Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

MGT 220 MIDTERM TEST 50 QUESTIONS WITH 100% VERIFIED ANSWERS GRADED A+, Exams of Business Administration

Q1. involve the purchase of materials, the processing of materials into products, and delivery of products to customers. PAGE 33 a. Supply chains b. Logistics c. Primary activities d. Support activities Q2. Which of the following is a characteristic of competitive advantage? PAGE 19 a. It is a long lasting edge over competitors if based on IT. b. It is short-lived if competitors quickly duplicate it. c. It requires the use of social media and networks. d. It always provides a big strategic payoff. Q3. Managers decide to increase the number of new accounts by 4.0% within the next quarter. This is an example of: PAGE 26 a. an objective. b. a strategy. c. customer loyalty. d. qualitative metric. Q4. is a series of processes in which an organization selects and arranges its businesses or services to keep the organization viable even when unexpected events disrupt its businesses, markets, products, or services. PAGE 30 a. Strategic planning b. SWOT c. Value proposition d. Threat analysi

Typology: Exams

2023/2024

Available from 01/01/2024

coursehero
coursehero 🇺🇸

4

(62)

1.6K documents

1 / 10

Toggle sidebar

Related documents


Partial preview of the text

Download MGT 220 MIDTERM TEST 50 QUESTIONS WITH 100% VERIFIED ANSWERS GRADED A+ and more Exams Business Administration in PDF only on Docsity!

Q1. involve the purchase of materials, the processing of materials into products, and delivery of products to customers. PAGE 33

a. Supply chains

b. Logistics

c. Primary activities

d. Support activities

Q2. Which of the following is a characteristic of competitive advantage? PAGE 19

a. It is a long lasting edge over competitors if based on IT.

b. It is short-lived if competitors quickly duplicate it.

c. It requires the use of social media and networks.

d. It always provides a big strategic payoff.

Q3. Managers decide to increase the number of new accounts by 4.0% within the next quarter. This is an example of: PAGE 26

a. an objective.

b. a strategy.

c. customer loyalty.

d. qualitative metric.

Q4. is a series of processes in which an organization selects and arranges its businesses or services to keep the organization viable even when unexpected events disrupt its businesses, markets, products, or services. PAGE 30

a. Strategic planning

b. SWOT

c. Value proposition

d. Threat analysis

Q5. Why are companies, such as Monsanto and Wells Fargo, willing to invest in the building of new data centers? PAGE 28

a. To stop wasting capital maintaining outdated energy-inefficient data centers.

b. To comply with government energy regulations.

c. To develop new computing capabilities.

d. To improve business process performance.

Q6. Basic functions of an IS are: PAGE 22

a. input, processing, and output.

b. input, processing, output, and feedback.

c. user interfaces, data sources, processing, and reporting.

d. hardware, software, data, and procedures.

Q7. Which of the following statements about mobile market opportunities is false? PAGE 20

a. Mobiles are replacing computers as the primary way to connect with public and private networks and to get work done.

b. Mobile gadgets are starting to look and feel like handheld computers, able to run all sorts of software.

c. Desktop and laptop computers are taking on more and more nontraditional duties, like streaming media to TV sets, stereos, and other household appliances.

d. Touch-navigate devices running on 3G and 4G networks create business opportunities and eliminate business threats.

Q8. IT infrastructure is the collection of: PAGE 60

a. hardware and software.

b. hardware, software, and networks.

c. hardware, software, networks, and mobile devices.

d. hardware, software, processes, networks, and users.

Q9. Victims of identity theft face enormous challenges and frustration because: PAGE 50

a. data errors detected later are difficult to correct.

b. data processing does not improve data quality.

c. data processing is done in real-time.

d. data processing cannot detect obvious data errors.

Q10. A is a visual presentation of critical data, such as the results of a report or analysis, to more quickly understand data. PAGE 55

a. dashboard

b. GUI

c. touch screen

d. KPI

Q11. To improve the performance and ability to store, protect, and manage data at lower

up-front costs, companies are turning to ___________ options. PAGE 60

a. cloud computing

b. mainframe

c. visualization

d. data center

Q12. The general name for Internet-based infrastructures is .......................... PAGE 60

a. social networking

b. cloud computing

c. Web 1.

d. Web 2.

Q13. Large companies and government agencies with multiple locations may set up on servers that they own if data confidentiality is a key requirement. PAGE 61

a. public clouds

b. private clouds

c. encrypted clouds

d. social clouds

Q14. RFID is a technology that uses instead of to identify products or pallets. PAGE 58

a. electronic tags; bar codes

b. electronic tags; chips

c. bar codes; PINs

d. PINs; EPC tags

Q15. The main difference between a database and data warehouse is that: PAGE 90

a. databases are designed and optimized to store data, whereas data warehouses are designed and optimized to respond to analysis questions that are critical for a business.

b. databases are designed and optimized to analyze data, whereas data warehouses are designed and optimized to store data for sharing.

c. databases are designed to detect trends in the data, whereas data warehouses are designed to support supply chains.

d. databases are designed to support traditional commerce, whereas data warehouses are designed to support e-commerce.

Q16. An extremely economical and effective method of delivering data from a data warehouse to decision makers throughout the enterprise is via ........................... PAGE 93

a. data marts

b. data cubes

c. an intranet

d. operational data stores

Q17. Which is not an advantage and capability of a DBMS? PAGE 89

a. security

b. audit trail

c. backup

d. physical view

Q18. According to the principle of , the more recent the data, the more valuable they are. PAGE 75

a. data uncertainty

b. 90/90 data use

c. diminishing data value

d. data in context

Q19. Which is not a characteristic of a data warehouse? PAGE 92

a. Data are organized by subject, such as customer, vendor, or product.

b. Data are coded in a consistent manner.

c. Data are kept for many years to be used for identifying trends, forecasting, and comparisons over time.

d. Most applications of data warehousing are in real-time.

Q20. Creating backups of records is not a form of electronic records management (ERM) because: PAGE 97

a. the content on backups is not organized so that it can be accurately and easily retrieved.

b. business records and documents may need to be modified.

c. records and documents cannot be stored together.

d. the requirement to save records is new.

Q21. Networks transmit , which carry voice or data between a sender and a receiver. PAGE 108

a. nodes

b. routers

c. signals

d. switches

Q22. are networks that are capable of transmitting data at very fast rates, but operate in a limited area, such as an office building, campus, or home. PAGE 117

a. MANs

b. Hot spots

c. LANs

d. WANs

Q23. transmits voice and data in packets and has become one of the most cost effective ways to communicate. PAGE 118

a. TCP

b. UDP

c. VoIP

d. UM

Q24. What is significant about 4G networks is that they do not have a , which both 2G and 3G networks do have. PAGE 110

a. packet-switched IP system

b. circuit-switched subsystem

c. WiMAX standard

d. GSM-based LTE subsystem

Q25. TCP performs error checking, which can cause packet delivery delays. Because of the error-checking process, TCP is not well-suited for what type of transmissions? PAGE 118

a. digital voice or video

b. data

c. documents

d. e-mail

Q26. Which of the following is a dysfunction of the group process? PAGE 125

a. Social pressures of conformity can lead to groupthink.

b. A group may produce synergy during problem solving.

c. Group members may have their egos embedded in the decision, and so they may be committed to the solution.

d. Groups are better than individuals at understanding problems.

Q27. Facebook, YouTube, Twitter, LinkedIn, and other social networks are making IT security dangers worse. Why? PAGE 141

a. Users invite in and build relationships with others. Cybercriminals hack into these trusted relationships using stolen log-ins.

b. E-mail viruses and malware have been increasing for years even though e-mail security has improved.

c. Communication has shifted from social networks to smartphones.

d. Web filtering, user education, and strict policies cannot help prevent IT security dangers on Facebook and other social networks.

Q28. Before the people who are responsible for security make any decisions about infosec defenses, they must understand. PAGE 153

a. the requirements and operations of the business

b. how firewalls, anti-virus software, and other technology function

c. tactics of hackers, fraudsters, botnets, and identity thieves

d. how much to invest in risk management

Q29. is the chain of events linking the business continuity plan to protection and to recovery. PAGE 161

a. Disaster recovery

b. Auditing

c. Date recovery

d. Internal control

Q30. Crime can be divided into two categories depending on the tactics used to carry out the crime. What are those two categories? PAGE 150

a. personal and non-personal

b. felonies and misdemeanors

c. insider and outsider

d. violent and nonviolent

Q31. is a security technology for wireless networks that improves on the authentication and encryption features of WEP. PAGE 159

a. Network access control (NAC)

b. Security exchange commission (SEC)

c. Wi-Fi protected access (WPA)

d. Intrusion detection system (IDS)

Q32. A fiduciary responsibility is both a legal and an ethical obligation. PAGE 135

a. True

b. False

Q33. Public and private are sites where many sellers and many buyers buy and sell. PAGE 186

a. networks

b. exchanges

c. sources

d. value chains

Q34. One of the problems with advertising is that advertisers knew very little about the recipients. PAGE 191

a. direct mail

b. Web

c. interactive

d. social media

Q35. California's Office of Traffic Safety (OTS) partnered with the Taxi Magic app team to

. PAGE 189

a. reduce DUI

b. sponsor contests

c. interface with Facebook

d. reduce poverty

Q36. Ethical standards and laws frequently technological innovation. PAGE 197

a. lag behind

b. keep pace

c. conflict with

d. lead ahead of

Q37. The purchase of indirect materials on an as-needed basis is referred to as sourcing. PAGE 186

a. horizontal

b. vertical

c. spot

d. systematic

Q38. American Express developed tools that improved compliance with procurement rules on indirect purchases, or MRO supplies. One of the major performance improvements was the. PAGE 187

a. increase in spot buying

b. elimination of maverick buying

c. reduction in billing errors

d. increase in purchases from local vendors

Q39. End users can access a WLAN with their laptops, desktops, or PDAs by adding a(n)

. PAGE 210

a. 4G network

b. Internet protocol

c. access point

d. wireless network card

Q40. The continues to be a leader in making digital music, movies and podcasts available to consumers for a fee. Page 216

a. iTunes Store

b. Amazon.com

c. Fox Mobile

d. Grooveshark.com

Q41. Applying mobile computing to may have strategic implications by shortening cycle time, reducing delays, and improving supplier and customer relationships. Such solutions enable organizations to proactively adjust plans or shift resources. Page 225

a. operations

b. job dispatch

c. supply chains

d. sales

Q42. The location provided by GPS is expressed in terms of. Page 221

a. geocodes

b. digital maps

c. latitude and longitude

d. data visualization

Q43. Why are leading organizations developing marketing and sales strategies built on connecting with their customers via mobile devices? Page 209

a. Because mobile transactions are now secure and protected against fraud.

b. To remain competitive with the vast majority of organizations that have developed plans for mobile customer service and support.

c. Because customers want to be connected to all aspects of their lives via their mobiles.

Q44. The underlying technologies needed for location-based commerce and services are and. Page 220

a. GPS; GIS

b. TPS; laptops

c. portals; servers

d. social networks; sensors

Q45. refers to a search strategy that focuses on finding information in a particular content area, such as travel, finance, legal, and medical. Page 259

a. Vertical search

b. Horizontal search

c. Tag search

d. Web 3.0 search

Q46. are effective and inexpensive ways to collect information from customers as well as to send information to them. It also can be used to gather intelligence on competitors. Page 255

a. Marketing research

b. Interactive social media

c. Dashboards

d. Mashups

Q47. Most large and medium sized companies utilize an Intranet based on technology for internal collaboration and communication, which gives them control of the content. PAGE 251

a. Web 1.

b. Web 2.

c. social tagging

d. wikis

Q48. Which is not a social media activity metric? PAGE 254

a. pageviews

b. posts

c. unique number of visitors

d. quality and speed of issue resolution

Q49. WedMD is one of the popular , which are communities organized by interest, such as hobbies, vocations, political parties, and unions. PAGE 243

a. affinity portals

b. associations

c. ethnic communities

d. B2B online communities

Q50. Web 2.0 is also referred to as the. PAGE 236

a. public Internet

b. online community

c. Blog 2.

d. social Web