Question 1
Question
The three activities in an information system that produce the information organizations use to control operations are:
Answer
-
Information retrieval, research, and analysis.
-
Input, output, and feedback.
-
Input, processing, and output.
-
Data analysis, processing, and feedback.
Question 2
Answer
-
Is feedback that has been processed to create meaningful information.
-
Is information that is returned to appropriate members of the organization to help them evaluate the input stage.
-
Transfers raw data to the people who will use it or to the activities for which it will be used.
-
Transfers processed information to the people who will use it or to the activities for which it will be used.
Question 3
Question
Converting raw data into a more meaningful form is called:
Answer
-
Capturing
-
Processing
-
Organizing
-
Feeback
Question 4
Answer
-
Results in a clear-cut division of labor.
-
Is composed primarily of experts trained for different functions.
-
Is a pyramid structure of rising authority and responsibility.
-
Is used primarily in large organizations to define job roles.
Question 5
Question
The field that deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm, is called:
Answer
-
Information systems literacy.
-
Information systems architecture.
-
Management information systems.
-
Information technology infrastructure.
Question 6
Question
All of the following can be considered managerial responsibilities except:
Answer
-
Making action plans to solve organizational problems.
-
Creating new products and services.
-
Designing new information systems
-
Allocating human resources to coordinate the work to be done
Question 7
Question
Data management technology consists of:
Answer
-
The physical hardware and media used by an organization for storing data.
-
The detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.
-
The software governing the organization of data on physical storage media.
-
The hardware and software used to transfer data.
Question 8
Question
Promoting the organization's products or services is a responsibility of the ________ function.
Question 9
Question
Checking for product quality is an activity associated with the ______ function.
Question 10
Question
That assist with paperwork at all levels of the firm are called:
Answer
-
Data workers.
-
Knowledge workers.
-
Operational management.
-
Service workers.
Question 11
Question
The three principal levels of hierarchies within a business organization are:
Answer
-
Management, knowledge workers, and service workers.
-
Senior management, middle management, and operational management.
-
Management, data workers, and operational management.
-
Senior management, operational management, and workers.
Question 12
Question
Engineers and architects are examples of:
Answer
-
Senior management.
-
Production workers.
-
Knowledge workers.
-
Middle management.
Question 13
Question
Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?
Question 14
Question
________ is the ability to offer individually tailored products or services using the same production resources as bulk production.
Answer
-
Mass customization
-
Size customization
-
Personalization
-
Demand customization
Question 15
Question
A substitute product of most concern for a cable TV distributor is:
Answer
-
Satellite TV.
-
Broadcast TV.
-
Satellite radio.
-
The Internet.
Question 16
Question
When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, it is often referred to as creating:
Answer
-
Value webs.
-
Value chains.
-
Synergies.
-
Core competencies.
Question 17
Question
The iPad can be seen as a disruptive technology for the ___________ industry.
Answer
-
Publishing
-
Music
-
Software
-
Travel
Question 18
Question
A ___________ is an activity at which a firm excels as a world-class leader.
Answer
-
Best practice
-
Competitive advantage
-
Primary activity
-
Core competency
Question 19
Question
Which of the following can force a business and its competitors to compete on price alone?
Question 20
Question
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
Question 21
Question
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
Answer
-
Responsibility
-
Accountability
-
Liability
-
Due process
Question 22
Question
The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
Answer
-
Liability
-
Due process
-
The courts of appeal
-
Accountability
Question 23
Question
Which of the five moral dimensions of the information age do the central business activities of
Choice Point raise?
Answer
-
Property rights and obligations
-
System quality
-
Accountability and control
-
Information rights and obligations
Question 24
Question
All of the following are current key technology trends raising ethical issues except:
Answer
-
Data storage improvements.
-
Data analysis advancements.
-
Increase in multimedia quality
-
Increase in use of mobile devices
Question 25
Question
Types of information gathered by Web site tracking tools include all of the following except:
Answer
-
Health concerns
-
Birthplace
-
Income
-
Purchases
Question 26
Question
An extranet is a private intranet extended to authorized users outside the organization.
Question 27
Question
Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach.
Question 28
Question
Developing a new product, fulfilling an order, or hiring a new employee are all examples of business processes.
Question 29
Question
Business processes are those logically related tasks for accomplishing tasks that have been formally encoded by an organization.
Question 30
Question
As a result of new public laws, accountants are beginning to perform more technical duties, such as auditing systems and networks.
Question 31
Question
A network requires at least three computers and a shared resource.
Question 32
Question
Senior management is responsible for directing the day-to-day activities of the business.
Question 33
Question
Transaction processing systems are most commonly encountered at the senior management level of an organization.
Question 34
Question
Transaction processing systems are the basic business systems that serve the operational level of the organization.
Question 35
Question
Most MISs use sophisticated mathematical models or statistical techniques.
Question 36
Question
ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.
Question 37
Question
ESSs are designed primarily to solve specific problems.
Question 38
Question
A firm can be said to have competitive advantage when it has higher stock market valuations than its competitors.
Question 39
Question
A primary challenge in BPM is employee resistance.
Question 40
Question
A transparent marketplace means that there is high product differentiation.
Question 41
Question
The greatest barrier to changing business processes is, ironically, management itself.
Question 42
Question
BPM is considered concluded when the new processes are both implemented and accepted.
Question 43
Question
In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer.
Question 44
Question
Advances in data storage have made routine violation of individual privacy more difficult.
Question 45
Question
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.
Question 46
Question
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
Question 47
Question
Most Internet businesses do very little to protect the privacy of their customers.
Question 48
Question
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
Question 49
Question
Spyware is software that comes hidden in downloaded applications and can track your online movements.
Question 50
Question
Most American and European privacy law is based on a set of five principles called COPPA.
Question 51
Question
Software used to apply the computer to a specific task for an end user is called:
Question 52
Question
Legacy systems are still in use today because:
Answer
-
they can only be run on the older mainframe computers.
-
they are too expensive to redesign.
-
many integrate well using new Web services technologies.
-
they contain valuable data that would be lost during redesign.
Question 53
Question
_________ describes the practices and technologies used minimize the environmental effects of manufacturing and managing computing devices.
Answer
-
Capacity planning
-
Cloud computing
-
Green computing
-
Autonomic computing
Question 54
Question
An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called:
Answer
-
grid computing.
-
utility computing.
-
cloud computing.
-
autonomic computing.
Question 55
Question
Microsoft Word is an example of:
Answer
-
open-source software.
-
word-processing software.
-
software productivity suite.
-
data management software.
Question 56
Question
Microsoft Excel is an example of:
Question 57
Question
An example of a pre-digital database is a:
Question 58
Question
Which of the following best illustrates the relationship between entities and attributes?
Answer
-
The entity CUSTOMER with the attribute PRODUCT
-
The entity CUSTOMER with the attribute ADDRESS
-
The entity PRODUCT with the attribute PURCHASE
-
The entity PRODUCT with the attribute CUSTOMER
Question 59
Question
In a relational database, a record is also called a(n):
Question 60
Question
A field identified in a record as holding the unique identifier for that record is called the:
Answer
-
primary key.
-
key field.
-
primary field.
-
foreign key.
Question 61
Question
Which of the following would you use to find out which Web sites with content related to database design were the most often linked to by other Web sites?
Answer
-
Web usage mining
-
Web server mining
-
Web structure mining
-
Web content mining
Question 62
Question
Which of the following is not a typical feature of DBMS?
Question 63
Question
A ______________ is special software that routes and manages communications on the network and coordinates networks resources.
Question 64
Question
Which of the following statements is not true about search engines?
Answer
-
They are arguably the Internet's "killer app."
-
They have solved the problem of how users instantly find information on the Internet
-
They are monetized almost exclusively by search engine marketing.
-
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Question 65
Question
Which of the following is an example of the "visual Web"?
Answer
-
Twitter
-
Blogger
-
Pinterest
-
Facebook
Question 66
Question
A LAN would be used to connect all of the following except:
Answer
-
all of the computers in a large building.
-
all of the devices within a 10-meter area.
-
all of the computers in a city.
-
all of the computers in a small office.
Question 67
Question
What is the primary difference between 3G and 4G cellular systems?
Answer
-
4G systems are digital.
-
4G systems have greater transmission speeds.
-
3G systems are unable to handle Web browsing.
-
3G systems have poor security.
Question 68
Question
__________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
Answer
-
Wireless networks
-
Intranets
-
Virtual private networks
-
Unified communications
Question 69
Answer
-
Trojan horses that appears to the user to be a legitimate commercial software application.
-
e-mail messages that mimic the e-mail messages of a legitimate business.
-
fraudulent Web sites that mimic a legitimate business's Web site.
-
bogus wireless network access points that look legitimate to users.
Question 70
Question
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
Question 71
Question
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:
Answer
-
sniffing
-
social engineering
-
phishing
-
pharming
Question 72
Question
Which of the following is a type of ambient data?
Answer
-
Computer log containing recent system errors
-
A file deleted from a hard disk
-
A file that contains an application's user settings
-
A set of raw data from an environmental sensor
Question 73
Question
Computer forensics tasks include all of the following except:
Answer
-
presenting collected evidence in a court of law.
-
securely storing recovered electronic data
-
collecting physical evidence on the computer
-
finding significant information in a large volume of electronic data
Question 74
Question
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
Answer
-
high-availability computing
-
recovery-oriented computing
-
fault-tolerant computing
-
disaster-recovery planning
Question 75
Question
Most antivirus software is effective against:
Answer
-
only those viruses active on the Internet and through e-mail
-
any virus.
-
any virus except those in wireless communications applications
-
only those viruses already known when the software is written
Question 76
Question
Systems integration means ensuring the legacy systems work with new elements of the infrastructure.
Question 77
Question
Using an online storage service such as DropBox is a type of virtualization.
Question 78
Question
SaaS providers deliver and provide Web-based, remote access to storage.
Question 79
Question
One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware.
Question 80
Question
Total cost of ownership components include costs for downtime, training, and support.
Question 81
Question
The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.
Question 82
Question
Web mining is the discovery of useful patterns on the Web.
Question 83
Question
Every record in a file should contain at least one key field.
Question 84
Question
OLAP is a key tool of BI.
Question 85
Question
Data cleansing is the same process as data scrubbing
Question 86
Question
The two key services of Hadoop are HDFS and in-memory computing
Question 87
Question
DBMS simplify how end users work with databases by separating the logical and physical views of the data.
Question 88
Question
To create a computer network, you must have at least two computers.
Question 89
Question
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.
Question 90
Question
Mobile search makes up approximately 10% of all Internet searches
Question 91
Question
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
Question 92
Question
VoIP technology delivers voice information in digital form using packet switching.
Question 93
Question
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
Question 94
Question
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
Question 95
Question
The term cracker is used to identify a hacker whose specialty is breaking open security systems
Question 96
Question
The term cracker is used to identify a hacker whose specialty is breaking open security systems
Question 97
Question
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
Question 98
Question
The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.
Question 99
Question
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
Question 100
Question
SSL is a protocol used to establish a secure connection between two computers.
Question 101
Question
Enterprise software is built around thousands of predefined business processes that reflect:
Question 102
Question
Which of the following is not true about enterprise systems?
Answer
-
Enterprise systems help firms respond rapidly to customer requests for information or products.
-
Enterprise system data have standardized definitions and formats that are accepted by the entire organization.
-
Enterprise software is expressly built to allow companies to mimic their unique business practices.
-
Enterprise software includes analytical tools to evaluate overall organizational performance.
Question 103
Question
When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with:
Answer
-
configuration tables
-
Web services
-
data dictionaries
-
middleware
Question 104
Question
In order to achieve maximum benefit from an enterprise software package, a business:
Answer
-
customizes the software to match all of its business processes
-
uses only the processes in the software that match its own processes
-
changes the way it works to match the software's business processes
-
selects only the software that best matches its existing business processes.
Question 105
Question
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the:
Answer
-
supplier's internal supply chain
-
external supply chain
-
upstream portion of the supply chain
-
downstream portion of the supply chain
Question 106
Question
Why is overstocking warehouses not an effective solution for a problem of low availability?
Answer
-
It does not speed product time to market
-
It is an inefficient use of raw materials
-
It increases sales costs
-
It increases inventory costs
Question 107
Question
Which of the following is not one of the unique features of e-commerce technology
Answer
-
Information density
-
Transparency
-
Richness
-
Social technology
Question 108
Question
The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?
Question 109
Question
Selling products and services directly to individual consumers via the Internet best describes
Answer
-
B2B e-commerce
-
C2C e-commerce
-
M-commerce
-
B2C e-commerce
Question 110
Question
Transaction brokers
Answer
-
generate revenue from advertising or from directing buyers to sel
-
save users money and time by processing online sales transactions.
-
provide a digital environment where buyers and sellers can establish prices for products
-
sell physical products directly to consumers or individual businesses.
Question 111
Answer
-
the use of Internet technologies for electronic data transactions
-
the exchange between two organizations of standard transactions through a network
-
electronic data invoicing
-
electronic delivery infrastructure
Question 112
Question
Goods that are involved in the actual production process are referred to as:
Answer
-
raw materials
-
direct goods.
-
purchasing goods
-
indirect goods
Question 113
Question
Where there is no well-understood or agreed-on procedure for making a decision, it is said to be
Answer
-
undocumented
-
unstructured
-
documented
-
semistructured
Question 114
Question
The type of decision that can be made by following a definite procedure is called a(n) ___________ decision.
Answer
-
structured
-
unstructured
-
semistructured
-
procedural
Question 115
Question
Simon's four different stages in decision making are, in order from first to last
Answer
-
identification, choice, design, and implementation
-
identification, design, choice, and finalization
-
intelligence, choice, design, and implementation
-
intelligence, design, choice, and implementation.
Question 116
Question
Which dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties?
Answer
-
Due process
-
Justice
-
Fairness
-
Coherence
Question 117
Question
All of the following are analytic functionalities that BI systems deliver except:
Answer
-
user interface
-
ad hoc queries
-
dashboards
-
production reports
Question 118
Question
Why is the balanced scorecard method said to be "balanced"?
Answer
-
It uses measurable dimensions for assessing performance
-
It measures performance of more than just financial systems
-
It assesses both the internally focused and externally focused business processes
-
It measures performance along all major divisions of a firm, from production and manufacturing to human resources.
Question 119
Question
"Hidden costs," such as _________ costs, can easily undercut anticipated benefits from outsourcing.
Answer
-
vendor selection
-
hardware
-
software
-
employee salary
Question 120
Question
The primary tool for representing a system's component processes and the flow of data between them is the:
Question 121
Question
You would expect to find all of the following in an information systems plan except
Answer
-
key business processes
-
budget requirements
-
portfolio analysis
-
milestones and planning
Question 122
Question
__________ is a method for deciding among alternative systems based on a system of ratings for selected objectives.
Answer
-
A scoring model
-
A scorecard
-
Portfolio analysis
-
Risk analysis
Question 123
Question
A systems analysis includes a ____________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.
Answer
-
test plan
-
conversion plan
-
feasibility study
-
risk analysis
Question 124
Question
The project risk will rise if the project team and the IS staff lack
Question 125
Question
____________ are tangible benefits of information systems.
Answer
-
Improved asset utilization, increased organizational learning, and improved operations
-
Reduced workforce, lower outside vendor costs, and increased productivity
-
Increased productivity, reduced workforce, and increased job satisfaction
-
Lower operational costs, improved resource control, and more information
Question 126
Question
Supply chain management systems are a type of enterprise system
Question 127
Question
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products.
Question 128
Question
Total supply chain costs in some industries approach 75 percent of the total operating budget
Question 129
Question
CRM software can help organizations identify high-value customers for preferential treatments
Question 130
Question
Enterprise systems require fundamental changes in the way the business operates.
Question 131
Question
The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
Question 132
Question
Rich media advertisements are a sales-oriented marketing format
Question 133
Question
An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.
Question 134
Question
Ninety-six percent of all U.S. households with Internet access use a broadband connection
Question 135
Question
Automobile manufacturing is an example of a vertical market
Question 136
Question
In the free/freemium revenue model, firms offer basic services for free and charge a fee for special features.
Question 137
Question
Web personalization is used primarily as a major marketing tool
Question 138
Question
In high-velocity automated decision making, humans are eliminated from the decision chain
Question 139
Question
DSS primarily address structured problems
Question 140
Question
GDSS are designed to display data in the form of digitized maps
Question 141
Question
CBR is used in diagnostic systems in medicine
Question 142
Question
Shopping bots are a form of intelligent agent
Question 143
Question
Enterprise-wide knowledge management systems deal with structured and semistructured knowledge, while other systems are used for unstructured knowledge.
Question 144
Question
Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents.
Question 145
Question
Documentation reveals how well the system has met its original objectives
Question 146
Question
Gantt and PERT charts are two common formal planning tools for project managemen
Question 147
Question
More timely information is a tangible benefit of information systems
Question 148
Question
An information systems plan shows how specific information systems fit into a company's overall business plan and business strategy.
Question 149
Question
End-user-developed systems can be completed more rapidly than those developed through the conventional programming tools.
Question 150
Question
A new information system is not considered in production until conversion is complete