Frage 1
Frage
The three activities in an information system that produce the information organizations use to control operations are:
Antworten
-
Information retrieval, research, and analysis.
-
Input, output, and feedback.
-
Input, processing, and output.
-
Data analysis, processing, and feedback.
Frage 2
Antworten
-
Is feedback that has been processed to create meaningful information.
-
Is information that is returned to appropriate members of the organization to help them evaluate the input stage.
-
Transfers raw data to the people who will use it or to the activities for which it will be used.
-
Transfers processed information to the people who will use it or to the activities for which it will be used.
Frage 3
Frage
Converting raw data into a more meaningful form is called:
Antworten
-
Capturing
-
Processing
-
Organizing
-
Feeback
Frage 4
Antworten
-
Results in a clear-cut division of labor.
-
Is composed primarily of experts trained for different functions.
-
Is a pyramid structure of rising authority and responsibility.
-
Is used primarily in large organizations to define job roles.
Frage 5
Frage
The field that deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm, is called:
Antworten
-
Information systems literacy.
-
Information systems architecture.
-
Management information systems.
-
Information technology infrastructure.
Frage 6
Frage
All of the following can be considered managerial responsibilities except:
Antworten
-
Making action plans to solve organizational problems.
-
Creating new products and services.
-
Designing new information systems
-
Allocating human resources to coordinate the work to be done
Frage 7
Frage
Data management technology consists of:
Antworten
-
The physical hardware and media used by an organization for storing data.
-
The detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.
-
The software governing the organization of data on physical storage media.
-
The hardware and software used to transfer data.
Frage 8
Frage
Promoting the organization's products or services is a responsibility of the ________ function.
Frage 9
Frage
Checking for product quality is an activity associated with the ______ function.
Frage 10
Frage
That assist with paperwork at all levels of the firm are called:
Antworten
-
Data workers.
-
Knowledge workers.
-
Operational management.
-
Service workers.
Frage 11
Frage
The three principal levels of hierarchies within a business organization are:
Antworten
-
Management, knowledge workers, and service workers.
-
Senior management, middle management, and operational management.
-
Management, data workers, and operational management.
-
Senior management, operational management, and workers.
Frage 12
Frage
Engineers and architects are examples of:
Antworten
-
Senior management.
-
Production workers.
-
Knowledge workers.
-
Middle management.
Frage 13
Frage
Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?
Frage 14
Frage
________ is the ability to offer individually tailored products or services using the same production resources as bulk production.
Antworten
-
Mass customization
-
Size customization
-
Personalization
-
Demand customization
Frage 15
Frage
A substitute product of most concern for a cable TV distributor is:
Antworten
-
Satellite TV.
-
Broadcast TV.
-
Satellite radio.
-
The Internet.
Frage 16
Frage
When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, it is often referred to as creating:
Antworten
-
Value webs.
-
Value chains.
-
Synergies.
-
Core competencies.
Frage 17
Frage
The iPad can be seen as a disruptive technology for the ___________ industry.
Antworten
-
Publishing
-
Music
-
Software
-
Travel
Frage 18
Frage
A ___________ is an activity at which a firm excels as a world-class leader.
Antworten
-
Best practice
-
Competitive advantage
-
Primary activity
-
Core competency
Frage 19
Frage
Which of the following can force a business and its competitors to compete on price alone?
Frage 20
Frage
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
Frage 21
Frage
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
Antworten
-
Responsibility
-
Accountability
-
Liability
-
Due process
Frage 22
Frage
The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
Antworten
-
Liability
-
Due process
-
The courts of appeal
-
Accountability
Frage 23
Frage
Which of the five moral dimensions of the information age do the central business activities of
Choice Point raise?
Antworten
-
Property rights and obligations
-
System quality
-
Accountability and control
-
Information rights and obligations
Frage 24
Frage
All of the following are current key technology trends raising ethical issues except:
Antworten
-
Data storage improvements.
-
Data analysis advancements.
-
Increase in multimedia quality
-
Increase in use of mobile devices
Frage 25
Frage
Types of information gathered by Web site tracking tools include all of the following except:
Antworten
-
Health concerns
-
Birthplace
-
Income
-
Purchases
Frage 26
Frage
An extranet is a private intranet extended to authorized users outside the organization.
Frage 27
Frage
Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach.
Frage 28
Frage
Developing a new product, fulfilling an order, or hiring a new employee are all examples of business processes.
Frage 29
Frage
Business processes are those logically related tasks for accomplishing tasks that have been formally encoded by an organization.
Frage 30
Frage
As a result of new public laws, accountants are beginning to perform more technical duties, such as auditing systems and networks.
Frage 31
Frage
A network requires at least three computers and a shared resource.
Frage 32
Frage
Senior management is responsible for directing the day-to-day activities of the business.
Frage 33
Frage
Transaction processing systems are most commonly encountered at the senior management level of an organization.
Frage 34
Frage
Transaction processing systems are the basic business systems that serve the operational level of the organization.
Frage 35
Frage
Most MISs use sophisticated mathematical models or statistical techniques.
Frage 36
Frage
ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.
Frage 37
Frage
ESSs are designed primarily to solve specific problems.
Frage 38
Frage
A firm can be said to have competitive advantage when it has higher stock market valuations than its competitors.
Frage 39
Frage
A primary challenge in BPM is employee resistance.
Frage 40
Frage
A transparent marketplace means that there is high product differentiation.
Frage 41
Frage
The greatest barrier to changing business processes is, ironically, management itself.
Frage 42
Frage
BPM is considered concluded when the new processes are both implemented and accepted.
Frage 43
Frage
In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer.
Frage 44
Frage
Advances in data storage have made routine violation of individual privacy more difficult.
Frage 45
Frage
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.
Frage 46
Frage
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
Frage 47
Frage
Most Internet businesses do very little to protect the privacy of their customers.
Frage 48
Frage
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
Frage 49
Frage
Spyware is software that comes hidden in downloaded applications and can track your online movements.
Frage 50
Frage
Most American and European privacy law is based on a set of five principles called COPPA.
Frage 51
Frage
Software used to apply the computer to a specific task for an end user is called:
Frage 52
Frage
Legacy systems are still in use today because:
Antworten
-
they can only be run on the older mainframe computers.
-
they are too expensive to redesign.
-
many integrate well using new Web services technologies.
-
they contain valuable data that would be lost during redesign.
Frage 53
Frage
_________ describes the practices and technologies used minimize the environmental effects of manufacturing and managing computing devices.
Antworten
-
Capacity planning
-
Cloud computing
-
Green computing
-
Autonomic computing
Frage 54
Frage
An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called:
Antworten
-
grid computing.
-
utility computing.
-
cloud computing.
-
autonomic computing.
Frage 55
Frage
Microsoft Word is an example of:
Antworten
-
open-source software.
-
word-processing software.
-
software productivity suite.
-
data management software.
Frage 56
Frage
Microsoft Excel is an example of:
Frage 57
Frage
An example of a pre-digital database is a:
Frage 58
Frage
Which of the following best illustrates the relationship between entities and attributes?
Antworten
-
The entity CUSTOMER with the attribute PRODUCT
-
The entity CUSTOMER with the attribute ADDRESS
-
The entity PRODUCT with the attribute PURCHASE
-
The entity PRODUCT with the attribute CUSTOMER
Frage 59
Frage
In a relational database, a record is also called a(n):
Frage 60
Frage
A field identified in a record as holding the unique identifier for that record is called the:
Antworten
-
primary key.
-
key field.
-
primary field.
-
foreign key.
Frage 61
Frage
Which of the following would you use to find out which Web sites with content related to database design were the most often linked to by other Web sites?
Antworten
-
Web usage mining
-
Web server mining
-
Web structure mining
-
Web content mining
Frage 62
Frage
Which of the following is not a typical feature of DBMS?
Frage 63
Frage
A ______________ is special software that routes and manages communications on the network and coordinates networks resources.
Frage 64
Frage
Which of the following statements is not true about search engines?
Antworten
-
They are arguably the Internet's "killer app."
-
They have solved the problem of how users instantly find information on the Internet
-
They are monetized almost exclusively by search engine marketing.
-
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Frage 65
Frage
Which of the following is an example of the "visual Web"?
Antworten
-
Twitter
-
Blogger
-
Pinterest
-
Facebook
Frage 66
Frage
A LAN would be used to connect all of the following except:
Antworten
-
all of the computers in a large building.
-
all of the devices within a 10-meter area.
-
all of the computers in a city.
-
all of the computers in a small office.
Frage 67
Frage
What is the primary difference between 3G and 4G cellular systems?
Antworten
-
4G systems are digital.
-
4G systems have greater transmission speeds.
-
3G systems are unable to handle Web browsing.
-
3G systems have poor security.
Frage 68
Frage
__________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
Antworten
-
Wireless networks
-
Intranets
-
Virtual private networks
-
Unified communications
Frage 69
Antworten
-
Trojan horses that appears to the user to be a legitimate commercial software application.
-
e-mail messages that mimic the e-mail messages of a legitimate business.
-
fraudulent Web sites that mimic a legitimate business's Web site.
-
bogus wireless network access points that look legitimate to users.
Frage 70
Frage
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
Frage 71
Frage
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:
Antworten
-
sniffing
-
social engineering
-
phishing
-
pharming
Frage 72
Frage
Which of the following is a type of ambient data?
Antworten
-
Computer log containing recent system errors
-
A file deleted from a hard disk
-
A file that contains an application's user settings
-
A set of raw data from an environmental sensor
Frage 73
Frage
Computer forensics tasks include all of the following except:
Antworten
-
presenting collected evidence in a court of law.
-
securely storing recovered electronic data
-
collecting physical evidence on the computer
-
finding significant information in a large volume of electronic data
Frage 74
Frage
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
Antworten
-
high-availability computing
-
recovery-oriented computing
-
fault-tolerant computing
-
disaster-recovery planning
Frage 75
Frage
Most antivirus software is effective against:
Antworten
-
only those viruses active on the Internet and through e-mail
-
any virus.
-
any virus except those in wireless communications applications
-
only those viruses already known when the software is written
Frage 76
Frage
Systems integration means ensuring the legacy systems work with new elements of the infrastructure.
Frage 77
Frage
Using an online storage service such as DropBox is a type of virtualization.
Frage 78
Frage
SaaS providers deliver and provide Web-based, remote access to storage.
Frage 79
Frage
One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware.
Frage 80
Frage
Total cost of ownership components include costs for downtime, training, and support.
Frage 81
Frage
The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.
Frage 82
Frage
Web mining is the discovery of useful patterns on the Web.
Frage 83
Frage
Every record in a file should contain at least one key field.
Frage 84
Frage
OLAP is a key tool of BI.
Frage 85
Frage
Data cleansing is the same process as data scrubbing
Frage 86
Frage
The two key services of Hadoop are HDFS and in-memory computing
Frage 87
Frage
DBMS simplify how end users work with databases by separating the logical and physical views of the data.
Frage 88
Frage
To create a computer network, you must have at least two computers.
Frage 89
Frage
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.
Frage 90
Frage
Mobile search makes up approximately 10% of all Internet searches
Frage 91
Frage
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
Frage 92
Frage
VoIP technology delivers voice information in digital form using packet switching.
Frage 93
Frage
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
Frage 94
Frage
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
Frage 95
Frage
The term cracker is used to identify a hacker whose specialty is breaking open security systems
Frage 96
Frage
The term cracker is used to identify a hacker whose specialty is breaking open security systems
Frage 97
Frage
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
Frage 98
Frage
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
Frage 99
Frage
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Frage 100
Frage
SSL is a protocol used to establish a secure connection between two computers.
Frage 101
Frage
Enterprise software is built around thousands of predefined business processes that reflect:
Frage 102
Frage
Which of the following is not true about enterprise systems?
Antworten
-
Enterprise systems help firms respond rapidly to customer requests for information or products.
-
Enterprise system data have standardized definitions and formats that are accepted by the entire organization.
-
Enterprise software is expressly built to allow companies to mimic their unique business practices.
-
Enterprise software includes analytical tools to evaluate overall organizational performance.
Frage 103
Frage
When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with:
Antworten
-
configuration tables
-
Web services
-
data dictionaries
-
middleware
Frage 104
Frage
In order to achieve maximum benefit from an enterprise software package, a business:
Antworten
-
customizes the software to match all of its business processes
-
uses only the processes in the software that match its own processes
-
changes the way it works to match the software's business processes
-
selects only the software that best matches its existing business processes.
Frage 105
Frage
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the:
Antworten
-
supplier's internal supply chain
-
external supply chain
-
upstream portion of the supply chain
-
downstream portion of the supply chain
Frage 106
Frage
Why is overstocking warehouses not an effective solution for a problem of low availability?
Antworten
-
It does not speed product time to market
-
It is an inefficient use of raw materials
-
It increases sales costs
-
It increases inventory costs
Frage 107
Frage
Which of the following is not one of the unique features of e-commerce technology
Antworten
-
Information density
-
Transparency
-
Richness
-
Social technology
Frage 108
Frage
The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?
Frage 109
Frage
Selling products and services directly to individual consumers via the Internet best describes
Antworten
-
B2B e-commerce
-
C2C e-commerce
-
M-commerce
-
B2C e-commerce
Frage 110
Frage
Transaction brokers
Antworten
-
generate revenue from advertising or from directing buyers to sel
-
save users money and time by processing online sales transactions.
-
provide a digital environment where buyers and sellers can establish prices for products
-
sell physical products directly to consumers or individual businesses.
Frage 111
Antworten
-
the use of Internet technologies for electronic data transactions
-
the exchange between two organizations of standard transactions through a network
-
electronic data invoicing
-
electronic delivery infrastructure
Frage 112
Frage
Goods that are involved in the actual production process are referred to as:
Antworten
-
raw materials
-
direct goods.
-
purchasing goods
-
indirect goods
Frage 113
Frage
Where there is no well-understood or agreed-on procedure for making a decision, it is said to be
Antworten
-
undocumented
-
unstructured
-
documented
-
semistructured
Frage 114
Frage
The type of decision that can be made by following a definite procedure is called a(n) ___________ decision.
Antworten
-
structured
-
unstructured
-
semistructured
-
procedural
Frage 115
Frage
Simon's four different stages in decision making are, in order from first to last
Antworten
-
identification, choice, design, and implementation
-
identification, design, choice, and finalization
-
intelligence, choice, design, and implementation
-
intelligence, design, choice, and implementation.
Frage 116
Frage
Which dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties?
Antworten
-
Due process
-
Justice
-
Fairness
-
Coherence
Frage 117
Frage
All of the following are analytic functionalities that BI systems deliver except:
Antworten
-
user interface
-
ad hoc queries
-
dashboards
-
production reports
Frage 118
Frage
Why is the balanced scorecard method said to be "balanced"?
Antworten
-
It uses measurable dimensions for assessing performance
-
It measures performance of more than just financial systems
-
It assesses both the internally focused and externally focused business processes
-
It measures performance along all major divisions of a firm, from production and manufacturing to human resources.
Frage 119
Frage
"Hidden costs," such as _________ costs, can easily undercut anticipated benefits from outsourcing.
Antworten
-
vendor selection
-
hardware
-
software
-
employee salary
Frage 120
Frage
The primary tool for representing a system's component processes and the flow of data between them is the:
Frage 121
Frage
You would expect to find all of the following in an information systems plan except
Antworten
-
key business processes
-
budget requirements
-
portfolio analysis
-
milestones and planning
Frage 122
Frage
__________ is a method for deciding among alternative systems based on a system of ratings for selected objectives.
Antworten
-
A scoring model
-
A scorecard
-
Portfolio analysis
-
Risk analysis
Frage 123
Frage
A systems analysis includes a ____________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.
Antworten
-
test plan
-
conversion plan
-
feasibility study
-
risk analysis
Frage 124
Frage
The project risk will rise if the project team and the IS staff lack
Frage 125
Frage
____________ are tangible benefits of information systems.
Antworten
-
Improved asset utilization, increased organizational learning, and improved operations
-
Reduced workforce, lower outside vendor costs, and increased productivity
-
Increased productivity, reduced workforce, and increased job satisfaction
-
Lower operational costs, improved resource control, and more information
Frage 126
Frage
Supply chain management systems are a type of enterprise system
Frage 127
Frage
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products.
Frage 128
Frage
Total supply chain costs in some industries approach 75 percent of the total operating budget
Frage 129
Frage
CRM software can help organizations identify high-value customers for preferential treatments
Frage 130
Frage
Enterprise systems require fundamental changes in the way the business operates.
Frage 131
Frage
The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
Frage 132
Frage
Rich media advertisements are a sales-oriented marketing format
Frage 133
Frage
An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.
Frage 134
Frage
Ninety-six percent of all U.S. households with Internet access use a broadband connection
Frage 135
Frage
Automobile manufacturing is an example of a vertical market
Frage 136
Frage
In the free/freemium revenue model, firms offer basic services for free and charge a fee for special features.
Frage 137
Frage
Web personalization is used primarily as a major marketing tool
Frage 138
Frage
In high-velocity automated decision making, humans are eliminated from the decision chain
Frage 139
Frage
DSS primarily address structured problems
Frage 140
Frage
GDSS are designed to display data in the form of digitized maps
Frage 141
Frage
CBR is used in diagnostic systems in medicine
Frage 142
Frage
Shopping bots are a form of intelligent agent
Frage 143
Frage
Enterprise-wide knowledge management systems deal with structured and semistructured knowledge, while other systems are used for unstructured knowledge.
Frage 144
Frage
Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents.
Frage 145
Frage
Documentation reveals how well the system has met its original objectives
Frage 146
Frage
Gantt and PERT charts are two common formal planning tools for project managemen
Frage 147
Frage
More timely information is a tangible benefit of information systems
Frage 148
Frage
An information systems plan shows how specific information systems fit into a company's overall business plan and business strategy.
Frage 149
Frage
End-user-developed systems can be completed more rapidly than those developed through the conventional programming tools.
Frage 150
Frage
A new information system is not considered in production until conversion is complete