MIS 300

Test 2

Chapters 4-5, Learning Module C

Name______

Multiple Choice:

Choose the one best answer for the following questions. (2 points each)

  1. A structured decision involves
  2. Processing a certain kind of information for which there may be several “right” answers
  3. Processing a certain kind of information for which there is not precise way to get a right answer
  4. Processing a certain kind of information in a specified way so that you will always get the right answer
  5. Processing a certain kind of information in a specified way so that you will always get the wrong answer
  1. A nonstructured decision is
  2. One for which there may be several “right” answers
  3. One for which you will always get the right answer
  4. One for which you will always get the wrong answer
  5. A decision made once in a lifetime
  1. A decision support system is
  2. A highly inflexible IT systems that is designed to support decision making when the problem is structured
  3. A highly inflexible IT system that is designed to support decision making when the problem is nonstructured
  4. A highly flexible and interactive IT system that is designed to support decision making when the problem is not structured
  5. None of the above
  1. A GDSS facilitates team decision making by integrating
  2. Groupware
  3. DSS capabilities
  4. Telecommunications
  5. All of the above

  1. Same-time meetings facilitated by a GDSS are also known as
  2. Virtual meetings
  3. Synchronous meetings
  4. Telecom meetings
  5. Asynchronous meetings
  1. Different-time meetings facilitated by a GDSS are also know as
  2. Virtual meetings
  3. Synchronous meetings
  4. Telecom meetings
  5. Asynchronous meetings
  1. A GIS is a decision support system designed specifically to work with
  2. Spatial information
  3. Just-in-time information
  4. Transaction process information
  5. Interorganizational information

Three separate roles must be filled in the development and use of an expert system. The first role is that of the domain expert. The domain expert works with a knowledge engineer. The knowledge worker is the user who will apply the expert system to the problem. Match the following with their respective responsibilities. (Write the appropriate letter next to the corresponding number)

  1. Knowledge Worker
/ a. The one who formulates the domain expertise into an expert system
  1. Knowledge Engineer
/ b. The one who provides the expertise in the form of problem-solving strategies
  1. Domain Expert
/ c. You
  1. Client-server network is
  2. A network in which one or more computers are servers and provide service to other computers which are called clients.
  3. A network in which two or more computers are connected so they can communicate with each other.
  4. A device that connects your computer to a phone line so that you can access another computer
  5. A highly inflexible IT systems that is designed to support decision making when the problem is structured
  1. Network topology refers to
  2. A limited geographic distance
  3. A public network that promises availability to your organization, but doesn’t provide you with a dedicated line or communications media
  4. The physical arrangement of computers in a network
  5. The transmission of information through the air
  6. Wired communications media
  7. Transmit information over a closed connected path
  8. Transmit information through the air
  9. Collects the transmissions from several communication media and sends them over a single line
  10. Is a transmission protocol that divides long messages into smaller units called cells
  1. Wireless communications media
  1. Transmit information over a closed connected path
  2. Transmit information through the air
  3. Collects the transmissions from several communication media and sends them over a single line
  4. Is a transmission protocol that divides long messages into smaller units called cells
  1. Pure plays are
  2. Internet retailers like Nordstrom, which has both an Internet presence and physical stores
  3. Retailers that have only physical stores
  4. Internet retailers such as Amazon.com that have no physical stores
  5. Are also referred to as brick-and-mortar retailers
  1. Clicks-and-mortar or Clicks-and-bricks are
  2. Internet retailers like Nordstrom, which has both an Internet presence and physical stores
  3. Retailers that have only physical stores
  4. Internet retailers such as Amazon.com that have no physical stores
  5. Are also referred to as brick-and-kicks retailers
  1. Techniques for attracting customers using the Internet include
  2. Banner ads
  3. Viral marketing
  4. Affiliate programs
  5. All of the above
  1. Meta tags are
  2. Little ads that appear on Web sites
  3. Directories of organized lists
  4. A count of the number of people who visit one site and click on a banner ad
  5. Part of a web site text not displayed to users but accessible to browsers and search engines for finding and categorizing Web sites

  1. Click-throughs are
  1. Little ads that appear on Web sites
  2. Directories of organized lists
  3. A count of the number of people who visit one site and click on a banner ad
  4. Part of a web site text not displayed to users but accessible to browsers and search engines for finding and categorizing Web sites

Protection of e-commerce sites from security attacks is built around several concepts.

  1. Confidentiality refers to
  2. Information that is stored in a Web site’s database that must be protected from unauthorized disclosure
  3. Information that is accurate and not changed without proper authorization
  4. Information that is made available when needed
  5. The verification that a user seeking access to a computer system is who she says she is
  1. Authentication refers to
  2. Information that is stored in a Web site’s database that must be protected from unauthorized disclosure
  3. Information that is accurate and not changed without proper authorization
  4. Information that is made available when needed
  5. The verification that a user seeking access to a computer system is who she says she is.
  1. Integrity refers to
  2. Information that is stored in a Web site’s database that must be protected from unauthorized disclosure
  3. Information that is accurate and not changed without proper authorization
  4. Information that is made available when needed
  5. The verification that a user seeking access to a computer system is who she says she is
  1. A firewall
  2. An interorganizational system that drives time and cost out of the supply chain.
  3. Attempts to detect when a security breach has occurred so that the intruder can be either observed or identified or expelled
  4. Internet-based services which bring together buyers and sellers
  5. Is designed to protect private networks from unauthorized intrusion
  1. Intrusion detection software
  2. An interorganizational system that drives time and cost out of the supply chain.
  3. Attempts to detect when a security breach has occurred so that the intruder can be either observed or identified or expelled
  4. Internet-based services which bring together buyers and sellers
  5. Is designed to protect private networks from unauthorized intrusion
  6. Micropayments are
  7. Very small payments made in everyday exchange in the physical store
  8. Commodity-like products
  9. Techniques to facilitate the exchange of small amounts of money for an Internet transaction
  10. Internet-based services which bring together buyers and sellers

Short Answer

Provide clearly expressed answers to the following questions. Please be sure to answer ALL part of the question.(10 points each)

  1. Decision making has four distinct phases. List and describe each individual phase. Which phase is considered the MOST important?
  1. GDSS groupware is a special kind of groupware designed to accommodate team decision making. It has capabilities that support the three phases of team decision making. Explain how a GDSS supports the three phases of team decision making.

  1. What is artificial intelligence? Name the artificial intelligence systems used widely in business. Give one example of how these are used (refer to the case “Are you green, yellow, or red on your bank’s computer?”)
  1. List four advantages of B2C e-commerce over traditional retailing.
  1. E-Cash has never become the preferred payment method for consumers. What are some of the main reasons for this?

1