MIS FINAL

¡Supera tus tareas y exámenes ahora con Quizwiz!

Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product (A) procurement (B) operations (C) inbound logistics (D) outbound logistics

(C) inbound logistics

A service company checks the availability of resources before planning its projects. This activity can be classified under ________ (A) marketing (B) procurement (C) linkages (D) customer service

(C) linkages

A business selects a differentiation strategy would invariably structure itself around low-cost activities (T) True (F) False

(F) False

terabyte

1,024 gigbyte

Lists involve data with multiple themes

A database is used instead of a spreadsheet when ________.

Email

A form of asynchronous communication in which participants send comments and attachments electronically. As a form of group communication, it can be disorganized, disconnected, and easy to hide from.

Wiki

A knowledge base maintained by its users; processed on Web sites that allow users to add, remove, and edit content.

Intranet

A private internet used exclusively within an organization

A thin-client application is designed to run within a program such as ________.

FireFox

Which of the following memory devices is volatile in nature?

cache

The ________ is sometimes called "the brain" of the computer.

central processing unit

Which of the following would be the most disruptive to an organization when implementing an information system?

changing reporting relationships

Which of the following is a characteristic of volatile memory?

contents are lost when power is off

All of the following are examples of support activities except ________.

contract negotiation

The process of automation is a process of moving work from ________.

human side to computer side

A(n) ________ contains the URL of the Web page to find when a user clicks on it.

hyperlink

Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.

inbound logistics

The sales process includes all of the following except ________.

inbound logistics

Porter's five forces model is used to assess ____________________.

industry structure

The responsibilities of a computer technician include ________.

installing software and repairing networks

Which of the following is a function of the technology office in an organization's IS department?

investigating new IS technologies

Database administration

involves a wide variety of activities such as providing database security.

A ________ is equivalent to 1,024 bytes.

kilobyte

Value

the amount of money that a customer is willing to pay for a resource, product, or service

storage hardware

saves data and programs

In which value chain activity does a drone company acquire the parts and materials needed to manufacture the drones (A) inbound logistics (B) customer service (C) sales and marketing (D) outbound logistics

(A) inbound logistics

In an E-R diagram, a line between two entities represents a(n) ________. A) attribute B) identifier C) cardinality D) relationship

d

Metadata

data that describes data

Which of the following principles of competitive advantage is associated with product implementations?

differentiating service offerings

in business process management (BPM), an as-in model ________________.

documents the existing business process

A ________ is a worldwide-unique name that is affiliated with a public IP address.

domain name

how does it create a competitive advantage

enhance existing products differentiates products locks in customers raises barriers to market entry increase profit margins

Identify the principle of competitive advantage that is associated with product implementations.

enhance services

Horizontal-market applications are developed for specific, unique needs of an industry.

false

Project

A dynamic application of people and other resources for the creation of a product pr the achievement of some aim. Projects normally have a limited duration-- they start and are completed.

Foreign Key

A field in a database table that contains values of a primary key field of another table in order to link the two tables is a(n) __________.

According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?

A firm that sells the only drug for a disease

Discussion forum

A form of asynchronous communication in which one group member posts an entry and other group members respond. A better form of group communication than email, because it is more difficult for the discussion to go off track.

Team survey

A form of asynchronous communication in which one team member creates a list of questions and other team members respond. Microsoft SharePoint has built-in survey capability.

File transfer protocol (FTP)

A layer-5 protocol used to copy files from one computer to another. In inter-organizational transaction processing, it enables users to exchange large files easily.

Virtual meeting

A meeting which participants do not meet in the same place and possibly not at the same time.

Packet

A message that moves across the Internet

Problem

A perceived difference between what is and what out to be.

Workflow

A process or procedure by which content is created, edited, used, and disposed.

Protocol

A set of rules and data structures for organizing communication

Bring your own device policy (BYOD)

A statement concerning employee's permissions and responsibilities when they use their own device

A database

A structured, self-describing collection of logically related data, managed as a single unit is __________.

Conference call

A synchronous virtual meeting in which participants meet at the same time via a voice-communication channel.

Multiparty text chat

A synchronous virtual meeting, in which participants meet at the same time and communicate by typing comments over a communication network.

Voice over IP (VoIP)

A technology that provides telephone communication over the Internet.

Structured decision

A type of decision for which there id a formalized and accepted method for making the decision.

Unstructured decision

A type of decision for which there is no agreed-on decision-making method.

Microsoft SharePoint

A version-control application that includes many collaboration features and functions, including document check-in/checkout, surveys, discussion forums, and workflow.

Google Docs & Spreadsheets

A version-management system for sharing documents and spreadsheet data. Documents are stored on a Google server, from which users can access and simultaneously see and edit the document.

Sequential workflow

A workflow in which activities occur in sequence.

Parallel workflow

A workflow in which activities occur simultaneously.

SharePoint site

A workflow site, created in Microsoft's collaboration tool SharePoint, that enables team members to define workflows for their group. The software that runs the site will send emails to team members requesting reviews, create task lists defined for the workflow, check documents in, mark tasks as complete, email the next person in the workflow, and email copies of all correspondence to the workflow leader, who can use this capability to ensure that all teammates perform the work they are requested to do.

Domain Name

A worldwide-unique name that is affiliated with a public IP address

database management system

A(n) ________ is a program used to create, process, and administer a database.

Business Process

A(n) ________ is a recurring, stable system of activities that generate value by transforming inputs into outputs.

Application

A(n) __________ is a computer program designed to support a specific task or business process.

Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets?

ARM

Procedure

According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems.

What are necessary data characteristics?

Accurate, Timely, Relevant, Just Sufficient, Worth Its Cost

________ is a form of outsourcing.

Acquiring licensed software

Net neutrality principle

All data is created equally - carriers should not be able to decide which sites load quickly, which apps are allowed on a network, and which content is acceptable

Which of the following is an example of IaaS?

Amazon EC2

Porter defined value as the ________.

Amount of money that a customer is willing to pay for an offering

Commerce server

An application program that runs on a server-tier computer

Transaction processing system (TPS)

An information system that supports operational decision making.

Structured

An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.

Which of the following is a mobile operating system licensed by Google?

Android

Which of the following mobile operating systems is licensed by Google?

Android

Bluetooth

Another common wireless protocol. Designed for transmitting data over short distances, replacing cables.

The top layer of TCP/IP Protocol architecture is related to ________.

Applications

Client application programs

Applications that are processed on client computers

server application programs

Applications that are processed on server computers

Data, information, knowledge

As a manager in your company, you expect to retrieve __________ from operational systems and present it as __________ to your boss, who will act based on his __________.

Instance

As an individual student in your university's student database, you are a(n) __________ of the STUDENT entity.

Customer Service

Assisting customers' use of the products and thus maintaining and enhancing the products' value

Do not meet at the same time

Asynchronous communication occurs when team members ________.

Many to many

At your university, students can take more than one class, and each class can have more than one student. This is an example of __________ relationship.

In the context of Porter's five forces model, the bargaining power of suppliers is a weak force when considering the example of auto dealers setting the price of new cars. T/F

False

Which of the following is an advantage to an organization if its BYOD policy offers wireless network to mobile devices?

The organization can sniff employees' mobile traffic.

Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage?

The policy appears to be permissive without actually being so.

Determining the best mix of products that a company should sell is an example of an unstructured decision True False

True

Each activity in a business process is a business function that receives inputs and produces outputs. T/F

True

Feedback and iteration enable a group to produce something greater than any single person could accomplish by working independently True False

True

Good information is conceived from accurate, correct, and complete data. T/F

True

In the context of Porter's five forces model, the bargaining power of grain farmers in a surplus year is an example of a weak market force. T/F

True

In the five-component model of an information system, data is the bridge between the computer and the human sides. T/F

True

Information systems become a waste of time and money when users work with inaccurate data. T/F

True

Information systems differ in the amount of work that is moved from the human side to the computer side. T/F

True

One of the advantages of a team survey is that it is easy to determine who has not yet responded. True False

True

Operational decisions are those that support day-to-day activities. True False

True

Ordering additional hardware creates the least amount of organizational disruption compared to changes in the other four components of an information system. T/F

True

Project data is data that is part of the collaboration's work product. True False

True

Project scope and initial budget are set during the starting phase of a project. True False

True

Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another? A) USB flash drive B) projector C) mouse D) barcode scanner

a

Which of the following statements correctly describes the relationship between drones and videos in Falcon Security's database? A) A drone takes many videos; a video is taken by one and only one drone. B) A video is taken by many drones; a drone takes many videos. C) A video is taken by one and only one drone; a drone takes one and only one video. D) A drone takes one and only one video; a video is taken by many drones.

a

What affects threat of substitutes?

availability of substitute, substitute performance, cost of substitute, switching costs

The term "open source" means that the source code of the program is ________.

available to the public

A ________ is equivalent to 1,024 bytes. A) gigabyte B) kilobyte C) terabyte D) megabyte

b

A data integrity problem will occur only if ________. A) a database has multiple administrators B) data are duplicated in a database C) the database is very complex D) there are complex relationships between entities in a database

b

A group of similar rows or records is known as ________. A) a prototype B) a file C) a field D) an attribute

b

Which of the following is used to process and display browser database application forms, reports, and queries? A) C++ B) html C) COBOL D) VisualBasic

b

Which of the following memory devices is volatile in nature? A) magnetic disk B) cache memory C) erasable programmable read only memory (EPROM) D) optical disk

b

In organizations that operate significant nonaccounting information systems, the chief information officer is most likely to report to the ________.

chief executive officer

The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives.

chief information officer

The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.

chief technology officer

personal computers (PCs)

classic computing devises used by individuals

When presenting an idea to his colleagues, Marcus failed to consider others' views and got defensive when people asked him questions. This situation indicates that Marcus lacks ________ skills.

collaboration

________ is the activity of two or more people working together to achieve a common goal, result, or work product.

collaboration

kilobyte

collection of 1,024 bytes

Database application

collection of forms, reports, queries, and application programs that serves as an intermediary between users users and database data.

repository

collection of something====database is repository of data

server farm

collection of typically thousand of servers

five-component framework

computer hardware, software, data, procedures, and people

server

computer that is designed to support processing request from many remote computers and users

Which of the following is NOT a function of the information systems department?

conducting external audits

Procurement

consists of processes of finding vendors, setting up contractual arrangements, and negotiating prices.

Support activities

contribute indirectly to the production, sale, and service of the product. Including the procurement.

Digital Revolution

conversion from mechanical and analog devices to digital devices. (monumental changes for society)

Cost

cost of business process is the cost of the inputs plus the cost of the activities. The margin of the business process is the value of the outputs minus the cost.

COST of a business process =

cost of inputs + cost of activities

The cost of the business process is the sum of the cost of the inputs and the ________.

cost of the activities

cost

cost of the inputs plus outputs plus cost of activities

which are the dimension of feasibility?

cost, schedule, technical, and organizational feasibility

product implementations

create a new product/service enhance products/services differentiate products/services

Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value?

customer service

International outsourcing companies like Amazon.com are particularly advantageous as they provide ________.

customer support

) A client-server application that requires nothing more than a browser is called ________. A) a native application B) adware C) firmware D) a thin-client application

d

A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access. A) PC B) mainframe computer C) server D) mobile device

d

A ________ is also called "the brain" of the computer. A) network card B) motherboard C) thumb drive D) central processing unit

d

Adobe's Acrobat, Photoshop, and PageMaker are examples of ________. A) vertical-market application software B) operating systems C) firmware D) horizontal-market application software

d

Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, productivity of an employee on daily basis, and employee name. These aspects that Brad wants to track are called ________. A) identifiers B) records C) primary keys D) entities

d

Dynamic processes

flexible, informal, and adaptive pressures that normally involve strategic and less structured material decisions and activities.

Which of the following is generally a responsibility of users of information systems?

following security and backup procedures

Structured processes

formally defined, standardized process, that involve day-to-day operations.

Which of the following is not part of Porter's definition of human resource management?

general management

Which of the following is the most important trait that an effective collaborator should have? avoiding unpopular ideas persuasive presentation skills giving and receiving critical feedback previous experience as a collaborator ability to resolve conflict

giving and receiving critical feedback

Which of the following is a benefit of in-house hosting?

greater visibility of security and disaster preparedness

System

group of components that interact to achieve some purpose

The storage disk in your computer is an example of the ________ component of information systems.

hardware

Which of the following components in the five-component model of information systems is considered an actor?

hardware

Which of the following components of an information system is the easiest to change and causes the least amount of organizational disruption when changed?

hardware

Which of the following components constitute the computer side of information systems?

hardware and software

true

hardware consists of electronic components that are used to input, process, output and store data.

The speed of a CPU is expressed in cycles called ________.

hertz

Dynotrix Motors is a large car-manufacturing company. The company purchases raw material from many small-sized sellers across the globe. In this case, Dynotrix Motors is characterized by ________.

high bargaining power over its suppliers

The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter's five forces model, this statement illustrates ________.

high levels of rivalry

false

horizontal- market applications are developed for specific, unique needs of an industry.

A spreadsheet program is an example of ________.

horizontal-market application software

Adobe's Acrobat, Photoshop, and PageMaker are examples of ________.

horizontal-market application software

The attribute for a hyperlink is ________, whose value indicates which Web page is to be displayed when a user clicks on a link.

href

Which of the following protocols guarantees secure data transmission?

https

true

if an organization's BYOD policy dictates that the employee is responsible for damage, the advantage to the organization is that it appears to be permissive without actually being so.

true

in a close source project, such as Adobe Photoshop, the source code is highly protected and only available to trusted employees and carefully vetted contractors.

false

in the context of user interfaces, using content to drive application behavior is called indirect interactions.

As production manager at a bottling plant for a cola manufacturer, you receive reports containing figures for raw materials from last year, but stated as the current year's. This information would qualify as bad information because it is ________.

inaccurate

Nielsen's Law

network connection speeds for high-end users will increase by 50 percent per year. As networks become faster, new companies, new products, and new platforms will emerge.

Business process

network of activities that generate value by transforming inputs and outputs.

business process

network of activities, resources, facilities, and information that interact to achieve some business function, sometimes called a business system

value chain

network of value crating activities

Value chain

network of value creating activities consisting of five primary activities and four support activities.

Value Chain

network of value-creating activities. Consists of primary activities and support activities.

Which of the following is a characteristic of cloud-based hosting?

no obsolescence

According to Moore's law, the ________.

number of transistors per square inch on an integrated chip doubles every 18 months

tue

numerous vendors license products called mobile device management (MDM) software to backup and restore mobile devices.

Java, C# and VB.Net are examples of ________.

object-oriented languages

true

object-oriented languages can only be used by professional programmers who have devoted years to learning object- oriented design and coding skills.

false

object-oriented languages cannot be used to create difficult and complex applications

Virtualization is the process by which ________.

one computer hosts the appearance of many computers

Virtualization is the process by which ________.

one physical computer hosts many different virtual computers within it

I:N

one to many relationships

Linux is an example of a(n) ________.

open source operating system

Linux is an example of a(n) ________.

open source operating system software

In the IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.

operations

Which of the following devices is an example of a storage hardware device?

optical disk

Which of the following is a nonvolatile memory device?

optical disk

Which of the following is an example of nonvolatile memory?

optical disk

Every information systems (IS) user has the right to a secure computing environment. This means that the ________.

organization should protect his/her computer and its files

In cloud computing, resources are said to be "pooled" because ________.

organizations share the same physical hardware through virtualization

Which of the following statements is consistent with the central idea of business process design?

organizations should create new business processes instead of improving existing systems.

Every information system user has the right to a secure computing environment. this means that _________.

organizations should protect his/her computer and its files

Which of the following principles of competitive advantage is related to process implementations? enhance services raise the barriers to market entry create new products differentiate services

raise the barriers to market entry

Which of the following principles of competitive advantage is related to process implementations?

raising the barriers to market entry

Main memory is also known as ________.

random access memory

true

random access memory is volatile.

Which of the following is a primary activity in the value chain?

receiving and handling of raw materials and other inputs

Which of the following is a right of users of information systems?

receiving effective training according to their requirements

Which of the following best describes data?

recorded facts or figures

Which of the following is the best description of data?

recorded facts or figures

Which of the following principles of competitive advantage is related to process implementations?

reduce costs

Meredith constantly analyzes her work in terms of the individual contribution that she makes to the overall output of the organization. This shows her ________ skills.

systems thinking

You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill. A) collaborative

systems thinking

Which of the following is a nonroutine cognitive skill?

systems thinking ability

Business users who administer the development of information systems should ________.

take an active role in that system's development

A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.

technical writer

Jamie's company manufactures 3D printers, and his job is to prepare user manuals for the products. Jamie also prepares training material for the workers who are involved in the manufacturing process. With reference to his job profile, Jamie is a ________.

technical writer

Source code is computer code ________.

that is written by humans

false

the CPU of a computing devices stores data and programs.

support activities

the activities that contribute indirectly to value creation: procurement, technology, human resources, firm's infrastructure

false

the cache and main memory are nonvolatile.

Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

the cloud

Which of the following factors determines the structure, features, and functions of an information system used in a company?

the competitive strategy

Information Silo

the condition that exists when data are isolated in separated information systems.

Margin

the difference between the value that an activity generates and the cost of the activity.

primary activities

the main activity -each stage accumulates costs and adds value to the product

true

the main memory of a computer is sometimes called random access memory.

true

the operating system creates and manages the user interface

As an IS user, you have a right to a secure computing environment. This means that ________.

the organization should protect your computer and its files

In-house hosting, delivered via Web service standards that can be configured dynamically, is referred to as ________.

the private cloud

Normalization

the process of converting a poorly structured table into two or more well structured tables.

Functional application

the program component of a functional system.

Which of the following is considered as information rather than mere data? a list of property prices in a neighborhood the price of a company's shares on a given day the total number of students in a school the return on investment of an advertising campaign

the return on investment of an advertising campaign

Which of the following is considered information rather than mere data?

the return on investment of an advertising campaign

competitive strategy

the strategy and organization chooses as the way it will succeed in its industry -4 fundamental strategies

false

the term "open sources" means that the source code of the program is not available to the public.

Managerial decisions are decisions about ________. the utilization of resources broad organizational issues the day-to-day activities strategic decision making the creation of strategic goals

the utilization of resources

Managerial decisions are decisions about ________. the utilization of resources broad organizational issues the day-to-day activities strategic decision making the creation of strategic goals

the utilization of resources

A client-server application that requires nothing more than a browser is called a(n) ________.

thin-client application

true

thin-client applications are developed by professional programmers and technically oriented Web developers and business professionals.

false

thin-client applications can seldom run within a computer browser.

According to Porter's five forces model, a frequent traveler's choice of auto rental would be an example of a strong force for ____________.

threat of substitutions

Which of the following refers to a small, portable storage device that can be used to back up data and to transfer it from one computer to another?

thumb drive

What affects threat of new entrants?

time and cost of entry, specialist knowledge economies of scale, barriers to entry (i.e. regulations)

which is true about outsourcing?

to achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff

why do info systems exist?

to help organizations achieve their strategies

The difference between the total value added and the total costs incurred is called the ________ of the value chain.

total margin

The difference between the total value added and the total costs incurred is called the _________ of the value chain.

total margin

Glazer & Hicks is a firm that offers enterprise software solutions to independent retailers. The firm recently bagged a contract from a major national retail chain to develop and implement a proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system?

training the employees to use and manage the new system

Which of the following statements best describes the role of operations in a value chain?

transforming inputs into the final products

A service company asks its customers to fill out application forms before offering service. This is an example of a supporting business process. t/f

true

Creating a new product to add value to customers is an example of using product implementations to achieve competitive advantage t/f

true

In the context of outsourcing, once a company has chosen a vendor, further risk management is up to that vendor.

true

One of the major functions of the information systems (IS) department is to develop, operate, and maintain applications.

true

T/F- installation of unauthorized hardware and programs may interfere with automated maintenance programs used for upgrading a users computer

true

The difference between the value that an activity generates and the cost of the activity is called 'margin'. t/f

true

The connection between a VPN client and a VPN server is called a(n) ________.

tunnel

lost-update problem

two people purchasing the same item at the same time.

The ________ tier of three-tier architecture consists of computers, phones, and other devices that have browsers that request and process Web pages.

user

Which of the following refers to the three tiers in the three-tier architecture?

user (client), server (application), and database (data)

Which of the following is the presentation format of an application?

user interface

Which of the following refers to the three tiers in the three-tier architecture?

user, server & database

What are the three tiers in three-tier architecture?

user, server, and database

Porter defined ________ as the amount of money that a customer is willing to pay for a resource, product, or service.

value

MARGIN of a business process =

value of all outputs - cost

Outsourcing gathers all of the possible risks into the risk of choosing the right ________.

vendor

When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________.

vendor

DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. DenTimes is an example of ________.

vertical-market application software

DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. This is an example of ________.

vertical-market application software

false

volatile memory devices can store data without using external power.

________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.

web servers

Data integrity problems

when an organization has inconsistent duplicated data.

organizational feasibility concerns ___________

whether the new system fits within the organizations customers or legal requirements

false

windows operating system is used for macintosh clients.

true

with open sources, anyone can obtain the source code from the open source project's Web site.

Focused cost leadership is observed when a product has the lowest cost _________.

within an industry segment

Communication

A critical factor in collaboration, consisting of two key elements: the abilities of individuals to share in formation and receive feedback, and the availability of effective systems by which to share information.

Three-tier architecture

A design of user computers and servers that consist of 3 categories. 1) user tier 2) server tier 3) database tier

Nonvolatiles

The contents survive when the power is off

Which of the following memory devices is volatile in nature?

cache memory

what should an organization focus on being according to porters-4 compet strategies

can focus on being the cost leader or on differentiating its products or services from those of the competition

Machine code ________.

cannot be modified by humans

One of the reasons outsourcing is undertaken is to ________.

cap an organization's financial exposure

Which of the following would be the most disruptive to an organization when implementing an information system? changing reporting relationships developing new programs creating new databases installing new hardware components

changing reporting relationships

Material ordering is a part of ________.

Inbound logistics

Which of the following is true about a VPN?

It encrypts messages to ensure secure transmissions.

Which of the following is true about the "maintenance" of information systems?

It involves fixing problems or adapting existing systems to support new features.

The traditional process for developing information systems is ______.

The systems development life cycle (SDLC)

Which of the following would be a consequence of teleaction?

The value of robotics would increase.

Information

__________ is (are) data that have been processed to have meaning and value to a user.

Knowledge

__________ is (are) information in context that can be acted upon.

) In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________. A) data integrity problem B) crow's-foot paradigm C) adaptation conflict D) security problem

a

) The process by which a personal computer hosts several different operating systems is known as ________. A) PC virtualization B) parallel computing C) cloud computing D) normalization

a

Porter defined value as the ________.

amount of money that a customer is willing to pay for an offering.

true

an operating system controls a computer's resources

true

native applications are programs that are written to use a particular operating system

Which of the following is a characteristic of smart devices?

require microprocessors and new protocols

What is the acronym for range of Kilobytes to Petabytes

KMGTP King Megs get totally pumped

Forms

Katrina is a sales representative for an online retailer. She needs to update her customer list with new contact information for five customers. Which of the following elements will help Katrina modify her data?

Which of the following features distinguishes a LAN from a WAN?

LAN connects computers in a single location

High bargaining power over its suppliers

LNG is a large multinational appliance manufacturer. The company gets raw materials from many vendors. In this case, LNG is characterized by ________.

Raise barriers to market entry

Launch Cars, a car manufacturing company, has patented its breakthrough technology that reduces pollutant emissions by half. The company is now an active supporter of anti-pollution laws that are likely to diminish the profitability of many other auto makers. Launch Cars is attempting to ________.

SAF Inc. has a team of then information system personnel. the personnel are kept busy throughout the day as they help employees solve even the most trivial issues. In which ways can the employees assist the IS personnel in this scenario?

Learning basic computer skills

In the context of shared content with version control, shared documents are placed into shared directories called ________. Caches Tables Libraries Sessions Arrays

Libraries

According to Porter's model of business activities, interactions across value activities are called ________.

Linkages

_______ is a version of the operating system Unix that was developed by an open source community.

Linux

________ is a version of Unix that was developed by an open source community.

Linux

Which of the following principles of competitive advantage is related to process implementations?

Locking in buyers

FunText is a company that owns an app used for text messaging. It recently offered a membership extension of six months without any additional charges to its existing customers who had registered for a three-year membership. By doing this, which competitive strategy did FunText implement?

Locking in customers

International Zoological club publishes a monthly magazine for zoology enthusiasts. Members are required to pay an up-front fee to cover the first two years of the subscription when registering with International Zoological club. By doing this, which competitive strategy is International Zoological club implementing?

Locking in customers

Switching costs

Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.

Which of the following principles of competitive advantage is related to process implementations?

Locking in suppliers

Negatives of cloud computing

Loss of control

A new drug that has shown promise in curing skin cancer has been discovered by a famous chemical laboratory. This is the only known drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________.

Low threat of substitutions

________ is used to install and update software, back up and restore mobile devices, wipe employer software and data from devices, report usage, and provide other mobile device management data.

MDM software

Which of the following is the operating system designed by Apple?

Mac OS

Which of the following operating systems was designed by Apple?

Mac OS

false

Mac OS and iOS applications are constructed using Java

Which of the following is an example of storage hardware in computers?

Magnetic disk

________ is an example of storage hardware in computers.

Magnetic disk

Identify a primary purpose of collaboration. Eliminating individual tasks Making decisions Evaluating coworkers Performing routine tasks Personal improvement

Making decisions

Organizations can lock in suppliers by making it difficult to switch to another organization or by ________.

Making it easy to work with the organization

Identify a key difference between managerial decisions and operational decisions. Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities. Managerial decisions are corporate decisions, whereas operational decisions concern the utilization of resources. Managerial decisions deal with the allocation of resources, whereas operational decisions concern broad-scope, organizational issues. Operational decisions have broad scope, whereas the scope of managerial decisions is limited to day-to-day activities. Operational decisions have narrow scope, whereas the scope of managerial decisions is limited to day-to-day activities.

Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities.

Operational

Marci, a purchasing agent, orders 300 refrigerators per month from an online vendor portal. In doing so, she has made a(n) ________ decision.

The difference between the value that an activity generates and the cost of the activity is called the ________.

Margin

in the information system (IS) department, the ________ group managers the process of creating new information systems as well as maintaining existing information systems.

The development group

Margin

The difference between the value that an activity generates and the cost of the activity is called the ________.

The Cloud

The elastic leasing of pooled computer resources over the Internet

Internet of things (IoT)

The idea that objects are becoming connected to the internet so they can interact with other devises

Caroline asks her secretary to send information on the meetings that she needs to attend next month. Her secretary, Joanne, provides her with the details immediately, but leaves out certain additional details that are irrelevant to Caroline's requirements. Which of the following statements is true about this scenario?

The information that Joanne gave was accurate and sufficient for Caroline's purpose.

You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.

The information that your secretary gave will be considered as good information.

Moore's Law

The number of transistors per square inch on an integrated chip doubles every 18 months.

in an information systems department, the _______ group managers computing infrastructure, including individual computers, in-house server farms, networks, and communications me

The operations group

Which of the following is an advantage to an organization if its BYOD (bring your own device) policy offers wireless network to mobile devices?

The organization can sniff employees' mobile traffic

A(n) ________ uses the Internet to create the appearance of private, secure connections.

VPN

________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity. Document monitoring Version control Document tracking Version management Document replication

Version control

Tunnel

Virtual private pathway over a public or shared network from the VPN client to VPN server

VPN

Virtual public network- uses public Internet to create appearance of a private connection on secure network

One physical computer hosts many different virtual computers within it

Virtualization is the process by which ________.

Computers that reside in different geographic locations are connected using a (an) ________.

WAN

Computers that reside in different geographic locations are connected using a(n) ________.

WAN

For a printer or laptop to connect to a wireless LAN, it must have a(n) ________.

WNIC

Cost leadership

Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which competitive strategy.

________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.

Web servers

________ is a popular commercial webinar product used in virtual sales presentations SurveyMonkey MS Office Web WebEx Skype Aspen

WebEx

The competitive strategy

Which of the following factors determines the structure, features, and functions of an information system used in a company?

Internet of Things

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device?

Require microprocessors and new protocols

Which of the following is a characteristic of smart devices?

IEEE 802.11 protocol

Wireless LAN connections use

Focused cost leadership is observed when a product has the lowest cost ________.

Within an industry segment

Collaboration is defined as a group of people ________. Coming together to perform tasks that are different Working together to achieve a common goal Performing independent tasks that are important Working without having to critically analyze each other's work Reconciling differences in communication styles

Working together to achieve a common goal

________ is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.

XML

Identify how information technology differs from information systems.

You can buy information technology, but not information systems.

Information System

__________ collects, processes, stores, analyzes, and disseminates information for a specific purpose.

10 TB is equivalent to ________ gigabytes. A) 10,240 B) 1,000 C) 1,024 D) 102.4

a

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A) database application B) database design C) data field D) data model

a

A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans. A) system analyst B) business analyst C) user support representative D) network administrator

a

A data model is a ________. A) logical representation of database data B) repository of unprocessed data C) collection of isolated databases D) set of programs used to retrieve data

a

A(n) ________ is a group of senior managers from the major business functions that works with the chief information officer (CIO) to set the information systems (IS) priorities and decide among major IS projects and alternatives. A) steering committee B) discussion forum C) IS department D) directors committee

a

Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. The "Employee Number" column is referred to as a ________. A) primary key B) key attribute C) foreign key D) functionally dependent record

a

Charles and Irene are editors at a content development firm. Both of them, unknowingly, are working on the same copy of the annual report. Irene finishes editing the report and saves her copy; Charles saves his report an hour after Irene. Charles's report overwrites Irene's, and her changes are lost. This scenario is an example of the ________. A) lost-update problem B) crow's-foot paradigm C) bullwhip effect D) update query problem

a

Every information systems (IS) user has the right to a secure computing environment. This means that the ________. A) organization should protect his/her computer and its files B) user should solely be in charge of protecting the organization's computers and files C) user should inform the IS about software upgrades D) user will never face a network problem

a

Identify an open source DBMS product. A) MySQL B) DB2 C) Access D) Oracle Database

a

In an information systems (IS) department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media. A) operations B) technology C) development D) maintenance

a

Linux is an example of a(n) ________. A) open source operating system B) mobile operating system C) user community D) workstation client

a

Mac OS and iOS applications are constructed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET

a

value

as the amount of money that a customer is willing to pay for a resource, product, or service

(IS) Information system

assembly of hardware, software data, procedures, and people that produces information.

10/100/1000 Ethernet

Most personal computers support

Operating system

The main system control program is the __________.

Business Process

a network of activities that generate value by transforming inputs into outputs.

Abstract Reasoning

ability to make and manipulate models

System Thinking

ability to model components of the system to connect the inputs and outputs among those components into a sensible whole

Kerin is a business student interning at Benson and Hodgson, a firm specializing in exports of sophisticated equipment to other countries. She finds that she is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that she lacks ________ skills.

abstract reasoning

Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch?

access point

Which of the following types of skills is most likely be outsourced to the lowest bidder?

accounting skills

Which of the following types of skills is most likely to be outsourced to the lowest bidder?

accounting skills

Collaboration

activity of two more people working together to achieve a common goal, result, or work product.

A(n) ________ is a number that identifies a particular device.

IP address

The IEEE 802.3 protocol standard is also known as ________.

Ethernet

Thin-client applications are developed using ________.

HTML5

Inbound Logistics

Receiving, send and disseminating inputs to the products

Which of the following is the smallest element in a database? A) field B) record C) byte D) metadata

c

T/F- the actors or participants in a business process are the users of information systems

true

what 5 forces determine industry structure?

"BTBTR" Bargaining power of customers threat of substitutions bargaining power of suppliers threat of new entrants rivalry

What affects competitive rivalry?

# of competitors, quality differences, switching costs, customer loyalty

What affects bargaining power?

# of customers, size of each order, cost of changing, differences between competitors

What affects supplier power?

# of suppliers, size of suppliers, uniqueness of service, cost of changing

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device (A) Internet of Things (IoT) (B) 3D printing (C) self-driving cars (D) automated guided vehicles

(A) Internet of Things (IoT)

Which of the following is an example of a value chain linkage (A) a manufacturing information system used to reduce inventory costs (B) a sales system used to place product orders (C) a system that supports customer service efforts (D) none of the above

(A) a manufacturing information system used to reduce inventory costs

Which of the following attempts to decrease a customer's buyer power (A) loyalty program offering rewards for shopping (B) having many options to choose from when buying a product or service (C) a patent expires on a pharmaceutical, allowing generics to enter the market (D) none. all of these increase buyer power

(A) loyalty program offering rewards for shopping

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers (A) outbound logistics (B) operations/manufacturing (C) sales and marketing (D) customer service

(A) outbound logistics

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device (A) 3D printing (B) Internet of Things (IoT) (C) self-driving cars (D) automated guided vehicles

(B) Internet of Things (IoT)

Is the threat of new entrants strong or weak for Amazon (A) Strong (B) Weak

(B) Weak

An organization implements an information system to optimize its supply chain. The system helps the organization to reduce wastes. In this scenario, implementing the information system has helped the organization to gain a competitive advantage by ________ (A) locking in customers (B) reducing costs (C) locking in suppliers (D) differentiating the products

(B) reducing costs

Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________ (A) entry barriers (B) switching costs (C) product standards (D) value differentiation

(B) switching costs

If you were an ALDI District Manager tasked to make sure the pricing of milk in your stores is competitive with the price of milk in other local stores, which data would you consider good data for your purpose (A) ALDI milk supplier's price proposals (B) the price of milk sold by five local ALDI competitors (C) the top three grocer's national milk prices (D) the average milk prices for the previous year for each week

(B) the price of milk sold by five local ALDI competitors

What is the relationship between Margin, Value, and Cost in a Value Chain (A) Margin = Value + Cost (B) Margin = Value x Cost (C) Margin = Value - Cost (D) Value = Margin - Cost

(C) Margin = Value - Cost

The difference between the value that an activity generates and the cost of the activity is called the ___________ (A) turnover (B) revenue (C) margin (D) value-addition

(C) margin

Which of the following statements is true about self-driving cars (A) increased fuel consumption (B) expensive and complex (C) reduced car insurance cost (D) cause fewer accidents

(C) reduced car insurance cost AND (D) cause fewer accidents

What is information (A) processed Data (B) data presented in a meaningful context (C) data processed by summing, ordering, averaging, grouping, comparing, or other similar operations. (D) all of these

(D) all of these

In order for any organization to consider data "timely" it must be in real-time (up to the second) (T) True (F) False

(F) False

ISP

(Internet service provider) -What your actually connecting to when you connect to the Internet - 3 important function 1) Provides you with a legitimate Internet address 2) Serves as gateway to Internet 3) Pays for the Internet

LAN

(Local Area Network) - connects computers that reside in a single geographic location on the premises of the company that operates the LAN. Two to several hundred computers

A 3D home printer would create more stable structures, use less material, and reduce workplace injuries (T) True (F) False

(T) True

A business with a differentiation strategy will add cost to an activity only as long as the activity has a positive margin (T) True (F) False

(T) True

WAN

(Wide Area Network) - connects computers at different geographic locations. Ex: Computers for a college of business located on multiple campuses

Hypertext Transfer Protocol

(http)- protocol used between browsers and web servers

Pooled

-A group of servers -Cloud resources are pooled because many different organizations use the same physical hardware; they share that hardware through virtualization. -Cloud vendors benefit from economies of scale - average cost of production decreases as size of operation increases -Major cloud vendors operate enormous data centers (server farms)

Public IP addresses & domain names

-IPv4 (32 bit)- 4 decimal notation -IPv6- Eight hexadecimal dotted notation

Private IP Address

-Identifies a device on a private network, usually a LAN -Assignment controlled within LAN

Public IP address

-Identifies a particular device on public Internet -Assigned by ICANN (internet Corporation for Assigned Names and Numbers) -U.S. Department of Commerce no longer has oversight over ICANN

megabyte

1,024 kilobytes

gigabyte

1,024 megabytes

petabyte

1,024 terabytes

4 parts of machine cycle

1. Fetch 2. Decode 3. Execute 4. Store

Collaboration tools that provide workflow control manager the activities in a process pre-defined by the group True False

True

10 TB is equivalent to ________ gigabytes

10,240

10 TB is equivalent to ________ gigabytes.

10,240

Focused cost leadership is observed when a product has the lowest cost ________. A) within an industry segment B) within the product range offered by a company C) within an industry D) within the supply chain of a company

A

Individuals who edit large pictures, sound, or video files need a ________ processor to effectively use more than 4 GB of main memory.

64-bit

) Which of the following statements is true of business process designs? A) Most process designs require people to work in new ways. B) Business process designs do not involve change in procedures. C) Business process designs should be accompanied by a change in management. D) Process designs attract very little employee resistance.

A

A database is an example of a(n) ________. A) repository B) software C) linkage D) value chain

A

A group of grain farmers in a surplus year will have reduced ________. A) bargaining power B) threat of substitutes C) risk of rivalry D) threat of new entrants

A

A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. Identify the strategy used here. A) switching costs strategy B) low cost operation strategy C) differentiation strategy D) consumerist strategy

A

A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________. A) low threat of substitutions B) high bargaining power of customers C) high threat of new entrants D) low bargaining power of suppliers

A

A(n) ________ is a network of activities that generate value by transforming inputs into outputs. A) business process B) competitive strategy C) linkage D) information system

A

An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help them do that? A) establishing alliances B) creating new products C) enhancing products D) differentiating services

A

Focused differentiation occurs when ________. A) a better product is provided within an industry segment B) there is limited competition in an industry C) the customers are highly price sensitive D) product quality improves across an entire industry

A

Identify the activity in the value chain that involves receiving, storing, and disseminating inputs to the product. A) inbound logistics B) procurement C) operations D) outbound logistics

A

In which of the following situations would the bargaining power of suppliers be highest? A) a single vendor providing raw materials to many department stores B) a fashion outlet catering to a niche market C) a bank liquidating during a fire sale D) a large retailer buying goods from many small suppliers

A

In which of the following would rivalry be considered as a weak force affecting the market? A) military services B) used car dealers C) book sellers D) packaged food manufacturers

A

Mae manages delivery at a custom-kitchen outlet. Working with her customer's specifications, she contacts Gem Cabinets and places an order for a full-motion wall mount. Which of the following primary activities is Mae performing here? A) inbound logistics B) operations C) customer service D) marketing

A

Porter defined value as the ________. A) amount of money that a customer is willing to pay for an offering B) extent of after-sale service provided to customers C) perceived satisfaction of the customers and sellers after a transaction D) actual money exchanged in return of a product/service

A

Porter's five forces model is used to assess ________. A) industry structure B) market share C) internal competition D) lifecycles of products

A

RedDart is a premium freight provider in the United States. The company offers premium shipment services to its customers. The company ships faster than its competitors and uses tamperproof containers to ship its products. RedDart company distinguishes itself from competitors by ________. A) providing an enhanced product B) locking in its suppliers C) locking in its customers D) offering low-cost operations and services

A

Synapz, a manufacturer of office automation products, recently received a patent for an advanced therapeutic ergonomics technology. By doing this, Synapz has ________. A) created entry barriers B) introduced product differentiation C) locked in its suppliers D) reduced the cost of operations

A

The cost of the business process is the sum of the cost of the inputs and the ________. A) cost of the activities B) cost of the outputs C) value of the outputs D) value of the product/service

A

The difference between the value that an activity generates and the cost of the activity is called the ________. A) margin B) turnover C) revenue D) value-addition

A

Which of the following factors determines the structure, features, and functions of the information system used in a company? A) the competitive strategy B) the brand value of its brands C) the size of the company D) the technology used by competitors

A

Which of the following is a primary activity in the value chain? A) receiving and disseminating inputs to the product B) negotiating prices with vendors C) finding suitable vendors to supply raw materials D) setting up contractual arrangements with various suppliers

A

Which of the following value chain activities involves transforming raw materials into a finished product or service? A) operations B) inbound logistics C) marketing D) maintenance

A

false

A CPU is an example of an input device.

According to Porter's five forces model, in which of the following situations would a supplier have the highest bargaining power?

A Houston-based vendor is the only supplier of a patented material for many smartphone manufacturers

database application

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.

Focused differentiation occurs when _______.

A better product is provided within an industry segment

Microsoft Office Groove

A collaboration product that includes version management and other useful tools. Users can access and edit documents at a workspace; the software automatically propagates changes made by one user to other users' computers.

Computer Network

A collection of computers that communicate with one another over transmission lines or wirelessly

Unstructured

A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making.

) N-joi Ice Cream was facing competition to their flagship brand of "black currant ice cream". The competitor began offering three varieties of "black currant ice cream." N-joi decided to counter the threat by introducing five new varieties of ice creams. Which competitive strategy is N-joi implementing? A) cost leadership B) product differentiation C) cost differentiation in the segment D) service focus

B

A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________. A) outbound logistics B) inbound logistics C) operations D) internal marketing

B

ABC Motors is the largest manufacturer of cars. The company purchases raw materials from many small-sized sellers across the globe. In this case, ABC Motors ________. A) faces very low threat of substitute products B) has high bargaining power over its suppliers C) faces very low threat of new entrants to market D) has very high bargaining power over its customers

B

An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________. A) focused cost-leadership B) industry-wide differentiation C) industry-wide cost leadership D) focused differentiation

B

An organization implements an information system to optimize its supply chain. The system helps the organization reduce wastages and inventory charges. Hence, the system provides a competitive advantage to the organization. Here, the information system helped the organization achieve competitive advantage by ________. A) locking in customers B) reducing costs C) locking in suppliers D) differentiating the products

B

Bargaining power of customers is likely to be the highest for markets involving ________. A) public transportation B) industrial products C) patented drugs D) luxury goods

B

Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing? A) creation of entry barriers B) product differentiation C) reduction of cost D) locking in of suppliers

B

Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________. A) entry barriers B) switching costs C) product standards D) value differentiation

B

The net result of the difference between the total value added and the total costs incurred is the ________ of the value chain. A) actual value B) total margin C) gross revenue D) gross turnover

B

Which of the following principles of competitive advantage is associated with product implementations? A) locking in customers B) differentiating service offerings C) locking in suppliers D) establishing alliances

B

Which of the following value chain activities involves assisting users to handle the product after sale, thus maintaining and enhancing the product's value? A) inbound logistics B) customer service C) operations D) outbound logistics

B

Porter's Five Forces Model

Bargaining Power of Customers, Threat of substitutions, Bargaining Power of Suppliers, Threat of New Entrants, Rivalry.

According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________.

Bargaining power

Communications speeds are expressed in ________.

Bits

Bytes

Bits are grouped into 8-bit chunks called ________.

Are easy to represent physically

Bits are used for computer data because they ________.

________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

Bluetooth

Central Processing Unit (CPU)

Brain of the computer. Selects instructions, processes them, performs arithmetic and logical comparisons and store results

Query

Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. She should use a ________ to obtain the information that she wants from the database.

Web applications are typically limited by the capabilities of the ________.

Browser

are more vulnerable to security threats than are traditional applications

Browser-based applications ________.

A(n) ________ is a network of activities that generate value by transforming inputs into outputs.

Business process

________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.

Business process design

Activity

Business process is a network of activities. Each activity is a business function that receives inputs and produces outputs.

Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. As part of its expansion strategy, the company decides to open outlets in four more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?

Buying and installing new computers in the new outlets.

false

Bytes lack the capacity to measure sizes of non character data.

A digital divide exists between ________. A) U.S. software companies and European software companies B) hardware companies and software companies C) those who have Internet access and those who do not D) employees of a software company and the managers of the company

C

A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage by ________. A) differentiating the industry B) establishing standards C) establishing alliances D) enhancing the products

C

According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes? A) a used car dealership in New York B) a convenience store that sells retail products C) a firm that sells the only drug for a disease D) corner latte shops in Atlanta

C

According to Porter's five forces model, which of the following would be most affected by the threat of substitutes? A) Microsoft Windows OS B) Boeing jets C) Southwest Airlines' services D) Google Adwords

C

According to Porter's model of business activities, interactions across value activities are called ________. A) support activities B) models C) linkages D) cross-functionalities

C

In a manufacturing business, the ________ process transforms finished goods into cash. A) inbound operations B) operations C) sales D) inbound logistics

C

July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers are required to pay an up-front fee to cover the first two years of the subscription, when registering with July Networks. By doing this, which competitive strategy is July Networks implementing? A) differentiating the product B) enhancing the product C) locking in customers D) standardizing the product

C

Organizations can lock in suppliers by making it difficult to switch to another organization or by ________. A) making it easy for the customers to switch products B) reducing investments in their supply chain C) making it easy to work with the organization D) reducing the bargaining power of consumers

C

PowerCruise, a holiday cruise firm, recently offered its existing customers an extension of six months to their membership without any additional charges. By doing this, which competitive strategy did PowerCruise implement? A) creation of a new service B) product differentiation C) locking in of customers D) locking in of suppliers

C

The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________. A) low threat of substitutions B) high bargaining power of suppliers C) high levels of rivalry D) low bargaining power of customers

C

Which of the following is considered a support activity in the value chain of a business? A) operations B) customer service C) contract negotiation D) marketing

C

Which of the following principles of competitive advantage is related to process implementations? A) creating new products B) enhancing products C) locking in suppliers D) differentiating products

C

Which of the following statements is consistent with the central idea of business process design? A) Technology should be used to supplement the existing value chain. B) Business processes should not focus on the core competencies of organizations. C) Organizations should create new business processes rather than improving existing systems. D) Technology should be used to modify and improve standard business processes

C

Which of the following value chain activities involves inducing buyers to get a product and providing a means for them to do so? A) inbound logistics B) operations C) sales and marketing D) outbound logistics

C

If the primary information systems in an organization support only accounting and finance activities, the CIO should most likely report to the ________.

CFO

What Do Business Professionals Need to Know About Computer Hardware?

CPU is "the brain" Dual and Quad processor computers volatile vs. nonvolatile basic types of hardware binary digits

________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.

Cable

According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market?

Cancer drug manufactures

Outsourcing is done to ____

Cap an organizations financial exposure

User tier

Consists of computer, phones and other mobile devices that have browsers that request & process webpages

Server tier

Consists of computers that run Web servers and process application programs

Database tier

Consists of computers that run a DBMS that processes requests to retrieve and store data

Strategic

Carl, the information technology head at Cloud Denim has to overhaul the enterprise legacy information system used by the organization. He is responsible for determining what the hardware and software would be required to implement changes. Carl's decisions, in this case, are ________.

Networks owned by large telecommunication providers known as ...

Carriers

A ________ is also called "the brain" of the computer

Central Processing Unit

Which of the following is true about IS infrastructure?

Changing IS infrastructure is expensive and time-consuming.

lost-update problem

Charles and Irene are editors at a content development firm. Both of them, unknowingly, are working on the same copy of the annual report. Irene finishes editing the report and saves her copy; Charles saves his report an hour after Irene. Charles's report overwrites Irene's, and her changes are lost. This scenario is an example of the ________.

The responsibilities of a ______ include advising the Chief Information Officer, executive group, and project managers on emerging technologies.

Chief Technology Officer (CTO)

________ is a term that refers to the visual overhead in a computer display.

Chrome

A student team, which is assigned a term project, works together to achieve results. They provide continuous feedback to each other and thus, complete the project. Which of the following is being illustrated in this activity? Collaboration Association Participation Cooperation Support

Collaboration

When presenting an idea to her colleagues, Marjorie failed to consider others' perspectives and got defensive when people asked her questions. This situation indicates that Majorie lacks ________ skills.

Collaboration

________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. Participation Collaboration Association Cooperation Assimilation

Collaboration

Outbound Logistics

Collecting, storing, and physically distributing the products to buyers

Mixed Reality

Combination of real physical world with interactive virtual images or objects

What are value chain linkages?

Communication between business activities. Optimally, linkages allow an organization to create a new and more efficient business processes that integrate activities of all departments involved in a particular value chain

Virtual reality

Computer generated virtual world with interactive digital objects

Firmware

Computer software that is installed into devices such as printers and various types of communication devices

Quad-processor

Computer with four CPUs

Dual-processor

Computer with two CPUs

Elastic

Computing resources leased can be increased or decreased dynamically, programmatically in a short span of time and that organizations pay for just the resources they use.

CDN

Content delivery network: -System of hardware and software stores user data in many different geographical locations and makes data available on demand. -Provides specialized types of PaaS but usually considered in its own category -Minimize latency -Used to store and deliver content seldom changed

Which of the following is considered a support activity in the value chain of a business?

Contract negotiation

________ is defined as a group of people working together, all doing essentially the same type of work, to accomplish a job Collaboration Association Participation Cooperation Support

Coorperation

Which of the following is a form of outsourcing?

Correct ANP Infotech acquiring licensed manufacturing software from a vendor

Which of the following is a limitation of aligning information systems (IS) with organizational strategy?

Correct Adapting the IS to new versions of business processes is complex and time-consuming.

Which of the following statements is true of the operations group in an organization's information system (IS) department?

Correct It monitors the user experience and responds to their problems.

Which of the following statements is true about a data administration staff function?

Correct The group establishes standards to protect information assets.

The cost of the business process is the sum of the cost of the inputs and the ________.

Cost of the activities

Which of the following is a major implication of Moore's law?

Costs of data communications and storage have become very low.

Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.

Created an entry barrier

Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value?

Customer service

A(n) ________ is a collection of something, such as data and raw materials. A) value chain B) cache C) linkage D) repository

D

Lynn, the manager of a transportation company, is going through this week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing? A) inbound logistics B) marketing C) customer service D) outbound logistics

D

RAC Associates is a car rental company. The company rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________. A) primary business processes B) core activities C) strategic activities D) supporting business processes

D

Which of the following is a part of the materials ordering process? A) outbound logistics B) marketing C) operations D) inbound logistics

D

Which of the following is a support activity in the value chain? A) receiving inputs to operationalize the production B) distributing the products to retailers or buyers directly C) assisting customers in using the product or service D) setting up contractual arrangements for procurement

D

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? A) inbound logistics B) operations C) customer service D) outbound logistics

D

________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain. A) Internal supply chain design B) Product differentiation model C) Market differentiation model D) Business process design

D

Which of the following is true of DSL modems?

DSL modem signals do not interfere with telephone signals

A customer relationship management (CRM) system contains the names and phone numbers of customers. Such details stored in a CRM system are part of the ________ component.

Data

A spreadsheet consists of airfares to different cities from Chicago. If the contents of the spreadsheet are used to make a decision, it will be considered as ________.

Data

A student fills out an online admission form to register for a particular course. This is an example of the ________ component of the information system.

Data

The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.

Data

the purpose of a _____ ______ group is to protect data and information assets by establishing data standards and data management practices and policies.

Data administration group

Just-In-Time Data

Data delivered to the user at the precise time it is needed.

Which of the following is an example of a strategic decision? Deciding to increase the salaries of a group of employees Deciding to open a centralized distribution system Deciding to increase the reorder quantity of raw materials Deciding to give an employee certain tasks and responsibilities Deciding to buy a replacement server

Deciding to open a centralized distribution system

Strategic decisions

Decision that concerns broader-scope, organizational issues.

Managerial decisions

Decision that concerns that allocation and use of resources.

Operational decision

Decisions that concern the day-to-day activities of an organization.

Groupthink is a phenomenon where the desire for group cohesion leads to improved decision making. True False

False

TCP/IP Protocol Architecture

Defines Internet protocols - 5 layers 1) Physical- Hardware specifications 2) Data Link- Flow among switches and access points 3) Internet- Internet routing 4) Transport- Reliable Internet transport 5) Application- Enable communication among programs

in systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ____________.

Deliverables

Which of the following has a high threat of substitution?

Dell's purchase of hard drives

Which of the following is an example of project data? List of project tasks Schedule Budget Design document Monthly sales report

Design document

Web application

Designed to run within a computer browser

Identify a task that should be performed during the planning phase of project management. Reporting project progress Determining the schedule Performing project tasks Preparing archival documents Form the team

Determining the schedule

One-of-a-kind application software

Developed for a specific unique need

Which of the following principles of competitive advantage is associated with product implementations?

Differentiating service operations

DSL

Digital subscriber line - operates on the same lines as voice telephones, but it operates so it does not interfere with voice telephone service. DSL's use their own protocols for data transmission.

Which of the following tools facilitates asynchronous communication? Videoconferencing Multiparty text chat Discussion forum Screen-sharing application Real-time protocol

Discussion forum

Asynchronous communication occurs when team members ________. Cannot arrive at consensus after discussions Engage in conflicting discussions Do not meet at the same time Communicate in a sequential manner Talk with each other via video conference

Do not meet at the same time

Web page

Document that is coded in, usually html

A project manager has to manage tasks and identify schedule problems during the ________ phase of project management. Planning Starting Doing Finalizing Maintenance

Doing

Identify the project management phase in which the budget and tasks of a project are managed. Finalizing Doing Planning Starting Maintenance

Doing

One of the procedures of a collaboration project is documenting and reporting progress. This is performed in the ________ phase of the project. Starting Planning Doing Scheduling Maintenance

Doing

Computer Hardware

Electronic components and related gadgetry that input, process, output, and store data

Identify the principle of competitive advantage that is associated with product implementations.

Enhance services

Which of the following principles of competitive advantage is associated with product implementations?

Enhancing services

A group of shoe manufacturing firms purchases raw materials collectively from a single supplier to obtain better deals. This is an example of obtaining competitive advantage by ________.

Establishing alliances

An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help it in achieving this?

Establishing alliances

________ is a means through which an organization can gain a competitive advantage through process implementations.

Establishing alliances

Erin is a manager for a reputed software firm. She typically monitors and evaluates the existing working procedures of her subordinates. She constantly changes these working procedures so that they are consistent with the company's resources. This shows her ability to ________.

Experiment

Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?

FTP

A shared file server is best suited for sharing content when there is increased risk of interference with the user's work by other team members. True False

False

A telecom service provider focusing on high-end users is following an industry-wide differentiation strategy. T/F

False

A webinar is a tool used to facilitate asynchronous communication True False

False

According to the five-component model of information systems, the data and software components of information systems are capable of performing actions. T/F

False

Applications such as MS Word and Excel are examples of procedures. T/F

False

Being a skilled and persuasive presenter is the most important characteristic for an effective collaborator. True False

False

Brad, an employee who works in the production department, has the ability to collaborate well with others. Brad's ability to collaborate is an example of a routine skill. T/F

False

Changing the structure of existing databases causes more organizational disruption than changing working procedures. T/F

False

Constructive criticism is negative advice given to improve an outcome. True False

False

Data should be relevant to the subject, not necessarily to the context. T/F

False

Margaret finds that calling all her senior supervisors and quality managers for a face-to-face meeting is not feasible. She arranges for multiparty text chatting session involving all of them. This is an example of asynchronous communication. True False

False

Moore's Law predicts that the price to performance ratio of computers will double once in 18 months. T/F

False

Need for collaboration increases as the decisions become more structured. True False

False

Operational decisions require a high degree of collaboration. True False

False

Project plan and budget are prepared during the finalizing phase of project management. True False

False

Skype for Business is an example of a comprehensive content sharing collaboration tool. True False

False

T/F- One of the Chief information Officers main duties is to evaluate new technologies for use in the company's business proccesses

False

T/F- if an organization does not develop programs in-house, then the organization's IS development group will include programmers, test engineers, and technical writers.

False

T/F- it is impossible to cap financial risk by outsourcing

False

T/F- not all information systems have applications or software components.

False

T/F- outsourcing guarantees a high level of quality than that provided in-house.

False

T/F- outsourcing neither saves time for direct management, nor for indirect management

False

The support activities in the generic value chain do not contribute to the production, sale, and service of the product. T/F

False

Using a file server to exchange documents is superior to using Google Drive. True False

False

Version management applications offer a higher degree of control than the version control applications. True False

False

Version management systems improve the tracking of shared content and provide version control. True False

False

It is likely that desktop and portable computers will disappear in the next decade. T/F

False ?

ftp

File Transfer Protocol- used to move files over the Internet

Project teams should document project results and information for future teams. Which of the following is the project management phase in which the teams perform this function. Doing Planning Staring Finalizing Maintenance

Finalizing

Which of the following is an open-source Web browser?

Firefox

________ is installed in special, read-only memory in devices like printers, print servers, or various types of communication devices.

Firmware

________ is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser.

Flash

Better service is provided within a market niche

Focused differentiation occurs when ________.

Which is generally a responsibility of users of information systems?

Following security and backup procedures

a ___________ shows the tasks, dates, and dependencies for the tasks of a project.

Gantt chart

Which of the following statements is true of good information?

Good information should be based on correct and complete data.

Which of the following statements is TRUE of sharing a task list on Google Drive? Sharing a task list on Google Drive is a very complex procedure Team members can share a task list without having a Google account Google Drive gives every team member permission to edit, but restricts their contributions to the task list Google Drive allows simultaneous edits Task lists updates are pushed out weekly

Google Drive allows simultaneous edits

Which of the following statements is TRUE about working with Google Drive? Google accounts are not necessarily required to edit documents Documents are stored on the user's personal computer Multiple users are not allowed to simultaneously see and edit documents Google tracks document revisions, with brief summaries of changes made Google provides unlimited storage

Google tracks document revisions, with brief summaries of changes made

Uniquely identify each record

In a relational database, the primary key field is used to __________.

Field

In a university's relational database, the student records contain last names. Last name is a(n) __________.

Permissions

In a version-control system, authorizations to access shared documents stored in carious directories, Typical they are read-only, read-and-edit, and read-edit-and-delete; some directories gave no permission-- they are off-limits.

Trade-off

In project management, a choice among scarce resources such as scope, time, cost, quality, risk, people, and other resources. Managers amy need to trade off a delay in the project due-date to reduce expense and keep critical employees.

Scope

In the discipline of project management, the characteristics needed to be built into or achieved by an IS; same as the term requirements.

the human-performed activities to the computer-performed activities

In the five-component model, the process of automation is a process of moving work from ________.

Library

In version-control collaboration system, a shared directory that allows access to various documents by means of permissions.

Data is worth its cost when an appropriate relationship exists between the cost of data and its value. T/F

True

________ is the most common language for defining the structure and layout of Web pages.

HTML

A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.

HTML tag

Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?

HTTP

Which of the following protocols guarantees secure data transmission?

HTTPS

Which of the following is the least important characteristic of an effective collaborator? Willingness to enter difficult conversations Having experience as a collaborator Showing the ability to receive critical feedback Being skillful at giving negative feedback Willing to put forward unpopular ideas

Having experience as a collaborator

Dynotrix Motors is a large car-manufacturing company. The company purchases raw materials from many small-sized sellers across the globe. In this case, Dynotrix Motors is characterized by ________.

High bargaining power over its suppliers

The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter's five forces model, this statement illustrates ________.

High levels of rivalry

It increases your bargaining power

How does the internet affect the way you purchase your textbooks?

Peering agreements

How large carriers exchange traffic freely without charging each other access fees

Which of the following decisions is LEAST likely to involve collaboration? How much of product A should be ordered from vendor B? What products should we include in the new product line? Should our company acquire company A? What type of relationship should the company maintain with company A? Should we create a strategic partnership with company A?

How much of product A should be ordered from vendor B?

The organization responsible for assigning public IP addresses is called ________.

ICANN

Impact of internet of things- Smart buildings

ID problems like wasteful lighting, competing heating and cooling systems, rogue fans, etc

The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.

IP

Which of the following is the most common format for IP addresses?

IPv4

Amazon S3 (Simple Storage Service) is an example of ________.

IaaS

Which of the following is the most basic cloud offering?

IaaS

Which of the following is a form of hardware outsourcing?

IaaS cloud hosting

Workspace

In Microsoft Groove, an electronic "space" consisting of tools and documents that enable users to collaborate.

A retail company sells products such as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.

Inbound logistics

Cassandra runs a downtown boutique that sells customized clothes. One of her customers wishes to purchase a trench coat with a bejeweled clip. Cassandra contacts "Gems and Stones" and places an order for the clip. This activity can be classified under ________.

Inbound logistics

Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.

Inbound logistics

Impact of internet of things- GE's industrial internet

Increase efficiencies, reduce waste, improve decision making. Greatest potential for smart devices in hospitals, power grids, railroads, and manufacturing plants.

Reduction in production cost results in ________.

Increased profitability

Bargaining power of customers is likely to be the highest for markets involving ________.

Industrial products

Porter's five forces model is used to assess ________.

Industry structure

An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________.

Industry-wide differentiation

Which of the following terms is described as processed data or data presented in a meaningful context? illustrations information scenarios questionnaires

Information

Asynchronous communication

Information exchange that occurs when all members of a work team do not meet at the same time, such as those who work different shifts or in different locations

Synchronous Communication

Information exchange that occurs when all members of a work team meet at the same time, such as face-to-face meetings or conference calls.

Which of the following is true about the quality of information?

Information should be just barely sufficient for its purpose

Which of the following statements is true about the quality of information? Information should be just barely sufficient for its purpose. Data that arrives after a prolonged period of time is of the highest quality. Freely available data is always accurate and timely. Information needs to be relevant to the subject, not necessarily to the context.

Information should be just barely sufficient for its purpose.

Mobile Systems

Information systems that supports users in motion

Which of the following statements regarding information technology (IT) is true?

Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information.

IaaS

Infrastructure as a service- the cloud hosting of a bare server computer or data storage

A thin-client application is designed to run within a program such as ________.

Internet Explorer

IP

Internet Protocol - Specifies routing of data communication through networks. Routers - Small, special purpose computers that route packets to their destination

IP address

Internet address - a number that identifies a particular device

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device?

Internet of things (IoT)

A private internet that is used exclusively within an organization is called a(n) ________.

Intranet

A private internet that is used exclusively within an organization is called a(n) ________. A) ethernet

Intranet

A private internet that is used exclusively within an organization is called aNo ________.

Intranet

Sales and Marketing

Introducing buyers to purchase products and providing a means for them to do so

Which of the following statements is true about the IEEE 802.11 protocol?

It allows speeds of up to 600 Mbps.

Which is a risk of outsourcing information systems/information technology functions

It involves the potential loss of intellectual capital

Which of the following is a risk of outsourcing IS/IT functions?

It involves the potential loss of intellectual capital.

Which of the following statements is true about IEEE 802.3?

It is the protocol for wired LAN connections.

Which of the following statements is true of the operations group in an organization's IS department?

It monitors the user experience and responds to user problems.

Which of the following is true about outsourcing?

It saves both direct and indirect management time.

Which of the following is a function of an ISP?

It serves as a gateway to the Internet.

Which of the following statements is true about the steering committee of an IS department?

Its meetings are conducted by the IS department.

Android applications are developed using ________.

Java

Linux applications are developed using ________.

Java

Object-oriented languages

Java, C#, and VB.NET are examples of ________.

________ refers to data delivered to the user at the precise moment it is needed.

Just in time data

________ refers to data delivered to the user at the precise moment it is needed.

Just-in-time data

Who among the following are most likely to use asynchronous communication? Members of a team who work in different time zones Managers who work in the same office Employees who work in an assembly line A group of directors who regularly meet for board meetings Group members flying together on the same flight

Members of a team who work in different time zones

data that describe data

Metadata are ________.

A thin-client application is designed to run within a program such as ________.

Microsoft Internet Explorer

Which of the following is an example of a closed source project?

Microsoft Office

Which of the following alternatives for sharing content provides version control? Microsoft Office WebApps Google Docs Microsoft Sharepoint Network attached storage

Microsoft Sharepoint

Which of the following is an example of an application program?

Microsoft Word

________ states that the number of transistors per square inch on an integrated chip doubles every 18 months

Moore's Law

________ states that the number of transistors per square inch on an integrated chip doubles every 18 months.

Moore's Law

Which of the following is true about the changes and developments foreseen for 2023?

Most organizations will move their internal hardware infrastructure into the cloud.

Which of the following statements is true of business process designs?

Most process designs require people to work in new ways.

Hop

Movement from one network to another

Which kinds of formatting is NOT normally allowed in a word processor such as MS Word?

Multiple file formatting

Which of the following is the device that connects a computer's or printer's circuitry to network wires?

NIC

________ typically have transmission speeds less than 56 Kbps.

Narrowband lines

Which of the following employees performs a support activity in the value chain?

Nathaniel is in charge of setting up contractual agreements with vendors

________ applications are programs that are written to use a particular operating system.

Native

A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

Network

Internet

Network of networks

Which of the following is a valid guideline for maintaining good password etiquette?

Never ask someone else for their password.

Which of the following statements is TRUE of managing tasks? When a single person is made responsible for accomplishing a task, it means that he/she should do the task No benefit will come from the task list unless every task has a date by which it is to be completed Accountability and follow-up are seldom required for task management For team members to utilize a task list effectively, they need to keep it confidential Important tasks are completed on time

No benefit will come from the task list unless every task has a date by which it is to be completed

Data

Noel creates a table listing the number of students in his biology class, their names, age, and phone numbers. His table is an example of the ________ component of an information system.

Which of the following statements is true of an operating system?

Nonmobile client operating systems are used on personal computers.

The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the list of products sold in the previous quarter. These details do not qualify as good information because they are ________.

Not relevant

Mac OS and iOS applications are constructed using ________.

Objective-C

Content management

One of the drivers of collaboration effectiveness, which enables multiple users to contribute to an change documents, schedules, task lists, assignments, and so forth, without one user's work interfering with another's. Also enables users to track and report who made what changes, when, and why.

Which of the following statements is true of closed source projects?

Only trusted programmers are allowed to make changes to a closed source project.

Marci, a purchasing agent, orders 300 refrigerators per month from an online vendor portal. In doing so, she has made a(n) ________ decision. Managerial Tactical Strategic Operational Technical

Operational

________ decisions are concerned with day-to-day activities. Operational Strategic Managerial Tactical Preemptive

Operational

________ decisions are the most structured and have very little need for collaboration. Operational Tactical Managerial Strategic Technical

Operational

Operational decisions are those that support ________. Operational, day-to-day activities Optimum utilization of resources Organizational issues Allocation of tasks Strategic competitive objectives

Operational, day-to-day activities

Which of the following value chain activities involves transforming raw materials into a finished product or service?

Operations

Which of the following is an example of a PaaS?

Oracle on Demand

Switching Costs

Organizations can lock in customers by making it difficult or expensive for customers to switch to another product.

Which of the following statements is consistent with the central idea of business process design?

Organizations should create new business processes rather than improve existing systems.

Which of the following statements is consistent with the central idea of business process design? Business processes should focus on improving individual functional systems. Technology should be used to modify and improve standard business processes. Organizations should create new business processes rather than improve existing systems. Technology should be used to supplement the existing value chain.

Organizations should create new business processes rather than improve existing systems.

Lynn, the manager of a transportation company, is goes through the week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?

Outbound logistics

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?

Outbound logistics

Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.

PC virtualization

With ________, a computer, such as a desktop or portable computer, hosts several different operating systems.

PC virtualization

A cloud vendor who provides hosted computers, an operating system, and a DBMS is offering which of the following services?

PaaS

In the next ten years, the ________ is most likely to change.

Pace of integration of new technology

A(n) ________ is a piece of a message that is handled by programs that implement IP.

Packet

In the system implementation phase of the systems development life cycle (SDLC), with ______________ installation, the new system runs alongside the old one until it has been tested and is fully operational.

Parallel

Project data is data that is ________. Part of the collaboration's work product Used to manage a project Used to schedule the tasks of the project Part of documents such as schedules and budgets Used for operational decision making

Part of the collaboration's work product

In the system implementation phase of the systems development life cycle (SDLC), with the _________ installation, the organization installs the next piece of the system only after the previous piece works.

Phased

In the system implementation phase of the systems development life cycle (SDLC), with ___________ installation, the organization implements the entires new system/business processes on a limited portion of the business

Pilot

Roselyn works for an event management company. Her latest project as a party planner is a corporate event. She delegates tasks like choosing the venue, posting invitations, and planning logistics to her team members. She also specifies a time frame for each task. Roselyn's project is in the ________ phase of project management. Planning Starting Doing Finalizing Maintenance

Planning

PaaS

Platform as a service- vendors provide hosted computers an operating system and possible a DBMS. Ex: Microsoft Azure

Industry structure

Porter's five forces model is used to analyze ________.

How can new hardware affect competitive strategies?

Potentially disruptive hardware developments for existing organizations. 1.Internet of Things (IoT) 2.Digital Reality Devices 3.Self-driving Cars 4.3D Printing

Mark follows certain steps to access the supplementary readings for a course when using his organization's library management system. These steps that he follows are examples of the ________ component of an information system.

Procedure

It is generally more difficult to make changes to the ________ of an information system than to the database itself.

Procedures

Hueblue Software, an application provider to the gaming industry, decided to increase its portfolio by developing motion-control-enabled games for the mobile gaming industry. In this scenario, which competitive strategy is Hueblue Software implementing?

Product differentiation

________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.

Systems thinking

I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." The competitor made significant in-roads into this market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 implementing?

Product differentiation

I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." The competitor made significant inroads into this market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 implementing?

Product differentiation

Operating System (OS)

Program that controls the computer's resources ex: windows, mac OS, Linix, Unix

Web server

Program that runs on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients

Native Applicaton

Programs that are written to use a particular operating system

Client operating system

Programs that control the client computer's resources

server operating system

Programs that control the server computer's resources

Productivity Software

Programs that enable a user to perform various tasks generally required in home, school, and business. (Ex: word processing, spread sheet, presentation, Personal Information Management (PIM), and database programs)

A ________ is a set of rules that programs on two communicating devices follow.

Protocol

Cable lines

Provide high-speed data transmission using cable TV lines

Horizontal Market

Provides capabilities common across all organizations and industires

Which of the following is a primary activity in the value chain?

Receiving and distributing inputs to the product

An organization implements an information system to optimize its supply chain. The system helps the organization decrease wastages. Hence, the system provides a competitive advantage to the organization. Here, the information system helped the organization achieve competitive advantage by ________.

Reducing costs

Which of the following principles of competitive advantage is related to process implementations?

Reducing costs

Increased profitability

Reduction in production cost results in ________.

referential integrity constraints

Relationships between entities are implemented in relational databases as ________.

A ________ is a collection of something, such as data and raw materials.

Repository

A database is an example of a ________.

Repository

According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the meaningful and satisfying experience criterion Document definitions Rewarding accomplishment Managing many versions of content Managing tasks Communicate (feedback)

Rewarding accomplishment

________ occurs when users move their activities, especially long-running transactions, across devices.

Roaming

PC virtualization

Ronald runs both Windows 10 and Linux on his desktop computer. This is an example of ________.

Which of the following TCP/IP application-layer protocols is used for e-mail transmission?

SMTP

Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?

Sales and marketing

In a manufacturing business, the ________ transforms finished goods into cash.

Sales process

Which of the following is an example of a company that offers SaaS?

Salesforce.com

Vertical market application software

Serves the needs of a specific industry.

Which is a responsibility of a chief information officer (CIO)

Serving as the principal manager of the IS department

The fundamental purpose of the starting phase of a project is ________. Accomplishing the project tasks effectively Determining tasks and dependencies Managing tasks and budgets of the project Setting the ground rules for the project and team Solving problems

Setting the ground rules for the project and team

Which of the following is a support activity in the value chain of a firm?

Setting up contractual arrangements for procurement

________ refers to the ability to model components and show how the components' inputs and outputs relate to one another.

Systems thinking

Which of the following question is best answered through unstructured decision making? How many overtime hours should be used to fill this order? Should we continue to outsource our bookkeeping processes? What is the acceptable defect ratio for this product ? When should the next batch be scheduled to reduce idle time? How many replacement parts should be kept on hand?

Should we continue to outsource our bookkeeping processes?

________ is an add-on to browsers that was developed by Microsoft and provides animation, movies, and other advanced graphics inside a browser.

Silverlight

smtp

Simple Mail Transfer Protocol- used for email transmissions

Which of the following is a comprehensive tool for communication? Google Hangouts SharePoint Google Drive Skype for Business Zphone

Skype for Business

SOHO

Small office or home office

Mobile device

Small, lightweight, power-conserving, computing device that is capable of wireless connectivity.

An operating system like Windows or Linux is an example of the ________ component of an information system.

Software

SaaS

Software as a service- provides not only hardware infrastructure, but an operating system and application programs as well. Ex: iCloud

Written by humans

Source code is computer code ________.

According to Porter's five forces model, which of the following would be most affected by the threat of substitutes?

Southwest airlines

The first place to look for and launch applications in MS Windows is to go to the:

Start menu

Evelyn, who is in charge of an ad hoc team, holds a meeting with her team and explains the purpose of the project and outlines what the team can expect during its course. She lays down certain rules regarding the methods that can be used to achieve their project goals. Evelyn's project is in the ________ phase of project management. Starting Finalizing Doing Planning Maintenance

Starting

Team roles, responsibilities, and authorities are established during the ________ phase of a project. Starting Planning Doing Evaluating Maintenance

Starting

Bell's Law

States that "a new computer class forms roughly each decade establishing a new industry." digital devices will evolve so quickly that they enable new platforms, programming, environments, industries, networks, and info systems every 10 years.

Carl, the information technology head at Cloud Denim, a clothing company, has to update the enterprise software system used by the organization. He is responsible for determining the hardware and software that would be required to implement the new system. Carl's decisions, in this case, are ________. Operational Strategic Procedural Managerial Technical

Strategic

The directors of X-lam Inc., a manufacturer of electric water heaters, meet to discuss ways to increase their net profit. They decide to manufacture electric toasters and thus invest in a new product line. This investment is an example of a(n) ________ decision. operational strategic managerial procedural technical

Strategic

The need for collaboration is greatest for ________ decisions. Operational Procedural Strategic Managerial Technical

Strategic

________ decisions are those that support broad-scope, organizational issues. Operational Strategic Unstructured Managerial Technical

Strategic

An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process. Structured Unstructured Managerial Strategic Predictive

Structured

Following standardized guidelines to calculate sales commissions is an example of a(n) ______. Autocratic participative decision-making style Structured decisions Unstructured decisions Consensus participative decision-making style Financial decision

Structured decisions

Using MS Word, the easiest way to format paragraphs with similar fonts, line spacing and justification without repeating many steps is to use:

Styles

RAC Associates is a car rental company that rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________.

Supporting business processes

According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the growth in team capability criterion? Rewarding accomplishment Managing many versions of content Supporting intra-team training Building team spirit Create sense of importance

Supporting intra-team training

Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.

Switching costs

A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. The strategy used by the company is referred to as ________.

Switching costs strategy

The use of a conference call is an example of ________ communication. Sequential Synchronous Indirect Asynchronous Incidental

Synchronous

________ communication occurs within a team when all team members meet at the same time. Synchronous Asynchronous Virtual Unidirectional Asynchronous

Synchronous

As described in the class slides, which of these job titles is the most common job title for a new MIS major graduate?

Systems Analyst

a ______ _______ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.

Systems analyst

The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

TCP/IP

The term ________ refers to a collaboration tool where team members can easily respond and the management can easily identify the people who have not responded to a request. Discussion forum Management survey Webinar Team survey Email

Team Survey

Videoconferencing

Technology that combines a conference call with video cameras.

Data

The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.

Augmented Reality

The altering of reality by overlaying digital information on real-world objects

Which of the following factors determines the structure, features, and functions of an information system used in a company?

The competitive strategy

Which of the following is a characteristic of volatile memory?

The contents are lost when power is off.

Volatile

The contents are lost when the power if off

Application software

The set of programs on a computer that helps a user carry out tasks such as word processing, sending e-mail, balancing a budget, creating presentations, editing photos, taking an online course, and playing games. ex: word, access, games

System Software

The set of programs that enables a computer's hardware devices and application software to work together; it includes the Operating System (OS) and utility programs.

Collaboration

The situation in which two or more people work together toward a common goal, result, or product; information systems facilitate collaboration.

Which of the following statements is true about the steering committee of the information systems (IS) department?

The steering committee's meetings are conducted by the IS department.

Discussion forums are better suited than emails in asynchronous communication because They are best suited to transmit personalized information They facilitate real-time communication between participants They keep the discussion from going off track They ensure that all team members are involved in the discussion They have greater organizational memory

They keep the discussion from going off track

Which of the following is true about users of information systems?

They must learn standard techniques and procedures for the applications they use.

Which of the following statements is true of native applications?

They only run on the operating system for which they are programmed

Which of the following statements is true of native applications?

They only run on the operating system for which they are programmed.

Which of the following is true about cable modems?

They rely on high-capacity optical fiber cables and use their own protocols for data transmission.

Which of the following statements is true of business users who administer the development of information systems?

They should take an active role in the system's development.

Which of the following statements is true of business users who administer the development of information systems? It is mandatory that they hold a degree in database management. They should refrain from specifying the system's requirements. They should take an active role in the system's development. When the system fails, they must refrain from performing tasks related to system recovery.

They should take an active role in the system's development.

The difference between the total value added and the total costs incurred is called the ________ of the value chain.

Total margin

Version management

Tracking of changes to documents by means of features and functions that accommodate concurrent work. The means by which version management is done depend on the particular version-management system used; three such systems are wikis, Google Docs & Spreadsheets, and Microsoft Groove.

Which of the following statements is true about the changes and developments foreseen by the year 2025? Traditional classrooms will be replaced by classrooms in a box. Processing image data will be difficult. Desktop and portable computers will increase in popularity. Mobile devices will be cheaper and powerful.

Traditional classrooms will be replaced by classrooms in a box.

Operations/Manufacturing

Transforming inputs into the final products

TCP

Transmission Control Protocol - Breaks traffic up into packets and sends each one along its way

According to Porter's five forces model, the intensity of each of the forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be. T/F

True

According to the five-component framework, the five components of an information system are present in every information system. T/F

True

Activities such as collecting, storing, and physically distributing the products to buyers are considered as primary activities in a value chain. T/F

True

An inventory of raw materials is an example of a repository. T/F

True

An operating system is a program that controls a computer's resources.

True

An organization providing the lowest cost for a product or service across an industry segment is focusing on cost leadership. T/F

True

An organization responds to the structure of its industry by choosing a competitive strategy.

True

An organization's goals and objectives are determined by its competitive strategy. T/F

True

An unstructured decision process is one for which there is no agreed-on decision-making method. True False

True

Changing personnel responsibilities to suit an information system is more disruptive to an organization than ordering additional hardware for the information system. T/F

True

Susan, the operations manager at Multitech Systems Inc., schedules a face-to-face meeting with her vendors to decide on the specifications for a project. Some of her senior engineers are also asked to participate in the discussion through a conference call. This is an example of synchronous communication. True False

True

T/F- Dimensions of process quality are effectiveness and efficiency.

True

T/F- a work breakdown structure (WBS) is a hierarchy of tasks required to complete a project

True

T/F- an organization reduces implementation risk by outsourcing information systems

True

T/F- if the outsource vendors employees have gained significant knowledge of the company, ending the agreement is a major risk

True

T/F- information system users have a responsibility to follow security and backup procedures.

True

T/F- the IS operations group monitors user experience and responds to user problems.

True

T/F- the activities in a business process often involve information systems

True

T/F- the actors or participants in a business process are the users of information systems.

True

Team members need not continually check the SharePoint task list for new tasks. True False

True

The facility manager of an insurance company makes decisions on the monthly purchase of office supplies. This is an example of an operational decision. True False

True

The five-component framework applies to simple and complex information systems. T/F

True

The most important skill for effective collaboration is to give and receive critical feedback. T/F

True

The streamlining of business processes to increase margin is key to obtaining competitive advantage. T/F

True

When considering different information systems alternatives, it will be helpful to consider the low-tech versus high-tech alternatives in light of the amount of work that is being moved from people to computers. T/F

True

According to the five-component framework, additional components are added to the existing component framework as the complexity of a system increases. T/F

True?

By 2025, huge networks of computers will be required to process image data in real time. T/F

True?

In the five-component model of an information system, hardware and software are part of the human side. T/F

True?

When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "http://www.bang-olufsen.com/", which is the ________ of the Web page.

URL

Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another?

USB Flashdrive

Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another?

USB flash drive

Most LAN connections are made using ________.

UTP cable

Which of the following is an example of an open-source desktop operating system?

Ubuntu

URL

Uniform Resource Locator- address on the Internet

Which of the following is a key difference between collaboration and cooperation? Unlike cooperation, collaboration occurs when a job has to be accomplished Cooperation requires people to have a common goal, whereas collaboration occurs even without a common goal People should work together to cooperate, whereas they need not work together to collaborate Unlike cooperation, collaboration emphasizes iteration and feedback Cooperation emphasizes iteration and feedback, and collaboration emphasizes consensus

Unlike cooperation, collaboration emphasizes iteration and feedback

A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspect of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making. Asynchronous Unstructured Structured Operational Relational

Unstructured

Workflow control

Use of software and IS to monitor the execution of a work team;s processes; ensures that actions are taken at appropriate times and prohibits the skipping of steps or tasks.

Version control

Use of software to control access to and configuration of documents, design, and other electronic versions of products.

Project management

Use of software to produce charts (such as Gantt charts) that schedule tasks and resources that are dependent on each other.

IEEE 802.3 protocol (Ethernet)

Used for LAN connection. Also called Ethernet - specifies hardware characteristics, such as which wire carries which signals. Also describes how messages are to be packaged and processed for wired transmissions of the LAN.

Project metadata is data that is ________. Part of a collaboration's work product Used to manage the project Developed to design new offerings Used in documents to describe recommended solutions Intended to be archived

Used to manage the project

Which of the following statements is true about firmware?

Users do not need to load firmware into a device's memory.

Which of the following statements is true of firmware?

Users do not need to load firmware into the device's memory.

Pervasive Computing

Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________.

A(n) ________ uses the Internet to create the appearance of private point-to-point connections

VPN

Melissa is a senior accountant at a consulting firm. She brings to her manager's notice the considerable amount of time that is wasted when accounting tasks are performed manually, and proposes that the department automates these tasks. Melissa's accounting department is in need of a(n) ________. A) application software B) system software C) firmware D) operating system

a

Owen, the database administrator for a shipping company, is responsible for checking the data model, which is to be used in the database management system, for accuracy and completeness. This is an example of Owen's ________ tasks. A) development B) adaptation C) backup and recovery D) operation

a

Reed Technologies has hired certified programmers to create an application for its Web site. The application would run inside a browser and support graphics and animation. Which of the following will the programmers use to develop this application? A) HTML5 B) Java C) Objective-C D) C#

a

Relational databases represent relationships using ________. A) foreign keys B) file systems C) metadata D) primary keys

a

Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________. A) PC virtualization B) server virtualization C) cloud computing D) desktop virtualization

a

SFA Inc. has a team of ten information systems (IS) personnel. The personnel are kept busy throughout the day as they help employees solve even the most trivial issues. In which of the following ways can the employees assist the IS personnel in this scenario? A) by learning basic computer skills B) by sharing their passwords with others to use their help in solving those trivial issues C) by installing security programs by themselves D) by making hardware modifications

a

Source code is computer code ________. A) that is written by humans B) that is not understandable by humans C) that is represented as bits and bytes D) that cannot be modified

a

The purpose of a ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data mining D) data communication

a

The responsibilities of a tech support engineer include ________. A) helping users solve problems and providing training B) managing and protecting databases C) writing program documentation D) advising the chief information officer on emerging technologies

a

The rows in a database are called ________. A) records B) tables C) files D) fields

a

The speed of a CPU is expressed in cycles called ________. A) hertz B) knot C) Mach D) rev

a

Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. A) mobile system B) nonmobile system C) client operating system D) native application

a

When using the relational model to represent two tables, one must ________. A) add a foreign key to one of the tables B) have more than two primary keys in the model C) establish only N:M relationships between the tables D) use metadata instead of foreign keys

a

Which of the following data elements is placed higher than records in the database hierarchy? A) file B) field C) character D) byte

a

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A) Internet of things (IoT) B) 3D printing C) self-driving cars D) automated guided vehicles

a

Which of the following is a characteristic of smart devices? A) require microprocessors and new protocols B) have lower bandwidth C) consume less energy D) have less processing power

a

Which of the following is a developmental task of database administration? A) evaluating an application design B) monitoring backup procedures C) conducting training for users D) managing configuration changes in systems

a

Which of the following is a limitation of aligning information systems (IS) with organizational strategy? A) Adapting the IS to new versions of business processes is complex and time-consuming. B) Aligning the IS direction with the organizational strategy occurs only when organizations merge. C) Aligning the IS direction with the organizational strategy occurs only when the divisions are sold. D) The steering committee provides a forum for the IS department to voice its complaints about the users.

a

Which of the following is a responsibility of a chief information officer (CIO)? A) serving as the principal manager of the IS department B) heading the technology group C) evaluating new technologies that are relevant to the organization D) developing processes and information systems (IS) that implement business strategy

a

Which of the following is an example of a mobile device? A) a smartphone B) an Xbox C) a desktop computer D) a mainframe

a

Which of the following is an example of an application program? A) Microsoft Word B) Unix C) Linux D) Windows

a

Which of the following is an example of nonvolatile memory? A) optical disk B) main memory C) cache memory D) static random access memory (SRAM)

a

Which of the following is an example of vertical-market application software? A) inventory tracking software for an automobile manufacturer B) Tally software that is used to maintain business and personal accounts C) Adobe suite, used by graphic designers D) Microsoft PowerPoint, used to create presentations

a

Which of the following is true about the database development process? A) The database structure is easy to change during the data modeling stage. B) Changing a relationship from 1:N to N:M in an existing database is a complex and lengthy process. C) User review of the data model is avoided as it is not helpful in data modeling. D) Databases are easier to develop than spreadsheets.

a

Which of the following is true of in-memory DBMS products? A) They support or extend the relational model. B) They do not provide acid transaction support. C) They are a hotbed of development. D) MongoDB is an in-memory DBMS product.

a

Which of the following statements is true about native applications? A) They only run on the operating system for which they are programmed. B) The cost of native applications is low. C) They can be developed by less skilled, lesser-paid employees. D) The limits on native applications are usually technological, not budgetary.

a

________ is the process of converting a data model into tables, relationships, and data constraints. A) Database design B) Database querying C) Data mining D) Database aggregation

a

true

a 64- bit, dual processor is needed to effectively utilize more than 4GB of main memory.

true

a BYOD policy is a statement concerning employees' permission and responsibilities when they use their own device for organizational business.

false

a CPU stores results of computations on the hard drive.

Focused differentiation occurs when ________.

a better product is provided within an industry segment

true

a central processing unit is sometimes called "the brain" of the computer.

Byte

a character of data.

Which of the following defines a repository?

a collection of something, such as data or raw materials

Repository

a collection of something.

Repository

a collection of something; a database is a repository of data and a raw material repository is an inventory of raw materials.

Primary key

a column or a group of columns that identifies a unique row in a table.

Which of the following is an example of computer hardware?

a computer monitor

According to Porter's five forces model, in which of the following situations would the supplier have the highest bargaining power?

a dealer of a patented material for smartphone manufacturers

Which of the following is a low-tech information system?

a file of email addresses stored in an email program

Which of the following is an example of a low-tech information system? an inventory tracking system that that stores millions of records and produces reports every 24 hours a customer support system that keeps track of product issues a decision support system that analyzes multiple variables a file of email addresses stored in an email program

a file of email addresses stored in an email program

According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?

a firm that sells the only drug for a disease

According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes? a firm that sells the only drug for a disease a corner latte shop in Atlanta a used car dealership in New York a convenience store that sells retail products

a firm that sells the only drug for a disease

According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?

a firm that sells the only drug for disease

false

a megabyte, or MB, is equal to 1,024 bytes.

Which of the following refers to server virtualization?

a server computer that hosts one, or more, other server computers

true

a server is a computer that is designed to support processing from many remote computers and users.

Which of the following is an example of a mobile device?

a smartphone

A client-server application that requires nothing more than a browser is called ________.

a thin-client application

true

a thin-client application is designed to run within computer browsers, such as Firefox and Internet Explorer.

true

a user interface (UI) is the presentation format of an opplication

SQL injection

a way of inserting your own SQL code into someone else information system.

Which of the following is a critical characteristic of good information?

accuracy

The hardware components of an information system will act as a(n) ________.

actor on the computer side

true

although the operating system makes the computer usable, it does little application- specific work

Value

amount of money that a customer is willing to pay for a resource, product, or service.

Porter defined value as the ________.

amount of money that a customer is willing to pay for an offering

false

an operating system is a hardware device used to input data into a computer.

Competitive strategy

an organizations response to the structure of its industry.

false

android is a nonmotile client operating system.

Programs that perform business functions, such as general ledger and accounting, are examples of ________.

application software

Multi-user processing

applications involving multiple users processing the same database.

true

applications must be designed to scale up and down without appearing awkward or taking over the drive

Bits are used for computer data because they ________.

are easy to represent physically

Server application programs are programs that ________.

are processed on server computers

true

as predicted by Moore's law, CPU speeds continually increase.

A primary key in a database is a ________. A) group of rows that identifies a unique table or file B) column or group of columns that identifies a unique row in a table C) group of fields or columns that represent metadata D) group of tables or files formed to identify a unique field or row

b

A significant difference between using Access versus Mongo DB to store Falcon Security's video information is: A) with Mongo DB the video footage and the metadata are stored in separate databases, while in Access the video footage and the metadata are stored in the same database. B) with Mongo DB the video footage and the metadata are stored in the same database, while in Access the video footage and the metadata are stored in separate databases. C) there is no significant difference in using Access versus Mongo DB for storing Falcon's video information. D) Mongo DB cannot be used for querying because it is a NoSQL database.

b

A thin-client application is designed to run within a program such as ________. A) Adobe Photoshop B) Edge C) Microsoft Word D) Microsoft Excel

b

A(n) ________ is a program used to create, process, and administer a database. A) operating system B) database management system C) information system D) database system

b

Atlanta Technologies outsourced its information technology (IT) support department to a vendor in China. The vendor company, however, faced repeated instances of software failure and now needs to make some changes to the information systems. Who among the following has control over prioritizing issues related to such changes? A) the chief technology officer at Atlanta (CTO) B) the vendor C) a third party technician D) the chief information officer at Atlanta (CIO)

b

Bits are used for computer data because they ________. A) are represented exclusively as letters of the alphabet B) are easy to represent physically C) represent the orientation of a nonoptical media D) can have more than two values at a time

b

Carter is the Web designer for an open source project. He has created a program that facilitates the easy collation of data for a large-scale logistics firm. Which of the following is true of the source code for Carter's program? A) It is less stable and platform dependent. B) It is available to the public. C) It is highly protected and obtained only by having a license. D) It is available only to carefully vetted contractors.

b

Columns that are keys to different tables than the ones in which they reside are called ________. A) attributes B) foreign keys C) primary keys D) internal records

b

Constraints on the minimum number of entities in a relationship are called ________ cardinalities. A) specific B) minimum C) primary D) critical

b

DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. DenTimes is an example of ________. A) horizontal-market application software B) vertical-market application software C) firmware D) adware

b

Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department. A) human resources B) information systems C) marketing D) manufacturing

b

Each entity in a database has a unique attribute called a(n) ________. A) public key B) identifier C) foreign key D) index field

b

Heidi, an accountant, completed three mandatory training sessions in the last quarter. She needs to update her training record in the company's database. Which of the following elements will help Heidi modify her data? A) reports B) forms C) queries D) operations

b

Linela Insurance needs to hire twenty accountants immediately to support its accounts receivable process. The hiring and training of the accountants requires a significant investment of funds and time, which the company cannot afford. Linela decides to hire another accounting firm to manage its accounts receivable process and thereby save time and money. This process is known as ________. A) merging B) outsourcing C) headhunting D) diversifying

b

Machine code ________. A) is understandable by humans B) cannot be modified by humans C) is written by humans D) cannot be processed by computers

b

Marcus is a video editor who works for the film industry. His job involves editing large pictures, sounds, and video files. Given the nature of his job, Marcus will require a computer with a minimum speed of 3.5 Gigahertz and a(n) ________ processor. A) 32-bit B) dual C) quad D) 8-bit

b

The CPU stores the results of computations in ________. A) floppy disks B) main memory C) secondary memory D) network cards

b

The process of normalization constructs tables such that every table has a ________. A) one-to-one relationship between entities B) single theme C) foreign key D) specialized graphical query

b

The term ________ implies that either all transactions related to a traditional relational DBMS are processed or none of them are processed. A) consistent B) atomic C) durable D) isolated

b

Thin-client applications are typically limited by the capabilities of the ________. A) programming language B) browser C) hardware D) operating system

b

Thompson is the chief information officer at a processed food manufacturing company. The information systems used in the company are manufacturing oriented and provide little support to accounting. In this case, Thompson will most likely report to the ________ of the company. A) chief financial officer B) chief executive officer C) director of information services D) chief technology officer

b

Which of the following is a form of outsourcing hardware infrastructure? A) acquiring licensed products B) Infrastructure as a service (IaaS) cloud hosting C) Software as a Service (SaaS) D) business function

b

Which of the following is an example of storage hardware in computers? A) plotter B) magnetic disk C) projector D) inkjet printer

b

Which of the following is true of MySQL? A) It is a Microsoft product. B) It is license-free for most applications. C) It is a paid and proprietary database product. D) It uses Static Query Language (SQL) to manage a database.

b

Which of the following statements is true about a data administration staff function? A) The chief technology officer (CTO) heads the data administration staff function. B) The group establishes standards to protect information assets. C) This group includes system and network administrators exclusively. D) This group manages the process of creating new information systems.

b

Which of the following statements is true about firmware? A) The software is not coded like other software. B) Users do not need to load firmware into a device's memory. C) Firmware is the same as cache memory. D) Firmware cannot be changed or upgraded.

b

Which of the following statements is true about outsourcing? A) It increases budgetary instability due to the level of risk involved. B) It saves both direct and indirect management time. C) It invariably leads to diseconomies of scale. D) It guarantees a higher level of quality than that provided in-house.

b

Which of the following statements is true of the operations group in an organization's information system (IS) department? A) It establishes data standards and data management practices and policies. B) It monitors the user experience and responds to their problems. C) It manages all computing infrastructure except in-house server farms and communications media. D) It includes technical writers if the programs are developed in-house.

b

Which of the following statements refers to server virtualization? A) a personal computer, such as a desktop or portable computer, that hosts several different operating systems B) a server computer that hosts one or more other server computers C) a storage area that loses its contents when the power is off D) a server that hosts many versions of desktop operating systems

b

Which of the following terms refers to a collection of servers? A) server database B) server farm C) firmware D) shareware

b

________ is the process of converting a poorly-structured table into two or more well-structured tables. A) Optimization B) Normalization C) Refactoring D) Standardization

b

n an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. A) small oval B) vertical bar C) arrow D) triangular block

b

According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________.

bargaining power

Which among the following is the most appropriate technique for creating memorable, strong passwords?

base your password on the first letters of the words in a phrase

Focused differentiation occurs when _______.

better service is provided within an industry segment

Focused differentiation occurs when ________.

better service is provided within an industry segment

binary digits

bits

bytes

bits grouped into 8-bit chunks

true

both client and server computers need an operating system

Thin-client applications are typically limited by the capabilities of the ________.

browser

A __________ __________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.

business analyst

If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by ________.

business and systems analysts

In 2005, Marriott International chose Hewitt Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing.

business function

activity

business function that receives inputs and produces outputs. an activity can be performed by a human, by a computer system, or by both

A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.

business process

A(n) ________ is a network of activities that generate value by transforming inputs into outputs.

business process

A(n) ________ is a network of activities that generate worth by transforming inputs into outputs.

business process

A(n) ___________ is a network of activities that generate worth by transforming inputs into outputs.

business process

a ______ _______ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.

business process

The ________ created by Porter states that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.

business process design

Building competitive advantage through the streamlining of business processes to increase margin is known as ________.

business process management

_________ is a standard set of terms and graphical notations for documenting business processes.

business process modeling notation (BPMN)

switching costs

business strategy of locking in customers by making it difficult or expensive to change to another product or supplier

Drother Sports Inc. is a sports equipment provider that markets its products through a chain of retail outlets in three states. As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?

buying and installing new computers in the new outlets

Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. As part of its expansion strategy, the company decides to open outlets in four more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?

buying and installing new computers in the new outlets

Bits are grouped into 8-bit chunks called ________.

bytes

) A(n) ________ is a request for data from a database. A) form B) report C) query D) application

c

A ________ describes the data and relationships that will be stored in a database. A) data aggregator B) query model C) data model D) data application

c

A database is used instead of a spreadsheet when ________. A) lists of data involve a single theme B) structures of data lists are simple C) lists involve data with multiple themes D) users do not want to store all data in one place

c

A(n)________ is an example of storage hardware in computers. A) overhead projector B) keyboard C) magnetic disk D) barcode scanner

c

Acelane Inc., unlike its competitors, procures raw material from multiple suppliers. Each supplier in turn supplies raw material to many buyers, including Acelane. This is an example of a(n) ________ relationship. A) 1:N B) 1:1 C) N:M D) M:1

c

Android applications are developed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET

c

Bits are grouped into 8-bit chunks called ________. A) switches B) strings C) bytes D) kilobytes

c

Browser applications are thin-client applications that ________. A) use COBOL as the standard language for user-side processing B) are processed using VisualBasic and C++ C) need not be preinstalled on the users' computers D) depend on internal networks and not the Internet to transmit data

c

Browser-based applications ________. A) are thick-client applications B) can display only static content C) support graphical queries D) process queries using C++

c

Clark's microbiology report is due the next day. Being short on time, he collects most of the information for his report from an open-source Web browser. In this case, which of the following has Clark used to complete his report? A) Edge B) Ubuntu C) Firefox D) Apache

c

For Falcon Security, the primary purpose of creating a database of video information is to ________. A) keep track of a single theme B) eliminate concern about the lost update problem C) enable querying based on video characteristics D) avoid the use of spreadsheets

c

If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. A) programmers and development personnel B) PQA test engineers C) business and systems analysts D) technical writers

c

In 2005, Marrion International chose a human resources consulting agency to handle its human resource needs for the next 7 years. This is an example of ________ outsourcing. A) network B) software C) business function D) application

c

In ________ process, a server hosts many versions of desktop operating systems. A) PC virtualization B) server virtualization C) desktop virtualization D) application virtualization

c

In a data model, a(n) ________ is something that a user wants to track. A) record B) byte C) entity D) primary key

c

In a database, ________ are grouped into columns. A) fields B) records C) bytes D) files

c

In the information system (IS) department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems. A) operations B) technology C) development D) outsourcing relations

c

Linux applications are developed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET

c

Main memory is also known as ________. A) cache memory B) random access memory C) read-only memory D) optical memory

c

Metadata are ________. A) codes used for server-side processing B) error logs of databases C) data that describe data D) data that are encrypted

c

Outsourcing is done to ________. A) diversify the business portfolio B) increase costs for outsourcing vendors C) cap an organization's financial exposure D) enhance management's focus on nonessential functions

c

Rebecca is one of the few reliable programmers of her organization who is authorized to work on a closed source project. The project will be especially useful to track the progress of outsourced activities. Which of the following statements is most likely to be true of Rebecca's project? A) Only users and developers will be allowed to alter the source code of the project. B) Anyone could obtain the source code for the project. C) Only trusted programmers will be allowed to make changes to the project. D) Programmers could alter the source code based on their interests and goals.

c

Ryan, a database administrator, is in the process of designing his company's database. Which of the following would Ryan have had to create before he began designing? A) data aggregator B) query model C) data model D) data application

c

The ________ is the representative for information systems (IS) and information technology (IT) issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives. A) chief operating officer B) chief technology officer C) chief information officer D) chief executive officer

c

The forked lines on the lines representing relationship between two related entities are referred to as ________. A) identifiers B) foreign keys C) crow's feet D) entities

c

Virtualization is the process by which ________. A) a single server is used to host the operations of a workstation B) many computers are used to control a server C) one physical computer hosts many different virtual computers within it D) a single operating system is licensed for multiple computers

c

Which of the following devices is an example of a storage hardware device? A) barcode scanner B) central processing unit C) optical disk D) random access memory

c

Which of the following is a form of outsourcing? A) ANP Infotech buying off-the-shelf software from a vendor B) ANP Infotech customizing its information systems C) ANP Infotech acquiring licensed manufacturing software from a vendor D) ANP Infotech updating its data standards to protect its information assets

c

Which of the following is a function of the technology office in an organization's information systems (IS) department? A) managing computing infrastructure B) creating new information systems C) investigating new information systems D) maintaining existing information systems

c

Which of the following is a right of users of information systems? A) right to install programs and applications of their choice B) right to make hardware modifications when desired C) right to receive effective training D) right to obtain the configuration of their choice

c

Which of the following is a risk of outsourcing information systems (IS)/information technology (IT) functions? A) It is easier to end an agreement between a vendor and an organization that hired the vendor. B) It provides the hiring organization with too many choices. C) It involves the potential loss of intellectual capital. D) It invariably results in diseconomies of scale.

c

Which of the following is an example of a closed source project? A) Native Client B) Android C) Microsoft Office D) Ubuntu

c

Which of the following is an example of an open-source desktop operating system? A) Microsoft Windows B) Apache C) MySQL D) Ubuntu

c

Which of the following is an example of outsourcing an entire business function? A) acquiring licensed security software instead of developing it in-house B) making customizations to licensed software C) paying another organization to arrange for employee travel D) acquiring virtualization technologies

c

Which of the following is an international standard language for processing a database? A) Cassandra B) DB2 C) SQL D) MS Access

c

Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased? A) licensed software B) Infrastructure as a Service (IaaS) cloud hosting C) Software as a Service (SaaS) D) virtualization

c

Which of the following is true of traditional database application programs? A) Application forms, reports, and queries are displayed and processed using a browser application. B) The application logic is contained in a program on the client-side computer. C) They are written in object-oriented languages such as C++ and VisualBasic. D) They are thin-client applications that need not be preinstalled on the users' computers.

c

Which of the following mobile operating systems is licensed by Google? A) Blackberry OS B) Symbian C) Android D) Windows 10

c

Which of the following operating systems is used by Apple? A) Windows OS B) Symbian C) iOS D) Android

c

Which of the following statements is true about operating systems? A) The server operating system Linux is gradually being replaced by Unix. B) Android is a mobile operating system licensed by Apple. C) Nonmobile client operating systems are used on personal computers. D) iOS is the most popular server operating system.

c

Which of the following statements is true about self-driving cars? A) increased fuel consumption B) expensive and complex C) reduced car insurance cost D) cause fewer accidents

c

Which of the following statements is true about the maintenance group of information systems (IS)? A) It is undertaken by the business analysts. B) It is overseen by the chief technology officer. C) It involves adapting existing systems to support new features. D) It comprises developing test plans and designing automated test scripts.

c

Which of the following statements is true about users of information systems? A) They have a responsibility to protect their computers from viruses by installing their choice of antivirus software. B) They can avoid security and backup procedures. C) They should learn standard techniques and procedures for the applications they use. D) They should learn to install hardware and software on their own.

c

Which of the following statements is true of outsourcing? A) Management should have expertise on a subject before it can decide to outsource. B) An outsource vendor transfers the responsibility of risk management to the development group. C) To achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff. D) Outsourcing leads to increased financial risk.

c

Which of the following statements is true of the information systems (IS) department? A) If the IS primarily support accounting and finance activities, the chief financial officer (CFO) is appointed as the chief information officer (CIO). B) Programs used in all information systems are developed in-house by the maintenance group. C) The operations group monitors user experience and responds to user problems. D) Data administration is performed exclusively by the outsourcing relations group.

c

________ applications are programs that are written to use a particular operating system. A) Web B) Thin-client C) Native D) Browser

c

________ are the final judges as to what data the database should contain and how the records in that database should be related to one another. A) Administrators B) Developers C) Users D) Designers

c

________ is a version of Unix that was developed by an open source community. A) Symbian OS B) Android C) Linux D) Mac OS

c

________ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication. A) Vertical-market software B) Application software C) Firmware D) Spyware

c

Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. She should use a ________ to obtain the information that she wants from the database. A) report B) data model C) database administrative function D) query

d

Browser-based applications ________. A) need to be preinstalled on the users' computers B) run within a corporate network that is protected from the Internet C) eliminate the need to check for data consistency D) are more vulnerable to security threats than are traditional applications

d

Entities in a data model have ________ that describe the characteristics of the entity. A) characters B) primary keys C) codes D) attributes

d

Identify the first step in transforming a data model into a relational database design. A) representing the entity relationships B) normalizing the data and files C) creating foreign keys D) creating a table for each entity

d

Jamie's company manufactures 3D printers, and his job is to prepare user manuals for the products. Jamie also prepares training material for the workers who are involved in the manufacturing process. With reference to his job profile, Jamie is a ________. A) system analyst B) consultant C) programmer D) technical writer

d

Java, C#, and VB.NET are examples of ________. A) thin-client applications B) client operating systems C) structured queries D) object-oriented languages

d

KPL Inc. is an outsource vendor. It handles the recruiting process for Numero Uno Computers. KPL recently changed its business strategy to a more profit-oriented one. This modification would require the company to charge more for its services. This change will be a ________ risk for Numero Uno Computers. A) de facto sole source B) benefits outweighed by long-term costs C) no easy exit D) loss of control

d

Samuel is the database administrator for Zimline Constructions. He determines the processing rights of employees based on their designation. Team leaders are given greater access to the database than their team members. This procedure of giving selective access is part of Samuel's ________ task. A) development B) recovery C) adaptation D) operation

d

The columns in a database are called ________. A) records B) tables C) files D) fields

d

The modification or deletion of data in a database is an example of ________ operations of a database management system. A) statistical B) analytical C) administrative D) processing

d

The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies. A) technical writer B) chief financial officer C) system analyst D) chief technology officer

d

Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program. When Toby buys the program, he will actually be buying the software ________. A) copyright B) trademark C) patent D) license

d

Traditional database application programs are ________. A) browser-based and display dynamic content B) written in languages such as html5 and JavaScript C) entirely dependent on the database server for application logic D) thick applications that need to be installed on users' computers

d

Which of the following database administration tasks is related to adaptation? A) monitoring backup procedures B) conducting training for users C) monitoring database performance D) managing configuration changes in systems

d

Which of the following is a characteristic of volatile memory? A) processor heats up during the operation B) files are stored permanently C) processing of data is very slow D) contents are lost when power is off

d

Which of the following is a function of the steering committee for the information systems (IS) department? A) writing program code B) imparting training C) adapting software D) setting IS priorities

d

Which of the following is an example of a database management system? A) MS Excel B) BigData C) NoSQL D) Access

d

Which of the following is generally a responsibility of users of information systems (IS)? A) reporting trivial problems B) replacing legacy systems with improved ones C) installing unauthorized hardware and programs D) following security and backup procedures

d

Which of the following is true of N:M relationships? A) They are the same as N:N relationships. B) They represent minimum cardinalities in a relationship. C) They are also called one-to-many relationships. D) They can have more than one entity on each side of the relationship.

d

Which of the following is true of single-user databases? A) They are displayed and processed using html5, css3, and JavaScript. B) They use JavaScript for user-side processing. C) The Internet is used to access the DBMS server computer. D) The application, the DBMS, and the database all reside on the user's computer.

d

Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type? A) vertical bar B) arrow C) double line D) small oval

d

Which of the following operating systems was designed by Apple? A) Android B) Unix C) Linux D) Mac OS

d

Which of the following statements is true about information systems (IS) planning functions? A) The chief operating officer (COO) is the sole representative for IS and IT issues within the executive staff. B) The steering committee represents the IS department exclusively in high-level discussions. C) The information systems (IS) department's priorities are developed by the chief executive officer (CEO). D) The chief executive officer (CEO) and other executive staff decide the membership of the steering committee.

d

Unlike the primary activities, the support activities in the generic value chain do not contribute to the production, sale, and service of the product t/f

false

solid state storage (SSD)

faster than traditional magnetic storage

Which of the following statements is true about the steering committee of the information systems (IS) department? A) The steering committee is comprised of employees from the IS department in an organization. B) The steering committee's membership is determined by the IS department. C) The steering committee's schedule and agenda are typically set by the chief executive officer (CEO) and other members of the executive staff. D) The steering committee's meetings are conducted by the IS department.

d

________ in an E-R diagram refer to the least number of entities required in a relationship. A) Minimum candidate keys B) Primary keys C) Foreign keys D) Minimum cardinalities

d

A customer relationship management (CRM) system contains the names and phone numbers of customers. Such details stored in a CRM system are part of the ________ component.

data

A customer relationship management (CRM) system contains the names and phone numbers of customers. Such things stored in a CRM system are part of the ________ component.

data

The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.

data

The words that you type in an MS Word document is an example of ________.

data

You have a spreadsheet that provides the airfares to different cities from New York. If this is used to make a decision, it will be considered as ________.

data

Which of the following is the least critical aspect of good information?

data abundance

The purpose of a ________ group is to protect data and information assets by establishing data standards and data management practices and policies.

data administration

The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies.

data administration

Relational database

databases that carry their data in the form tables and that represent relationships using foreign keys.

data model

describes data and relationships that will be stored in the database.

true

desktop computers and Xboxes are not mobile devices

In ________ process, a server hosts many versions of desktop operating systems.

desktop virtualization

The main purpose of the planning phase in a project is to ________. set up the project scope and initial budget accomplish the project tasks effectively determine who will do what and by when establish team roles, responsibilities, and authorities determine completion

determine who will do what and by when

Competitive Strategy

determines the structure, features, and functions of every information system. (Porter's Four Competitive Strategies)

Identify a task that should be performed during the planning phase of project management. reporting project progress determining the schedule performing project tasks preparing archival documents form the team

determining the schedule

In the IS department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.

development

margin

difference between the value that an activity generated and the cost of the activity

Margin

difference between the value that an activity generates the cost of the activity.

A group of shoe manufacturing firms purchases raw materials collectively from a single supplier to obtain better deals. This is an example of obtaining competitive advantage by ________.

establishing alliances

Organizations can 'lock in' customers by making it difficult or expensive to switch to other products or services. This is called:

establishing high switching costs

Which of the following is true of information systems?

every information system has at least one application

how does an actual company use IS to create competitive advantages

ex: abc and shipping industry -had superior customer service -ease of customer business use by minimizing data ---------helps from making errors

Workgroup process

exists to enable workgroups to fulfill the charter, purpose and goals of particular group or department.

Edwin leads a team of fifteen programmers. He constantly changes the procedures that he uses to monitor, evaluate, and control the way his subordinates function. This shows his ability to ________.

experiment

A manager will essentially require ________ skills to test ideas clearly on a small scale, before taking bigger risks or committing significant resources to a larger project.

experimentation

________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.

experimentation

In the context of Porter's five forces model, the bargaining power of customers of medicinal drugs is enhanced when pharmaceutical companies patent their products. t/f

false

Providing the lowest cost across an industry can be referred to as focused cost-leadership t/f

false

The difference between the value that an activity generates and the cost of the activity is called revenue. t/f

false

The structure of the information systems (IS) department remains constant across organizations.

false

Thin-client applications can seldom run within a computer browser.

false

Five forces model

five competitive forces determine industry profitability.

You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is ________.

inaccurate

A retail company sells agricultural produce and consumer products. The company procures materials from farmers and local producers. This process is an example of ________.

inbound logistics

As the purchasing manager of a company that designs costumes, Natalie orders yards of fabric in preparation for Halloween. Natalie's duties can be classified under the ________ category of a business process.

inbound logistics

Cassandra runs a downtown boutique that sells customized clothes. One of her customers wishes to purchase a trench coat with a bejeweled clip. Cassandra contacts "Gems and Stones" and places an order for the clip. This activity can be classified under ________.

inbound logistics

Reduction in production cost results in ________.

increased profitability

Reduction in production cost results in __________.

increased profitability

Bargaining power of customers is likely to be the highest for markets involving ________.

industrial products

Porter's five forces model is used to assess ________.

industry structure

An automobile company decides to improve the quality of its products and bring more variety into its entire product line. The company has decided to adopt ________.

industry-wide differentiation

Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.

information systems

Globus Corp. uses a software tool to manage its supply chain. This software tool is an ________ of the company's information system.

instruction on the computer side

Your company uses a software tool to manage its supply chain. This software tool is a(n) ________ of your company's information system.

instruction on the computer side

linkages

interactions across value activities

Linkages

interactions across value activities.

linkages

interactions across value activities.

(SQL) Structured Query Language

international standard language for processing a database.

Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.

introduced product differentiation

Which of the following is an example of vertical-market application software?

inventory tracking software for an automobile manufacturer

The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________.

irrelevant

You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________.

irrelevant

Information is considered inefficient if ________.

it is irrelevant to the subject

Information is considered to be bad if ________.

it is irrelevant to the subject

________ is equivalent to 1,024 bytes.

kilobyte

Which of the following is a common description of information?

knowledge derived from data

Which of the following is a common description of information? unbiased, unrelated data list of recorded facts or figures knowledge derived from data collection of unprocessed data

knowledge derived from data

Information

knowledge derived from data, whereas data is defined as recorded facts or figures.

To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n) ________ is used.

layered protocol

Users should not bother IS personnel for trivial issues, so they have a responsibility to ________.

learn basic computer skills

Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program. When Toby buys the program, he will actually be buying the software ________.

license

When an individual buys a program for his or her personal computer, he or she is actually buying a software ________.

license

When an individual buys a program for his/her personal computer, he/she is actually buying a software ________.

license

true

native applications are sometimes called tick-client applications.

Madison, the project manager of a sports apparel company, estimates that the demand for jogging shoes is likely to decline in the coming months. He advises the procurement department to order raw material accordingly to ensure minimum wastage. This intercommunication that facilitates smooth operations is called ________.

linkages

Which of the following paved the way for the creation of a business process design?

linkages

false

linux applications are constructed using objective-C

false

linux is an open source variant of Mac OS.

Which of the following principles of competitive advantage is related to process implementations?

lock in buyers

Jason's Burgers, a famous diner, recently started taking orders online to reduce the customer wait time. This arrangement was perfect for busy office workers who frequented the place, and the sales went up considerably. Jason's Burgers attempted to ________.

lock in customers

process implementations

lock in customers/buyers lock in suppliers raise barriers to market entry establish alliances reduce costs

FunText is a company that owns an app used for text messaging. It recently offered a six month membership extension, to its existing customers, without any additional charges. Which competitive strategy is FunText trying to implement in this scenario?

locking in customers

The International Zoological club publishes a monthly magazine for zoology enthusiasts. Members are required to pay an initial fee to cover the first two years of the subscription when registering with the club. In this scenario, the International Zoological club is ________.

locking in customers

Which of the following principles of competitive advantage is related to process implementations? enhancing services locking in suppliers creating new products differentiating products

locking in suppliers

A new drug that has shown promise in curing skin cancer has been discovered by a famous chemical laboratory. This is the only known drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________.

low threat of substitutions

A new drug that has shown promise in curing skin cancer has been discovered by a famous chemical laboratory. This is the only known drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by __________.

low threat of substitutions

true

magnetic and optical disks are nonvolatile.

A(n)________ is an example of storage hardware in computers.

magnetic disk

Which of the following is an example of storage hardware in computers?

magnetic disk

Random Access Memory (RAM)

main memory

The CPU stores results of computations in the ________.

main memory

The CPU stores the results of computations in _____.

main memory

CPU works in conjunction with

main memory (RAM)

Abstract reasoning is the ability to ________.

make and manipulate models

Organizations can lock in suppliers either by making it difficult to switch to another organization or by___________.

making it east to work with the organization

experimentation

making reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ores, consistent with the resources you have.

(MIS)Management Information Systems

management and use of information systems that help organizations achieve their strategies.

Arie is a team lead for a group of engineers working on a new product. Arie decides to assign four additional engineers to the project to optimize corporate resources. His decisions, in this scenario, are ________ in nature. operational functional managerial strategic active

managerial

N:M

many-to-many relationships

The difference between the value that an activity generates and the cost of the activity is called the ________.

margin

Process effectivness

measure of how well a process archived organizational strategy.

Process efficency

measure of the ratio of process outputs to inputs.

Compared to in-house hosting, cloud-based hosting ________.

minimizes the risk of investing in technology than will soon become obsolete

true

mobile applications can share their device with other mobile applications.

A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access.

mobile device

false

mobile devices cannot be connected through cloud

false

mobile devices lack wireless connectivity features

false

mobile system users can move geographically, but they are restricted to using a single device.

true

mobile systems offer the potential of just-in-time data, which is data delivered to the user at the precise time it is needed.

A(n) ________ converts an analog signal to a digital one during data transmission.

modem

The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the details of each invoice drawn up in the previous quarter. This information is not good because it is ________.

more than what is required

Lynn, the manager of a transportation company, goes through the product delivery schedule. She assigns territories to each executive of the delivery team, and also contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?

outbound logistics

Lynn, the manager of a transportation company, goes through the week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?

outbound logistics

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?

outbound logistics

________ is the process of hiring another organization to perform a service.

outsourcing

Which is an example of outsourcing an entire business function?

paying another organization to arrange for employee travel

The five-component framework considers individuals who maintain the data and who support the networks of computers as ________ components.

people

Which of the following is a component of an information system but not of information technology?

people

Which of the following components constitute the human side of information systems?

people and procedures

Which of the following pairs of components constitutes the human side of information systems? hardware and people people and procedures software and procedures software and people

people and procedures

Information Age

period in history where production distribution, and control of information is the primary driver of the economy

In the context of systems implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced.

plunge

Crispies is a breakfast cereal manufacturing company. It is shifting its manufacturing process from batch processing to assembly line production. The information system for the assembly line is ready to be installed. Crispies decides to completely shut down the batch processing system and install the new assembly line. This style of conversion is known as _____________.

plunge installation

Which of the following ratios has fallen as a result of Moore's Law? profit/loss debt/equity demand/supply price/performance

price/performance

Which of the following ratios has fallen as a result of Moore's law?

price/performance

According to the five-component model of information systems, the ________ component functions as instructions for the people who use information systems.

procedure

You follow certain steps to access the supplementary readings for a course when using your organization's library management system. These steps that you follow are examples of the ________ component of an information system.

procedure

It is generally more difficult to make changes to the ________ of an information system than to the databases itself.

procedures

Which of the following is not an example of primary activities in the value chain?

procurement

Hueblue Software, an application provider to the gaming industry, decided to enhance its portfolio by developing motion-control-enabled games for the mobile gaming industry. In this scenario, which competitive strategy is Hueblue Software implementing?

product differentiation

Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing?

product differentiation

I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." A competitor made significant in-roads into the market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 Ice Cream implementing?

product differentiation

(IT) Information technology

products, method, inventions, and standards used for the purpose of producing information.

true

program instructions for programs, such as Microsoft Excel, are stored in the main memory of a computer.

(DBMS) Database management system

program used to create, process, and administer a database.

false

programmers cannot alter or add to an open source code.

five forces model

proposed by Michael porter that assesses industry characteristics and profitability by means of 5 competitive forces

Version management systems ________. lack the features needed to track changes to shared documents provide features and functions to accommodate concurrent work prevent more than one user from checking out the same document simultaneously provide version control to limit and direct user activity prevent group access to entire directories

provide features and functions to accommodate concurrent work

false

quad-processor computers have two CPUs.

Launch Cars, a car manufacturing company, has patented its breakthrough technology that reduces pollutant emission by half. The company is now an active supporter of anti-pollution laws that are likely to diminish the profitability of many other auto makers. Launch Cars is attempting to ________.

raise barriers to market entry

Which of the following principles of competitive advantage is related to process implementations?

raise the barriers to market entry

Cooper, the owner of a small bicycle manufacturing company, is striving to keep his organization running smoothly while remaining profitable in a highly competitive market. Cooper chooses process implementation to give his company a competitive edge over others. Which of the following principles is he most likely to implement?

reducing costs

PL Inc. implements an information system to improve its supply chain. The system helps the organization to reduce wastes and optimally utilize its resources. In this scenario, implementing the information system has helped PL Inc. to gain a competitive advantage by ________.

reducing its costs

Good information must be ________.

relevant

Neil creates an application which facilitates the easy storage and access of employee information like name, age, experience, and qualification for his organization. The application is an example of a(n) ________.

repository

A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.

router

Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?

sales and marketing

In a manufacturing business, which of the following transforms finished goods into cash?

sales process

According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market?

search engine designers

Database

self-describing collection of integrated records.

Which of the following terms refers to a collection of servers?

server farm

Which of the following is a function of the steering committee for an IS department?

setting IS priorities

crows-foot diagram

shows maximum number of entities that can be involved in a relationship.

Which of the following is the distinguishing feature of a LAN as compared to a WAN?

single location

Adobe Acrobat is an application that allows users to create and edit digital documents. Adobe Acrobat is an example of a ________.

software

An operating system like Windows or Linux is an example of the ________ component of an information system.

software

Which of the following is an outsourcing alternative, in which hardware and both operating system and application software are leased?

software as a service (SaaS)

Entity

something that the users want to track.

true

source code is computer code as written by humans and understood by humans

Enterprise process

span on organization and support activities in multiple departments.

Inter-enterprise systems

span two or more independent organizations

CPUs vary in

speed, function, and cost.

Metcalfe's Law

states that the value of a network is equal to the square of the number of users connected to it.

A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives.

steering committee

Kryder's Law

storage density on magnetic disks is increasing at an exponential rate.

An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process. structured unstructured managerial strategic predictive

structured

RAC Associates is a car rental company that rents cars to tourists in the United States. The company uses tracking devices and magnetic locks to prevent car theft. These procedures are examples of ________.

supporting business processes

A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.

switch

Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.

switching costs

A large software manufacturer attempts to lock in customers by making it difficult for them to substitute their software with one from another company. The strategy used by the company is referred to as ________.

switching costs strategy

true

symbian operating system is used for Nokia, Samsung, and other mobil devices.

business process management

systematic process of modeling, creating, implementing, and assessing business processes

A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.

systems analyst

________ _________ are information system professionals who understand both business and information technology

systems analysts

___________ are information system professionals who understand both business and information technology

systems analysts

___________ play a key role in moving development projects through the SDLC or scrum development process.

systems analysts

A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.

systems thinking

list the 5 main functions of the information systems (IS) department.

~Plan the use of IS to accomplish organizational goals and strategy. ~Develop, operate, and maintain the organization's computing infrastructure. ~Develop, operate, and maintain applications. ~Protect information assets. ~Manage outsourcing relationships.


Conjuntos de estudio relacionados

Darwin's Theory Bio 2 answer keys

View Set

The Modernist Period (1910-1945)

View Set

Philosophy Chapter 4: Myself or Others?

View Set