BIS 320 Final Exam July 2017 Version

1. A major criterion in deciding the most important perspectives of a business problem is:



organizational needs

change management

2. Which of the following can force a business and its competitors to compete on price alone?

Transparent marketplace

Poor process efficiency

High product differentiation

Demand control

3. Software used to apply the computer to a specific task for an end user is called:

data management software

network software

system software

application software

4. To show each level of a system’s design, its relationship to other levels, and its place in the overall design structure, structured methodologies use:

process specifications

high-level data flow diagrams

structured diagrams

low-level data flow diagrams

5. The most basic business database is comprised of:

five tables: for customers, employees, suppliers, parts, and sales

four tables: for customers, suppliers, sales, and employees

four tables: for customers, suppliers, parts, and sales

three tables: for suppliers, parts, and sales

6. In order to achieve maximum benefit from an enterprise software package, a business:

selects only the software that best matches its existing business processes

uses only the processes in the software that match its own processes

changes the way it works to match the software’s business processes

customizes the software to match all of its business processes

7. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called:


packet switching


packet routing

8. What are the relationships that the relational database is named for?

Relationships between fields and records

Relationships between databases

Relationships between entities

Relationships between rows and columns

9. In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:

accountability and control

system quality

information rights and obligations

property rights and obligations

10. Which of the following is one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

Identify the options you cannot reasonably take.

Assign responsibility.

Identify the prime dependents.

Identify and clearly describe the facts.

11. The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called:





12. Which of the following collaboration tools would be appropriate for participants in separate locations who need to collaborate synchronously?

Team Room

Electronic meeting software

Group calendar


13. In a(n) ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods.



hybrid cloud


14. Microsoft® Excel® is an example of:

data management software

word processing software

presentation graphics

spreadsheet software

15. Virtualization:

allows smartphones to run full-fledged operating systems.

has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.

can boost server utilization rates to 70% or higher.

allows one operating system to manage several physical machines.

16. Microsoft Word is an example of:

open-source software

word-processing software

software productivity suite

data management software

17. What is the most important benefit of an enterprise application?

Enabling speed of communicating

Enabling cost-effective, e-business processes

Enabling a company to work collaboratively with customers and suppliers

Enabling business functions and departments to share information

18. The oldest method for building information systems is:

the systems development lifecycle


component-based development

object-oriented development

19. A VPN:

is an encrypted private network configured within a public network

is an Internet-based service for delivering voice communications

provides secure, encrypted communications using Telnet

is more expensive than a dedicated network

20. In choosing the best solution for a business problem, one of the most important considerations is:

change management

existing resources and skills

outcome measurement

employee training

21. Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.





22. Which of the following statements about the Internet security is true?

The use of P2P networks cannot expose a corporate computer to outsiders.

VoIP is more secure than the switched voice network.

A corporate network with access to the Internet is more secure than one that provides access.

Instant messaging can provide hackers access to an otherwise secure network.

23. Which of the following statements is true about cloud computing?

It consists of three types of services: cloud infrastructure, cloud platform, and cloud software.

It removes the concern about data and systems security for businesses.

It prevents smaller firms to use resources previously affordable.

It relies on the help desk as the method for delivering services to users.

24. The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?





25. An independent computer program that copies itself from one computer to another over a network is called a:

Trojan Horse




26. Microsoft® PowerPoint® is an example of which type of software that provides more control over text and graphic placement in the layout of a page than word processing software?

presentation graphics

word processing software

data management software

spreadsheet software

27. Which of the following is a characteristic of an effective PowerPoint® Presentation slide?

Multiple complete sentences filling the slide with text

Three to five bullets per slide summarizing key points for the presenter

Extensive animation and sound effects

Embedded tables with fonts less than 12pt.

28. Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?

peer-to-peer network


campus area network

domain-based LAN

29. The most successful solutions or methods for achieving a business objective are called:

best processes

core processes


best practices

30. Specific security challenges that threaten corporate servers in a client/server environment include:

unauthorized access; errors; spyware

tapping; sniffing; message alteration; radiation

theft, copying, alteration of data; hardware or software failure

hacking; vandalism; denial of service attacks

Calculate Your Essay Price
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 10% with the coupon code: best10