1. Electronic data are more susceptible to destruction, fraud, error, and misuse because
information systems concentrate data in computer files that:
a. have the potential to be accessed by large numbers of people and by groups outside
of the organization.
b. are frequently available on the Internet.
c. are usually bound up in legacy systems that are difficult to access and difficult to
correct in case of error.
d. are not secure because the technology to secure them did not exist at the time the
files were created.
2. Inputting data into a poorly programmed Web form in order to disrupt a company's systems
and networks is called:
a. an SQL injection attack.
b. a Trojan horse.
c. a DDoS attack.
d. key logging.
3. Hackers create a botnet by:
a. by infecting corporate servers with "zombie" Trojan horses that allow undetected access
through a back door.
b. infecting Web search bots with malware.
c. by causing other people's computers to become "zombie" PCs following a master
computer.
d. by using Web search bots to infect other computers.
4. Which of the following is not an example of a computer used as a target of crime?
a. Illegally accessing stored electronic communication
b. Threatening to cause damage to a protected computer
c. Accessing a computer system without authority
d. Knowingly accessing a protected computer to commit fraud
5. Evil twins are:
a. Trojan horses that appears to the user to be a legitimate commercial software
application.
b. fraudulent Web sites that mimic a legitimate business's Web site.
c. e-mail messages that mimic the e-mail messages of a legitimate business.
d. bogus wireless network access points that look legitimate to users.
6. How do software vendors correct flaws in their software after it has been distributed?
a. Re-release software
b. Issue bug fixes
c. Issue patches
d. Issue updated versions
7. The Gramm-Leach-Bliley Act:
a. outlines medical security and privacy rules.
b. imposes responsibility on companies and management to safeguard the accuracy of
financial information.
c. requires financial institutions to ensure the security of customer data.
d. specifies best practices in information systems security and control.
8. Currently, the protocols used for secure information transfer over the Internet are:
a. SSL, TLS, and S-HTTP.
b. TCP/IP and SSL.
c. HTTP and TCP/IP.
d. S-HTTP and CA.
9. Most antivirus software is effective against:
a. any virus.
b. only those viruses already known when the software is written.
c. any virus except those in wireless communications applications.
d. only those viruses active on the Internet and through e-mail.
10. A digital certificate system:
a. uses tokens to validate a user's identity.
b. is used primarily by individuals for personal correspondence.
c. uses third-party CAs to validate a user's identity.
d. uses digital signatures to validate a user's identity.
11. Smaller firms may outsource some or many security functions to:
A) MSSPs.
B) MISs.
C) CAs.
D) ISPs.
12. A suite of integrated software modules for finance and accounting, human resources,
manufacturing and production, and sales and marketing that allows data to be used by
multiple functions and business processes best describes:
a. ERM software.
b. SCM software.
c. CRM modules.
d. ERP systems.
13. Why is overstocking warehouses not an effective solution for a problem of low availability?
a. It increases sales costs.
b. It increases inventory costs.
c. It does not speed product time to market.
d. It is an inefficient use of raw materials.
14. A network of organizations and business processes for procuring raw materials, transforming
these materials into intermediate and finished products, and distributing the finished products
to customers is called a:
a. distribution channel.
b. supply chain.
c. marketing channel.
d. value chain.
15. A company's organizations and processes for distributing and delivering products to the final
customers is the:
a. external supply chain.
b. downstream portion of the supply chain.
c. supplier's internal supply chain.
d. upstream portion of the supply chain.
16. Uncertainties arise in any supply chain because of:
a. inaccurate or untimely information.
b. unforeseeable events.
c. inefficient or inaccurate MIS.
d. poor integration between systems of suppliers, manufacturers, and distributors.
17. SFA modules in CRM systems would provide tools for:
a. capturing prospect and customer data.
b. managing sales prospect and contact information.
c. identifying profitable and unprofitable customers.
d. assigning and managing customer service requests.
18. ________ management is an important capability for service processes that is found in most
major CRM software products.
a. Lead
b. Returns
c. Account
d. Events
19. Customer relationship management applications dealing with the analysis of customer data to
provide information for improving business performance best describes ________ applications.
a. operational SCM
b. analytical CRM
c. analytical SFA
d. operational CRM
20. Based on your reading of the chapter, e-commerce is:
a. not yet fully accepted by consumers, although much of its driving technology is firmly
in place.
b. still in a revolutionary phase.
c. widely accepted by consumers, although technology is still quickly changing.
d. well entrenched as a form of modern commerce.
21. Varying a product's price according to the supply situation of the seller is called ________
pricing.
a. menu
b. asymmetric
c. dynamic
d. flexible
22. Compared to traditional goods, digital goods have:
a. lower marketing costs.
b. higher production costs.
c. greater pricing flexibility.
d. higher inventory costs.
23. Which of the following best illustrates the sales revenue model?
a. EBay receives a small fee from a seller if a seller is successful in selling an item.
b. Apple accepts micropayments for single music track downloads.
c. Flickr provides basic services for free, but charges a premium for advanced services.
d. Epinions receives a fee after steering a customer to a participating Web site where he
or she makes a purchase.
24. Exposing an individual to ads that are chosen and based on the recorded and analyzed online
behavior of the individual is referred to as:
a. long-tail marketing.
b. behavioral targeting.
c. online profiling.
d. clickstream advertising.
25. Which of the following describes long-tail marketing?
a. The dwindling sales of a once-popular book.
b. The yearly sales of one or two copies each of thousands of obscure films.
c. The unexpected growth of sales of a product long after its initial release.
d. The continued successful sales of a product over years.

information systems concentrate data in computer files that:
a. have the potential to be accessed by large numbers of people and by groups outside
of the organization.
b. are frequently available on the Internet.
c. are usually bound up in legacy systems that are difficult to access and difficult to
correct in case of error.
d. are not secure because the technology to secure them did not exist at the time the
files were created.
2. Inputting data into a poorly programmed Web form in order to disrupt a company's systems
and networks is called:
a. an SQL injection attack.
b. a Trojan horse.
c. a DDoS attack.
d. key logging.
3. Hackers create a botnet by:
a. by infecting corporate servers with "zombie" Trojan horses that allow undetected access
through a back door.
b. infecting Web search bots with malware.
c. by causing other people's computers to become "zombie" PCs following a master
computer.
d. by using Web search bots to infect other computers.
4. Which of the following is not an example of a computer used as a target of crime?
a. Illegally accessing stored electronic communication
b. Threatening to cause damage to a protected computer
c. Accessing a computer system without authority
d. Knowingly accessing a protected computer to commit fraud
5. Evil twins are:
a. Trojan horses that appears to the user to be a legitimate commercial software
application.
b. fraudulent Web sites that mimic a legitimate business's Web site.
c. e-mail messages that mimic the e-mail messages of a legitimate business.
d. bogus wireless network access points that look legitimate to users.
6. How do software vendors correct flaws in their software after it has been distributed?
a. Re-release software
b. Issue bug fixes
c. Issue patches
d. Issue updated versions
7. The Gramm-Leach-Bliley Act:
a. outlines medical security and privacy rules.
b. imposes responsibility on companies and management to safeguard the accuracy of
financial information.
c. requires financial institutions to ensure the security of customer data.
d. specifies best practices in information systems security and control.
8. Currently, the protocols used for secure information transfer over the Internet are:
a. SSL, TLS, and S-HTTP.
b. TCP/IP and SSL.
c. HTTP and TCP/IP.
d. S-HTTP and CA.
9. Most antivirus software is effective against:
a. any virus.
b. only those viruses already known when the software is written.
c. any virus except those in wireless communications applications.
d. only those viruses active on the Internet and through e-mail.
10. A digital certificate system:
a. uses tokens to validate a user's identity.
b. is used primarily by individuals for personal correspondence.
c. uses third-party CAs to validate a user's identity.
d. uses digital signatures to validate a user's identity.
11. Smaller firms may outsource some or many security functions to:
A) MSSPs.
B) MISs.
C) CAs.
D) ISPs.
12. A suite of integrated software modules for finance and accounting, human resources,
manufacturing and production, and sales and marketing that allows data to be used by
multiple functions and business processes best describes:
a. ERM software.
b. SCM software.
c. CRM modules.
d. ERP systems.
13. Why is overstocking warehouses not an effective solution for a problem of low availability?
a. It increases sales costs.
b. It increases inventory costs.
c. It does not speed product time to market.
d. It is an inefficient use of raw materials.
14. A network of organizations and business processes for procuring raw materials, transforming
these materials into intermediate and finished products, and distributing the finished products
to customers is called a:
a. distribution channel.
b. supply chain.
c. marketing channel.
d. value chain.
15. A company's organizations and processes for distributing and delivering products to the final
customers is the:
a. external supply chain.
b. downstream portion of the supply chain.
c. supplier's internal supply chain.
d. upstream portion of the supply chain.
16. Uncertainties arise in any supply chain because of:
a. inaccurate or untimely information.
b. unforeseeable events.
c. inefficient or inaccurate MIS.
d. poor integration between systems of suppliers, manufacturers, and distributors.
17. SFA modules in CRM systems would provide tools for:
a. capturing prospect and customer data.
b. managing sales prospect and contact information.
c. identifying profitable and unprofitable customers.
d. assigning and managing customer service requests.
18. ________ management is an important capability for service processes that is found in most
major CRM software products.
a. Lead
b. Returns
c. Account
d. Events
19. Customer relationship management applications dealing with the analysis of customer data to
provide information for improving business performance best describes ________ applications.
a. operational SCM
b. analytical CRM
c. analytical SFA
d. operational CRM
20. Based on your reading of the chapter, e-commerce is:
a. not yet fully accepted by consumers, although much of its driving technology is firmly
in place.
b. still in a revolutionary phase.
c. widely accepted by consumers, although technology is still quickly changing.
d. well entrenched as a form of modern commerce.
21. Varying a product's price according to the supply situation of the seller is called ________
pricing.
a. menu
b. asymmetric
c. dynamic
d. flexible
22. Compared to traditional goods, digital goods have:
a. lower marketing costs.
b. higher production costs.
c. greater pricing flexibility.
d. higher inventory costs.
23. Which of the following best illustrates the sales revenue model?
a. EBay receives a small fee from a seller if a seller is successful in selling an item.
b. Apple accepts micropayments for single music track downloads.
c. Flickr provides basic services for free, but charges a premium for advanced services.
d. Epinions receives a fee after steering a customer to a participating Web site where he
or she makes a purchase.
24. Exposing an individual to ads that are chosen and based on the recorded and analyzed online
behavior of the individual is referred to as:
a. long-tail marketing.
b. behavioral targeting.
c. online profiling.
d. clickstream advertising.
25. Which of the following describes long-tail marketing?
a. The dwindling sales of a once-popular book.
b. The yearly sales of one or two copies each of thousands of obscure films.
c. The unexpected growth of sales of a product long after its initial release.
d. The continued successful sales of a product over years.