stevensae
Quiz by , created more than 1 year ago

Quiz on INFO 360 tests 1-3 , created by stevensae on 10/12/2015.

49
1
0
No tags specified
stevensae
Created by stevensae almost 9 years ago
Close

INFO 360 tests 1-3

Question 1 of 150

1

The three activities in an information system that produce the information organizations use to control operations are:

Select one of the following:

  • Information retrieval, research, and analysis.

  • Input, output, and feedback.

  • Input, processing, and output.

  • Data analysis, processing, and feedback.

Explanation

Question 2 of 150

1

Output:

Select one of the following:

  • Is feedback that has been processed to create meaningful information.

  • Is information that is returned to appropriate members of the organization to help them evaluate the input stage.

  • Transfers raw data to the people who will use it or to the activities for which it will be used.

  • Transfers processed information to the people who will use it or to the activities for which it will be used.

Explanation

Question 3 of 150

1

Converting raw data into a more meaningful form is called:

Select one of the following:

  • Capturing

  • Processing

  • Organizing

  • Feeback

Explanation

Question 4 of 150

1

A hierarchy:

Select one of the following:

  • Results in a clear-cut division of labor.

  • Is composed primarily of experts trained for different functions.

  • Is a pyramid structure of rising authority and responsibility.

  • Is used primarily in large organizations to define job roles.

Explanation

Question 5 of 150

1

The field that deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm, is called:

Select one of the following:

  • Information systems literacy.

  • Information systems architecture.

  • Management information systems.

  • Information technology infrastructure.

Explanation

Question 6 of 150

1

All of the following can be considered managerial responsibilities except:

Select one of the following:

  • Making action plans to solve organizational problems.

  • Creating new products and services.

  • Designing new information systems

  • Allocating human resources to coordinate the work to be done

Explanation

Question 7 of 150

1

Data management technology consists of:

Select one of the following:

  • The physical hardware and media used by an organization for storing data.

  • The detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.

  • The software governing the organization of data on physical storage media.

  • The hardware and software used to transfer data.

Explanation

Question 8 of 150

1

Promoting the organization's products or services is a responsibility of the ________ function.

Select one of the following:

  • Finance and accounting

  • Human resources

  • Manufacturing and production

  • Sales and marketing

Explanation

Question 9 of 150

1

Checking for product quality is an activity associated with the ______ function.

Select one of the following:

  • Finance and accounting

  • Human resources

  • Manufacturing and production

  • Sales and marketing

Explanation

Question 10 of 150

1

That assist with paperwork at all levels of the firm are called:

Select one of the following:

  • Data workers.

  • Knowledge workers.

  • Operational management.

  • Service workers.

Explanation

Question 11 of 150

1

The three principal levels of hierarchies within a business organization are:

Select one of the following:

  • Management, knowledge workers, and service workers.

  • Senior management, middle management, and operational management.

  • Management, data workers, and operational management.

  • Senior management, operational management, and workers.

Explanation

Question 12 of 150

1

Engineers and architects are examples of:

Select one of the following:

  • Senior management.

  • Production workers.

  • Knowledge workers.

  • Middle management.

Explanation

Question 13 of 150

1

Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?

Select one of the following:

  • ESS

  • TPS

  • MIS

  • DSS

Explanation

Question 14 of 150

1

________ is the ability to offer individually tailored products or services using the same production resources as bulk production.

Select one of the following:

  • Mass customization

  • Size customization

  • Personalization

  • Demand customization

Explanation

Question 15 of 150

1

A substitute product of most concern for a cable TV distributor is:

Select one of the following:

  • Satellite TV.

  • Broadcast TV.

  • Satellite radio.

  • The Internet.

Explanation

Question 16 of 150

1

When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, it is often referred to as creating:

Select one of the following:

  • Value webs.

  • Value chains.

  • Synergies.

  • Core competencies.

Explanation

Question 17 of 150

1

The iPad can be seen as a disruptive technology for the ___________ industry.

Select one of the following:

  • Publishing

  • Music

  • Software

  • Travel

Explanation

Question 18 of 150

1

A ___________ is an activity at which a firm excels as a world-class leader.

Select one of the following:

  • Best practice

  • Competitive advantage

  • Primary activity

  • Core competency

Explanation

Question 19 of 150

1

Which of the following can force a business and its competitors to compete on price alone?

Select one of the following:

  • High product differentiation

  • Poor process efficiency

  • Demand control

  • Transparent marketplace

Explanation

Question 20 of 150

1

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:

Select one of the following:

  • Family and home.

  • Property rights and obligations

  • System quality.

  • Quality of life.

Explanation

Question 21 of 150

1

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:

Select one of the following:

  • Responsibility

  • Accountability

  • Liability

  • Due process

Explanation

Question 22 of 150

1

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:

Select one of the following:

  • Liability

  • Due process

  • The courts of appeal

  • Accountability

Explanation

Question 23 of 150

1

Which of the five moral dimensions of the information age do the central business activities of
Choice Point raise?

Select one of the following:

  • Property rights and obligations

  • System quality

  • Accountability and control

  • Information rights and obligations

Explanation

Question 24 of 150

1

All of the following are current key technology trends raising ethical issues except:

Select one of the following:

  • Data storage improvements.

  • Data analysis advancements.

  • Increase in multimedia quality

  • Increase in use of mobile devices

Explanation

Question 25 of 150

1

Types of information gathered by Web site tracking tools include all of the following except:

Select one of the following:

  • Health concerns

  • Birthplace

  • Income

  • Purchases

Explanation

Question 26 of 150

1

An extranet is a private intranet extended to authorized users outside the organization.

Select one of the following:

  • True
  • False

Explanation

Question 27 of 150

1

Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach.

Select one of the following:

  • True
  • False

Explanation

Question 28 of 150

1

Developing a new product, fulfilling an order, or hiring a new employee are all examples of business processes.

Select one of the following:

  • True
  • False

Explanation

Question 29 of 150

1

Business processes are those logically related tasks for accomplishing tasks that have been formally encoded by an organization.

Select one of the following:

  • True
  • False

Explanation

Question 30 of 150

1

As a result of new public laws, accountants are beginning to perform more technical duties, such as auditing systems and networks.

Select one of the following:

  • True
  • False

Explanation

Question 31 of 150

1

A network requires at least three computers and a shared resource.

Select one of the following:

  • True
  • False

Explanation

Question 32 of 150

1

Senior management is responsible for directing the day-to-day activities of the business.

Select one of the following:

  • True
  • False

Explanation

Question 33 of 150

1

Transaction processing systems are most commonly encountered at the senior management level of an organization.

Select one of the following:

  • True
  • False

Explanation

Question 34 of 150

1

Transaction processing systems are the basic business systems that serve the operational level of the organization.

Select one of the following:

  • True
  • False

Explanation

Question 35 of 150

1

Most MISs use sophisticated mathematical models or statistical techniques.

Select one of the following:

  • True
  • False

Explanation

Question 36 of 150

1

ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.

Select one of the following:

  • True
  • False

Explanation

Question 37 of 150

1

ESSs are designed primarily to solve specific problems.

Select one of the following:

  • True
  • False

Explanation

Question 38 of 150

1

A firm can be said to have competitive advantage when it has higher stock market valuations than its competitors.

Select one of the following:

  • True
  • False

Explanation

Question 39 of 150

1

A primary challenge in BPM is employee resistance.

Select one of the following:

  • True
  • False

Explanation

Question 40 of 150

1

A transparent marketplace means that there is high product differentiation.

Select one of the following:

  • True
  • False

Explanation

Question 41 of 150

1

The greatest barrier to changing business processes is, ironically, management itself.

Select one of the following:

  • True
  • False

Explanation

Question 42 of 150

1

BPM is considered concluded when the new processes are both implemented and accepted.

Select one of the following:

  • True
  • False

Explanation

Question 43 of 150

1

In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer.

Select one of the following:

  • True
  • False

Explanation

Question 44 of 150

1

Advances in data storage have made routine violation of individual privacy more difficult.

Select one of the following:

  • True
  • False

Explanation

Question 45 of 150

1

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

Select one of the following:

  • True
  • False

Explanation

Question 46 of 150

1

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

Select one of the following:

  • True
  • False

Explanation

Question 47 of 150

1

Most Internet businesses do very little to protect the privacy of their customers.

Select one of the following:

  • True
  • False

Explanation

Question 48 of 150

1

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

Select one of the following:

  • True
  • False

Explanation

Question 49 of 150

1

Spyware is software that comes hidden in downloaded applications and can track your online movements.

Select one of the following:

  • True
  • False

Explanation

Question 50 of 150

1

Most American and European privacy law is based on a set of five principles called COPPA.

Select one of the following:

  • True
  • False

Explanation

Question 51 of 150

1

Software used to apply the computer to a specific task for an end user is called:

Select one of the following:

  • system software.

  • application software.

  • data management software.

  • network software.

Explanation

Question 52 of 150

1

Legacy systems are still in use today because:

Select one of the following:

  • they can only be run on the older mainframe computers.

  • they are too expensive to redesign.

  • many integrate well using new Web services technologies.

  • they contain valuable data that would be lost during redesign.

Explanation

Question 53 of 150

1

_________ describes the practices and technologies used minimize the environmental effects of manufacturing and managing computing devices.

Select one of the following:

  • Capacity planning

  • Cloud computing

  • Green computing

  • Autonomic computing

Explanation

Question 54 of 150

1

An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called:

Select one of the following:

  • grid computing.

  • utility computing.

  • cloud computing.

  • autonomic computing.

Explanation

Question 55 of 150

1

Microsoft Word is an example of:

Select one of the following:

  • open-source software.

  • word-processing software.

  • software productivity suite.

  • data management software.

Explanation

Question 56 of 150

1

Microsoft Excel is an example of:

Select one of the following:

  • data management software.

  • spreadsheet software.

  • presentation graphics.

  • word processing software.

Explanation

Question 57 of 150

1

An example of a pre-digital database is a:

Select one of the following:

  • library's card-catalog.

  • cash register receipt.

  • doctor's office invoice.

  • list of sales totals on a spreadsheet.

Explanation

Question 58 of 150

1

Which of the following best illustrates the relationship between entities and attributes?

Select one of the following:

  • The entity CUSTOMER with the attribute PRODUCT

  • The entity CUSTOMER with the attribute ADDRESS

  • The entity PRODUCT with the attribute PURCHASE

  • The entity PRODUCT with the attribute CUSTOMER

Explanation

Question 59 of 150

1

In a relational database, a record is also called a(n):

Select one of the following:

  • tuple

  • row

  • entity

  • field

Explanation

Question 60 of 150

1

A field identified in a record as holding the unique identifier for that record is called the:

Select one of the following:

  • primary key.

  • key field.

  • primary field.

  • foreign key.

Explanation

Question 61 of 150

1

Which of the following would you use to find out which Web sites with content related to database design were the most often linked to by other Web sites?

Select one of the following:

  • Web usage mining

  • Web server mining

  • Web structure mining

  • Web content mining

Explanation

Question 62 of 150

1

Which of the following is not a typical feature of DBMS?

Select one of the following:

  • Data manipulation language

  • Report generation tools

  • Data dictionary

  • Query wizard tool

Explanation

Question 63 of 150

1

A ______________ is special software that routes and manages communications on the network and coordinates networks resources.

Select one of the following:

  • switch

  • firewall

  • server

  • network operating system/NOS

Explanation

Question 64 of 150

1

Which of the following statements is not true about search engines?

Select one of the following:

  • They are arguably the Internet's "killer app."

  • They have solved the problem of how users instantly find information on the Internet

  • They are monetized almost exclusively by search engine marketing.

  • There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

Explanation

Question 65 of 150

1

Which of the following is an example of the "visual Web"?

Select one of the following:

  • Twitter

  • Blogger

  • Pinterest

  • Facebook

Explanation

Question 66 of 150

1

A LAN would be used to connect all of the following except:

Select one of the following:

  • all of the computers in a large building.

  • all of the devices within a 10-meter area.

  • all of the computers in a city.

  • all of the computers in a small office.

Explanation

Question 67 of 150

1

What is the primary difference between 3G and 4G cellular systems?

Select one of the following:

  • 4G systems are digital.

  • 4G systems have greater transmission speeds.

  • 3G systems are unable to handle Web browsing.

  • 3G systems have poor security.

Explanation

Question 68 of 150

1

__________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.

Select one of the following:

  • Wireless networks

  • Intranets

  • Virtual private networks

  • Unified communications

Explanation

Question 69 of 150

1

Evil twins are:

Select one of the following:

  • Trojan horses that appears to the user to be a legitimate commercial software application.

  • e-mail messages that mimic the e-mail messages of a legitimate business.

  • fraudulent Web sites that mimic a legitimate business's Web site.

  • bogus wireless network access points that look legitimate to users.

Explanation

Question 70 of 150

1

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?

Select one of the following:

  • Wireless network

  • Employees

  • Authentication procedures

  • Lack of data encryption

Explanation

Question 71 of 150

1

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:

Select one of the following:

  • sniffing

  • social engineering

  • phishing

  • pharming

Explanation

Question 72 of 150

1

Which of the following is a type of ambient data?

Select one of the following:

  • Computer log containing recent system errors

  • A file deleted from a hard disk

  • A file that contains an application's user settings

  • A set of raw data from an environmental sensor

Explanation

Question 73 of 150

1

Computer forensics tasks include all of the following except:

Select one of the following:

  • presenting collected evidence in a court of law.

  • securely storing recovered electronic data

  • collecting physical evidence on the computer

  • finding significant information in a large volume of electronic data

Explanation

Question 74 of 150

1

The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:

Select one of the following:

  • high-availability computing

  • recovery-oriented computing

  • fault-tolerant computing

  • disaster-recovery planning

Explanation

Question 75 of 150

1

Most antivirus software is effective against:

Select one of the following:

  • only those viruses active on the Internet and through e-mail

  • any virus.

  • any virus except those in wireless communications applications

  • only those viruses already known when the software is written

Explanation

Question 76 of 150

1

Systems integration means ensuring the legacy systems work with new elements of the infrastructure.

Select one of the following:

  • True
  • False

Explanation

Question 77 of 150

1

Using an online storage service such as DropBox is a type of virtualization.

Select one of the following:

  • True
  • False

Explanation

Question 78 of 150

1

SaaS providers deliver and provide Web-based, remote access to storage.

Select one of the following:

  • True
  • False

Explanation

Question 79 of 150

1

One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware.

Select one of the following:

  • True
  • False

Explanation

Question 80 of 150

1

Total cost of ownership components include costs for downtime, training, and support.

Select one of the following:

  • True
  • False

Explanation

Question 81 of 150

1

The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.

Select one of the following:

  • True
  • False

Explanation

Question 82 of 150

1

Web mining is the discovery of useful patterns on the Web.

Select one of the following:

  • True
  • False

Explanation

Question 83 of 150

1

Every record in a file should contain at least one key field.

Select one of the following:

  • True
  • False

Explanation

Question 84 of 150

1

OLAP is a key tool of BI.

Select one of the following:

  • True
  • False

Explanation

Question 85 of 150

1

Data cleansing is the same process as data scrubbing

Select one of the following:

  • True
  • False

Explanation

Question 86 of 150

1

The two key services of Hadoop are HDFS and in-memory computing

Select one of the following:

  • True
  • False

Explanation

Question 87 of 150

1

DBMS simplify how end users work with databases by separating the logical and physical views of the data.

Select one of the following:

  • True
  • False

Explanation

Question 88 of 150

1

To create a computer network, you must have at least two computers.

Select one of the following:

  • True
  • False

Explanation

Question 89 of 150

1

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.

Select one of the following:

  • True
  • False

Explanation

Question 90 of 150

1

Mobile search makes up approximately 10% of all Internet searches

Select one of the following:

  • True
  • False

Explanation

Question 91 of 150

1

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

Select one of the following:

  • True
  • False

Explanation

Question 92 of 150

1

VoIP technology delivers voice information in digital form using packet switching.

Select one of the following:

  • True
  • False

Explanation

Question 93 of 150

1

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

Select one of the following:

  • True
  • False

Explanation

Question 94 of 150

1

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

Select one of the following:

  • True
  • False

Explanation

Question 95 of 150

1

The term cracker is used to identify a hacker whose specialty is breaking open security systems

Select one of the following:

  • True
  • False

Explanation

Question 96 of 150

1

The term cracker is used to identify a hacker whose specialty is breaking open security systems

Select one of the following:

  • True
  • False

Explanation

Question 97 of 150

1

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

Select one of the following:

  • True
  • False

Explanation

Question 98 of 150

1

The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.

Select one of the following:

  • True
  • False

Explanation

Question 99 of 150

1

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

Select one of the following:

  • True
  • False

Explanation

Question 100 of 150

1

SSL is a protocol used to establish a secure connection between two computers.

Select one of the following:

  • True
  • False

Explanation

Question 101 of 150

1

Enterprise software is built around thousands of predefined business processes that reflect:

Select one of the following:

  • the firm's organization.

  • industry goals.

  • best practices.

  • cutting edge workflow analyses

Explanation

Question 102 of 150

1

Which of the following is not true about enterprise systems?

Select one of the following:

  • Enterprise systems help firms respond rapidly to customer requests for information or products.

  • Enterprise system data have standardized definitions and formats that are accepted by the entire organization.

  • Enterprise software is expressly built to allow companies to mimic their unique business practices.

  • Enterprise software includes analytical tools to evaluate overall organizational performance.

Explanation

Question 103 of 150

1

When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with:

Select one of the following:

  • configuration tables

  • Web services

  • data dictionaries

  • middleware

Explanation

Question 104 of 150

1

In order to achieve maximum benefit from an enterprise software package, a business:

Select one of the following:

  • customizes the software to match all of its business processes

  • uses only the processes in the software that match its own processes

  • changes the way it works to match the software's business processes

  • selects only the software that best matches its existing business processes.

Explanation

Question 105 of 150

1

A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the:

Select one of the following:

  • supplier's internal supply chain

  • external supply chain

  • upstream portion of the supply chain

  • downstream portion of the supply chain

Explanation

Question 106 of 150

1

Why is overstocking warehouses not an effective solution for a problem of low availability?

Select one of the following:

  • It does not speed product time to market

  • It is an inefficient use of raw materials

  • It increases sales costs

  • It increases inventory costs

Explanation

Question 107 of 150

1

Which of the following is not one of the unique features of e-commerce technology

Select one of the following:

  • Information density

  • Transparency

  • Richness

  • Social technology

Explanation

Question 108 of 150

1

The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?

Select one of the following:

  • Ubiquity

  • Personalization/customization

  • Richness

  • Interactivity

Explanation

Question 109 of 150

1

Selling products and services directly to individual consumers via the Internet best describes

Select one of the following:

  • B2B e-commerce

  • C2C e-commerce

  • M-commerce

  • B2C e-commerce

Explanation

Question 110 of 150

1

Transaction brokers

Select one of the following:

  • generate revenue from advertising or from directing buyers to sel

  • save users money and time by processing online sales transactions.

  • provide a digital environment where buyers and sellers can establish prices for products

  • sell physical products directly to consumers or individual businesses.

Explanation

Question 111 of 150

1

EDI is:

Select one of the following:

  • the use of Internet technologies for electronic data transactions

  • the exchange between two organizations of standard transactions through a network

  • electronic data invoicing

  • electronic delivery infrastructure

Explanation

Question 112 of 150

1

Goods that are involved in the actual production process are referred to as:

Select one of the following:

  • raw materials

  • direct goods.

  • purchasing goods

  • indirect goods

Explanation

Question 113 of 150

1

Where there is no well-understood or agreed-on procedure for making a decision, it is said to be

Select one of the following:

  • undocumented

  • unstructured

  • documented

  • semistructured

Explanation

Question 114 of 150

1

The type of decision that can be made by following a definite procedure is called a(n) ___________ decision.

Select one of the following:

  • structured

  • unstructured

  • semistructured

  • procedural

Explanation

Question 115 of 150

1

Simon's four different stages in decision making are, in order from first to last

Select one of the following:

  • identification, choice, design, and implementation

  • identification, design, choice, and finalization

  • intelligence, choice, design, and implementation

  • intelligence, design, choice, and implementation.

Explanation

Question 116 of 150

1

Which dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties?

Select one of the following:

  • Due process

  • Justice

  • Fairness

  • Coherence

Explanation

Question 117 of 150

1

All of the following are analytic functionalities that BI systems deliver except:

Select one of the following:

  • user interface

  • ad hoc queries

  • dashboards

  • production reports

Explanation

Question 118 of 150

1

Why is the balanced scorecard method said to be "balanced"?

Select one of the following:

  • It uses measurable dimensions for assessing performance

  • It measures performance of more than just financial systems

  • It assesses both the internally focused and externally focused business processes

  • It measures performance along all major divisions of a firm, from production and manufacturing to human resources.

Explanation

Question 119 of 150

1

"Hidden costs," such as _________ costs, can easily undercut anticipated benefits from outsourcing.

Select one of the following:

  • vendor selection

  • hardware

  • software

  • employee salary

Explanation

Question 120 of 150

1

The primary tool for representing a system's component processes and the flow of data between them is the:

Select one of the following:

  • data dictionary

  • process specifications diagram

  • user documentation

  • data flow diagram

Explanation

Question 121 of 150

1

You would expect to find all of the following in an information systems plan except

Select one of the following:

  • key business processes

  • budget requirements

  • portfolio analysis

  • milestones and planning

Explanation

Question 122 of 150

1

__________ is a method for deciding among alternative systems based on a system of ratings for selected objectives.

Select one of the following:

  • A scoring model

  • A scorecard

  • Portfolio analysis

  • Risk analysis

Explanation

Question 123 of 150

1

A systems analysis includes a ____________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.

Select one of the following:

  • test plan

  • conversion plan

  • feasibility study

  • risk analysis

Explanation

Question 124 of 150

1

The project risk will rise if the project team and the IS staff lack

Select one of the following:

  • RAD experience

  • web services

  • the required technical expertise

  • CASE tools

Explanation

Question 125 of 150

1

____________ are tangible benefits of information systems.

Select one of the following:

  • Improved asset utilization, increased organizational learning, and improved operations

  • Reduced workforce, lower outside vendor costs, and increased productivity

  • Increased productivity, reduced workforce, and increased job satisfaction

  • Lower operational costs, improved resource control, and more information

Explanation

Question 126 of 150

1

Supply chain management systems are a type of enterprise system

Select one of the following:

  • True
  • False

Explanation

Question 127 of 150

1

In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products.

Select one of the following:

  • True
  • False

Explanation

Question 128 of 150

1

Total supply chain costs in some industries approach 75 percent of the total operating budget

Select one of the following:

  • True
  • False

Explanation

Question 129 of 150

1

CRM software can help organizations identify high-value customers for preferential treatments

Select one of the following:

  • True
  • False

Explanation

Question 130 of 150

1

Enterprise systems require fundamental changes in the way the business operates.

Select one of the following:

  • True
  • False

Explanation

Question 131 of 150

1

The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.

Select one of the following:

  • True
  • False

Explanation

Question 132 of 150

1

Rich media advertisements are a sales-oriented marketing format

Select one of the following:

  • True
  • False

Explanation

Question 133 of 150

1

An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.

Select one of the following:

  • True
  • False

Explanation

Question 134 of 150

1

Ninety-six percent of all U.S. households with Internet access use a broadband connection

Select one of the following:

  • True
  • False

Explanation

Question 135 of 150

1

Automobile manufacturing is an example of a vertical market

Select one of the following:

  • True
  • False

Explanation

Question 136 of 150

1

In the free/freemium revenue model, firms offer basic services for free and charge a fee for special features.

Select one of the following:

  • True
  • False

Explanation

Question 137 of 150

1

Web personalization is used primarily as a major marketing tool

Select one of the following:

  • True
  • False

Explanation

Question 138 of 150

1

In high-velocity automated decision making, humans are eliminated from the decision chain

Select one of the following:

  • True
  • False

Explanation

Question 139 of 150

1

DSS primarily address structured problems

Select one of the following:

  • True
  • False

Explanation

Question 140 of 150

1

GDSS are designed to display data in the form of digitized maps

Select one of the following:

  • True
  • False

Explanation

Question 141 of 150

1

CBR is used in diagnostic systems in medicine

Select one of the following:

  • True
  • False

Explanation

Question 142 of 150

1

Shopping bots are a form of intelligent agent

Select one of the following:

  • True
  • False

Explanation

Question 143 of 150

1

Enterprise-wide knowledge management systems deal with structured and semistructured knowledge, while other systems are used for unstructured knowledge.

Select one of the following:

  • True
  • False

Explanation

Question 144 of 150

1

Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents.

Select one of the following:

  • True
  • False

Explanation

Question 145 of 150

1

Documentation reveals how well the system has met its original objectives

Select one of the following:

  • True
  • False

Explanation

Question 146 of 150

1

Gantt and PERT charts are two common formal planning tools for project managemen

Select one of the following:

  • True
  • False

Explanation

Question 147 of 150

1

More timely information is a tangible benefit of information systems

Select one of the following:

  • True
  • False

Explanation

Question 148 of 150

1

An information systems plan shows how specific information systems fit into a company's overall business plan and business strategy.

Select one of the following:

  • True
  • False

Explanation

Question 149 of 150

1

End-user-developed systems can be completed more rapidly than those developed through the conventional programming tools.

Select one of the following:

  • True
  • False

Explanation

Question 150 of 150

1

A new information system is not considered in production until conversion is complete

Select one of the following:

  • True
  • False

Explanation