SlideShare a Scribd company logo
34 Multiple choice questions, 3 points each t
1. The practice of becoming the largest purchaser of products from a given supplier is an
example of:
A. Cost leadership
B. Growth strategies
C. Differentiation
D. Locking in the supplier
2. Becoming a low-cost producer of products and services in an industry is an example of a(n):
A. Cost leadership strategy
B. Differentiation strategy
C. Innovation strategy
D. Growth strategy
3. Companies like Wal-Mart extend their networks to their customers and suppliers in order to
build innovative continuous inventory replenishment systems that would lock in their business.
This creates a(n) _______________ information system.
A. leveraged
B. inter-enterprise
C. intra-enterprise
D. locked-in
4. A serious problem of competitive advantage is that:
A. It normally doesn't last very long and it isn't sustainable over the long term
B. Competitors figure out how it was done and do the same thing
C. A competitive advantage can become a competitive necessity
D. All of the choices are correct.
5. Organizations are examples of _______________ systems because they interface and interact
with other systems in their environment.
A. linked
B. open
C. dependent
D. parallel
6. The majority of organizations today would be classified as _______________ systems.
A. open
B. closed
C. open adaptive
D. closed adaptive
7. Telecommunications networks consist of _______________.
A. computers, the Internet, intranets, and extranets
B. communications processors
C. devices interconnected by communication media and controlled by communications software
D. All of the choices are correct.
8. All of the following normally happens to data during a value-added process except:
A. Their useful life is determined
B. Their form is aggregated, manipulated, and organized
C. Their content is analyzed and evaluated
D. They are placed in a proper context for a human user
9. Which of the following is an advantage of RAID?
A. It provides virtually unlimited online storage
B. It provides high access speeds
C. It provides fault-tolerant storage capacity
D. All of the choices are advantages.
10. All of the following are considered characteristics of a desktop publishing package except:
A. Used to print newsletters and brochures
B. Imports text and graphic files from other programs
C. Used for business analysis and modeling
D. Used to print books and manuals
11. According to the text, spreadsheet packages are used by virtually every business for
_______________.
A. analysis, planning, and modeling
B. maintaining accounting records, such as a general ledger
C. keeping up-to-the-minute inventory records
D. tracking human resources
12. Cloud computing is not:
A. Grid computing
B. A style of computing users need not have knowledge, expertise, or control over the
technological infrastructure
C. A style of computing where resources are provided as a service over the Internet
D. A metaphor for the Internet
13. System management programs:
A. Manage the hardware, software, networking, and data resources of computer systems during
the execution of information processing jobs
B. Manage e-mail and CASE tools for both end users and developers
C. Help users develop information system programs and procedures
D. All of the choices are correct.
14. The user interface function of an operating system typically:
A. Allows end users to communicate with it so they can load programs, access files, and
accomplish other tasks
B. Manages the hardware resources of a computer system
C. Controls the creation, deletion, and access of files of data and programs
D. Manages the accomplishment of the computing tasks of end users
15. All of the following contribute to problems when using a file management approach except:
A. Data redundancy
B. Lack of integration of data
C. Data independence
D. Lack of data integrity
16. (p. 204) Database management involves the use of database management software to control
how databases are _______________.
A. created
B. interrogated
C. maintained
D. All of the choices are correct.
17. All of the following are major functions of a database management system except:
A. Creating new databases and database applications
B. Identifying insufficient data processing or storage needs
C. Maintaining the quality of the data in an organization's databases
D. Using the databases of an organization to provide the information needed by its end users
18. A DBMS query language is designed to:
A. Support information systems professionals in the development of complex application
software
B. Support end users who wish to obtain ad hoc reports
C. Provide efficient batch mode processing of the database
D. Specify the content, relationships, and structure of a database
19. The database maintenance process is accomplished via:
A. Hierarchical database systems that provide flexibility and network databases
B. Transaction processing systems and other end user applications, with the support of the
DBMS
C. Graphical query languages correctly phrasing SQL
D. File processing systems with the support of 4GLs
20. Boolean logic deals with three logical operators:
A. AND, OR, and BUT
B. AND, NOT, and BUT
C. OR, BUT, and NOT
D. AND, OR, and NOT
21. In mainframe and server computer systems, the database management system controls the
_______________ of the databases of computer-using organizations.
A. maintenance
B. development
C. use
D. All of the choices are correct.
21. All of the following are major functions of a database management system except:
A. Creating new databases and database applications
B. Identifying insufficient data processing or storage needs
C. Maintaining the quality of the data in an organization's databases
D. Using the databases of an organization to provide the information needed by its end users
21. Database development involves defining and organizing the _______________ of the data
needed to build a database.
A. structure
B. content
C. relationships
D. All of the choices are correct.
22. Which of the following best describes how star, ring, and bus networks differ?
A. Performance and reliability
B. Performance, reliability, and cost
C. Reliability and cost
D. Performance and cost
23. A(n) _______________ is a standard set of rules and procedures for the control of
communication in a network.
A. amplification
B. algorithm
C. protocols
D. transponders
24. The _______________ layer in an OSI model provides communications services for end
users.
A. application
B. data link
C. network
D. transport
25. In an OSI model, the _______________ layer does the routing and forwarding.
A. physical
B. data link
C. network
D. application
26. When IP was first standardized, the specification required that each system attached to the
Internet be assigned a unique, _______________ Internet address value.
A. 4-bit
B. 8-bit
C. 16-bit
D. 32-bit
27. _______________ systems cross the boundaries of traditional business functions in order to
reengineer and improve vital business processes all across the enterprise.
A. Electronic business
B. Enterprise collaboration
C. Cross-functional enterprise
D. Supply chain management
28. Networked enterprises view _______________ systems as a strategic way to use IT to
decentralize information resources.
A. electronic business
B. enterprise collaboration
C. cross-functional enterprise
D. supply chain management
29. Instead of focusing on the information processing requirements of business functions,
enterprise software focuses on supporting integrated clusters of _______________ involved in
the operations of a business.
A. application software
B. business processes
C. customer relationships
D. all of the choices are correct.
30. A(n) _______________ architecture illustrates the inter-relationships of the major cross-
functional enterprise applications that many companies have, or are installing, today.
A. enterprise application
B. enterprise operation
C. cross-functional
D. none of the choices are correct.
31. Which of the following applications focuses on the efficiency of a firm's internal production,
distribution, and financial processes?
A. Customer relationship management
B. Enterprise resource planning
C. Knowledge management
D. Supply chain management
32. Which of the following applications focuses on acquiring and retaining profitable customers
via marketing, sales, and service processes?
A. Customer relationship management
B. Enterprise resource planning
C. Knowledge management
D. Supply chain management
33. Which of the following applications focuses on developing the most efficient and effective
sourcing and procurement processes?
A. Customer relationship management
B. Enterprise resource planning
C. Knowledge management
D. Supply chain management
34. Which of the following applications focuses on tools that support group collaboration and
decision support?
A. Customer relationship management
B. Enterprise resource planning
C. Knowledge management
D. Supply chain management
Solution
1. The practice of becoming the largest purchaser of products from a given supplier is an
example of:
Answer ) Option D. Locking in the supplier
2. Becoming a low-cost producer of products and services in an industry is an example of a(n):
Answer ) OptionA. Cost leadership strategy
3. Companies like Wal-Mart extend their networks to their customers and suppliers in order to
build innovative continuous inventory replenishment systems that would lock in their business.
This creates a(n) _______________ information system.
Answer ) OptionB. inter-enterprise
4. A serious problem of competitive advantage is that:
Answer ) Option D. All of the choices are correct.
5. Organizations are examples of _______________ systems because they interface and interact
with other systems in their environment.
Answer) Option B. open
23. A(n) _______________ is a standard set of rules and procedures for the control of
communication in a network.
Answer ) OptionC. protocols
24. The _______________ layer in an OSI model provides communications services for end
users.
Answer ) Option A. application
25. In an OSI model, the _______________ layer does the routing and forwarding.
Answer ) Option C. network
26. When IP was first standardized, the specification required that each system attached to the
Internet be assigned a unique, _______________ Internet address value.
Answer ) OptionD. 32-bit
27. _______________ systems cross the boundaries of traditional business functions in order to
reengineer and improve vital business processes all across the enterprise.
Answer ) Option C. Cross-functional enterprise
28. Networked enterprises view _______________ systems as a strategic way to use IT to
decentralize information resources.
Answer ) Option C. Cross-functional enterprise
29. Instead of focusing on the information processing requirements of business functions,
enterprise software focuses on supporting integrated clusters of _______________ involved in
the operations of a business.
Answer ) Option B. business processes
30. A(n) _______________ architecture illustrates the inter-relationships of the major cross-
functional enterprise applications that many companies have, or are installing, today?
Answer ) OptionA. enterprise application
31. Which of the following applications focuses on the efficiency of a firm's internal production,
distribution, and financial processes?
Answer ) Option B. Enterprise resource planning
32. Which of the following applications focuses on acquiring and retaining profitable customers
via marketing, sales, and service processes?
Answer ) Option A. Customer relationship management
33. Which of the following applications focuses on developing the most efficient and effective
sourcing and procurement processes
Answer ) Option D. Supply chain management
34. Which of the following applications focuses on tools that support group collaboration and
decision support?
Answer ) Option C. Knowledge management

More Related Content

DOCX
1. ________ occur(s) when data are isolated in separated informa.docx
DOCX
Final Exam (20)Started Dec 12 at 6pm Quiz Instructio.docx
DOCX
Bis 219 final exam mcq`s correct answers 100%
DOCX
Bis 219 final exam mcq`s correct answers 100%
DOCX
(New) final exam for bis 219 all correct answers 100%
DOCX
(New) final exam for bis 219 all correct answers 100%
DOCX
(New) final exam for bis 219 bis 219 all correct answers 100%
DOCX
Bis 219 bis219 final exam correct 100%
1. ________ occur(s) when data are isolated in separated informa.docx
Final Exam (20)Started Dec 12 at 6pm Quiz Instructio.docx
Bis 219 final exam mcq`s correct answers 100%
Bis 219 final exam mcq`s correct answers 100%
(New) final exam for bis 219 all correct answers 100%
(New) final exam for bis 219 all correct answers 100%
(New) final exam for bis 219 bis 219 all correct answers 100%
Bis 219 bis219 final exam correct 100%

Similar to 34 Multiple choice questions, 3 points each t1. The practice of be.pdf (20)

DOCX
Bis 219 bis219 final exam correct 100%
DOCX
1..bis 219 bis219 final exam correct 100%
DOCX
Bis 219 bis219 final exam correct 100%
DOCX
Bis 219 bis219 final exam correct 100%
DOC
Mcq for final
DOCX
Bis 219 final exam 54 54 correct answers 100%
DOCX
Bis 220 final exam 30 30 correct answers 100%
DOCX
Bis 219 final exam 54#questions with answers correct 100%
DOCX
Bis 219 final exam 54#questions with answers correct 100%
DOCX
Bis 219 final exam
DOCX
Bis 219 final exam
DOCX
Bis 219 final exam
DOCX
Bis 220 bis220 final exam correct 100%
DOCX
Bis 220 bis220 final exam correct 100%
DOCX
Bis 220 bis220 final exam correct 100%
DOCX
Bis 220 bis220 final exam correct 100%
DOCX
TrueFalse Questions (25 Points)Instructions Select True or Fal.docx
DOCX
Bis 220 final exam
DOCX
Bis 220 final exam
DOCX
Bis 220 final exam
Bis 219 bis219 final exam correct 100%
1..bis 219 bis219 final exam correct 100%
Bis 219 bis219 final exam correct 100%
Bis 219 bis219 final exam correct 100%
Mcq for final
Bis 219 final exam 54 54 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%
Bis 219 final exam 54#questions with answers correct 100%
Bis 219 final exam 54#questions with answers correct 100%
Bis 219 final exam
Bis 219 final exam
Bis 219 final exam
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
TrueFalse Questions (25 Points)Instructions Select True or Fal.docx
Bis 220 final exam
Bis 220 final exam
Bis 220 final exam
Ad

More from arjuncorner565 (20)

PDF
Write about Participatory Design Issues and Concerns (use your own.pdf
PDF
Why do some vertebrates, like a hellbender salamander, exchange oxyg.pdf
PDF
Which of the following is the most direct source of energy for cotran.pdf
PDF
Which minerals commonly show pleochroisma. Isometric minerals.pdf
PDF
Two cards are drawn from a standard deck of cards. Determine the pro.pdf
PDF
The probability that a student will find a (desirable) job before gr.pdf
PDF
The Northern Pacific Railroad actively lobbied for which of the foll.pdf
PDF
The difference between vertical and horizontal transmission of plant .pdf
PDF
select all that apply to ground substanceSolutionLets us see w.pdf
PDF
Relying on the above pathway for biosynthesis of tryptophan, fill i.pdf
PDF
Question 7 (2 points)A researcher conducts a study on the realtion.pdf
PDF
Primary difference between the income sections for form 1120 and .pdf
PDF
Once its readable i will be okay.SolutionI will be okay in.pdf
PDF
Need the mutiple choice answered uslde .An)_can omunicate with a sys.pdf
PDF
Need a strong biologistgeneticist to answer this P element question.pdf
PDF
Modify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdf
PDF
Listed are 2 of the core theories of evolution. For each, give a def.pdf
PDF
Light is confined within the core of a simple clad optical fiber by.pdf
PDF
Let L R^n rightarrow R^m be a linear transformation. Show that if n .pdf
PDF
IS path vector routing algorithm closer to the distance vector rou.pdf
Write about Participatory Design Issues and Concerns (use your own.pdf
Why do some vertebrates, like a hellbender salamander, exchange oxyg.pdf
Which of the following is the most direct source of energy for cotran.pdf
Which minerals commonly show pleochroisma. Isometric minerals.pdf
Two cards are drawn from a standard deck of cards. Determine the pro.pdf
The probability that a student will find a (desirable) job before gr.pdf
The Northern Pacific Railroad actively lobbied for which of the foll.pdf
The difference between vertical and horizontal transmission of plant .pdf
select all that apply to ground substanceSolutionLets us see w.pdf
Relying on the above pathway for biosynthesis of tryptophan, fill i.pdf
Question 7 (2 points)A researcher conducts a study on the realtion.pdf
Primary difference between the income sections for form 1120 and .pdf
Once its readable i will be okay.SolutionI will be okay in.pdf
Need the mutiple choice answered uslde .An)_can omunicate with a sys.pdf
Need a strong biologistgeneticist to answer this P element question.pdf
Modify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdf
Listed are 2 of the core theories of evolution. For each, give a def.pdf
Light is confined within the core of a simple clad optical fiber by.pdf
Let L R^n rightarrow R^m be a linear transformation. Show that if n .pdf
IS path vector routing algorithm closer to the distance vector rou.pdf
Ad

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Pre independence Education in Inndia.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Cell Structure & Organelles in detailed.
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Basic Mud Logging Guide for educational purpose
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pre independence Education in Inndia.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
human mycosis Human fungal infections are called human mycosis..pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Cell Structure & Organelles in detailed.
Renaissance Architecture: A Journey from Faith to Humanism
Basic Mud Logging Guide for educational purpose
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
102 student loan defaulters named and shamed – Is someone you know on the list?
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
O7-L3 Supply Chain Operations - ICLT Program
Supply Chain Operations Speaking Notes -ICLT Program
Anesthesia in Laparoscopic Surgery in India
VCE English Exam - Section C Student Revision Booklet
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

34 Multiple choice questions, 3 points each t1. The practice of be.pdf

  • 1. 34 Multiple choice questions, 3 points each t 1. The practice of becoming the largest purchaser of products from a given supplier is an example of: A. Cost leadership B. Growth strategies C. Differentiation D. Locking in the supplier 2. Becoming a low-cost producer of products and services in an industry is an example of a(n): A. Cost leadership strategy B. Differentiation strategy C. Innovation strategy D. Growth strategy 3. Companies like Wal-Mart extend their networks to their customers and suppliers in order to build innovative continuous inventory replenishment systems that would lock in their business. This creates a(n) _______________ information system. A. leveraged B. inter-enterprise C. intra-enterprise D. locked-in 4. A serious problem of competitive advantage is that: A. It normally doesn't last very long and it isn't sustainable over the long term B. Competitors figure out how it was done and do the same thing C. A competitive advantage can become a competitive necessity D. All of the choices are correct. 5. Organizations are examples of _______________ systems because they interface and interact with other systems in their environment. A. linked B. open C. dependent D. parallel 6. The majority of organizations today would be classified as _______________ systems. A. open B. closed C. open adaptive D. closed adaptive
  • 2. 7. Telecommunications networks consist of _______________. A. computers, the Internet, intranets, and extranets B. communications processors C. devices interconnected by communication media and controlled by communications software D. All of the choices are correct. 8. All of the following normally happens to data during a value-added process except: A. Their useful life is determined B. Their form is aggregated, manipulated, and organized C. Their content is analyzed and evaluated D. They are placed in a proper context for a human user 9. Which of the following is an advantage of RAID? A. It provides virtually unlimited online storage B. It provides high access speeds C. It provides fault-tolerant storage capacity D. All of the choices are advantages. 10. All of the following are considered characteristics of a desktop publishing package except: A. Used to print newsletters and brochures B. Imports text and graphic files from other programs C. Used for business analysis and modeling D. Used to print books and manuals 11. According to the text, spreadsheet packages are used by virtually every business for _______________. A. analysis, planning, and modeling B. maintaining accounting records, such as a general ledger C. keeping up-to-the-minute inventory records D. tracking human resources 12. Cloud computing is not: A. Grid computing B. A style of computing users need not have knowledge, expertise, or control over the technological infrastructure C. A style of computing where resources are provided as a service over the Internet D. A metaphor for the Internet 13. System management programs: A. Manage the hardware, software, networking, and data resources of computer systems during the execution of information processing jobs B. Manage e-mail and CASE tools for both end users and developers
  • 3. C. Help users develop information system programs and procedures D. All of the choices are correct. 14. The user interface function of an operating system typically: A. Allows end users to communicate with it so they can load programs, access files, and accomplish other tasks B. Manages the hardware resources of a computer system C. Controls the creation, deletion, and access of files of data and programs D. Manages the accomplishment of the computing tasks of end users 15. All of the following contribute to problems when using a file management approach except: A. Data redundancy B. Lack of integration of data C. Data independence D. Lack of data integrity 16. (p. 204) Database management involves the use of database management software to control how databases are _______________. A. created B. interrogated C. maintained D. All of the choices are correct. 17. All of the following are major functions of a database management system except: A. Creating new databases and database applications B. Identifying insufficient data processing or storage needs C. Maintaining the quality of the data in an organization's databases D. Using the databases of an organization to provide the information needed by its end users 18. A DBMS query language is designed to: A. Support information systems professionals in the development of complex application software B. Support end users who wish to obtain ad hoc reports C. Provide efficient batch mode processing of the database D. Specify the content, relationships, and structure of a database 19. The database maintenance process is accomplished via: A. Hierarchical database systems that provide flexibility and network databases B. Transaction processing systems and other end user applications, with the support of the DBMS C. Graphical query languages correctly phrasing SQL D. File processing systems with the support of 4GLs
  • 4. 20. Boolean logic deals with three logical operators: A. AND, OR, and BUT B. AND, NOT, and BUT C. OR, BUT, and NOT D. AND, OR, and NOT 21. In mainframe and server computer systems, the database management system controls the _______________ of the databases of computer-using organizations. A. maintenance B. development C. use D. All of the choices are correct. 21. All of the following are major functions of a database management system except: A. Creating new databases and database applications B. Identifying insufficient data processing or storage needs C. Maintaining the quality of the data in an organization's databases D. Using the databases of an organization to provide the information needed by its end users 21. Database development involves defining and organizing the _______________ of the data needed to build a database. A. structure B. content C. relationships D. All of the choices are correct. 22. Which of the following best describes how star, ring, and bus networks differ? A. Performance and reliability B. Performance, reliability, and cost C. Reliability and cost D. Performance and cost 23. A(n) _______________ is a standard set of rules and procedures for the control of communication in a network. A. amplification B. algorithm C. protocols D. transponders 24. The _______________ layer in an OSI model provides communications services for end users. A. application
  • 5. B. data link C. network D. transport 25. In an OSI model, the _______________ layer does the routing and forwarding. A. physical B. data link C. network D. application 26. When IP was first standardized, the specification required that each system attached to the Internet be assigned a unique, _______________ Internet address value. A. 4-bit B. 8-bit C. 16-bit D. 32-bit 27. _______________ systems cross the boundaries of traditional business functions in order to reengineer and improve vital business processes all across the enterprise. A. Electronic business B. Enterprise collaboration C. Cross-functional enterprise D. Supply chain management 28. Networked enterprises view _______________ systems as a strategic way to use IT to decentralize information resources. A. electronic business B. enterprise collaboration C. cross-functional enterprise D. supply chain management 29. Instead of focusing on the information processing requirements of business functions, enterprise software focuses on supporting integrated clusters of _______________ involved in the operations of a business. A. application software B. business processes C. customer relationships D. all of the choices are correct. 30. A(n) _______________ architecture illustrates the inter-relationships of the major cross- functional enterprise applications that many companies have, or are installing, today. A. enterprise application
  • 6. B. enterprise operation C. cross-functional D. none of the choices are correct. 31. Which of the following applications focuses on the efficiency of a firm's internal production, distribution, and financial processes? A. Customer relationship management B. Enterprise resource planning C. Knowledge management D. Supply chain management 32. Which of the following applications focuses on acquiring and retaining profitable customers via marketing, sales, and service processes? A. Customer relationship management B. Enterprise resource planning C. Knowledge management D. Supply chain management 33. Which of the following applications focuses on developing the most efficient and effective sourcing and procurement processes? A. Customer relationship management B. Enterprise resource planning C. Knowledge management D. Supply chain management 34. Which of the following applications focuses on tools that support group collaboration and decision support? A. Customer relationship management B. Enterprise resource planning C. Knowledge management D. Supply chain management Solution 1. The practice of becoming the largest purchaser of products from a given supplier is an example of: Answer ) Option D. Locking in the supplier 2. Becoming a low-cost producer of products and services in an industry is an example of a(n): Answer ) OptionA. Cost leadership strategy 3. Companies like Wal-Mart extend their networks to their customers and suppliers in order to
  • 7. build innovative continuous inventory replenishment systems that would lock in their business. This creates a(n) _______________ information system. Answer ) OptionB. inter-enterprise 4. A serious problem of competitive advantage is that: Answer ) Option D. All of the choices are correct. 5. Organizations are examples of _______________ systems because they interface and interact with other systems in their environment. Answer) Option B. open 23. A(n) _______________ is a standard set of rules and procedures for the control of communication in a network. Answer ) OptionC. protocols 24. The _______________ layer in an OSI model provides communications services for end users. Answer ) Option A. application 25. In an OSI model, the _______________ layer does the routing and forwarding. Answer ) Option C. network 26. When IP was first standardized, the specification required that each system attached to the Internet be assigned a unique, _______________ Internet address value. Answer ) OptionD. 32-bit 27. _______________ systems cross the boundaries of traditional business functions in order to reengineer and improve vital business processes all across the enterprise. Answer ) Option C. Cross-functional enterprise 28. Networked enterprises view _______________ systems as a strategic way to use IT to decentralize information resources. Answer ) Option C. Cross-functional enterprise 29. Instead of focusing on the information processing requirements of business functions, enterprise software focuses on supporting integrated clusters of _______________ involved in the operations of a business. Answer ) Option B. business processes 30. A(n) _______________ architecture illustrates the inter-relationships of the major cross- functional enterprise applications that many companies have, or are installing, today? Answer ) OptionA. enterprise application 31. Which of the following applications focuses on the efficiency of a firm's internal production, distribution, and financial processes? Answer ) Option B. Enterprise resource planning 32. Which of the following applications focuses on acquiring and retaining profitable customers
  • 8. via marketing, sales, and service processes? Answer ) Option A. Customer relationship management 33. Which of the following applications focuses on developing the most efficient and effective sourcing and procurement processes Answer ) Option D. Supply chain management 34. Which of the following applications focuses on tools that support group collaboration and decision support? Answer ) Option C. Knowledge management