In: Operations Management
Which of the following include the three primary network access technologies?
A. DSL, Cable Modem, Broadband
B. LAN, WAN, MAN
C. VoIP, UC, IPTV
D. TCP/IP, FTP, DHCP
What are the five elements that are needed to create a connected world or a network?
A. categories, programs, alternatives, people, and core philosophy
B. program, providers, access, mechanics, and teachers
C. categories, providers, access technologies, protocols, and convergence
D. LAN, WAN, MAN, PAN, and SAN
What is a large computer network usually spanning a city or a specific infrastructure like a
college?
A. metropolitan area network (MAN)
B. local area network (LAN)
C. wide area network (WAN)
D. secure area network (SAN)
LANs, WANs, and MANs all provide users with an accessible and reliable network
infrastructure. Which of the below are the most important network differentiating dimensions?
A. reliability and timing
B. confidentiality and performance
C. security and cost
D. cost and performance
The Internet is a hierarchical structure linking different levels of service providers whose
millions of devices supply all the interconnections. The three levels outlined in the book from the
top down include ________.
A. new system provider (NSP), current system provider (CSP), and order entry system provider
(OSP)
B. national service provider (NSP), regional service provider (RSP), and internet service
provider (ISP)
C. net server point (NSP), radio server point (RSP), and internet server point (ISP)
D. None of these are correct.
The speed of transmission of a network is determined by the speed of its smallest ________.
A. unit of time
B. number of computers
C. amount of bandwidth
D. number of customers
What measures bandwidth in terms of numbers transferred or received per unit of time?
A. connection time
B. broadband
C. protocol
D. bit rate
What are the two most prevalent types of broadband access?
A. data subscriber and cable connection
B. digital subscriber line and cable connection
C. digital line and client line
D. digital server and client server
What allows users to work from remote locations such as home or hotel using high-speed
Internet to access business applications and data?
A. telecommuting
B. repeater
C. packet header
D. virtual attenuation
What is traceroute?
A. a single unit of binary data routed through a network
B. lists the destination (for example, in IP packets the destination is the IP address) along with
the length of the message data
C. represents the end of the packet or transmission end
D. a utility application that monitors the network path of packet data sent to a remote computer
What lists the destination (for example in IP packets the destination is the IP address) along with
the length of the message data?
A. traceroute
B. standard packet
C. packet header
D. packet footer
What is a utility application that monitors the network path of packet data sent to a remote
computer?
A. traceroute
B. standard packet
C. packet header
D. packet footer
What is the standard Internet protocol, which provides the technical foundation for the public
Internet?
A. data streaming and DSL protocols
B. transmission control protocol/Internet protocol (TCP/IP)
C. data streaming rules and regulations
D. Internet protocol/Transmission control protocol (IP/TCP)
How do TCP and IP differ?
A. TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the data are
sent to the correct IP address.
B. TCP verifies the information is reliable, and IP verifies that the data is sent.
C. IP verifies the correct delivery of data in case it is corrupted, where TCP verifies the data are
sent to the correct IP address.
D. IP verifies connectivity, and TCP verifies the rate at which the data is sent.
What is the conversion of IP addresses that identifies labels that use a variety of recognizable
naming conventions?
A. domain grades
B. URL spaces
C. domain national sequences (DNS)
D. domain name system (DNS)
What is a benefit of network convergence?
A. the uncoupling of voice, data, and video service
B. multiple services offered from several different vendors
C. multiple devices supported by one provider
D. All of these are correct.
What is the biggest benefit of VoIP?
A. lowers costs
B. clear connection
C. higher expenses
D. All of these are correct.
What is an extension of an intranet that is available only to authorized outsiders?
A. national ISP
B. regional ISP
C. intranet
D. extranet
What is the major challenge of networking or performing business in a connected world?
A. personal issues
B. society demands
C. security issues
D. telecommuting demands
Which of the statements below is not accurate in reference to mobile and wireless computing?
A. Mobile technology can travel with the user.
B. Wireless technology is any type of operation accomplished without the use of a hard-wired
connection.
C. Wireless technology is any type of operation accomplished with the use of a hard-wired
connection.
D. Mobile technology allows a user to download software to a laptop or cell phone for portable
reading or reference.
A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive
data and can be divided into which two categories?
A. cellular communications and multiple user communication systems
B. mobile and wireless technologies
C. cellular and satellite communication systems
D. client and server systems
What is mobile device management (MDM)?
A. allows mobile voice calls to be made over broadband networks, creating—under the right
network conditions—clearer audio and fewer dropped calls
B. remotely controls smart phones and tablets, ensuring data security
C. the blending of personal and business use of technology devices and applications
D. administers and delivers applications to corporate and personal smart phones and tablets
Which of the following is not a primary use of GIS?
A. finding what is nearby from a specific location
B. mapping densities
C. routing information
D. ensuring safety equipment is on an airplane before a flight
What allows separate systems to communicate directly with each other, eliminating the need for
manual entry into multiple systems?
A. integration
B. intelligence
C. data interchange
D. demand plan
What is the integration of data from multiple sources, which provides a unified view of all data?
A. backward integration
B. application integration
C. data integration
D. forward integration
What provides enterprisewide support and data access for a firm’s operations and business
processes?
A. enterprise systems
B. enterprise application integration
C. middleware
D. enterprise application integration middleware
What connects the plans, methods, and tools aimed at integrating separate enterprise systems?
A. enterprise systems
B. enterprise application integration
C. middleware
D. enterprise application integration middleware
What are several different types of software that sit between and provide connectivity for two or
more software applications?
A. enterprise systems
B. enterprise application integration
C. middleware
D. enterprise application integration middleware
In which of the five basic supply chain activities do you prepare to manage all resources required
to meet demand?
A. plan
B. source
C. deliver
D. return
In which of the five basic supply chain activities do you plan for the transportation of goods to
customers?
A. plan
B. source
C. deliver
D. return
Where would you find the suppliers' suppler in a typical supply chain?
A. upstream
B. downstream
C. in the middle
D. not on the supply chain
Where would you find the manufacturer and distributor in a typical supply chain?
A. upstream
B. downstream
C. in the middle
D. not on the supply chain
Which of the following is not one of the five basic components of supply chain management?
A. plan
B. source
C. analyze
D. deliver
What can effective and efficient supply chain management systems enable an organization to
accomplish?
A. increase the power of its buyers
B. increase its supplier power
C. increase switching costs to increase the threat of substitute products or services
D. All of these are correct.
Which of the metrics below represents the agreed upon time between the purchase of a product
and the delivery of the product?
A. back order
B. inventory cycle time
C. customer order cycle time
D. inventory turnover
What is the purchasing of goods and services to meet the needs of the supply chain?
A. procurement
B. logistics
C. materials management
D. bullwhip effect
What includes the increasingly complex management of processes, information, and
communication to take a product from cradle to grave?
A. inbound logistics
B. outbound logistics
C. logistics
D. cradle to grave
What are systems are used to create the digital designs and then manufacture the products?
A. computer-aided design/computer-aided manufacturing.
B. maker movement
C. makerspace
D. RFID electronic product code
What is a community center that provides technology, manufacturing equipment, and
educational opportunities to the public that would otherwise be inaccessible or unaffordable?
A. computer-aided design/computer-aided manufacturing
B. maker movement
C. makerspace
D. RFID electronic product code
Which of the following is not a current CRM trend?
A. partner relationship management
B. supplier relationship management
C. employee relationship management
D. distributor relationship management
Which of the following is not a valid way that a CRM system can collect information?
A. accounting system
B. order fulfillment system
C. inventory system
D. customer’s personal computer
Which of the following is a common marketing CRM metric?
A. number of new prospective customers
B. average number of service calls per day
C. average time to resolution
D. cost per interaction by marketing campaign
Which question below represents a CRM reporting technology example?
A. Why did sales not meet forecasts?
B. What customers are at risk of leaving?
C. What is the total revenue by customer?
D. All of these are correct.
Which question below represents a CRM predicting technology question?
A. Why did sales not meet forecasts?
B. What customers are at risk of leaving?
C. What is the total revenue by customer?
D. All of these are correct.
Which of the following is not considered a feature in a contact center?
A. automatic call distribution
B. interactive voice response
C. predictive dialing
D. automatic predictive dialing
Which of the following is where customer service representatives answer customer inquiries and
respond to problems through a number of different customer touchpoints?
A. contact center
B. web-based self-service
C. call scripting
D. website personalization
What is the primary difference between contact management and opportunity management?
A. Contact management deals with new customers; opportunity management deals with existing
customers.
B. Contact management deals with existing customers; opportunity management deals with
existing customers.
C. Contact management deals with new customers; opportunity management deals with new
customers.
D. Contact management deals with existing customers; opportunity management deals with new
customers.
Which of the following occurs when everyone involved in sourcing, producing, and delivering
the company’s product works with the same information?
A. eliminates redundancies
B. cuts down wasted time
C. removes misinformation
D. All of these are correct.
Which of the following describes an ERP system?
A. ERP systems provide a foundation for collaboration between departments.
B. ERP systems enable people in different business areas to communicate.
C. ERP systems have been widely adopted in large organizations to store critical knowledge used
to make the decisions that drive the organization’s performance.
D. All of these are correct.
Which of the following is a business-related consequence of successful software?
A. increased revenues
B. damage to brand reputation
C. increased liabilities
D. increased expenses
Which of the following represents the phases in the SDLC?
A. plan, analysis, design, test, maintain, develop, implement
B. analysis, plan, design, test, develop, maintain, implement
C. plan, analysis, design, develop, test, implement, maintain
D. analysis, plan, develop, design, test, implement, maintain
What is a project manager?
A. the application of knowledge, skills, tools, and techniques to project activities in order to meet
or exceed stakeholder needs and expectations from a project
B. any measurable, tangible, verifiable outcome, result, or item that is produced to complete a
project or part of a project
C. the representation of key dates when a certain group of activities must be performed
D. an individual who is an expert in project planning and management
Which of the following does a project manager perform?
A. defines and develops the project plan
B. tracks the plan to ensure all key project milestones are completed on time
C. expert in project planning and management
D. All of these are correct.
Which phase of the SDLC gathers business requirements?
A. plan
B. analysis
C. test
D. design
What is a data flow diagram (DFD)?
A. an illustration of the movement of information between external entities and the processes and
data stores within the system
B. software suites that automate systems analysis, design, and development
C. a formal, approved document that manages and controls the entire project
D. a graphical representation of the processes that capture, manipulate, store, and distribute
information between a system and its environment
Which phase takes all the detailed design documents from the design phase and transforms them
into the actual system?
A. testing phase
B. analysis phase
C. development phase
D. planning phase
What are defects in the code of an information system?
A. testing
B. bugs
C. insects
D. All of these are correct.
What assesses if the entire system meets the design requirements of the users?
A. alpha testing
B. development testing
C. integration testing
D. system testing
What verifies that separate systems can work together passing data back and forth correctly?
A. alpha testing
B. development testing
C. integration testing
D. system testing
What is the implementation phase in the SDLC?
A. Involves establishing a high-level plan of the intended project and determining project goals.
B. Involves analyzing end-user business requirements and refining project goals into defined
functions and operations of the intended system.
C. Involves describing the desired features and operations of the system.
D. Involves placing the system into production so users can begin to perform actual business
operations with the system.
What makes system changes to repair design flaws, coding errors, or implementation issues?
A. corrective maintenance
B. preventative maintenance
C. pilot implementation
D. phased implementation
What is an activity-based process in which each phase in the SDLC is performed sequentially
from planning through implementation and maintenance?
A. RAD methodology
B. agile methodology
C. waterfall methodology
D. extreme programming
Which of the following is an issue related to the waterfall methodology?
A. flaws in accurately defining and articulating the business problem
B. managing costs, resources, and time constraints
C. assumes users can specify all business requirements in advance
D. All of these are correct.
What breaks a project into tiny phases, and developers cannot continue on to the next phase until
the first phase is complete?
A. RAD methodology
B. agile methodology
C. waterfall methodology
D. extreme programming
Which gate in the RUP methodology expands on the agreed-upon details of the system,
including the ability to provide an architecture to support and build it?
A. inception
B. elaboration
C. construction
D. transition
Which gate in the RUP methodology includes building and developing the project?
A. inception
B. elaboration
C. construction
D. transition
Which methodology begins or ends each day with a stand-up meeting to monitor and control the
development effort?
A. Scrum
B. XP
C. RUP
D. RAD
What measures how well the solution will be accepted in a given opportunity?
A. political feasibility
B. operational feasibility
C. schedule feasibility
D. legal feasibility
What is the number one reason that IT projects fall behind schedule or fail?
A. change in business goals during the project
B. lack of support from business management
C. unclear or missing business requirements
D. change in technology during the project
What defines the how, what, when, and who regarding the flow of project information to
stakeholders and is key for managing expectations?
A. communication plan
B. executive sponsor
C. project assumptions
D. project deliverable
Which of the following is not a characteristic of a well-defined project plan?
A. prepared by the project manager
B. easy to read
C. appropriate to the project’s size
D. communicated to all key participants
What is the most important part of the project plan?
A. Gantt chart
B. specification
C. communication
D. None of these are correct.
What type of chart typically displays the critical path?
A. Gantt chart
B. PERT chart
C. All of these are correct.
D. None of these are correct.
Which of the following is the primary reason why companies outsource?
A. tap outside sources of expertise for a low cost
B. concentrate resources on core business
C. reduce headcount and related expenses
D. better manage the costs of internal processes
Which of the following is the least common reason why companies outsource?
A. tap outside sources of expertise for a low cost
B. concentrate resources on core business
C. reduce headcount and related expenses
D. better manage the costs of internal processes
Q1) the three primary network access technologies are:
a) DSL, Cable Modem, broadband
Q2) the five elements that are needed to create a connected world or a network are:
c) categories, providers, access technologies, protocols, and convergence
Q3) large computer network usually spanning a city or a specific infrastructure like a college is:
a) Metropolitan Area network
Q4) the most important network differentiating dimensions:
d) Cost and performance
Q5) The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the interconnections. The three levels outlined in the book from the top down include:
b) national service provider (NSP), regional service provider (RSP), and internet service provider (ISP)
Q6) The speed of transmission of a network is determined by the speed of its smallest:
c) Amount of Bandwidth
Q7) what measures bandwidth in terms of numbers transferred or received per unit of time:
d) Bit rate
Q8) What are the two most prevalent types of broadband access:
b) digital subscriber line and cable connection
Q9) What allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data:
a) Telecommuting
Q10) What is traceroute?:
d) a utility application that monitors the network path of packet data sent to a remote computer