2024 – Exam 1 Question 1 Question Which of the following ratios has fallen

SAINT GBA327 EXAM 1 2 AND EXAM 3 LATEST 2015 WINTER (ALL CORRECT) – 2024

2024 – Exam 1 Question 1 Question Which of the following ratios has fallen.

Exam 1

Question 1. Question : Which of the following ratios has fallen as a result of Moore’s Law?

>price/performance

Price/performance

Demand/supply

>profit/loss

Profit/loss

Debt/equity

Question 2. Question : You have a spreadsheet that provides the airfares to different cities from Chicago. If the contents of the spreadsheet are used to make a decision, it will be considered:

knowledge.

data.

information.

>intuition

intuition.

Question 3. Question : Which of the following is categorized as a non-routine cognitive skill?

Computer programming

Marketing knowledge

>tax accounting

Tax accounting

Systems thinking

Question 4. Question : Which of the following statements is true of data characteristics in the context of information systems?

Data generated should be in excess of what is required.

>

An appropriate relationship should exist between the cost of data and its value.

Data should be relevant to the context, not necessarily to the subject.

Freely available data is always accurate and timely.

Question 5. Question : Melissa wants to create a password. Which of the following is the strongest password that she could use?

>melissa@123

Melissa@123

Melissa@Melissa

NewYork

NOOCSmyPw$42

Meredith constantly analyzes

Question 6. Question : Meredith constantly analyzes her work in terms of her individual contribution that she makes to the overall output of the organization. This shows her ________ skills.

collaboration

experimentation

systems thinking

problem-solving

Integrated chip doubles

Question 7. Question : ________ states that the number of transistors per square inch on an integrated chip doubles every 18 months.

Nielsen’s Law

Faraday’s Law

Moore’s Law

Newton’s Law

Question 8. Question : Graham & Hilda Corp. is a firm that offers enterprise software solutions to independent retailers. The firm recently entered into a contract with a major national retail chain to develop and implement proprietary software that tracks inventory, restocking, and supplier information.

Upgrading the computer systems used by the retail chain

Writing the programs to create the software

Changing the structure of existing databases that reflect supplier and customer data

Training the employees to use and manage the new system

Automobile company decides

Question 9. Question : An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt:

focused cost leadership.

industry-wide differentiation.

industry-wide cost leadership.

focused differentiation.

Question 10. Question : According to Porter’s five forces model, in which of the following situations would a supplier have the highest bargaining power?

A Houston-based vendor is the only supplier of a patented material for many smartphone manufacturers

A fashion brand’s outlet catering to a niche market

A restaurant that serves only army veterans

A large retailer buying finished goods from many small suppliers

Question 11. Question : FunText is a company that owns an app used for text messaging. It recently offered a membership extension of six months without any additional charges to its existing customers who had registered for a three-year membership.

Creation of a new service

Product differentiation

Locking in customers

Locking in suppliers

Question 12. Question : Which of the following statements is consistent with the central idea of business process design?

Technology should be used to supplement the existing value chain.

Business processes should not focus on the core competencies of organizations.

Organizations should create new business processes rather than improve existing systems.

Technology should be used to modify and improve standard business processes.

Question 13. Question : Bargaining power of customers is likely to be the highest for markets involving:

limited edition apparel.

industrial products.

patented drugs.

vintage cars.

Question 14. Question : Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high:

entry barriers.

switching costs.

product standards.

value differentiation.

Question 15. Question : A(n) ________ is a network of activities that generate value by transforming inputs into outputs.

business process

competitive strategy

linkage

information system

Question 16. Question : Focused cost leadership is observed when a product has the lowest cost:

within an industry segment.

across the product range offered by a company.

within an industry.

within the supply chain of a company.

Question 17. Question : Which of the following statements is true of closed-source projects?

Only users and developers are allowed to alter the source code in closed-source projects.

Anyone can obtain the source code for a closed-source project.

Only trusted programmers are allowed to make changes to a closed-source project.

Programmers can alter the closed-source code based on their interests and goals.

Question 18. Question : Which of the following refers to server virtualization?

A personal computer, such as a desktop or portable computer, that hosts several different operating systems

A server computer that hosts one, or more, other server computers

A storage area that loses its contents when the power is off

A server that hosts many versions of desktop operating systems

Question 19. Question : Thin-client applications are developed using:

HTML5.

Java.

Objective-C.

C#.

Question 20. Question : ________ refers to data delivered to the user at the precise moment it is needed.

Asynchronous data

Just-in-time data

Source code

Payload

Question 21. Question : The CPU stores results of computations in the:

joystick.

main memory.

printer.

barcode scanner.

Question 22. Question : 10 TB is equivalent to ________ gigabytes.

10,240

1,000

1,024

102.4

Question 23. Question : Android applications are developed using:

Objective-C.

C#.

Java.

VB.Net.

Question 24. Question : Which of the following is an example of storage hardware in computers?

Plotter

Magnetic disk

Projector

Inkjet printer

Question 25. Question : Each entity in a database has a unique attribute called a(n) ________.

public key

identifier

foreign key

index field

Question 26. Question : __________ is the first step in transforming a data model into a relational database design.

Representing the data relationships

Normalizing the data and files

Creating foreign keys

Creating a table for each entity

Question 27. Question : In a database, when data items disagree with one another, it leads to a(n):

data integrity problem.

crow’s-foot paradigm.

adaptation conflict.

lost-update problem.

Question 28. Question : Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.

Development

Adaptation

Backup and recovery

Operation

Question 29. Question : Which of the following database administration tasks is related to adaptation?

Monitoring backup procedures

Conducting training for users

Monitoring database performance

Managing configuration changes in systems

Question 30. Question : An administrator should create a ________ before developing a database design.

data aggregator

query model

data model

data application

Question 31. Question : Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called:

identifiers.

records.

primary keys.

entities.

Question 32. Question : Which of the following is an example of a database management system?

MS Excel

BigData

NoSQL

Access

Question 33. Question : Communications speeds are expressed in:

bits.

bytes.

hertz.

packets.

Question 34. Question : Which of the following is a characteristic of in-house hosting?

Speedy development

Superior adaptability to fluctuating demand

Control of data location

Possibly the best disaster preparedness

Question 35. Question : ________ signals do not interfere with TV signals, even though they use the same lines.

DSL

Dial-up

Cable

ADSL

Question 36. Question : Which of the following statements is true about IEEE 802.3?

It is the protocol for wireless LAN connections.

It is the protocol for Bluetooth.

It is the protocol for wired LAN connections.

It is the universal standard protocol for all WAN connections.

Question 37. Question : Which of the following is an example of IaaS?

Apple iCloud

Microsoft Azure

Office 365

Amazon S3

Question 38. Question : To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.

layered protocol

virtual private network

three-tier system

remote access system

Question 39. Question : A(n) ________ is a number that identifies a particular device.

domain

IP address

hyperlink

href

Question 40. Question : Rackspace is an example of:

SaaS.

PaaS.

IaaS.

VPN.

Question 41. Question : A private internet that is used exclusively within an organization is called a(n)

Ethernet.

intranet.

cloud.

server.

Question 42. Question : Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product?

Marketing

Customer acquisition

Relationship management

Loss/churn

Question 43. Question : ________ is the activity of altering existing and designing new business processes to take advantage of new information systems.

Business process modeling

Business process reengineering

Business process outsourcing

Enterprise resource planning

Question 44. Question : ________ is a measure of the ratio of process outputs to inputs.

Process effectiveness

Process efficiency

Process conformance

Process reliability

Question 45. Question : When an organization has inconsistent duplicated data, it is said to have a problem of:

information silo.

data integrity.

error of omission.

data segregation.

Question 46. Question : Which of the following workgroup processes is related to manufacturing?

Order entry and tracking

Finished goods inventory management

Product and brand management

Planning and scheduling

Question 47. Question : Which of the following information systems minimizes data duplication among departments?

Departmental information systems

Workgroup information systems

Personal information systems

Enterprise information systems

Question 48. Question : The two dimensions of process quality are:

efficiency and effectiveness.

performance and reliability.

conformance and durability.

perception and serviceability.

Question 49. Question : Which of the following workgroup processes is related to customer service?

Assessment

Account tracking

Sales forecasting

Accounts payable

Question 50. Question : Which of the following workgroup processes is related to operations?

Account updating and tracking

Sales forecasting

Finished goods inventory management

Treasury and account management

Exam 2

Question 1. Web 2.0 refers to Web-delivered services and content paid for by:

SM sponsors.

users.

advertisers.

investors.

Question 2. Question : Which of the following statements is true of social CRM?

Customers likely to generate the most business get the most attention from the organization.

All the customer relationship processes in social CRM are structured and controlled.

Each customer crafts his or her own relationship with the company.

Though relationships emerge from joint activity, companies control the customers.

Question 3. Question : When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her:

human capital.

process capital.

social capital.

structural capital.

Question 4. Question : A group considers Twitter to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion.

Defenders of belief

Seekers of the truth

Proprietary community

Gated community

Question 5. Question : The primary risk of peer-to-peer support in the context of social media and customer service is:

loss of control.

loss of credibility.

lack of privacy.

increase in expenses.

Question 6. Question : Social capital, unlike traditional capital:

appreciates with time and never depreciates.

depreciates with time and never appreciates.

sometimes depreciates and at other times appreciates with time.

remains constant with time.

Question 7. Question : According to the SEAMS dynamic process, which of the following activities is most likely to involve the identification of important communities, what they do, where they hang out, what they care about, and how organizations relate to them?

Sensing

Engaging

Activating

Measuring

Question 8. Question : Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as:

links.

authoring.

signals.

extensions.

Question 9. Question : In McAfee’s SLATES Enterprise 2.0 model, “A” stands for:

auditing.

alerts.

authoring.

announcements.

Question 10. Question : ________, which refers to the matter in an SM site that is contributed by nonemployee site visitors, is the essence of SM relationships.

User-generated content

Folksonomy

Secondary data

Continuous data

Question 11. Question : ________ measures the frequency that someone who clicks on an ad makes a purchase, “Likes” a site, or takes some other action desired by the advertiser.

Pay-per-click

Conversion rate

Folksonomy

Enterprise 2.0

Question 12. Question : Which of the following revenue models is most likely followed by companies providing Web 2.0 services?

Traditional marketing

Pay-per-click

User participation

Venture capital

Question 13. Question : According to Gossieaux and Moran, which of the following observations is true about a hyper-social organization?

It uses social media in an organization-centric manner.

It creates relationships in which only one of the parties perceives and gains value.

It is characterized by a transformation of thinking from market segments to tribes.

It is an organization that transitions from a dynamic process to a structured one.

Question 14. Question : The storage of ________ differentiates SMIS from Web site applications.

secondary data

content data

connection data

continuous data

Question 15. Question : According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities?

They are open to changing their beliefs when confronted with contrary evidence.

They are very effective for activities that involve innovation or problem solving.

They make ineffective sales and marketing professionals.

They seek conformity and want to convince others of the wisdom of their beliefs.

Question 16. Question : A ________ is a person who is well versed in an organization’s strategy and focuses on ensuring that business processes and information systems meet the organization’s competitive strategies.

business analyst

business application programmer

business administrator

business supervisor

Question 17. Question : In a business process, resources are:

people or computer applications that are assigned to roles.

collections of procedures and activities.

the total number of points of work that can be accomplished in each scrum period.

collections of related tasks that receive inputs and produce outputs.

Question 18. Question : According to Brooks’ Law, adding more people to a late project will:

guarantee efficiencies.

speed up the project.

create diseconomies of scale.

reduce the need for coordination.

Question 19. Question : Organizational feasibility assesses:

the organization’s budget and schedule requirements.

the competitor’s business process model.

whether the organization has the technical infrastructure to implement the new system.

whether the new system fits within the organization’s customs or legal requirements.

Question 20. Question : In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.

activities

databases

resources

presentations

Question 21. Question : In a business process, an inventory or a database is an example of a:

decision tree.

repository.

botnet.

cookie.

Question 22. Question : A ________ is a sequence of activities that determine the earliest date by which a project can be completed.

Venn diagram

Pareto chart

critical path

scatter plot

Question 23. Question : According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called:

scrums.

points.

grades.

tallies.

Question 24. Question : In Business Process Modeling Notation (BPMN) diagrams, a square with a plus sign means that:

a question can be answered with no.

it is the end of the process.

a question can be answered with yes.

an activity is considered to be a subprocess of a process.

Question 25. Question : During the system implementation phase of the SDLC, once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity?

Beta testing

System conversion

Agile development

System control

Question 26. Question : During the requirements definition stage of developing an information system, the project team will consist mostly of:

programmers and testers.

testers and business users.

business and systems analysts.

database designers and administrators.

Question 27. Question : The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the SDLC project’s resources.

swim-lane layout

trade-off

transmission control protocol

configuration control

Question 28. Question : Which of the following phases of the SDLC include identifying what is to be produced, how frequently, and how fast it is to be produced?

Requirements analysis

System implementation

Component design

System definition

Question 29. Question : The project plan which results from defining the system is the input to ________, which is the second phase of the SDLC.

system design

system implementation

requirements analysis

system maintenance

Question 30. Question : Which of the following are the four dimensions of feasibility?

Planning, process, technical, and schedule feasibility

Operational, strategic, technical, and tactical feasibility

Cost, schedule, technical, and organizational feasibility

Schedule, process, technical, and competitive feasibility

Question 31. Question : Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

honeypots

blogs

activity logs

RSS feeds

Question 32. Question : Key escrow is a(n):

protocol used to secure communication over the internet.

safety procedure that allows a trusted party to have a copy of the encryption key.

device that prevents unauthorized network access.

encryption algorithm that uses both public and private keys.

Question 33. Question : Secure Socket Layer is also known as:

application layer.

transport layer security.

presentation layer.

network interface layer security.

Question 34. Question : Which of the following is classified as a technical safeguard?

Cookies

Firewalls

Key escrow

Passwords

Question 35. Question : Which of the following statements is true of the Secure Socket Layer (SSL)?

It uses asymmetric encryption exclusively.

It is used to send sensitive data such as credit card numbers.

It uses one set of encryption keys for multiple sessions.

It is a stronger version of HTTPS.

Question 36. Question : A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the:

payload.

kernel.

bot herder.

key escrow.

Question 37. Question : ________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

Data encryption

Database administration

Data authentication

Database normalization

Question 38. Question : ________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

Data administration

Authentication

Usurpation

Data encryption

Question 39. Question : Packet-filtering firewalls:

can filter both inbound and outbound traffic.

examine the destination address but not the source address.

are the most complex type of firewall.

seldom examine the data or the addresses of the message.

Question 40. Question : Which of the following is an example of a sniffing technique?

IP spoofing

Caches

Denial of service

Adware

Question 41. Question : ________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks.

Spoofing

Phishing

Sniffing

Pretexting

Question 42. Question : Which of the following systems procedures is specifically the responsibility of operations personnel?

Writing software program codes

Using systems to perform job tasks

Creating back up of system databases

Knowing whom to contact when a security breach occurs

Question 43. Question : ________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

Unauthorized data disclosure

Incorrect data modification

Denial of service

Loss of infrastructure

Question 44. Question : A(n) ________ has a microchip in it to hold data.

ATM card

smart card

cookie

key escrow

Question 45. Question : In information security, which of the following is true of managing risk?

All organizations except financial institutions should invest heavily in security safeguards.

Organizations should implement safeguards that balance the trade-off between risk and cost.

Passwords are classified under the technical safeguards category.

Physical security is classified under the human safeguards category.

Question 46. Question : When a firm is localizing a computer program, which of the following should it avoid?

Translating the user interface

Retaining forms and reports that have labels

Adjusting the sorting order for different character sets

Redrawing and translating diagrams

Question 47. Question : A ________ is a network of organizations and facilities that transforms raw materials into products delivered to customers.

legacy system

flat organization

shell corporation

supply chain

Question 48. Question : Which of the following best describes the bullwhip effect?

The value of a telecommunications network is proportional to the square of the number of users connected to the system.

The performance improvement to be gained from using some faster mode of execution is limited by the fraction of the time the faster mode can be used.

The variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier.

Improvements in technology lead to new applications, which result in new markets and industries.

Question 49. Question : Which of the following statements is true of global databases?

A single database increases data integrity problems.

A single database makes it possible to have an integrated view of the operations of an organization.

When using a single database to process data, data transmission speeds are extremely high.

The processing of a single database that resides in a single location is referred to as distributed database processing.

Question 50. Question : Enterprise systems, such as ERP, solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view. This would require:

all processes to be located in the same geographical place.

the company to standardize on a single language.

backshoring processes to the home country.

the company to customize its product offerings.

Exam 3

Question 1. Which of the following ways would × /100 – 73 be represented in an Excel spreadsheet?

10(2) * 5(3) / 100 ^ 73

10(2) ^ 5(3) / 100 – 73

10^2 * 5^3 / 100 – 73

10*2 ^ 5*3 / 100 – 73

Question 2. Question : Monte Carlo sampling differs from Latin Hypercube sampling in that the Monte Carlo sampling:

results in a more even distribution of output values.

uses the entire range of the distribution in a more consistent manner.

selects random variates independently over the entire range of possible values of the distribution.

uses an uncertain variable whose probability distribution is divided into intervals of equal probability.

Question 3. Question : Which of the following inputs of a decision model is an example of data?

Estimated consumer demand

Inflation rates

Costs

Investment allocations

Question 4. Question : Descriptive decision models:

aim to predict what will happen in the future.

do not tell a manager what to do.

help analyze the risks associated with various decisions.

do not facilitate evaluation of different decisions.

Question 5. Question : Which of the following symbols is used to represent exponents in Excel?

^

*

#

!

Question 6. Question : Following are the components of a data set containing purchase details of a shoe manufacturing company. Identify the ratio data.

Item Number

Rank of suppliers

Item cost

Arrival Date

Question 7. Question : During which phase in problem solving is a formal model often developed?

Analyzing the problem

Structuring the problem

Defining the problem

Implementing the solution

Question 8. Question : Which of the following is necessary to calculate the variable cost of production for the company to develop a profit model?

Unit sale price

Quantity of item produced

Quantity of item sold

Fixed cost of production

Question 9. Question : When will a company use a predictive decision model?

When it wishes to determine the best product pricing to maximize revenue.

When it wishes to know how best to use advertising strategies to influence sales.

When it wishes to know sales patterns to plan inventory levels.

When it wishes to ensure that a specified level of customer service is achieved.

Question 10. Question : The demand for coffee beans over a period of three months has been represented in the form of an L-shaped curve. Which form of model was used here?

Mathematical model

Visual model

Kinesthetic model

Verbal model

Question 11. Question : Prescriptive decision models help:

Make predictions of how demand is influenced by price.

Make trade-offs between greater rewards and risks of potential losses.

Decision makers identify the best solution to decision problems.

Describe relationships and influence of various elements in the model.

Question 12. Question : The data mining approach called ________ involves the developing of analytic models to describe the relationship between metrics that drive business performance like profitability, customer satisfaction, or employee satisfaction.

association

reduction

cause-and-effect modeling

classification

Question 13. Question : In the cause-and-effect modeling, internal metrics, such as employee satisfaction, productivity, and turnover are considered to be ________ measures.

logit

life

leading

lagging

Question 14. Question : In the ________ method, the distance between groups is defined as the distance between the closest pair of objects, where only pairs consisting of one object from each group are considered.

Ward’s linkage clustering

single linkage clustering

divisive clustering

average group linkage clustering

Question 15. Question : Which of the following is true of hierarchical clustering?

All clusters must have the same number of data.

No single cluster can have all objects

The data are not partitioned into a particular cluster in a single step.

All clusters must have more than one object in it.

Question 16. Question : Which of the following typically describes the support for the association rule?

The number of transactions that include all items that are in the antecedent parts of the rule

The number of transactions that include all items in the antecedent and consequent parts of the rule

The number of transactions that include half from the antecedent and half from the consequent

The number of transactions that include all items that are in the consequent parts of the rule

Question 17. Question : Which of the following is true of cluster analysis?

It is a cause-and-modeling type of analytic model.

It does not provide a definitive answer from analyzing the data.

It is primarily a prescriptive analytical method.

It uses clustered data that are not affected by the specific method used.

Question 18. Question : Sendstars is a package delivering company that recently made a study on its customer retention and service renewal metrics. They found that most customers defected from using Sendstars’ services due to customer dissatisfaction stemming from delivery personnel being rude or ill-mannered.

To curb this issue, Sendstars gave special training to its employees in customer service.

Association

Cause-and-effect modeling

Classification

Reduction

Question 19. Question : ________ is a data-mining technique used for classifying a set of observations into predefined classes.

Logistic regression

k-Nearest Neighbors algorithm

Discriminant analysis

Linear regression

Question 20. Question : Which of the following would be considered a lagging measure in a restaurant using the cause-and-modeling method of data mining?

A manager who is having trouble meeting the daily demands

A waiter’s behavior toward a customer

An accurately billed meal

A satisfied customer

Question 21. Question : Which of the following is true of random partitioning?

It cannot be used for creating training data sets.

It can contain any non-negative value from the observations.

It can include negative-value observations in its data.

It selects its data based on observations that have similar properties.

Question 22. Question : Divisive clustering method is different from agglomerative clustering methods in that divisive clustering methods:

can only have a pair of subjects in each cluster.

separate objects into a particular cluster in one step.

separate n objects successively into finer groupings.

can only have a single subject in each cluster.

Question 23. Question : Uniform or triangular distributions are used in the absence of data.

True

False

Question 24. Question : A normal distribution has a limited range and can be skewed in either direction.

True

False

Question 25. Question : Monte Carlo simulation is an inappropriate tool to analyze cash budgets because of the inherent uncertainty of the sales forecasts on which most cash budgets are based.

True

False

 

 

Need assignment writing services that are 100% risk-free. Our writers are capable of providing the best assignment help to students in globally at best rates.

Assignment online is a team of top-class experts whose only goal is to give you the best assignment help service. Follow the link below to order now...

#write essay #research paper