The three activities in an information system that produce the information organizations use to control operations are:
Information retrieval, research, and analysis.
Input, output, and feedback.
Input, processing, and output.
Data analysis, processing, and feedback.
Output:
Is feedback that has been processed to create meaningful information.
Is information that is returned to appropriate members of the organization to help them evaluate the input stage.
Transfers raw data to the people who will use it or to the activities for which it will be used.
Transfers processed information to the people who will use it or to the activities for which it will be used.
Converting raw data into a more meaningful form is called:
Capturing
Processing
Organizing
Feeback
A hierarchy:
Results in a clear-cut division of labor.
Is composed primarily of experts trained for different functions.
Is a pyramid structure of rising authority and responsibility.
Is used primarily in large organizations to define job roles.
The field that deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm, is called:
Information systems literacy.
Information systems architecture.
Management information systems.
Information technology infrastructure.
All of the following can be considered managerial responsibilities except:
Making action plans to solve organizational problems.
Creating new products and services.
Designing new information systems
Allocating human resources to coordinate the work to be done
Data management technology consists of:
The physical hardware and media used by an organization for storing data.
The detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.
The software governing the organization of data on physical storage media.
The hardware and software used to transfer data.
Promoting the organization's products or services is a responsibility of the ________ function.
Finance and accounting
Human resources
Manufacturing and production
Sales and marketing
Checking for product quality is an activity associated with the ______ function.
That assist with paperwork at all levels of the firm are called:
Data workers.
Knowledge workers.
Operational management.
Service workers.
The three principal levels of hierarchies within a business organization are:
Management, knowledge workers, and service workers.
Senior management, middle management, and operational management.
Management, data workers, and operational management.
Senior management, operational management, and workers.
Engineers and architects are examples of:
Senior management.
Production workers.
Middle management.
Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?
ESS
TPS
MIS
DSS
________ is the ability to offer individually tailored products or services using the same production resources as bulk production.
Mass customization
Size customization
Personalization
Demand customization
A substitute product of most concern for a cable TV distributor is:
Satellite TV.
Broadcast TV.
Satellite radio.
The Internet.
When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, it is often referred to as creating:
Value webs.
Value chains.
Synergies.
Core competencies.
The iPad can be seen as a disruptive technology for the ___________ industry.
Publishing
Music
Software
Travel
A ___________ is an activity at which a firm excels as a world-class leader.
Best practice
Competitive advantage
Primary activity
Core competency
Which of the following can force a business and its competitors to compete on price alone?
High product differentiation
Poor process efficiency
Demand control
Transparent marketplace
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
Family and home.
Property rights and obligations
System quality.
Quality of life.
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
Responsibility
Accountability
Liability
Due process
The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
The courts of appeal
Which of the five moral dimensions of the information age do the central business activities of Choice Point raise?
System quality
Accountability and control
Information rights and obligations
All of the following are current key technology trends raising ethical issues except:
Data storage improvements.
Data analysis advancements.
Increase in multimedia quality
Increase in use of mobile devices
Types of information gathered by Web site tracking tools include all of the following except:
Health concerns
Birthplace
Income
Purchases
An extranet is a private intranet extended to authorized users outside the organization.
Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach.
Developing a new product, fulfilling an order, or hiring a new employee are all examples of business processes.
Business processes are those logically related tasks for accomplishing tasks that have been formally encoded by an organization.
As a result of new public laws, accountants are beginning to perform more technical duties, such as auditing systems and networks.
A network requires at least three computers and a shared resource.
Senior management is responsible for directing the day-to-day activities of the business.
Transaction processing systems are most commonly encountered at the senior management level of an organization.
Transaction processing systems are the basic business systems that serve the operational level of the organization.
Most MISs use sophisticated mathematical models or statistical techniques.
ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.
ESSs are designed primarily to solve specific problems.
A firm can be said to have competitive advantage when it has higher stock market valuations than its competitors.
A primary challenge in BPM is employee resistance.
A transparent marketplace means that there is high product differentiation.
The greatest barrier to changing business processes is, ironically, management itself.
BPM is considered concluded when the new processes are both implemented and accepted.
In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer.
Advances in data storage have made routine violation of individual privacy more difficult.
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
Most Internet businesses do very little to protect the privacy of their customers.
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
Spyware is software that comes hidden in downloaded applications and can track your online movements.
Most American and European privacy law is based on a set of five principles called COPPA.
Software used to apply the computer to a specific task for an end user is called:
system software.
application software.
data management software.
network software.
Legacy systems are still in use today because:
they can only be run on the older mainframe computers.
they are too expensive to redesign.
many integrate well using new Web services technologies.
they contain valuable data that would be lost during redesign.
_________ describes the practices and technologies used minimize the environmental effects of manufacturing and managing computing devices.
Capacity planning
Cloud computing
Green computing
Autonomic computing
An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called:
grid computing.
utility computing.
cloud computing.
autonomic computing.
Microsoft Word is an example of:
open-source software.
word-processing software.
software productivity suite.
Microsoft Excel is an example of:
spreadsheet software.
presentation graphics.
word processing software.
An example of a pre-digital database is a:
library's card-catalog.
cash register receipt.
doctor's office invoice.
list of sales totals on a spreadsheet.
Which of the following best illustrates the relationship between entities and attributes?
The entity CUSTOMER with the attribute PRODUCT
The entity CUSTOMER with the attribute ADDRESS
The entity PRODUCT with the attribute PURCHASE
The entity PRODUCT with the attribute CUSTOMER
In a relational database, a record is also called a(n):
tuple
row
entity
field
A field identified in a record as holding the unique identifier for that record is called the:
primary key.
key field.
primary field.
foreign key.
Which of the following would you use to find out which Web sites with content related to database design were the most often linked to by other Web sites?
Web usage mining
Web server mining
Web structure mining
Web content mining
Which of the following is not a typical feature of DBMS?
Data manipulation language
Report generation tools
Data dictionary
Query wizard tool
A ______________ is special software that routes and manages communications on the network and coordinates networks resources.
switch
firewall
server
network operating system/NOS
Which of the following statements is not true about search engines?
They are arguably the Internet's "killer app."
They have solved the problem of how users instantly find information on the Internet
They are monetized almost exclusively by search engine marketing.
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Which of the following is an example of the "visual Web"?
Twitter
Blogger
Pinterest
Facebook
A LAN would be used to connect all of the following except:
all of the computers in a large building.
all of the devices within a 10-meter area.
all of the computers in a city.
all of the computers in a small office.
What is the primary difference between 3G and 4G cellular systems?
4G systems are digital.
4G systems have greater transmission speeds.
3G systems are unable to handle Web browsing.
3G systems have poor security.
__________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
Wireless networks
Intranets
Virtual private networks
Unified communications
Evil twins are:
Trojan horses that appears to the user to be a legitimate commercial software application.
e-mail messages that mimic the e-mail messages of a legitimate business.
fraudulent Web sites that mimic a legitimate business's Web site.
bogus wireless network access points that look legitimate to users.
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
Wireless network
Employees
Authentication procedures
Lack of data encryption
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:
sniffing
social engineering
phishing
pharming
Which of the following is a type of ambient data?
Computer log containing recent system errors
A file deleted from a hard disk
A file that contains an application's user settings
A set of raw data from an environmental sensor
Computer forensics tasks include all of the following except:
presenting collected evidence in a court of law.
securely storing recovered electronic data
collecting physical evidence on the computer
finding significant information in a large volume of electronic data
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
high-availability computing
recovery-oriented computing
fault-tolerant computing
disaster-recovery planning
Most antivirus software is effective against:
only those viruses active on the Internet and through e-mail
any virus.
any virus except those in wireless communications applications
only those viruses already known when the software is written
Systems integration means ensuring the legacy systems work with new elements of the infrastructure.
Using an online storage service such as DropBox is a type of virtualization.
SaaS providers deliver and provide Web-based, remote access to storage.
One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware.
Total cost of ownership components include costs for downtime, training, and support.
The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.
Web mining is the discovery of useful patterns on the Web.
Every record in a file should contain at least one key field.
OLAP is a key tool of BI.
Data cleansing is the same process as data scrubbing
The two key services of Hadoop are HDFS and in-memory computing
DBMS simplify how end users work with databases by separating the logical and physical views of the data.
To create a computer network, you must have at least two computers.
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.
Mobile search makes up approximately 10% of all Internet searches
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
VoIP technology delivers voice information in digital form using packet switching.
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
The term cracker is used to identify a hacker whose specialty is breaking open security systems
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
SSL is a protocol used to establish a secure connection between two computers.
Enterprise software is built around thousands of predefined business processes that reflect:
the firm's organization.
industry goals.
best practices.
cutting edge workflow analyses
Which of the following is not true about enterprise systems?
Enterprise systems help firms respond rapidly to customer requests for information or products.
Enterprise system data have standardized definitions and formats that are accepted by the entire organization.
Enterprise software is expressly built to allow companies to mimic their unique business practices.
Enterprise software includes analytical tools to evaluate overall organizational performance.
When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with:
configuration tables
Web services
data dictionaries
middleware
In order to achieve maximum benefit from an enterprise software package, a business:
customizes the software to match all of its business processes
uses only the processes in the software that match its own processes
changes the way it works to match the software's business processes
selects only the software that best matches its existing business processes.
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the:
supplier's internal supply chain
external supply chain
upstream portion of the supply chain
downstream portion of the supply chain
Why is overstocking warehouses not an effective solution for a problem of low availability?
It does not speed product time to market
It is an inefficient use of raw materials
It increases sales costs
It increases inventory costs
Which of the following is not one of the unique features of e-commerce technology
Information density
Transparency
Richness
Social technology
The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?
Ubiquity
Personalization/customization
Interactivity
Selling products and services directly to individual consumers via the Internet best describes
B2B e-commerce
C2C e-commerce
M-commerce
B2C e-commerce
Transaction brokers
generate revenue from advertising or from directing buyers to sel
save users money and time by processing online sales transactions.
provide a digital environment where buyers and sellers can establish prices for products
sell physical products directly to consumers or individual businesses.
EDI is:
the use of Internet technologies for electronic data transactions
the exchange between two organizations of standard transactions through a network
electronic data invoicing
electronic delivery infrastructure
Goods that are involved in the actual production process are referred to as:
raw materials
direct goods.
purchasing goods
indirect goods
Where there is no well-understood or agreed-on procedure for making a decision, it is said to be
undocumented
unstructured
documented
semistructured
The type of decision that can be made by following a definite procedure is called a(n) ___________ decision.
structured
procedural
Simon's four different stages in decision making are, in order from first to last
identification, choice, design, and implementation
identification, design, choice, and finalization
intelligence, choice, design, and implementation
intelligence, design, choice, and implementation.
Which dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties?
Justice
Fairness
Coherence
All of the following are analytic functionalities that BI systems deliver except:
user interface
ad hoc queries
dashboards
production reports
Why is the balanced scorecard method said to be "balanced"?
It uses measurable dimensions for assessing performance
It measures performance of more than just financial systems
It assesses both the internally focused and externally focused business processes
It measures performance along all major divisions of a firm, from production and manufacturing to human resources.
"Hidden costs," such as _________ costs, can easily undercut anticipated benefits from outsourcing.
vendor selection
hardware
software
employee salary
The primary tool for representing a system's component processes and the flow of data between them is the:
data dictionary
process specifications diagram
user documentation
data flow diagram
You would expect to find all of the following in an information systems plan except
key business processes
budget requirements
portfolio analysis
milestones and planning
__________ is a method for deciding among alternative systems based on a system of ratings for selected objectives.
A scoring model
A scorecard
Portfolio analysis
Risk analysis
A systems analysis includes a ____________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.
test plan
conversion plan
feasibility study
risk analysis
The project risk will rise if the project team and the IS staff lack
RAD experience
web services
the required technical expertise
CASE tools
____________ are tangible benefits of information systems.
Improved asset utilization, increased organizational learning, and improved operations
Reduced workforce, lower outside vendor costs, and increased productivity
Increased productivity, reduced workforce, and increased job satisfaction
Lower operational costs, improved resource control, and more information
Supply chain management systems are a type of enterprise system
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products.
Total supply chain costs in some industries approach 75 percent of the total operating budget
CRM software can help organizations identify high-value customers for preferential treatments
Enterprise systems require fundamental changes in the way the business operates.
The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
Rich media advertisements are a sales-oriented marketing format
An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.
Ninety-six percent of all U.S. households with Internet access use a broadband connection
Automobile manufacturing is an example of a vertical market
In the free/freemium revenue model, firms offer basic services for free and charge a fee for special features.
Web personalization is used primarily as a major marketing tool
In high-velocity automated decision making, humans are eliminated from the decision chain
DSS primarily address structured problems
GDSS are designed to display data in the form of digitized maps
CBR is used in diagnostic systems in medicine
Shopping bots are a form of intelligent agent
Enterprise-wide knowledge management systems deal with structured and semistructured knowledge, while other systems are used for unstructured knowledge.
Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents.
Documentation reveals how well the system has met its original objectives
Gantt and PERT charts are two common formal planning tools for project managemen
More timely information is a tangible benefit of information systems
An information systems plan shows how specific information systems fit into a company's overall business plan and business strategy.
End-user-developed systems can be completed more rapidly than those developed through the conventional programming tools.
A new information system is not considered in production until conversion is complete