ࡱ>  bjbj 7lmTT8X=(<<<<<<<$?A<<=666<6<6699TZ9<(=0X=9B:3B9B96<< 5X=BT ]: Information Systems Today, 4e (Valacich/Schneider) Chapter 4 Managing the Information Systems Infrastructure 1) Google's data center has been set up in The Dalles, OR due to all of the following EXCEPT: A) high-speed connectivity. B) access to unlimited water supply. C) availability of cheap, uninterrupted power. D) availability of skilled labor. 2) Information gathered from different business processes to improve organizational decision-making are referred to as: A) tacit knowledge. B) explicit knowledge. C) business intelligence. D) street smarts. 3) ________ can help to deal with fluctuating computation needs. A) On-demand computing B) Grid computing C) Autonomic computing D) Pay-per-use computing 4) CPU stands for: A) computer processing unit. B) control program unit. C) central processing unit. D) character parsing unit. 5) ________ devices transform inputs into outputs. A) Output B) Input C) Processing D) Internet 6) A keyboard is best associated with which information category? A) Selecting and pointing B) Entering batch data C) Entering original text/numbers D) Entering audio and video 7) A mouse is best associated with which information category? A) Selecting and pointing B) Entering batch data C) Entering original text/numbers D) Entering audio and video 8) A touch pad is best associated with which information category? A) Selecting and pointing B) Entering batch data C) Entering original text/numbers D) Entering audio and video 9) Entering batch data can be done with all of the following devices EXCEPT: A) scanners. B) keyboard. C) bar code. D) character reader. 10) Computers use a language called ________, which is based on 1s and 0s. A) data B) streaming C) binary code D) high-voltage current 11) The binary digits that make up machine language (1s and 0s) are called: A) units. B) bytes. C) bits. D) electrons. 12) A ________ is 1,024 bytes or approximately a thousand characters. A) kilobyte B) megabyte C) gigabyte D) terabyte 13) A ________ is 1,048,576 bytes or approximately a million characters. A) kilobyte B) megabyte C) gigabyte D) terabyte 14) A ________ is 1,073,741,824 bytes or approximately a billion characters. A) kilobyte B) megabyte C) gigabyte D) terabyte 15) A ________ is 1,099,511,627,776 bytes or approximately a trillion characters. A) kilobyte B) megabyte C) gigabyte D) terabyte 16) ________ can increase the reliability of an organization's information systems infrastructure. A) On-demand computing B) Grid computing C) Autonomic computing D) Pay-per-use computing 17) Using on-demand computing, resources are allocated on a(n) ________ basis. A) as-needed B) most-important-application C) prioritized D) demand-adjusted 18) ________ refers to combining the computing power of a large number of smaller, independent, networked computers into a cohesive system in order to solve problems that only supercomputers were previously capable of solving. A) On-demand computing B) Grid computing C) Autonomic computing D) Pay-per-use computing 19) In a ________ grid, the computers are just there to perform the grid's computing tasks. A) homogeneous B) dedicated C) pure D) uniform 20) One factor that adds to the popularity of using dedicated grids is: A) the increased power. B) the falling cost of computing hardware. C) the increasing skill level of grid engineers. D) outsourcing of noncore activities. 21) Today, it is often more cost effective to set up a ________ grid. A) uniform B) dedicated C) heterogeneous D) none of the above 22) ________ computing uses relatively small servers close to the end users to save resources in terms of network bandwidth and access time. A) Grid B) Utility C) Edge D) Network 23) ________ software is the collection of software that controls the basic functions of the computer. That is, it coordinates the interaction between hardware devices, peripherals, application software, and users. A) Systems B) Applications C) Integration D) Command 24) Operating systems are often written in ________, a very low-level programming language that allows the computer to operate quickly and efficiently. A) COBOL B) Visual Basic C) C D) assembly language 25) Windows and Macintosh operating systems have: A) voice-activated interfaces. B) Internet-activated interfaces. C) command-based interfaces. D) graphical user interfaces. 26) The ________ requires that you type text commands into the computer to perform basic operations. A) voice-activated interface B) Internet-activated interface C) command-based interface D) graphic user interface 27) ________ computing systems are self-managing, meaning that they need only minimal human intervention to operate. A) Grid B) Utility C) Edge D) Autonomic 28) An autonomic computing system must know its: A) configuration. B) capacity. C) current status. D) All of the above. 29) In order to be able to use different computing resources, autonomic computing systems should be: A) self-healing. B) self-configuring. C) self-optimizing. D) self-protecting. 30) Autonomic computing systems should be ________, so that users can continue working on tasks, even if parts of the system are not operational. A) self-healing B) self-configuring C) self-optimizing D) self-protecting 31) ________ software refers to software the source code is freely available for use and/or modification. A) Free B) Source-code C) Open-source D) Application 32) Systems designed to perform specific, predefined task such as a digital video recorder (TiVo) or a network router are referred to as ________ systems. A) integrated B) specific C) embedded D) special-purpose 33) ________ is the operating system of choice for Web servers, embedded system, and supercomputers alike. A) Tux B) Pengu-ware C) Linux D) Unix 34) In a(n) ________ architecture, different repeatable business tasks are integrated to better perform various business processes. A) integrated B) service-oriented C) Web-oriented D) e-Enabled 35) A(n) ________ offers on-demand software on an as-needed basis to its clients over the web. A) best-cost provider B) software provider C) Web service provider D) application service provider 36) The term ________ refers to the physical pathways used to carry network information. A) networks B) transmission media C) wireless D) protocols 37) As with human communications, computer networks require three things: senders and receivers, a transmission medium, and rules or: A) audio. B) communications. C) networks. D) protocols. 38) Procedures that different computers follow when they transmit and receive data are called: A) networks. B) protocols. C) controls. D) modems. 39) One of the differences between human and computer communication is that human communication consists of words, whereas computer communications consist of ________, the fundamental information units of computers. A) bits B) protons C) blips D) protocols 40) ________ is the process of converting a photograph, a song, or text into digital information, or bits. A) Atomizing B) Bitmapping C) Reduction D) Digitizing 41) A ________ consists of three separate components: servers, clients, and peers. A) network B) protocol C) control D) modem 42) A ________ is any computer on the network that uses services provided by the server. A) peer B) client C) control D) topology 43) A(n) ________ is any computer that may both request and provide services. A) modem B) client/server C) operating service D) peer 44) ________ is the carrying capacity of the computer or communications channel. A) Attenuation B) EMI C) Bandwidth D) Saturation 45) A ________ network is a computer network that is used to connect to or more LANs. A) wide area B) personal area C) value-added D) metropolitan area 46) There are two forms of media used in networks: cable and ________ media. A) topology B) coaxial C) fiber-optic D) wireless 47) A TV remote control is an example of which type of wireless media? A) Infrared line of sight B) High-frequency radio C) Microwave D) Modulator-demodulator 48) ________ allows various devices to communicate using IP technologies. A) IP conveyance B) IP integration C) IP communication D) IP convergence 49) ________ refers to the use of Internet technologies for placing telephone calls. A) VoIP B) IPT C) IPP D) PoIP 50) In the DBMS, the individual database is a: A) collection of related attributes about entities. B) set of records. C) set of attributes. D) text file. 51) Which of the following is the best example of a database? A) A collection of books on a shelf B) Articles within a magazine C) A set of coins in an envelope D) An alphabetically listed address book 52) A ________ is a software application which one uses to create, store, organize, and retrieve data from a single database or multiple databases. A) record B) database administrator C) database management system D) query by example 53) When considering data in a database entity, each row is a: A) file. B) record. C) data dictionary. D) template. 54) ________, a big part of interactive e-commerce on the Internet, refers to immediate automated responses to the requests of users. A) Normalization B) Entity relationship diagramming C) Online analytical processing D) Online transaction processing 55) ________ refers to immediate automated responses to user requests. A) OLTP B) OLAP C) OLST D) OLIP 56) When merging transaction and analytical processing a problem occurs. Real-time analytical processing diminishes the performance of transaction processing. What is the solution to this problem that many companies use? A) Pause transaction processing while analytical processing is occurring. B) Only allow transaction processing during off-peak hours. C) Replicate all transactions on a second database server and run analytical processing off of the second server. D) None of the above. 57) ________ are systems used to interact with customers and run a business in real time. A) Operational systems B) Informational systems C) Structured query systems D) Office automation 58) ________ are systems designed to support decision making based on point-in-time data or historical data. A) Operational systems B) Informational systems C) Structured query systems D) Office automation 59) The purpose of a data warehouse is to: A) create backups for mission critical corporate data. B) centralize the manageability of data collection. C) put key business information into the hands of more decision makers. D) store all corporate transaction data in one single location. 60) A ________ is a data warehouse that is limited in scope. It contains selected information of the company's business, for example finance data, inventory data, or personnel data. A) report B) data model C) data mart D) query 61) A single repository of database information integrated from multiple large databases and other information sources is called a(n): A) data warehouse. B) data mart. C) informational system. D) data supermart. Chapter 5 Enabling Commerce Using the Internet 1) Electronic commerce (EC) is defined as the online exchange of ________ between firms, and also between firms and their customers. A) goods B) services C) money D) All of the above. 2) According to the book, EC was used as far back as the year ________ during the Berlin Airlift. A) 1941 B) 1943 C) 1945 D) 1948 3) The Internet and the World Wide Web (Web) have fueled a revolution in the manner in which products and services are sold. In this respect, their far-reaching effects have led to the creation of a nearly limitless: A) electronic marketplace. B) virtual auction house. C) virtual work environment. D) electronic social environment. 4) Electronic commerce goes beyond buying and selling. EC can involve the events leading to a purchase, as well as ________ after the sale. A) marketing B) communication C) customer service D) management 5) There are several types of EC. Transactions between businesses and consumers (B2C) are known as: A) business-to-customer. B) business-to-consumer. C) business-to-controller. D) business-to-carrier. 6) B2B is a type of EC that refers to transactions that occur as: A) business-to-consumer. B) business-to-buyer. C) business-to-business. D) buyer-to-business. 7) B2E types of EC are referred to as: A) business-to-employee. B) buyer-to-employee. C) business-to-environment. D) business-to-everyone. 8) eBay's typical transaction is an example of a Web site that employs the ________ type of EC. A) B2B B) B2C C) B2E D) C2C 9) The combination of the Internet and Web technologies has given rise to a global platform where firms across the world can compete for customers and gain access to new: A) competitors. B) markets. C) monies. D) employees. 10) It is the worldwide connectivity of the Internet that provides a relatively ________ medium for marketing products over long distances. A) expensive B) difficult C) economical D) None of the above. 11) The factor of ________ is not a limitation as it is in traditional stores. A) money B) employees C) time D) culture 12) Web technologies allow integration of information via Web sites, which can be linked to corporate ________ to provide real-time access to information. A) headquarters B) databases C) executives D) warehouses 13) Web technologies help firms realize their goal of mass: A) production. B) profitability. C) customization. D) employment. 14) Interactive communication via the Web enables firms to build ________ by providing immediate communication and feedback to and from customers. A) customer loyalty B) profit C) databases D) firm image 15) By providing ways for customers and firms to conduct business online without assistance from humans, the Internet and Web have significantly reduced ________ costs. A) production B) transaction C) human resource D) marketing 16) ________ is the phenomenon of cutting out the middle vendor ("middleman") and reaching customers in a more direct and efficient manner. A) Disintermediation B) Watermarking C) Reverse pricing D) Tunneling 17) Companies that choose to operate solely in the traditional physical markets are described as: A) brick-and-mortar. B) brick-and-click. C) pure play. D) business-and-mortar. 18) Click-only companies are also referred to as ________ companies. A) click-thru B) pure play C) pure click D) click-click 19) Click-only companies do not have: A) warehouses. B) supply chains. C) storefronts. D) employees. 20) Firms that operate in both the physical and virtual (online) arenas are termed: A) click-and-mortar. B) click only. C) brick-and-mortar. D) pure play. 21) Click-and-mortar businesses continue to operate their physical locations, but they have also added a(n) ________ component to their business strategy. A) strategic B) security C) EC D) marketing 22) Another challenge for the click-and-mortar company is the requirement for Web-based computing skills, which requires the company to make substantial investments in resources such as ________ and computers. A) software B) hardware C) networks D) people 23) Click-only companies are able to effectively compete with other types of companies on product or service: A) quality. B) price. C) volume. D) delivery. 24) Click-only companies may experience challenges in realizing: A) production. B) economies of scale. C) reverse pricing. D) an IPO. 25) A virtual company is another term for those companies that adopt a ________ strategy. A) brick-and-mortar B) click-only C) business-to-business D) click-and-mortar 26) A ________ model describes how the firm will generate profits and produce a superior return on invested capital. A) revenue B) business C) profit D) virtual 27) While EDI was generally limited to large corporations, the Internet and the Web have provided an economical medium over which information can be transmitted, thus enabling small to midsize enterprises to participate in ________ markets. A) B2C B) B2B C) C2C D) traditional 28) Web-based B2B systems range from simple ________ applications to complex trading exchanges where multiple buyers and sellers can congregate to conduct business online. A) Internet B) intranet C) extranet D) Web ring 29) Electronic Data Interchange (EDI) is the forerunner of modern ________ EC, as it was used to facilitate transactions between large corporations and their suppliers. A) B2C B) C2C C) B2B D) click-only 30) EDI refers to the ________ transmission of business information between organizations via telecommunications networks. A) digital B) paper C) managerial D) tunneling 31) While EDI has been used for four decades to conduct B2B transactions, the trend today in business is to use: A) the Internet and the Web. B) facsimiles. C) facsimiles and telephones. D) facsimiles and the Web. 32) A(n) ________ is a vehicle for communicating proprietary information with authorized users outside organizational boundaries. A) Internet B) extranet C) intranet D) Web ring 33) An extranet allows two or more firms to use the ________ to conduct business together. A) Web B) Internet C) intranet D) telephone 34) Web-based technologies are ________, which means that disparate computing systems can communicate with each other, provided that standard Web protocols have been implemented. A) uni-platform B) cross-platform C) multi-platform D) non-platform 35) Another term for an electronic marketplace is: A) trading exchange. B) trading floor. C) electronic exchange. D) multimedia marketplace. 36) Use of the Internet and the Web for internal communications is accomplished by means of a(n): A) tunnel. B) extranet. C) intranet. D) LAN. 37) An intranet consists of an internal, ________ network using Web technologies to facilitate the secured transmission of proprietary information. A) private B) public C) corporate D) government 38) Employees access information on the intranet by means of a(n): A) file. B) e-mail. C) browser. D) printer. 39) Intranets and extranets provide many benefits to organizations, including: A) low-cost deployment. B) information timeliness and accuracy. C) positive return on investment. D) All of the above. 40) While an intranet looks and acts like a publicly accessible Web site, there are ________ that secure proprietary information from the public. A) boundaries B) intranet walls C) firewalls D) telecommunication walls 41) One of the significant intranet applications used by organizations to leverage their EC investment is: A) training. B) real-time access to information. C) application integration. D) All of the above. 42) Organizations often install disparate applications on different computing platforms, which made it difficult for users to consolidate the needed information. Today, these consolidation problems can be solved by adding a single product to the: A) SiteMinder. B) intranet Web server. C) firewall. D) web page. 43) Organizations can use ________ to facilitate team efforts. A) their intranet B) IM Chat C) videoconferencing D) All of the above. 44) B2C focuses on retail transactions between a company and: A) wholesalers. B) retailers. C) dealers. D) end consumers. 45) The major portion of B2C focuses on electronic retailing, which is also called: A) e-tailing. B) retailing. C) click-tailing. D) e-selling. 46) Which network is an unrestricted public network? A) Internet B) Intranet C) Extranet D) E-Net 47) Which network is a private network restricted to authorized employees? A) Internet B) Intranet C) Extranet D) E-Net 48) Which network is a private network used for communications with business partners? A) Internet B) Intranet C) Extranet D) E-Net 49) The book relates a three-stage model of EC. Which of the following is not one of the stages? A) E-initiation B) E-information C) E-integration D) E-transaction 50) The e-information stage of EC involves the promotion of sales and marketing information via a(n): A) brochure. B) e-brochure. C) e-mail. D) voicemail. 51) The goal of the e-information stage is to achieve: A) collaboration. B) global dissemination of customized information. C) global dissemination of non-customized information. D) customer transaction processing. 52) E-information is more flexible than traditional promotional methods because this type of information: A) is more difficult to update. B) may be modified and posted quickly. C) labor expenses are increased. D) users obtain outdated information. 53) E-integration, the second stage of EC, is focused on accommodating requests for: A) general information. B) legal information. C) customized information. D) products. 54) In order to facilitate e-integration, Web sites must be integrated with organizational ________ in order to extract and display the appropriate information. A) headquarters B) sales offices C) databases D) IS team 55) The ________ phase adds the ability for customers to enter orders and payments online. A) E-transaction B) E-integration C) E-information D) E-bay 56) Which system allow customers to specify the product that they are looking for and set the price that they are willing to pay for the product? A) Forward pricing B) Menu-driven pricing C) Reverse pricing D) Watermarked pricing 57) The pricing scheme used by the company Priceline.com that allows customers to name their own price is a(n) ________ system. A) immediate pricing B) menu-driven pricing C) forward pricing D) reverse pricing 58) The concept of the ________ refers to a focus on niche markets, rather than purely on mainstream products: A) dissemination B) the long tail C) e-tailers D) m-commerce 59) EC companies should follow each of the following rules for their Web sites EXCEPT: A) The Web site should offer something unique. B) The Web site must motivate people to visit, to stay, and to return. C) You should learn from your Web site. D) Each of the above is correct. 60) All of the following are ways to protect yourself when shopping online, EXCEPT: A) Don't use 3rd party payment services, such as PayPal. B) Read and understand the refund and shipping policies. C) Check the site's privacy policy. D) Use a secure browser. 61) In the term m-commerce, the "m" refers to: A) mobile. B) multimedia. C) multi-type. D) miscellaneous. 62) ________ actively pushes information at the consumer whether it is wanted or not. A) Pull marketing B) Punch marketing C) Distribution marketing D) Push marketing Chapter 6 Enhancing Collaboration Using Web 2.0 1) Tim O'Reilly defined ________ as "the business revolution in the computer industry caused by the move to the Internet as a platform and an attempt to understand the rules for success on that new platform." A) Web 2.0 B) Web 1.0 C) Web 3.0 D) the dot-com era 2) Web 2.0 uses all of the following technologies EXCEPT: A) ECommerce. B) AJAX. C) Web services. D) Web content syndication. 3) All of the following are pillars of Web 2.0 EXCEPT: A) AJAX. B) Web as a platform. C) harnessing collective intelligence. D) leveraging the data. 4) Businesses using the Internet not just as an add-on to the PC are leveraging which Web 2.0 pillar? A) Utilizing the Web as a platform B) Harnessing collective intelligence C) Implementing innovative Web capabilities D) Leveraging the data 5) Successful Web 2.0 sites not only providing content, but allowing users to contribute are leveraging which Web 2.0 pillar? A) Utilizing the Web as a platform B) Harnessing collective intelligence C) Implementing innovative Web capabilities D) Leveraging the data 6) Businesses basing their success on tremendous, powerful databases are leveraging which Web 2.0 pillar? A) Utilizing the Web as a platform B) Harnessing collective intelligence C) Implementing innovative Web capabilities D) Leveraging the data 7) Web 2.0 companies basing their competitive advantage on technology are leveraging which Web 2.0 pillar? A) Utilizing the Web as a platform B) Harnessing collective intelligence C) Implementing innovative Web capabilities D) Leveraging the data 8) Web 2.0 companies using scripting languages for simple and dynamic composition of applications are leveraging which Web 2.0 pillar? A) Utilizing the Web as a platform B) Harnessing collective intelligence C) Implementing innovative Web capabilities D) Leveraging the data 9) ________ software uses the network bandwidth of all users of the software to improve download performance. A) AJAX B) RSS feed C) Scripting D) Peer-to-peer 10) All of the following are examples of the use of scripting languages such as AJAX on current web sites, EXCEPT: A) Window Live Hotmail. B) GMail. C) Google Maps. D) All of the above. 11) All of the following technologies can be used to provide a rich user experience EXCEPT: A) AJAX. B) Adobe Flash. C) Microsoft's Silverlight. D) All of the above. 12) ________ allow(s) data to be accessed without intimate knowledge of other organizations' systems, enabling machine-to-machine interaction over the Internet. A) Peer-to-peer file sharing B) AJAX C) Widgets D) Web services 13) ________ allow(s) any device to connect to any network to access any service. A) Peer-to-peer file sharing B) AJAX C) Widgets D) Web services 14) Web services have several benefits including: A) peer-to-peer file sharing. B) utilizing the existing Internet. C) widgets. D) no programming required. 15) Google has offered all of the following as Web services EXCEPT: A) maps. B) Gmail. C) search. D) All of the above are web services. 16) Web services enable: A) tagging maps B) accessing remote or local data without knowing the complexities C) performing complex searches D) All of the above are enabled by Web services. 17) __________ are small interactive tools used for a single purpose such as taking notes, viewing pictures and so on. A) AJAX B) Web services C) Web maps D) Widgets 18) Which company pioneered widgets in its early versions of its operating system? A) Microsoft B) Google C) Linux D) Apple 19) Which Web 2.0 concept came from popular music, where many songs are produced by mixing two or more existing songs together? A) Widgets B) Web services C) Mashups D) Gmail 20) _________ combine(s) two or more web services into a unique application. A) Widgets B) AJAX C) Mashups D) Gmail 21) Housingmaps.com is an example of two web services combined together on a single web site. This is called: A) Widget B) AJAX C) Mashup D) Gmail 22) All of the following are examples of mashups EXCEPT: A) Google Maps B) Google Scholar C) Everyblock.com D) Housingmaps.com 23) Which of the following was the first consumer-oriented Web editor for creating mashups? A) Apple Widgets B) Yahoo! Pipes C) Microsoft Popfly D) Google Mashup Editor 24) ___________ allow(s) users to easily access, share, post, and transfer documents back and forth using a web interface. A) Email B) Collaboration tools C) Microsoft Popfly D) Mashups 25) Web-based collaboration tools require all of the following EXCEPT: A) Internet connection B) Email account C) Browser D) All of the above are needed. 26) MS Outlook, Blogger.com, and Wikipedia are examples of which type of collaborative tools? A) Electronic communication tools B) Electronic conferencing tools C) Collaboration management tools D) Content communication tools 27) Apple Discussion Forum, Skype, AOL IM, and WebEx are examples of which type of collaborative tools? A) Electronic communication tools B) Electronic conferencing tools C) Collaboration management tools D) Content communication tools 28) Google Docs, MS OfficeLive, and MS SharePoint are examples of which type of collaborative tools? A) Electronic communication tools B) Electronic conferencing tools C) Collaboration management tools D) Content communication tools 29) ________ allow users to publish, edit, version track and retrieve digital information (content). A) Electronic communication tools B) Conferencing systems C) Content management systems D) Widgets 30) Content management systems allow for assigning different user roles, which include all EXCEPT: A) guest. B) creator. C) provider. D) editor. 31) Zoho, ajaxWrite, Google docs, and Presenter Net are all examples of: A) Widgets B) Web services C) Web-based collaboration tools D) Electronic conferencing tools 32) _______are used to facilitate virtual or co-located meetings and manage group activities. A) Electronic communication tools B) Electronic conferencing systems C) Content management systems D) Collaboration management tools 33) ________, originally envisioned by one of the founders of the Internet, Tim Berners-Lee, is a set of design principles that will allow computers to be able to better index Web sites, topics, and subjects. A) Web indexing B) Web 2.0 C) The Web as a platform D) The Semantic web 34) Which one of the following is NOT a candidate for Web 3.0? A) Web services B) World wide database C) Open ID D) Open technologies 35) ________, a possible Web 3.0 technology, is the provision of an online identity that can easily be ported to mobile devices, PCs, and more, allowing for easy authentication across different Web sites. A) Intelligent application B) World wide database C) Open ID D) Open technology 36) ________, a possible Web 3.0 technology, use(s) agents, machine learning, and semantic Web concepts to complete "smart" tasks for users. A) Intelligent applications B) World wide database C) Open ID D) Open technologies 37) ________, a possible Web 3.0 technology, enable(s) designing Web sites and other software so that they can be easily integrated. A) Intelligent applications B) World wide database C) Open ID D) Open technologies 38) ________, a possible Web 3.0 technology, enable(s) databases to be distributed and accessed from anywhere. A) Intelligent applications B) World wide database C) Open ID D) Open technologies 39) ________ allow(s) users to contribute to a web site by adding keywords or relevant terms to maps or images, thus making it searchable. A) Blogs B) Tagging C) Vlogs D) Open ID 40) Adding information to maps, a common practice on Google maps, is called: A) Blogging B) Geo-tagging C) Vlogging D) Geo-blogging 41) ________ is the process of creating an online text diary made up of chronological entries that comments on everything from one's everyday life, to wine and food, or even computer problems. A) Wikiing B) Blogging C) VTexting D) Flickring 42) ________ can be simply thought of as data about data. A) Tagging B) Metadata C) Blogging D) Open data 43) Blogging power led to which of the following? A) The bankruptcy of the Chicago Tribune B) The resignation of Dan Rather of 60 Minutes C) Barry Bond's trial D) The launch of the online edition of the Los Angeles Times 44) Noted technology journalist Nicholas Carr classifies blogging as: A) true journalism. B) amateurization of journalism. C) the new newspaper. D) a danger. 45) Which one of the following organizations does NOT have a blog associated with it? A) CNN B) New York Times C) Washington Post D) All of the above have blogs. 46) _________, also known as podcasting, is the distribution of digital media via syndication feeds. A) Vlogging B) Blogging C) Tagging D) Netcasting 47) The content of netcasts is typically distributed via: A) wikis. B) blogs. C) tags. D) syndication feeds. 48) _________ is a family of syndication feeds used to publish the most current blogs, podcasts, videos, and news stories. A) Open source B) Google's C) iTunes D) Real Simple Syndication 49) RSS stands for: A) Real Source Syndication. B) Real Simple Syndication. C) Real Source Standards. D) Rights Simple Standards. 50) Customized printing that is done in small batches via Internet web sites is called: A) print blogs. B) printing-on-demand. C) open source printing. D) RSS feeds. 51) Blurb, Booksurge, and Lulu are all examples of: A) blogs. B) printing-on-demand. C) open source printing. D) RSS feeds. 52) ________ communication is communication taking place at the same time. A) Asynchronous B) Synchronous C) Standardized D) Virtual 53) ________ communication is communication that is not coordinated in time. A) Asynchronous B) Synchronous C) Standardized D) Virtual 54) ________ comprise of members from different geographic areas, assembled to collaborate on a project. A) Virtual teams B) Collaborative teams C) Electronic teams D) Synchronous teams 55) A project with team members in India, Germany, and New York is also known as a(n) ________ project. A) virtual team B) collaborative team C) electronic team D) synchronous team 56) MySpace.com was originally designed around: A) musical interests. B) online dating. C) political interests. D) friendships 57) Facebook.com and Myspace.com are examples of: A) virtual teams. B) wikis. C) blogs. D) social online communities. 58) _________ was the most popular social networking site in March of 2008. A) Bebo.com B) Classmates.com C) Facebook.com D) MySpace.com 59) ________ refers to the belief that the value of a network is dependent on the number of other users. In other words, if a network has few users, it has little or no value. A) A virtual network B) Viral marketing C) Social networking D) The network effect 60) ________ is using the network effect to increase brand awareness. A) Virtual networking B) Viral marketing C) Social networking D) Blogging 61) Which of the following are NOT critical factors to good viral marketing, according to designer Thomas Baekdal? A) Do something unexpected B) Do something illegal C) Make sequels D) Allow sharing 62) BMW hired popular directors to create a series of short films that could be easily distributed and shared on the Internet; this is an example of: A) viral marketing. B) social networking. C) virtual networking. D) blogging. 63) Amazon's mechanical turk is an example of: A) crowdsourcing. B) viral marketing. C) social networking. D) the network effect. 64) Eli Lilly created a site called InnoCentive, where companies can post scientific problems, and everybody can take a shot at solving the problem. This is an example of: A) crowdsourcing. B) viral marketing. C) social networking. D) network effect. Technology Briefing Advanced Topics and Trends in Managing the Information Systems Infrastructure Networking and Database Management (Note: questions 47-111 are for test#2; 1-46 were for test#1) 47) The ________ computing model consists of a large mainframe computer connected to terminals. A) distributed B) network C) centralized D) decentralized 48) Devices with a keyboard and monitor, but with no localized computing power, that are connected to a mainframe are called: A) end points. B) terminals. C) servers. D) distributed computers. 49) Under the ________ computing model, multiple computers (such as personal computers) are networked together to share information and services. A) wide area network B) local area network C) centralized D) distributed 50) The ________ computing model is a synergistic form of distributed computing, in which two or more networked computers are used to accomplish a common processing task. A) networked B) centralized C) collaborative D) distributed 51) A company has a computer to store a large employee database, and another computer used to process and update individual employee records. These two computers work together to keep the employee records current. This is an example of ________ computing. A) networked B) centralized C) collaborative D) distributed 52) Which of the following is/are a type of network? A) LANs B) WANs C) PANs D) All of the above. 53) A network that spans a relatively small area, allowing computer users to connect and share information within a building or limited geographical area is called a ________ network. A) wide area B) personal area C) value-added D) local area 54) A ________ network is a computer network that is used to connect to or more LANs. A) wide area B) personal area C) value-added D) metropolitan area 55) When considering LANs, WANs, PANs, and PBXs, which ones are always wireless? A) LANs B) WANs C) PANs D) PBX 56) The enabling technology for PANs is called: A) Bluetooth. B) Viking. C) Bluewave. D) Bluenet. 57) A ________ consists of three separate components: servers, clients, and peers. A) network B) protocol C) control D) modem 58) A ________ is any computer on the network that makes access to files, printing, communications, and other services available to users of the network. A) peer B) client C) server D) router 59) A ________ is any computer on the network that uses services provided by the server. A) peer B) client C) controller D) router 60) The trend in business is to use ________ networks in which servers and clients have defined roles. A) peer-to-peer B) server-centric C) client-server D) integrated 61) There are two forms of media used in networks: cable and ________ media. A) wired B) coaxial C) fiber-optic D) wireless 62) ________ cable is made of two or more pairs of insulated copper wires twisted together. A) Twisted pair B) Backbone C) Coaxial D) Fiber-optic 63) ________ cable contains a solid inner copper conductor, surrounded by plastic insulation and an outer braided copper or foil shield. A) Twisted pair B) Backbone C) Coaxial D) Fiber-optic 64) ________ cable is made of a light-conducting glass or plastic core, surrounded by more glass, called cladding, and a tough outer sheath. A) Twisted pair B) Backbone C) Coaxial D) Fiber-optic 65) High-speed network backbones are generally made of ________ cable. A) twisted pair B) backbone C) coaxial D) fiber-optic 66) Wireless LANs are based on the ________ family of standards. A) 311.1 B) 486.4 C) 802.11 D) 911 67) ________ are the rules that govern how a given node or workstation gains access to the network to send or receive information. A) Protocols B) Media access controls C) Message services D) Application services 68) The most commonly used method of distributed access control is called: A) token passing. B) carrier sense multiple access / collision detect. C) client/server. D) Transmission Control Protocol / Internet Protocol. 69) The most commonly used method of random access control is called: A) token passing. B) carrier sense multiple access / collision detect. C) client/server. D) Transmission Control Protocol / Internet Protocol. 70) ________ refers to the shape of a network. A) Communications mapping B) Network geography C) Network morphology D) Network topology 71) The network configuration when all nodes or workstations are connected to a central hub or concentrator through which all messages pass is called a: A) star network. B) ring network. C) bus network. D) mesh network. 72) The network configuration in the shape of a closed loop is called a: A) star network. B) ring network. C) bus network. D) mesh network. 73) The network configuration when the network is an open-ended line is called a: A) star network. B) ring network. C) bus network. D) mesh network. 74) A network in which the computers or devices are either fully or partially connected to each other is called a: A) star network. B) ring network. C) bus network. D) mesh network. 75) The ________ model is a protocol that represents a group of specific tasks as successive layers that enable computers to communicate data. A) TCP/IP B) OSI C) EDI D) LAN 76) ________ is a local area network protocol (developed by the Xerox Corporation in 1976) which uses random access control to send data. A) WireNet B) SimNet C) Arpanet D) Ethernet 77) A(n) ________ is a PC expansion board that plugs into a computer so that it can be connected to a network. A) expansion card B) TCP/IP card C) hard card D) network interface card 78) A ________ is a modulator/demodulator that enables computers to transmit data over telephone lines and thereby connect your PC with other PCs in a computer network. A) signal switcher B) transmission media C) modem D) hub 79) A ________ is used as a central point of connection between media segments for the purpose of extending the network to accommodate additional workstations. A) hub B) bridge C) transmission media connector D) modem 80) A ________ is used to connect two different LANs or two segments of the same LAN by forwarding network traffic between network segments. A) hub B) bridge C) transmission media connector D) modem 81) A(n) ________ is used to share a communication line or medium among a number of users because it is able to transmit several signals over a single channel. A) gateway B) merge unit C) integrator D) multiplexer 82) A ________ is an intelligent device used to connect two or more individual networks by looking at the network address and passing the signals on to the appropriate network. A) connector B) modem C) router D) multiplexer 83) A(n) ________ is both a bridge and a router. A) brouter B) hub C) integrator D) multiplexer 84) A ________ is a device that acts as a "buffer" between a LAN and a public carrier's WAN. It ensures that all signals placed on the public lines from the LAN are appropriately timed and formed for the public network. A) hub B) bridge C) transmission media connector D) channel service unit (CSU) 85) A ________ performs protocol conversion so that different networks can communicate even though they "speak" different languages. A) hub B) gateway C) router D) bridge 86) Routers: A) have a central processor, memory, and network interfaces. B) are used to interconnect independent networks. C) forward data packets from one network to another. D) All of the above. 87) The Internet uses special-purpose computers called ________ to interconnect independent networks. A) backbones B) routers C) senders D) distributors 88) The ________ acts as a central repository for Internet-related information. A) Internet Registry B) IANA C) IAB D) IETF 89) What root database is used to associate Internet host names with their IP addresses? A) DNS B) TCP C) IANA D) InterNIC 90) Why are we transitioning to Ipv6? A) To avoid confusion when InterNIC morphed into ICANN B) The number of unassigned Internet addresses is running out C) To take the Internet worldwide D) To comply with new government regulations 91) An ISP connects to the Internet at an exchange point for Internet traffic, much like a railway station. These exchange points are called: A) interchange points. B) intersections. C) Network Access Points (NAPs). D) onramps. 92) NAPs are a key component of the: A) Internet backbone. B) wide-area network. C) ISPs' infrastructure. D) DSL service. 93) The structure of the Internet is: A) flat. B) convoluted. C) hierarchical. D) relational. 94) When considering Internet connections there are multiple options. One of them, ISDN, stands for: A) Integrated Services Digital Network. B) Internet Signal Direct Network. C) Information Systems Dial-up Network. D) International Systems Data Network. 95) DSL stands for: A) Digital Subscriber Lines. B) Direct Signal Licenses. C) Data Source Libraries. D) Dynamic Signal Links. 96) Cable modems provide Internet service: A) over one's phone lines. B) with a fiber-optic cable. C) wirelessly. D) through cable TV lines. 97) When considering Internet connections there are multiple options. One of them, IoS, stands for: A) Internet over Satellite. B) Information-online Service. C) Information of Substance. D) Internet on Site. 98) A ________ is a dedicated digital transmission line that can carry 1.544 Mbps of information. A) satellite link-up B) T1 line C) POTS system D) wireless line 99) ________ lines are transmission lines that can carry 45 Mbps of information. A) IXC B) ATM C) T1 D) T3 100) ________ lines are transmission lines that can carry up to 2.2 Gbps of information. A) IXC B) ATM C) T1 D) T3 101) The system that uses existing power distribution wires for data transmission is called: A) power line communication. B) Internet over power lines. C) power Internet. D) WiMax. 102) A technology capable of providing high-speed stationary wireless access without needing line-of sight technology is called: A) WiMax. B) WiFi. C) broadband wireless. D) Internet over satellite. 103) How many entities can a database have? A) One B) Two C) Many D) None 104) A unique identifier for linking entities together is a: A) link list. B) master key. C) primary key. D) merge link. 105) Which of the following would make a bad primary key? A) Social security number B) Driver's license number C) Combination of last name and date of birth D) Student identification number (where numbers are unique) 106) A secondary key: A) is an attribute not referred to as a primary key. B) identifies one or more records within a table that share a common value. C) can be multiple attributes in a table. D) All of the above. 107) A database key not used as a primary key but used to identify records in a table that share a common value is called a(n): A) secondary key. B) tertiary key. C) dual key. D) duplicate key. 108) One-to-one, one-to-many, and many-to-many are descriptions of database relationships called: A) constructions. B) combinations. C) linkages. D) associations. 109) A ________ refers to an attribute that appears as a nonprimary key attribute in one entity and as a primary key attribute in another entity. A) secondary key B) master key C) merge key D) foreign key 110) Which is the most common DBMS model? A) Network B) Hierarchical C) Relational D) System 111) The elimination of data redundancy is a major goal and benefit of: A) entities. B) queries. C) a data dictionary. D) normalization.     PAGE 42 PAGE 1 Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall 234nopi j k C D E ­p_Q@_Q@_Q/ hw;hCJOJQJ^JaJ hHhCJOJQJ^JaJhFlCJOJQJ^JaJ hHhFlCJOJQJ^JaJ/hHhFl5B*CJOJQJ\^JaJph hFl5CJOJQJ\^JaJ&hHhFl5CJOJQJ\^JaJ)h|h|5>*CJ$OJQJ\^JaJ$#hFl5>*CJ$OJQJ\^JaJ$)h|hFl5>*CJ$OJQJ\^JaJ$,h|hFl5>*CJ$OJQJ\]^JaJ$34op E i j k  / C D E  3 $  h8gd|3 P l m n  3 K n # @ A B $ l m n @ A B 0def  LMNO••ᦄ hHhCJOJQJ^JaJ hHhFlCJOJQJ^JaJhq:CJOJQJ^JaJh?CJOJQJ^JaJhCJOJQJ^JaJ hw;hCJOJQJ^JaJhFlCJOJQJ^JaJ hw;hFlCJOJQJ^JaJ4 IWesfq|_ly ly2Jdeef  2LMO+Er#XYZ&'(/01opqRSTlmn6 7 8 ﱣᒿᒿᒿﱣﱣᒿhahCJOJQJ^JaJ hw;hCJOJQJ^JaJhCJOJQJ^JaJh?CJOJQJ^JaJ hw;hFlCJOJQJ^JaJ hHhCJOJQJ^JaJhFlCJOJQJ^JaJ hHhFlCJOJQJ^JaJ/#1CXYZ &'(--Mp3Tp !/01cw--DZopq*>RSTBJYYclmn  ( 6 7 8 !![!h!!!!!!"","?"M" !!!!!["\"]""""###$$$'%(%)%%%%=&>&?&&&&e'f'g''''(((+),)-).))))G*±УУУvhq:CJOJQJ^JaJ hHhFlCJOJQJ^JaJhCJOJQJ^JaJh?CJOJQJ^JaJ hHhCJOJQJ^JaJhFlCJOJQJ^JaJ hw;hFlCJOJQJ^JaJ hw;hCJOJQJ^JaJh@=CJOJQJ^JaJ.M"["\"]""""""""#######h$v$$$$$$$%%%'%'%(%)%%%%%%%%& &&4&=&>&?&&&&&&&&'-'?'O'e'f'f'g''''''''5(P(i(w(((((())+),).)))))))))) *!*8*G*H*I*****+++++++ , , ,K,U,a,v,,,, -G*H*I*+++ , , ,,,,--------///000}1~11222333h4i4k4п򄿱vhh|CJOJQJ^JaJh@=CJOJQJ^JaJ hHhCJOJQJ^JaJhCJOJQJ^JaJhq:CJOJQJ^JaJh?CJOJQJ^JaJ hHhFlCJOJQJ^JaJ hw;hFlCJOJQJ^JaJ hw;hCJOJQJ^JaJhFlCJOJQJ^JaJ% --C-d-----------. /]/////C0[0u0000010101J1g1}1~11112a2222[3f3u333334+4:4T4h4i4j4k44gdWk4444Y5Z5[5555677787 8 8 8 8888999::::::};~;;N<O<P<Q<<<<===.>/>0>?ͼshq:CJOJQJ^JaJhBCJOJQJ^JaJhsCJOJQJ^JaJ hyhBCJOJQJ^JaJhWCJOJQJ^JaJ hyhWCJOJQJ^JaJ hyhW/hyhW5B*CJOJQJ\^JaJph&hyhW5CJOJQJ\^JaJ-44"5,595C5Y5Z5[5555555566676777877777 8 8 8gdW 8q8888888999P9j99999999:::v:~::::::D;gdWD;U;b;n;};~;; <<(<7<N<O<Q<<<<<<<<l=}========gdW= >>.>/>0>>>>>??????????|@@@@@@@*A@AUAgdW??????@@@}A~AABBBnBoBCCCCCCDDDEEEFFFFFFjGkGlGHHHiIjIkI=J>JJJJKKKLLLMMMNNNNN9O:O;O´д´´д´Ц´hq:CJOJQJ^JaJhBCJOJQJ^JaJhsCJOJQJ^JaJ hyhWCJOJQJ^JaJ hyhBCJOJQJ^JaJhWCJOJQJ^JaJAUAdA}A~AAAAAABBB*B:BMB^BmBnBoBBBBBCCCCCCCgdWCCCCDDDDDDDTEaElExEEEEEEEFFFFpFFFFFgdWFFF:GFGSG^GjGkGlG^HfHnHvHHHH5IBIOI\IiIjIkIJJ%J-JJJJJJJJJaKKKKKKKOL\LiLvLLLLLLLMMMMgdWMMMMMNNNEN[NnNNNNNOO"O0O9O:O;OOOOOPPPJPgdW;OPPPzP{P|PFQGQHQ'R(R)RRRR8T9T:TTTTEUFUGUUUUEVFVGVVVVOWPWQWWWXXXzY{Y|YyZzZ{Z|Z+[,[-[ \ \\\\\]]]p^q^r^__´´´hq:CJOJQJ^JaJhBCJOJQJ^JaJhsCJOJQJ^JaJ hyhBCJOJQJ^JaJhWCJOJQJ^JaJ hyhWCJOJQJ^JaJAJPTP`PmPzP{P|PPP Q0QFQGQHQQQQ R'R(R)RRRRRRRRSTgdWTT*T8T9T:TzTTTTTTTUU%U2UEUFUGUUUUUUUUV!V.VgdW.V;VEVFVGVVVVVVVVW+W8WEWOWPWQWWWWWWWWcXqXXXgdWXXXXXXYUYzY{Y|YYZ0ZRZyZzZ|ZZZ[[+[,[-[[[[\ \gdW \ \\j\|\\\\\\?]S]k]]]]]^0^H^\^p^q^r^^^___ _gdW_ _!_7`8`9`aaaaa[b]b^bb±УЁseWC&h"hn"m5CJOJQJ\^JaJhn"mCJOJQJ^JaJh|CJOJQJ^JaJh-CCJOJQJ^JaJ hyhWCJOJQJ^JaJ hik$h-CCJOJQJ^JaJhBCJOJQJ^JaJ hik$hBCJOJQJ^JaJhWCJOJQJ^JaJ hik$hWCJOJQJ^JaJ hyhBCJOJQJ^JaJhsCJOJQJ^JaJ _!_x___`7`8`9````#aanazaaaaaabb-bHb[b\bgdW\b]b^bbb`ckcvcccccccccdddMdVdlddddde6e\egdn"mbbbbccccccccccddddddddddddd eeeeeefffffggggggggh hhhַַַַַַַַַַַַַַַַַַַ֘h-CCJOJQJ^JaJhCJOJQJ^JaJ h"h-CCJOJQJ^JaJhn"mCJOJQJ^JaJ h( hn"mCJOJQJ^JaJ h"hn"mCJOJQJ^JaJ/h"hn"m5B*CJOJQJ\^JaJph1\eeeeefBfhfffffg:g`gggggh3hYhhhhh&iIioiigdn"mhhhh%iiiiTjUjVjZjsjzj{jjjjjjjkkk+kPkkkkkklljlwlllllll m/m0m1mrmmmmmXnYnZnknrnvnnn±У’’’ h"hCJOJQJ^JaJhCJOJQJ^JaJ h"hq:CJOJQJ^JaJhn"mCJOJQJ^JaJ h"hn"mCJOJQJ^JaJ h"h-CCJOJQJ^JaJhq:CJOJQJ^JaJ9iiii"j*j6jDjTjUjVjjjjjkkknkwkkkkkk[lxllllgdn"mllll mmm/m0m1mcmmmmmmmnn&n1nXnYnZnsnnnnoogdn"mnnnnnnnoooo'o(o*oooooooo?p@pApEpZprpspppppp q>q?qgqhqiqqqqqrr'r(r.r6r:rErIrWr[rirmr|r}r~rrrrrr(s)s*s.s9s?s@sAshq:CJOJQJ^JaJ h"hCJOJQJ^JaJhCJOJQJ^JaJ h"hn"mCJOJQJ^JaJhn"mCJOJQJ^JaJGooooooooop#p-p6p?p@pApppppppp@qKqSq^qgqhqiqgdn"miqqqqqqqq7rFrXrjr}r~rrrrrs(s)s*ssssssss-tgdn"mAsBsfshsssssstt+t,ttttttteufuguuuSvUvuvyv>w?w@wx x x)xFxLxRxxxxxxxxCyDyEyIySyyy(z)z*z{ {{.{3{7{D{F{{{{|||||} }}}hCJOJQJ^JaJ h"hCJOJQJ^JaJ h"hn"mCJOJQJ^JaJhn"mCJOJQJ^JaJJ-tDtUt`tttttu$uFueufuguuuv4vSvTvUvvvvw>w?w@wwwgdn"mwwwx x xmxwxxxxxxxxy"yCyDyEyyyyz(z)z*zz {{gdn"m{0{D{E{F{{{{{{{{|||||||z}}}}}}}U~q~~~gdn"m}}}}~ ~~~~~~~ln!"#'-now{=SgzՂ ./34BCGHcdhддУ hlwhn"mCJOJQJ^JaJhCJOJQJ^JaJhn"mCJOJQJ^JaJ h"hn"mCJOJQJ^JaJ h"hCJOJQJ^JaJhq:CJOJQJ^JaJ@~~~~5LWlmn !"#p|jugdn"mց:d0De{ ,-gdn"mhiyz~)*,-.2<UY{ĄńƄʄل  !123459B!"=>WXstuhq:CJOJQJ^JaJ h"hCJOJQJ^JaJ h"hn"mCJOJQJ^JaJhn"mCJOJQJ^JaJH-.ĄńƄ 345˅Յ#?Yuvwgdn"muw͆Ά҆ӆ݆ކ QRVW[\`arswxև "#$?Whjtugh h"hCJOJQJ^JaJhn"mCJOJQJ^JaJ h"hn"mCJOJQJ^JaJhCJOJQJ^JaJIwφ߆S]t"#$qgdn"m'>Rghj҉  !QgyԊfrgdn"mhij !%PTfjx|Ҋӊ׊؊-deX[;<=>*/0ITjuŴŴŴŴŴŴ h"hCJOJQJ^JaJhn"mCJOJQJ^JaJ h"hn"mCJOJQJ^JaJhCJOJQJ^JaJhq:CJOJQJ^JaJGrUj}/;<=̍ǎgdn"muŎƎ܎ݎ ,-12@AEFVW[`mnopq  !-.23ABFGWX\]jkloѐ$Ἣ hf5CJOJQJ\^JaJ&h]!hf5CJOJQJ\^JaJ h"hCJOJQJ^JaJhn"mCJOJQJ^JaJ h"hn"mCJOJQJ^JaJ@ǎގ.BXopq/CYlmnoҐ56gdfgdn"m$')3456Ց֑בŒǒmo)+ՙۙݙޙʲtth($CJOJQJ^JaJ h]!h($CJOJQJ^JaJhfCJOJQJ^JaJ h]!hfCJOJQJ^JaJ/h]!hf5B*CJOJQJ\^JaJph&h]!hf5CJOJQJ\^JaJ hf5CJOJQJ\^JaJ hq:5CJOJQJ\^JaJ-ÑՑ֑בVfu2H_o-;K]mnop~gdfԖlz!)gdf)*+\jv Ǚҙݙޙߙ9BM\ghgdfޙߙWZ_eghijjo345ÝĝŝGHIJnopIJKء١ڡOQ]^_ئڦ§ç޴޴޴޴h($CJOJQJ^JaJh,CJOJQJ^JaJhfCJOJQJ^JaJ h]!hfCJOJQJ^JaJ h]!h($CJOJQJ^JaJGhjҚgq} #345МݜgdfÝĝŝ +7GHI9Gavܟgdfܟ$7nopɠIJK{áء١ڡtgdf,=OPQȣ٣as:EMU]^_gdf ئ٦ڦ§çdlw2:Efgdffpqr.=MNO$456ht|zͬgdfpqrMNO46ͬάϬLMNopqް߰ɱʱ˱JKL;<=>дѴҴQRSöŶ=>?Ǹȸɸh,CJOJQJ^JaJh($CJOJQJ^JaJ h]!h($CJOJQJ^JaJhfCJOJQJ^JaJ h]!hfCJOJQJ^JaJGͬάϬU]itͭ6LMNîϮۮ?U^fopgdfpq˯ӯۯQް߰oɱʱ˱9JKLgdfLs}@d̳!;<=jдѴҴ7gdf7Tt #/?QRSöĶŶ'/6=>?gdfٷ}ǸȸɸXgwչ gdfxzUVW !ɼʼ˼Ц¦{j!jhHh]0JCJUaJh]hf0JmHnHu h]0Jjh]0JUh\Zjh\ZUhn"mCJOJQJ^JaJh,CJOJQJ^JaJh($CJOJQJ^JaJ h]!hfCJOJQJ^JaJ h]!h($CJOJQJ^JaJhfCJOJQJ^JaJ' ;xyzǺ?UVWػ !ɼʼ˼^pgdfʽֽKYf} &`#$gdFlgdf$&`#$a$gdu$&`#$a$gdHhn"mCJOJQJ^JaJh\Zh] h]0Jh]CJaJhf0JCJaJmHnHu!jhHh]0JCJUaJhHh]0JCJaJ 50P/ =!"#$% Dp^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH VV  Heading 1dd@&[$\$5CJ0KH$PJ\aJ0DA`D Default Paragraph FontRiR  Table Normal4 l4a (k (No List dod Normal Text1$7$8$H$%B*OJQJ^J_HmH phsH tH 4 @4 HFooter  !.)@. H Page Number4"4 HHeader  !424 questionCJaJHBH v\ Balloon TextCJOJQJ^JaJPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK]  l lllo  G*k4?;O_bhnAs}huhu$ޙ`cglqty3 e--YM"'%f') -014 8D;=UACF=JMJPT.VX \ _\b\eiloiq-tw{~-wrǎ)hܟfͬpL7 abdefhijkmnoprsuvwxz{|}~ !#o!!8@0(  B S  ?MR!!\,e,EEKL WW[[bbhhVi]iii'j.jjj kkk kkkkkinsnppppxxxxmytyyyyyG{U{||||||*3 , -ykr5=%( <G#HT28#6=S\LTZbhkvintybjow|   o w | . 1 H K u x !&/4AFJszz)0@GV]l(-<APcjuw<>^fkw/=BJPY % !*7;"&08BMR^!!""$"'";"?"########N$R$X$^$d$h$y$$&&''(())))**d*i*^+d+i+m+x+|+++,,,,.,2,=,J,W,[,s,~,%-*-/-7-<-A-....../ ////////022G3R3X3_3e3k3q3z3444&4+45444444444o5{5555555555666!6+66666666677777777X9\99999-:7:=:C:P:[:a:j:::;;w;y;;;;;;;<<<<<<<<W=^=d=i=o=u={======== > >=?D?I?Q?V?\?a?h?y@@EAMARAZABBBBBBdCgCCCCCCCCC_DgDlDtDDEEEEEF FHFOF^FeFqF{FFFGG GGGG%G-GGGGGGHCHEHMHQHWH]HcHjHpHwHHHIIIIIIJ JJJJJJJJJLLL'L-L0L}LLLLMMM"M(M/M5M8MMM\P^PPPPPPPPP Q&QXQ`Q RR3R8RURZRRRRRSS S(SSSSSSSTTVVV&VKVRV_VfVVVVVfXnX}YYYYYY[[o\y\\\kdoddeseweeeeeeeff)f/fvf}fffff*g-g`lwlMoRoppupzpppppp3{7{G{U{h{k{~{{}} }}}} }+}}}~~~~V[w{Ձ܁T[jp|ׂނʆц ,16EK[^ -27FL\cƉӉ +Y\irx59KPbmr}09>IN[`ks|׎ێ os} őʑБՑۑ<@EKPZ_e jot{!).5–Ŗߗ̘Әw{ !/2@D˛Λܛdhvz "Ǟouz=CHTinvx"'1;@K "'2:<krwz`glrw}Хӥ ƦͦҦ٦ަr}ƩvzmqBJDGܯ[_jpzʲԲ۳ƴдѴajsy NV\cij3333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333ccZfZfhhiiiippttuuxx.|.|}}hi!!$'),23oo++hiڙڙ__rr??zz ccZfZfhhiiiippttuuxx.|.|}}hi!!$'),23oo++hiڙڙ__rr??zz @$8Z5 hh^h`o(hH. ^`o(hH. ^`o(hH ^`o(hH() ^`o(hH() pp^p`o(hH()   ^ `o(hH. @ @ ^@ `o(hH.   ^ `o(hH.@$0q:f{r9 7 x 'N\Zahn|,7qpPsjNCau0 ] O!($#()(:(+s>+y-yJ."p3 74Qh4-6.6U709@=r=>*Br FLG:>HPtHlJ{JLPPWPkRRR3RW'YDZ^Zn:\)S\S ]]Wboef-#f#fffgIg5hlFlQln"mRMm9nm'oC&q@r4drs)tXt vi+v wwfx5xi|z~t{B. b2}x3C,0]mv\Xw; `KOli[PXbi'#0")XNE/H]7/DfEB9m/k#wqU2G(3g 4L>B5U_sz&31s>:p<WkCfcl[Q% <CPp6w"Q2?|{~-Cz=5+]/b:{NAljlR@ `@UnknownG* Times New Roman5Symbol3. * ArialI. ??Arial Unicode MSK@Palatino Linotype5. *aTahomaA BCambria Math#h.ڦ.ڦ@T+]K@T+]K%xxd772qX?H2!xx2Information Systems Today, 4e (Valacich/Schneider)Preferred CustomerLawrence L. Andrew Oh+'0 0< \ h t4Information Systems Today, 4e (Valacich/Schneider)Preferred Customer Normal.dotmLawrence L. Andrew2Microsoft Office Word@F#@T@T+@T՜.+,D՜.+,p, hp  Tamarack SoftwareK]7 3Information Systems Today, 4e (Valacich/Schneider) TitleH@$<_AdHocReviewCycleID_EmailSubject _AuthorEmail_AuthorEmailDisplayName_ReviewingToolsShownOnce]Fuller IM and TIF projectsAna_Jankowski@prenhall.comJankowski, Ana  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry FPT1TableBWordDocument7lSummaryInformation(DocumentSummaryInformation8CompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q