BMIS 311 Final Ch. 3-4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry? A. Benchmarking B. Strategic systems analysis C. Secondary activities D. Value chain analysis E. Best practices

A. Benchmarking

Which of the following is the most common reason that business systems fail? A. Data quality B. Hardware failures C. Software errors D. Facilities failures E. Software bugs

A. Data quality

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A. Due process B. Liability C. Accountability D. Responsibility E. The judicial system

A. Due process

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? A. Slippery-slope rule B. Utilitarian principle C. Golden Rule D. High-failure cost rule E. Lemming rule

A. Slippery-slope rule

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? A. Trade secret B. Patent C. Trademark D. All forms of intellectual property protection E. Copyright

A. Trade secret

All of the following are steps in the process for analyzing an ethical issue except: A. assigning responsibility. B. identifying the potential consequences of your options. C. identifying the options you can reasonably take. D. identifying the stakeholders. E. identifying and clearly describing the facts.

A. assigning responsibility.

The most successful solutions or methods for achieving a business objective are called: A. best practices. B. best processes. C. benchmarks. D. core competencies. E. value activities.

A. best practices.

All of the following are technical solutions to protecting user privacy except: A. data use policies. B. e-mail encryption. C. anonymous email. D. preventing client computers from accepting cookies. E. anonymous surfing.

A. data use policies.

All of the following are competitive forces in Porter's model except: A. external environment. B. substitute products. C. new market entrants. D. customers. E. suppliers.

A. external environment.

Redesigning and automating business processes can be seen as a double-edged sword because: A. it can concentrate power in the hands of senior executives. B. increases in efficiency may be accompanied by job losses. C. increases in efficiency may be accompanied by poor data quality. D. support for middle-management decision making may be offset by poor data quality. E. reliance on technology results in the loss of hands-on knowledge.

B. increases in efficiency may be accompanied by job losses.

The ability to offer individually tailored products or services using the same production resources as bulk production is known as: A. micro customization. B. mass customization. C. mass marketing. D. niche customization. E. micromarketing.

B. mass customization.

Walmart's continuous replenishment system allows it to do all of the following except: A. transmit orders to restock directly to its suppliers. B. provide mass customization. C. better meet customer demands. D. fine-tune merchandise availability. E. keep costs low.

B. provide mass customization.

According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are: A. organization, culture, management, and environment. B. tasks, technology, people, and structure. C. technology, people, culture, and structure. D. costs, tasks, structure, and management. E. environment, organization, structure, and tasks.

B. tasks, technology, people, and structure.

According to ________, you should take the action that produces the least harm. A. the utilitarian principle B. the risk aversion principle C. Kant's categorical imperative D. the Golden Rule E. the "no free lunch" rule

B. the risk aversion principle

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A. P3P B. FIP principles C. The opt-in model D. A safe harbor E. The opt-out model

C. The opt-in model

Walmart's attempt to increase its online presence is an example of a firm using information systems to: A. focus on market niche. B. simplify the industry value chain. C. achieve low-cost leadership. D. strengthen ties to its customers. E. develop synergies.

C. achieve low-cost leadership.

The interaction between information technology and organizations is influenced: A. by the rate of growth of the organization. B. solely by the decision making of middle and senior managers. C. by many factors, including structure, politics, culture, and environment. D. by two main macroeconomic forces: capital and labor. E. by the development of new information technologies.

C. by many factors, including structure, politics, culture, and environment.

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? A. Technostress B. CVS C. CTS D. Digital divide E. RSI

D. Digital divide

Which of the following statements about disruptive technologies is not true? A. Firms that invent disruptive technologies as first movers always become market leaders. B. Disruptive technologies may sometimes simply extend the marketplace. C. Disruptive technologies radically change the business landscape and environment. D. Disruptive technologies may put entire industries out of business. E. Disruptive technologies may be substitute products that perform better than other products currently being produced.

A. Firms that invent disruptive technologies as first movers always become market leaders.

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A. HIPAA B. Freedom of Information Act C. Privacy Protection Act D. Gramm-Leach-Bliley Act E. COPPA

A. HIPAA

Which of the following is not one of the current key technology trends that raises ethical issues? A. Increase in data quality B. Data analysis advancements C. Data storage improvements D. Increase in use of mobile devices E. Advances in networking technology

A. Increase in data quality

Which of the following best describes the effect that new information technology has on society? A. It has a ripple effect, raising new ethical, social, and political issues. B. It has a dampening effect on the discourse of business ethics. C. It is beneficial for society as a whole, while raising dilemmas for consumers. D. It has a waterfall effect in raising ever more complex ethical issues. E. It has a magnifying effect, creating increasing numbers of ethical issues.

A. It has a ripple effect, raising new ethical, social, and political issues.

The value chain model: A. highlights specific activities in the business where competitive strategies can best be applied. B. categorizes four basic strategies a firm can use to enhance its value chain. C. sees the supply chain as the primary activity for adding value. D. enables more effective product differentiation. E. categorizes five related advantages for adding value to a firm's products or services.

A. highlights specific activities in the business where competitive strategies can best be applied.

The four major competitive strategies are: A. low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy. B. low-cost leadership, substitute products and services, customers; and suppliers. C. new market entrants, substitute products and services, customers, and suppliers. D. low-cost leadership, new market entrants, product differentiation, and focus on market niche. E. customers, suppliers, new market entrants, and substitute products

A. low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy.

Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors. A. market niche B. product differentiation C. process efficiency D. mass customization E. low-cost leadership

A. market niche

When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as A. transaction costs. B. procurement. C. agency costs. D. network costs. E. switching costs.

A. transaction costs.

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A. The judicial system B. Accountability C. The courts of appeal D. Liability E. Due process

B. Accountability

Which of the following statements about organizations is not true? A. An organization is a collection of rights, privileges, obligations, and responsibilities delicately balanced over a period of time through conflict and conflict resolution. B. An informal group can be considered to be an organization. C. An organization is a formal, legal entity with internal rules and procedures that must abide by laws. D. An organization is a stable, formal social structure that takes resources from the environment and processes them to produce outputs. E. An organization is a collection of people and other social elements.

B. An informal group can be considered to be an organization.

Which of the following best describes Immanuel Kant's categorical imperative? A. One should take the action that produces the least harm or incurs the least cost. B. If an action is not right for everyone to take, it is not right for anyone to take. C. You should act towards others as you would like them to act towards you. D. One can put values in rank order and understand the consequences of various courses of action. E. If an action cannot be taken repeatedly, then it is not right to be taken at any time.

B. If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following marketplace forces would be of least concern to a manufacturer of deep-sea oil rigs? A. Product differentiation B. New market entrants C. Low number of customers D. Traditional competitors E. Low number of suppliers

B. New market entrants

________ means that you accept the potential costs and obligations for the decisions you make. A. Accountability B. Responsibility C. Liability D. Due process E. Duty

B. Responsibility

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? A. The Gramm-Leach-Bliley Act B. The Privacy Act C. HIPPA D. COPPA E. The Freedom of Information Act

B. The Privacy Act

Which of the following is not true about the changes to EU data protection rules proposed in 2012? A. The new rules would apply only to all companies providing services in Europe. B. The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data. C. The new rules would require Internet companies to delete information at the user's request. D. The new rules would reject the right to be forgotten. E. The new rules would require Internet companies to retain information only as long as absolutely necessary.

B. The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data.

Which of the following is not an example of the potential dark side of big data? A. Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. B. Use of computerized systems to filter and hire job applicants. C. Analyzing data from sensors installed in local parks to monitor soil moisture. D. Police visits to individuals whom a computer system identified as likely to commit a crime in the future. E. Use of a device installed in a car to analyze driving habits.

C. Analyzing data from sensors installed in local parks to monitor soil moisture.

Which of the following statements about business processes is not true? A. Business processes influence the relationship between an organization and information technology. B. Business processes are a collection of standard operating procedures. C. Business processes are typically unaffected by changes in information systems. D. Business processes are usually ensconced in an organization's culture. E. A business firm is a collection of business processes.

C. Business processes are typically unaffected by changes in information systems.

Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete? A. Competitive advantage model B. Demand control model C. Competitive forces model D. Network economics model E. Agency costs model

C. Competitive forces model

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? A. His action is acceptable, because the grocer suffers the least harm. B. His action is wrong, because the grocery store owner is harmed. C. His action is acceptable, because the higher social value is the survival of the family. D. His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E. His action is wrong, because the man would not want the grocer to steal from him.

C. His action is acceptable, because the higher social value is the survival of the family.

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: A. consumers should be able to review and contest the accuracy and completeness of data. B. firms should require consumer consent and provide clear options to opt out of data collection. C. firms should limit the length of time that any personal data is stored to six months or less. D. firms should increase the transparency of their data collection. E. firms should build products and services that protect privacy.

C. firms should limit the length of time that any personal data is stored to six months or less.

The ethical "no free lunch" rule states that: A. one can put values in rank order and understand the consequences of various courses of action. B. one should take the action that produces the least harm or incurs the least cost. C. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. D. if an action cannot be taken repeatedly, then it is not right to be taken at any time. E. if an action is not right for everyone to take, it is not right for anyone to take.

C. if something someone else has created is useful to you, it has value, and you should

All of the following statements are true about information technology's impact on business firms except: A. it helps firms lower the cost of market participation. B. it helps reduce internal management costs. C. it helps firms expand in size. D. it helps reduce agency costs. E. it helps reduce transaction costs.

C. it helps firms expand in size.

The Internet increases the bargaining power of customers by A. enabling the development of new services. B. making more products available. C. making information available to everyone. D. creating new opportunities for building loyal customer bases. E. lowering transaction costs.

C. making information available to everyone.

A firm can exercise greater control over its suppliers by having: A. global suppliers. B. local suppliers. C. more suppliers. D. fewer suppliers. E. only a single supplier.

C. more suppliers.

The expenses incurred by a customer or company in lost time and resources when changing from one supplier or system to a competing supplier or system are known as: A. retention costs. B. differentiation costs. C. switching costs. D. preservation costs. E. variation costs.

C. switching costs.

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A. the utilitarian principle B. the risk aversion principle C. the Golden Rule D. the "no free lunch" rule E. Kant's categorical imperative

C. the Golden Rule

The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as: A. the point of no return. B. network inelasticity. C. the law of diminishing returns. D. virtual economics. E. supply and demand.

C. the law of diminishing returns.

Which of the following statements about the technical view of organizations is not true? A. It sees the organization as a social structure similar to a machine. B. It emphasizes group relationships, values and structures. C. It sees information systems as a way to rearrange the inputs and outputs of the organization. D. It sees the inputs and outputs, labor and capital, as being infinitely malleable. E. It sees capital and labor as primary production factors.

D. It sees the inputs and outputs, labor and capital, as being infinitely malleable.

________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors. A. Low-cost leadership B. Focusing on market niche C. Strengthening supplier intimacy D. Product differentiation E. Strengthening customer intimacy

D. Product differentiation

Information systems enhance core competencies by: A. providing better reporting facilities. B. fostering synergies among departments. C. allowing operational employees to interact with management. D. encouraging the sharing of knowledge across business units. E. creating educational opportunities for management.

D. encouraging the sharing of knowledge across business units.

Along with capital, ________ is the primary production input that the organization uses to create products and services. A. culture B. structure C. feedback D. labor E. politics

D. labor

The parts of an organization's infrastructure, human resources, technology, and procurement that make the delivery of the firm's products or services possible are known as ________ activities. A. auxiliary B. primary C. secondary D. support E. service

D. support

When two organizations pool markets and expertise that result in lower costs and generate profits, they are creating: A. net marketplaces. B. a value chain. C. core competencies. D. synergies. E. a value web.

D. synergies.

Which of the following protects the authors of a book from having their work copied by others? A. Trade Secret law B. Fair Use Doctrine C. Patent protection D. Due process E. Copyright law

E. Copyright law

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? A. Accountability and control B. System quality C. Property rights and obligations D. Quality of life E. Information rights and obligations

E. Information rights and obligations

Which of the following is a primary drawback to the "do anything anywhere" computing environment? A. It leads to employees being paid less for the total amount of work performed. B. It makes work environments less pleasant. C. It centralizes power at corporate headquarters. D. It creates a digital divide. E. It blurs the traditional boundaries between work and family time.

E. It blurs the traditional boundaries between work and family time.

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? A. Property rights and obligations B. Family and home C. System quality D. Accountability and control E. Quality of life

E. Quality of life

Which of the following industries has the lowest barrier to entry? A. Airline B. Automotive C. Computer chip D. Solar energy E. Small retailer

E. Small retailer

Which of the following best describes how new information systems can result in legal gray areas? A. They are little understood by politicians or lawyers. B. They are created from sets of logical and technological rules rather than social or organizational mores. C. They work with networked, digital data, which are more difficult to control than information stored manually. D. They are implemented by technicians rather than managers. E. They result in new situations that are not covered by old laws.

E. They result in new situations that are not covered by old laws.

A(n) ________ is an activity for which a firm is a world-class leader. A. expertise area B. competitive advantage C. growth driver D. efficiency E. core competency

E. core competency

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. A. PGP B. P3P C. safe harbor D. opt-in E. opt-out

E. opt-out

"Look and feel" copyright infringement lawsuits are concerned with: A. violation of a monopoly on the ideas behind a product. B. using the graphical elements of another product. C. the distinction between tangible and intangible ideas. D. using the creative elements of another product. E. the distinction between an idea and its expression.

E. the distinction between an idea and its expression.


Conjuntos de estudio relacionados

Unit XIV- Nursing Care of the Patient with Problems of the Integumentary System

View Set

Exam 5 Unit IX/VIII Nursing Care of Patients with Problems of Digestion, Peptic Ulcer

View Set

Chapter 10: Capillary Puncture Equipment, Principles and Procedures

View Set

Special senses autonomic nervous system homework:

View Set