MIS Chapter 4, BUS 335 Ch. 1-4, BTE FINAL

¡Supera tus tareas y exámenes ahora con Quizwiz!

A: Behavioral targeting

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. A) behavioral targeting B) Web bugs C) NORA D) intelligent agents E) FIP principles

Data Visualization

After processing, Data Presented to users in visual formats such as text, graphics, and tables.

B: False

All business processes are formally documented by an organization. A) TRUE B) FALSE

17. Big Data primarily deals with ______________ data. A. Semi-structured B. Structured C. Unstructured D. All of the above

All of the above

E: Nike's use of celebrities to market their products

All of the following are IT-enabled products and services providing competitive advantage except: A) Amazon's one-click shopping. B) Apple's iPod and iTunes. C) Ping's golf club customization. D) PayPal's online person-to-person payment system. E) Nike's use of celebrities to market their products.

C: External environment

All of the following are competitive forces in Porter's model except: A) suppliers. B) new market entrants. C) external environment. D) customers. E) substitute products.

B: False

An SCM is considered to be an intraorganizational system because it manages information that flows between different companies. A) TRUE B) FALSE

A: True

An efficient customer response system directly links consumer behavior to distribution and production and supply chains. A) TRUE B) FALSE

A: True

An example of a remote, synchronous collaboration tool is a Skype conference call using VOIP and webcams. A) TRUE B) FALSE

B: False

An inventory control system is an example of an MIS. A) TRUE B) FALSE

Business Intelligence

Broad category of applications, technologies, and processes for gathering, storing, accessing, and analyzing data to help business users make better decisions.

____________ refers to the fact that when users carry an open mobile device, they can be reached instantly, even across great distances. A. Broad reach B. Instant connectivity C. Mobility D. Ubiquity

Broad reach

35) FIP principles are based on a belief in which of the following? A) Accountability of the record holder B) Responsibility of the record holder C) Mutuality of interest between the record holder and the individual D) Privacy of the individual E) Difference between the interests of the individual and commercial organizations

C

47) Which of the following protects the authors of a book from having their work copied by others? A) Patent protection B) Due process C) Copyright law D) Fair Use Doctrine E) Trade Secret law

C

89) Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? A) CVS B) Technostress C) Digital divide D) RSI E) CTS

C

5) Which of the following is not one of the current key technology trends that raises ethical issues? A) Data storage improvements B) Data analysis advancements C) Increase in data quality D) Increase in use of mobile devices E) Advances in networking technology

C

55) ________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. A) Copyright law B) Trademark law C) Patent law D) Trade secret protection E) Privacy law

C

8) Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? A) HIPAA B) FIP C) NORA D) COPPA E) Spyware

C

91) Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? A) CTS B) CVS C) RSI D) Technostress E) RSS

C

6. The Sarbanes-Oxley Act of 2002 holds ______________ personally responsible for disclosing the effectiveness of their financial controls. A. CFOs B. CIOs C. COOs D. CSOs

CFOs

B: False

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on. A) True B) False

49. Which of the following is NOT an advantage of solid state drives over hard drives? A. Cost B. Heat production C. Power use D. Speed

Cost

A: True

Creating a marketing plan is an example of a business process. A) TRUE B) FALSE

A: True

Creative work driven by new knowledge and information is a significant part of management responsibility. A) TRUE B) FALSE

B: False

Cross-functional systems are being phased out in favor of systems that support business processes within a single functional group, such as human resources. A) TRUE B) FALSE

A: True

Customers are one of the competitive forces that affect an organization's ability to compete. A) TRUE B) FALSE

7. __________________________ is an approach to managing information across an entire organization. A. Big Data B. Data governance C. Master data D. Master data management

Data governance

B: False

Data is information that has been shaped into a form that is meaningful to human beings. A) TRUE B) FALSE

E: Ease of establishing uniqueness

Digital media differs from a physical book in all of the following ways except: A) ease of replication. B) ease of alteration. C) ease of transmission. D) ease of global distribution. E) ease of establishing uniqueness.

Key Performance Indicators (KPI)

Dimensions that gauge an org's performance (ROI, revs, pg views, op'l costs; and page views, network traffic, transactions per second).

B: Operations research, management science, and computer science

Disciplines that contribute to the technical approach to information systems include: A) computer science, engineering, and networking. B) operations research, management science, and computer science. C) engineering, utilization management, and computer science. D) management science, computer science, and engineering. E) economics, sociology, and psychology.

__________ is an identity theft technique. A. Dumpster diving B. Espionage C. Sabotage D. Vandalism

Dumpster diving

Which of the following is NOT a telemedicine model used by the Miami Children's Hospital? A. Dynamic B. Extremely static C. Mobile D. Semistatic

Dynamic

38) Which of the following is not a U.S. federal law affecting private institutions? A) COPPA B) HIPAA C) Gramm-Leach-Bliley Act D) Video Privacy Protection Act E) Computer Matching and Privacy Protection Act

E

11) In today's legal environment, managers who are convicted for the misuse of information systems are still unlikely to be given a prison sentence.

FALSE

69) Software programs were unprotected by copyright law until the early 1990s.

FALSE

75) Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person.

FALSE

93) Spam is legally defined as any e-mail that is unsolicited.

FALSE

10) Routine violations of individual privacy are made more difficult by advances in data storage.

FALSE

27) Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue.

FALSE

66) The rate of global software piracy in 2015 was approximately 50%.

FALSE

74) COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

FALSE

92) Gaining unapproved access to a computer is not a federal crime.

FALSE

The emergence of the Internet has decreased the threats to information security.

False

The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.

False

Thin-client systems are more complex than fat client systems.

False

Tracking down cybercriminals is the most difficult and only real challenge authorities face.

False

Transferring data from the organization's operational databases into its data warehouse is called data reconciliation.

False

When various copies of the data agree, this is an example of data integrity.

False

Wi-Fi is a wireless standard that enables temporary, short-range connections between mobile devices.

False

Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations.

False

22. You purchased a laptop and installed Word, Excel, Outlook, and other useful applications on it; this makes your laptop a _______________-client system. A. Cloud B. Fat C. Thin D. Open

Fat

24. If ________ clients lose access to the internet, they are still useable. A. Fat B. Heavy C. Skinny D. Thin

Fat

A: True

Feedback is output returned to appropriate members of the organization to help them evaluate or correct the input stage. A) TRUE B) FALSE

Interpersonal Roles

Figurehead, leader, liaison.

B: His action is acceptable, because the higher social value is the survival of the family

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? A) His action is acceptable, because the grocer suffers the least harm. B) His action is acceptable, because the higher social value is the survival of the family. C) His action is wrong, because the man would not want the grocer to steal from him. D) His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E) His action is wrong, because the grocery store owner is harmed.

30. _____________________ is a source-data automation input device. A. A digital pen B. A graphics tablet C. A point-of-sale terminal D. Voice recognition

A point-of-sale terminal

A: True

A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals. A) TRUE B) FALSE

D: MIS

A relocation control system that reports summaries on the total moving, house hunting, and home financing costs for employees in all company divisions falls into which of the following categories? A) KMS B) TPS C) ESS D) MIS E) DSS

software

A set of computer programs that enable the hardware to process data.

28. ____________ is a human data-entry device. A. An ATM B. A barcode scanner C. A trackball D. RFID

A trackball

social interface

A user interface that guides the user through computer applications by using cartoonlike characters, graphics, animation, and voice commands.

D: Manages data entry staff

An information systems manager: A) writes software instructions for computers. B) acts as liaison between the information systems group and the rest of the organization. C) translates business problems into information requirements. D) manages data entry staff. E) oversees the company's security policy.

The advantage of ________________ is they can be read over greater distances. A. Active RFID tags B. Passive RFID tags C. QR codes D. WSNs

Active RFID tags

Which if the following is not a common risk mitigation strategy? a) Risk analysis. b) Risk limitation. c) Risk acceptance. d) Risk transference.

Risk analysis.

______________________ is the wireless transmission and receipt of data gathered from remote sensors. A. A mobile portal B. A voice portal C. The Internet of Things D. Telemetry

Telemetry

_______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan. A. Risk B. Risk analysis C. Risk management D. Risk mitigation

Risk mitigation

B: False

Routine violations of individual privacy are made more difficult by advances in data storage. A) True B) False

A: True

Routines are also called standard operating procedures. A) TRUE B) FALSE

Shodan is used for _________. A. creating a backdoor B. SCADA attacks C. spreading viruses D. phishing

SCADA attacks

5. _____________ manipulates the data and controls the tasks performed by the other components. A. AI B. EDI C. ERP D. The CPU

The CPU

A: True

The European Parliament has banned unsolicited commercial messaging A) True B) False

E: Websites must disclose the information practices before collecting data

The FIP principle of Notice/Awareness states that: A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there must be a mechanism in place to enforce FIP principles. D) consumers should be able to review the data collected about them. E) websites must disclose their information practices before collecting data.

proprietary software

Software that has been developed by a company and has restrictions on its use, copying, and modification.

speech-recognition software

Software that recognizes and interprets human speech, either one word at a time (discrete speech) or in a stream (continuous speech)

48. __________ are the fastest form of secondary storage. A. Optical storage devices B. Magnetic disks C. Magnetic tapes D. Solid-state drives

Solid-state drives

A: True

Some experts believe that exposure to computers reduces intelligence and makes people dumb. A) True B) False

A: True

Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded. A) True B) False

B: False

Spam is legally defined as any e-mail that is unsolicited. A) True B) False

According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed. A. the Heartbleed bug B. FireEye C. Shodan D. SpyEye

SpyEye

2. Decisions about hardware are NOT focused on __________. A. Appropriateness for the task B. Cost C. Speed D. Strategic value

Strategic value

C: Making information available to everyone

The Internet increases the bargaining power of customers by: A) creating new opportunities for building loyal customer bases. B) making more products available. C) making information available to everyone. D) lowering transaction costs. E) enabling the development of new services

12) Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

TRUE

28) Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

TRUE

29) Liability is a feature of political systems and allows individuals to recover damages done to them by others.

TRUE

62) The European Parliament has banned unsolicited commercial messaging.

TRUE

64) Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

TRUE

65) Most Internet businesses do very little to protect the privacy of their customers.

TRUE

67) Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.

TRUE

68) Copyright is a legal protection given to creators of certain types of intellectual property.

TRUE

70) The problem with web browsers' Do Not Track options is that websites aren't obligated to honor these settings.

TRUE

71) European countries do not allow businesses to use personally identifiable information without consumers' prior consent.

TRUE

72) One of the key concepts in patent law is novelty.

TRUE

73) Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded.

TRUE

76) Web beacons are tiny, invisible software programs hidden in e-mail messages and web pages that are used to track and report a user's online behavior.

TRUE

94) Some experts believe that exposure to computers reduces intelligence and makes people dumb.

TRUE

95) Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.

TRUE

E: Online seal program

TRUSTe is an example of which of the following? A) Web beacon B) Behavioral targeting program C) Opt-out program D) Spyware E) Online seal program

B: Online privacy issues

The NAI is an industry association formed to help with which of the following? A) Copyright protection B) Online privacy issues C) Patent protection D) Trademark protection E) Trade secret protection

D: Customer intimacy

The Mandarin Oriental's use of computer systems to keep track of guests' preferences is an example of which of the following? A) Improved flexibility B) Improved decision making C) Improved efficiency D) Customer intimacy E) Operational excellence

B: Market niche

Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors. A) product differentiation B) market niche C) mass customization D) process efficiency E) low-cost leadership

B: False

For nonroutine decision making, senior managers rely on management information systems. A) TRUE B) FALSE

______________ satellites are the most expensive to build and launch. A. GEO B. LEO C. MEO D. SEO

GEO

B: False

Gaining unapproved access to a computer is not a federal crime. A) True B) False

personal application software

General-purpose, off-the-shelf application programs that support general types of processing, rather than being linked to any specific business function.

A: True

Global firms can collaborate from different locations at the same time using synchronous collaboration tools. A) TRUE B) FALSE

____________ purchased Skybox in 2014 to keep its maps updated. A. Amazon B. Facebook C. Google D. Microsoft

Google

31. _____________ is use to plan and control Business Intelligence activities. A. A data dictionary B. ETL C. Governance D. Metadata

Governance

The airport's self check-in computers are a(n) __________ threat. A. outside B. employee C. hardware D. software

Hardware

A smart ID card is something the user _______. A. Does B. Has C. Is D. Knows

Has

B: False

High product differentiation is a sign of a transparent marketplace. A) TRUE B) FALSE

C: 300,000

How many service jobs move offshore to lower-wage countries in a typical year? A) 3,000 B) 30,000 C) 300,000 D) 3 million E) 30 million

D: About $1 trillion

How much did American businesses spend on information systems hardware, software, and telecommunications equipment in 2015? A) About $100 million B) About $1 billion C) About $100 billion D) About $1 trillion E) About $10 trillion

10. Which of the following is NOT one of the most important issues for businesspeople in regard to hardware? A. What the hardware enables B. How it is advancing C. How much it costs D. How rapidly it is advancing

How much it costs

The adoption of __________ has been an important factor in the development of the Internet of Things. A. IPv1 B. IPv4 C. IPv6 D. IPv8

IPv6

40. You've been working at ABC Corp for 20 years. Even though they say they are an Equal Opportunity Employer, you know they prefer to hire people who personally know someone at the company. This is _________. A. Data B. Explicit knowledge C. Information D. Tacit knowledge

Tacit knowledge

D: Firms should limit the length of time that any personal data is stored to six months or less

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: A) firms should build products and services that protect privacy. B) firms should increase the transparency of their data collection. C) firms should require consumer consent and provide clear options to opt out of data collection. D) firms should limit the length of time that any personal data is stored to six months or less. E) consumers should be able to review and contest the accuracy and completeness of data.

B: Opt-out

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. A) opt-in B) opt-out C) P3P D) PGP E) safe harbor

B: False

In the value chain model, support activities are most directly related to the production and distribution of the firm's products and services, which create value for the customer. A) TRUE B) FALSE

B: False

In today's legal environment, managers who are convicted for the misuse of information systems are still unlikely to be given a prison sentence. A) True B) False

10. If your sales team shows a customer's name is "Johnny Smith" but your shipping department says it is "John A. Smith", this is a data __________ issue. A. Inconsistency B. Isolation C. Redundancy D. Security

Inconsistency

The Internet of Things is also called the _______. A. Industrial Everywhere Internet B. Internet of Anything C. Internet of Everything D. M2M Communication

Industrial Everywhere Internet

*SCADA attacks typically occur on ___________. A. Hacker networks B. Industrial control systems C. Personal computers D. Government networks

Industrial control systems

Google created a code fix for the Heartbleed bug. Which of the following is a TRUE statement? A. Home internet routers should be largely safe from this bug since they don't exchange enough sensitive data to be a target. B. Industrial control systems are highly vulnerable since they are updated infrequently. C. Organizations simply have to install the fix. D. Organizations need to install the fix and just create new private key-public key pairs.

Industrial control systems are highly vulnerable since they are updated infrequently.

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. A. Competitive intelligence B. Espionage C. Information extortion D. Intellectual property

Information extortion

40. Primary storage does NOT store the following: A. Data to be processed by the CPU B. Information for the organization's ERP system C. Instructions for the CPU as to how to process the data D. Operating system programs that manage various aspects of the computer's operation

Information for the organization's ERP system

A: True

Information systems are used to enable new products and services via product differentiation. A) TRUE B) FALSE

B: Raising the bargaining power of suppliers

Information systems can be used at the industry level to achieve strategic advantage by: A) building industrywide, IT-supported consortia and symposia. B) raising the bargaining power of suppliers. C) encouraging the entry of new competitors. D) enforcing standards that reduce the differences between competitors. E) decreasing switching costs

D: Encouraging the sharing of knowledge across business units

Information systems enhance core competencies by: A) providing better reporting facilities. B) creating educational opportunities for management. C) allowing operational employees to interact with management. D) encouraging the sharing of knowledge across business units. E) fostering synergies among departments.

B: False

Information systems literacy focuses primarily on knowledge of information technology. A) TRUE B) FALSE

A: True

Information technology (IT) consists of all hardware and software that a firm needs to use in order to achieve its business objectives. A) TRUE B) FALSE

8. ________________ technologies accept data and instructions and convert them to a form that the computer can understand. A. Input B. Primary C. Output D. Secondary

Input

4. Corporate databases are an example of a(n) _________ source of data. A. Clickstream B. External C. Internal D. Personal

Internal

B: False

Internet advertising is growing at approximately 5 percent a year. A) TRUE B) FALSE

A: True

Intranets link different systems and networks within a firm. A) TRUE B) FALSE

Biometrics is something the user _______. A. Does B. Has C. Is D. Knows

Is

45. Which of the following is TRUE of secondary storage? A. It is volatile. B. It takes less time to retrieve data from it than from RAM. C. It is more expensive than primary storage. D. It can utilize a variety of media, each with its own technology.

It can utilize a variety of media, each with its own technology.

44. Which of the following is FALSE of secondary storage? A. It is nonvolatile. B. It takes more time to retrieve data from it than from RAM. C. It is more expensive than primary storage. D. It can utilize a variety of media, each with its own technology.

It is more expensive than primary storage.

39. From smallest to largest, which of the following is in the correct order? A. KB, MB, GB, TB, PB, EB, ZB B. KB, MB, TB, GB, PB, EB, ZB C. MB, KB, GB, TB, PB, EB, ZB D. MB, KB, TB, GB, PB, EB, ZB

KB, MB, GB, TB, PB, EB, ZB

38. Intellectual capital is also called __________. A. Data B. Knowledge C. Information D. Wisdom

Knowledge

B: False

Knowledge workers make long-range strategic decisions about products and services. A) TRUE B) FALSE

Wi-Fi is a ______________. A. LAN B. MAN C. PAN D. WAN

LAN

19. __________ organizations typically utilize supercomputers. A. Small B. Medium C. Large D. Extra-large

Large

Status Access

Latest data available on KPI's or some other metric/trend.

A: True

Laws and regulations creating fair, stable market environments are examples of complementary social assets required to optimize returns from IT investments. A) TRUE B) FALSE

A: True

Liability is a feature of political systems and allows individuals to recover damages done to them by others A) True B) False

Strategic Controls

Long-range goals and policies for growth and resource allocation.

GPS are supported by ___ satellites a) LEO b) MEO c) GEO

MEO

______________ satellites require medium-powered transmitters. A. GEO B. LEO C. MEO D. SEO

MEO

47. ___________ is the cheapest form of memory. A. Cache B. Magnetic disk C. Magnetic tape D. RAM

Magnetic disk

46. Hard drives are a type of _____________ that are ______________ access. A. Magnetic disks; direct B. Magnetic disks; sequential C. Magnetic tapes; direct D. Magnetic tapes; sequential

Magnetic disks; direct

20. Which of the following is NOT a microcomputer? A. Desktop personal computer B. PC C. Mac D. Mainframe

Mainframe

21. Which of the following is NOT a PC? A. Desktop personal computer B. Mac C. Mainframe D. Microcomputer

Mainframe

18. ___________ have the highest performance and greatest reliability A. Laptop computers B. Mainframes C. Microcomputers D. Tablets

Mainframes

*Which of the following is FALSE? A. It is easier to be a hacker nowadays. B. Mainframes make it easy to communicate freely and seamlessly with everyone. C. Management doesn't always support security efforts. D. Thumb drives make it easy to steal huge amounts of sensitive information.

Mainframes make it easy to communicate freely and seamlessly with everyone.

B: Finance and accounting

Maintaining the organization's financial records is a central purpose of which main business function? A) Manufacturing and accounting B) Finance and accounting C) Sales and manufacturing D) Finance and sales E) Human resources

A: True

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware. A) True B) False

A: True

Managers can use DSS to make decisions about problems that are unusual and not easily specified in advance. A) TRUE B) FALSE

Cybercriminals _________ A. are violent criminals. B. can be easily arrested, once they are found. C. don't make that much money; they do it for fun. D. target known software security weaknesses.

Target known software security weaknesses.

Drill Down

Refers to the ability to delve into the details at several levels of data.

33. Which of the following types of primary storage is part of the CPU? A. Cache memory B. RAM C. Registers D. ROM

Registers

Exception Reporting

Reports that highlight deviations larger than certain thresholds. Reports may include only deviations.

1. Which of the following is FALSE? A. Hardware becomes obsolete more quickly than other organizational technologies. B. Knowing when to purchase hardware is one of the biggest difficulties. C. Technology is getting more advanced, so it tends to get more expensive as time progresses. D. You need to understand hardware because you may be making decisions about hardware purchases or upgrades.

Technology is getting more advanced, so it tends to get more expensive as time progresses.

B: False

Research has shown that a majority of firms are able to align their information technology with their business goals. A) TRUE B) FALSE

32) Define the basic concepts of responsibility, accountability, and liability as applied to ethical decisions. How are these concepts related? Short Answer:

Responsibility is first key element in ethical action. Responsibility whether as a group, individual, or organization accepts the potential costs, duties, and obligations for its decisions. Accountability is a feature of systems and social institutions where mechanisms are put in place as to who is responsible for a given action. Liability is a feature of political system where a body of law in place permits individuals to recover damages done to them by others. These concepts are related in that there is a clear interconnectedness in our decision making progress. Ex -> make a choice that is well thought out (exercising responsibility), accepting the potential upsides and downsides for said decision (being accountable), and knowing how to fix and or uses consequences of an action on others (being liable).

D: Enterprise applications

Which of the following systems is designed to support organization-wide process coordination and integration? A) DSS B) MIS C) CRM D) Enterprise applications E) SCM

B: ESS

Which of the following systems would you expect to deliver integrated, personalized business content through a web-based interface? A) TPS B) ESS C) MIS D) DSS E) SCM

E: World Wide Web

Which of the following technologies disrupted the traditional publishing industry? A) Instant messaging B) e-mail C) Internet telephony D) PCs E) World Wide Web

C: Patent law

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. A) Copyright law B) Trademark law C) Patent law D) Trade secret protection E) Privacy law

A: Video conferencing

________ is a collaboration tool that supports remote (different place), synchronous (same time) collaboration. A) Video conferencing B) E-mail C) A MUD D) A wall display E) A virtual world

A: Product differentiation

________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors. A) Product differentiation B) Low-cost leadership C) Focusing on market niche D) Strengthening customer intimacy E) Strengthening supplier intimacy

C: Digital divide

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? A) CVS B) Technostress C) Digital divide D) RSI E) CTS

E: The time/space collaboration and social tool matrix

Which of the following tools would you use to evaluate and choose a collaboration tool for your organization? A) Virtual meeting system B) Cloud collaboration C) IBM Notes D) The collaboration matrix E) The time/space collaboration and social tool matrix

C: DSS

Which of the following types of information systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance? A) MIS B) TPS C) DSS D) KMS E) RPS

A: SCM

Which of the following types of system enables management to make better decisions regarding organizing and scheduling sourcing, production, and distribution? A) SCM B) TPS C) KMS D) ERP E) MIS

B: Extranet

Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers? A) Intranet B) Extranet C) KMS D) TPS E) DSS

A: CRM

Which of the following types of system would you use to manage relationships with your customers? A) CRM B) MIS C) CLE D) CLU E) KMS

C: ESS

Which of the following types of systems typically use a digital dashboard to display an array of charts and graphs of a business's key performance indicators? A) MIS B) TPS C) ESS D) CRM E) SCM

E: Apple and Samsung

Which of the following were involved in what has been called the patent trial of the century? A) Apple and Microsoft B) Apple and Hewlett-Packard C) Microsoft and Symantec D) Microsoft and Facebook E) Apple and Samsung

A: Benchmarking

Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry? A) Benchmarking B) Best practices C) Value chain analysis D) Strategic systems analysis E) Secondary activities

C: Centralized hierarchal decision making

Which of the following would not be a complementary asset for a solar panel manufacturer? A) International solar equipment certification standards B) Government funding for green technology C) Centralized hierarchical decision making D) Innovation-driven management team E) Subsidies for adoption of solar energy

A: Digital dashboard

Which of the following would not be used as an input for an information system? A) Digital dashboard B) Tablet computer C) Bar code scanner D) Smartphone E) RFID reader

A: MIS

Which of the following would you use in order to determine which of your suppliers has the best and worst records for keeping to your production schedule? A) MIS B) TPS C) UPS D) DSS E) CRM

C: KMS

Which of the following would you use to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making? A) TPS B) An extranet C) KMS D) CRM E) MIS

A: ESS

Which of the following would you use to forecast trends in your supplier's industry that could affect your firm over the next five years? A) ESS B) TPS C) MIS D) DSS E) KMS

C: MIS

Which type of information system would you use to forecast the return on investment if your firm planned to switch to a new supplier that offered products at a lower cost? A) ESS B) TPS C) MIS D) CRM E) DSS

*Modern smartphones exhibit a process called __________, which means the functions of many physical devices are included in one other physical device. A. dematerialization B. materialization C. multi-tasking D. tasking

dematerialization

*A ___________ is a remote attack needing no user action. A. back door B. denial-of-service attack C. logic bomb D. phishing attack

denial-of-service attack

The term "data rot" refers to a) Data that no longer serve a purpose. b) The deterioration of the medium on which the data are stored. c) Data that are irrelevant or contain errors. d) All of these

The deterioration of the medium on which the data are stored.

A: True

The key elements of an organization are its structure, business processes, politics, culture, and people. A) TRUE B) FALSE

B: False

The law of diminishing returns only applies to digital products. A) TRUE B) FALSE

operating system (OS)

The main system control program, which supervises the overall operations of the computer, allocates CPU time and main memory to programs, and provides an interface between the user and the hardware

D: Best practices

The most successful solutions or methods for achieving a business objective are called: A) value activities. B) best processes. C) core competencies. D) best practices. E) benchmarks.

A: True

The number of IS/MIS jobs is projected to grow 50% faster than the average job growth for the economy as a whole in the next eight years. A) TRUE B) FALSE

A: Property rights and obligations

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? A) Property rights and obligations B) System quality C) Accountability and control D) Information rights and obligations E) Quality of life

E: Support

The parts of an organization's infrastructure, human resources, technology, and procurement that make the delivery of the firm's products or services possible are known as ________ activities. A) primary B) auxiliary C) secondary D) service E) support

C: Systems analyst

The principal liaison between the information systems groups and the rest of the organization is a(n): A) programmer. B) information systems manager. C) systems analyst. D) CTO. E) CIO.

A: True

The problem with web browsers' Do Not Track options is that websites aren't obligated to honor these settings. A) True B) False

Data Mining

The process of searching for valuable business info. in a large database, warehouse, or mart.

programming

The process of writing or coding programs

B: False

The rate of global software piracy in 2015 was approximately 50%. A) True B) False

computer programs

The sequences of instructions for the computer, which comprise software.

B: Supply chain management system

Which type of system integrates supplier, manufacturer, distributor, and customer logistics processes? A) Collaborative distribution system B) Supply chain management system C) Reverse logistics system D) Enterprise planning system E) Transaction processing system

One answer might be that we should depend upon the Federal Trade Commission Fair Information Practice Principles and that as long as these principles are not ignored or overset, personal privacy does not conflict with homeland security. This is a weak argument. Other issues involve online privacy, employee monitoring, tradeoffs between security and privacy and good business results versus privacy.

What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not?

D: Improved employee morale

Which of the following is not one of the six strategic business objectives of information systems? A) New products and services B) Improved decision making C) Competitive advantage D) Improved employee morale E) Survival

E: Machines

Which of the following is not protected by copyright law? A) Musical compositions B) Motion pictures C) Maps D) Artwork E) Machines

The terms mobile and wireless are not synonymous.

True

War driving is the act of locating WLANs while driving around a city

True

Whitelisting is when nothing can run unless it is on the list.

True

Wireless computing can increase speed and improve customer service.

True

Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.

True

Wireless is an untrusted network.

True

Wireless means communication is occurring without wires.

True

You should regularly delete any spyware that might be residing on your computer, because it may be dangerous.

True

Dashboard

Type of BI that provides quick info and data to managers.

A: True

UPS's use of web-based tools that allow customers to embed UPS functions such as tracking and cost calculations into their own Web sites is an information systems solution used to achieve customer intimacy. A) TRUE B) FALSE

Which of the following is a short-range wireless network? A. MiFi B. WiMAX C. WLAN D. UWB

UWB

_____________ means a mobile device can provide information and communication regardless of the user's location. A. Broad reach B. Instant connectivity C. Mobility D. Ubiquity

Ubiquity

46. A ___________ relationship exists when an association is maintained within a single entity. A. Binary B. Ternary C. Quarterly D. Unary

Unary

C: Professional bureaucracies

Under Mintzberg's classification of organizational structure, knowledge-based organizations fall under the category of: A) entrepreneurial structures. B) divisionalized bureaucracies. C) professional bureaucracies. D) adhocracies. E) machine bureaucracies.

Security must be balanced with _________ for people to use systems. A. Convenience B. Cost C. Time D. Trust

Convenience

B: False

Software programs were unprotected by copyright law until the early 1990s. A) True B) False

63) A Facebook user's visit to a website can be tracked even if they do not click a Like button.

TRUE

B: Processing

Converting raw data into a more meaningful form is called: A) capturing. B) processing. C) organizing. D) feedback. E) analysis

A: True

Copyright is a legal protection given to creators of certain types of intellectual property. A) True B) False

B: The distinction between an idea and its expression

"Look and feel" copyright infringement lawsuits are concerned with: A) the distinction between tangible and intangible ideas. B) the distinction between an idea and its expression. C) using the graphical elements of another product. D) using the creative elements of another product. E) violation of a monopoly on the ideas behind a product.

Online Analytical Processing (OLAP)

"slicing and dicing" data stored in a dimensional format, drilling down in the data to greater detail, and aggregating the data.

31) Identify and discuss the six ethical principles discussed in the chapter. Short Answer:

(1) Golden rule - do onto others as you would have them do onto you. (2) Kant's categorical imperative - if an action isn't right for everyone to take, than it is not right for anyone to take. (3) Slippery slope rule - If an action cannot be taken repeatedly it's not right to take at all. (4) Utilitarian principle - Take action that achieves higher or greater value than others. (5) Risk aversion principle - Taking an action that produces the least amount of harm or potential downside. (6) "No free lunch" Rule - virtually all tangible assets that are appealing are owned by someone, who most likely expects payment for use of them. Therefore, nothing is society is completely free.

Management Cockpit

- A strategic management room with series of dashboards to help managers to pilot their businesses better. - Create an environment that encourages more efficient management meetings and boosts team performance via effective communication.

Unstructured Decisions

- Decision in which there is no standardized procedure for carrying out any of the three phases. EX.-- Planning new service offerings, hiring an executive, and choosing a set of research and development (R&D) projects.

Corporate Performance Management

- Monitoring and managing an organization's performance according to key performance indicators (KPIs).

Semi-Structured Decisions

- Require a combination of standard solution procedures and individual judgment. EX.-- evaluating employees, setting marketing budgets for consumer products, performing capital acquisition analysis.

Structured Decisions

- Routine and repetitive problems for which standard solutions exist. EX.-- Inventory Control

4 Reasons why manages need IT Support

1) # of ALTERNATIVES increasing. 2) TIME pressure. 3) Sophisticated (Complex) analysis necessary. 4) Dispersion of Resources

3 Basic Manager Roles

1) Decisional 2) Interpersonal 3) Informational (D.I.I.)

2 Valuable Data VISUALIZATION METHODS/Software

1) Geographic Info. Systems 2) Reality Mining

13) Identify the five moral dimensions that are involved in political, social, and ethical issues and briefly describe each. Of these, which do you think is the most difficult for society to deal with? Support your opinion. Short Answer:

1) Information rights and obligations: What information rights do individuals and organizations possess with respect to themselves? What can they protect? (2) Property rights and obligations: How will traditional intellectual property rights be protected in a digital society in which tracing and accounting for ownership are difficult and ignoring such property rights is so easy? (3) Accountability and control: Who can and will be held accountable and liable for the harm done to individual and collective information and property rights? (4) System quality: What standards of data and system quality should we demand to protect individual rights and the safety of society? (5) Quality of life: What values should be preserved in an information and knowledge-based society? Which institutions should we protect from violation? Which cultural values and practices does the new information technology support? I think the hardest of these moral dimensions to deal with is quality of life, because it deals with changing values. It is extremely difficult to do this due to the fact that different groups have varying values. Values aren't one-size-fits-all, but are determined, instead, by age, race, ethnicity, religion, socioeconomic status, and many other factors. Because of this, it seems impossible to arrive at a majority consensus on which values and institutions should be protected, which means that many individuals will always be unhappy with the standard set.

3 Main Managerial Decisions

1) Operational 2) Management 3) Strategic

2 Data Mining Operations

1) Predict trends and behaviors 2) Identifying previously unknown patterns

2 Dimension of Decision Making

1) Problem Structure 2) Nature of Decision

7 Main Data Mining Uses

1) Retail and Sales 2) Banking 3) Manufacturing and Production 4) Insurance 5) Police Work 6) Healthcare 7) Marketing

3 BI targets that represent different levels of change

1) The development of one or a few related BI applications 2) The development of infrastructure to support enterprise-wide BI 3) Support for organizational transformation.

6 Capabilities of Dashboards

1)Drill Down 2)CSF-- Critical Success Factors 3)KPI 4) Status Access 5) Trend Analysis 6) Exception Reporting

16) ________ means that you accept the potential costs and obligations for the decisions you make. A) Responsibility B) Accountability C) Liability D) Due process E) Duty

A

38. A kilobyte is _____________ bytes. A. 1000 B. 1024 C. 1,000,000 D. 1,000,024

1024

34. Moore's law predicted microprocessor complexity would double approximately every _______ months. A. 6 B. 12 C. 18 D. 24

18

The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where ____ percent travels through Wi-Fi. A. 25 B. 50 C. 75 D. 100

75

___ percent of organizational breaches exploit weak or stolen user credentials. A. 26 B. 51 C. 76 D. 99

76

36. A byte is ______ bits. A. 2 B. 8 C. 16 D. 32

8

7) The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware

A

20) A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? A) Kant's Categorical Imperative B) The Golden Rule C) The Risk Aversion Principle D) The "No free lunch" rule E) The slippery-slope rule

A

53) Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. A) behavioral targeting B) Web bugs C) NORA D) intelligent agents E) FIP principles

A

19) All of the following are steps in the process for analyzing an ethical issue except: A) assigning responsibility. B) identifying the stakeholders. C) identifying the options you can reasonably take. D) identifying and clearly describing the facts. E) identifying the potential consequences of your options.

A

25) Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? A) Slippery-slope rule B) Lemming rule C) High-failure cost rule D) Utilitarian principle E) Golden Rule

A

3) The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? A) Property rights and obligations B) System quality C) Accountability and control D) Information rights and obligations E) Quality of life

A

34) Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? A) The Privacy Act B) The Gramm-Leach-Bliley Act C) The Freedom of Information Act D) COPPA E) HIPPA

A

37) Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A) HIPAA B) Gramm-Leach-Bliley Act C) Privacy Protection Act D) Freedom of Information Act E) COPPA

A

42) The Online Privacy Alliance: A) encourages self-regulation to develop a set of privacy guidelines for its members. B) protects user privacy during interactions with websites. C) has established technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information. E) is a safe harbor program established by the U.S. government.

A

51) Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act E) Computer Software Copyright Act

A

52) Which of the following statements about Flash cookies is not true? A) Flash cookies are installed only at the user's request. B) Flash cookies are stored on the user's computer. C) Flash cookies cannot be easily detected or deleted. D) Flash cookies are sometimes called super cookies. E) Flash cookies can be installed whenever a person clicks a Flash video.

A

81) ________ are not held liable for the messages they transmit. A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials E) European ISPs

A

82) Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012? A) A failure of Amazon's cloud computing service B) A failure of Netflix's recommendation engine software C) A blackout at Netflix's primary data center D) A hacking attack E) A bug in Netflix's credit card processing system

A

88) Redesigning and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. E) it can concentrate power in the hands of senior executives.

A

90) CVS refers to: A) eyestrain related to computer display screen use. B) a business practice that attempts to evaluate the intangible values of computer systems. C) carpal vision syndrome. D) a type of antivirus protection software. E) wrist injuries brought about by incorrect hand position when using a keyboard.

A

B: False

A DSS is most commonly used by the operations management level of an organization. A) TRUE B) FALSE

A: True

A DSS uses internal information as well as information from external sources. A) TRUE B) FALSE

A: True

A Facebook user's visit to a website can be tracked even if they do not click a Like button. A) True B) False

A: True

A TPS is an information system that keeps track of all of the daily routine transactions of a business. A) TRUE B) FALSE

C: CIO

A ________ is a senior manager who oversees the use of IT in the firm. A) CEO B) CFO C) CIO D) CTO E) CKO

A: True

A business model describes how a company produces, delivers, and sells a product or service to create wealth. A) TRUE B) FALSE

Decision

A choice among two or more alternatives that individuals or groups make.

A: Kant's Categorical Imperative

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? A) Kant's Categorical Imperative B) The Golden Rule C) The Risk Aversion Principle D) The "No free lunch" rule E) The slippery-slope rule

100) What are some of the potential health risks associated with use of computers? Short Answer:

A common occupational disease today is repetitive stress injury (RSI). RSI occurs when muscle groups are forced through repetitive actions often with high-impact loads (such as tennis) or tens of thousands of repetitions under low-impact loads (such as working at a computer keyboard). The incidence of repetitive stress syndrome is estimated to be as much as one-third of the labor force and accounts for one-third of all disability cases. The single largest source of RSI is computer keyboards. The most common kind of computer-related RSI is carpal tunnel syndrome (CTS), in which pressure on the median nerve through the wrist's bony structure, called a carpal tunnel, produces pain. The pressure is caused by constant repetition of keystrokes. Symptoms of carpal tunnel syndrome include numbness, shooting pain, inability to grasp objects, and tingling. Millions of workers have been diagnosed with carpal tunnel syndrome. It affects an estimated 3 percent to 6 percent of the workforce. RSI is not the only occupational illness computers cause. Back and neck pain, leg stress, and foot pain also result from poor ergonomic designs of workstations. Computer vision syndrome (CVS) refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers, smartphones, and handheld video games. CVS affects about 90 percent of people who spend three hours or more per day at a computer. Its symptoms, which are usually temporary, include headaches, blurred vision, and dry and irritated eyes.

A: True

A company's competitive advantages ultimately translate into higher stock market valuations than its competitors. A) TRUE B) FALSE

78) Describe how a cookie works. Short Answer:

A cookie works as follows: A user opens a web browser and selects a website to visit. The user's computer sends a request for information to the server running the website. At the same time the server sends a cookie—a data file containing information like an encrypted user ID and information about when the user visited and what he did on the site. The user's computer receives the cookie and places it in a file on the hard drive. Whenever the user goes back to the website, the server running the site retrieves the cookie to help identify the user.

C: Social

A corporation that funds a political action committee, which in turn promotes and funds a political candidate who agrees with the values of that corporation, could be seen as investing in which main category of complementary assets? A) Managerial B) Governmental C) Social D) Organizational E) Auxiliary

A: True

A firm can be said to have competitive advantage when it has access to resources that others do not. A) TRUE B) FALSE

A: More suppliers

A firm can exercise greater control over its suppliers by having: A) more suppliers. B) fewer suppliers. C) global suppliers. D) local suppliers. E) only a single supplier.

A: True

A firm that invests in a strong IS development team is making an investment in organizational complementary assets. A) TRUE B) FALSE

E: Survival

A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives? A) Operational excellence B) Improved decision making C) Competitive advantage D) Customer intimacy E) Survival

C: Survival

A firm that must invest in new information systems capabilities in order to comply with federal legislation is investing to achieve which business objective? A) Customer intimacy B) Operational excellence C) Survival D) Creation of new products E) Improved decision making

A: True

A key word in social business is "conversations." A) TRUE B) FALSE

27. _____________________ is the most common input device for text and numerical data. A. A keyboard B. A touch screen C. A web camera D. Voice-recognition

A keyboard

A: Uses networks to link people, assets, and ideas

A virtual company: A) uses networks to link people, assets, and ideas. B) uses Internet technology to maintain a virtual storefront. C) uses Internet technology to maintain a networked community of users. D) provides entirely Internet-driven services or virtual products. E) is limited by traditional organizational boundaries.

A: True

A web interface used to present integrated personalized business content to users is called a portal. A) TRUE B) FALSE

E-government

A website that allows citizens to file taxes online is a form of ________.

D: Consortium

A(n) ________ is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market. A) value chain B) support web C) value web D) consortium E) net marketplace

E: Core competency

A(n) ________ is an activity for which a firm is a world-class leader. A) expertise area B) competitive advantage C) growth driver D) efficiency E) core competency

A: TPS

A(n) ________ is typically a major source of data for other systems. A) TPS B) MIS C) ESS D) DSS E) KMS

E: Enterprise

A(n) ________ social networking tool creates business value by connecting the members of an organization through profiles, updates, and notifications that are tailored to internal corporate uses. A) cloud-based B) social-commerce C) collaborative D) remote, asynchronous E) enterprise

B: Enterprise

A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business. A) transaction processing B) enterprise C) automatic reporting D) management information E) knowledge management

32. The __________________ performs the mathematic calculations and makes logical comparisons. A. ALU B. Control unit C. Primary storage D. Registers

ALU

_______________ is the only major carrier in the US that offers seamless offloading to Wi-Fi networks. A. AT&T B. Spring C. T-Mobile D. Verizon

AT&T

B: The risk aversion principle

According to ________, you should take the action that produces the least harm. A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule

D: "nexus of contracts" among self-interested individuals

According to agency theory, the firm is viewed as a(n): A) unified, profit-maximizing entity. B) task force organization that must respond to rapidly changing environments. C) entrepreneurial endeavor. D) "nexus of contracts" among self-interested individuals. E) entrepreneurial structure.

D: Tasks, technology, people, and structure

According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are: A) environment, organization, structure, and tasks. B) technology, people, culture, and structure. C) organization, culture, management, and environment. D) tasks, technology, people, and structure. E) costs, tasks, structure, and management

A: Microeconomic

According to the ________ definition of organizations, an organization is seen as a means by which capital and labor are transformed by the organization into outputs to the environment. A) microeconomic B) macroeconomic C) sociotechnical D) behavioral E) psychological

A: The intranet was too expensive to maintain

According to the chapter case, ABB decided to switch from its existing corporate intranet for all of the following reasons except: A) the intranet was too expensive to maintain. B) the intranet was too static and outmoded to meet its current needs. C) the intranet had poor capabilities for searching for information. D) the intranet lacked collaboration tools. E) the intranet was confusing and inefficient.

B: A six-seated IX500 system costs about $500,000

According to the chapter case, which of the following statements about Cisco's IX5000 telepresence system is not true? A) No special changes to a room are required to install the IX5000 system. B) A six-seat IX500 system costs about $500,000. C) The IX5000 system is able to capture an entire room in fine detail. D) The IX5000 system needs only half the power, installation time, and data transmission capacity (bandwidth) as Cisco's previous telepresence systems. E) Produban was the first company to deploy the IX5000 system.

A: True

According to the network economics perspective, the more people offering products on eBay's site, the greater the value of the site to all who use it. A) TRUE B) FALSE

Which of the following is NOT one of the most dangerous employees to information security? A. Accountants B. HR employees C. Janitors D. MIS employees

Accountants

Management Controls

Acquiring and using resources efficiently in accomplishing organizational goals.

B: Tracks the flows of materials in a factory

All of the following are examples of business intelligence systems except a system that: A) summarizes and reports on a company's basic operations. B) tracks the flows of materials in a factory. C) focuses on problems that are unique and rapidly changing. D) compares total annual sales figures for specific products to planned targets. E) addresses nonroutine decisions.

E: Sales force

All of the following are examples of environmental actors in an information system except: A) competitors. B) regulatory agencies. C) customers. D) suppliers. E) sales force.

E: Co-creation of business value

All of the following are new technology-related trends in MIS except: A) cloud computing. B) big data. C) IoT. D) the mobile digital platform. E) co-creation of business value.

D: The need for more efficient work hierarchies

All of the following are reasons for the increased business focus on collaboration and teamwork, except for: A) the need for creating innovative products and services. B) growth of "interaction" jobs. C) greater global presence. D) the need for more efficient work hierarchies. E) the need to reduce communication costs.

A: Assigning responsibility

All of the following are steps in the process for analyzing an ethical issue except: A) assigning responsibility. B) identifying the stakeholders. C) identifying the options you can reasonably take. D) identifying and clearly describing the facts. E) identifying the potential consequences of your options.

E: Data use policies

All of the following are technical solutions to protecting user privacy except: A) e-mail encryption. B) anonymous surfing. C) anonymous email. D) preventing client computers from accepting cookies. E) data use policies.

D: Increases in transaction costs

All of the following describe the effects of globalization except: A) significant decreases in operating costs. B) reduction of labor costs through outsourcing. C) ability to find low-cost suppliers. D) increases in transaction costs. E) replication of business models in multiple countries.

C: Systems analysts

All of the following job categories are expected to grow over the next eight years except: A) computer support specialists. B) software engineers. C) systems analysts. D) computer programmers. E) database administrators.

D: Children's Online Privacy Protection Act

All of the following laws apply to actions by the federal government except the: A) Freedom of Information Act. B) Privacy Act. C) Computer Security Act. D) Children's Online Privacy Protection Act. E) E-Government Act.

A: It helps firms expands in size

All of the following statements are true about information technology's impact on business firms except: A) it helps firms expand in size. B) it helps firms lower the cost of market participation. C) it helps reduce internal management costs. D) it helps reduce transaction costs. E) it helps reduce agency costs.

A: True

All organizations have bedrock, unquestioned assumptions that define their goals and products. A) TRUE B) FALSE

E: Labor

Along with capital, ________ is the primary production input that the organization uses to create products and services. A) structure B) culture C) politics D) feedback E) labor

B: False

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person. A) True B) False

A: Low-cost leadership

Amazon's use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates which of the following strategies? A) Low-cost leadership B) Marketing effectiveness C) Focusing on market niche D) Strengthening supplier intimacy E) Developing synergies

A: Long-range planning activities of senior managment

An ESS supports which of the following? A) Long-range planning activities of senior management B) Knowledge and data workers in an organization C) Decision making and administrative activities of middle managers D) Day-to-day processes of production E) Transactional needs of the organization

A: True

An organization's MIS and DSS supply an ESS with summarized information. A) TRUE B) FALSE

A: True

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret. A) True B) False

C: 194 million

Approximately how many Americans access the Internet using a smartphone or tablet? A) 118 million B) 172 million C) 194 million D) 220 million E) 258 million

D: About 60%

Approximately what percent of U.S. businesses have some form of remote work program? A) About 15 percent B) About 25 percent C) About 35 percent D) About 60 percent E) About 75 percent

A: Verizon is focusing on satellite-based television in its competition with AT&T

As discussed in the chapter opening case, which of the following statements about Verizon is not true? A) Verizon is focusing on satellite-based television in its competition with AT&T. B) Verizon claims that its wireless network is the largest and most reliable in the United States. C) Verizon is investing in upgrading its high-speed networks. D) Verizon sees mobile ads and video as an investment for the future. E) Verizon offers a standalone video service

Goal-seeking-analysis

Attempts to calculate the value of the inputs necessary to achieve a desired level of output.

17. Which of the following is NOT an example of a supercomputer or mainframe application? A. Augmented reality technologies B. Corporate payroll programs C. Student grade calculation and reporting D. Web site transaction processing systems

Augmented reality technologies

The International Olympic Committee selected ___________ to build and manage the Wi-Fi network for the 2014 Winter Games A. Avaya B. Cisco C. Netgear D. Ooma

Avaya

17) ________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A) Due process B) Accountability C) The courts of appeal D) The judicial system E) Liability

B

86) The U.S. CAN-SPAM Act: A) makes spamming illegal. B) requires commercial email senders to identify themselves. C) has dramatically cut down spamming. D) does not override state anti-spamming laws. E) does not outlaw the use of fake return addresses.

B

1) Which of the following best describes how new information systems can result in legal gray areas? A) They work with networked, digital data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. E) They are little understood by politicians or lawyers.

B

18) ________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A) Liability B) Due process C) Responsibility D) Accountability E) The judicial system

B

2) Which of the following best describes the effect that new information technology has on society? A) It has a dampening effect on the discourse of business ethics. B) It has a ripple effect, raising new ethical, social, and political issues. C) It is beneficial for society as a whole, while raising dilemmas for consumers. D) It has a waterfall effect in raising ever more complex ethical issues. E) It has a magnifying effect, creating increasing numbers of ethical issues.

B

21) A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? A) His action is acceptable, because the grocer suffers the least harm. B) His action is acceptable, because the higher social value is the survival of the family. C) His action is wrong, because the man would not want the grocer to steal from him. D) His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E) His action is wrong, because the grocery store owner is harmed.

B

24) According to ________, you should take the action that produces the least harm. A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule

B

40) When a cookie is created during a website visit, it is stored: A) on the website's server. B) on the hard drive of the visitor's computer. C) on the ISP's servers. D) in the browser's application settings. E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site.

B

43) In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. A) opt-in B) opt-out C) P3P D) PGP E) safe harbor

B

48) "Look and feel" copyright infringement lawsuits are concerned with: A) the distinction between tangible and intangible ideas. B) the distinction between an idea and its expression. C) using the graphical elements of another product. D) using the creative elements of another product. E) violation of a monopoly on the ideas behind a product.

B

49) The NAI is an industry association formed to help with which of the following? A) Copyright protection B) Online privacy issues C) Patent protection D) Trademark protection E) Trade secret protection

B

54) ________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A) A safe harbor B) The opt-in model C) FIP principles D) P3P E) The opt-out model

B

12. The ____________ phenomenon addresses the use of personal devices at work. A. BYOD B. CIC C. RFID D. SFA

BYOD

Which of the following is NOT a value-adding attribute of mobile computing? A. Bandwidth improvement B. Instant connectivity C. Localization D. Ubiquity

Bandwidth improvement

A: True

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. A) True B) False

36. __________________ are/is the most effective and efficient way of doing things, readily available to a wide range of employees. A. Best practices B. Intellectual capital C. Knowledge management D. Knowledge management systems

Best practices

19. Which of the following is TRUE in regard to Big Data? A. Big Data refers to large amounts of traditional data. B. Big Data is about predictions. C. Big Data systems work because people have taught those systems to think like humans; they just work faster than humans. D. Big Data systems need human intervention to improve over time

Big Data is about predictions.

20. Which of the following is FALSE? A. Big Data can come from untrusted sources. B. Big Data is often inaccurate, incomplete, incorrect, or erroneous. C. Big Data changes, especially in data streams. D. Big Data is valuable because it is structured.

Big Data is valuable because it is structured.

*Which of the following is NOT an example of alien software? A. Adware B. Blockware C. Spamware D. Spyware

Blockware

With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices. a) ubiquity b) convenience c) instant connectivity d) Both of the following are correct: convenience and instant connectivity e) All of these

Both of the following are correct: convenience and instant connectivity

A: Eyestrain related to computer display screen use

CVS refers to: A) eyestrain related to computer display screen use. B) a business practice that attempts to evaluate the intangible values of computer systems. C) carpal vision syndrome. D) a type of antivirus protection software. E) wrist injuries brought about by incorrect hand position when using a keyboard.

45. If your university has a policy that states you must take a minimum of 12 hours to be considered a full-time student and take no more than 21 hours without special permission, the 21 hours rule is referred to as ____________. A. Cardinality B. Connectivity C. Mandatory D. Optional

Cardinality

Which of the following is not a social engineering technique? a) Tailgating b) Shoulder surfing c) Careless internet surfing d) All of the choices are social engineering techniques. e) None of the choices are social engineering techniques

Careless internet surfing

If you have an empty building you can move into if your primary location is destroyed, you've implemented a _________ site. A. Cold B. Hot C. Neutral D. Warm

Cold

Decision Support Systems (DSS)

Combine models and data to analyze semi-structured problems and some unstructured problems that involve extensive user involvement.

package

Common term for an integrated group of computer programs developed by a vendor and available for purchase in prepackaged form.

C: Survival

Competitors were seeking which of the following business objectives when they rushed to provide ATMs after Citibank introduced the first ATMs in New York? A) Improved efficiency B) Customer and supplier intimacy C) Survival D) Competitive advantage E) Improved decision making

A: True

Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical. A) True B) False

GIS (Geographic Info Systems)

Computer based system for capturing, integrating, manipulating, and displaying data using digitized maps. EX.-- ESRI, InterGraph, Pitney Bowes.

Which of the following would be an example of a SCADA attack? a) Bank accounts are hacked into after Internet purchases b) Social Security numbers are deleted from a company's database. c) Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant. d) Email accounts are hacked and kinky messages are sent to all of the user's contacts

Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.

B: False

Computers and programs are the only things required to produce the information an organization needs. A) TRUE B) FALSE

open systems

Computing products that work together by using the same operating system with compatible software on all the computers that interact in an organization

27. Information ______________ utilize information created by others. A. Consumers B. Creators C. Producers D. Users

Consumers

23) The ethical "no free lunch" rule states that: A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E) if an action is not right for everyone to take, it is not right for anyone to take.

D

44) What percent of global Internet users use Google Search and other Google services? A) Less than 10 percent B) Around 25 percent C) About 50 percent D) Nearly 80 percent E) Over 90 percent

D

22) Which of the following best describes Immanuel Kant's categorical imperative? A) If an action cannot be taken repeatedly, then it is not right to be taken at any time. B) One should take the action that produces the least harm or incurs the least cost. C) One can put values in rank order and understand the consequences of various courses of action. D) If an action is not right for everyone to take, it is not right for anyone to take. E) You should act towards others as you would like them to act towards you.

D

26) Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule

D

33) In 2010, the FTC added all of the following recommendations to its privacy guidelines except: A) firms should build products and services that protect privacy. B) firms should increase the transparency of their data collection. C) firms should require consumer consent and provide clear options to opt out of data collection. D) firms should limit the length of time that any personal data is stored to six months or less. E) consumers should be able to review and contest the accuracy and completeness of data.

D

39) All of the following laws apply to actions by the federal government except the: A) Freedom of Information Act. B) Privacy Act. C) Computer Security Act. D) Children's Online Privacy Protection Act. E) E-Government Act.

D

58) Which of the following is not true about the changes to EU data protection rules proposed in 2012? A) The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data. B) The new rules would require Internet companies to delete information at the user's request. C) The new rules would require Internet companies to retain information only as long as absolutely necessary. D) The new rules would reject the right to be forgotten. E) The new rules would apply only to all companies providing services in Europe.

D

61) Which of the following is not a file-sharing service? A) The Pirate Bay B) Megaupload C) Morpheus D) Pandora E) Grokster

D

84) Which of the following is a primary drawback to the "do anything anywhere" computing environment? A) It makes work environments less pleasant. B) It creates a digital divide. C) It centralizes power at corporate headquarters. D) It blurs the traditional boundaries between work and family time. E) It leads to employees being paid less for the total amount of work performed.

D

It is very difficult to manage data for which of the following reasons? a) The amount of data stays about the same over time. b) Data are scattered throughout organizations. c) The decreasing amount of external data needs to be considered. d) Data security is easy to maintain. e) Data are stored in the same format throughout organizations.

Data are scattered throughout organizations.

E: Software governing the organization of data on physical storage media

Data management technology consists of which of the following? A) Physical hardware and media used by an organization for storing data B) Detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system C) Two or more computers to share data or resources D) Hardware and software used to transfer data E) Software governing the organization of data on physical storage media

25. ___________ support local control, whereas ____________ support central control. A. Data marts; data dictionaries B. Data marts; data warehouses C. Data warehouses; data dictionaries D. Data warehouses; data marts

Data marts; data warehouses

8. Your company decides to keep copies of your invoices on CDs. You decide the safest place to store them is in your company's basement since it is secure and people rarely go down there. When you get audited, you find the CDs got ruined during a recent rainstorm when the basement got flooded; you don't have access to the information for your audit. This is an example of _______. A. Data degradation B. Data integrity failure C. Data rot D. Low data quality

Data rot

A: True

Detailed, programmed instructions that control computer hardware components in an information system are known as computer software. A) TRUE B) FALSE

4) The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? A) Family and home B) Property rights and obligations C) System quality D) Accountability and control E) Quality of life

E

41) The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. A) COPPA B) P3P C) PGP D) FIP E) safe harbor

E

50) Which of the following is not protected by copyright law? A) Musical compositions B) Motion pictures C) Maps D) Artwork E) Machines

E

56) TRUSTe is an example of which of the following? A) Web beacon B) Behavioral targeting program C) Opt-out program D) Spyware E) Online seal program

E

59) Digital media differs from a physical book in all of the following ways except: A) ease of replication. B) ease of alteration. C) ease of transmission. D) ease of global distribution. E) ease of establishing uniqueness.

E

36) The FIP principle of Notice/Awareness states that: A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there must be a mechanism in place to enforce FIP principles. D) consumers should be able to review the data collected about them. E) websites must disclose their information practices before collecting data.

E

45) Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? A) Copyright B) Patent C) All forms of intellectual property protection D) Trademark E) Trade secret

E

46) All of the following are technical solutions to protecting user privacy except: A) e-mail encryption. B) anonymous surfing. C) anonymous email. D) preventing client computers from accepting cookies. E) data use policies.

E

57) Which of the following is not a difficulty in establishing patent protection? A) Length of time required to receive protection B) The requirement that the work reflect some special understanding and contribution C) The requirement that the work must be original D) The requirement that the work must be novel E) The requirement that the work must be a secret

E

6) Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? A) Property rights and obligations B) System quality C) Accountability and control D) Quality of life E) Information rights and obligations

E

60) Which of the following were involved in what has been called the patent trial of the century? A) Apple and Microsoft B) Apple and Hewlett-Packard C) Microsoft and Symantec D) Microsoft and Facebook E) Apple and Samsung

E

83) Which of the following is the most common reason that business systems fail? A) Software bugs B) Software errors C) Hardware failures D) Facilities failures E) Data quality

E

85) Which of the following statements about spam is not true? A) Most spam originates from bot networks. B) Cell phone spam usually comes in the form of SMS text messages. C) Spam costs for business are very high. D) Spamming has mushroomed because it is so inexpensive and can reach so many people. E) Spamming is more tightly regulated in Europe than in the United States.

E

87) Which of the five moral dimensions of the information age does spamming involve? A) Quality of life B) System quality C) Accountability and control D) Information rights and obligations E) Property rights and obligations

E

9) Which of the following is not an example of the potential dark side of big data? A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future. B) Use of a device installed in a car to analyze driving habits. C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. D) Use of computerized systems to filter and hire job applicants. E) Analyzing data from sensors installed in local parks to monitor soil moisture.

E

35. _______________ is knowledge that has been codified or documented. A. Data B. Explicit knowledge C. Information D. Tacit knowledge

Explicit knowledge

The ___________ model utilizes kiosks to open new market opportunities for the Miami Children's Hospital in offsite locations like malls and shopping centers. A. Dynamic B. Extremely static C. Mobile D. Semistatic

Extremely static

30. ____________ is one form of data integration. A. EDI B. ETL C. SAP D. SQL

ETL

____________ is NOT a benefit of RFID for Marks & Spencer. A. Efficient production B. Inventory accuracy C. Inventory turnover D. Out-of-stock products

Efficient production

98) How does the use of electronic voting machines act as a "double-edged sword?" What moral dimensions are raised by this use of information technology? Short Answer:

Electronic voting machines can be seen as beneficial by making voting 1: Easy to accomplish and tabulate. However, it may be easier to tamper with electronic voting machines than with countable paper ballots. In terms of information rights, it seems possible that methods could be set up to determine how an individual has voted and to store and disseminate this knowledge. Manufacturers of voting machines claim property rights to the voting software, which means that if the software is protected from inspection, there is no regulation in how the software operates or how accurate it is. In terms of accountability and control, if an electronic voting system malfunctions, will it be the responsibility of the government, of the company manufacturing the machines or software, or the programmers who programmed the software? The dimension of system quality raises questions of how the level of accuracy of the machines is to be judged and what level is acceptable? In terms of quality of life, while it may make voting easier and quicker, does the vulnerability to abuse of these systems pose a threat to the democratic principle of one person, one vote?

*Weak passwords are a(n) ___________ threat. A. outside B. employee C. hardware D. software

Employee

Reality Mining

Enables users to employ multidimensional analysis, data mining, and decision support systems to Analyze Data in REAL TIME.

OpenSSL is __________ software. A. Banking B. Encryption C. Hacking D. Free

Encryption

A: True

Enterprise applications integrate information from multiple functions and business processes to enhance the performance of the organization as a whole. A) TRUE B) FALSE

Decisional Roles

Entrepreneur, disturbance handler, resource allocator.

A: True

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior. A) True B) False

A: True

European countries do not allow businesses to use personally identifiable information without consumers' prior consent. A) True B) False

Operational Controls

Executing specific tasks efficiently and effectively.

C: Mutuality of interest between the record holder and the individual

FIP principles are based on a belief in which of the following? A) Accountability of the record holder B) Responsibility of the record holder C) Mutuality of interest between the record holder and the individual D) Privacy of the individual E) Difference between the interests of the individual and commercial organizations

1. Managing data is easier nowadays since there is so much of it.

False

10. When data are normalized, attributes in the table depend only on the secondary key.

False

3. Google Glasses are an example of virtual reality.

False

4. An entity is the same thing as a field.

False

4. Source-data automation devices output data with minimal human intervention.

False

5. Moore's Law states that microprocessor complexity will double every year.

False

5. Secondary keys identify a file with complete accuracy.

False

6. All primary storage is volatile.

False

7. NoSQL databases only allow businesses to manipulate structured data.

False

8. Data warehouses maintain historical data while data marts are real-time.

False

9. Tacit knowledge is easier to document than explicit knowledge.

False

A copyright lasts 20 years.

False

A data warehouse is a low-cost, scaled-down version of a data mart designed for the end-user needs in a department in a large organization.

False

A database must be associated with only one computer program or information system.

False

A group of related fields is generally called a data file.

False

A patent lasts for the life of the creator plus 70 years.

False

A relational database typically consists of one large two-dimensional table.

False

All 4G offerings meet the International Telecommunications Union standards.

False

Backup and recovery procedures are recommended only to safeguard against hardware/software failures.

False

Bar codes can include numbers, text, and URLs.

False

Bluetooth devices can be used to establish NFC for mobile commerce.

False

Competitive intelligence is industrial espionage.

False

GPS uses the GEO satellite network.

False

Hardware is simply the computer itself.

False

Janitors are no threat to information security since they have no access to company systems.

False

Low cost and improved bandwidth are the 2 characteristics of mobile computing.

False

Low level employees pose the greatest threat to information security.

False

Microwave transmissions are broadcast, whereas satellite transmissions are point-to-point.

False

Multimedia technologies such as DVDs and gaming devices cannot be considered as input and output devices.

False

Primary storage stores data and programs for future use.

False

QR codes must be read horizontally.

False

RF jamming is performed by adding an unauthorized access point to a wireless network.

False

Social data is not a form of big data.

False

Super Wi-Fi uses the same technology as Wi-Fi, it's just super-powerful.

False

A: True

IT governance refers to the overall decision-making that guides the IT strategy of a firm. A) TRUE B) FALSE

private clouds (internal clouds or corporate clouds)

IT infrastructures that are accessible only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all the business units within a single organization

B: False

Identifying customers is a business process handled by the human resources function. A) TRUE B) FALSE

B: False

Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue. A) True B) False

B: TPS

If your main supplier was late in delivering goods, which type of system would you use to update your production schedule? A) ESS B) TPS C) MIS D) DSS E) BIS

80) Discuss the history of Apple's and Samsung's patent battle against each other. Medium Answer

In 2011, Apple sued Samsung for violating its patents for iPhones, iPads, and iPods. On August 24, 2012, a California jury in federal district court delivered a decisive victory to Apple and a stunning defeat to Samsung. The jury awarded Apple $1 billion in damages. The decision established criteria for determining just how close a competitor can come to an industry-leading and standard-setting product like Apple's iPhone before it violates the design and utility patents of the leading firm. The same court ruled that Samsung could not sell its new tablet computer (Galaxy 10.1) in the United States. In a later patent dispute, Samsung won an infringement case against Apple. In June 2013, the United States International Trade Commission issued a ban for a handful of older iPhone and iPad devices because they violated Samsun patents from years ago. In 2014, Apple sued Samsung again, claiming infringement of five patents. The patents cover hardware and software techniques for handling photos, videos, and lists used on the popular Galaxy 5. Apple sought $2 billion in damages. In 2015, the U.S. Court of Appeals reaffirmed that Samsung had copied specific design patents, but dropped the damages Apple was granted to $930 million. To make matters more complicated, Apple has been one of Samsung's largest customers for flash memory processors, graphic chips, solid-state drives, and display parts that are used in Apple's iPhones, iPads, iPod Touch devices, and MacBooks. The Samsung and Apple patent cases are indicative of the complex relationships among the leading computer firms.

C: 30 percent

In 2015, what percent of the U.S. economy resulted from foreign trade? A) 10 percent B) 25 percent C) 30 percent D) 50 percent E) 66 percent

A: True

In 2016, the median wage for IT/MIS jobs is about twice the level for all occupations. A) TRUE B) FALSE

79) How does protection of privacy in Europe differ from the United States? Long (Essay) Answer:

In Europe, privacy protection is much more stringent than in the United States. Unlike the United States, European countries do not allow businesses to use personally identifiable information without consumers' prior consent. On October 25, 1998, the European Commission's Directive on Data Protection went into effect, broadening privacy protection in the European Union (EU) nations. The directive requires companies to inform people when they collect information about them and disclose how it will be stored and used. Customers must provide their informed consent before any company can legally use data about them, and they have the right to access that information, correct it, and request that no further data be collected. Informed consent can be defined as consent given with knowledge of all the facts needed to make a rational decision. EU member nations must translate these principles into their own laws and cannot transfer personal data to countries, such as the United States, that do not have similar privacy protection regulations. In 2009, the European Parliament passed new rules governing the use of third-party cookies for behavioral tracking purposes. These new rules were implemented in May 2011 and require website visitors to give explicit consent to be tracked by cookies. Websites are required to have highly visible warnings on their pages if third-party cookies are being used. In January 2012, the EU issued significant proposed changes to its data protection rules, the first overhaul since 1995. The new rules would apply to all companies providing services in Europe and require Internet companies such as Amazon, Facebook, Apple, Google, and others to obtain explicit consent from consumers about the use of their personal data, delete information at the user's request (based on the right to be forgotten), and retain information only as long as absolutely necessary. In 2014, the European Parliament gave strong support to significant changes in privacy policies by extending greater control to users of the Internet. Although the privacy policies of United States firms (in contrast to the government's) are largely voluntary, in Europe, corporate privacy policies are mandated and more consistent across jurisdictions. Among the changes being discussed are a requirement for firms to inform users before collecting data, every time they collect data, and how it will be used. Users would have to give consent to any data collection. Other proposals call for users to have a right of access to personal data, and the right to be forgotten. The right to be forgotten was upheld by a European Union court in 2014, and since then, Google has had to respond to more than 200,000 requests to remove personal information from its search engine.

B: E-business

In ________, digital technology and the Internet are used to execute the major business processes in the enterprise. A) e-commerce B) e-business C) enterprise applications D) MIS E) SCM

A: An information value chain

In ________, raw data is systematically acquired and transformed during various stages that add value to that information. A) an information value chain B) the firm value chain C) information processing D) the feedback process E) the dissemination process

D: Operational management

In a business hierarchy, which of the following levels is responsible for monitoring the daily activities of the business? A) Middle management B) Service workers C) Production management D) Operational management E) Knowledge workers

B: Senior managament

In a hierarchical organization, the upper level consists of: A) scientists. B) senior management. C) professional employees. D) data workers. E) knowledge workers.

D: Keep track of the temperature

In environmental scanning, a firm may use information systems to: A) transform inputs into products and services. B) analyze the performance of its intranet. C) identify external events that may affect it. D) keep track of the temperature within its data centers. E) develop a unified organizational culture.

A: Increases as more people use them

In network economics, the value of a commercial software vendor's software products: A) increases as more people use them. B) decreases as more people use them. C) increases due to higher marginal gain in output. D) decreases according to the law of diminishing returns. E) is unrelated to the number of people that use them

B: False

In order to be considered a digital firm, all of the firm's significant business relationships and core business processes must be digitally enabled. A) TRUE B) FALSE

Which of the following is NOT a challenge mentioned in the case that Avaya faced when setting up the 2014 Sochi Winter Olympic Games? A. Delivering high-definition TV channels B. Handling an unprecedented number of mobile devices C. Managing language barriers between technicians and athletes D. Moving goods safely into Russia

Managing language barriers between technicians and athletes

A: True

Mass customization offers individually tailored products or services using the same resources as mass production. A) TRUE B) FALSE

*Hotspots are an example of ______________ wireless networks. A. Long-range B. Medium-range C. Short-range D. Wide-area

Medium-range

Wi-Fi networks are typically classified as _______ wireless networks a) Short-range b) Medium-range c) Wide-range d) None of these

Medium-range

_____ use multiple Wi-Fi access points to create a wide area network. a) Mesh networks b) Pervasive networks c) Global networks d) Fixed networks e) Ubiquitous networks

Mesh networks

Which of the following is a medium-range wireless network? A. Bluetooth B. MiFi C. NFC D. UWB

MiFi

Which of the following categories of general purpose computers is the least expensive? a) Supercomputers. b) Midrange Computers c) Microcomputers d) Mainframe Computers

Microcomputers

29. _________ is a gesture-based input device. A. A touchpad B. A trackball C. Microsoft Kinect D. Microsoft Office

Microsoft Kinect

Which of the following technologies is wireless but not mobile? a) Smart phones b) Laptops c) Tablet computers d) Microwave towers

Microwave towers

The major types of wireless media are: a) Satellite, radio, microwave, and television. b) Cellular, television, radio, and microwave. c) Microwave, satellite, radio, and infrared. d) Smart phones, satellite, television, and radio.

Microwave, satellite, radio, and infrared.

B: False

Middle managers make long-range strategic decisions about the firm's products and services. A) TRUE B) FALSE

The use of databases enables organizations to (choose all that apply): a) Eliminate data redundancy. b) Minimize data isolation. c) Minimize data inconsistency. d) Minimize data security risks. e) Eliminate data integrity.

Minimize data isolation Minimize data inconsistency Minimize data security risks

A: Machine

Mintzberg classifies a large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management as a ________ bureaucracy. A) machine B) professional C) divisionalized D) multidivisional E) ad hoc

B: False

Mintzberg's classification identifies five forces in an industry's environment that affect the strategic position of a firm. A) TRUE B) FALSE

*The _____________ model at the Miami Children's Hospital is most appropriate for nonemergency, consultative services because the physician is limited to a visual examination. A. Dynamic B. Extremely static C. Mobile D. Semistatic

Mobile

______________________ refers to the real-time connection between a mobile device and other computing environments. A. Location-based commerce B. Mobile computing C. Mobile commerce D. Telemetry

Mobile computing

14) Describe three technology trends that pose ethical issues, giving an example for each of its ethical or moral impact. Short Answer:

Mobile device growth: Individual cell phones may be tracked without user consent or knowledge Date storage costs rapidly declining: Organizations can easily maintain detailed databases on individuals, so there are no limits on the data collected about you Networking advances: The cost of moving data and making it accessible from anywhere falls exponentially, which makes access to data more difficult to control

____________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be. A. Broad reach B. Instant connectivity C. Mobility D. Ubiquity

Mobility

25. Which of the following is an example of an output technology? A. Keyboard B. Monitor C. Mouse D. Trackball

Monitor

Informational Roles

Monitor, disseminator, spokesperson, analyzer.

4. Which of the following is NOT an overall trend in hardware? A. Cheaper B. Faster C. More complex D. Smaller

More complex

A: True

Most Internet businesses do very little to protect the privacy of their customers A) True B) False

B: False

Most transaction processing systems use sophisticated mathematical models or statistical techniques. A) TRUE B) FALSE

Which of the following statements is true? a) Multifactor authentication systems are more reliable and less expensive than single-factor. b) Multifactor authentication systems are more reliable and more expensive than single-factor. c) Multifactor authentication systems are less reliable and less expensive than single-factor d) Multifactor and single-factor authentications have the same degree of reliability.

Multifactor authentication systems are more reliable and more expensive than single-factor.

*Which of the following is the technology that enables most mobile wallet applications? A. AFC B. ERP C. NFC D. VRP

NFC

15) What is NORA and how does it work? Short Answer:

NORA - non-obvious relationship awareness; technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships It takes information from different sources, like job applications and telephone records, and correlates relationships to find obscure connections to help identify criminals or terrorists. It scans data and extracts information as the data is being generated to instantly find connections. For example, NORA could reveal if a man at an airline ticket counter shares a phone number with a known terrorist before that person boards the plane.

C: Information technology (IT) infrastructure

Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's: A) data management environment. B) networked environment. C) information technology (IT) infrastructure. D) information system. E) culture.

D: DSS

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which of the following types of information system? A) MIS B) TPS C) ESS D) DSS E) KMS

6. ____________________ storage temporarily stores data and program instructions during processing. A. Input B. Primary C. Output D. Secondary

Primary

77) What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not? Short Answer:

One answer might be that we should depend upon the Federal Trade Commission Fair Information Practice Principles and that as long as these principles are not ignored or overset, personal privacy does not conflict with homeland security. This is a weak argument. Other issues involve online privacy, employee monitoring, tradeoffs between security and privacy and good business results versus privacy.

A: True

One example of a business process is shipping a product to a customer. A) TRUE B) FALSE

A: True

One of the key concepts in patent law is novelty. A: True B: False

The Heartbleed bug is an encryption security flaw in the ___________ software package that was an _____________ mistake by the software developer. A. Microsoft; intended B. Microsoft; unintended C. OpenSSL; intended D. OpenSSL; unintended

OpenSSL; unintended

B: False

Operational managers use ESS primarily to solve specific problems. A) TRUE B) FALSE

Retailers that use location-based services like iBeacon favor a(n) ___________ option to avoid alienating customers. A. L-commerce B. M-commerce C. Opt-in informed consent D. Opt-out informed consent

Opt-in informed consent

50. CDs are an example of _________. A. Optical storage devices B. Magnetic disks C. Magnetic tapes D. Solid-state drives

Optical storage devices

9. ______________________ technologies present data and information in a form people can understand. A. Input B. Primary C. Output D. Secondary

Output

D: Transfers processed information to the people who will use it or to the activities for which it will be used

Output: A) is feedback that has been processed to create meaningful information. B) is information that is returned to appropriate members of the organization to help them evaluate the input stage. C) transfers data to the people who will use it or to the activities for which it will be used. D) transfers processed information to the people who will use it or to the activities for which it will be used. E) converts raw input into a meaningful form.

_____ can be used to create strong passwords that are easy to remember. a) Mnemonics b) Passphrases c) Birthdates d) Numbers

Passphrases

C: Knowledge workers

Personnel who design new products or services for a firm belong to which level of a business hierarchy? A) Middle management B) Production workers C) Knowledge workers D) Data workers E) Service workers

31. ___________ use computer-directed pens for creating high-quality images, blueprints, schematics, drawing of new products, etc. A. Monitors B. Plotters C. Pocket projectors D. Printers

Plotters

open-source software

Software made available in source-code form at no cost to developers.

41. ROM is ____________ storage that is _______________. A. Primary; non-volatile B. Primary; volatile C. Secondary; non-volatile D. Secondary; volatile

Primary; non-volatile

A: True

Private business investment in information technology constituted 37 percent of all invested capital in 2015. A) TRUE B) FALSE

Management

Process by which org's achieve goals through the use of resources.

16. Which of the following is an example of what a server does? A. Processing email B. Running spreadsheets C. Tracking user activity D. Word processing

Processing email

A: To enhance its core competencies

Procter and Gamble uses InnovationNet for which of the following? A) To enhance its core competencies B) To benchmark its progress against competitors C) To create synergies with its suppliers D) To take advantage of network economics E) To establish a virtual company

C: Manufacturing and production

Producing a bill of materials is a business process in which of the following functional areas? A) Finance and accounting B) Human resources C) Manufacturing and production D) Research and development E) Sales and marketing

B: False

Production tasks are coordinated through the use of social networks in social business. A) TRUE B) FALSE

35. Moore's law has NOT had an impact on ______. A. Cost B. Performance C. Productivity D. Speed

Productivity

Data dictionaries perform all of the following functions except: a) Providing information on each record b) Providing information on why attributes are needed in the database c) Defining the format necessary to enter data into the database d) Providing information on name of attributes e) Providing information on how often attributes should be updated

Providing information on each record

B: How human decision makers perceive and use formal information

Psychologists study information systems with an eye to understanding: A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods. E) mathematically based models and physical technology

The drawback of __________ for location-based tracking is that they require users to open a specific app to take a clear photo. A. GPS B. iBeacon C. NFC D. QR codes

QR codes

________________ store information horizontally and vertically. A. Active RFID tags B. Bar codes C. Passive RFID tags D. QR codes

QR codes

A standardized language used to manipulate data is _____. a) MS-Access b) Oracle c) Query-by-example language d) None of these

Query-by-example language

43. Which of the following is primary storage? A. Magnetic disk B. Magnetic tape C. RAM D. SSDs

RAM

Marks & Spencer implemented _______ to track its inventory more effectively. A. Bar codes B. Optical scanners C. QR codes D. RFID

RFID

A: Raw input

RFID sensor-generated data on stored food items such as storage location is an example of: A) raw input. B) raw output. C) customer and product data. D) sales information. E) information systems.

A: Increases in efficiency may be accompanied by job losses

Redesigning and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. E) it can concentrate power in the hands of senior executives.

42. Which of the following is secondary storage? A. Cache memory B. ROM C. Registers D. SSDs

SSDs

C: Microsoft SharePoint Online

SVF uses which of the following collaboration tools? A) EMC Documentum eRoom B) IBM Notes C) Microsoft SharePoint Online D) Microsoft Yammer E) Salesforce Chatter

You start browsing your favorite home improvement company's website and notice someone has changed all the logos to their main competitor's logos. This is an example of ___________. A. Espionage B. Identity theft C. Information extortion D. Sabotage

Sabotage

7. __________________ storage stores data and programs for future use. A. Input B. Primary C. Output D. Secondary

Secondary

The ___________ model utilizes rented carts where patients receive a live consultation with a Miami Children's Hospital specialist working out of the Miami command center. A. Dynamic B. Extremely static C. Mobile D. Semistatic

Semistatic

Trend Analysis

Short-, medium-, and long-term trend of KPIs or metrics, which are projected using forecasting methods.

Apple's iBeacon uses ___________ wireless network technology to provide location-aware, contextual information to users. A. Short-range B. Local-area C. Medium-range D. Wide-area

Short-range

NFC is an example of ______________ wireless networks. A. Long-range B. Medium-range C. Short-range D. Wide-area

Short-range

*An advantage of a radio transmission system is ____________. A. Large coverage area B. Relatively inexpensive C. Signals pass through walls D. All of the above

Signals pass through walls

A: True

Smart products are an example of the Internet of Things. A) TRUE B) FALSE

A: True

Smart products generally raise switching costs. A) TRUE B) FALSE

_____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. A. Dumpster diving B. Shoulder surfing C. Social engineering D. Tailgating

Social engineering

13. Which of the following is a good example of a primary key in a student table? A. Address B. Birthdate C. First and Last Name D. Social security number

Social security number

A: How systems affect individuals, groups, and organizations

Sociologists study information systems with an eye to understanding: A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods. E) mathematically based models and physical technology.

B: Strategic transitions

Sociotechnical changes affecting a firm adopting new information systems requiring organizational change can be considered: A) organizational adjustments. B) strategic transitions. C) systems alterations. D) business goal transitions. E) sociotechnical transitions.

Skybox is disrupting the space-based commercial imaging industry by focusing on ________. A. Communications B. Databases C. Hardware D. Software

Software

*Phishing is an example of __________. A. Copyright infringement B. Espionage C. Sabotage D. Software attack

Software attack

96) One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up user names. Is anonymity the same thing as privacy, and should it be a right? What ethical issues are raised by increased anonymity? Short Answer:

Student answers will vary, but should include a definition of privacy and an attempt to differentiate between anonymity and privacy, as well as an understanding that anonymity can result in a breakdown of clear accountability or responsibility for actions. A sample answer is: Privacy is the claim to be left alone, free from surveillance. This is different from anonymity, in which nobody knows who you are or what actions you take even in a public arena. Some individuals, if they feel they are anonymous, may have lapses in ethical behavior because anonymity means they are no longer accountable for their actions. I don't know if anonymity should be a right, but perhaps anonymity should not be permissible for some types of communication.

97) What do you consider to be the primary ethical, social, and political issues regarding the quality of a software product? Short Answer:

Student answers will vary, but should include a description of the software manufacturer's responsibility in software quality and an understanding of the difference between social concerns (culture, lifestyle effects) and political concerns (legal, institutional effects). A sample answer is: The central quality-related ethical issue that software quality raises is what responsibility does a software manufacturer have in the performance of its software? At what point can the manufacturer conclude that its software achieves an adequate level of quality? The leading social issue raised by quality is: how is our society affected by low-quality software and is this a concern? And how much accountability should the software manufacturer have? The central political concern raised by software quality is whether and how to enforce software quality minimums and standards, and what institutions are thus also held accountable.

Sensitivity Analysis

Study of the impact that changes in one or more parts of a decision-making model have on other parts.

A: True

Supply chain management systems are more externally oriented than enterprise systems. A) TRUE B) FALSE

A disadvantage of a microwave transmission system is ____________. A. Creates electrical interference problems B. Signals experience propagation delay C. Susceptible to environmental interference D. none of the above

Susceptible to environmental interference

B: False

Switching costs decrease when customers are strongly linked to products and platforms. A) TRUE B) FALSE

graphical user interface (GUI)

System software that allows users to have direct control of the hardware by manipulating visible objects (such as icons) and actions, which replace command syntax.

____________ is an encryption standard used for secure transactions such as credit card processing and online banking. a) VPN b) TLS c) DMZ d) Whitelisting

TLS

A: Encourages self-regulation to develop a set of privacy guidelines for its members

The Online Privacy Alliance: A) encourages self-regulation to develop a set of privacy guidelines for its members. B) protects user privacy during interactions with websites. C) has established technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information. E) is a safe harbor program established by the U.S. government.

B: Requires commercial email senders to identify themselves

The U.S. CAN-SPAM Act: A) makes spamming illegal. B) requires commercial email senders to identify themselves. C) has dramatically cut down spamming. D) does not override state anti-spamming laws. E) does not outlaw the use of fake return addresses.

E: Safe harbor

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. A) COPPA B) P3P C) PGP D) FIP E) safe harbor

D: Sales and marketing

The ________ function is responsible for identifying customers. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing E) distribution and logistics

C: CKO

The ________ helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes. A) CTO B) CSO C) CKO D) CPO E) CEO

B: Value chain

The ________ model highlights the primary or support activities that add a margin of value to a firm's products or services where information systems can best be applied to achieve a competitive advantage. A) competitive forces B) value chain C) bargaining power D) new entrant E) rivalry

E: Mass customization

The ability to offer individually tailored products or services using the same production resources as bulk production is known as: A) mass marketing. B) micromarketing. C) micro customization. D) niche customization. E) mass customization

A: True

The behavioral approach to information systems focuses on analyzing the psychological, social, and economic impacts of systems rather than the technical aspects. A) TRUE B) FALSE

application software

The class of computer instructions that directs a computer system to perform specific processing activities and provide functionality for users

systems software

The class of computer instructions that serve primarily as an intermediary between computer hardware and application programs; provides important self-regulatory functions for computer systems

B: False

The competitive forces model cannot be used to analyze modern digital firms which face new competitive forces that are not true of traditional firms. A) TRUE B) FALSE

26. Nonvolatile in the context of data storage means ________________. A. The data can't be changed in a data warehouse. B. The data can't be changed in the source system. C. The data can only be changed by IT professionals. D. The data can only be changed by users.

The data can only be changed by IT professionals.

99) What is the digital divide and how does it impact society? Short Answer:

The digital divide relates to the fact that information, knowledge, computers, and access to digital and information resources through educational institutions and public libraries are inequitably distributed along ethnic and social class lines. Several studies have found that poor and minority groups in the United States are less likely to have computers or online Internet access even though computer ownership and Internet access have soared in the past five years. Although the gap in computer access is narrowing, higher-income families in each ethnic group are still more likely to have home computers and broadband Internet access than lower-income families in the same group. Moreover, the children of higher-income families are far more likely to use their Internet access to pursue educational goals, whereas lower-income children are much more likely to spend time on entertainment and games. Left uncorrected, this digital divide could lead to a society of information haves, computer literate and skilled, versus a large group of information have-nots, computer illiterate and unskilled. Public interest groups want to narrow this digital divide by making digital information services—including the Internet—available to virtually everyone, just as basic telephone service is now

B: Politics

The divergent viewpoints about how resources, rewards, and punishments should be distributed, and the struggles resulting from these differences are known as organizational: A) culture. B) politics. C) structure. D) environments. E) routines.

B: False

The effect of the Internet has been to decrease the bargaining power of customers. A) TRUE B) FALSE

B: Big data

The enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as: A) IoT. B) big data. C) the mobile digital platform. D) cloud computing. E) business intelligence.

D: If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

The ethical "no free lunch" rule states that: A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E) if an action is not right for everyone to take, it is not right for anyone to take.

D: Switching costs

The expenses incurred by a customer or company in lost time and resources when changing from one supplier or system to a competing supplier or system are known as: A) retention costs. B) preservation costs. C) differentiation costs. D) switching costs. E) variation costs.

Critical Success Factors

The factors most critical for the success of a business.

B: Low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy

The four major competitive strategies are: A) low-cost leadership, substitute products and services, customers; and suppliers. B) low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy. C) new market entrants, substitute products and services, customers, and suppliers. D) low-cost leadership, new market entrants, product differentiation, and focus on market niche. E) customers, suppliers, new market entrants, and substitute products.

D: ERP, SCM, CRM, and KMS

The four major types of enterprise applications are: A) SCM, CRM, DSS, and KMS. B) SCM, CRM, ESS, and KMSs. C) ERP, SCM, DSS, and CRM. D) ERP, SCM, CRM, and KMS. E) TPS, MIS, DSS, and ESS

A: Culture

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its: A) culture. B) environment. C) atmosphere. D) business process. E) mission.

B: The law of diminishing returns

The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as: A) the point of no return. B) the law of diminishing returns. C) supply and demand. D) network inelasticity. E) virtual economics

B: By the development of new information technologies

The interaction between information technology and organizations is influenced: A) solely by the decision making of middle and senior managers. B) by the development of new information technologies. C) by many factors, including structure, politics, culture, and environment. D) by two main macroeconomic forces: capital and labor. E) by the rate of growth of the organization.

B: False

The inventors of a disruptive technology typically benefit the most from the technology; it is rare that fast followers catch up quickly. A) TRUE B) FALSE

30) What are the steps in conducting an ethical analysis? Short Answer:

The steps are: (1) Identify and describe clearly the facts; (2) define the conflict or dilemma and identify the higher-order values involved; (3) identify the stakeholders; (4) identify the options that you can reasonably take; and (5) identify the potential consequences of your options

A: True

The term business ecosystem describes the loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers. A) TRUE B) FALSE

E: Middle management functions

The term management information systems refers to a specific category of information systems serving: A) integrated data processing throughout the firm. B) transaction process reporting. C) employees with online access to historical records. D) the information technology function. E) middle management functions.

E: Input, processing, and output

The three activities in an information system that produce the information organizations use to control operations are: A) information, research, and analysis. B) input, output, and feedback. C) data, information, and analysis. D) data analysis, processing, and feedback. E) input, processing, and output.

A: True

The three main dimensions of information systems are management, organizations, and information technology. A) TRUE B) FALSE

B: Senior management, middle management, and operational management

The three principal levels within a business organization hierarchy are: A) senior management, operational management, and service workers. B) senior management, middle management, and operational management. C) senior management, operational management, and information systems. D) senior management, middle management, and service workers. E) senior management, data workers, and service workers.

C: Meaningful information

The total number of food items with storage temperatures problems is an example of which of the following? A) Input B) Raw data C) Meaningful information D) Feedback E) Processing

B: False

The use of Internet technologies allows companies to more easily sustain competitive advantage. A) TRUE B) FALSE

A: Profiling

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware

A: True

The value chain model classifies all company activities as either primary or support activities. A) TRUE B) FALSE

D: Highlights specific activities in the business where competitive strategies can best be applied

The value chain model: A) categorizes five related advantages for adding value to a firm's products or services. B) sees the supply chain as the primary activity for adding value. C) categorizes four basic strategies a firm can use to enhance its value chain. D) highlights specific activities in the business where competitive strategies can best be applied. E) enables more effective product differentiation

B: False

There are four major business functions: human resources; manufacturing and production; finance and accounting; and information technology. A) TRUE B) FALSE

B: False

There is little variation in returns on IT investment across firms. A) TRUE B) FALSE

Auditing __________ the computer means inputs, outputs, and processing are checked. A. Around B. Into C. Through D. With

Through

The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.

True

The goal of risk management is to reduce risk to acceptable levels.

True

The Sochi Winter Games were similar to the Vancouver Winter Games in what respect? A. Both cities had a fairly modern basic IT infrastructure that was improved for the Games. B. The wireless networks of both were able to handle 4 Tbps per second. C. Wireless traffic outnumbered wired traffic by 4:1 for both. D. They both utilized the services of Avaya to get their cities ready for the Games.

They both utilized the services of Avaya to get their cities ready for the Games.

Which of the following is NOT a major advantage of wireless devices to users? A. They are small enough to easily carry or wear. B. They can be used to copy and pass on confidential information. C. They can communicate wirelessly with the Internet and other devices. D. They have sufficient computing power to perform productive tasks.

They can be used to copy and pass on confidential information.

Which of the following is NOT a limitation of bar codes? A. They can be easily ripped, soiled, or lost. B. They don't identify individual items. C. They don't identify the manufacturer. D. They require line of site.

They don't identify the manufacturer.

23. If ________ clients lose access to the internet, they can't do much. A. Fat B. Heavy C. Skinny D. Thin

Thin

Digital Dashboard

This dashboard provides rapid access to timely info in a user friendly way.

What-if-analysis

This study attempts to predict the impact of a change in the assumptions on the proposed solution.

A: The flattening of economic and cultural advantages of developed countries

Thomas Friedman's description of the world as "flat" refers to: A) the flattening of economic and cultural advantages of developed countries. B) the use of the Internet and technology for instantaneous communication. C) the reduction in travel times and the ubiquity of global exchange and travel. D) the growth of globalization. E) the increased use of global currencies.

_________ is any danger to which a system may be exposed. A. Exposure B. Information security C. Threat D. Security

Threat

C: Operational excellence

To make sure they stock clothes that their customers will purchase, a department store implements a new application that analyzes spending levels at their stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support? A) Customer intimacy B) Survival C) Operational excellence D) Improved decision making E) New products and services

C: TPS

To monitor the status of internal operations and the firm's relations with the external environment, managers need which of the following types of system? A) DSS B) KWS C) TPS D) MIS E) BIS

Coca-Cola's formula is an example of a ___________. A. Copyright B. Patent C. Trade secret D. All of the above

Trade secret

A: True

Transaction-level information is essential for operational management to be able to direct the day-to-day operations of the business. A) TRUE B) FALSE

1. Communication technologies provide for the flow of data from external computer networks to the CPU and from the CPU to computer networks.

True

2. Data governance is implemented through master data management.

True

2. Hardware purchases can be a strategic decision.

True

3. Databases maximize data independence.

True

6. Big Data predictions come from applying mathematics to huge quantities of data to infer probabilities.

True

Biometrics is an authentication tool.

True

Blacklisting is when everything can run except what is on the list.

True

Buses are the electrical pathways on which the data and instructions travel.

True

Computer technologies become obsolete faster than other technologies in the organization.

True

If you have copied a software package (computer program) from a friend without paying for it, you are guilty of software piracy.

True

In the United States, federal law requires companies to store, evaluate, and disclose financial data for fixed periods of time, even if the company no longer has any use for the data.

True

Knowledge management systems (KMS) are used by organizations to capture, store, and disseminate knowledge within the organization.

True

Mobile ads' forms were borrowed from other media like web, TV, and print ads.

True

Normalization is a method for eliminating redundant data elements.

True

Online analytical processing involves the analysis of accumulated data by end users.

True

Risk management identifies, controls, and minimizes the impact of threats to the organization's information security.

True

Rogue access points can be set up by employees.

True

Satellite radio offers uninterrupted, near-CD quality music that is beamed to your radio from satellites.

True

The 5 value-added attributes of mobile computing are ubiquity, convenience, instant connectivity, personalization, and localization.

True

The OnStar system from General Motors is an example of telemetry.

True

The amount of data is increasing exponentially over time.

True

The central processing unit is the same thing as the microprocessor.

True

The central processing unit performs the actual computation or "number crunching" inside any computer.

True

The data dictionary defines the format necessary to enter data into a database.

True

The primary key is a field that uniquely and completely identifies a record.

True

*Social engineering is a(n) ___________ threat on the part of the employee and a(n) _________ threat on the part of the social engineer. A. deliberate; unintentional B. deliberate; deliberate C. unintentional; deliberate D. unintentional; unintentional

Unintentional; deliberate

39. Knowledge and knowledge management processes usually have a(n) ________ format. A. Mini-structured B. Semi-structured C. Structured D. Unstructured

Unstructured

Wireless is a(n) inherently _________ network. A. trusted B. neutral C. untrusted D. useful

Untrusted

A: The Internet and networking technologies

Using ________ to enable government relationships with citizens, businesses, and other arms of government is called e-government. A) the Internet and networking technologies B) e-commerce C) e-business D) any computerized technology E) telecommunications

A: E-commerce

Using the Internet to buy or sell goods is called: A) e-commerce. B) e-business. C) an intranet. D) an extranet. E) e-government.

41. ___________ is a challenge of KMS. A. Being willing to invest resources B. Getting employees to share information C. Maintaining and updating the knowledge D. Utilizing the knowledge

Utilizing the knowledge

18. There are 3 distinct characteristics of Big Data. The collection of social network data is an example of __________. A. Variety B. Velocity C. Vintage D. Volume

Variety

B: Managerial decision making

Verizon's use of a web-based digital dashboard to provide managers with precise real-time information enabled it to improve which of the following? A) Compliance with regulations B) Managerial decision making C) Efficiency in creation of new products D) Employee morale E) Intimacy with its suppliers

*Which of the following is NOT an unintentional threat to information systems? A. Careless monitoring of environmental hazards B. Choosing a weak password C. Having an unlocked desk or filing cabinet after going home D. Viruses

Viruses

_________ is the possibility that the system will be harmed by a threat. A. Exposure B. Threat C. Security D. Vulnerability

Vulnerability

Business Intelligence answers____?

WHAT happened?

Data mining answers the question____?

WHY something happened.

War driving is the act of locating __________________ while driving around a city. A. WLANs B. WMANs C. WPANs D. WWANs

WLANs

B: Operational efficiency

Walmart exemplifies the power of information systems coupled with state-of-the-art business practices and supportive management to achieve which of the following? A) New products and services B) Operational efficiency C) Survival D) Customer intimacy E) Competitive advantage

E: Achieve low-cost leadership

Walmart's attempt to increase its online presence is an example of a firm using information systems to: A) strengthen ties to its customers. B) simplify the industry value chain. C) develop synergies. D) focus on market niche. E) achieve low-cost leadership

A: Provide mass customization

Walmart's continuous replenishment system allows it to do all of the following except: A) provide mass customization. B) transmit orders to restock directly to its suppliers. C) keep costs low. D) better meet customer demands. E) fine-tune merchandise availability.

*_____________ is the act of locating WLANs while driving around a city. A. A rogue access point B. Eavesdropping C. RF jamming D. War driving

War driving

A: True

Web beacons are tiny, invisible software programs hidden in e-mail messages and web pages that are used to track and report a user's online behavior. A) True B) False

B: Enabling business functions and departments to share information

What is the most important function of an enterprise application? A) Increasing speed of communicating B) Enabling business functions and departments to share information C) Enabling a company to work collaboratively with customers and suppliers D) Enabling cost-effective e-business processes E) Enabling inventory and supply chain management

D: Nearly 80 percent

What percent of global Internet users use Google Search and other Google services? A) Less than 10 percent B) Around 25 percent C) About 50 percent D) Nearly 80 percent E) Over 90 percent

B: On the hard drive of the visitor's computer

When a cookie is created during a website visit, it is stored: A) on the website's server. B) on the hard drive of the visitor's computer. C) on the ISP's servers. D) in the browser's application settings. E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site.

E: Transaction costs

When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as: A) switching costs. B) network costs. C) procurement. D) agency costs. E) transaction costs.

A: True

When the output of some units in a firm can be used as inputs to other units, synergies develop, which can lower costs and generate profits. A) TRUE B) FALSE

E: Synergies

When two organizations pool markets and expertise that result in lower costs and generate profits, they are creating: A) a value web. B) a value chain. C) net marketplaces. D) core competencies. E) synergies.

A: Slippery slope rule

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? A) Slippery-slope rule B) Lemming rule C) High-failure cost rule D) Utilitarian principle E) Golden Rule

E: Management information systems

Which field of study focuses on both a behavioral and technical understanding of information systems? A) Sociology B) Operations research C) Economics D) Behavioral computing E) Management information systems

D: Senior management

Which level of the organization is an ESS specifically designed to serve? A) Operational B) End-user C) Middle management D) Senior management E) Knowledge workers

B: Human resources

Which main business function is responsible for maintaining employee records? A) Sales and marketing B) Human resources C) Finance and accounting D) Manufacturing and production E) Middle management

B: Competitive forces model

Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete? A) Network economics model B) Competitive forces model C) Competitive advantage model D) Demand control model E) Agency costs model

E: Information rights and obligations

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? A) Property rights and obligations B) System quality C) Accountability and control D) Quality of life E) Information rights and obligations

E: Property rights and obligations

Which of the five moral dimensions of the information age does spamming involve? A) Quality of life B) System quality C) Accountability and control D) Information rights and obligations E) Property rights and obligations

A: HIPAA

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A) HIPAA B) Gramm-Leach-Bliley Act C) Privacy Protection Act D) Freedom of Information Act E) COPPA

A: Digital Millennium Copyright Act

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act E) Computer Software Copyright Act

D: If an action is not right for everyone to take, it is not right for anyone to take

Which of the following best describes Immanuel Kant's categorical imperative? A) If an action cannot be taken repeatedly, then it is not right to be taken at any time. B) One should take the action that produces the least harm or incurs the least cost. C) One can put values in rank order and understand the consequences of various courses of action. D) If an action is not right for everyone to take, it is not right for anyone to take. E) You should act towards others as you would like them to act towards you.

B: They result in new situations that are not covered by old laws

Which of the following best describes how new information systems can result in legal gray areas? A) They work with networked, digital data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. E) They are little understood by politicians or lawyers.

B: It has a ripple effect, raising new ethical, social, and political issues

Which of the following best describes the effect that new information technology has on society? A) It has a dampening effect on the discourse of business ethics. B) It has a ripple effect, raising new ethical, social, and political issues. C) It is beneficial for society as a whole, while raising dilemmas for consumers. D) It has a waterfall effect in raising ever more complex ethical issues. E) It has a magnifying effect, creating increasing numbers of ethical issues.

web services

applications delivered over the internet that IT developers can select and combine through almost any device, from personal computers to mobile phones

B: The system will create new value for the firm, beyond its costs

Which of the following best describes the primary reason for implementing a new information system, from a business perspective? A) The system enables the firm to create new products and services. B) The system will create new value for the firm, beyond its costs. C) The system will automate key business processes. D) The system is in use by our primary competitors. E) The system integrates well with the Web

D: A department store creating specialized products for preferred customers

Which of the following best illustrates the use of information systems to focus on market niche? A) A car manufacturer's Web site that lets you customize the features on the car you are purchasing. B) A restaurant chain analyzing local sales figures to determine which menu items to serve. C) A bookseller selling an e-book reader that reads only the bookseller's books. D) A department store creating specialized products for preferred customers. E) A clothes manufacturer expanding its offerings to new styles

C: The decision to use automation

Which of the following constitutes a managerial element in the UPS tracking system described in the chapter? A) Taking inventory B) Providing package status reports to customers C) The decision to use automation D) In-house package tracking software E) Ability to embed UPS functions in external sites

A: The specification of procedures for identifying packages with sender and recipient information

Which of the following constitutes an organizational element in the UPS tracking system described in the chapter? A) The specification of procedures for identifying packages with sender and recipient information B) Monitoring service levels C) Promoting the company strategy of low-cost, superior service D) The use of handheld computers and networks for managing package delivery E) A web-based Post Sales Order Management System

E: Management information systems

Which of the following deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm? A) Information systems literacy B) Information systems architecture C) Business processes D) Information technology infrastructure E) Management information systems

B: Should we work with outside vendors on new products and services?

Which of the following decisions requires knowledge based on collaboration and interaction? A) How long will it take to manufacture this product? B) Should we work with outside vendors on new products and services? C) In which geographical locations are our products garnering the most sales? D) Which product design is the most efficient for the user in terms of energy use? E) How can we produce this product more cheaply?

E: Operations research

Which of the following disciplines focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control? A) Management science B) MIS C) Computer science D) Utilization management E) Operations research

D: The Golden Rule

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule

E: Trade secret

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? A) Copyright B) Patent C) All forms of intellectual property protection D) Trademark E) Trade secret

E: Small retailer

Which of the following industries has the lowest barrier to entry? A) Automotive B) Computer chip C) Solar energy D) Airline E) Small retailer

C: Substitute products or services

Which of the following is a competitive force challenging the publishing industry? A) Positioning and rivalry among competitors B) Low cost of entry C) Substitute products or services D) Customers' bargaining power E) Suppliers' bargaining power

C: NORA

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? A) HIPAA B) FIP C) NORA D) COPPA E) Spyware

A: Ensuring that the company complies with existing data privacy laws

Which of the following is a firm's CPO responsible for? A) Ensuring that the company complies with existing data privacy laws B) Making better use of existing knowledge in organizational and management processes C) Enforcing the firm's information security policy D) Overseeing the use of information technology in the firm E) Acting as liaison between the information systems group and the rest of the company

C: The Internet

Which of the following is a global network that uses universal standards to connect millions of different networks around the world? A) An extranet B) The World Wide Web C) The Internet D) An intranet E) Verizon

D: Granting credit to a customer

Which of the following is a highly structured decision? A) Creating a new product B) Estimating the effect of changing costs of supply materials C) Calculating the best trucking routes for product delivery D) Granting credit to a customer E) Forecasting new industry trends

D: It blurs the traditional boundaries between work and family time

Which of the following is a primary drawback to the "do anything anywhere" computing environment? A) It makes work environments less pleasant. B) It creates a digital divide. C) It centralizes power at corporate headquarters. D) It blurs the traditional boundaries between work and family time. E) It leads to employees being paid less for the total amount of work performed.

D: An extranet

Which of the following is a private corporate network extended to authorized users outside the organization? A) An intranet B) The World Wide Web C) The Internet D) An extranet E) FTP

B: The World Wide Web

Which of the following is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format? A) HTML B) The World Wide Web C) E-mail D) An extranet E) FTP

E: Technology

Which of the following is a support activity in a firm's value chain? A) Inbound logistics B) Operations C) Sales and marketing D) Service E) Technology

D: Apple's creation of the iPod

Which of the following is an example of a business using information systems to create a new product? A) Walmart's RetailLink system B) The Mandarin Oriental's use of computers to keep track of guest preferences C) Verizon's use of a web-based digital dashboard to provide real-time company information for managers D) Apple's creation of the iPod E) Kroger's use of sensors to monitor cold food storage temperatures

C: Creating a new product

Which of the following is an example of a cross-functional business process? A) Identifying customers B) Transporting the product C) Creating a new product D) Assembling a product E) Paying creditors

C: Fortune 500 firm

Which of the following is an example of a divisionalized bureaucracy? A) Startup firm B) University C) Fortune 500 firm D) Midsize manufacturer E) Consulting firm

A: Apple in the mobile platform ecosystem

Which of the following is an example of a keystone firm within a business ecosystem? A) Apple in the mobile platform ecosystem B) GUESS and the fashion ecosystem C) Citibank and the ATM ecosystem D) American Airlines and the computerized reservation ecosystem E) Nike and the athletic apparel ecosystem

A: Technology and service firms in adjacent markets

Which of the following is an example of a social complementary asset? A) Technology and service firms in adjacent markets B) Training programs C) Distributed decision-making rights D) Incentives for management innovation E) A strong IS development team

A: Using the appropriate business model

Which of the following is an example of an organizational complementary asset? A) Using the appropriate business model B) A collaborative work environment C) Laws and regulations D) The Internet and telecommunications infrastructure E) Strong senior management

C: One Subaru Outback sold July 27, 2016 in Mohegan Lake, New York for $24,000

Which of the following is an example of raw data from an automobile manufacturer? A) An average of 120 Subarus sold daily in New York in 2016 B) 1,200 Subaru Outbacks sold during the first quarter 2016 in New York C) One Subaru Outback sold July 27, 2016 in Mohegan Lake, New York for $24,000 D) Annual sales of Subaru Outbacks increased 5.3 percent E) An average sale price of $25,500 for all Subaru Outbacks sold during July 2016 in Mohegan Lake, New York

B: Bank of America acquiring Countrywide Financial to reach a larger pool of customers

Which of the following is an example of synergy in business? A) Amazon's use of the Internet to sell books B) Bank of America acquiring Countrywide Financial to reach a large pool of new customers C) Blockbuster combining traditional video rental with online video rental D) Walmart's order entry and inventory management system to coordinate with suppliers E) Nike's use of technology to improve its product offerings

E: Computer Matching and Privacy Protection Act

Which of the following is not a U.S. federal law affecting private institutions? A) COPPA B) HIPAA C) Gramm-Leach-Bliley Act D) Video Privacy Protection Act E) Computer Matching and Privacy Protection Act

E: Improved compliance with government regulations

Which of the following is not a business benefit of collaboration? A) Improved quality B) Improved financial performance C) Improved customer service D) Improved innovation E) Improved compliance with government regulations

E: The requirement that the work must be a secret

Which of the following is not a difficulty in establishing patent protection? A) Length of time required to receive protection B) The requirement that the work reflect some special understanding and contribution C) The requirement that the work must be original D) The requirement that the work must be novel E) The requirement that the work must be a secret

D: Pandora

Which of the following is not a file-sharing service? A) The Pirate Bay B) Megaupload C) Morpheus D) Pandora E) Grokster

D: Agency costs

Which of the following is not a major feature of organizations that impacts the use of information systems? A) Business processes B) Environments C) Goals D) Agency costs E) Leadership styles

D: Value webs are inflexible and cannot adapt quickly to changes in supply and demand

Which of the following is not a true statement about value webs? A) Value webs involve a collection of independent firms that use information technology to coordinate their value chains. B) Value webs are more customer-driven than traditional value chains. C) Value webs operate in a less linear fashion than traditional value chains. D) Value webs are inflexible and cannot adapt quickly to changes in supply and demand. E) Value webs involve highly synchronized industry value chains.

E: Analyzing data from sensors installed in local parks to monitor soil moisture

Which of the following is not an example of the potential dark side of big data? A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future. B) Use of a device installed in a car to analyze driving habits. C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. D) Use of computerized systems to filter and hire job applicants. E) Analyzing data from sensors installed in local parks to monitor soil moisture.

C: Growth in the PC platform

Which of the following is not one of the current changes taking place in information systems technology? A) Growing business use of big data B) Growth in cloud computing C) Growth in the PC platform D) Emerging mobile digital platform E) Increased usage of data generated by the Internet of Things

C: Increase in data quality

Which of the following is not one of the current key technology trends that raises ethical issues? A) Data storage improvements B) Data analysis advancements C) Increase in data quality D) Increase in use of mobile devices E) Advances in networking technology

D: Remote/collocated

Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix? A) Synchronous/colocated B) Same time/remote C) Different time/remote D) Remote/colocated E) Same time/same place

D: The new rules would reject the right to be forgotten

Which of the following is not true about the changes to EU data protection rules proposed in 2012? A) The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data. B) The new rules would require Internet companies to delete information at the user's request. C) The new rules would require Internet companies to retain information only as long as absolutely necessary. D) The new rules would reject the right to be forgotten. E) The new rules would apply only to all companies providing services in Europe.

C: Time zones

Which of the following is the greatest obstacle in enabling collaboration between employees at different, distant corporate locations? A) Privacy B) Permissions C) Time zones D) Language E) Corporate culture

A: Higher customer satisfaction levels

Which of the following is the key business metric behind the technologies implemented by Kroger, as discussed in the chapter-opening case? A) Higher customer satisfaction levels B) Survival C) Improved employee morale D) Improved decision making E) Reduced cost of supplies

E: Data equality

Which of the following is the most common reason that business systems fail? A) Software bugs B) Software errors C) Hardware failures D) Facilities failures E) Data quality

C: Systems analysts

Which of the following job categories is expected to experience the most growth over the next eight years? A) Computer support specialists B) Software engineers C) Systems analysts D) Computer programmers E) Database administrators

D: New market entrants

Which of the following marketplace forces would be of least concern to a manufacturer of deep-sea oil rigs? A) Product differentiation B) Traditional competitors C) Low number of suppliers D) New market entrants E) Low number of customers

E: 1, 2, and 3

Which of the following may lead to competitive advantage? 1. New products, services, and business models; 2. Charging less for superior products; 3. Responding to customers in real time A) 1 only B) 1 and 2 C) 2 and 3 D) 1 and 3 E) 1, 2, and 3

C: RSI

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? A) CTS B) CVS C) RSI D) Technostress E) RSS

C: Copyright law

Which of the following protects the authors of a book from having their work copied by others? A) Patent protection B) Due process C) Copyright law D) Fair Use Doctrine E) Trade Secret law

A: Inbound logistics, operations, outbound logistics, sales and marketing, and service

Which of the following represent the primary activities of a firm? A) Inbound logistics, operations, outbound logistics, sales and marketing, and service B) Inbound logistics, operations, outbound logistics, technology, and service C) Procurement, inbound logistics, operations, technology, and outbound logistics D) Procurement, operations, technology, sales and marketing, and services E) Organization infrastructure, human resources, technology, and procurement

A: The Privacy Act

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? A) The Privacy Act B) The Gramm-Leach-Bliley Act C) The Freedom of Information Act D) COPPA E) HIPPA

A: A failure of Amazon's cloud computing service

Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012? A) A failure of Amazon's cloud computing service B) A failure of Netflix's recommendation engine software C) A blackout at Netflix's primary data center D) A hacking attack E) A bug in Netflix's credit card processing system

C: Production workers

Which of the following roles in a firm would be least affected by using mobile devices to access firm information systems? A) Senior executives B) Sales executives C) Production workers D) Operational managers E) Knowledge workers

A: Flash cookies are installed only at the user's request

Which of the following statements about Flash cookies is not true? A) Flash cookies are installed only at the user's request. B) Flash cookies are stored on the user's computer. C) Flash cookies cannot be easily detected or deleted. D) Flash cookies are sometimes called super cookies. E) Flash cookies can be installed whenever a person clicks a Flash video.

A: It took six months to implement a working system at Plan International's international headquarters

Which of the following statements about Plan International's new human resources system, as described in the chapter case, is not true? A) It took six months to implement a working system at Plan International's international headquarters. B) The new system helps manage grants and donations received by Plan International. C) The new system is cloud-based and delivers information on a secure mobile platform. D) The new system enables employees to update their own personal information. E) The new system provides a bird's-eye view of the entire Plan workforce.

E: Business processes are typically unaffected by changes in information systems

Which of the following statements about business processes is not true? A) Business processes influence the relationship between an organization and information technology. B) Business processes are a collection of standard operating procedures. C) A business firm is a collection of business processes. D) Business processes are usually ensconced in an organization's culture. E) Business processes are typically unaffected by changes in information systems.

C: Successful collaboration can be achieved through technology regardless of the organization's culture or structure

Which of the following statements about collaboration is not true? A) In business, a collaboration can last as little as a few minutes. B) Business collaboration relies on the formation of teams that are assigned a specific task or goal. C) Successful collaboration can be achieved through technology regardless of the organization's culture or structure. D) One business benefit of collaboration is improved innovation. E) Businesses need special systems for collaboration.

A: Satellite TV

Which of the following substitute products would be of most concern for a cable TV distributor? A) Satellite TV B) Broadcast TV C) Satellite radio D) The Internet E) Terrestrial radio

B: Today, most firms are fully digital

Which of the following statements about digital firms is not true? A) In digital firms, time shifting and space shifting are the norm. B) Today, most firms are fully digital. C) Digital firms offer extraordinary opportunities for flexible global organization and management. D) Digital firms sense and respond to their environments more rapidly than traditional firms. E) Digital firms have more flexibility to survive in turbulent times.

E: Firms that invent disruptive technologies as first movers always become market leaders

Which of the following statements about disruptive technologies is not true? A) Disruptive technologies radically change the business landscape and environment. B) Disruptive technologies may be substitute products that perform better than other products currently being produced. C) Disruptive technologies may sometimes simply extend the marketplace. D) Disruptive technologies may put entire industries out of business. E) Firms that invent disruptive technologies as first movers always become market leaders.

E: In network economics, the marginal cost of adding new members to the network is higher than the marginal gain

Which of the following statements about network economics is not true? A) Uber is an example of a business model that is based on the principle of network economics. B) The law of diminishing returns does not always apply to every situation. C) From a network economics perspective, the value of a community of people grows as the number of participants in the community increases. D) Information technology can be strategically useful from a network economics perspective. E) In network economics, the marginal cost of adding new members to the network is higher than the marginal gain.

D: An informal group can be considered to be an organization

Which of the following statements about organizations is not true? A) An organization is a stable, formal social structure that takes resources from the environment and processes them to produce outputs. B) An organization is a formal, legal entity with internal rules and procedures that must abide by laws. C) An organization is a collection of people and other social elements. D) An informal group can be considered to be an organization. E) An organization is a collection of rights, privileges, obligations, and responsibilities delicately balanced over a period of time through conflict and conflict resolution.

E: Spamming is more tightly regulated in Europe than in the United States

Which of the following statements about spam is not true? A) Most spam originates from bot networks. B) Cell phone spam usually comes in the form of SMS text messages. C) Spam costs for business are very high. D) Spamming has mushroomed because it is so inexpensive and can reach so many people. E) Spamming is more tightly regulated in Europe than in the United States.

E: It sees the inputs and outputs, labor and capital, as being infinitely malleable

Which of the following statements about the technical view of organizations is not true? A) It sees information systems as a way to rearrange the inputs and outputs of the organization. B) It sees capital and labor as primary production factors. C) It emphasizes group relationships, values and structures. D) It sees the organization as a social structure similar to a machine. E) It sees the inputs and outputs, labor and capital, as being infinitely malleable.

E: It is a fundamental set of assumptions, values, and ways of doing things that has been accepted by most members of the organization

Which of the following statements best describes organizational culture? A) It encompasses the sum of beliefs and assumptions by all members. B) It enables the organization to transcend the different levels and specialties of its employees. C) It reflects the senior management's perspective on the organization and goals. D) It allows a company to achieve greater operational efficiency. E) It is a fundamental set of assumptions, values, and ways of doing things that has been accepted by most members of the organization.

B: In 2015, American businesses spent $500 billion on business and management consulting and information technology services

Which of the following statements is not true? A) In 2015, American businesses invested about $1 trillion in information systems hardware, software, and telecommunications equipment. B) In 2015, American businesses spent $500 billion on business and management consulting and information technology services. C) Private business investment in information technology has grown from 21 percent of total invested capital in 1999 to 37 percent of all invested capital in 2015. D) Most of the business value of IT investment derives from organizational, management, and cultural changes inside firms. E) Much of the money spent by American businesses on business and management consulting involves redesigning firms' business operations to take advantage of new technologies.

D: In general, the technical occupations in IT are showing faster expansion than occupations involved with the management of IT

Which of the following statements is not true? A) In 2016, the median wage for IT/MIS jobs is about $80,000. B) In the next eight years to 2024, IS/MIS will add about 500,000 jobs. C) Out of 114 occupations, MIS is ranked 15th in terms of salaries. D) In general, the technical occupations in IT are showing faster expansion than occupations involved with the management of IT. E) The growth of online software services and cloud computing is impacting the job prospects for computer programmers.

B: Most PCs manufactured in China use microprocessor chips manufactured in Korea

Which of the following statements is not true? A) Many Fortune 500 U.S. firms derive more than half their revenues from foreign operations. B) Most PCs manufactured in China use microprocessor chips manufactured in Korea. C) Eighty percent of the toys sold in the United States are manufactured in China. D) In 2015, 60 percent of Apple's revenue was generated outside of the United States. E) Technology companies are particularly dependent on offshore revenue.

A: It began as an e-mail and messaging client

Which of the following statements regarding IBM Notes is not true? A) It began as an e-mail and messaging client. B) It is a widely used collaboration tool at larger firms. C) It provides capabilities for wikis and microblogging. D) It provides tools for full version control of all company documentation. E) It is designed to provide security for sensitive corporate information.

B: Internet technologies are universal, and therefore usable by all companies

Why does Amazon need to worry about competitors in online shopping? A) E-commerce is affected by the law of diminishing returns. B) Internet technologies are universal, and therefore usable by all companies. C) Internet shopping produces cost transparency. D) The Internet enables the production or sales of substitute products or services. E) The Internet increases switching costs.

Telecommunications around the world are shifting to ________ networks. A. cellular B. mobile C. Wi-Fi D. VoIP

Wi-Fi

____________ enables peer-to-peer communications and allows users to transfer content among devices without having to rely on a wireless antenna. A. MiFi B. Wi-Fi C. Wi-Fi Direct D. Super Wi-Fi

Wi-Fi Direct

15. Which of the following is an example of what a client does? A. Processing email B. Processing web sites C. Running networks D. Word processing

Word processing

documentation

Written description of the functions of a software program.

C: Perform a strategic systems analysis

You are consulting for a natural food products distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step? A) Identify the business ecosystem the distributor is in B) Implement a strategic transition to the new system C) Perform a strategic systems analysis D) Benchmark existing systems E) Set up a strategic transition

A: An extranet, to enable quick collaboration over the Internet, minimize the time spent communication with the client, and minimize the amount of paperwork needed

You have been hired by BizCom, a business communications consultancy that services many clients in different industries throughout the United States, to help it improve its profit margin. BizCom provides customized recommendations for the best use of a client's existing resources for improving internal communications, typically delivered via documentation in different media. The company has approximately 50 consultants, all of whom are located in its central headquarters in Alexandria, Virginia. What type of system do you recommend that BizCom install to improve its business processes and increase its profit margin? A) An extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed B) A CRM, to maintain easily accessible customer records to minimize the time spent looking for client data C) A KMS, for minimizing redundant work on similar clients D) A marketing system, for improving sales levels E) A TPS, to help manage all daily activities and transactions

C: TPS with MIS capabilities

You have been hired by a non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, SMS, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? A) TPS B) TPS with DSS capabilities C) TPS with MIS capabilities D) TPS with ESS capabilities E) DSS with MIS capabilities

C: Extranet

You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. Which type of system will most efficiently provide a solution? A) CRM B) Enterprise system C) Extranet D) Intranet E) MIS

A: True

You need to know something about the hierarchy and culture of the company in order to understand how a specific business firm uses information systems. A) TRUE B) FALSE

B: False

You would use an MIS to help determine if your business should introduce a new product line. A) TRUE B) FALSE

A: A virtual world

________ allows you to communicate with avatars using text messaging. A) A virtual world B) Screen sharing C) Collaborative writing D) A large audience Webinar E) Telepresence

A: Regulated common carriers

________ are not held liable for the messages they transmit. A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials E) European ISPs

B: Due process

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A) Liability B) Due process C) Responsibility D) Accountability E) The judicial system

B: Accountability

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A) Due process B) Accountability C) The courts of appeal D) The judicial system E) Liability

A: Responsibility

________ means that you accept the potential costs and obligations for the decisions you make. A) Responsibility B) Accountability C) Liability D) Due process E) Duty

B: The opt-in model

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A) A safe harbor B) The opt-in model C) FIP principles D) P3P E) The opt-out model

B: Enterprise resource planning

________ systems are also known as enterprise systems. A) Resource planning B) Enterprise resource planning C) Enterprise support D) Management information E) Decision-support

extensible markup language- XML

a computer language that makes it easier to exchange data among a variety of applications and to validate and interpret these data

software as a service (SaaS) delivery model

a delivery model with which cloud computing vendors provide software that is sepcific to their customers requirements

on premise-computing

a model of IT management where companies own their own IT infrastructure (their software, hardware, networks, and data management) and maintain it in their data centers

infrastructure-as-a-service (IaaS) model

a model with which cloud computing providers offer remotely accessible servers, networks, and storage capacity

platform as a service (PaaS) model

a model with which customers rent servers, operating systems, storage, a database, software development technologies such as Java and NET, and network capacity over the internet

hypertext markup language

a page description language for specifying how text, graphics, video, and sound are placed on a web page document

HTML5

a page description language that makes it possible to embed images, audio, and video directly into a document without add-ons. Also makes it easier for web pages to function across different display devices, including mobile devices as well as desktops. Supports the storage of data offline

Shodan's primary purpose is ___________. A. a hacker website B. a service that searches the internet for devices connected to the internet C. a website that shows which devices are vulnerable to hackers D. to help users search for other people who use similar devices

a service that searches the internet for devices connected to the internet

cloud computing

a technology in which tasks are performed by computers physically removed from the user and accessed over a network, in particular the internet

grid computing

a technology that applies the unused processing resources of many geographically dispersed computers in a network to forma virtual supercomputer

server virtualization

a technology that uses software-based partitions to create multiple virtual servers (called virtual machines) on a single physical server

utility computing

a technology whereby a service provider makes computing resources and infrastructure management available to a customer as needed

Risk _______________ means absorbing any damages that occur. A. acceptance B. analysis C. limitation D. transference

acceptance

You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy. A. acceptance B. analysis C. limitation D. transference

acceptance

service oriented architecture

an IT architecture that makes it possible to construct business applications using Web services

A ___________ is an attack by a programmer developing a system. A. back door B. denial-of-service attack C. phishing attack D. virus

back door

11. Which of the following is the correct order of the data hierarchy, from smallest to largest? A. bit, byte, field, file, record, database B. bit, byte, field, record, file, database C. byte, bit, field, record, file, database D. byte, bit, field, file, record, database

bit, byte, field, record, file, database

37. A _____ is 8 ________. A. bit; bytes B. blip; bytes C. byte; bits D. byte; blips

byte; bits

hybrid clouds

clouds composed of public and private clouds that remain unique entities but are bound together, offering the benefits of multiple deployment models

The purpose of SpyEye is to _____________. A. catch hackers in the act of hacking B. collect personal and financial information C. facilitate SCADA attacks by seeing which systems are vulnerable D. watch what you do on your computer

collect personal and financial information

*A firewall is a _______ control. A. access B. communication C. physical D. virtual

communication

14. Portable computers and advanced ___________ have enabled employees to work from home or from anywhere. A. communication technologies B. input technologies C. output technologies D. primary storage devices

communication technologies

Compared to data warehouses, data marts have which one of the following characteristics? a) cost less b) have longer lead time for implementation c) have central rather than local control d) contain more information e) are harder to navigate

cost less

11. While the ______________ of hardware is constantly decreasing, the ______________ is constantly increasing. A. complexity; cost B. cost; complexity C. cost; performance D. performance; cost

cost; performance

37. Which of the following is the correct order for the KMS cycle? A. create, capture, store, refine, manage, disseminate B. create, capture, refine, manage, store, disseminate C. create, capture, refine, store, manage, disseminate D. create, capture, store, manage, refine, disseminate

create, capture, refine, store, manage, disseminate

Using a hotspotter is useful for _____________. A. creating a rogue access point B. eavesdropping C. radio-frequency jamming D. war driving

creating a rogue access point

42. A __________________________ defines the required format for entering the data into the database A. data dictionary B. DBMS C. entity D. primary key

data dictionary

The management of data across the entire organization is most accurately defined as: a) data integration. b) data control. c) data governance. d) data administration.

data governance

28. Data warehouses store _________ data, used primarily by _______ companies. A. historical; large B. historical; small C. real-time; large D. real-time; small

historical; large

The goal of CAPTCHA is to ___________. A. ensure you aren't alien software B. hack into secure networks C. protect networks against hackers D. remove alien software from your computer

ensure you aren't alien software

A data model is the diagrammatic representation of a database that clearly defines a database's ___, ____ and ____. a) entities, attributes, relationships. b) entity classes, hierarchy, files. c) data hierarchy, data attributes, data files. d) entity classes, entity attributes, entity files.

entities, attributes, relationships.

With which type of satellite is there a propagation delay? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit

geostationary

The biggest challenge for Skybox is ________. A. collecting data B. competition C. expenses D. government regulation

government regulation

44. SQL is the most popular query language because it ___________. A. doesn't require training B. has relatively simple statements C. is so easy to point and click on the different icons D. uses structured data

has relatively simple statements

E: Quality of life

he obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? A) Family and home B) Property rights and obligations C) System quality D) Accountability and control E) Quality of life

_________ is one common example of SSL. A. http B. https C. www D. wwws

https

26. A keyboard is an example of __________________. A. a communication device B. an output device C. human data-entry D. source-data automation

human data-entry

5. Data are scattered throughout organizations. An example of this is ________________. A. customers moving B. data hoarding C. human vs. computer languages D. media changing (cassette to CD)

human vs. computer languages

9. Data ___________ means all applications are able to access the same data, which is ___________ by databases. A. independence; maximized B. independence; minimized C. isolation; maximized D. isolation; minimized

independence; maximized

21. Big Data helps companies treat customers as individuals. This is called __________. A. business model creation B. data analyzation C. experimentation D. microsegmentation

microsegmentation

The main problem with multifactor authentication is _____________. A. it's a single point of failure B. it's too hard to do C. it will invade our privacy D. there are no problems with multifactor authentication

it will invade our privacy

If you hire a cybersecurity company like FireEye to identify security weaknesses in your information systems, you are using a risk _________ strategy. A. acceptance B. analysis C. limitation D. transference

limitation

A ___________ is an attack by a programmer developing a system. A. denial-of-service attack B. logic bomb C. phishing attack D. worm

logic bomb

Which type of satellite has the shortest orbital life? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit

low earth orbit

server farms

massive data centers which may contain hundreds of thousands of networked computer servers

Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics? a) mobility, broad reach b) mobility, lack of expense c) security, broad reach d) security, mobility e) broad reach, localization

mobility, broad reach

The two major characteristics that differentiate mobile computing from other forms of computing are _______ and _________. a) mobility, broad reach b) mobility, lack of expense c) security, broad reach d) security, mobility e) road reach, localization

mobility, broad reach

3. Computer technologies become obsolete _________ other organizational technologies. A. at the same time as B. less often than C. more quickly than D. irrelevantly different than

more quickly than

Facebook has discovered __________ are the most effective way of reaching consumers. A. banner ads B. native ads C. pop-under ads D. pop-up ads

native ads

29. Data warehouses and data marts are __________; this means users cannot change or update the data in data warehouses or data marts. A. integrated B. nonvolatile C. organized by business dimension or subject D. time variant

nonvolatile

Explicit knowledge has which of the following characteristics? a) objective b) personal c) slow d) costly to transfer e) ambiguous

objective

13. The BYOD phenomenon addresses the use of ___________ devices at _________. A. personal; home B. personal; work C. work; home D. work; work

personal; work

A ___________ is a remote attack requiring user action. A. back door B. denial-of-service attack C. logic bomb D. phishing attack

phishing attack

12. Employee # is the _______ in the Employee file and the _________ in the Class File. A. primary key; identifier B. primary key; secondary key C. secondary key; identifier D. secondary key; primary key

primary key; secondary key

Facebook has busted the myth that _________. A. businesses can't use social networking sites B. privacy isn't that important C. security is paramount in any industry D. small screens inhibit big, flashy ads

small screens inhibit big, flashy ads

Productivity

ratio between an org's. inputs and outputs.

The advantages of RFID tags to Staples include all of the following except: a) accurate inventory b) precise location of each item in stores c) reduced transaction costs at checkout d) movement history of each item through the store to moment of sale e) labor savings

reduced transaction costs at checkout

43. ____________ is a benefit of a data dictionary. A. managing security and user access B. recovering information if the system fails C. reducing the chances that the same attribute will be used in multiple applications under different names D. all of the above are benefits of a data dictionary

reducing the chances that the same attribute will be used in multiple applications under different names

Whereas phishing attacks are ____, denial of service attacks are ____. a) remote attacks requiring user action; remote attacks requiring no user action b) remote attacks requiring no user action; attacks by a programmer developing a system c) remote attacks requiring no user action; remote attacks requiring user action d) distributed remote attacks requiring user action; attacks by a programmer developing a system

remote attacks requiring user action; remote attacks requiring no user action

An evil twin attack is a type of ___________. A. eavesdropping B. rogue access point C. radio-frequency jamming D. war driving

rogue access point

Public clouds

shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public (individuals, groups, and/or organizations)

Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book? a) adware b) spyware c) spamware d) cookies

spamware

KPI

specific measures of CSF's.

*Which of the following is NOT a major threat to wireless networks? A. eavesdropping B. tapping C. rogue access points D. radio-frequency jamming

tapping

The key fob you use to open your car before you get to it is an example of _______. A. a mobile portal B. a voice portal C. mobile commerce D. telemetry

telemetry

The Shodan case illustrates ___________. A. how vulnerable all devices are, even if they aren't connected to the internet B. strong passwords aren't necessary on home devices since most hackers don't care about such a small target C. that hackers and security researchers use the same sites to identify vulnerabilities D. the government is doing nothing to protect our privacy

that hackers and security researchers use the same sites to identify vulnerabilities

One of the reasons for Facebook shares to drop by 50 percent from the IPO was _____. A. the failure of Sponsored Stories B. the irritating nature of their ads C. their abuse of consumers' privacy D. their neglect of mobile advertising

their neglect of mobile advertising

The most important benefit of knowledge management systems is: a) improved customer service. b) they make best practices available to employees. c) retention of scarce knowledge if employees retire. d) improved morale. e) more efficient product development.

they make best practices available to employees.

Metals and thick liquids can interfere with RFID signals, so Marks & Spencer _____. A. can only tag 50% of its merchandise B. can only tag 75% of its merchandise C. uses more powerful ID tags to capture the other 75% of its merchandise D. uses more powerful ID tags to ensure 100% of its merchandise are tagged

uses more powerful ID tags to ensure 100% of its merchandise are tagged

Which of the following is not a mobile application in financial services? a) transaction processing systems b) mobile banking c) wireless electronic payment systems d) micropayments e) wireless wallets

transaction processing systems

You have a small business that has had problems with malware on your employees' computers. You decide to hire a third-party company such as GFI Software to implement security controls and then monitor your company's systems. You are adopting a risk ________ strategy. A. acceptance B. analysis C. limitation D. transference

transference

An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks. a) vulnerability; threat; exposure b) vulnerability; security; threat c) threat; vulnerability; liability d) threat; vulnerability; exposure

vulnerability; threat; exposure

Problem Structure

where decision-making processes fall along a continuum ranging from highly structured to highly unstructured.

The _____ is the number of bits that can be processed by the CPU at one time. a) clock speed b) word length c) bus width d) line width e) none of the above

word length


Conjuntos de estudio relacionados

Earth's Interior - Instruction/Assignment

View Set

Suffix (-lysis, -desis, -tripsy)

View Set

Ch. 62 Care of Patients with Pituitary and Adrenal Gland Problems

View Set

Intro to Sociology Pre/Post Test

View Set

Combo with "Chapter 48 Assessment and Management of Patients With Hepatic Disorders" and 1 other

View Set