) Digital, analog
e) Packet, analog

b) Analog, digital
_____ are hardware devices that support data transmission and reception across a telecommunications system.

a) Integrated services digital networks
b) Digital subscriber lines
c) Communications channels
d) Integrated circuits
e) Communications processors

c) Communications channels
Which of the following is not a communications channel?

a) Fiber-optic cable
b) Satellite transmission
c) Twisted-pair wire
d) Integrated circuits
e) Cellular radio

d) Integrated circuits
Which of the following is not a characteristic of twisted-pair wire?

a) Inexpensive
b) Easy to work with
c) Subject to interference from other electrical sources
d) Secure transmissions
e) None of these

d) Secure transmissions
The cable medium with the highest bandwidth is:

a) Twisted-pair wire
b) Coaxial cable
c) Fiber-optic cable
d) Cellular radio
e) Copper cable

c) Fiber-optic cable
Data are sent through a fiber-optic cable by a(n) _______.

a) Optical switch
b) Electromagnetic switch
c) Laser
d) Multiplexer
e) Optical modem

c) Laser
Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL?

a) Digital subscriber line
b) Asynchronous transfer mode
c) Synchronous optical network
d) T-carrier system
e) ISDN

b) Asynchronous transfer mode
Which transmission technology is an interface standard for transporting digital signals over fiber-optic lines that enables the integration of transmissions from multiple vendors?

a) Digital subscriber line
b) Asynchronous transfer mode
c) Synchronous optical network
d) T-carrier system
e) ISDN

c) Synchronous optical network
Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call?

a) Digital subscriber line
b) Asynchronous transfer mode
c) Synchronous optical network
d) T-carrier system
e) ISDN

d) T-carrier system
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.

a) Protocols
b) Client/server architectures
c) WANs
d) Application software packages
e) Developmental architectures

a) Protocols
A protocol is:

a) A device that handles the switching of voice and data in a local area network.
b) A standard set of rules and procedures for the control of communications in a network.
c) A communications service for the connection of devices in a local area network.
d) The main communications channel in a wide-area network.
e) Synonymous with network interface card

b) A standard set of rules and procedures for the control of communications in a network
The part of a network that handles the major traffic is the ________.

a) Front end
b) Network interface
c) Multiplexer
d) Backbone
e) Front end processor

d) Backbone
Which of the following enables users to send data across sometimes unreliable networks?

a) Ethernet
b) TCP/IP
c) Protocols
d) Digital subscriber lines
e) Integrated services digital network

b) TCP/IP
In TCP/IP, IP is responsible for:

a) Disassembling and reassembling of packets during transmission.
b) Establishing the Internet connection between two computers.
c) Moving packets over the network.
d) Sequencing the transfer of packets across the network.
e) Error checking

a) Disassembling and reassembling of packets during transmission.
Which of the following statements concerning packet switching is not true?

a) Packets contain a sequence number.
b) Packets are routed through different paths.
c) Packets require dedicated circuits.
d) Packets use TCP/IP to carry their data.
e) Packets contain destination addressing.

Answer: c

c) Packets require dedicated circuits
A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______.

a) Open systems
b) Client/server
c) Peer-to-peer
d) Centralized
e) Mainframe-centric

b) Client/server
BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time.

a) Leeching
b) Collaboration
c) Packet switching
d) Torrents
e) Swarming

e) Swarming
The _____ is a global wide-area network that connects approximately 1 million organizational computer networks.

a) Ethernet
b) Extranet
c) Internet
d) Intranet
e) World Wide Web

c) Internet
) A(n) _____ is a network designed to serve the internal informational needs of a single organization.

a) Global network
b) Extranet
c) Internet
d) Intranet
e) World Wide Web

d) Intranet
A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners.

a) Global network
b) Extranet
c) Internet
d) Intranet
e) World Wide Web

b) Extranet
Internet service providers connect to one another through _____.

a) Internet connection points
b) Common carrier connection points
c) Network access points
d) Network connection points
e) An extranet

c) Network access points
_____ are Internet access points that are located in public places, such as libraries and airports.

a) Clients
b) Servers
c) Internet access computers
d) Network computer
e) Internet kiosks

e) Internet kiosks
Each site on the Internet gets an assigned address, which is a(n) _____.

a) TCP address
b) IP address
c) URL address
d) ISO/OSI identifier
e) World Wide Web address

c) URL address
Consider this domain name, www.business.gsu.edu. The “edu” is the _______.

a) Top-level domain
b) URL
c) Web site locator
d) Name of the computer
e) Address of the Webmaster

a) Top-level domain
Consider this domain name, www.business.gsu.edu. The “gsu” is the __________.

a) Top-level domain
b) Name of the organization
c) URL
d) Name of the specific computer
e) Address of the Webmaster

b) Name of the organization
Consider this domain name, www.business.gsu.edu. The “business” is the ________.

a) Top-level domain
b) Name of the organization
c) URL
d) Name of the specific computer
e) Address of the Webmaster

d) Name of the specific computer
Applications offered by the Internet2 include which of the following?

a) remote diagnosis
b) digital libraries
c) distance education
d) virtual laboratories
e) all of these

e) all of these
Networks enable which of the following applications?

a) Discovery
b) Communications
c) Collaboration
d) Web services
e) All of these

e) All of these
Which of the following are advantages of computer networks?

a) They enable organizations to be more flexible.
b) They enable companies to share hardware, computer applications, and data.
c) They enable geographically dispersed employees to work together.
d) They provide a critical link between businesses and their customers.
e) All of these

e) All of these
Which network application(s) enable(s) users to access information located in databases all over the world?

a) Discovery
b) Communications
c) Collaboration
d) Web services
e) None of these

a) Discovery
Which of the following statements about publication of material in foreign languages is not correct?

a) It is a competitive necessity.
b) It must be accurate.
c) It is expensive.
d) Content must be localized to the needs of people in local markets.
e) It is not yet a major consideration for most companies.

e) It is not yet a major consideration for most companies
_____ portals offer content for diverse communities and are intended for broad audiences.

a) Industrywide
b) Personal
c) Affinity
d) Corporate
e) Commercial

e) Commercial
_____ portals support communities such as hobby groups or political parties.

a) Industrywide
b) Personal
c) Affinity
d) Corporate
e) Commercial

c) Affinity
_____ portals coordinate content within relatively narrow organizational and partners’ communities.

a) Publishing
b) Personal
c) Affinity
d) Corporate
e) Commercial

d) Corporate
Many organizations have implemented corporate portals for which of the following reasons?

a) To cut costs
b) To free up time for busy managers
c) To improve profitability
d) To offer customers self-service opportunities
e) All of these

e) All of these
Portals are an example of which network application?

a) Discovery
b) Collaboration
c) Communications
d) Web services
e) None of these

a) Discovery
With _____, every call opens up a dedicated circuit for the duration of the call.

a) Voice over IP
b) Plain old telephone service
c) Chat rooms
d) Teleconference
e) Internet relay chat

b) Plain old telephone service
With _____, phone calls are treated as just another kind of data.

a) Voice over IP
b) Plain old telephone service
c) Chat rooms
d) Teleconference
e) Internet relay chat

a) Voice over IP
Skype is an example of _______.

a) Teleconference
b) Telepresence
c) Plain old telephone service
d) Voice over IP
e) Videoconference

d) Voice over IP
Workflow, groupware, and telepresence systems are examples of which network application?

a) Discovery
b) Communications
c) Collaboration
d) Web services
e) None of these

c) Collaboration
The newest type of videoconferencing technology is ________.

a) Teleconferencing
b) Telepresence
c) Work group analysis software
d) Workflow software
e) Groupware

b) Telepresence
In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation.

a) Teleconference
b) Group decision support
c) Telepresence
d) Telephone conference call
e) Crowdsourcing

c) Telepresence
The benefits of e-learning include which of the following?

a) Increased content retention
b) Current, high-quality content
c) Consistency
d) Flexibility
e) All of these

e) All of these
Which of the following is not a disadvantage of telecommuting for employees?

a) Fewer opportunities for housebound people
b) Possible loss of fringe benefits
c) Lower pay (in some cases)
d) No workplace visibility
e) Slower promotions

a) Fewer opportunities for housebound people
Refer to Opening Case – The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality?

a) The amount of video traffic on the Internet is increasing.
b) Under current models, the investment required to meet future demand exceeds projected revenue growth.
c) Net neutrality might hinder U.S. competitiveness.
d) Network providers could censor certain content by slowing down or blocking access.
e) Telecommunications and cable companies are in favor of net neutrality.

e) Telecommunications and cable companies are in favor of net neutrality.
1) In traditional commerce, one or more of the following can be digital: the product or service, the process, and the delivery agent.
Answer: False
2) Visiting the Web site of a car manufacturer (e.g., www.gm.com), entering the specifications for the car you want, and then picking up your car at your local dealership is an example of partial electronic commerce.
Answer: True
3) eBay is a good example of business-to-consumer electronic commerce.
Answer: False
4) Forward auctions are auctions that sellers use as a channel to many potential buyers.
Answer: True
5) Even though B2C EC is much larger by volume, B2B is more complex.
Answer: False
6) An electronic storefront is a Web site on the Internet that represents a single store.
Answer: True
7) You can make a purchase in a referral mall.
Answer: False
8) Selling products such as books and computers on the Internet may reduce vendors’ selling costs by 20 to 40 percent, with further reductions being difficult because the products must be delivered physically.
Answer: True
9) Virtual banks are those banks that are dedicated only to Internet transactions.
Answer: True
10) Channel conflict occurs when click-and-mortar companies have problems with their regular distributors when they sell directly to customers online.
Answer: True
11) Internet advertising is impersonal, one-way mass communication.
Answer: False
12) Banners are the most common form of advertisement on the Internet.
Answer: True
13) Hacking is the indiscriminate distribution of electronic ads without permission of the receiver.
Answer: False
14) Business-to-consumer applications comprise the majority of electronic commerce volume.
Answer: False
15) The key mechanisms in the sell-side marketplace are customized electronic catalogs and reverse auctions.
Answer: False
16) The buy-side marketplace is similar to the business-to-consumer model.
Answer: False
17) Horizontal exchanges connect buyers and sellers across many industries.
Answer: True
18) In most cases, traditional payment systems are not effective for electronic commerce.
Answer: True
19) Smart cards can be used as credit cards, debit cards, and/or loyalty cards.
Answer: True
20) Each buyer needs only one e-wallet for all merchants.
Answer: False
21) E-commerce affects only businesses that sell products online.
Answer: False
25) Which of the following is not an effect that E-commerce has had on organizations?
a) E-commerce enables smaller businesses to operate in areas dominated by larger companies.
b) E-commerce increases the number of potential customers to whom the company can market its products.
c) E-commerce is a costly medium for increasing market share.
d) E-commerce removes many barriers for start-up businesses.
e) E-commerce makes it easy to reach customers around the world.
c) E-commerce is a costly medium for increasing market share.
26) _____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization.
a) Business-to-business electronic commerce, business-to-customer electronic commerce
b) Electronic commerce, electronic business
c) Business-to-customer electronic commerce, business-to-business electronic commerce
d) Business-to-business electronic commerce, intrabusiness electronic commerce
e) Electronic business, electronic commerce
b) Electronic commerce, electronic business
27) The degree of digitization relates to all of the following except:
a) the product or service sold
b) the process by which the product is produced
c) the delivery agent or intermediary
d) the size of e-commerce transactions
e) none of these
d) the size of e-commerce transactions
28) In _______ e-commerce, the sellers and buyers are organizations.
a) government-to-citizen
b) consumer-to-consumer
c) business-to-business
d) business-to-consumer
e) consumer-to-business
c) business-to-business
29) In ________ e-commerce, an organization provides information and services to its workers.

a) business-to-employee
b) consumer-to-consumer
c) consumer-to-business
d) business-to-consumer
e) government-to-business

a) business-to-employee
30) Direct payment of Social Security benefits is an example of ______ e-commerce.

a) government-to-citizen
b) consumer-to-consumer
c) consumer-to-business
d) business-to-consumer
e) business-to-business

a) government-to-citizen
31) If you are an worker managing your fringe benefits over your company’s intranet, you are engaging in _________ e-commerce.
a) business-to-business
b) business-to-consumer
c) consumer-to-consumer
d) business-to-employee
e) government-to-citizen
d) business-to-employee
32) Which of the following statements regarding the relationship between electronic commerce and search is not correct?
a) Purchases often follow successful online searches.
b) Shopping carts are often abandoned after unsuccessful online searches.
c) Retailers will provide fewer product details to avoid information overload for customers.
d) Customers will be able to find the closest store offering the product that they want.
e) Customers will have more relevant product information in the near future.
c) Retailers will provide fewer product details to avoid information overload for customers.
33) In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins.
a) forward
b) static
c) reverse
d) physical
e) simple
c) reverse
34) eBay uses a _____ auction.
a) forward
b) static
c) reverse
d) physical
e) simple
a) forward
35) _____ auctions employ a request for quotation.
a) Forward
b) Static
c) Reverse
d) Physical
e) Simple
c) Reverse
36) _____ auctions are the most common auction model for large purchases.

a) Forward
b) Static
c) Reverse
d) Physical
e) Simple

c) Reverse
37) In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism?
a) find-the-best-price
b) electronic tendering system
c) name-your-own-price
d) online direct marketing
e) affiliate marketing
b) electronic tendering system
38) A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor’s site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model?
a) find-the-best-price
b) electronic tendering system
c) name-your-own-price
d) online direct marketing
e) affiliate marketing
e) affiliate marketing
39) Which type of electronic commerce is the largest by volume?

a) business-to-employee
b) consumer-to-consumer
c) business-to-business
d) business-to-consumer
e) none of these

c) business-to-business
40) Which type of electronic commerce does Amazon practice?

a) business-to-employee
b) consumer-to-consumer
c) consumer- to-business
d) business-to-consumer
e) employee-to-business

d) business-to-consumer
41) _______ e-commerce is also known as e-tailing.

a) Business-to-business
b) Collaborative commerce
c) Intrabusiness
d) Business-to-consumer
e) Consumer-to-business

d) Business-to-consumer
42) The advantages of electronic commerce for consumers include all of the following except:

a) You can buy from home 24 hours per day, 7 days per week.
b) You have a wider variety of products to choose from.
c) You typically cannot access additional information, so you do not have information overload.
d) You can easily compare prices and features.
e) You can find unique items.

c) You typically cannot access additional information, so you do not have information overload.
43) Which of the following is not an electronic commerce application?

a) home banking
b) buying stocks
c) evaluating an employee
d) conducting an auction
e) buying real estate

c) evaluating an employee
44) Which of the following is not an advantage of e-tailing?

a) You can buy from home, 24 hours per day.
b) You have only a few products to choose from.
c) You can obtain detailed information on products.
d) You can compare competitors’ products and prices.
e) All of these

b) You have only a few products to choose from.
45) ________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen.

a) Disintegration
b) Supply chain integration
c) Direct sales
d) Disintermediation
e) Value-added services

d) Disintermediation
46) Cyberbanking offers all of the following advantages except:

a) It is convenient for customers. b) It saves time for customers.
c) It includes inexpensive transactions for the bank.
d) It can help recruit remote customers.
e) It is more expensive for the customer.

e) It is more expensive for the customer.
47) Which of the following is a problem that e-commerce can cause for the airline industry?

a) Too many fares
b) Mistakes in fares
c) Too few fares
d) No fares offered on certain routes
e) Too many fares offered on certain routes

b) Mistakes in fares
50) Difficulties in order fulfillment are most closely associated with which type of electronic commerce?

a) business-to-business
b) business-to-consumer
c) government-to-citizen
d) business-to-employee
e) mobile commerce

b) business-to-consumer
51) Internet advertising improves on traditional advertising in all of the following ways except:
a) Internet ads can be updated at any time at minimal cost.
b) Internet ads can reach large numbers of potential buyers all over the world.
c) Internet ads are always more effective than other types of advertising.
d) Internet ads can make effective use of multimedia.
e) Internet ads are current.
c) Internet ads are always more effective than other types of advertising.
52) A _____ is automatically launched by some trigger and appears behind the active window.

a) keyword banner
b) random banner
c) pop-up ad
d) pop-under ad
e) text box

d) pop-under ad
53) _____ offer(s) consumers incentives to accept advertising and e-mail voluntarily.

a) Viral marketing
b) Personalized marketing
c) Permission marketing
d) Paper catalogs
e) Direct mail

c) Permission marketing
54) _____ refers to online word-of-mouth marketing.

a) Permission marketing
b) One-to-one marketing
c) Personalized marketing
d) Viral marketing
e) Direct mail

d) Viral marketing
55) In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically.

a) buy-side
b) sell-side
c) group purchasing
d) desktop purchasing
e) electronic exchange

b) sell-side
56) The key mechanisms of the _____ marketplace model are forward auctions and electronic catalogs that can be customized for each large buyer.

a) buy-side
b) sell-side
c) group purchasing
d) desktop purchasing
e) electronic exchange

b) sell-side
57) In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time.
a) buy-side
b) sell-side
c) auctions
d) group purchasing
e) electronic exchange
a) buy-side
58) In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention.

a) buy-side
b) sell-side
c) auctions
d) group purchasing
e) electronic exchange

d) group purchasing
59) In _____, direct and indirect materials in one industry are purchased on an as-needed basis.

a) horizontal exchanges
b) vertical exchanges
c) buy-side marketplaces
d) functional exchanges
e) sell-side marketplaces

b) vertical exchanges
60) _____ connect buyers and sellers across many industries and are used mainly for indirect materials.

a) Horizontal exchanges
b) Vertical exchanges
c) Buy-side marketplaces
d) Functional exchanges
e) Sell-side marketplaces

a) Horizontal exchanges
61) All of the following are limitations of traditional payment methods in electronic commerce except:

a) Cash cannot be used because there is no face-to-face contact.
b) Paying for goods and services via the mail takes more time.
c) Not all organizations accept credit cards.
d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer.
e) None of these

d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer.
62) _____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form.

a) Electronic checks
b) Electronic credit cards
c) Electronic cash transactions
d) Electronic wallets
e) Electronic debit cards

a) Electronic checks
63) _____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer’s and seller’s banks.

a) Electronic checks
b) Electronic credit cards
c) Electronic cash transactions
d) Electronic wallets
e) Electronic debit cards

b) Electronic credit cards
64) _____ are typically used for unplanned B2B purchases for amounts under $2000.

a) Electronic checks
b) Stored-value money cards
c) Purchasing cards
d) Smart cards
e) Person-to-person payments

c) Purchasing cards
65) ______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary.

a) Electronic checks
b) Stored-value money cards
c) Purchasing cards
d) Smart cards
e) Person-to-person payments

b) Stored-value money cards
66) _____ contain a chip that can store information and be used for several purposes.

a) Electronic checks
b) Stored-value money cards
c) Purchasing cards
d) Smart cards
e) Person-to-person payments

d) Smart cards
67) _____ enable two individuals to transfer funds without using a credit card.

a) Electronic checks
b) Stored-value money cards
c) Purchasing cards
d) Smart cards
e) Person-to-person payments

e) Person-to-person payments
68) _____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing.

a) Electronic checks
b) Digital wallets
c) Purchasing cards
d) Smart cards
e) Person-to-person payments

b) Digital wallets
69) The practice of using similar but not identical domain names is called _____.

a) domain spoofing
b) domain masquerading
c) domain tasting
d) cybersquatting
e) domain fraud

c) domain tasting
70) _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else.

a) Domain spoofing
b) Domain masquerading
c) Domain tasting
d) Cybersquatting
e) Domain fraud

d) Cybersquatting
71) The device that Treat America installed on top of each of their machines communicates the following pieces of data except:

a) the amount of money in the machine at any given minute.
b) the amount of product inventory remaining.
c) whether the machine had been moved.
d) the number of customers.
e) whether the door had been opened after business hours.

d) the number of customers.
72) Companies use Web sites for all of the following reasons except:

a) To reduce operational and transaction costs.
b) To enhance their reputation.
c) To sell goods and services.
d) To reduce the amount of actual cash they need to deal with.
e) To induce people to visit a physical location.

d) To reduce the amount of actual cash they need to deal with.
86) You decide to start a landscaping business called Trim Grass. One of your services will be to perform fertilizer treatments. You will need to buy a great deal of fertilizer for your many clients. You can use all of the following methods to purchase the fertilizer except:

a) Forward auction
b) Reverse auction
c) Name your Own Price
d) Electronic Marketplace
e) Multichanneling

e) Multichanneling
87) You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn’t seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial?

a) Banner ads
b) Pop-up or pop-under ads
c) Spamming
d) Permission marketing
e) Viral marketing

c) Spamming
88) You decide to start a landscaping business called Trim Grass. Some of your residential clients would like to pay their bills online. Which of the following methods will not be appropriate for this type of payment?

a) Electronic checks
b) Electronic credit cards
c) Purchasing cards
d) Person-to-person payments
e) Stored-value money cards

c) Purchasing cards
89) You decide to start a landscaping business called Trim Grass. You expect to use the Web to help clients find you and communicate with you. You will mow lands, clean flower beds, and pick up leaves in the fall. You will send your clients monthly bills. Which of the following is true?

a) Trim Grass is using an e-commerce model.
b) Trim Grass is using an e-business model.
c) Trim Grass is using a forward auction.
d) Trim Grass is an electronic marketplace.
e) Trim Grass needs to worry about channel conflict.

b) Trim Grass is using an e-business model.
90) You have been running a landscaping business called Trim Grass for about two years. You have developed a special blend of grass seed for your area that you use when you reseed your clients’ lawns. You are receiving e-mails via your Web site from people who would like to purchase some. You decide to start selling seed online, and you hire someone to rebuild your Web site. Which of the following statements is not true?

a) Trim Grass is now multichanneling.
b) Trim Grass needs to think about how to ship the seed.
c) Trim Grass will have to collect sales tax from all sales.
d) Trim Grass will have more expenses.
e) Trim Grass will need to consider different advertising methods.

c) Trim Grass will have to collect sales tax from all sales.
1) Wireless computing does not really affect productivity.
False
2) Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
True
3) Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster.
False
4) Short message service allows users to send short text messages on digital cell phones.
True
5) Microwave transmissions are affected by environmental conditions such as storms.
True
6) The higher the orbit of a satellite, the larger its footprint.
True
7) The global positioning system is supported by GEO satellites.
False
8) Radio transmissions are highly secure.
False
9) Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices.
True
10) A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.
True
11) Wi-Fi provides excellent security.
False
12) In a mesh network, the motes transmit their data to a central computer.
False
13) Mesh networks are reliable, efficient, and fault tolerant.
True
14) Personalization means that a mobile device can provide real-time communication, independent of the user’s location.
False
15) A voice portal is a standard Web site that accepts voice commands.
False
16) Mobile wallets enable users to make purchases with a single click from a mobile device.
True
17) Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station.
True
18) Pervasive computing and virtual reality are just different names for the same thing.
False
19) Two systems being developed to replace bar codes are QR codes and RFID systems.
True
20) Rogue access points can be set up by employees.
True
21) War driving is the act of locating wireless networks while driving around a certain area.
True
22) Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?
a) To make use of time that was formerly wasted
b) To become more efficient
c) Work locations are more flexible
d) To be able to allocate working time around personal and professional obligations
e) All of these
e) All of these
23) Of the following, which is the major problem with smart phones?
a) They are too slow.
b) They are too expensive.
c) They can be used to compromise security.
d) Their screens are too small.
e) Their browsers are not fully functional.
c) They can be used to compromise security.
24) The capabilities of smart phones include all of the following except _________.
a) A calculator
b) E-mail
c) A global positioning system
d) Corporate transaction processing
e) A full-function Internet browser
d) Corporate transaction processing
25) Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly.
a) Phones, digital cameras
b) Phones, pagers
c) Digital cameras, phones
d) Digital cameras, pagers
e) Cheap, expensive devices
a) Phones, digital cameras
26) Microwave transmission systems are used for _____ volume, _____ distance, _____ communications.
a) Low, long, broadcast
b) Low, short, line-of-sight
c) High, long, broadcast
d) High, short, broadcast
e) High, long, line-of-sight
e) High, long, line-of-sight
27) Which type of satellite has the largest footprint? a) Low-earth-orbit
b) Medium-earth-orbit
c) Geostationary
d) Polar orbit
e) Equatorial orbit
c) Geostationary
28) The area of the earth reached by a satellite’s transmission is referred to as its _____.
a) Hotspot
b) Coverage
c) Footprint
d) Zone
e) Wireless area
c) Footprint
29) The greatest problem with GEO satellites is which of the following?
a) Propagation delay
b) Expense
c) Orbital life
d) Size of the footprint
e) Relative speed with respect to a point on the earth’s surface
a) Propagation delay
30) _____ is a satellite-based tracking system that enables users to determine a person’s position.
a) Bluetooth
b) Wireless application protocol
c) Short message service
d) Wi-Fi
e) Global positioning system
e) Global positioning system
31) Which of the following is not an advantage of radio?
a) No metallic wires are needed.
b) Radio waves propagate easily through office walls.
c) Radio devices are inexpensive.
d) Radio waves do not create electrical interference problems.
e) Radio devices are easy to install.
d) Radio waves do not create electrical interference problems.
32) The main problem with radio transmission is which of the following?
a) Radio waves cannot travel through walls.
b) When you travel too far from the source, the signal fades.
c) Devices are difficult to install.
d) Radio waves are slow.
e) Devices are expensive to install.
b) When you travel too far from the source, the signal fades.
33) The most common wireless technology for TV and DVD remote control devices is _______.
a) Bluetooth
b) Ultra-wideband
c) Near-field communications
d) WiMAX
e) Infrared
e) Infrared
34) _____ is a wireless standard that enables temporary, short-range connection between mobile devices.
a) Bluetooth
b) Wireless application protocol c) Short message service
d) Wi-Fi
e) Global positioning system
a) Bluetooth
35) Which of the following is the most appropriate wireless networking standard for creating personal area networks?
a) Wi-Fi
b) Cellular radio
c) Microwave
d) Bluetooth
e) WiMAX
d) Bluetooth
36) Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments?
a) Wi-Fi
b) Microwave
c) Ultra-wideband
d) Infrared
e) Bluetooth
c) Ultra-wideband
37) _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards.
a) Near-field communications
b) Bluetooth
c) Ultra-wideband
d) Wi-Fi
e) Infrared
a) Near-field communications
38) Which of the following statements about Wi-Fi is not correct?
a) Wi-Fi provides simple Internet access.
b) Laptop PC scans contain chips that can send and receive Wi-Fi signals.
c) Many companies offer free Wi-Fi access in their stores.
d) Wi-Fi requires encryption for secure transmissions.
e) Wi-Fi is expensive to set up.
e) Wi-Fi is expensive to set up.
39) Which of the following is not inhibiting faster Wi-Fi expansion?
a) Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. b) A lack of security.
c) The growth of WiMAX
d) Unless the service is free, users have to log on to separate accounts for each hotspot.
e) Wi-Fi services may not survive in the face of free hotspot access.
c) The growth of WiMAX
40) A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.
a) Transceiver
b) Hotspot
c) Local reception node d) Wireless network
e) GPS location
b) Hotspot
41) Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet.
a) 802.11a
b) 802.11b
c) 802.11c
d) 802.11g
e) WiMAX
d) 802.11g
42) _____ networks use multiple Wi-Fi access points to create a wide area network.
a) Mesh
b) Pervasive
c) Global
d) Fixed
e) Ubiquitous
a) Mesh
43) _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.
a) Bluetooth
b) Cell phones
c) A satellite
d) Ultra-wideband
e) Near-field communications
b) Cell phones
44) The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.
a) Wi-Fi
b) 802.11b
c) 802.11c
d) 802.11g
e) WiMAX
e) WiMAX
45) The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________.
a) Mobility, broad reach
b) Mobility, lack of expense
c) Security, broad reach
d) Security, mobility
e) Broad reach, localization
a) Mobility, broad reach
46) With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices.
a) Ubiquity
b) Convenience
c) Instant connectivity
d) B and C
e) A, B, and C
d) B and C
47) With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services.
a) Ubiquity
b) Convenience
c) Instant connectivity
d) Personalization
e) Localization of products and services
e) Localization of products and services
48) The development of mobile commerce is driven by all of the following factors except: a) The widespread availability of mobile devices.
b) The cell phone culture.
c) Increasing prices.
d) Bandwidth improvement.
e) It eliminates the need for a PC.
c) Increasing prices.
49) Which of the following is not a mobile application in financial services?
a) Transaction processing systems
b) Mobile banking
c) Wireless electronic payment systems d) Micropayments
e) Wireless wallets
a) Transaction processing systems
50) Parking meters that you can pay via your mobile telephone are an example of _________. a) Mobile banking
b) Wireless electronic payment
c) Wireless wallets
d) Brokerage service e) Money transfer
b) Wireless electronic payment
51) If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a) Wireless money transfer
b) Wireless wallet
c) Wireless bill payment
d) Micropayment
e) Wireless electronic payment system
e) Wireless electronic payment system
52) Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________.
a) Viral marketing
b) Permission advertising
c) Geographical advertising
d) Location-based advertising
e) Direct marketing
d) Location-based advertising
53) _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.
a) Location-based services
b) Telematics
c) Pervasive services d) RFID
e) Wi-Fi
b) Telematics
54) Sense networks track users via all of the following technologies except _______.
a) GPS
b) Traffic cameras
c) Cell towers
d) Wi-Fi networks
e) None of these
b) Traffic cameras
55) _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station.
a) Telemetry
b) Wireless access point
c) Near-field communications d) Microwave
e) Wireless positioning
a) Telemetry
56) The generic term for technologies that use radio waves to automatically identify individual items is __________.
a) Telemetry
b) Bar codes
c) Shipping labels
d) Radio-frequency identification
e) Wireless access points
d) Radio-frequency identification
57) Which of the following is not a limitation of barcodes?
a) They require line-of-sight to the scanning device.
b) They are printed on paper.
c) They identify the manufacturer, product, and item.
d) They are difficult to use in a manufacturing plant.
e) They are useless in determining expiration date.
c) They identify the manufacturer, product, and item.
58) The major problem with RFID has been _______.
a) Expense
b) Bandwidth
c) Location
d) RFID readers
e) RFID tags
a) Expense
59) What would be the best use of RFID in a business? a) Transaction processing
b) Supply chain management
c) Personnel tracking
d) Enabling communications with customers
e) Decreasing network costs
b) Supply chain management
60) _____ networks collect data from many points over an extended space. a) Bluetooth
b) Ultra-wideband
c) Wireless sensor
d) WiMAX
e) Wi-Fi
c) Wireless sensor
61) Which of the following can be used for reading utility meters without a person having to get out of a truck?
a) RuBee
b) ZigBee
c) Wi-Fi
d) Near-field communications
e) RFID
b) ZigBee
62) The act of locating wireless local area networks while moving around a city is called ____.
a) Eavesdropping
b) War driving
c) RF jamming
d) Cybersquatting
e) Installing rogue access devices
b) War driving
63) A(n) _____ allows unauthorized entry into a wireless network.
a) Lack of encryption
b) Disgruntled employee
c) Open node
d) Illegal server
e) Rogue access point
e) Rogue access point
64) _____ refers to efforts by unauthorized users to access data traveling over wireless networks.
a) RF jamming
b) War driving
c) Eavesdropping
d) Telemetry
e) Installing rogue access devices
c) Eavesdropping
65) In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.
a) RF jamming
b) War driving
c) Eavesdropping
d) Telemetry
e) Installing rogue access devices
a) RF jamming
Refer to IT’s About Business 8.6 – BP Uses Wireless Technologies: Wireless sensors can be used to increase safety and reliability by doing tasks that are too dangerous for humans.
False
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____.
a) Unencrypted node
b) Evil twin
c) Open node
d) Illegal server
e) Unauthorized rogue access point
b) Evil twin