Você está na página 1de 125

1 A computer user buys a low priced replacement monitor but finds that there is a lot of flicker.

The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing? #refresh rate When analy!ing a protocol used on the network" it is discovered that multicast messages are being sent to network devices. Which class of #$ addressing is being used to send these messages? #% & A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause? #invalid system disk ' What characteri!es spoofing? #(aking data appear to come from a source other than the actual source. ) When a Windows *$ computer has completed the $+,T for each adapter card that has a -#+," what is the ne.t step during the boot se/uence? #-#+, reads the (-0. 1 When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an ink2et printer? 34hoose two.5 #ink cartridge #paper 6 Which protocol adds security to remote connections? #,,7 8 What is the purpose of an #09? #0e/uest information from the 4$:. ;

A wireless <A= is being deployed inside the new park ranger" one room office that is located at the highest part of the national park. When the testing was completed" the technicians reported that occasionally" the wireless <A= signal is affected by some type of interference. What are two possible causes of the signal distortion? 34hoose two.5 #the number of wireless devices that are used in the wireless <A= #the large number of trees that surround the office 1> When installing a service pack or security patches on an operating system" what should be done to protect the system in the event of a faulty or aborted installation? #4reate a restore point. 11 A technician is asked to wire a network that supports 4,(A?4%. Which architecture and physical topology should the technician use for supporting this access control method? #@thernet and ,tar 1 What is the best way to fully ensure that data is unable to be recovered from a hard drive? #shattering the hard drive platters with a hammer 1& A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management? #,ystem 0egistry 1' A printer has a paper 2am. An impatient user has sent multiple print 2obs of the same document to this printer. What can be done to remove these print 2obs? #4ancel the 2obs in the printer /ueue. 1) A-4 #nc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy? #0A#% adapter 11

A call center technician has asked a customer to perform a simple operation to fi. a problem on a computer. The customer seems unable to perform the task. What should the technician do? #%etermine whether the customer would prefer to receive the instructions in another form" such as e-mailed" illustrated written instructions. 16 Which two technologies enable printers to be accessed by multiple network users? 34hoose two.5 #Wi-Ai #@thernet 18 A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue? #:ninstall and reinstall the printer driver. 1; Which network device uses a (A4 address table to segment the network? #router > A technicians need to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. 7ow can the hard drive be configured to provide this perception? #4reate one primary partition and one logical partition with four logical drives within it. 1 A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain? #The technician interrupted a number of times to ask /uestions. A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first that the technician should take? #4heck the %evice (anager on the user computer for hardware problems. & Which 0egistry file contains information about all software that is installed on a Windows *$ computer? #7B@CD<+4A<D(A47#=@

' A hacker is detected using commonly available wireless hacking tools to access encrypted wireless network communication. Which resolution would prevent this action? #4hange the ,,#% that is being used on the wireless network. ) Which two general precautions should be taken before replacing any non-hot-swappable laptop component? 34hoose two.5 #%isconnect the power cord. #0emove any batteries. 1 Which power mode should be used by a laptop so that all the data is saved" all the applications the user was working on are left open" and there is no power used by the laptop? #7ibernate 6 What is the purpose of ,4,# and 0A#% adapters? #to connect storage devices such as hard disk drives to a $4 8 Which network protocol is used to automatically assign an #$ address to a computer on a network? #%74$ ; A customer used the convert.e.e utility to take advantage of =TA, security features. The customer later discovered that the application on the computer can only read AAT& files. After the hard drive was formatted back to AAT& " the customer noticed all of the data files are missing. What should the customer do ne.t? #0estore the data files that were backed up in preparation for the conversion. &> Which two components normally re/uire a laptop to be powered down and the battery removed before removing the components? 34hoose two.5 #internal hard drive #0A( &1 A customer reports that after using a computer for over a year" the computer now takes

more time to access the files. Which management tool can be used first" before any other comple. procedure? #defrag & A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply? #The power supply has sufficient wattage to support all components inside the computer. && What is a benefit of using the :,- or AireWire ports to connect peripherals to a laptop? #The peripherals can be plugged in and out without turning the laptop off. &' A small business has used a high /uality configurable flatbed scanner to scan a number of photographs to print as large posters. 7owever" the /uality of the images printed as posters is poor. What should the user do? ##ncrease the resolution of the scanner. &) A user has been writing data to a :,- flash memory drive. What should the user do before removing the device? #4lick on the ,afely 0emove 7ardware icon in the system tray then on the device. &1 A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem? #The default gateway is not set. &6 A technician is e.plaining the differences between ink2et printers and laser printers to a customer. Which two comparisons should the technician make? 34hoose two.5 ##nk2et printers are less e.pensive than laser printers. #The laser printer output is dry after printing" but an ink2et printer may still have wet ink on the paper after printing. &8 A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server" the administrator notices repeated" larger than normal pings to the server. What is the name of this type of attack?

#ping of death &; A technician wants to create a new partition on a new additional hard drive. Which tool should be used? #%isk (anagement '> Which two /uick solutions are commonly recommended when a technician is troubleshooting a laptop? 34hoose two.5 #0eboot the laptop. #%isconnect the peripherals. '1 A company uses a single computer to receive and test all Windows updates. When the most recent update was installed" several programs failed. What is the first course of action that a technician should attempt to remove the update? #0un a ,ystem 0estore from the last restore point. ' A mobile training room uses a generator to power the $4s" servers" and printers. The company that runs the room upgraded the e/uipment but then found that when all the devices are powered up they become unreliable" with some $4s shutting down. What may cause this power problem? #The power consumption of all devices is too much for the electrical circuit that is provided. '& When installing the Windows *$ operating system" a technician is given a choice of file systems to use. #f security is a re/uirement" which file system should be chosen? #=TA, '' A technician has replaced a failing floppy drive. While testing the new drive" the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem? #The ribbon cable is installed incorrectly. ') Which two types of connectors can be found on %E# cables? 34hoose two.5

'1 Which Windows tool should be run before upgrading the operating system? #=tbackup '6 The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver? #manufacturerFs website '8 Where can a user change the idle time after which a laptop will switch to standby mode? #<eft-click ,tart G 4ontrol $anel G $ower +ptions" then click the $ower ,chemes tab. '; A home computer owner has a $4 system that runs Windows *$. Aor security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software" but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software? #administrator )> A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured? #peer-to-peer )1 What do the terms refresh rate" interlace" and aspect ratio e.plain? #image properties of a monitor ) A technician wishes to boot a computer using a 4%-0+( that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the $4? #-#+, )& (icrosoft +ffice Word is a 3n5 DDDDD. a. area in the computerHs main memory in which (icrosoft +ffice te.t files are stored temporarily b. program included with Windows >>> that can be used only to create or

edit te.t files" smaller than 1'B" that do not re/uire formatting c. classified password that prevents unauthori!ed users from accessing a protected (icrosoft +ffice item or document d. full-featured word processing program that can be used to create and revise professional looking documents easily . The main elements of the DDDDD are the insertion point" end mark" mouse pointer" rulers" scroll bars" and status bar. a. Word toolbar b. Aormatting toolbar c. Word document window d. Iraphics toolbar &. The DDDDD is a short hori!ontal line indicating the conclusion of a document. a. insertion point b. end mark c. status indicator d. scroll bo. Note: If you are preparing an examination using your own word processor, for Multiple Choice questions 4 and 5 you must use the Picture command on the Insert menu to insert igure !"#$%&mp% 'he figure is referenced when students answer the questions% !hen the Insert Picture dialog &ox displays select igure !"#$%&mp from the !ord su&folder in the Printed 'est (an) folder in the 'est (an) * 'est +ngine menu item and ma)e sure the ,in) to file chec) &ox is not chec)ed% '. #n the accompanying figure" the DDDDD is a special toolbar that displays a series of names" each of which represents a list of commands that can be used to perform tasks. a. scroll bar b. status bar c. title bar d. menu bar ). #n the accompanying figure" a DDDDD contains buttons" bo.es" and menus that allow tasks to be performed more /uickly than using the menu bar. a. format bar b. status bar c. command bar

d. toolbar 1. A DDDDD is not attached to an edge of the Word windowJ that is" it displays in the middle of the Word window and can be moved anywhere in the window. a. floating toolbar b. scroll bar c. status toolbar d. menu bar 6. When the <anguage bar is DDDDD" it means that you do not see it on the screen but it will be displayed the ne.t time you start your computer. a. restored b. hidden c. minimi!ed d. closed 8. The DDDDD" or typeface" defines the appearance and shape of letters" numbers" and special characters. a. font b. font si!e c. point d. paragraph formatting ;. When Word flags a possible spelling or grammar error" it also changes the mark on the ,pelling and Irammar ,tatus icon to a DDDDD. a. green * b. green check mark c. red * d. red check mark 1>.The paragraph mark 3K5 is a formatting mark that indicates where the DDDDD was pressed. a. TA- key -. ,$A4@-A0 c. @=T@0 key d. ,7#AT key
11. $ress the @=T@0 key in all of the following circumstances except DDDDD.

a. to insert a blank line into a document b. when the insertion point reaches the right margin c. to begin a new paragraph

d. in response to certain Word commands 1 .The scroll bo. on the vertical scroll bar indicates the DDDDD. a. position of the insertion point from the top of the page b. distance of the insertion point from the left margin c. current relative location of the document portion displayed in the window d. rank of the word in which the insertion point is found 1&.To move to the end of the document" press the DDDDD key3s5. A. %+W= A00+W -. @=% 4. 4T0<L%+W= A00+W %. 4T0<L@=% 1'.The file type DDDDD indicates the file is a Word document. a. .msw b. .wor c. .wrd d. .doc 1).DDDDD formatting is the process of changing the way letters" numbers" punctuation marks" and symbols appear on the screen and in print. a. %ocument b. 4haracter c. $aragraph d. +b2ect 11.#n Word" the default alignment for paragraphs is DDDDD. a. left-aligned" or flush margins at the left edge and uneven edges at the right edge b. centered" or e/uidistant from both the left edge and the right edge c. right-aligned" or flush margins at the right edge and uneven edges at the left edge d. 2ustified" or flush margins at both the left and right edges 16.To select a group of words" DDDDD. a. click the Iroup button on the Aormatting toolbar b. double-click anywhere within the group to be selected c. drag the mouse pointer through the characters to be selected d. right-click the first and last characters of the group to be selected

18.Word includes a series of predefined graphics called DDDDD that can be inserted into a Word document. a. clip art b. hyperlinks c. captions d. bookmarks 1;.,mall s/uares" called DDDDD" on the selection rectangle that surrounds a graphic can be used to change the dimensions of the graphic. a. scroll bo.es b. si!ing handles c. status indicators d. move handles >.To save an e.isting document with a different file name" click DDDDD. a. the ,ave button on the ,tandard toolbar b. ,ave on the Aile menu c. the ,ave As button on the ,tandard toolbar d. ,ave As on the Aile menu 1.To cancel a 2ob that is printing or one that is waiting to be printed DDDDD. a. click the $rint button on the ,tandard toolbar b. click the printer icon on the taskbar c. double-click the $rint button on the ,tandard toolbar d. double-click the printer icon on the taskbar .DDDDD are types of changes that occur when te.t has been omitted from a document and must be inserted later. a. Additions b. %eletions c. (odifications d. All of the above &.To switch between insert mode and overtype mode" DDDDD. a. click 4aption on the #nsert menu b. double-click the +E0 status indicator on the status bar c. click Te.t -o. on the #nsert menu d. double-click the #=, status indicator on the status bar '.To erase a character to the right of the insertion point" press the DDDDD key. A. 4A=4@<

-. -A4B,$A4@ 4. %@<@T@

d. either b or c
). The DDDDD on the right side of the menu bar lets users type free-form /uestions"

such as how do I save" or terms" such as copy" and Word responds by displaying a list of topics related to the word or phrase entered. a. Type a /uestion for help bo. b. 9uestion (ark button c. WhatHs this? command d. #nde. sheet True/False

1. '

When starting Word" the Word window appears the same way that it did the last time Word was used. True

4lip Art" 7elp" and 0esearch all are task panes provided by Word. 6. ' True

8. '

The Word window consists of a variety of components to make your work more efficient and documents more professional. True

;. ' & >. '

When typing" the insertion point moves to the left" and when the end of a line is reached" it moves downward to the ne.t line.

@ach time a new line is begun in the document window" the end mark moves to the right. True

& 1. ' & . ' & &. ' & '. ' & ). ' & 1. ' & 6. ' & 8. '

The mouse pointer becomes different shapes depending on the task being performed in Word and the pointerHs location on the screen.

The vertical ruler sometimes displays at the right edge of the Word window when certain tasks are performed. True +n the left edge of the hori!ontal scroll bar are four buttons used to change the format of a document.

Word displays the first four status indicators 30@4" T0B" @*T" and +E05 dimmed when they are on and darkened when they are off.

#f you perform a task that re/uires several seconds" the status bar usually displays a message informing you of the progress of the task.

#n Word" the menu bar and toolbars display at the bottom of the screen. True

To display a full menu" you can click the menu name on the menu bar and then point to the arrows at the bottom of the short menu. True A dimmed command on a short or full menu indicates that it is not available for a current selection in a menu.

& ;. ' ' >. ' ' 1. ' ' . ' ' &. ' ' '. ' ' ). ' ' 1. '

Two built-in toolbars are the (enu toolbar and the Aind toolbar. True

When you first install Word" the buttons on both the ,tandard and Aormatting toolbars are preset to share a single row that displays immediately below the menu bar. A docked toolbar is attached to an edge of the Word window.

To indicate whether you want to speak commands or dictate te.t" you use the ,peech 0ecognition bar. True

#f the <anguage bar command is dimmed on the Toolbars submenu or if the ,peech command is dimmed on the Tools menu" the +ffice ,peech 0ecognition software is not installed. A single point is about 1?1 of an inch in height. True

+n most computers" the default font si!e in Word is 11.

To enter te.t in a document" you type on the keyboard or speak into the microphone. True

' 6. ' ' 8. ' ' ;. ' ) >. ' ) 1. ' ) . ' ) &. ' ) '. '

#f a word is typed that is not in WordHs dictionary" a red wavy underline appears below the word. True To enter a blank line into a document" press the 4T0< key without typing any te.t on the line.

A raised dot 35 shows where the @=T@0 key was pressed.

@ach time the @=T@0 key is pressed" Word creates a new paragraph. True

Wordwrap forces you to stop typing words and press the @=T@0 key at the end of each line.

As you enter te.t in the Word document window" you must press the @=T@0 key when the insertion point reaches the right margin. True A document may wordwrap differently depending on the type of printer being used. True Although te.t cannot be seen once it scrolls off the screen" it remains in the document.

) ). ' ) 1. ' ) 6. '

@ither the mouse or the keyboard can be used to scroll to a different location in a document. True When using the keyboard to scroll" the insertion point remains stable. True

#f you feel the wavy underlines from the check spelling as you type feature clutter the document window" you can hide them temporarily until you are ready to check for spelling and grammar errors. True

) 8. ' ) ;. ' 1 >. ' 1 1. ' 1 . '

#f the computer is turned off or electrical power is lost" the document remains stored in the computerHs memory. true

$aragraphs encompass the te.t up to and including the paragraph mark 3K5. True

$aragraph formatting re/uires the paragraph to be selected prior to formatting. True

When a paragraph is right-aligned" the Align 0ight button on the Aormatting toolbar is selected. True The 4enter button on the Aormatting toolbar centers te.t between the top and bottom margins. True

1 &. ' 1 '. ' 1 ). '

Word provides an :ndo button on the ,tandard toolbar that can be used to cancel the most recent command or action. True #n addition to the basic underline" Word has many decorative underlines that are available through the Aont dialog bo..

#f clip art is part of a paragraph and that paragraph is left-aligned" then the clip art also is left-aligned. True

1 1. ' 1 6. ' 1 8. ' 1 ;. ' 6 >. '

Cou do not have to have selected a graphic in order to resi!e it. True A selected graphic can be resi!ed using the Aormat $icture dialog bo." by clicking the Aormat $icture button on the $icture toolbar" clicking the ,i!e tab" and then entering new height and width measurements. True After a document is saved the first time" Word automatically assigns a different file name each time it is saved subse/uently. True When you use the $rint button to print a document" Word prints only the current page.

#f you want to print multiple copies of a document" display the $rint dialog bo. by clicking the $rint button on the ,tandard toolbar.

6 1. ' 6 . ' 6 &. ' 6 '. '

To /uit Word" click the 0estore button on the right side of the title bar.

Word inserts te.t to the right of the insertion point. True #n Word" the default typing mode is insert mode. True When used properly" the Word 7elp system can increase productivity and reduce frustrations by minimi!ing the time spent learning how to use Word.

Completion 6).The DDDDDDDDDDDDDDDDDDDDDDDDD contains buttons that allow you to speak commands and dictate te.t. 61.A 3n5 DDDDDDDDDDDDDDDDDDDDDDDD is a separate window that enables users to carry out some Word tasks more efficiently. 66.A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD contains buttons and bo.es that allow you to perform fre/uent tasks /uickly. 68.The DDDDDDDDDDDDDDDDDDDDDDDDD displays te.t" tables" graphics" and other items as they are typed or inserted in a document. 6;.The DDDDDDDDDDDDDDDDDDDDDDDDD is a blinking vertical bar that indicates where te.t will be inserted as you type.

Note: If you are preparing an examination using your own word processor, for Completion questions - through . you must use the Picture command on the Insert menu to insert igure !"#/%&mp% 'he figure is referenced when students answer the questions% !hen the Insert Picture dialog &ox displays select igure !"#/%&mp from the !ord su&folder in the Printed 'est (an) folder in the 'est (an) * 'est +ngine menu item and ma)e sure the ,in) to file chec) &ox is not chec)ed% 8>.At the top of the document window in the accompanying figure is the DDDDDDDDDDDDDDDDDDDDDDDDD" which is used to set tab stops" indent paragraphs" ad2ust column widths" and change page margins. 81.+n both the vertical and hori!ontal scroll bars in the accompanying figure" the position of the DDDDDDDDDDDDDDDDDDDDDDDDD reflects the location of the portion of the document displaying in the document window. 8 .#n the accompanying figure" the DDDDDDDDDDDDDDDDDDDDDDDDD presents information about the location of the insertion point and the progress of current tasks" as well as the status of certain commands" keys" and buttons. 8&.#n the accompanying figure" DDDDDDDDDDDDDDDDDDDDDDDDD" such as 0@4" T0B" @*T" and +E0" are used to turn certain keys or modes on or off. 8'.When a menu name is clicked on the menu bar" a 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD displays that lists the most recently used commands. 8).A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD lists all the commands associated with a menu. 81.A command with a medium blue shading in the rectangle to its left on a full menu is called a 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD because it does not appear on a short menu. 86.A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD is a short on-screen note associated with the ob2ect to which a user is pointing. 88.The DDDDDDDDDDDDDDDDDDDDDDDDD" which is one of two built-in toolbars" contains the +pen" ,ave" and $rint $review buttons. 8;.When the ,tandard and Aormatting toolbars display on the same row" all of the buttons on either toolbar can be displayed by double-clicking the DDDDDDDDDDDDDDDDDDDDDDDDD on the left edge of each toolbar.

;>.With the DDDDDDDDDDDDDDDDDDDDDDDDD installed and a microphone" the names of toolbar buttons" menus" menu commands" list items" alerts" and dialog bo. controls can be spoken. ;1.When the <anguage bar is in the DDDDDDDDDDDDDDDDDDDDDDDDD state" it is displayed somewhere in the Word window. ; .When the <anguage bar is in the DDDDDDDDDDDDDDDDDDDDDDDDD state" it is displayed on the Windows taskbar. ;&.When the <anguage bar is in the DDDDDDDDDDDDDDDDDDDDDDDDD state" it is hidden permanently until you enable it. ;'.#n Word" the preset" or DDDDDDDDDDDDDDDDDDDDDDDDD" font is Times =ew 0oman. ;).The DDDDDDDDDDDDDDDDDDDDDDDDD displays at the right of the status bar when te.t is entered into a document and shows an animated pencil writing on paper as te.t is typed. ;1.A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD is a character that displays on the screen but is not visible on a printed document. ;6.As more lines of te.t are typed than Word can display in the document window" Word DDDDDDDDDDDDDDDDDDDDDDDDD the top portion of a document upward off the screen. ;8.A saved document is called a 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD. ;;.A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD is a specific location on a disk. 1>>. DDDDDDDDDDDDDDDDDDDDDDDDD is the process of changing the appearance of a paragraph. 1>1. DDDDDDDDDDDDDDDDDDDDDDDDD is the process of changing the way characters appear on the screen and in print. 1> . The DDDDDDDDDDDDDDDDDDDDDDDDD on the @dit menu duplicates your last command so you can perform it again. 1>&. 4lip art is located in the DDDDDDDDDDDDDDDDDDDDDDDDD" which contains a collection of clips" including clip art" as well as photographs" sound" and video clips. 1>'. DDDDDDDDDDDDDDDDDDDDDDDDD includes both reducing and enlarging the si!e of a graphic. 1>). A selected graphic displays surrounded by a 3n5

DDDDDDDDDDDDDDDDDDDDDDDDD" which has small s/uares at each corner and middle location. 1>1. A printed version of a document is called a 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD. 1>6. #n DDDDDDDDDDDDDDDDDDDDDDDDD" as a character is typed Word inserts the character and moves all the characters to the right of the typed character one position to the right. 1>8. #n DDDDDDDDDDDDDDDDDDDDDDDDD" as characters are typed Word replaces characters to the right of the insertion point. 1>;. At any time while using Word" answers to /uestions can be obtained by using the DDDDDDDDDDDDDDDDDDDDDDDDD.

Multiple Choice Note: If you are preparing an examination using your own word processor, for Multiple Choice questions $ and / you must use the Picture command on the Insert menu to insert igure !"#0%&mp% 'he figure is referenced when students answer the question% !hen the Insert Picture dialog &ox displays select igure !"#0%&mp from the !ord su&folder in the Printed 'est (an) folder in the 'est (an) * 'est +ngine menu item and ma)e sure the ,in) to file chec) &ox is not chec)ed% 11>. When using the (<A style" position e.planatory notes either at the DDDDD" as shown in the accompanying figure. a. top of the page as head notes or at the end of the paper as endnotes b. bottom of the page as footnotes or at the end of the paper as endnotes c. top of the page as head notes or at the beginning of the paper as front notes

d. bottom of the page as footnotes or at the beginning of the paper as front notes 111. +n the works cited page" list works by each authorHs last name and DDDDD the title of the work" as shown in the accompanying figure. a. italici!e or underline b. boldface or italici!e c. underline or boldface d. enlarge or underline 11 . Word is preset to use standard 8.)-by-11-inch paper with DDDDD margins. a. 1-inch left" right" top" and bottom b. 1. )-inch left" right" top" and bottom c. 1. )-inch left and right margins and 1-inch top and bottom d. 1-inch left and right margins and 1. )-inch top and bottom

11&. To change margin settings" click DDDDD on the menu bar and then point to the $age ,etup command. a. Aile b. @dit c. Aormat d. Tools 11'. 7eaders and footers can include te.t and graphics" as well as the DDDDD. a. current date b. page number c. current time d. all of the above

11). #nsert %ate" Aormat $age =umber" and #nsert AutoTe.t are buttons on the DDDDD toolbar. a. Aormatting b. 7eader and Aooter c. ,tandard d. @dit
111.
,#I=.

The shortcut keys for the DDDDD character formatting are 4T0<L ,7#ATL $<:, a. case of letters b. underline words" not spaces c. superscript

d. all capital letters 116. To increase a paragraph indent" use the DDDDD shortcut keys. a. 4T0<L< b. 4T0<L@ c. 4T0<L1 d. 4T0<L(

118. @ach time the DDDDD key is pressed" the paragraph formatting in the previous paragraph is carried forward to the ne.t paragraph. A. @=T@0 -. ,7#AT 4. 4T0< %. A<T 11;. Word has a list of predefined typing" spelling" capitali!ation" and grammar errors that DDDDD can detect and correct. a. Auto@ntry b. Auto4orrect c. AutoAdd d. Auto,pell 1 >. To set an e.ception to an Auto4orrect rule" click DDDDD on the menu bar and then click Auto4orrect +ptions to display the Auto4orrect dialog bo.. a. Aormat b. @dit c. Tools d. Eiew 1 1. The (<A style specifies that a superscript be used for a note reference mark to signal an e.planatory note e.ists either at the bottom of the page as a3n5 DDDDD. a. footnote or at the end of the document as a startnote b. headnote or at the end of the document as an endnote c. footnote or at the end of the document as an endnote d. headnote or at the end of the document as a startnote 1 . The formats defined by DDDDD include character formatting" such as the font and font si!eJ paragraph formatting" such as line spacing and te.t alignmentJ table formattingJ and list formatting. a. options

b. styles c. toolbars d. tabs 1 &. The Aootnote Te.t style defines characters as DDDDD. a. 1 -point Times =ew 0oman and paragraphs as single-spaced and rightaligned b. 1>-point Times =ew 0oman and paragraphs as double-spaced and leftaligned c. 1 -point Times =ew 0oman and paragraphs as double-spaced and rightaligned d. 1>-point Times =ew 0oman and paragraphs as single-spaced and leftaligned

1 '. To verify that the note te.t is positioned correctly on the page" switch to DDDDD view or display the document in print preview. a. normal b. print layout c. page layout d. page edit 1 ). To edit note te.t" use the DDDDD at the bottom of the Word window. a. si!ing handle b. footnote te.t window c. ,creenTip d. note pane

1 1. The Word 4ount command on the Tools menu displays the number of words as well as the number of DDDDD in the current document. a. lines b. characters c. paragraphs d. all of the above 1 6. #n normal view" automatic page breaks DDDDD. a. do not display b. display on the screen as a single dotted hori!ontal line c. display on the screen above the header and beneath the footer d. display on the screen as a line separated by the words $age -reak

1 8. Although it is not shown in normal view" to view a header" click DDDDD on the menu bar and then click 7eader and Aooter. a. Eiew b. @dit c. Aormat d. Tools 1 ;. According to the (<A style" the DDDDD is a bibliographical list of sources that are referenced directly in a research paper. a. parenthetical citations page b. works cited page c. e.planatory notes page d. superscript reference page
1&>.

With WordHs Auto4orrect entries" to display an indifferent face 35 type DDDDD. a. M5 b. M3 c. MN d. M? When a hyperlink is created" Word formats the Web address as DDDDD. a. italici!ed and colored red b. italici!ed and colored blue c. underlined and colored red d. underlined and colored blue

1&1.

1& .

To select a block of te.t" click at the beginning of the selection" scroll to the end of the selection" position the mouse pointer at the end of the selection" hold down the DDDDD key" and then click 3or drag through the te.t5.
a.
4T0< -. A<T 4. ,7#AT %. TA-

1&&. With the DDDDD" Word notifies that a smart tag is available by displaying a smart tag indicator on the screen. a. Auto4orrect +ptions and $aste +ptions b. ,mart Tag Actions and 4opy Actions c. Auto4orrect +ptions and ,mart Tag Actions d. $aste +ptions and 4opy Actions

1&'. When the same word is used in multiple locations or a word is used that was not /uite appropriate" a thesaurus can be used to look up a 3n5 DDDDD or a word similar in meaning. a. synonym b. homonym c. antonym d. metronym 'rue1 alse 1 & ). ' 1 & 1. ' 1 & 6. ' 1 & 8. ' 1 & ;. ' Although many different styles of documentation e.ist for report preparation" each style re/uires the same basic information.

To follow the (<A style" single-space te.t on all pages with one and a half-inch top and bottom margins" and one-inch left and right margins.

According to (<A style" on each page of the research paper" precede the page number by the title of the paper.

:sing the (<A style of documentation" the title of the paper is centered one double-space below the writerHs name and course information.

#n the (<A style" notes are used only for optional e.planatory notes.

1 ' >. ' 1 ' 1. ' 1 ' . ' 1 ' &. ' 1 ' '. ' 1 ' ). ' 1 ' 1. '

The (<A style uses the term bibliographical references for works cited.

When the $age ,etup dialog bo. is used to change margin settings" the new margin settings take effect immediately in the document.

When you change the margin settings in the te.t bo.es in the $age ,etup dialog bo." the $review area ad2usts to reflect a changed margin setting.

-y default" Word single-spaces between lines of te.t and automatically ad2usts line height to accommodate various font si!es and graphics.

To apply the most recently set line spacing to the current or selected paragraphs" click the <ine ,pacing button arrow.

:sing the $age =umbers command" you can specify the location and alignment of the page numbers.

To place your name to the left of the page number" as re/uired by the (<A style" you must create a header that contains the page number.

1 ' 6. ' 1 ' 8. ' 1 ' ;. ' 1 ) >. ' 1 ) 1. ' 1 ) . ' 1 ) &. '

When the 7eader and Aooter command on the Eiew menu is clicked" Word switches to normal view" which does not display the document as it will print.

To move a docked toolbar" right-click its move handle and click (ove on the resulting shortcut menu.

7eaders and footers do not display on the screen when the document window is in normal view because they block the te.t.

To use 4lick and Type" you click a blank area of the document window.

The shortcut keys used to left-align a paragraph are 4T0<LA.

The shortcut keys used to center a paragraph are 4T0<L<.

4T0<L-" 4T0<LO"

and 4T0<L: are all shortcut keys for formatting

paragraphs.

1 ) '. ' 1 ) ). ' 1 ) 1. ' 1 ) 6. ' 1 ) 8. ' 1 ) ;. ' 1 1 >. '

To decrease a font si!e" use the 4T0<L,7#ATLP shortcut keys.

To right-align a paragraph" use the 4T0<L0 shortcut keys.

#n addition to a predefined list of Auto4orrect spelling" capitali!ation" and grammar errors" you can create your own Auto4orrect entries to add to the list.

To delete a note" select the note reference mark in the note pane by dragging through the note reference mark" and then click the 4ut button on the ,tandard toolbar.

To count words" click Tools on the menu bar and then click Word 4ount.

A floating toolbar" such as the Word 4ount toolbar" can be moved anywhere on the screen by dragging its title bar.

#f you add te.t" delete te.t" or modify te.t on a page" Word recomputes the position of automatic page breaks and ad2usts them accordingly.

1 1 1. ' 1 1 . ' 1 1 &. ' 1 1 '. ' 1 1 ). ' 1 1 1. ' 1 1 6. '

According to the (<A style" the first line of each entry on the works cited page begins at the left margin.

Word never moves or ad2usts automatic page breaksJ however" Word ad2usts manual page breaks that follow an automatic page break.

The shortcut keys" 4T0<L@=T@0" instruct Word to insert an automatic page break immediately above the insertion point and position the insertion point immediately below the automatic page break.

When you drag the 7anging #ndent marker" the <eft #ndent marker moves with it.

@ach time you press the 4T0< key" Word carries forward the paragraph formatting from the previous paragraph to the ne.t paragraph.

WordHs Auto4orrect entries contain some commonly used symbols" such as a smiling face and a double arrow.

-y clicking a hyperlink in a document window while pressing the A<T key" you 2ump to another document on your computer" on your network" or on the World Wide Web.

1 1 8. ' 1 1 ;. ' 1 6 >. ' 1 6 1. ' 1 6 . ' 1 6 &. ' 1 6 '. '

#n Word" a hyperlink can be created simply by typing the address of the file or Web page to be linked and then pressing the ,$A4@-A0 or the @=T@0 key.

To create a hyperlink to a Web page from a Word document" you must be connected to the #nternet.

The (<A style re/uires that the works cited be listed in alphabetical order by the first character in each work.

#n the ,ort Te.t dialog bo." the default sort order is descending.

Ascending sort order means sorting from the end of the alphabet to the beginning of the alphabet" the largest number to the smallest number" or the most recent date to the earliest date.

%epending on the icon you click on the ,elect -rowse +b2ect menu" the function of the buttons above and below the ,elect -rowse +b2ect button on the vertical scroll bar changes.

To move te.t" you first select the te.t to be moved and then use dragand-drop editing or the cut-and-paste techni/ue to move the selected te.t.

1 6 ). ' 1 6 1. ' 1 6 6. ' 1 6 ;. ' 1 8 1. ' 1 8 &. ' 1 8 ). '

#f you accidentally drag selected te.t to the wrong location" you can click the 0edo button on the ,tandard toolbar to return the te.t to its original location.

To display a smart tag button" you point to the smart tag indicator.

168. 4licking a smart tab button displays a menu that contains commands relative to the action performed at the location of the smart tag.

18>. Cou can display the thesaurus in the 0eference task pane by clicking Thesaurus on the ,ynonyms submenu that displays when you right-click a word for which you want to display a synonym.

18 . To prevent Word from flagging proper names as errors" you can add the names to the custom dictionary.

18'. #f you have multiple custom dictionaries" you can specify which one Word should use when checking spelling.

181.

When you hold down the 4T0< key and click a hyperlink in a document" if you currently are not connected to the Web Word connects you using your default browser.

1 8 6. ' 1 8 ;. ' 1 ; 1. '

188. To send a Word document as an attachment to an e-mail message" click Aile on the menu bar" point to ,end To" and then click (ail 0ecipient 3as Attachment5.

1;>. Arom within Word" you can search through various forms of online reference information.

1; . While plagiarism is unethical" it is not considered an academic crime.

Completion 1;&. The (<A style uses in-te.t DDDDDDDDDDDDDDDDDDDDDDDDD instead of noting each source at the bottom of the page or at the end of the paper. 1;'. The (<A style uses the term DDDDDDDDDDDDDDDDDDDDDDDDD for the bibliographical references. 1;). DDDDDDDDDDDDDDDDDDDDDDDDD is the amount of vertical space between lines of te.t in a document. 1;1. The (<A documentation style re/uires that you DDDDDDDDDDDDDDDDDDDDDDDDD the entire paperJ that is" one blank line should display between each line of te.t. 1;6. A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD is te.t printed at the top of each page in a document.

Note: If you are preparing an examination using your own word processor, for Completion questions - through 2 you must use the Picture command on the Insert menu to insert igure !"#4%&mp% 'he figure is referenced when students answer the questions% !hen the Insert Picture dialog &ox displays, select igure !"#4%&mp from the !ord su&folder in the Printed 'est (an) folder in the 'est (an) * 'est +ngine menu item and ma)e sure the ,in) to ile chec) &ox is not chec)ed% 1;8. #t is possible to DDDDDDDDDDDDDDDDDDDDDDDDD" or attaches" a floating toolbar 3such as the 7eader and Aooter toolbar in the accompanying figure5 above or below the ,tandard and Aormatting toolbars by double-clicking the floating toolbarHs title bar. 1;;. As shown in the accompanying figure" when the 7eader and Aooter command on the Eiew menu is clicked" Word automatically switches to DDDDDDDDDDDDDDDDDDDDDDDDD" which displays the document e.actly as it will print. >>. #n print layout view" as shown in the accompanying figure" DDDDDDDDDDDDDDDDDDDDDDDDD can be used to format and enter te.t" graphics" and other items.
>1.

To save typing" the @=T@0 key can be pressed while a 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD displays" which instructs Word to place the entire te.t of the tip at the location of the typing.

> . When fingers are already on the keyboard" it often is more efficient to use DDDDDDDDDDDDDDDDDDDDDDDDD" or keyboard key combinations" to format te.t as it is typed. >&. Word can be instructed to indent the first line of a paragraph" called DDDDDDDDDDDDDDDDDDDDDDDDD" using the hori!ontal ruler. >'. The DDDDDDDDDDDDDDDDDDDDDDDDD is the top triangle at the >Q mark on the hori!ontal ruler. >). The small s/uare at the >Q mark on the hori!ontal ruler is the DDDDDDDDDDDDDDDDDDDDDDDDD" which can be used to change the entire left margin. >1. Word provides a 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD feature that automatically corrects some typing" spelling" capitali!ation" or grammar errors as they are typed in a document.

>6. When clicked" the DDDDDDDDDDDDDDDDDDDDDDDDD displays a menu that allows a correction to be undone or changes how Word handles future automatic corrections of this type. >8. Word automatically numbers notes se/uentially by placing a 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD in the body of the document and in front of the note te.t. >;. A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD is a named group of formatting characteristics that can be applied to te.t. 1>. The base styles for a new Word document is the DDDDDDDDDDDDDDDDDDDDDDDDD" which for new installation of Word >>& most likely uses 1 -point Times =ew 0oman font for characters and single-spaced" leftaligned paragraphs. 11. As documents that e.ceed one page are typed" Word automatically inserts page breaks" called DDDDDDDDDDDDDDDDDDDDDDDDD" when it determines the te.t has filled one page according to paper si!e" margin settings" line spacing" and other settings. 1 . -ecause page repagination is performed between keystrokes" Word refers to the automatic page break task as DDDDDDDDDDDDDDDDDDDDDDDDD. 1&. -ecause the works cited are to display on a separate numbered page" a 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD must be inserted at a specific location following the body of a research paper. 1'. A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD is a type of paragraph formatting in which the first line e.tends to the left of the rest of the paragraph.
1). 11.

The DDDDDDDDDDDDDDDDDDDDDDDDD is the bottom triangle at the >Q mark on the hori!ontal ruler. #n addition to many commonly misspelled words" WordHs built-in list of DDDDDDDDDDDDDDDDDDDDDDDDD also contains some commonly used symbols" such as when M5 is typed. A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD is a shortcut that allows a user to 2ump to another location in the same document or to other documents or Web pages.

16.

18. DDDDDDDDDDDDDDDDDDDDDDDDD is the process of following a hyperlink to its destination. 1;. #n Word" paragraphs can be arranged in alphabetic" numeric" or date order

based on the first character in each paragraph in a manner called DDDDDDDDDDDDDDDDDDDDDDDDD. >. DDDDDDDDDDDDDDDDDDDDDDDDD means sorting from the end of the alphabet to the beginning of the alphabet" the largest number to the smallest number" or the most recent date to the earliest date. 1. While DDDDDDDDDDDDDDDDDDDDDDDDD" you review a document to look for grammatical errors and spelling errors. . With DDDDDDDDDDDDDDDDDDDDDDDDD" the selected item is dragged to the new location and then inserted" or dropped" there. &. The DDDDDDDDDDDDDDDDDDDDDDDDD is a temporary Windows storage area. '. DDDDDDDDDDDDDDDDDDDDDDDDD is the process of copying an item from the 4lipboard into the document at the location of the insertion point. ). #f you click the DDDDDDDDDDDDDDDDDDDDDDDDD that displays when you drag and drop te.t" a menu displays that allows you to change the format of the te.t that was moved. 1. A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD is a button that automatically appears on the screen when Word performs a certain action. 6. A 3n5 DDDDDDDDDDDDDDDDDDDDDDDDD is a book of synonyms.

Multiple Choice 8. DDDDD are types of wi!ards and templates in the 0esume Wi!ard dialog bo.. a. ,tandard" 4ontemporary" and ,ophisticated b. $rofessional" 4ontemporary" and @legant c. Aormatted" :nformatted" and Iraphic d. -asic" 4omprehensive" and Aormatted DDDDD is a type of resume created by the 0esume Wi!ard. a. @ntry-level b. 4hronological c. Aunctional d. All of the above

;.

&>. The DDDDD in the 0esume Wi!ard dialog bo. indicates the wi!ard is ready to create the document. a. ,tart panel b. Address panel

c. Add?,ort 7eading panel d. Ainish panel &1. To e.it from the 0esume Wi!ard and return to the document window without creating a resume" click the DDDDD button in any panel in the 0esume Wi!ard dialog bo.. a. 4ancel b. -ack c. =e.t d. Ainish & . To display more of the document on the screen in print layout view" the DDDDD can be hidden. a. white space at the top of the pages b. white space at the bottom of the pages c. gray space between pages d. all of the above &&. When you point to the DDDDD corner of a table" the table move handle appears. a. upper-right b. lower-left c. lower-right d. upper-left Note: If you are preparing an examination using your own word processor, for Multiple Choice questions 5 through 3 you must use the Picture command on the Insert menu to insert igure !"#5%&mp% 'he figure is referenced when students answer the questions% !hen the Insert Picture dialog &ox displays, select igure !"#5%&mp from the !ord su&folder in the Printed 'est (an) folder in the 'est (an) * 'est +ngine menu item and ma)e sure the ,in) to ile chec) &ox is not chec)ed% &'. #n the accompanying figure" information about work e.perience can be entered where the 0esume Wi!ard has inserted the words" Rob Title" which is called DDDDD. a. standard te.t b. placeholder te.t c. variable te.t d. formatted te.t

&). A 3n5 DDDDD" like that shown before the degrees listed in the accompanying figure" is a dot or other symbol positioned at the beginning of a paragraph. a. bullet b. logo c. cell d. target &1. A DDDDD is a formatting mark at the end of a line that moves the insertion point to the beginning of the ne.t physical line" as shown after the areas of concentration in the accompanying figure. a. paragraph break character b. nonbreaking space c. line break character d. nonbreaking hyphen &6. $ress DDDDD to create a line break" which advances the insertion point to the beginning of the ne.t physical line S ignoring any paragraph formatting instructions. A. ,7#ATL@=T@0 -. 4T0<L@=T@0 4. ,7#ATLTA%. 4T0<LTA&8. When three hyphens" underscores" e/ual signs" asterisks" or number signs are typed and then the enter key is pressed" the AutoAormat feature DDDDD. a. places a border above a paragraph b. creates a numbered list c. changes the characters to an em dash d. creates a bulleted list &;. A letterhead should contain all of the following @*4@$T DDDD. a. full street address b. logo c. complete legal name of the company" group" or individual d. =one of the above Word" by default" places a tab stop at every DDDDD mark on the ruler. a. . )Q b. .)Q c. .6)Q d. 1Q

'>.

'1.

When a custom tab stop is set" Word DDDDD. a. clears all default tab stops b. clears all default tab stops to the right of the custom tab stop c. clears all default tab stops to the left of the custom tab stop d. does not clear any default tab stops +n the hori!ontal ruler" an upside down T indicates a DDDDD tab stop. a. left-aligned b. right-aligned c. decimal-aligned d. centered

' .

'&. When you point to a te.t entry in the +ffice 4lipboard gallery in the 4lipboard task pane" DDDDD. a. the first several characters of te.t in the item display as a ,creenTip b. the te.t entry is deleted from the +ffice 4lipboard gallery c. the te.t entry is pasted into the document at the location of the insertion point d. all of the above ''. To convert a hyperlink e-mail address to regular te.t" right-click the e-mail address and then click DDDDD on the shortcut menu. a. @dit 7yperlink b. ,elect 7yperlink c. 4onvert 7yperlink d. 0emove 7yperlink '). @ssential business letter elements include the DDDDD. a. date line and inside address b. message c. signature block d. all of the above

'1. #n a business letter" the DDDDD" if present" begins two lines below the last line of the inside address. a. salutation b. date line c. message d. complimentary close

'6. #n a business letter" type the DDDDD at least four lines below the complimentary close" allowing room for the author to sign his or her name. a. inside address b. message c. signature block d. salutation '8. #n the DDDDD letter style" all components of the letter begin flush with the left margin. a. modified block style b. block style c. modified semi-block style d. all of the above ';. $ressing the DDDDD key instructs Word to replace an AutoTe.t entry name with the stored AutoTe.t entry. a. A1
b. c. d.
A A& A'

)>. To advance rightward from one cell to the ne.t in a table" press the DDDDD key. A. TA-. -A4B,$A4@ 4. 7+(@ %. @=T@0 )1. To select multiple cells" rows" or columns in a table that are not ad2acent to one another" select the first cell and then hold down the DDDDD key while selecting the ne.t cell" row" or column. A. A<T -. ,7#AT 4. @=T@0 %. 4T0<
) .

To instruct Word to stop bulleting paragraphs" do any of the following except DDDDD. a. press the @=T@0 key twice b. click the :ndo button on the ,tandard toolbar c. press the -A4B,$A4@ key to remove the bullet

d. click the -ullets button on the Aormatting toolbar True/False A resume allows you to elaborate on positive points in your cover letter. ) &. ' A template asks you several basic /uestions and then" based on your responses" uses a wi!ard to prepare and format a document for you.

) '. '

) ). '

To move from one panel to the ne.t within the 0esume Wi!ardHs dialog bo." click the =e.t button or click the panel name on the left side of the dialog bo..

) 1. '

The ,tandard 7eadings panel in the 0esume Wi!ard dialog bo. re/uests the headings wanted on the resume.

) 6. '

The Add?,ort 7eading panel in the 0esume Wi!ard dialog bo. allows a user to enter any additional headings wanted on the resume.

) 8. '

Word displays the resume created with the 0esume Wi!ard in normal view.

) ;. '

#n normal view" Word places the entire piece of paper in the document window" showing precisely the positioning of the te.t" margins" headers" footers" and footnotes.

1 >. '

When the 0esume Wi!ard prepares a resume" it arranges the body of the resume as a table.

1 1. '

Aormatting marks" such as the end-of-cell mark" do not print on a hard copy.

1 . '

To display gridlines in a table" position the insertion point somewhere in the table" click Table on the menu bar" and then click ,how Table.

1 &. '

When you use a wi!ard to create a document" Word formats the document using styles.

1 '. '

The ,tyle bo. on the Aormatting toolbar displays the name of the style associated with the location of the insertion point or selection.

1 ). '

#f the ,tyle bo. arrow on the Aormatting toolbar is clicked" Word displays the list of styles associated with the current document.

1 1. '

$aragraph styles affect formats of only selected characters" whereas character styles affect formatting of an entire paragraph.

1 6. '

#n the ,tyle list and ,tyles and Aormatting task pane" paragraph style names are followed by an underlined letter a 3a5" and character style names usually are followed by a proofreaderHs paragraph mark 3K5.

1 8. '

#n a bulleted list" each time the @=T@0 key is pressed" a bullet displays at the beginning of the new paragraph.

1 ;. '

To see e.actly how a document will look when it is printed" it can be displayed in print preview.

6 >. '

#n print preview" it is impossible to edit or format te.t" ad2ust margins" view multiple pages" reduce the document to fit on a single page" or print the document.

6 1. '

To open a new document window" click the =ew -lank %ocument button on the ,tandard toolbar.

6 . '

+n the Aont 4olor button arrow" Automatic is the default color" which usually is white.

6 &. '

#n Word" a paragraph can be both left-aligned and right-aligned at the same time.

6 '. '

@ach time the @=T@0 key is pressed" any custom tab stops are carried forward to the ne.t paragraph.

6 ). '

Cou can click the ruler at the right margin location to create a tap stop there.

6 1. '

When a custom tab stop is set" the tab marker on the ruler reflects the alignment of the characters at the location of the tab stop.

6 6. '

When an item is pasted into a document" the contents of the +ffice 4lipboard are erased.

6 8. '

The first item copied always displays at the top of the +ffice 4lipboard gallery.

6 ;. '

@ach time an item is copied to the +ffice 4lipboard" a ,creenTip displays above the +ffice 4lipboard icon in the notification area on the Windows taskbar" indicating the number of entries currently in the +ffice 4lipboard.

8 >. '

When the )th item is copied to the +ffice 4lipboard" Word deletes the last item to make room for the new item.

8 1. '

To paste all the items on the +ffice 4lipboard in a row without any characters in between them" click the 4lear All button in the 4lipboard task pane.

8 . '

-orders may be added above or below a paragraph" to the left or right of a paragraph" or any combination of these sides.

8 &. '

To remove a border from a paragraph" position the insertion point in the paragraph" click the -order button arrow on the Aormatting toolbar" and then click the =o -order button.

8 '. '

When the @=T@0 key or ,$A4@-A0 is pressed after entering an e-mail address or Web address" Word automatically formats the address as a hyperlink" that is" colored blue and underlined.

8 ). '

#n a business letter" the inside address" placed three to eight lines below the date line" usually contains the senderHs title plus full name" business affiliation" and full geographical address.

8 1. '

#n a business letter" within the message paragraphs are double-spaced with single-spacing between paragraphs.

8 6. '

#n a business letter" the complimentary close displays two lines below the last line of the message.

8 8. '

To move a custom tab stop" drag the tab marker to the desired location on the ruler.

8 ;. '

To remove a custom tab stop" right-click the tab marker on the ruler and then click 0emove on the shortcut menu.

,ome compound words should not be divided at the end of a line. ; >. ' The difference between an Auto4orrect entry and an AutoType entry is that the AutoType feature makes corrections automatically as soon as the ,$A4@-A0 or a punctuation key is pressed" whereas the A& key must be pressed or the Auto4orrect command clicked to instruct Word to make an Auto4orrect correction. To ignore an Auto4omplete tip proposed by Word" simply continue typing to remove the Auto4omplete tip from the screen.

; 1. '

; . '

; &. '

@ach row of a table has an end-of-row mark" which can be used to add columns to the left of a table.

; '. '

When at the rightmost cell in a row" press the @=T@0 key to move to the first cell in the ne.t rowJ do not press the TA- key.

; ). '

To delete the contents of a cell" select the cell contents by pointing to the left edge of the cell and clicking when the mouse pointer changes direction" and then press the %@<@T@ key.

; 1. '

The column boundary" the border to the right of a column" can be dragged until a row is at a desired height.

; 6. '

The row boundary" the border at the top of a row" can be dragged until the column is at the desired width.

; 8. '

When you first create a table it is left-alignedJ that is" flush with the left margin.

; ;. ' & > >. '

When the insertion point is in a bulleted list" the -ullets button on the Aormatting toolbar is selected.

To print a mailing label" click the <abels tab in the @nvelopes and <abels dialog bo." type the delivery address in the Address bo." and click the $rint button in the dialog bo..

& > 1. ' & > . '

The smart tag indicator for ,mart Tag Actions is a green triangle.

The commands in the ,mart Tag Actions menu always are the same regardless of the smart tag.

Word >>&

$age 1>8 of 1 1

Completion &>&. A 3n5 DDDDDDDDDDDDDDDDDDDD asks several basic /uestions and then" based on the responses" uses a template to prepare and format a document. &>'. A 3n5 DDDDDDDDDDDDDDDDDDDD is similar to a form with prewritten te.tJ that is" Word prepares the re/uested document with te.t and?or formatting common to all documents of this nature. Note: If you are preparing an examination using your own word processor, for Completion questions 0 and 4 you must use the Picture command on the Insert menu to insert igure !"#-%&mp% 'he figure is referenced when students answer the questions% !hen the Insert Picture dialog &ox displays, select igure !"#-%&mp from the !ord su&folder in the Printed 'est (an) folder in the 'est (an) * 'est +ngine menu item and ma)e sure the ,in) to ile chec) &ox is not chec)ed% &>). A resume can be typed from scratch into a blank document or the DDDDDDDDDDDDDDDDDDDD" shown in the accompanying figure" can be used and Word will format the resume with appropriate headings and spacing. &>1. A wi!ardHs dialog bo." such as that shown in the accompanying figure" displays a list of DDDDDDDDDDDDDDDDDDDD along its left side with the currently selected panel displaying on the right side of the dialog bo.. &>6. :nlike normal view" DDDDDDDDDDDDDDDDDDDD shows an e.act view of the printed page. &>8. A Word DDDDDDDDDDDDDDDDDDDD is a collection of rows and columns. &>;. #n a Word table" the intersection of a row and a column is called a 3n5 DDDDDDDDDDDDDDDDDDDD" and is filled with te.t. &1>. @ach cell in a Word table has a 3n5 DDDDDDDDDDDDDDDDDDDD" which is a formatting mark that assists with selecting and formatting cells. &11. ,ome Word users prefer to show DDDDDDDDDDDDDDDDDDDD" which help identify the rows and columns in a table. &1 . A 3n5 DDDDDDDDDDDDDDDDDDDD is a named group of formatting characteristics that can be applied to te.t. &1&. Through the DDDDDDDDDDDDDDDDDDDD task pane" styles can be viewed" created" and applied. &1'. &1). DDDDDDDDDDDDDDDDDDDD are styles that affect formatting of an entire paragraph. DDDDDDDDDDDDDDDDDDDD are styles that affect formats of only selected characters.

Word >>&

$age 1>; of 1 1

&11. DDDDDDDDDDDDDDDDDDDD are styles that affect alignment and fonts in a numbered or bulleted list. &16. A 3n5 DDDDDDDDDDDDDDDDDDDD is a list of paragraphs that each begin with a dot or other symbol. &18. DDDDDDDDDDDDDDDDDDDD displays an entire document on reduced side on the Word screen.
&1;. & >.

A 3n5 DDDDDDDDDDDDDDDDDDDD is a location on the hori!ontal ruler that tells Word where to position the insertion point when the TA- key is pressed. When the TA- key is pressed" a3n5 DDDDDDDDDDDDDDDDDDDD formatting mark appears in the empty space between tab stops.

& 1. The DDDDDDDDDDDDDDDDDDDD is a temporary storage area that can hold up to ' items 3te.t or graphics5 copied from any +ffice application. & . +ffice 4lipboard allows users to copy" or DDDDDDDDDDDDDDDDDDDD" items and then pastes them in a new location.

& &. DDDDDDDDDDDDDDDDDDDD is the process of copying an item from the +ffice 4lipboard into a document at the location of the insertion point. & '. #n Word" a solid line" called a 3n5 DDDDDDDDDDDDDDDDDDDD" can be drawn at any edge of a paragraph. & ). #n Word the term DDDDDDDDDDDDDDDDDDDD refers to returning the formatting to the =ormal style. & 1. #n a business letter" the DDDDDDDDDDDDDDDDDDDD" which consists of the month" day" and year" is positioned two to si. lines below the letterhead. & 6. #f the same te.t is used fre/uently" the te.t can be stored in a 3n5 DDDDDDDDDDDDDDDDDDDD and then the stored entry can be used throughout the open document" as well as in future documents.
& 8.

$ress 4T0<L,7#ATL,$A4@-A0 to enter a3n5 DDDDDDDDDDDDDDDDDDDD" which is a special space character that prevents two words from splitting if the first word falls at the end of a line. $ress 4T0<L,7#ATL7C$7@= to enter a 3n5 DDDDDDDDDDDDDDDDDDDD" which is a special type of hyphen that prevents two words separated by a hyphen from splitting at the end of a line.

& ;.

&&>. As characters are typed" Word searches the list of AutoTe.t entry names and if one matches the typing" displays its complete name above the typing as a 3n5

Word >>&

$age 11> of 1 1

DDDDDDDDDDDDDDDDDDDD. &&1. When inserting a table" the total number of rows and columns re/uired must be specified" which is called the DDDDDDDDDDDDDDDDDDDD of the table? && . Cou can drag a 3n5 DDDDDDDDDDDDDDDDDDDD" which is the border to the right of a column" until the column is the desired width. &&&. Cou can drag a 3n5 DDDDDDDDDDDDDDDDDDDD" which is the border at the bottom of a row" until the row is the desired height. &&'. An entire table can be resi!ed by dragging the DDDDDDDDDDDDDDDDDDDD" which is a small s/uare that displays when pointing to the bottom-right corner of a table. &&). A 3n5 DDDDDDDDDDDDDDDDDDDD is a button that automatically appears on the screen when Word performs a certain action. &&1. #n addition to the Auto4orrect +ptions and $aste +ptions smart tags" a third type of smart tag" called DDDDDDDDDDDDDDDDDDDD" performs various functions depending on the ob2ect identified by the smart tag indicator. &&6. To help locate documents at a later time" additional information about the document" called DDDDDDDDDDDDDDDDDDDD" can be stored when the document is saved. Multiple Choice &&8. Word has Web authoring tools allow you to incorporate DDDDD on Web pages. a. bullets b. hyperlinks c. sounds d. all of the above Word stores all frames associated with a Web page in a single file called the DDDDD. a. authoring page b. te.t page c. frames page d. hyperlink page

&&;.

&'>. When you save a file as a Web page" Word converts the contents of the document into DDDDD. a. Rava b. $erl c. 7T(< d. :ni.

Word >>&

$age 111 of 1 1

&'1. The DDDDD saves the file in Web $age format and then reduces the si!e of the file by removing specific (icrosoft +ffice formats. a. compressed Web $age format b. archival Web $age format c. single Web $age format d. filtered Web $age format &' . A DDDDD is a collection of predefined design elements and color schemes. a. feature b. hyperlink c. palette d. theme

True/False & ' &. ' & ' ). ' & ' 6. ' & ' ;. ' &''. Word provides three different techni/ues for creating Web pages.

&'1. Applying a theme is the process of making Web pages available to others" on the World Wide Web or on a companyHs intranet" for e.ample.

&'8. The ,ave as Web $age command" by default" saves the document in a format called filtered Web page.

&)>. The Web $age format saves a Web page in a file and some of its components in a folder.

Word >>&

$age 11 of 1 1 &) .

& ) 1. ' & ) &. ' & ) ). ' & ) 6. ' & ) ;. ' & 1 1. '

To test an e-mail hyperlink" you can ,7#ATLclick the mouse while pointing to the hyperlink.

&)'. -y using themes" you easily can make Web pages and other online documents consistent with one another.

&)1. #n Word" you cannot see how a Web page looks in the browser unless you publish it and connect to the #nternet.

&)8. When a frames page is divided into two frames" a frame border separates the frames.

&1>. When you point to and drag a frame border" the mouse pointer shape changes to a single-headed arrow.

&1 . #f you want to alter an e.isting hyperlink" you right-click the hyperlink te.t and then click @dit 7yperlink on the shortcut menu.

chapter 9

Managing Multi-User Databases

Word >>&

$age 11& of 1 1

True-False Questions
&1&. %atabase administration tasks have to be performed for single-user" personal databases. Answer: True Level: hard Page: 300 %atabase administration is more important but less difficult in multi-user database systems than in single-user database systems. Answer: False Level: moderate Page: 300 #n general" the overall responsibility of the %-A is to facilitate the development and use of the database system. Answer: True Level: easy Page: 30 The %-A has to find a balance between the conflicting goals of ma.imi!ing availability of the database to users and protecting the database. Answer: True Level: moderate Page: 30 The %-A is responsible for managing changes to the database structure" but is rarely involved in the original design of the structure. Answer: False Level: moderate Page: 30 4hanges in the database structure usually involve only one application. Answer: False Level: hard Page: 30 +ne important reason for documenting changes to the database structure is for diagnosing errors. Answer: True Level: easy Page: 30 4oncurrency control measures are taken to ensure that one userHs work has absolutely no influence on another userHs work. Answer: False Level: moderate Page: 30!

&1'.

&1).

&11.

&16.

&18.

&1;.

&6>.

Word >>&
&61

$age 11' of 1 1

A transaction is a group of alternative database actions from which the database can choose to perform only one of them. Answer: False Level: easy Page: 303 T0esource lockingU is one remedy to the lost update problem. Answer: True Level: moderate Page: 30" T@.plicit locksU are locks that are placed automatically by the %-(,. Answer: False Level: easy Page: 30# <ocks with large granularity are easy for the %-(, to administer but fre/uently cause conflicts. Answer: True Level: moderate Page: 30# #n general" the boundaries of a transaction should correspond to the boundaries of the database view it is processing. Answer: True Level: hard Page: 30$ 0esource locking must be carefully planned because most %-(, products cannot detect a deadlock condition. Answer: False Level: moderate Page: 30% 0esources are locked for a shorter amount of time with pessimistic locking because the transaction is pre-processed. Answer: False Level: easy Page: 30% #n general" optimistic locking is the preferred techni/ue for #nternet databases. Answer: True Level: hard Page: 30% A Qdirty readQ happens when one transaction reads a changed record that has not been committed to the database. Answer: True Level: hard Page: 3 ! T0epeatable 0eadsU isolation is the most restrictive level of isolation. Answer: False Level: moderate Page: 3 ! The goal of database security is to ensure that only authori!ed users can perform authori!ed activities at authori!ed times. Answer: True Level: easy Page: 30&

&6 .

&6&.

&6'.

&6).

&61.

&68.

&6;.

&8>.

&81.

&8 .

Word >>&
&8&.

$age 11) of 1 1

#n regard to database security" neither the %-(, nor the database applications can enforce processing responsibilities. Answer: True Level: moderate Page: 30' $rocessing responsibilities should be documented and encoded into manual procedures. Answer: True Level: easy Page: 30' $rocessing rights may be implemented at the %-(, level. Answer: True Level: easy Page: 30' All commercial %-(, products use some version of Tusername and passwordU as part of their security features. Answer: True Level: easy Page: 3 " The security provided by the %-(, often has to be augmented by additional security features within the application program. Answer: True Level: moderate Page: 3 % A Tdatabase saveU is used to mark the end of a transaction. Answer: False Level: moderate Page: 3!0 0eprocessing is normally the most convenient method for recovery after a system failure. Answer: False Level: easy Page: 3!0 0ollforward and reprocessing are two different names for the same techni/ue. Answer: False Level: hard Page: 3!0 -oth rollforward and rollback re/uire the use of a log of transaction results. Answer: True Level: easy Page: 3!0 The %-A should periodically analy!e run-time statistics of database performance to help manage the %-(,. Answer: True Level: easy Page: 3!3 A passive repository is preferred over an active repository because it re/uires less human intervention. Answer: False Level: moderate Page: 3!&

&8'.

&8).

&81.

&86.

&88.

&8;.

&;>.

&;1.

&; .

&;&.

Word >>&

$age 111 of 1 1

Multiple Choice Questions


&;'. Which of the following is not a database administration responsibility of a %-A? a.5 managing the database structure b.5 managing data activity c.5 managing the %-(, d.5 maintaining the data repository e%4 5ll of the a&o6e are data&ase administration responsi&ilities of a "(5%

Level: easy Page: 300-30 ()ee Figure %- * & . Which of the following is true about making changes to the database structure? a.5 The %-A need not get input from users on the issue because it is a technical decision. b.5 Aormal policies and procedures for re/uesting a change are not used because they are too limiting. c%4 "ocumentation of when the change was made, how it was made, and why it was made must &e created% d.5 4hanges do not produce une.pected results because the %-A will have investigated the change thoroughly before implementing it. e.5 #f the database is properly designed" changes should not be necessary throughout the systemHs lifetime.

Level: hard Page: 30 &&. The task of diagnosing errors due to changes in the database structure is eased byM a.5 formal policies for re/uesting changes. &%4 data&ase structure change documentation% c.5 rollback analysis. d.5 configuration control. e.5 =one of the above.

Level: moderate Page: 30 -30! &'. (easures that are taken to prevent one userHs work from inappropriately influencing another userHs work are calledM a%4 concurrency control% b.5 checkpoint. c.5 database recovery. d.5 database logging. e.5 interleaving.

Level: easy Page: 30!

Word >>&
&).

$age 116 of 1 1

A series of actions to be taken on the database such that either all actions are completed successfully" or none of them can be completed" is known as a3n5M a.5 checkpoint. b.5 log. c.5 lock. d%4 transaction% e.5 concurrent.

Level: easy Page: 303 &1. When two transactions are being processed against the database at the same time" a.5 they are called concurrent transactions. b.5 they are usually interleaved. c.5 they always result in a lost update problem. d.5 one must be rolled back. e%4 &oth a and &

Level: easy Page: 303 &6. The situation that occurs when one userHs changes to the database are lost by a second userHs changes to the database is known as theM a%4 concurrent update pro&lem% b.5 deadly embrace problem. c.5 inconsistent read problem. d.5 inconsistent write problem. e.5 deadlock problem.

Level: hard Page: 303-30" &8. +ne remedy for the inconsistencies caused by concurrent processing is DDDDDDDDDDDDD. a.5 lost updates b.5 checkpointing c.5 rollback d%4 resource loc)ing e.5 concurrency

Level: easy Page: 30"

Word >>&
&;. A lock placed automatically by the %-(, is called a3n5 DDDDDDDDDDD lock. a.5 e.clusive b.5 e.plicit c.5 granular d%4 implicit e.5 shared

$age 118 of 1 1

Level: moderate Page: 30# '>. Which of the following is not true about locks? a.5 <ocks with large granularity are easier for the %-(, to administer. &%4 ,oc)s with small granularity cause more conflicts% c.5 <ocks with large granularity produce fewer details for the %-(, to track. d.5 <ocks may have a table-level granularity. e.5 <ocks may have a database-level granularity.

Level: hard Page: 30# '1. Which type of lock prevents all types of access to the locked resource? a%4 exclusi6e loc) b.5 shared lock c.5 two-phased lock d.5 e.plicit lock e.5 implicit lock

Level: easy Page: 30# ' . Which type of lock still allows other transactions to have read-only access to the locked resource? a.5 e.clusive lock &%4 shared loc) c.5 two-phased lock d.5 e.plicit lock e.5 implicit lock

Level: easy Page: 30#

Word >>&
'&. Which of the following is not true about two-phased locking? a.5 can make transactions seriali!able &%4 uses only shared loc)s c.5 has a growing phase d.5 has a shrinking phase e.5 cannot obtain a new lock once a lock has been released

$age 11; of 1 1

Level: hard Page: 30#-30$ ''. The situation that occurs when two users are each waiting for a resource that the other person has locked is known as a3n5M a.5 lost update problem. &%4 deadloc)% c.5 inconsistent read problem. d.5 inconsistent write problem. e.5 checkpoint.

Level: moderate Page: 30$ '). 0e/uiring all application programs to lock resources in the same order is a techni/ue for preventing what problem? a.5 concurrent update b.5 lost update c%4 deadloc) d.5 e.clusive locks e.5 growing phase locking

Level: hard Page: 30$ '1. <ocks that are placed assuming that a conflict will occur are calledM a.5 dynamic locks. b.5 e.plicit locks. c.5 implicit locks. d.5 optimistic locks. e%4 pessimistic loc)s%

Level: moderate Page: 30%

Word >>&
'6. <ocks that are placed assuming that a conflict will not occur are calledM a.5 dynamic. b.5 e.plicit. c.5 implicit. d%4 optimistic% e.5 pessimistic.

$age 1 > of 1 1

Level: moderate Page: 30% '8. @nsuring that all rows impacted by the actions of a transaction are protected from changes until the entire transaction is completed is calledM a.5 statement level consistency. b.5 optimistic locking. c%4 transaction le6el consistency% d.5 durable transactions. e.5 A0#% transactions.

Level: hard Page: 3 ! ';. Which of the following is allowed by T0epeatable 0ead #solation?U a.5 nonrepeatable reads b.5 dirty reads c%4 phantom reads d.5 a and b e.5 a" b and c

Level: hard Page: 3 !-3 3 ()ee Figure %- 0* )>. Which of the following is true of forward only cursors? a.5 4urrent values for each row are retrieved when the application accesses a row. b.5 All changes of any type from any source are visible. c%4 Changes made &y the transaction are 6isi&le only if they occur on rows ahead of the cursor% d.5 Applications may scroll backward in the record set. e.5 #t re/uires the greatest overhead of any cursor type.

Level: moderate Page: 3 3-3 & ()ee Figure %- *

Word >>&
)1.

$age 1 1 of 1 1

Which of the following cannot be enforced in the %-(, or application programs? a.5 processing rights b.5 security c%4 processing responsi&ilities d.5 cursors e.5 transaction isolation

Level: moderate Page: 3 ' ) . +nce processing rights have been defined" they may be implemented at any of these levels e.ceptM a.5 network. b.5 operating system. c%4 data% d.5 %-(,. e.5 application.

Level: hard Page: 3 ' )&. Which of the following is not true of %-(, security features? a.5 :sers may be assigned to one or more roles. &%4 5 role may &e assigned to only one user% c.5 -oth users and roles can have many permissions. d.5 +b2ects have many permissions. e.5 @ach permission pertains to one user or role and one ob2ect.

Level: moderate Page: 3 " )'. 0ecovering a database via reprocessing involvesM a%4 restoring the data&ase from the sa6e and reprocessing all the transactions since the sa6e% b.5 restoring the database from the save and reapplying all the changes made by transactions since the save. c.5 undoing the changes made by erroneous or partially processed transactions" and restarting the valid transactions that were in process at the time of the failure. d.5 recreating the database by reentering all of the data from the beginning" and then reprocessing all of the transactions. e.5 synchroni!ing the database and the transaction log by checkpointing.

Level: easy Page: 3!0

Word >>&
)).

$age 1

of 1 1

0ecovering a database via rollforward involvesM a.5 restoring the database from the save and reprocessing all the transactions since the save. &%4 restoring the data&ase from the sa6e and reapplying all the changes made &y transactions since the sa6e% c.5 undoing the changes made by erroneous or partially processed transactions" and restarting the valid transactions that were in process at the time of the failure. d.5 re-creating the database by re-entering all of the data from the beginning" and then reprocessing all of the transactions. e.5 synchroni!ing the database and the transaction log by checkpointing.

Level: easy Page: 3!0 )1. 0ecovering a database via rollback involvesM a.5 restoring the database from the save and reprocessing all the transactions since the save. b.5 restoring the database from the save and reapplying all the changes made by transactions since the save. c%4 undoing the changes made &y erroneous or partially processed transactions, and restarting the 6alid transactions that were in process at the time of the failure% d.5 re-creating the database by re-entering all of the data from the beginning and" then reprocessing all of the transactions. e.5 synchroni!ing the database and the transaction log by checkpointing.

Level: easy Page: 3!0 )6. Which of the following would not be contained in a transaction log? a.5 before-images b.5 type of operation c.5 pointers d.5 time of the action e%4 permissions

Level: moderate Page: 3!0 )8. Which of the following would a %-A do in managing the %-(,? a.5 analy!e system performance statistics b.5 investigate user complaints c.5 evaluate new %-(, product features d.5 tune %-(, product options to accommodate other software in use e%4 5ll of the a&o6e%

Level: easy Page: 3!3

Word >>&
);.

$age 1 & of 1 1

Which of the following is not true of data repositories? a%4 'hey are usually created after the data&ase has &een implemented and optimi7ed for performance% b.5 They may be virtual. c.5 They may contain metadata about database applications. d.5 They may contain metadata about users. e.5 They may contain metadata about web pages.

Level: moderate Page: 3!& 1>. Which type of data repository is composed of metadata that is created automatically as the system components are created? a.5 passive b.5 dynamic c%4 acti6e d.5 automatic e.5 summary

Level: moderate Page: 3!&

Fill in the Blank Questions


11. The overall responsibility of the use of the database. Level: easy Page: 30 D+, is to facilitate the development and

1 . The database is most vulnerable to failure after a change to its Level: hard Page: 30 1&.

structure .

A3n5 transaction is a series of actions to be taken on the database such that either all of them are performed successfully or none of them is performed at all. Level: easy Page: 303 1'. A transaction is sometimes called Level: easy Page: 303 atomic " since it is performed as a unit.

1). <ocks placed automatically by the %-(, are called Level: moderate Page: 30#

implicit

locks.

Word >>&
11. <ocks placed by a command issued to the %-(, from the application program are called explicit locks. Level: moderate Page: 30# 16. The si!e of a lock is referred to as the lock Level: hard Page: 30# 18. A3n5 Level: easy Page: 30# 1;. A3n5 Level: easy Page: 30# exclusive granularity .

$age 1 ' of 1 1

lock locks the item from access of any type.

shared

lock locks the item from change but not from read access.

6>. Two-phased locking is a scheme for achieving Level: hard Page: 30#

seriali-ability

of transactions.

61. #n two-phase locking" all locks are obtained during the Level: moderate Page: 30$ 6 . #n two-phase locking" all locks are released during the Level: moderate Page: 30$ 6&.

growing

phase.

shrin.ing

phase.

0e/uiring all application programs to lock resources in the same order is one way of preventing a deadloc. condition. Level: hard Page: 30$ 6'. With Level: easy Page: 30% 6). With Level: easy Page: 30% 61. optimistic locking" the assumption is made that no conflict will occur.

pessimistic

locking" the assumption is made that a conflict will occur.

The transaction boundaries are the essential information that the %-(, needs from the application programs to enforce different locking strategies. Level: hard Page: 30%-3 0

Word >>&
66. A3n5 Level: hard Page: 3 68. durable

$age 1 ) of 1 1
transaction is one for which all committed changes are permanent.

Transaction level consistency means that all rows impacted by any actions in a transaction are protected from change during the entire transaction. Level: moderate Page: 3 ! 6;. A3n5 dirty read database. Level: hard Page: 3 ! 8>. occurs when one transaction reads a changed record that has not been committed to the

/onrepeatable reads occur when a transaction rereads data it has previously read and finds modifications or deletions caused by a committed transaction. Level: hard Page: 3 ! 81. According to A=,# ,9<" the nonrepeatable reads. Level: hard Page: 3 ! 8 . A3n5 static Level: moderate Page: 3 3 8&. seriali-able isolation level will not allow phantom reads" dirty reads" and

cursor processes a snapshot of the relation that was taken when the cursor was opened.

A3n5 .eyset cursor saves primary key values when the cursor is opened and retrieves the values for each row as the application program accesses it. Level: moderate Page: 3 3 8'. 0oll1orward is a method of database recovery that restores the database save and all valid transactions since the save was reapplied. Level: easy Page: 3!0 8). To support rollforward and rollback recovery" transactions must be written to a3n5 log before they are applied to the database. Level: easy Page: 3!0 81. 4opies of each database record or page before it was changed by a transaction that are saved for use in database recovery are called be1ore-images . Level: easy Page: 3!0

Word >>&
86.

$age 1 1 of 1 1

4opies of each database record or page after it was changed by a transaction that are saved for use in database recovery are called a1ter-images . Level: easy Page: 3!0 88. A3n5 chec.point Level: moderate Page: 3!! 8;. is a point of synchroni!ation between the database and the transaction log.

A3n5 active data repository is one in which the metadata is automatically created as the system components are created. Level: easy Page: 3!& ;>. A3n5 passive data repository is one which re/uires a person to generate the metadata and place it in the repository. Level: easy Page: 3!&

Essa Questions
;1. @.plain the importance of documenting changes in database structure. 2hanges in database structure may introduce errors that do not become apparent 1or long periods o1 time3 Documentation provides a record o1 changes to assist the investigation into the cause o1 database errors3 Further4 documentation o1 database changes can be used to determine the structure o1 the database at some point in the past3 This is necessary 1or proper interpretation o1 any historical records that may need to be retrieved3 Finally4 documentation can assist in recovering the database 1rom a previous copy in case o1 database 1ailure3 /ot only do transactions have to be restored to the recovered database4 but also any structural changes since the bac.up was created will have to be reapplied3 ; . @.plain the concept of seriali!able transactions. 2oncurrent transactions are two or more transactions that are processed against the database at the same time3 It is desirable 1or concurrent transactions to be seriali-able5 that is4 the results o1 the concurrent transactions should be logically consistent with the results that would be obtained i1 the transactions were not processed concurrently but rather in an arbitrary serial order3 ;&. Which are more commonly used S implicit or e.plicit locks? Why? Implicit loc.s are more commonly used than explicit loc.s3 2oncurrency control involves many complex 1actors that in1luence the per1ormance o1 the system3 The impact o1 some o1 these 1actors can only be determined through trial and error3 2hanging explicit loc.s to tune system per1ormance can re6uire ma.ing changes throughout the program code to obtain and release loc.s at various places in the transactions3 Implicit loc.s are much easier to change since a loc.ing strategy can be speci1ied in a system parameter or loc. declaration area and then the D+M) will place the loc.s implicitly wherever they are needed to implement that strategy3

Word >>&
;'. %istinguish among the four cursor types.

$age 1 6 of 1 1

Forward only cursors are the simplest type o1 cursor4 and only allow the application program to move 1orward through the record set3 The three other types o1 cursors are all scrollable cursors4 meaning that the application program can move 1orward and bac.ward through the record set3 )tatic cursors ta.e a snapshot o1 the relation at the point in time when the cursor was opened3 7eyset cursors save a copy o1 the primary .ey value 1or each record in the cursor3 This .ey value is then used to retrieve the values o1 each record as the application program accesses that record3 Dynamic cursors are 1ully 1unctional cursors and can see any changes made to the records by any committed transactions3 ;). @.plain the purpose of transaction logs and checkpoints. Transaction logs are created to 1acilitate the recovery o1 the database3 ,ll transactions that ma.e changes to the database are recorded in the transaction log be1ore they are applied to the database3 In the event that the database 1ails4 the transactions in the log can be used to undo changes made by transactions that were not committed4 and to redo changes that were committed since the database was last saved3 2hec.points are used in con8unction with transaction logs3 , chec.point is a mar.er 1or when the last time the database and the transaction log were synchroni-ed3 I1 the database must be restored4 only a1ter-images 1or transactions that began a1ter the last chec.point have to be applied3

C85P'+9 $$: (+8IN" '8+ :C+N+:: "5'5(5:+: 5N" IN ;9M5'I;N :<:'+M:


Multiple Choice:
1. Which of the following is a reason for creating a list instead of creating a database? a. to prevent data inconsistency b. to prevent data redundancy c. to make it easier to share data in a central location d. to organi!e data for simple tasks 5nswer: % 9eference: <ife Without %atabases "ifficulty: @asy . Which of the following is =+T an effect of data redundancy in a database? e. increased loss of data f. wasted time entering data g. increased likelihood of a mistake h. inconsistent data 5nswer: A 9eference: <ife Without %atabases "ifficulty: (oderate &. When data changes in multiple lists and all lists are not updated" this causesM

Word >>& i. data redundancy. 2. information overload. k. duplicate data. l. data inconsistency. 5nswer: % 9eference: <ife Without %atabases

$age 1 8 of 1 1

"ifficulty: 4hallenging

'. DDDDDDDDDDDD means that the data contained in a database is accurate and reliable. m. %ata redundancy n. %ata integrity o. %ata reliability p. %ata consistency 5nswer: - 9eference: Advantages of :sing %atabases ). All of the following are advantages of using a database" @*4@$TM /. data redundancy. r. data integrity. s. fle.ible use of data. t. information sharing. 5nswer: A 9eference: Advantages of :sing %atabases 1. #n a database" a field is aM u. label. v. table of information. w. group of related records. .. category of information. 5nswer: % 9eference: Aields 6. @ach field in a database is identified by aM y. field name. !. key name. "ifficulty: (oderate "ifficulty: @asy "ifficulty: (oderate

Word >>& aa. field type. bb. field code. 5nswer: A 9eference: Aields

$age 1 ; of 1 1

"ifficulty: @asy

8. #n a database" DDDDDDDDDDDD fields store numbers used to perform calculations. cc. ne.t dd. numeric ee. key ff. alphanumeric 5nswer: - 9eference: Aields "ifficulty: @asy ;. A telephone number would be stored in aDDDDDDDDDDDD field in a database. gg. te.t hh. memo ii. computed 22. date 5nswer: A 9eference: -its And -ytesM When a =umber #snHt 0eally a =umber 1>. A picture would be stored in a3n5DDDDDDDDDDDD field in a database. kk. te.t ll. memo mm. ob2ect "ifficulty: (oderate

nn. hyperlink 5nswer: 4 9eference: Aields "ifficulty: (oderate 11. To record a personHs last name" use a3n5 DDDDDDDDDDDD field in a database. oo. memo pp. ob2ect //. name rr. te.t 5nswer: % 9eference: Aields "ifficulty: @asy

Word >>&

$age 1&> of 1 1

1 . To store te.t data that may be very long" use a DDDDDDDDDDDD field in a database. ss. memo tt. te.t uu. data vv. long 5nswer: A 9eference: Aields 1&. A group of related fields in a database is called a3n5M ww. record. "ifficulty: @asy

... ob2ect. yy. memo. !!. table. 5nswer: A 9eference: 0ecords and Tables 1'. A group of related records in a database is called a3n5M aaa. bbb. ccc. ddd. column. ob2ect. key. table. "ifficulty: @asy "ifficulty: @asy

5nswer: % 9eference: 0ecords and Tables 1). The purpose of the primary key in a database is toM eee. unlock the database.

fff. uni/uely identify a record. ggg. hhh. 5nswer: provide a map of the data. establish constraints on database operations. "ifficulty: (oderate

9eference: $rimary Beys

11. A good candidate for a primary key in a database would be a3n5M iii. last name.

Word >>& 222. birthdate. kkk. employee position title.

$age 1&1 of 1 1

lll. student identification number. 5nswer: % 9eference: $rimary Beys 16. All of the following are types of databases" @*4@$TM mmm. relational. nnn. ooo. ppp. relation-oriented. ob2ect-oriented. multidimensional. "ifficulty: (oderate

5nswer: - 9eference: %atabase Types "ifficulty: 4hallenging 18. A relational database organi!es data by logically grouping similar data into DDDDDDDDDDDD" or tables that contain related data. ///. keys

rrr. relations sss.fields ttt. records 5nswer: - 9eference: 0elational %atabases "ifficulty: (oderate 1;. #n a relational database" tables are logically linked to each other by aM uuu. vvv. key. hyperlink.

www. field type. .... 5nswer: A field si!e. "ifficulty: (oderate

9eference: 0elational %atabases

Word >>& >. A3n5 DDDDDDDDDDDD database stores data in ob2ects" not in tables. yyy. !!!. ob2ect-oriented relational

$age 1& of 1 1

aaaa. multidimensional bbbb. ob2ect-relational 5nswer: A 9eference: +b2ect-+riented %atabases "ifficulty: 4hallenging 1. Which of the following statements concerning ob2ect-oriented databases is AA<,@? cccc. +b2ects in an ob2ect-oriented database contain not only data but also methods for processing the data. dddd. +b2ect-oriented databases store computational instructions in the same place as the data. eeee. +b2ect-oriented databases are more adept at handling structured 3analytical5 data than relational databases. ffff. +b2ect-oriented databases store more types of data than relational databases and access that data faster. 5nswer: 4 9eference: +b2ect-+riented %atabases "ifficulty: 4hallenging . Which of the following would =+T ordinarily be considered unstructured data? gggg. te.t hhhh. video iiii. audio clips 2222. ($& files 5nswer: A 9eference: +b2ect-+riented %atabases &. +racle 1>g is an e.ample of a3n5M kkkk. relational database. llll. ob2ect-oriented database. mmmm. multidimensional database. "ifficulty: 4hallenging

nnnn. Web-based database. 5nswer: 4 9eference: (ultidimensional %atabases "ifficulty: (oderate

'. Which of the following is =+T one of the four main functions of a database management system 3%-(,5? oooo. creating databases and entering data

Word >>& pppp. viewing and inde.ing data ////. /uerying data rrrr. programming data

$age 1&& of 1 1

5nswer: % 9eference: %atabase (anagement ,ystemsM -asic +perations "ifficulty: (oderate ). The DDDDDDDDDDDD contains data descriptions and defines the name" data type" and length of each field in the database. ssss. data dictionary

tttt. data table uuuu. data record vvvv. data field 5nswer: A 9eference: 4reating %atabases and @ntering %ata 1. Another name for the data dictionary in a database is theM wwww. validation data. "ifficulty: (oderate

..... relational data. yyyy. database management system. !!!!. database schema. 5nswer: % 9eference: 4reating %atabases and @ntering %ata "ifficulty: 4hallenging 6. Aield attributes 3such as data type and field si!e5 in a database are also known asM aaaaa. metadata. bbbbb. default values. ccccc. field names. ddddd. primary keys. 5nswer: A 9eference: 4reating %atabases and @ntering %ata "ifficulty: (oderate

8. When entering data" violations of DDDDDDDDDDDD usually result in error messages. eeeee. data entry fffff. validation rules

ggggg. arithmetic operators

Word >>& hhhhh. computation

$age 1&' of 1 1

5nswer: - 9eference: %ata Ealidation "ifficulty: (oderate ;. DDDDDDDDDDDD are the values the database will automatically use for the field unless the user enters another value. iiiii. 22222. %ata types %efault values

kkkkk. Ealidated data lllll. (etadata

5nswer: - 9eference: 4reating %atabases and @ntering %ata "ifficulty: (oderate &>. 4ommon types of validation checks include all of the following" @*4@$TM mmmmm. range. nnnnn. completeness. ooooo. redundancy. ppppp. consistency. 5nswer: A 9eference: %ata Ealidation "ifficulty: 4hallenging &1. 0ange checks ensure that the data entered falls within the set DDDDDDDDDDDD" which are properties that must be satisfied for an entry to be accepted into a field. /////. field constraints rrrrr. default values

sssss. validations ttttt. 5nswer: descriptions "ifficulty: 4hallenging

9eference: %ata Ealidation

& . #n addition to keying data directly into the database" data entry can be done from a3n5M uuuuu. input form. vvvvv. table. wwwww. field. ...... data dictionary. 5nswer: A 9eference: #nput Aorms "ifficulty: @asy

Word >>& $age 1&) of 1 1 &&. DDDDDDDDDDDD is the process within the database design of ensuring that data entered into a database meets validation rules. yyyyy. $roofreading !!!!!. Authori!ation aaaaaa.Ealidation bbbbbb. 4omputation

5nswer: 4 9eference: %ata Ealidation "ifficulty: (oderate &'. The phrase TG).)> And P >U is an e.ample of a3n5 DDDDDDDDDDDD check to validate data in a database. cccccc.re/uirements dddddd. completeness

eeeeee.range ffffff. insurance 5nswer: 4 9eference: %ata Ealidation "ifficulty: (oderate &). A3n5 DDDDDDDDDDDD check confirms that only te.t characters are entered in a field. gggggg. hhhhhh. iiiiii. 222222. 5nswer: A alphabetic numeric

completeness range "ifficulty: @asy

9eference: %ata Ealidation

&1. A3n5 DDDDDDDDDDDD check ensures that all fields in a database defined as Tre/uiredU have data entered into them. kkkkkk. llllll. re/uirements

completeness consistency

mmmmmm. nnnnnn.

alphabetic and numeric

5nswer: - 9eference: %ata Ealidation "ifficulty: (oderate &6. A DDDDDDDDDDDD check compares the values of data in two or more fields to see if these values are reasonable.

Word >>& oooooo. pppppp. //////. constraint completeness consistency

$age 1&1 of 1 1

rrrrrr. range 5nswer: 4 9eference: %ata Ealidation &8. (aking a field DDDDDDDDDDDD means that it cannot be left blank. ssssss. numeric tttttt. re/uired calculated validated "ifficulty: @asy "ifficulty: (oderate

uuuuuu. vvvvvv.

5nswer: - 9eference: %ata Ealidation &;. DDDDDDDDDDDD organi!es a database into the order you need. wwwwww. ....... yyyyyy. -rowsing

,crolling ,orting

!!!!!!.9uerying 5nswer: 4 9eference: Eiewing and ,orting %ata "ifficulty: @asy

'>. ,9< is based on a branch of mathematics calledM aaaaaaa. structured algebra.

bbbbbbb. data-driven calculus. ccccccc. artificial intelligence.

ddddddd. relational algebra. 5nswer: % 9eference: %ig %eeperM ,tructured 9uery <anguage 3,9<5 "ifficulty: 4hallenging '1. A3n5 DDDDDDDDDDDD /uery displays a subset of data from one table based on specified criteria. eeeeeee. select

fffffff. variable ggggggg. operational

Word >>& hhhhhhh. 2oin

$age 1&6 of 1 1

5nswer: A 9eference: %ig %eeperM ,tructured 9uery <anguage 3,9<5 "ifficulty: (oderate ' . A DDDDDDDDDDDD /uery displays a subset of data from two or more tables using a common field. iiiiiii. select 2222222. comple. kkkkkkk. table lllllll. 2oin 5nswer: % 9eference: %ig %eeperM ,tructured 9uery <anguage 3,9<5 "ifficulty: (oderate '&. A3n5 DDDDDDDDDDDD enables users to have the database select and display records that match a certain criteria. mmmmmmm. nnnnnnn. sort ooooooo. operation ppppppp. 2oin 5nswer: A 9eference: @.tracting or 9uerying %ata "ifficulty: (oderate /uery

''. The process of reducing redundancy in a database is calledM ///////. a consistency check. rrrrrrr. normali!ation. sssssss.metadata. ttttttt. schema. 5nswer: - 9eference: =ormali!ation of %ata '). The primary key must be a3n5 DDDDDDDDDDDD field. uuuuuuu. numeric vvvvvvv. ob2ect wwwwwww. ........ related 5nswer: 4 9eference: =ormali!ation of %ata "ifficulty: @asy '1. A DDDDDDDDDDDD is a large-scale electronic repository of data that is time-variant. uni/ue "ifficulty: (oderate

Word >>& yyyyyyy. data warehouse !!!!!!!. data mine

$age 1&8 of 1 1

aaaaaaaa. knowledge-based system bbbbbbbb. decision support system 5nswer: A 9eference: %ata Warehouses "ifficulty: (oderate '6. The premise behind a relational database is that DDDDDDDDDDDD are established among the tables. cccccccc. relationships dddddddd. schema eeeeeeee. consistencies ffffffff. normali!ations 5nswer: A 9eference: =ormali!ation of %ata "ifficulty: (oderate

'8. DDDDDDDDDDDD is the term used for e.tracting data from source databases" transforming or reformatting the data" and storing it in the data warehouse. gggggggg. %ata staging hhhhhhhh. Ealidation iiiiiiii. =ormali!ation 22222222. 4lickstream data 5nswer: A 9eference: %ata ,taging "ifficulty: 4hallenging ';. All of the following are types of reports generated by a management information system" @*4@$TM kkkkkkkk. summary llllllll. detail mmmmmmmm. e.ception nnnnnnnn. validation 5nswer: % 9eference: (anagement #nformation ,ystems "ifficulty: @asy )>. Which of the following items is =+T a ma2or component of a decision support system 3%,,5? oooooooo. internal and e.ternal data sources pppppppp. data warehousing

Word >>& ////////. model management systems rrrrrrrr. knowledge-based systems 5nswer: 9eference: %ecision ,upport ,ystems

$age 1&; of 1 1

"ifficulty: 4hallenging

Fill in the Blank:


)1. #n a database" a category of information is stored in a3n5 DDDDDDDDDDDD. 5nswer: field 9eference: Aields "ifficulty: (oderate ) . #n a database" DDDDDDDDDDDD fields are numeric fields that store the contents of a calculation. 5nswer: computational 3or computed5 9eference: Aields "ifficulty: 4hallenging )&. #n a database" field DDDDDDDDDDDD include te.t" numeric" date" memo" ob2ect" and hyperlink. 5nswer: types 9eference: Aields "ifficulty: @asy )'. DDDDDDDDDDDD are electronic collections of related data that can be easily stored" sorted" organi!ed" and /ueried. 5nswer: %atabases 9eference: <ife Without %atabases "ifficulty: @asy )). @ach record in a database should have one field that has a value uni6ue to that record" and this is called a3n5 DDDDDDDDDDDD. 5nswer: primary key 9eference: $rimary Beys "ifficulty: (oderate )1. A3n5DDDDDDDDDDDD stores data in multiple dimensions as opposed to relational databases" which store data in two-dimensional tables. 5nswer: multidimensional database 9eference: (ultidimensional %atabases )6. A group of related records in a database is called a file or a3n5 DDDDDDDDDDDD. "ifficulty: (oderate

5nswer: table 9eference: 0ecords and Tables "ifficulty: @asy )8. #n DDDDDDDDDDDD databases" tables are logically linked to each other by including their primary keys in other tables with related information. 5nswer: relational 9eference: 0elational %atabases "ifficulty: @asy );. All modern DDDDDDDDDDDD contain a /uery language that the software uses to retrieve and display records. 5nswer: database management systems 3%-(,5 9eference: @.tracting or 9uerying %ata "ifficulty: @asy 1>. DDDDDDDDDDDD databases are more adept at handling unstructured data such as audio clips" video clips" and pictures. 5nswer: +b2ect-oriented 9eference: +b2ect-+riented %atabases "ifficulty: (oderate 11. ,9< is based on relational algebra" which" like algebraic e/uations" uses DDDDDDDDDDDD and DDDDDDDDDDDD. 5nswer: variables" operations 9eference: %ig %eeperM ,tructured 9uery <anguage 3,9<5 "ifficulty: (oderate

Word >>& $age 1'> of 1 1 1 . -ecause they store the instructions for doing computations in the same place as the data" DDDDDDDDDDDD databases can usually process re/uests for information faster than relational databases. 5nswer: ob2ect-oriented 9eference: +b2ect-+riented %atabases 1&. ,mall slices of a data warehouse are known as DDDDDDDDDDDD. 5nswer: data marts 9eference: %ata (arts "ifficulty: 4hallenging "ifficulty: @asy

1'. The data dictionary is also known as the DDDDDDDDDDDD. 5nswer: database schema 9eference: 4reating %atabases and @ntering %ata "ifficulty: (oderate 1). %ata describing other data in a database is called DDDDDDDDDDDD. 5nswer: metadata 9eference: 4reating %atabases and @ntering %ata "ifficulty: 4hallenging 11. -esides using data entry forms or keying data directly into the database" users can DDDDDDDDDDDDdata electronically from other application files. 5nswer: import 9eference: #nput Aorms "ifficulty: (oderate 16. A3n5 DDDDDDDDDDDD check is used to restrict fields in a database to numbers only. 5nswer: numeric 9eference: %ata Ealidation 18. Another name for sorting is DDDDDDDDDDDD. "ifficulty: (oderate

5nswer: inde.ing 9eference: Eiewing and ,orting %ata "ifficulty: @asy 1;. The predominant /uery language for modern-day databases is DDDDDDDDDDDD. 5nswer: ,9< 3structured /uery language5 9eference: @.tracting or 9uerying %ata "ifficulty: @asy 6>. A3n5 DDDDDDDDDDDD /uery displays a subset of data from a table based on the criteria you specify. 5nswer: select 9eference: %ig %eeperM ,tructured 9uery <anguage 3,9<5 "ifficulty: 4hallenging 61. When creating a /uery" the DDDDDDDDDDDD include directions such as select" 1rom4 and where. 5nswer: operations 9eference: %ig %eeperM ,tructured 9uery <anguage 3,9<5 "ifficulty: 4hallenging 6 . The two most common /ueries used to e.tract data are select /ueries and DDDDDDDDDDDD /ueries. 5nswer: 2oin 9eference: %ig %eeperM ,tructured 9uery <anguage 3,9<5 "ifficulty: (oderate 6&. A3n5 DDDDDDDDDDDD is a /uestion or in/uiry you ask the database so that it provides you with records you wish to view3 5nswer: /uery 9eference: @.tracting or 9uerying %ata "ifficulty: @asy 6'. The process of outputting the contents of a database in a file format recogni!able by other applications is called DDDDDDDDDDDD. 5nswer: e.porting 9eference: +utputting %ata "ifficulty: @asy 6). The DDDDDDDDDDDD of data is the process of achieving the goal of reducing data redundancy by recording data only once. 5nswer: normali!ation 'rue and alse: 9eference: =ormali!ation of %ata "ifficulty: (oderate

Word >>& $age 1'1 of 1 1 61. 0eferential integrity means that for each value in the foreign key of one table" there is a corresponding value in the primary key of the related table. 5nswer: True 9eference: =ormali!ation of %ata 66. A data warehouse includes data that pertains to one period in time. "ifficulty: 4hallenging

5nswer: Aalse 9eference: %ata Warehouses "ifficulty: (oderate 68. 0eal-time processing means that transactions are accumulated" then a number of transactions are processed at once. 5nswer: Aalse 3-atch5 9eference: Transaction $rocessing ,ystems "ifficulty: @asy 6;. The most pressing problems of lists are the inability of the data to be shared and data redundancy. 5nswer: True 9eference: <ife Without %atabases "ifficulty: (oderate 8>. +nline transaction processing 3+<T$5 works with real-time processing to ensure that the data is as up to date as possible. 5nswer: True 9eference: Transaction $rocessing ,ystems "ifficulty: @asy 81. A 2oin /uery displays a subset of data from a table based on the criteria you specify. 5nswer: Aalse 3select5 9eference: %ig %eeperM ,tructured 9uery <anguage 3,9<5 "ifficulty: (oderate 8 . (anagement information systems 3(#,5 help managers develop solutions for specific problems. 5nswer: Aalse 3decision support systems-%%,5 9eference: %ecision ,upport ,ystems "ifficulty: 4hallenging 8&. @.ternal data sources include any source not owned by the company that owns the %%," such as demographic data purchased from third parties" mailing lists" and statistics compiled by the federal government. 5nswer: True 9eference: #nternal and @.ternal %ata ,ources "ifficulty: @asy 8'. A portal is a Web site where many types of data services or applications can be accessed at one time. 5nswer: True 9eference: Trends in #TM @merging TechnologiesM Web $ortalV "ifficulty: @asy 8). %ata warehousing is the process by which great amounts of data are analy!ed and investigated with the purpose of spotting significant patterns or trends. 5nswer: Aalse 3%ata mining5 9eference: %ata (ining "ifficulty: (oderate

81. Bnowledge-based systems support normal logic that enables the inter2ection of e.periential learning into the e/uation by considering possibilities. 5nswer: Aalse 3fu!!y logic5 9eference: Bnowledge--ased ,ystems "ifficulty: 4hallenging 86. 0educing data redundancy by recording data only once is called normali!ation of data. 5nswer: True 9eference: =ormali!ation of %ata "ifficulty: (oderate 88. #n a relational database" when two tables have a common field" the link between the tables is known as a relationship. 5nswer: True 9eference: 0elational %atabase +perations "ifficulty: @asy

Word >>& $age 1' of 1 1 8;. ,orting a database in alphabetical order means you are sorting in descending order. 5nswer: Aalse 3ascending5 9eference: Eiewing and ,orting %ata ;>. ,ummary reports provide a consolidated picture of detailed data. 5nswer: True 9eference: (anagement #nformation ,ystems "ifficulty: @asy "ifficulty: (oderate

Matching: ;1. (atch the following terms to their functionsM #. normali!ation A. alerts managers of need for immediate attention ##. e.ception report -. contains historical data ###. data warehouse 4. reduces data redundancy in a database #E. data dictionary %. enforces match of primary to foreign keys E. referential integrity @. contains metadata describing database structure 5nswer: 4" A" -" @" % 9eference: (ultiple locations in chapter "ifficulty: 4hallenging

; . (atch the following acronyms to their descriptionsM #. +9< ##. ,9< ###. +<A$ #E. T$, E. %,, 5nswer: -" @" %" A" 4 A. processes everyday business transactions -. /uery language similar to ,9< 4. uses databases and models for assisting comple. decision processes %. assists users with analy!ing and finding trends in data warehouses @. consists of commands and synta. for /uerying relational databases 9eference: (ultiple locations in chapter "ifficulty: (oderate

;&. (atch the following ,9< terms to their meaningsM #. 2oin A. another term for directions ##. select -. a /uery that uses keywords to specify fields to display from a table ###. variables 4. table names" field names" or selection criteria #E. select" from" where %. a /uery that displays related data from multiple tables E. operations @. e.amples of operations 5nswer: %" -" 4" @" A 9eference: %#I %@@$@0M ,tructured 9uery <anguage 3,9<5 "ifficulty: (oderate ;'. (atch the following terms to their meaningsM #. ob2ect-oriented database ##. knowledge-based system ###. data mart #E. memo field E. relational algebra A. ,9< is based on this form of mathematics -. combines data and methods for processing 4. smaller-scale version of a data warehouse %. can include artificial intelligence and uses fu!!y logic @. contains variable-length te.t data

Word >>& 5nswer: -" %" 4" @" A

9eference: (ultiple locations in chapter

$age 1'& of 1 1 "ifficulty: (oderate

;). (atch the following terms to their meaningsM #. data mining A. finding patterns and trends in a data warehouse ##. multidimensional database -. updating transactions all at one time ###. batch processing 4. loading data into a database from e.ternal sources #E. real-time processing %. stores data in multiple dimensions E. importing @. updating the database as a transaction occurs 5nswer: A" %" -" @" 4 9eference: (ultiple locations in chapter "ifficulty: @asy ;1. (atch the following acronyms to their definitionsM #. -<+##. (#, ###. =<$ #E. A# E. +,, 5nswer: -" @" %" A" 4 A. a branch of computer science that is attempting to create computers that think like humans -. unstructured data encoded in binary form 4. a system that assists employees in accomplishing routine tasks %. users communicate with computers using a natural spoken or written language as opposed to programming languages @. information that enables managers to make critical business decisions 9eference: (ultiple locations in chapter "ifficulty: (oderate

;6. (atch the following terms to their meaningsM A. electronic collection of related data that can be easily stored" sorted" organi!ed" and /ueried ##. fu!!y logic -. ensures that data in the T$, is as up to date as possible ###. online transaction processing 3+<T$54. tries to replicate human decision-making processes #E. model management system %. inter2ects e.periential learning into the e/uation E. e.pert system @. assists in building management models in %,,s 5nswer: A" %" -" @" 4 9eference: (ultiple locations in chapter "ifficulty: (oderate ;8. (atch the following terms to their meaningsM #. detailed report ##. data redundancy ###. unstructured data #E. table E. database schema 5nswer: -" @" 4" %" A A. another name for the data dictionary -. a list of transactions that occurred during a certain time period 4. non-traditional data such as audio clips" video clips" and pictures %. another name for a file" it is usually organi!ed by a common ob2ect @. entering data multiple times 9eference: (ultiple locations in chapter "ifficulty: (oderate #. database

;;. (atch the following terms to their functionsM #. ob2ect fields A. a uni/ue field that ensures that records are not duplicated ##. computational fields -. contain items such as pictures or video clips

Word >>& ###. relations #E. record E. primary key 5nswer: -" 4" %" @" A

$age 1'' of 1 1 4. store the contents of a calculation %. tables that contain related data in a relational database @. a group of related fields 9eference: (ultiple locations in chapter "ifficulty: (oderate

1>>. (atch the following terms to their meaningsM #. file ##. metadata ###. information system #E. relational database E. validation check 5nswer: 4" %" A" @" A. software-based solution used to gather and analy!e information -. includes range" completeness" consistency" alphabetic" and numeric 4. also known as a table %. data describing data @. organi!es data in tables that are logically linked to each other by primary keys 9eference: (ultiple locations in chapter "ifficulty: (oderate

1. Accurate" relevant" and timely information is the key to good decision making. True Aalse . (etadata provide the description of the data characteristics but do not describe the set relationships that link the data found within the database. True Aalse &. A database that is primarily designed to support a companyHs day-to-day operations is called a data warehouse. True Aalse '. A record is a logically connected set of one or more fields that describes a person" place" or thing. True Aalse ). The final outcome of a natural R+#= operation yields a table that does not include the unmatched row. True Aalse 1. #n a relational table" each column represents an attribute and each column has a distinctive name. True Aalse 6. #n a relational table" each value in a column must conform to the same data format. True Aalse 8. A key consists of one or more attributes that determine other attributes. True Aalse ;. A primary key can be defined as a superkey with redundancies. True Aalse

Word >>& 1>. To maintain entity integrity" a null value is permitted in the primary key. True Aalse

$age 1') of 1 1

Word >>&

$age 1'1 of 1 1

,ection M (ultiple 4hoice 9uestions $lease select only one of the choices 3#f more than one is selected" it is considered as incorrect5 1. The %-(, allows you to e.trapolate information from your data by using a3n5 DDDD. a. /uery language b. table generator c. security system d. access control . A DDDD system is composed of software" hardware" procedures" and people. a. software b. computer c. file d. database &. DDDD are the people who run the organi!ationHs daily operations. a. @nd users b. (anagers c. %atabase programmers d. %ata practitioners '. %ata is?areM a. information b. raw facts c. processed information d. a %-(, ). A telephone number" a birth date" and a customer name are all e.amples ofM a. data b. a record c. a file d. a database

Word >>& $age 1'6 of 1 1 1. A logically connected set of one or more fields that describes a person" place" or thing is a3n5M a. data b. a record c. a file d. a database 6. (etadata isM a. raw facts b. data about data c. user created data d. warehoused data

Word >>&

$age 1'8 of 1 1

8. ,9< isM a. a structured /uery language b. a se/uencing /uery language c. a se/uencing /uery listing d. a structured /uery listing ;. A relational database is a group of DDDD. a. common fields b. field values c. records d. tables 1>. %atabase models can be grouped into two categoriesM conceptual models and DDDD models. a. implementation b. logical c. physical d. /uery 11. @ach row in the relational table is known as an entity DDDD. a. instance b. relationship c. attribute d. model 1 . Which model represents the end userHs view of the database? a. #nternal b. 4onceptual c. $hysical d. @.ternal 1&. Which model operates at the lowest level of abstraction? a. 4onceptual

Word >>& b. #nternal c. @.ternal d. $hysical

$age 1'; of 1 1

1'. What type of relationship is e.pressed with the phrase T$ainter paints $aintingU? a. 1M( b. 1M1 c. (M1 d. (M= 1). What type of relationship is e.pressed with the phrase T@mployee manages ,toreU? a. 1M( b. 1M1 c. (M1 d. (M= 11. What type of relationship is e.pressed with the phrase T,tudent takes 4lassU? a. 1M( b. 1M1 c. (M1 d. (M= 16. Which of the following is least likely to be a business rule as relates to data modeling? a. A customer may make many payments on an account. b. A machine operator may not work more than 1> hours in a '-hour period. c. A training session cannot be scheduled for fewer than 1> employees or more than &> employees. d. 4asual Aridays take place in the summer. 18. The entity integrity rule re/uires that DDDD. a. all primary key entries are uni/ue b. a part of the key may be null c. foreign key values do not reference primary key values d. duplicate ob2ect values are allowed 1;. The referential integrity rule re/uires that DDDD.

Word >>& $age 1)> of 1 1 a. every null foreign key value must reference an e.isting primary key value b. an attribute have a corresponding value c. every non-null foreign key value reference an e.isting primary key value d. you delete a row in one table whose primary key does not have a matching foreign key value in another table

Word >>&

$age 1)1 of 1 1

>. @ach table must have a DDDD key. a. primary b. secondary c. foreign d. logical 1. A primary key DDDD. a. is a minimal superkey b. is always the first field in each table c. must be numeric d. must be uni/ue . A relational operator that yields values from all rows in a table is known as the DDDD operator. a. %#AA@0@=4@ b. $0+%:4T c. ,@<@4T d. $0+R@4T &. A relational operator that yields all values from selected attributes is known as the DDDD operator. a. %#AA@0@=4@ b. $0+%:4T c. ,@<@4T d. $0+R@4T '. A relational operator that allows for the combination of information from two or more tables is known as the DDDD operator. a. ,@<@4T b. $0+R@4T c. R+#= d. %#AA@0@=4@ ). #n a relationship" when a primary key from one table is also defined in a second table" the field is referred to as a DDDD in the second table.

Word >>& a. combined key b. redundant field c. primary key d. foreign key

$age 1) of 1 1

1. A relational operator that yields all possible pairs of rows from two tables is known as the DDDD operator. a. :=#+= b. #=T@0,@4T c. %#AA@0@=4@ d. $0+%:4T 6. Which of the following statements concerning the primary key is true? a. All primary key entries are uni/ue. b. The primary key may be null. c. The primary key is not re/uired for all tables. d. The primary key data do not have to be uni/ue. 8. #n the conte.t of a database table" the statement TA determines -U indicates that DDDD. a. knowing the value of attribute A" you cannot look up the value of attribute b. you do not need to know the value of attribute A in order to look up the value of attribute c. knowing the value of attribute -" you can look up the value of attribute A d. knowing the value of attribute A" you can look up the value of attribute ;. A DDDD is any key that identifies each entity uni/uely. #t functionally determines all of the entityHs attributes. a. superkey b. primary key c. foreign key d. combined key &>. A superkey that does not contain a subset of attributes that is itself a superkey is called a DDDD. a. candidate key b. primary key c. superkey d. secondary key

Word >>&

$age 1)& of 1 1

,ection &M Aill up the empty space with most appropriate word 1. A collection of programs that manages the database structure and controls access to the data stored in the database is called a DDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. "(M: . A %-(, that supports more than one user is classified as a DDDDDDDDDDDDDDDDDDDD user. Multi &. DDDDDDDDDDDDDDDDDDDD" or data about data" through which the end-user data and are integrated and managed. Meta"ata '. DDDDDDDDDDDDDDDDDDDD e.ists when different versions of the same data appear in different places. "ata inconsistency ). DDDDDDDDDDDDDDDDDDDD refers to the activities that focus on the design of the database structure that will be used to store and manage end-user data. "ata&ase design 1. The relationship described by the phrase Tthe 4ustomer generates the #nvoiceU is DDDDDDDDDDDDDDDDDDDD. one=to=many 6. A3n5 DDDDDDDDDDDDDDDDDDDD is a brief" concise" and unambiguous description of a policy. &usiness rule 8. The /uery language for a relational database is DDDDDDDDDDDDDDDDDDDDDDDDD. :>,, structured query language ;. A3n5 DDDDDDDDDDDDDDDDDDDD consists of one or more attributes that determine other attributes. )ey 1>. Another form of R+#=" known as DDDDDDDDDDDDDDDDDDDD" links tables on the basis of an e/uality condition that compares columns of each table. equi?oin

Word >>&

$age 1)' of 1 1

,ection 'M Answer the following /uestions. 1. @.plain why %-(,s are important in our information-based society. ,ince data are important" we must have good ways of managing such data. Additionally" a %-(, creates an environment with better access to more and better data" makes it possible for end users to respond /uickly to changes in their environment" and makes available data that can be easily transformed into usable information. . @.plain data redundancy and what it sets the stage for. %ata redundancy occurs when the same data is stored in different locationsJ 0edundancy creates data inconsistency" which results from different and conflicting versions of the same data in different places" and data anomalies" as a result of the need to modify the same data in different locations. &. <ist the different types of relationships and provide an e.ample of each. There are three types of relationshipsM 15 +ne-to-+ne 31M15 relationshipsM @mployee manages ,tore 5 +ne-to-(any 31M(5 relationshipsM $ainter paints $ainting &5 (any-to-(any 3(M= or (M(5 relationshipsM ,tudent takes 4lass

Chapter $4 Mar)eting in the "igital 5ge


@+N+95, C;N'+N': Multiple=Choice >uestions 1. What is the name for the recent technology advances including the widespread use of the #nternet? a. An old economy. b. Transformation. c. A new world. d. The digital age. e. - and 4 3AnswerM dJ p. '&6J @asy5 . DDDDD are networks that connect people within a company to each other and to the company network. a. -its b. -ytes c. #ntranets d. @.tranets e. #nternets 3AnswerM cJ p. '&6J @asy5

Word >>&

$age 1)) of 1 1

&. The DDDDD enables consumers and companies to access and share huge amounts of information with 2ust a few mouse clicks. a. Analog age b. %igital age c. #nternet d. e.tranet e. marketing mi. 3AnswerM cJ p. '&6J @asy5 '. The flip side of e-marketing is DDDDD" the buying side of e-commerce. a. e-purchasing b. e-commerce c. e-supply d. e-business e. none of the above 3AnswerM aJ p. '&8J (oderate5

). All of the following are accurate descriptions of the benefits of #nternet buying" e.cept which one? a. #nternet buying is convenient. b. The #nternet offers buyers the benefit of comparative shopping with 2ust the click of a mouse. c. The #nternet seldom provides buyers with greater product access and selection. d. +nline buying is interactive and immediate. e. -uying is easy and private. 3AnswerM cJ p. '&8J (oderate5 1. DDDDD is3are5 a vast public web of computer networks that connect users of all types all around the world to each other. a. #ntranets b. @.tranets c. The #nternet d. -itstreams e. =one of the above 3AnswerM cJ p. '&6J @asy5 6. 0esearch suggests that the growth of #nternet access among the worldHs citi!ens will continue to DDDDD. a. decline b. grow slowly c. stay the same d. e.plode e. grow mainly among the emerging economies 3AnswerM dJ p. '&6J @asy5 8. @-commerce includes DDDDD and DDDDD. a. e-marketingJ e-tailers

Word >>& b. e-businessJ e-marketing c. e-marketingJ e-purchasing d. e-marketingJ intranets e. the #nternetJ e.tranets 3AnswerM cJ p. '&8J @asy5

$age 1)1 of 1 1

;. At first" what did the established brick-and-mortar firms do when the click-only firms began doing business? a. They dragged their feet" hoping the click-only firms would falter. b. They 2oined in right away" reali!ing it was a good thing. c. They completely ignored click-only firms. d. They ree.amined how they served their markets. e. =one of the above. 3AnswerM dJ p. '&6J 4hallenging5 1>. The popular press has paid the most attention to DDDDD e-commerceWthe online selling of goods and services to final consumers. a. - 4 b. - c. 4 4 d. 4 e. global 3AnswerM aJ p. ''>J (oderate5 11. All of the following statements are accurate descriptions of the demographic profile of online consumers" e.cept which one? a. Today" young" techy" upscale professionals heavily populate use of the #nternet. b. Almost two-thirds of :.,. households surf the #nternet. c. The #nternet provides e-marketers with access to a broad range of demographic segments. d. 4hildren and teens are going online more than any other age group. e. Web-surfing seniors tend to be well educated and well-off. 3AnswerM aJ p. ''>J (oderate5 1 . DDDDD are huge e-marketspaces in which buyers and sellers find each other online" share information" and complete transactions efficiently. a. $rivate trading e.changes b. +pen trading e.changes c. - 4 Web sites d. 4 4 Web sites e. =one of the above. 3AnswerM bJ p. '' J (oderate5 1&. The digital age will fundamentally change customersH notions of convenience" speed" price" product information" and service. This new consumer thinking will affect DDDDD. a. a few businesses b. every business c. established businesses d. starting up businesses e. global businesses only 3AnswerM bJ p. '&8J @asy5

Word >>& $age 1)6 of 1 1 1'. DDDDD are trading networks that link a particular seller with its own trading partners. a. +pen trading e.changes b. $rivate trading e.changes c. - 4 Web sites d. 4 4 Web sites e. Ilobal Web sites 3AnswerM bJ p. '' J @asy5 1). @-business involves the use of all but one of the following. Which is not associated with e-business? a. #ntranets. b. @.tranets. c. The #nternet. d. ,tamps. e. =one of the above. 3AnswerM dJ p. '&8J @asy5 11. #ntranets are used to help DDDDD. a. buying and selling processes b. business-to-business purchasing c. employees to communicate with each other d. customer relations e. none of the above 3AnswerM cJ p. '&8J (oderate5 16. +nline e.change of goods and information between final consumers is called DDDDD. a. - 4 b. - c. 4 4 d. 4 e. marketing myopia 3AnswerM cJ p. ''&J @asy5 18. DDDDD consists of companies purchasing goods" services" and information from online suppliers. a. @-marketing b. @-purchasing c. @-privacy d. @-customeri!ation e. @-learning 3AnswerM bJ p. '&8J (oderate5 1;. What is one reason why #nternet buying is not a benefit to the customer? a. 4onvenience. b. =o need to find a parking space. c. 4omparative shopping made easier. d. (istrust. e. ,hopping from home. 3AnswerM dJ p. '&8J @asy5

Word >>&

$age 1)8 of 1 1

>. e-ay and Ama!on.com Auctions and other auction sites offer popular marketspaces for online e.change of goods and information. These online companies are e.amples of DDDDD. a. - 4 b. - c. 4 4 d. 4 e. global commerce 3AnswerM cJ p. ''&J (oderate5 1. (ost of todayHs online customers e.hibit a clear tendency toward DDDDD" as they are able to create e.act configurations of products desired. a. consumer control b. fickleness by nature and will flock to the ne.t new idea c. indifference d. bad manners e. none of the above 3AnswerM aJ p. '&;J (oderate5 . DDDDD e-commerce sites entail online e.changes in which consumers search out sellers" learn about their offers" and initiate purchases" sometimes even driving transaction terms. a. - 4 b. - c. 4 4 d. 4 e. - - or 4 4 3AnswerM dJ p. '''J @asy5 &. Which one listed is not one of the four ma2or #nternet domains? a. - 4 3business-to-consumer5 b. - % 3business-to-door5 c. - - 3business-to-business5 d. 4 4 3consumer-to-consumer5 e. They are all ma2or #nternet domains. 3AnswerM bJ p. ''>J @asy5 '. ,earch engines" portals" e-tailers and dot-coms are e.amples of DDDDD" selling products and services directly to final buyers via the #nternet. a. click-and-mortar @-marketers b. brick-and mortar retailers c. new-age businesses d. click-only marketers e. - - marketers 3AnswerM dJ p. '')J (oderate5 ). DDDDD" such as A+< and @arthlink" are click-only companies that provide #nternet and e-mail connections for a fee. a. Transaction sites b. #nternet ,ervice $roviders 3#,$s5

Word >>& c. 4ontent sites d. @nabler sites e. 4 - marketers 3AnswerM bJ p. '')J @asy5

$age 1); of 1 1

1. 7uge e-marketspaces in which buyers and sellers find each other online" share information" and complete transactions efficiently are called DDDDD. a. intranets b. channel conflicts c. open trading e.changes d. fidelity investments e. none of the above 3AnswerM cJ p. '' J 4hallenging5 6. DDDDD link3s5 a particular seller with its own trading partners. a. +pen trading networks b. $rivate trading e.changes c. #nternet profitability d. %igital %ivide e. <A=s 3AnswerM bJ p. '' J (oderate5 8. DDDDD is the means by which consumers can buy or e.change goods or information directly with one another. a. 4 4 3consumer-to-consumer5 b. - - 3business-to-business5 c. 4 - 3consumer-to-business5 d. +$T 3open trading networks5 e. =one of the above 3AnswerM aJ p. ''&J @asy5 ;. What is the term used for discussion groups located on commercial online services such as A+< and 4ompu,erve? a. @-mail. b. -logs. c. 4hat rooms. d. #nstant messaging. e. Aocus groups. 3AnswerM bJ p. ''&J (oderate5

&>. What is the name of the e-commerce used when consumers can drive transactions with businesses" such as using $riceline.com? a. -logs. b. - , 3banner-to-site5. c. 4 - 3consumer-to-business5. d. Webcasting. e. =one of the above. 3AnswerM cJ p. '''J @asy5

Word >>&

$age 11> of 1 1

&1. The #nternet gave birth to a new species of e-markets" DDDDD that operate3s5 only online. a. brick-and-mortar companies b. click-and-mortar companies c. old economy d. click-only dot-coms e. Web-and-mortar companies 3AnswerM dJ p. '''J @asy5 & . %ot-coms failed for many reasons. What is one reason this happened? a. ,ome rushed into the market without proper research or planning. b. ,ome developed sound marketing strategies. c. (any did not rely on spin and hype. d. (any did not have much investment cash. e. All of the above. 3AnswerM aJ p. '')J (oderate5 &&. Which one is the best description of Tchannel conflictU? a. There would be too many customers on a companyHs site at one time. b. #f a company sells its products or services online" it would be competing with its offline retailers. c. #t would be hard to find its business online. d. The online description of a product would not be convincing enough to close a sale. e. All of the above. 3AnswerM bJ p. ''1J (oderate5 &'. 4ompanies can conduct e-marketing in any of four ways. What is not one of these ways? a. 4reating a Web site. b. $lacing ads online. c. 4alling their customers to do surveys. d. ,etting up or participating in Web communities. e. - and % 3AnswerM cJ p. ''6J @asy5 &). What is the main purpose for a corporate Web site? a. These sites are designed to sell the companyHs products directly. b. These sites are designed to build customer goodwill. c. These sites show a catalog and give shopping tips. d. These sites give out coupons and tell about sales events or contests. e. These sites e.plain competitorsH weaknesses. 3AnswerM bJ p. ''8J 4hallenging5 &1. To attract new visitors and to encourage revisits" e-marketers should pay close attention to the seven 4s of effective Web site design. What is included in the seven 4s? a. 4onte.tM siteHs layout and design. b. 4ontentM te.t" pictures" sounds" and video that the Web site contains. c. 4ommerceM siteHs ability to enable commercial transactions. d. A and 4 e. A" -" and 4 3AnswerM eJ p. ')>J @asy5

Word >>& &6. @ffective Web sites contain all of the following e.cept DDDDD. a. deep and useful information b. interactive tools that help buyers find products c. only brick-and-mortar companies d. changing promotional efforts e. A and 3AnswerM cJ p. ')>J @asy5

$age 111 of 1 1

&8. Arom time to time a company needs to reassess its Web siteHs attractiveness and usefulness. What is one way that is not used to do this? a. To detect potential problems" it tracks hits and time spent on the site. b. #t sends out forms in the mail to fill out and send back in to the business. c. #t detects fre/uently visited pages and the se/uence of pages the customer visits. d. #t conducts /uarterly phone surveys with customers. e. All of the above. 3AnswerM bJ p. ')>J (oderate5 &;. What does the term viral mar.eting mean? a. #t is the #nternet version of word-of-mouth marketing. b. #t is where problems occur with viruses online. c. #t is another term for online privacy3 d. #t is another term for online security3 e. #t is where a customerHs inventory levels are accessible online by suppliers. 3AnswerM aJ p. ')&J @asy5

'>. What does the term 9eb communities not mean? a. A site that allows members to congregate online and e.change views. b. The cyberspace e/uivalent to a ,tarbucks coffeehouse. c. $art of the #nternet that takes advantage of the - - properties. d. A place where everybody knows your e-mail address. e. A and % 3AnswerM cJ p. ')'J 4hallenging5 '1. The most ardent apostles of e-commerce envision a time when the #nternet will replace all but which of the following? a. (aga!ines. b. =ewspapers. c. ,tores. d. (ail service. e. =one of the above. 3AnswerM eJ p. ')8J @asy5 ' . There are two ma2or concerns about the darker side of the Web. What are they? a. +perating on analog information and digitali!ation. b. #nternet profitability and legal and ethical issues. c. :sing the old economy and the new economy.

Word >>& d. $roblems with dot-coms and #,$s. e. =one of the above. 3AnswerM bJ p. ')8J 4hallenging5

$age 11 of 1 1

'&. www.nytimes.com" espn.com" and @ncyclopedia -ritannica +nline provide financial" research" and other information. They are called DDDDD. . a. transaction sites b. content sites c. enabler sites d. #,$s e. click-and-mortar sites 3AnswerM bJ p. '')J (oderate5 ''. What is perhaps the number-one e-commerce concern? a. 4ost of increasing speed and efficiency. b. 4ustomeri!ation. c. +nline privacy. d. Aorums. e. $ornography. 3AnswerM cJ p. ');J (oderate5

Word >>& $age 11& of 1 1 '). What happened as a result of personal information collected online from children? a. 4hildren have no access to certain parts of the #nternet. b. 4ongress passed the 4hildrenHs +nline $rivacy $rotection Act. c. 4hildren began to be targeted on their sites. d. This caused the %igital %ivide. e. Eery little has happened as a result. 3AnswerM bJ p. ');J (oderate5 '1. All of the following define Internet 1raud e.cept for DDDDD. a. brick-and-mortar firms b. identity theft c. investment fraud d. financial scams e. false advertising 3AnswerM aJ p. '1>J @asy5 '6. The term digital divide is defined as the DDDDD. a. conflict between corporate Web sites and marketing Web sites b. gap between those who have access to the latest #nternet technologies and those who do not c. difference between online advertising and banner ads d. conflict between 4 - relations and e-commerce e. struggle of dot-com companies to survive 3AnswerM bJ p. '1>J (oderate5 '8. +ne of the reasons dot-coms failed is because their primary goal was to launch DDDDD while the market was hot. a. an initial public offering 3#$+5 b. a glit!y Web site c. a new Web site d. more retail outlets e. none of the above 3AnswerM aJ p. '')J @asy5 ';. $XI feared that its retailers would drop their packaged goods brands if the company sold the same brands directly online. They worried that it would produce DDDDD. a. vertical conflict b. hori!ontal conflict c. channel conflict d. customeri!ation e. copycats 3AnswerM cJ p. ''1J @asy5

)>. DDDDD includes all electronics-based information e.changes within or between companies and customers. a. @-commerce b. @-business c. The e.tranet d. The #nternet

Word >>& e. @-marketing 3AnswerM bJ p. '&8J (oderate5 )1. - - includes all of the following e.cept DDDDD. a. trading networks b. the WebHs darker side c. auction sites d. online product catalogs e. - and 4 3AnswerM bJ p. '' J @asy5 ) . Which is not one of the four ma2or e-commerce domains? a. @ -. b. - 4. c. - -. d. 4 4. e. 4 -. 3AnswerM aJ p. ''>J @asy5

$age 11' of 1 1

)&. #n DDDDD e-commerce" consumers can buy or e.change goods and information directly from or with one another. a. - 4 b. 4 4 c. - d. 4 e. none of the above 3AnswerM bJ p. ''&J @asy5 )'. +ther forms of online marketing include all of the following e.cept DDDDD. a. content sponsorships b. microsites c. Web communities d. intranets e. alliances and affiliate programs 3AnswerM dJ p. ')1J 4hallenging5

)). All of the following are challenges that e-commerce faces e.cept DDDDD. a. Web profitability b. ethical issues c. %igital %ivide d. too many customers e. legal issues 3AnswerM dJ p. ')8J 4hallenging5 )1. DDDDD is the term used to describe a company that does not offer its services on the #nternet. a. +ffline business

Word >>& b. -rick-and-mortar c. 4lick-and-mortar d. @-business e. Web community 3AnswerM bJ p. '''J (oderate5

$age 11) of 1 1

)6. A recent study revealed that nearly half of all the - - and - 4 companies surveyed use DDDDD to reach consumers. a. e-commerce b. e-mail c. !ip code d. the #nternet e. the :.,. mail 3AnswerM bJ p. '))J @asy5 )8. What is an e-mail ad designed to do? a. 4ommand your attention. b. %istant the readerHs attention from unwanted pop-ups. c. @.hibit more credibility than any other media option. d. #ntroduce products in the introductory stage of the $<4. e. #ntimidate competitors. 3AnswerM aJ p. '))J (oderate5 );. Which of the following is not an appealing feature of modern e-mail ads? a. Animation. b. #nteractive links. c. 4olor photos. d. #mmediacy. e. =one of the above. 3AnswerM eJ p. ')1J (oderate5

1>. Aor most companies" the first step in conducting e-marketing is to DDDDD. a. place an ad online b. use online e-mail c. create a marketing Web site d. create Web communities e. A and % 3AnswerM cJ p. ''6J (oderate5 11. DDDDD are designed to build customer goodwill and to supplement other sales channels" rather than to sell the companyHs products directly. a. (arketing Web sites b. 4orporate Web sites c. ,mall business Web sites d. =on-profit corporation web sites e. none of the above

Word >>& 3AnswerM bJ p. ''8J (oderate5

$age 111 of 1 1

1 . 4onnie Wright designs e-mail ads for her marketing department. 4onnie hopes to DDDDD with well-designed ads. a. command customer attention b. get customers to act c. achieve success d. A and e. A" -" and 4 3AnswerM eJ p. ')1J (oderate5 1&. $ermission e-mail campaigns typically achieve higher click-through rates than traditional direct mail. What is the average click-through rate? a. to & percent b. 1> to > percent c. )> percent d. 6) percent e. ;> percent 3AnswerM bJ p. ')1J @asy5 1'. According to customer surveys" a disadvantage of permission-based e-mails is that DDDDD. a. they can be annoying b. they can be seen as spam c. they are of poor /uality construction d. A and e. they contain little useful information 3AnswerM dJ p. ')6J (oderate5

1). T@ven among consumers who opt in to the e-mail barrage" thereHs a fine line between legitimate marketing and DDDDD.U a. 2unk mail b. spam c. illegal marketing d. black marketing e. all of the above 3AnswerM bJ p. ')6J @asy5 11. DDDDD engage consumers in interactions that will move them closer to a direct purchase or other marketing outcome. a. 4orporate Web sites b. (arketing Web sites c. Web communities d. ,pam tends to e. all of the above 3AnswerM bJ p. ''8J (oderate5 16. DDDDD are banner ads that move across the computer screen while consumers are surfing the Web. a. #nterstitials

Word >>& b. ,kyscrapers c. 0ectangles d. Tickers e. ,/uares 3AnswerM dJ p. ')1J @asy5 18. Those tall" skinny ads on the side of the Web page are called DDDDD. a. interstitials b. rectangles c. tickers d. skyscrapers e. s/uares 3AnswerM dJ p. ')1J @asy5

$age 116 of 1 1

1;. The e.plosive worldwide growth in DDDDD usage forms the heart of the new digital age. a. e.tranet b. #nternet c. intranet d. analog e. A and 4 3AnswerM bJ p. '&6J @asy5

6>. DDDDD are online ads that pop up between changes on a Web site. a. 0ectangles b. #nterstitials c. Tickers d. ,kyscrapers e. =one of the above 3AnswerM bJ p. ')1J @asy5 61. @-business involves the use of DDDDD to conduct a companyHs business. a. intranets b. e.tranets c. the #nternet d. A and 4 e. A" -" and 4 3AnswerM eJ p. '&8J @asy5 6 . DDDDD is more specific than DDDD. a. @-commerceJ e-business b. @-businessJ e-commerce c. @-commerceJ e-marketing d. @-marketingJ e-purchasing e. none of the above 3AnswerM aJ p. '&8J @asy5 6&. #n which of the following ways does the #nternet benefit sellers? a. The #nternet is a tool for customer relationship building.

Word >>& $age 118 of 1 1 b. 4ompanies can increase customer value through ongoing #nternet interaction. c. The #nternet can reduce costs and increase efficiency. d. A and e. All of the above. 3AnswerM eJ p. '&;J (oderate5 6'. @-commerce allows buyers a chance to DDDDD. a. compare information about companies and products b. get immediate results c. have access to a vast product selection d. A" -" and 4 e. none of the above 3AnswerM dJ p. '&;J (oderate5

6). According to the te.t" e-marketers should pay attention to the seven 4s of effective Web site design. DDDDD refers to the ways that the site enables user-to-user communication. a. 4onte.t b. 4ontent c. 4ommunity d. 4ustomi!ation e. 4ause 3AnswerM cJ p. ')>J @asy5 'rue1 alse 61. Tickers are online ads that pop up between changes on a Web site. 3AalseJ p. ')1J @asy5 66. #ntranets are networks that connect a company with its suppliers" distributors" and other outside partners. 3AalseJ p. '&6J 4hallenging5 68. @.tranets connect people within a company to each other and to the company network. 3AalseJ p. '&6J 4hallenging5 6;. The #nternet is a vast public web of computer networks that connect users to each other. 3TrueJ p. '&6J @asy5 8>. #n the 1;;>s" the #nternet was transformed from a mere communication tool into a revolutionary technology. 3TrueJ p. '&6J @asy5 81. 0ecent studies have shown that consumers do not trust the #nternet for gathering information about such things as choosing a school" finding a 2ob" or dealing with illness. 3AalseJ p. '&6J (oderate5

Word >>&

$age 11; of 1 1

8 . Aor most companies" the first step in conducting e-marketing is to place an ad online. 3AalseJ p. ''6J (oderate5 8&. $rivate trading e.changes are huge e-marketspaces in which buyers and sellers find each other online" share information" and complete transactions efficiently. 3TrueJ p. '' J 4hallenging5

8'. :nsolicited" unwanted commercial e-mail messages that clog up our e-mailbo.es are called Tspam.U 3AalseJ p. ')1J (oderate5 8). @-commerce includes all electronics-based information e.changes within or between companies and customers. 3AalseJ p. '&8J 4hallenging5 81. @-business involves the buying and selling process supported by electronic means" primarily the #nternet. 3AalseJ p. '&8J 4hallenging5 86. @-marketing is the buying side of e-commerce. 3AalseJ p. '&8J 4hallenging5 88. -rick-and-mortar companies avoid the e.pense of maintaining a store. 3AalseJ p. '''J @asy5 8;. - 4 Web sites deal with e.changes between businesses and companies. 3AalseJ p. ''>J @asy5 ;>. A blog may take the form of a library" a Tchat room"U or even a classified ad directory. 3TrueJ p. ''&J (oderate5 ;1. The new breed of e-mail ads is designed to command your attention through animation" interactive links" color photos" streaming video" and personali!ed audio messages. 3TrueJ p. ')1J 4hallenging5 ; . Transaction sites provide the hardware and software that enable #nternet communication and commerce. 3AalseJ p. '')J @asy5 ;&. $ermission-based methods allow customers to opt in or opt out to ensure that e-mails are sent to both current and prospective customers. 3TrueJ p. ')6J 4hallenging5 ;'. $ermission-based e-mail advertising allows marketers to send tailored messages to targeted customers who actually want to receive them. 3TrueJ p. ')6J @asy5 ;). @-commerce includes e-marketing and e-procurement. 3TrueJ p. '&8J @asy5

Word >>&

$age 16> of 1 1

;1. Today" young" techy" upscale professionals heavily populate use of the #nternet. 3AalseJ p. ''>J @asy5 ;6. #n the consumerHs mind" there is a fine line between legitimate marketing and spam. 3TrueJ p. ')6J (oderate5 ;8. (ost people would say that well-designed e-mail ads command attention and get customers to act. 3TrueJ p. ')1J (oderate5 ;;. The popular press has paid the least attention to - 4 e-commerce. 3AalseJ p. ''>J @asy5 1>>. #nternet consumers differ from traditional offline consumers in their approaches to buying. 3TrueJ p. ''1J @asy5 1>1. ,ales via - - e-commerce are e.pected to decrease in the ne.t decade. 3AalseJ p. '' J @asy5 1> . (ost - - e-commerce takes place through open trading e.changes. 3AalseJ p. '' J (oderate5 1>&. 4 4 e-commerce is facilitated by companies such as e-ay and Ama!on.com. 3TrueJ p. ''&J @asy5 1>'. Web logs" also known as blogs" are growing in popularity. 3TrueJ p. ''&J 4hallenging5 1>). 4onsumersH registering of complaints is a form of 4 4 e-commerce. 3TrueJ p. '''J @asy5 +ssay 1>1. (uch of the worldHs business today is carried out over networks that connect people and companies. @.plain what intranets and e.tranets are. #ntranets are networks that connect people within a company to each other and to the company network. @.tranets connect a company with its suppliers" distributors" and other outside partners. 3p. '&6J (oderate5

1>6. $rovide five ways that the #nternet benefits both final buyers and business buyers. #t can be convenient. -uying is easy and private. There is greater product access and selection. -uyers have access to a wealth of comparative information. +nline buying is interactive and immediate. 3p. '&8J (oderate5

Word >>& 1>8. What do the letters of the four ma2or #nternet domains stand for?

$age 161 of 1 1

- 4 3business-to-consumer5" - - 3business-to-business5" 4 4 3consumer-to-consumer5" and 4 3consumer-to-business5. 3p. ''>J 4hallenging5 1>;. What are five reasons dot-coms failed? Airst" some rushed into the market without proper research or planning. ,econd" many relied on spin and hype instead of developing sound marketing strategies. Third" flushed with investorsH cash" the dot-coms spent lavishly offline on mass marketing in an effort to establish brand identities and attract customers to their sites. Aourth" many dot-coms failed because they had poor business models. Ainally" the dot-com tended to devote too much effort to ac/uiring new customers instead of building loyalty. 3p. '')J 4hallenging5 11>. What is a corporate Web site? 4orporate Web sites are designed to build customer goodwill and to supplement other sales channels" rather than to sell the companyHs products directly. They offer a rich variety of information and other features in an effort to answer customer /uestions" build closer relationships" and generate e.citement about the company. They provide information about the companyHs history" its mission" and its philosophy. 3p. ''8J 4hallenging5 111. To attract new visitors and to encourage revisits" e-marketers should pay close attention to the seven 4s of effective Web site design. What are these seven 4s? 4onte.t" content" community" customi!ation" communication" connection" and commerce are the seven 4s. 3p. ')>J (oderate5 11 . #nternet marketing practices have raised a number of ethical and legal /uestions. Why is online privacy perhaps the number-one e-commerce concern? Web site activities provide e.tensive personal information. This may leave consumers open to information abuse if companies make unauthori!ed use of the information in marketing their products or e.changing databases with other companies. 3p. ');J @asy5 11&. What goes into designing e-mail ads to command attention? The new breed of e-mail ad is designed to command your attention by being loaded with glit!y features such as animation" interactive links" color photos" streaming video" and personali!ed audio messages. 3p. ')1J 4hallenging5 11'. 7ow does e-commerce benefit buyers and sellers? @-commerce benefits buyers by making buying convenient and private" providing greater product access and selection" and making available a wealth of product and buying information. #t is interactive and immediate and gives the consumers a greater measure of control over the buying process. Aor sellers" ecommerce is a powerful tool for building customer relationships. #t also increases the sellersH speed and efficiency" helping to reduce selling costs. @-commerce also offers great fle.ibility and better access to global markets.

Word >>& 3p. '&8J (oderate5

$age 16 of 1 1

11). +verview the promise and challenges that e-commerce presents for the future. @-commerce continues to offer great promise for the future. Aor most companies" online marketing will become an important part of a fully integrated marketing mi.. Aor others" it will be the ma2or means by which they serve the market. @ventually" the TeU will fall away from e-business or e-marketing as companies become more adept at integrating e-commerce with their everyday strategy and tactics. 7owever" ecommerce also faces many challenges. +ne challenge is Web profitabilityWsurprisingly few companies are using the Web profitably. The other challenge concerns legal and ethical issuesWissues of online privacy and security" #nternet fraud" and the digital divide. %espite these challenges" companies large and small are /uickly integrating online marketing into their marketing strategies and mi.es. 3p. ')8J 4hallenging5 5PP,IC5'I;N C;N'+N': Multiple=Choice >uestions 111. As *CY" #nc. ships a package to a customer" the accounting department is immediately notified to print and send an invoice. The information transferal between the shipping and accounting departments likely travels via DDDDD. a. the #nternet b. an e.tranet c. information repositories d. an intranet e. an analog system 3AnswerM dJ p. '&6J @asy5

Word >>& $age 16& of 1 1 116. -orders" #nc. began as a brick-and-mortar firm. #n recent years" many brick-and-mortar firms eventually became DDDDD in response to DDDDD. a. click-only firmsJ click-and-mortar competitorsH actions b. click-and-mortar firmsJ brick-and-mortar competitorsH actions c. click-and-mortar firmsJ click-only competitorsH actions d. obsoleteJ a growing number of click-and-mortar competitors e. none of the above 3AnswerM cJ p. '''J 4hallenging5 118. As an e-business manager" you may be re/uired to DDDDD. a. convince competitors to lower prices b. set up a Web site c. focus more on products than services d. A and e. none of the above 3AnswerM bJ p. ''6J (oderate5 11;. 4arina %wyer" owner of -looms Ialore" engages in e-commerce. ,he is likely to see improved benefit from DDDDD. a. receiving direct customer feedback b. learning more about specific customer needs c. reduced operating costs d. more efficient order processing e. all of the above 3AnswerM eJ p. '&;J @asy5 1 >. A-4 4ompany sells directly to consumers. A-4 4ompany avoids intermediaries. A-4 4ompany caters to a broad group of demographic segments. This marketer falls under which e-marketing domain? a. - 4 b. - c. 4 4 d. 4 e. A or 4 3AnswerM aJ p. ''>J @asy5 1 1. Acorn @nterprises offers product information online" as well as online customer support services. ,ome of AcornHs e-commerce takes place in open trading e.changes. Acorn falls under the DDDDD e-marketing domain" the largest e-marketing domain. a. - 4 b. - c. 4 4 d. 4 e. none of the above 3AnswerM bJ p. '' J (oderate5 1 . 0asbaugh Aarms benefits from a wide range of buyers. #n addition" the firm is linked with its own trading partners via a private site. 0asbaugh Aarms appears to be utili!ing DDDDD. a. an open trading e.change b. analog data c. a private trading e.change d. blogs

Word >>& e. 4 4 e-marketing 3AnswerM cJ p. '' J (oderate

$age 16' of 1 1

1 &. (arketplace.com is an e-tailer. Which of the follower statements might be true? a. (arketplace.com sells products or services directly to final buyers via the #nternet. b. (arketplace.com might be a click-only company. c. (arketplace.com began as a search engine and later added a storefront. d. A and e. All of the above. 3AnswerM eJ p. '''J @asy5 1 '. 4ompany * began as a brick-and-mortar company. Which of the following statements must be true? a. -y adding e-marketing options" 4ompany * would be a click-and-mortar company. b. 4ompany * is also considered a click-only dot-com. c. 4ompany * is an enabler site. d. 4ompany * is probably not making a profit. e. -y adding e-marketing options" 4ompany * became an #,$. 3AnswerM aJ p. '''J 4hallenging5 1 ). 4ompany * is a dot-com company that failed. What can be accurately assumed? a. 4ompany * rushed to market without proper planning. b. 4ompany * relied too heavily on spin instead of developing a marketing strategy. c. 4ompany * spent too much money trying to attract customers. d. 4ompany * may have spent too much effort trying to attract customers instead of building customer loyalty. e. =one of the above can be accurately assumed. 3AnswerM eJ p. '')J (oderate5

Word >>& $age 16) of 1 1 1 1. Which of the following does not represent channel conflict? a. 0etailer dropping 7ewlett-$ackard computers if 7ewlett-$ackard sells the same product online. b. R.4. $enneyHs catalog sales decreasing while online sales of the same products increase c. A drop in 9uarter $ounder sales when (c%onaldHs offers a ?Z& promotion for -ig (ac. d. All of the above. e. =one of the above. 3AnswerM cJ p. ''1J (oderate5 1 6. +ffice %epot is a click-and-mortar company. ,uch companies have an advantage. What might that include? a. +ffice %epot is a known name with greater financial resources. b. +ffice %epot has a large" established customer base. c. -y offering online marketing" +ffice %epot offers customers more options. d. :nwanted goods purchased online can be returned to a nearby store. e. All of the above. 3AnswerM eJ p. ''6J 4hallenging5 1 8. 4ompany - claims to currently be conducting e-marketingJ therefore" 4ompany - must be DDDDD. a. involved in global business b. placing ads online c. avoiding the use of e-mail d. planning to create a Web site e. - and % 3AnswerM bJ p. ''6J @asy5 1 ;. +scar Aviation has a corporate Web site. $rospective customers are likely able to DDDDD. a. learn about +scarHs philosophy b. ask online /uestions c. en2oy entertainment features on the site d. A and 4 e. all of the above 3AnswerM eJ p. ''8J @asy5 1&>. Adams 4utlery has an ineffective Web site. What might be missing? a. The site may not be updated. b. The site may not meet customer e.pectations. c. The site may lack important links. d. All of the above. e. =one of the above. 3AnswerM dJ p. '';J @asy5 1&1. #n attempting to design an effective Web site" 4ompany A tried to address all of the seven 4s. The site" however" has a weak layout and design. Which 4 does this represent? a. 4ustomi!ation. b. 4ontent. c. 4onte.t. d. 4onnection. e. 4ommunity. 3AnswerM cJ p. ')>J (oderate5

Word >>& $age 161 of 1 1 1& . Cou are looking up airline schedules on the #nternet. A flashing bar appears at the top of the screen e.claiming" T,tay at 7oliday #nn and get a ) percent discount[U This is a3n5 DDDDD. a. banner b. skyscraper c. content sponsorship d. microsite e. interstitial 3AnswerM aJ p. ')1J @asy5 1&&. Cou have accessed fare information on =orthwest AirlinesH Web site. Cou want to compare it with :nited AirlinesH fares. #n between sites" an ad pops up from Alamo 4ar 0ental. This is a3n5 DDDDD. a. banner b. skyscraper c. content sponsorship d. microsite e. interstitial 3AnswerM eJ p. ')1J @asy5 1&'. Cou see a tall" skinny ad at the side of a Web page. This is a3n5 DDDDD. a. banner b. skyscraper c. content sponsorship d. microsite e. interstitial 3AnswerM bJ p. ')1J @asy5

Word >>& $age 166 of 1 1 1&). 4ompany 4 is an online marketer that uses viral marketing. Rohn Cu" Web site coordinator" feels certain that viral marketing will be effective because DDDDD. a. 4ompany 4Hs newsletters have a button that allows recipients to easily forward the newsletter to friends. b. Rohn has created fun and attractive e-mail messages that are very likely to be passed on. c. 4ompany 4 has a large advertising budget. d. A and e. All of the above. 3AnswerM dJ p. ')&J (oderate5 :hort 5nswer 1&1. What is an intranet? #ntranets are networks that connect people within a company to each other and to the company network. 3p. '&6J @asy5 1&6. What is an e.tranet? An e.tranet connects a company with its suppliers" distributors" and other outside partners. 3p. '&6J @asy5 1&8. What is a brick-and-mortar firm? -rick-and-mortar firms are those companies that do not rely on e-business or e-marketingJ instead" they rely on a traditional store location. 3p. '&6J @asy5 1&;. What is viral marketing? Eiral marketing is the #nternet version of word-of-mouth marketing. Eiral marketing involves creating a Web site" e-mail message" or other event that is so infectious that customers will want to pass it along to their friends. 3p. ')&J @asy5 1'>. 7ow is e-commerce more specific than e-business? @-business includes all electronics-based information e.changes within or between companies and customersJ whereas" e-commerce involves buying and selling processes supported by electronic means" primarily the #nternet. 3p. '&8J (oderate5 1'1. 7ow can the #nternet provide benefits to buyers? #nternet buying can be convenientJ in addition" it is easy and private. 4ustomers also encounter fewer buying hassles and do not have to face salespeople or open themselves up to persuasion and emotional pitches. -usiness buyers can also learn about and buy products and services without waiting for and tying up time with salespeople. 3p. '&8J 4hallenging5

Word >>& 1' . 7ow can the #nternet provide benefits to sellers?

$age 168 of 1 1

The #nternet is a powerful tool for customer relationship building. +nline customers can ask online /uestions and receive feedback. The #nternet can also reduce costs and improve speed and efficiency. 3p. '&;J (oderate5 1'&. 7ow does e-marketing provide fle.ibility? @-marketing allows the marketer to make ongoing ad2ustments to its offers and programs. +nline catalogs" if used" can be ad2usted daily or even hourly if needed. -ecause the #nternet is a global tool" it allows buyers and sellers to click from one country to another country in seconds. 3p. '&8J 4hallenging5 1''. 7ow do #nternet consumers differ from traditional online consumers? They differ in their approaches to buying and in their responses to marketing. The e.change process via the #nternet has become more customer initiated and customer controlled. Traditional marketing targets a somewhat passive audienceJ e-marketing targets people who actively select which Web sites they will visit and what marketing information they will receive about which products and under what conditions. 3p. ''1J 4hallenging5 1'). What types of services do - - marketers offer online? (ost ma2or - - marketers now offer product information" customer purchasing" and customer support services online. 3p. '' J (oderate5 1'1. What is an open trading e.change? +pen trading e.changes are huge e-marketspaces in which buyers and sellers find each other online" share information" and complete transactions efficiently. 3p. '' J @asy5

Word >>& 1'6. What is a private trading e.change?

$age 16; of 1 1

+nline sellers are setting up their own private trading e.changes that link a particular seller with his or her own trading partners. 3p. '' J (oderate5 1'8. What types of information can be e.changed through a blog? A blog is a Web log" where daily scribblings can be posted about such narrow topics as baseball" politics" money" and so on. -logs give everyday people a chance to discuss whatever they want to discuss. 3p. ''&J (oderate5 1';. Iive three possible reasons why dot-coms failed. ,ome rushed into the market without proper planning. (any relied too heavily on spin and hype instead of developing sound marketing strategies. ,ome dot-coms spent lavishly offline on mass marketing in an effort establish brand identities and attract customers to their sites. (any dot-coms devoted too much effort to ac/uiring new customers rather than on building loyalty and purchase fre/uency among current customers. 3p. '')J 4hallenging5 1)>. 7ow could e-commerce create channel conflict? Adding e-commerce poses a fear that selling certain products or services online might compete with offline retailers and agents. 3p. ''1J (oderate5 1)1. What are click-and-mortar companies? A click-and-mortar company is one that likely began as a brick-and-mortar company then decided to add a touch of e-commerce. 3p. ''1J @asy5 1) . What are three elements of an effective Web site? @ffective Web sites attract people. ,ome of the most effective Web sites are those with attractive te.t" sound" and animation. Web site effectiveness can be measured by looking at the seven 4s of effective Web design. 3p. '';J @asy5

Word >>& 1)&. What are the seven 4s of effective Web site design?

$age 18> of 1 1

The seven 4s includeM conte.t" content" community" customi!ation" communication" connection" and commerce. 3p. ')>J (oderate5 1)'. What is involved with a content sponsorship?

4ontent sponsorships are a form of #nternet promotionJ many companies gain e.posure on the #nternet by sponsoring special content on various Web sites" such as news and financial information. ,ponsorships are best placed in carefully targeted sites where they can offer relevant information or service to the audience. 3p. ')1J (oderate5 1)). 7ow can an e-marketer benefit from a microsite?

(icrosites are limited areas on the Web managed and paid for by an e.ternal company. #nformation on a microsite is most likely connected to the information available on the host Web site. #nternet companies can also develop alliances and affiliate programs in which they work with other online companies to TadvertiseU each other. 3p. ')1J 4hallenging5 :cenario The Treble 4lef offers a complete line of sheet music" musical instruments" and novelty gifts of a musical nature. #n recent years" owner Iary Yahn has even served as the local representative of several musical instrument manufacturers" providing a contact person for three local school districts. T#f we donHt have it" chances are e.cellent that we can get it for you"U Iary tells all Treble 4lef visitors and customers. (ost walk-ins are particularly interested in a specific piece of sheet music from a particular era or 2ust browsing among the hundreds of musical knick-knacks in the store. Iary spends most of his time making presentations to beginning music students at the local schools and making bi-weekly visits to the schools in order to deliver instruments" to make minor reports when possible" or to pick up instruments to ship to the manufacturer for more complicated repairs. After dragging his feet for /uite some time" Iary was convinced that a Treble 4lef Web site could benefit a variety of customers. 7e began with a simple site e.plaining store hours and depicting types of gifts and services available. The site received so much response that Iary added a /uestion-and-answer option. 9uestions poured in" ranging from TWhere can # get the sheet music for \7ello" %ollyH?U to T%o you carry clarinet reeds?U to T(y sa.ophone needs two new pads. When will you be at @lmhurst school to repair it?U @ventually" customers found the capability of ordering musical novelties online with a credit card as well. A gift could now be wrapped and sent to the recipient at no e.tra charge. T# donHt know how we did it without our Web site"U Iary admitted. T#t allows us to be so responsive. And our novelties sales have doubled[U 1)1. 7ow is The Treble 4lef benefiting from the #nternet? The Treble 4lefHs Web site allows a tremendously shorter response time to customer /uestions. #n addition" novelties and sheet music can be ordered online for greater convenience" and basic information regarding store hours and available inventory can be accessed. 3p. '&6J @asy5

Word >>& 1)6. #n what way3s5 is The Treble 4lef a click-and-mortar company?

$age 181 of 1 1

The Treble 4lef began as a brick-and-mortar company but added Web access" becoming a click-and-mortar company with online sales and /uestion-and-answer channels. 3p. '&6J (oderate5 1)8. 7ow are The Treble 4lefHs buyers benefiting from the #nternet? The customers appear to be e.tremely satisfied with the very short response time to orders and online /uestions. 3p. '&8J @asy5 1);. #n what way could this marketer engage in customer relationship building through the #nternet? 4ustomer relationship building has apparently already begun with The Treble 4lefHs Web site. Iary may consider sending follow-up messages after answering customersH /uestions. -eginning music students at the local schools may appreciate occasional messages from The Treble 4lef" asking about their progress or satisfaction with their instruments. 3p. '&;J 4hallenging5 11>. #n your opinion" what is the most critical element this marketer should include in the Web site? Answers will vary. (ost will agree that the /uestion-and-answer option is critical. Also" a schedule of school visits may be appreciated. Ainally" because novelties sales have doubled" many students will recogni!e the importance of online ordering. 3p. '';J (oderate5

Word >>& 111. What types of online advertising might benefit The Treble 4lef?

$age 18 of 1 1

-anners that move across the screen when music-related information is sought may be effective. 4ontent sponsorships or microsites could possibly be arranged with the instrument manufacturers. 3p. ')1J (oderate5 11 . Would The Treble 4lef benefit from viral marketing? @.plain. The Treble 4lef could benefit by viral marketing with newsletters sent to the schoolsH band members and?or online customers. 4ustomer testimonials could also be forwarded to targeted groups. 3p. ')&J 4hallenging5 11&. #n what way might this marketer want to provide continuous e-mail for which consumers can communicate? As already mentioned" follow-up comments or /uestions to previously asked and answered customer /uestions can be effective. (onthly newsletters to the schoolsH band students" for e.ample" may also be important" especially in relationship building. 3p. '))J (oderate5 11'. 7ow could spam harm this marketer? -ecause Iary Yahn is becoming very reliant on The Treble 4lefHs Web site and #nternet technology for the success of his business" he will want to avoid any unnecessary #nternet information that could somehow harm the efficiency and credibility of The Treble 4lef. 3p. ')1J 4hallenging5 11). #n what area3s5 might online privacy be important for this marketer? 4ustomers have to feel secure in ordering online via a credit card. #n addition" because so many customers are relying on the #nternet to communicate with Iary" he has to assure them that their information is protected and not being supplied to other marketers. 3p. ');J 4hallenging5
1. A paradigm for electronic communications where a dedicated path is opened and maintained during the exchange is called: a. message switching. b. circuit switching. c. packet switching. d. data switching. e. analog switching. 2. The development of a internationally distributed collection of multimedia files addressed using universal resource locators led to the: a. Telnet package. b. Email system. c. orld!wide!web.

Word >>&
d. "T# package. e. $omain resource locator.

$age 18& of 1 1

%. The problems of using &# numbers for addressing hosts in the &nternet are resolved using: a. the concept of domains and the use of domain names. b. the use of Telnet applications. c. the use of email servers. d. splitting &# addresses into four octets. e. using fixed routing paths through the network. '. The $omain (ame )ystem *$()+ is comprised of four elements. (,T one of these elementsa. The domain name space b. &# addresses c. $() database d. (ame servers e. .esolvers hich of the following is

Word >>&
/. The key features of the $() database are:

$age 18' of 1 1

a. variable!depth hierarchy for names0 distributed databases0 and name servers. b. .esolvers0 distributed databases0 and name servers. c. $istribution controlled by the database0 resolvers0 and distributed databases. d. $omain name spaces0 name servers0 and variable!depth hierarchies. e. 1ariable!depth hierarchy for names0 distributed databases0 and distribution controlled by the database.

Attempt to answer the following questions from your text:

]'.1O 4ompare and contrast circuit switching and packet switching. %escribe the tradeoffs between the two technologies. Why is packet switching the more appropriate mechanism for the operation of the #nternet?

Você também pode gostar