MIS Exam 1
The inventors of a disruptive technology typically benefit the most from the technology; it is rare that fast followers catch up quickly.
False
The law of diminishing returns only applies to digital products.
False
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
Profiling
Walmart's continuous replenishment system allows it to do all of the following except:
Provide mass customization
A(n) ________ is typically a major source of data for other systems.
TPS
If your main supplier was late in delivering goods, which type of system would you use to update your production schedule?
TPS
Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded.
True
Supply chain management systems are more externally oriented than enterprise systems.
True
The three main dimensions of information systems are management, organizations, and information technology.
True
Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.
True
Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.
True
Copyright is a legal protection given to creators of certain types of intellectual property.
True
Enterprise applications integrate information from multiple functions and business processes to enhance the performance of the organization as a whole.
True
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
True
Global firms can collaborate from different locations at the same time using synchronous collaboration tools.
True
IT governance refers to the overall decision-making that guides the IT strategy of a firm.
True
Information systems enable globalization.
True
Information technology (IT) consists of all hardware and software that a firm needs to use in order to achieve its business objectives.
True
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
True
One example of a business process is shipping a product to a customer.
True
TRUSTe is an example of which of the following?
online seal program
Which of the following industries has the lowest barrier to entry?
small retailer
Which of the following may lead to competitive advantage? 1. New products, services, and business models; 2. Charging less for superior products; 3. Responding to customers in real time
1, 2, and 3
Which of the following is a private corporate network extended to authorized users outside the organization?
An extranet
Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry?
Benchmarking
The enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as:
Big data
Which of the following statements about business processes is not true?
Business processes are typically unaffected by changes in information systems
A ________ is a senior manager who oversees the use of IT in the firm.
CIO
All of the following are new technology-related trends in MIS except:
Co-creation of business value
Which of the following is not a U.S. federal law affecting private institutions?
Computer Matching and Privacy Protection Act
The four major types of enterprise applications are:
ERP, SCM, CRM, and KMS
A DSS is most commonly used by the operations management level of an organization.
False
An information system could never hinder an organization's business capabilities.
False
Computers and programs are the only things required to produce the information an organization needs.
False
Data is information that has been shaped into a form that is meaningful to human beings.
False
For nonroutine decision making, senior managers rely on management information systems.
False
Gaining unapproved access to a computer is not a federal crime.
False
Identifying customers is a business process handled by the human resources function.
False
Middle managers make long-range strategic decisions about the firm's products and services.
False
Most transaction processing systems use sophisticated mathematical models or statistical techniques.
False
Operational managers use ESS primarily to solve specific problems.
False
Research has shown that a majority of firms are able to align their information technology with their business goals.
False
Spam is legally defined as any e-mail that is unsolicited.
False
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPAA
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?
Information rights and obligations
An ESS supports which of the following?
Long-range planning activities of senior management
Which of the following is not protected by copyright law?
Machines
All of the following are IT-enabled products and services providing competitive advantage except:
Nike's use of celebrities to market their products
________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.
Patent law
The ________ function is responsible for identifying customers.
Sales and marketing
Which of the following substitute products would be of most concern for a cable TV distributor?
Satellite TV
Which level of the organization is an ESS specifically designed to serve?
Senior management
Competitors were seeking which of the following business objectives when they rushed to provide ATMs after Citibank introduced the first ATMs in New York?
Survival
The principal liaison between the information systems groups and the rest of the organization is a(n):
Systems analyst
Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?
The Privacy Act
Which of the following statements about digital firms is not true?
Today, most firms are fully digital
A TPS is an information system that keeps track of all of the daily routine transactions of a business.
True
A business model describes how a company produces, delivers, and sells a product or service to create wealth.
True
A firm can be said to have competitive advantage when it has access to resources that others do not.
True
A key word in social business is "conversations."
True
A web interface used to present integrated personalized business content to users is called a portal.
True
Which of the following best illustrates the use of information systems to focus on market niche?
a department store creating specialized products for preferred customers
Walmart's attempt to increase its online presence is an example of a firm using information systems to:
achieve low-cost leadership
Which of the following statements about organizations is not true?
an informal group can be considered to be an organization
In ________, raw data is systematically acquired and transformed during various stages that add value to that information.
an information value chain
All of the following are steps in the process for analyzing an ethical issue except:
assigning responsibility
In relationship to total capital investments for organization, for the past 15 years Information technology capital investments have
been steadily increasing
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.
behavioral targeting
A(n) ________ is an activity for which a firm is a world-class leader.
core competency
All of the following are technical solutions to protecting user privacy except:
data use policies
Using the Internet to buy or sell goods is called:
e-commerce
What is the most important function of an enterprise application?
enabling business functions and departments to share information
Information systems enhance core competencies by:
encouraging the sharing of knowledge across business units
All of the following are competitive forces in Porter's model except:
external environment
Current information technology innovations are creating new products and services while having no impact on existing businesses or industries.
false, While current information technology innovations are creating new products and services, in some cases there are businesses and industries changing or being destroyed due to these innovations.
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?
his action is acceptable because the survival of his family has the higher social value
Which main business function is responsible for maintaining employee records?
human resources
Which of the following is not one of the six strategic business objectives of information systems?
improved employee morale
All of the following describe the effects of globalization except:
increases in transaction costs
The three activities in an information system that produce the information organizations use to control operations are:
input, processing, and output
Why does Amazon need to worry about competitors in online shopping?
internet technologies are universal, and thereby usable by all companies
All of the following statements are true about information technology's impact on business firms except:
it helps firms expand in size
Order fulfillment involves all of the following business processes except:
making customers aware of the product
The Internet increases the bargaining power of customers by:
making information available to everyone
An information systems manager:
manages data entry staff
Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors.
market niche
A firm can exercise greater control over its suppliers by having:
more suppliers
When a cookie is created during a website visit, it is stored:
on the hard drive of the visitor's computer
You are consulting for a natural food products distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step?
perform a strategic systems analysis
Converting raw data into a more meaningful form is called:
processing
The four major competitive strategies are:
product differentiation, low-cost leadership, focus on market niche, and customer and supplier intimacy
The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
safe harbor
A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives?
survival
According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are:
tasks, technology, people, and structure
"Look and feel" copyright infringement lawsuits are concerned with:
the distinction between an idea and its expression
Thomas Friedman's description of the world as "flat" refers to:
the flattening of economic and cultural advantages of developed countries
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
the opt-in model
According to ________, you should take the action that produces the least harm.
the risk aversion principle
In digital firms, both _____________ and _____________ are the norm.
time shifting, space shifting
A virtual company:
uses networks to link people, ideas, and assets