ISDS 351 Chapter 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

18. _____ is a free software project that produces libraries and programs for handling multimedia data. a. FLmpeg b. FFmpeg c. LLmpeg d. PLmpeg

b. FFmpeg

Positive perception, adoption, and institutionalization are the stages of the _____ phase of the Change Management Continuum Model. a. inform b. educate c. contact d. commit

b. educate

The set of information technology (IT) hardware, software, and networks in an organization is called its _____. a. IT organization b. IT hierarchy c. IT infrastructure d. IT board

c. IT infrastructure

Fillkart, an online shopping Web site, needs to share data for purchase orders, invoices, and payments along with information about common suppliers and financial institutions. Which of the following will support these needs of Fillkart? a. Customer relationship management. b. Product life cycle management. c. Interorganizational information system. d. Enterprise resource planning.

c. Interorganizational information system.

In _____, the audio and video information is shown from the presenter to participants. a. screen sharing b. network sharing c. Webcasting d. podcasting

c. Webcasting

Which of the following information systems employ an analytic model to help users gain insights into a problem situation, examine alternate solutions, and recommend an appropriate course of action? a. A word processing software b. A decision support system c. A spreadsheet software d. A web conferencing system

b. A decision support system

Which of the following best describes the awareness stage of the Change Management Continuum Model? a. A person becoming aware that a change is to take place b. A person gaining basic knowledge of the change c. A person incorporating the change in routine operating procedures d. A person committed to a change due to personal interest

b. A person gaining basic knowledge of the change

Which of the following adopter categories is considered as risk takers? a. Laggard b. Early majority c. Late majority d. Innovator

d. Innovator

Interorganizational systems are examples of _____. a. group information technologies b. private information technologies c. marketing information technologies d. enterprise information technologies

d. enterprise information technologies

The _____ explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization. a. Change Management Continuum Model b. Diffusion of Innovation Theory c. Change Management Consistent Model d. Unified Theory of Acceptance and Use of Technology

b. Diffusion of Innovation Theory

Which of the following information technologies (IT) include information systems that improve the productivity of individual users in performing stand-alone tasks? a. Enterprise IT b. Personal IT c. Group IT d. Prototype IT

b. Personal IT

Identify the industry that has the highest information technology spending. a. Agriculture b. Food c. Finance d. Automobile

c. Finance

Identify the stage in the Change Management Continuum Model that incorporates the changes in the routine operating procedures of an organization. a. Internalization b. Perception c. Adoption d. Institutionalization

d. Institutionalization

. _____ systems support the sales and marketing processes. a. Customer relationship management (CRM) b. Product life cycle management (PLM) c. Enterprise resource planning (ERP) d. Organizational information system (OIS)

a. Customer relationship management (CRM)

Which of the following is true of the Internalization phase of the Change Management Continuum Model? a. Employees are highly committed to the change because it suits their interests. b. Employees formally incorporate the change into routine operating procedures of the organization. c. Employees comprehend the nature and intent of the change and how he or she will be affected. d. Employees gain a basic knowledge of the change.

a. Employees are highly committed to the change because it suits their interests.

Which of the following scenarios best describes the violation of legally mandated procedures for controlling the information technology (IT) assets? a. IT system controls are inadequate to meet specific federal Sarbanes-Oxley guidelines that require companies to maintain the integrity of financial data. b. IT system controls are violated so that the same person can both initiate a purchase order and approve the invoice for that purchase order. c. Employees waste time at work visiting Web sites unrelated to their work. d. Hackers access and download customer data, including account numbers, and carry out a denial-of-service attack on an organization's Web site.

a. IT system controls are inadequate to meet specific federal Sarbanes-Oxley guidelines that require companies to maintain the integrity of financial data.

Which of the following is a phase of the Change Management Continuum Model? a. Inform b. Adopt c. Perception d. Internalization

a. Inform

_____ includes all tools that capture, store, process, exchange, and use information. a. Information technology b. Information hierarchy c. Information board d. Information broadcast

a. Information technology

Which of the following is true of Bluepages? a. It enables an employee to contact other employees and their backups. b. It captures data from company transactions and other key events. c. It supports sales, marketing, and customer service processes. d. It supports the flow of data among different organizations to achieve shared goals.

a. It enables an employee to contact other employees and their backups.

Which of the following is true of interorganizational information systems? a. It speeds up the flow of material and information. b. It increases the effort of processing a transaction. c. It increases the cost of processing a transaction. d. It reduces the flow of payments while concentrating on the flow of material and information.

a. It speeds up the flow of material and information.

Which of the following adopter categories is very conservative and highly skeptical of change? a. Laggard b. Early majority c. Early adopter d. Innovator

a. Laggard

Which of the following acts as an input to the shipment planning transaction processing system that determines the orders to be filled, the shipping date, and the location from which each order will be shipped? a. The open order file b. The planned order file c. The exchange order file d. The local order file

a. The open order file

What is the strategy required by successful enterprise information technology system? a. Top-down imposition of standards and procedures b. Bottom-up imposition of standards and procedures c. Refactoring the standards and procedures d. Reengineering the standards and procedures

a. Top-down imposition of standards and procedures

Which of the following uses information technology to conduct meetings or presentations via the Internet? a. Web conferencing b. Really simple syndication feed c. Podcast d. Electronic bulletin board

a. Web conferencing

Increased costs and wasted effort are consequences of: a. failed information technology projects. b. missed information technology projects. c. complicated information technology projects. d. overlooked information technology projects.

a. failed information technology projects.

The Change Management Continuum Model, the Unified Theory of Acceptance and Use of Technology, and the Diffusion of Innovation Theory are the theories that can help: a. in smooth introduction and adoption of information technology. b. to identify appropriate information technology opportunities. c. in ensuring that information technology risks are mitigated. d. to implement the section 404 of the Sarbanes-Oxley Act.

a. in smooth introduction and adoption of information technology.

Rapidstudy, an online platform, is used to enhance the learning capabilities of students. This is an example of: a. personal information technology. b. enterprise information technology. c. group information technology. d. prototype information technology.

a. personal information technology.

In an enterprise information technology, payroll is a part of the: a. target process. b. requirement process. c. design process. d. planning process.

a. target process.

A _____ captures data from company transactions and other key events, and then updates the firm's records, which are maintained in electronic files or databases. a. transaction processing system (TPS) b. transaction migration system (TMS) c. transaction secured system (TSS) d. transaction broadcast system (TBS)

a. transaction processing system (TPS)

A _____ is a Web site that allows users to edit and change its content easily and rapidly. a. wiki b. forum c. podcast d. blog

a. wiki

The _____ provides a roadmap to guide the management actions at each stage of the introduction of a new system. a. Unified Acceptance Model b. Change Management Continuum Model c. Change Management Technology Model d. Diffusion of Innovation Model

b. Change Management Continuum Model

What approach should be followed by managers to ensure that information technology innovations pay off? a. Linguistic b. Holistic c. Relativistic d. Imperialistic

b. Holistic

Which of the following best describes an enterprise system? a. It captures data from company transactions and other key events, and then updates the firm's records, which are maintained in electronic files or databases. b. It enables the sharing of information across all business functions and all levels of management. c. It includes information systems that improve communications and support collaboration among the members of a workgroup. d. It encompasses a number of computer-enhanced learning techniques, including computer-based simulations, multimedia DVDs, Web-based learning materials, hypermedia, podcasts, and Webcasts.

b. It enables the sharing of information across all business functions and all levels of management.

Which of the following is true of a Webinar? a. It automatically delivers to subscribers the updated posts from their favorite blogs with limited one-way communication. b. It is a live Internet presentation that supports interactive communications between the presenter and the audience. c. It provides a set of tools to report project status. d. It determines the resource availability and schedule rooms for meetings over the internet.

b. It is a live Internet presentation that supports interactive communications between the presenter and the audience.

An organization has to submit an audit to prove that it has accurate information on their assets. This is done to be in accordance to the: a. Section 906 of the Sarbanes-Oxley Act. b. Section 404 of the Sarbanes-Oxley Act. c. Section 802 of the Sarbanes-Oxley Act. d. Section 301 of the Sarbanes-Oxley Act.

b. Section 404 of the Sarbanes-Oxley Act.

John, a product manager, decides to adopt to a new strategy to improve the quality of products served by his company. He also has the additional responsibility of convincing his team members to use the new strategy. In the context of innovation adopters, John is an example of a(n): a. laggard. b. early adopter. c. early majority. d. late majority.

b. early adopter.

Web conferencing and electronic corporate directories are examples of: a. personal information technologies. b. group information technologies. c. process information technology. d. prototype information technology.

b. group information technologies.

Organizations are concerned about the profits they receive for their investments in information technology (IT) than the amount spent on the investment. This is to done to: a. ensure smooth introduction and adoption of IT. b. identify appropriate IT opportunities. c. ensure that IT risks are mitigated. d. adopt the section 404 of the Sarbanes-Oxley Act.

b. identify appropriate IT opportunities.

The scope of the project, the data captured, and the usability of new information technology systems are some of the decisions taken by: a. software developers. b. managers. c. software testers. d. network administrators

b. managers.

Data breaches lead to: a. the physical damage of a personal computer. b. the loss of business opportunity. c. the decreased customer support cost for information hotlines. d. the decreased customer support cost for credit monitoring services.

b. the loss of business opportunity.

Successful implementation of enterprise information technology system requires: a. a set of tools for project managers and members to report project plans and status. b. the radical redesign of fundamental work processes and the automation of new processes. c. information systems that improve communications and support collaboration among members of a workgroup. d. integrated data, text, voice, and video in a single solution that encompasses instant messaging, presence information, and video conferencing.

b. the radical redesign of fundamental work processes and the automation of new processes.

Which of the following information technologies (IT) is used by organizations to define structured interactions among their own employees and with external customers? a. Private IT b. Group IT c. Enterprise IT d. Prototype IT

c. Enterprise IT

Which of the following systems support the supply chain processes such as order processing, inventory management, and purchasing? a. Customer relationship management (CRM) b. Product life cycle management (PLM) c. Enterprise resource planning (ERP) d. Organizational information system (OIS)

c. Enterprise resource planning (ERP)

Which of the following best describes a group information technology information system? a. It includes information systems that improve the productivity of individual users in performing stand-alone tasks. b. It includes information systems that organizations use to define structured interactions with external customers. c. It includes information systems that improve communications and support collaboration among members of a project. d. It includes information systems that organizations use to define structured interactions among their employees and suppliers.

c. It includes information systems that improve communications and support collaboration among members of a project.

Which of the following scenarios best describes the compromise of confidential data regarding organizational plans, products, or services? a. Fire destroys all the physical assets in an organization. b. Employees use corporate email to disseminate sexually explicit material. c. Senior executive loses laptop containing critical data. d. Employees waste time at work visiting Web sites unrelated to their work.

c. Senior executive loses laptop containing critical data.

In the Unified Theory of Acceptance and Use of Technology, who provides the technical infrastructure help in learning and using the new technology? a. End user b. Client c. Super user d. Tester

c. Super user

Which of the following models describe the key activities that are needed to build commitment for change? a. The Unified Acceptance Model b. The Change Management Technology Model c. The Change Management Continuum Model d. The Diffusion of Innovation Model

c. The Change Management Continuum Model

Which of the following best describes late majority? a. They are the first to try new products and ideas. b. They listen to and follow the opinion of leaders. c. They are skeptical to changes and new ideas. d. They are the leaders whom others listen to and understand the need for change.

c. They are skeptical to changes and new ideas.

The _____ stage of the Change Management Continuum Model demonstrates a positive impact on the organization. a. internalization b. institutionalization c. adoption d. perception

c. adoption

VisualDX provides instant access to concise disease information and high-quality medical images. This is an example of: a. word processing system. b. interorganizational information system. c. decision support system. d. online learning system.

c. decision support system.

Data assets must be secured from unwanted intrusion, loss, and alteration. This is to: a. ensure the smooth adoption of the systems information technology. b. ensure the smooth transfer of information technology. c. ensure the smooth mitigation of risks in information technology. d. ensure the smooth induction of information technology.

c. ensure the smooth mitigation of risks in information technology.

. Hackers carry out a denial-of-service attack on an organization's Web site. This leads to the: a. violation of legally mandated procedures for controlling information technology assets. b. violation of generally accepted accounting principles. c. inability to continue operations due to a deliberate attack on the information technology assets. d. theft of computers from a corporate training facility.

c. inability to continue operations due to a deliberate attack on the information technology assets.

. Shipment planning and shipment execution are the stages involved in: a. inventory control. b. structured interaction. c. order processing. d. target process.

c. order processing.

Which of the following is an example of a personal information technology system? a. Project management software b. Instant messaging service c. Transaction processing system d. Decision support system

d. Decision support system

Which of the following is used in large organizations to find the right person to collaborate on an issue or on an opportunity? a. Electronic bulletin boards b. Electronic yellow pages c. Electronic enterprise systems d. Electronic corporate directories

d. Electronic corporate directories

Which of the following supports the flow of data among different organizations to achieve shared goals? a. Customer relationship management b. Product life cycle management c. Enterprise resource planning system d. Interorganizational information system

d. Interorganizational information system

Which of the following is the most basic form of Web conferencing? a. Podcasting b. Network sharing c. Webinar d. Screen sharing

d. Screen sharing

Which of the following requires that all reports filed with the Securities and Exchange Commission (SEC) include a statement signed by the chief executive officer and the chief financial officer attesting the accuracy of the information provided in the reports? a. Smooth adoption of information technology b. Smooth introduction of information technology c. Diffusion of innovation Act d. Section 404 of the Sarbanes-Oxley Act

d. Section 404 of the Sarbanes-Oxley Act

Which of the following is a step taken by organizations to ensure efficient and effective sharing of information? a. Discussing the gist of the information b. Duplicating the information c. Increasing the cost of processing the information d. Using compatible technologies

d. Using compatible technologies

Exposing employee and customer personal data to an untrusted environment is an example of: a. data spam. b. data phishing. c. data adware. d. data breach.

d. data breach.

Customer relationship management (CRM) and product life cycle management (PLM) are common types of: a. personal systems. b. group systems. c. resource planning systems. d. enterprise systems.

d. enterprise systems.

Employees of Jackshay Corp. misuse their time by viewing online shopping Web sites that is unrelated to their job. This leads to: a. violation of generally accepted accounting principles. b. violation of the organization's defined procedures and/or accounting practices. c. compromise of confidential data regarding organizational plans, products, or services. d. inappropriate use of information technology resources that reduces worker productivity.

d. inappropriate use of information technology resources that reduces worker productivity.

Hypermedia, podcasts, and Webcasts are the techniques used in: a. decision enabled systems. b. product lifecycle systems. c. transaction processing systems. d. online learning systems.

d. online learning systems.

Usefulness, ease of use, management expectations, and facilitating conditions are the key factors of: a. the Change Management Continuum Model. b. the Diffusion of Innovation Theory. c. the Change Management Consistent Model. d. the Unified Theory of Acceptance and Use of Technology.

d. the Unified Theory of Acceptance and Use of Technology.

Data captured using the order entry transaction processing system is used to: a. replicate a set of orders. b. process the refund for returned orders. c. create new orders. d. update a file of open orders.

d. update a file of open orders.


Conjuntos de estudio relacionados

Human Resource Management or HRM

View Set

Sustantivos femeninos con terminación "-cion"/"-sion"/"-dad"/"-tad"/"-tud"

View Set

Nurs 211 Chapter 17: Implementing

View Set

MIS Chapter 1, MIS Chapter 2, MIS Chapter 3, MIS Chapter 4

View Set

Chapter 8: Financing Real Estate

View Set

Mother Baby NCLEX practice questions week 1

View Set

Three types of Cartilage (connective tissue)

View Set

Biology 114- Chapter 14 LearnSmart

View Set

Chapter 29: Care of Patients with Respiratory Emergencies (PRACTICE)

View Set

Micro - Quiz #19 - Actinomycosis and Candidiasis

View Set