Multipel Choice Test (April 2017, June 2016, March 2016)
d
.Which of the following is not an example of an agency cost category? A. Monitoring costs. B. Bondings costs. C. Residual loss. D. Information processing costs.
b
Gamification can change stakeholder behavior because it taps into motivational drivers of human behavior in two connected ways: _____ and emotions. A. mechanics B. reinforcements C. rational thinking D. affection
c
Gamification is defined as... A. the application of insights from game theory in organizational settings. B. the use of actual games and simulations for business purposes. C. the application of lessons from the gaming domain to change behaviours in non-game situations. D. the use of online, points-based customers loyalty programs.
b
Google employees in Silicon Valley can visit the onsite hair salon or laundry center, get a massage, and bring their dog to work. Google's policy is an example of the __ strategy. A. compensation B. integration C. negotiation D. protection
c
___ is one of the growing sectors of cloud computing and helps developers to increase the speed of app development. A. grid computing B. Hadoop/MapReduce C. platform-as-a-service D. virtualization
d
___ is the technology that hides the physical characteristics of a computing platform from the users. A. A web service B. Multitenancy C. Platform as a service D. Virtualization
d
_____ is deemed impractical for the development of large, complex systems. A. Outsourcing B. The systems development lifecycle C. Parallel conversion D. Prototyping
c
important managerial implication from the Mata et al. study is that ... A. technical IT skills are competitively unimportant. B. the search for IT-based sources of sustained competitive advantage must primarily focus on unique, proprietary IT. C. IT managers should seek to develop close working relationships with managers in other business functions. D. all of the above are valid managerial implications from the Mata et al. study.
b
'A critical review of cloud computing: researching desires and realities', Venters & Whitley One of the critical concepts in cloud computing is ___. This means ensuring that the end user perceives no additional performance lags when they are interacting with a cloud based service. A. availability B. latency C. scalability D. abstraction
d
'A critical review of cloud computing: researching desires and realities', Venters & Whitley The service dimension includes: A. the desire to receive a service that helps users be more efficient economically. B. the desire to receive a service which aids innovation and creativity. C. the desire to receive a service which is simple to understand and use. D. all of the above.
b
'A critical review of cloud computing: researching desires and realities', Venters & Whitley The service dimension includes: A. the desire to receive a service which is scalable to meet demand B. the desire to receive a service which is simple to understand and use. C. the desire to receive a technical service which is at least equivalent (in terms of security, latency and availability) to that experienced when using a locally running traditional IT system. D. all of the above.
c
'Is it all a game? Understanding the principles of gamification', Robson et al. In gamification, ___ are defined as outside individuals who are passively involved and absorbed in the experience. A. designers B. players C. observers D. spectators
a
'The past, present, and future of IS success', Petter et al. During the ___ era, practitioners considered an information system to be successful if it met specific technical needs such as speed and accuracy. A. data processing B. enterprise system and networking C. management reporting & decision support D. strategic and personal computing
a
'When gadgets turn into enterprise IT tools', Harris et al A disadvantage of the 'broadening the scope' strategy is that... A. the list of approved apps and devices can quickly become obsolete. B. it is only effective in organizations with a technically literate workforce. C. it can only be applied in heavily regulated industries. D. younger workers and newly hired employees may not accept it.
c
'When gadgets turn into enterprise IT tools', Harris et al. A disadvantage of the 'authoritarian' strategy is... A. the high cost associated with it. B. the difficulty to achieve and monitor security. C. the potential resistance from employees. D. the lack of technology standardization.
b
'Why software projects escalate: an empirical analysis and test of four theoretical models', Keil et al. One of the questionnaire items used is 'the primary decision maker exhibited the attitude 'we are so close to the end of the project, we should keep going'. Which theory does this survey item pertain to? A. agency theory. B. approach avoidance theory. C. prospect theory. D. self-justification theory.
c
'Why software projects escalate: an empirical analysis and test of four theoretical models', Keil et al. The need to self-justify is both ___ and ___ in nature. A. psychological; economic. B. economic; irrational. C. psychological; social. D. economic; social.
a
. Prospect theory... A. can explain the so-called sunk cost effect. B. argues that escalation behavior arises from a kind of 'retrospective rationality'. C. suggests that individuals exhibit risk averse behavior when choosing between two negative alternatives. D. conceptualizes escalation as a behavior that results when driving forces that encourage persistence seem to outweigh restraining forces that encourage abandonment.
c
. Which of the following statements about the effects of IT on organizations and markets is correct? A. The net effect of IT on firm size is unambiguous. B. IT provides the ability to reduce decision information costs, inducing the decentralization of decision rights. C. The availability of cost-effective monitoring IT-devices is of crucial importance in reducing agency costs, thus leading to decentralization of decision rights. D. IT provides the ability to reduce internal coordination costs, leading to vertically smaller firms.
d
.A key characteristic of the systems development lifecycle methodology (SDLC) approach is: A. an assessment method based on the look-and-feel of the new system. B. the recognition that it is simply impossible to define all requirements for a new system in detail at the beginning of the process. C. a relatively small involvement of systems analysts, as compared to other development methods. D. the use of extensive formal reviews at the end of each major step.
c
.A(n) _____ enables a company to tailor a particular aspect of the enterprise system to the way it chooses to do business. A. mashup B. complement C. configuration table D. interface
b
.According to Sarker et al., an integration strategy is most relevant for: A. people holding a compartmentalized perspective on the work-life relationship. B. people holding an encompassing perspective on the work-life relationship. C. people holding an overlapping perspective on the work-life relationship. D. people holding either a compartmentalized or an encompassing perspective on the work-life relationship.
c
.The evaluation of information systems success based on cost reduction is typical for: A. the data processing era. B. the enterprise system and networking era. C. the management reporting & decision support era. D. the strategic and personal computing era.
d
.The first step in the systems development lifecycle methodology (SDLC) approach is: A. requirements definition. B. system design. C. system building. D. feasibility analysis.
b
.Which of the following statements about Nicolaou's paper is false? A. Nicolaou compares the performance of ERP adopters with the performance of non-adopters in the same industry. B. Nicolaou measures the performance effect of ERP implementation by studying how the stock price of adopting firms changes after the announcement of the adoption decision. C. It takes at least two years before financial performance gains from ERP adoption become apparent. D. Nicolaou employs traditional accounting variables to capture the impact of ERP adoption.
d
.Which theory has been used in the management information systems course to analyze the effect of IT investments on firm size? A. Agency theory. B. Institutional theory. C. The resource-based view of the firm. D. Transaction cost theory.
c
18. _____ makes minimum alterations to the ERP system and, by itself, is rarely sufficient in an ERP implementation. A. Table configuration B. Code customization C. Module selection D. Process customization
a
27.A(n) _____ strategy isolates employees from colleagues/managers who see integration of work and life as an imperative for accomplishing work efficiently and effectively. A. protection B. compensation C. integration D. negotiation
c
A crucial difference between enterprise and network IT is that... A. network IT supports data integration. B. enterprise IT can be used on a voluntary basis. C. enterprise IT mandates data formats. D. network IT imposes complements throughout the organization.
b
A crucial difference between function and enterprise IT is that... A. function IT defines tasks and sequences. B. function IT can be adopted without complements. C. the use of function IT is optional. D. function IT mandates data formats
d
A dependent data mart a. is used for ad hoc analysis of operational data b. is created with data drawn from multiple source systems c. may plant the seeds for problems later when the organization tries to create a more comprehensive data warehouse d. typically provides faster response times to queries than data warehouse solutions
c
A difference between the enterprise data warehouse approach and the data mart strategy is that the latter... A. cannot incorporate external data. B. does not preclude the creation of data marts. C. has lower financial risk. D. has a lower risk of resulting in the creation of multiple data mart 'silos
d
A ripple effect will typically be observed during: A. requirements definition. B. system design. C. system testing. D. maintenance.
d
A technological resource that is valuable, heterogeneously distributed across firms and imperfectly mobile, can be a source of... A. competitive disadvantage. B. competitive parity. C. temporary competitive advantage. D. sustained competitive advantage.
b
A technological resource that is valuable, homogeneously distributed across firms and imperfectly mobile, is a source of... A. sustained competitive advantage. B. competitive parity. C. temporary competitive advantage. D. competitive disadvantage.
b
A(n) ___ strategy is one that enables employees to seamlessly move between work and personal life domains at all times. A. compensation B. integration C. negotiation D. protection
b
According to Burton Swanson, ... A. it's a good sign if there is only one provider of a new technology, because this suggests that this vendor is likely going to dominate the market and be financially healthy. B. it's not a good sign if an IT innovation is known under more than one name. C. organization should aim to adopt and implement IT innovations that have not been adopted by others, because this may generate first mover advantages. D. all of the above statements are correct.
c
According to Burton Swanson, ... A. in the long run, adoptions of IT innovations have to equate implementations. B. innovation diffusion can be depicted using a simple contagion model called the innovation wave machine. C. the IT innovation wave machine has limited capacity in terms of the attention of its institutional participants. D. jumping on an innovation's bandwagon is an example of mindful innovation.
d
According to Burton Swanson, ... A. it's a good sign if an IT innovation is known under one name. B. it's a good sign if there is more than one provider of a new technology. C. organizations should be wary of new technologies that don't have clear, verifiable success stories attached. D. all of the above statements are correct.
b
According to Carr, ... A. the penalties for wasteful IT spending will become smaller over time. B. proprietary systems face the risk of becoming obsolete. C. the sluggishness in IT demand is a cyclical rather than a structural phenomenon. D. technology vendors will no longer be able to do well, because companies have already bought all the IT infrastructure they want to own.
d
According to Carr, ... A. IT's power is outstripping most of the business needs it fulfills. B. the opportunities for gaining strategic advantage from information technology are rapidly disappearing. C. penalties for wasteful IT spending will become larger over time. D. All of the above statements are correct.
c
According to Chen & Kamal, ICT adoption is more likely to result in increased outsourcing... A. if the MNE employs enterprise IT. B. in the manufacturing sector (as compared to non-manufacturing sectors). C. if the electronic codifiability of the production process of the MNE is high. D. if the MNE is an early adopter of ICT.
c
According to Chen & Kamal, the relation between ICT use and firms' foreign boundary decisions gets moderated by... A. the timing of the adoption decision (early/late) B. environmental uncertainty C. ICT complexity D. CEO compensation
d
According to Davenport, ... A. Firms that derive their competitive advantage mainly from the distinctiveness of their business processes, may put their source of competitive advantage at stake when implementing an enterprise system. B. The complexity of ERP systems makes major modifications impracticable. C. ERP systems may be used to both centralize or decentralize decision-making rights. D. All of the above statements are correct.
a
According to Davenport, the ERP system and the business strategy may clash... A. for companies that compete on the distinctiveness of their business processes. B. if companies decide to rewrite large portions of the software code to ensure a tight fit. C. for companies that follow a low cost strategy. D. for companies that compete on the distinctiveness of their products.
c
According to Firth & Burton Swanson, A. IT R&A service usefulness is evaluated similarly by proactive, reactive, and situational users. B. Situational users find the IT R&A services they receive more useful than proactive and reactive users. C. The value of IT R&A services mostly lies in the early comprehension phase of the IT innovation lifecycle. D. All of the above are correct.
a
According to Frey & Osborne... A. computerisation is now spreading to domains commonly defined as nonroutine tasks. B. even occupations that involve social intelligence tasks are likely to be substituted by computer capital over the next decade. C. robots are able to match the depth and breadth of human perception. D. all of the above statements are correct.
c
According to Iansiti & Lakhani, blockchain is a(n) _____ technology. A. unsecure B. disruptive C. foundational D. proprietary
b
According to Keil et al., ... A. around 80% of all IT projects involve some degree of project escalation. B. the outcomes associated with escalated projects are significantly worse than those of projects that do not escalate. C. runaway projects are rare when implementing off-the-shelf software. D. all of the above statements are correct.
c
According to Luo & Strong, ... A. novice and technician organizations differ in their process change capabilities. B. novice organizations should not attempt table customization. C. technician organizations should not use radical process change. D. only expert organizations are capable of code customization.
c
According to Luo & Strong, ... A. technician organizations have the largest range of customization options at their disposal. B. technician organizations should not attempt code customization. C. technician organizations should not use radical process change. D. only expert organizations are capable of table customization.
a
According to Marston et al., cloud computing standards are needed to... A. address the risk of vendor holdup. B. alleviate client concerns about multitenancy. C. lower the cost of entry. D. address the risk of cloud computing vendors going bankrupt.
c
According to Mata et al (Information technology and sustained competitive advantage)., access to IT capital a. is unlikely to be a source of competitive adv., because the risk associated with IT investments is heterogeneously distributed across firms b. is unlikely to be a source of competitive adv., because IT investments are not as risky as other corporate investments c. is unlikely to be a source of competitive adv., because technology followers can have access to lower cost of capital than technology first-movers d. all of the above are correct
a
According to Mata et al, technical IT skills are unlikely to be a source of sustainable competitive advantage, because... A. they can be easily contracted. B. they soon become obsolete, and hence lose their value. C. they are usually tacit. D. of all of the above reasons
d
According to Mata et al., ... A. technical IT skills are usually codifiable. B. the know-how needed to build (program) IT applications is unlikely to be a source of sustainable competitive advantage. C. the development of managerial IT skills is a socially complex process. D. all of the above statements are correct.
b
According to McAfee & Brynjolfsson, one of the driving forces behind this increased competitiveness is a. the fact that products and services are becoming digital b. the use of enterprise IT to propagate a company's unique business process c. increased centralization of decision rights d. top-down propagation of web 2.0 technologies
d
According to Nonaka, ... A. socialization and articulation are the critical steps in the spiral of knowledge. B. articulation is a rather limited form of knowledge creation. C. the view of the organization as a machine for information processing is deeply ingrained in the traditions of Japanese management. D. the combination process does not really extend the company's existing knowledge base.
b
According to Nonaka,... A. a fundamental principle of organizational design at European companies is redundancy. B. European organizations assume that knowledge needs to be systematic and formal in order to be useful. C. articulation is a rather limited form of knowledge creation because the generated knowledge cannot easily be leveraged by the organization. D. all of the above statements are correct.
a
According to Robson et al, a pitfall in gamification is ... A. to focus only on the connection between the designer and the players. B. to focus on only one goal, rather than a more holistic set of gamification goals. C. to modify the game over time. D. all of the above.
b
According to Wang, engagement with an IT fashion can take on two forms: _____ or _____. A. legitimate; illegitimate. B. material; informational C. material; legitimate D. legitimate; informational
c
According to approach avoidance theory, escatlation behavior is triggered by... a. goal incongruence between different management levels within a firm's hierarchy b. the manager's need to demonstrate competence and rationality c. the completion effect d. social pressure
c
According to prospect theory, escalation behavior is triggered by a. social pressures b. the management's need to demonstrate competence and rationality c. a cognitive bias in human decision making d. the proximity to the goal
a
According to the results of Nicolaou's study, ... A. firm profitability will be negatively affected by ERP adoption in the year of and in the year following system completion. B. stock markets react more positively to firms announcing an investment in the software of a major vendor (e.g. SAP or Oracle) versus software of a small vendor. C. firms that justified system implementation using business-led objectives performed better than firms that used system-led objectives. D. all of the above statements are correct.
c
Adobe Buzzword allows users to access a word processing program via their web browser. Just like Google Docs, it allows users to collaborate on online text documents. Buzzword is available for free and because it operates inside a web browser, there's no software installation required. Adobe Buzzword is an example of: A. enterprise IT. B. a general purpose technology. C. software-as-a-service. D. text mining software.
b
An IT fashion (Wang) can be defined as a _____ collective belief that an information technology is new, efficient and at the forefront of practice. A. legitimate B. transitory C. unjustified D. lasting
b
An important disadvantage of the _____ method is that it may take too long to go from the original idea to a working system. A. joint application design B. systems development lifecycle C. parallel conversion D. prototyping
d
At the heart of an enterprise resource planning (ERP) system is... A. a large number of customization tables. B. a series of modular applications supporting diverse company functions. C. a data warehouse. D. a central database.
c
Brynjolfsson & McAfee argue that it is unlikely that humans will go the way of horses, because: A. human wants and desires are infinite. B. service jobs can not be automated. C. humans can choose to redistribute capital in order to replace lost income. D. all of the above reasons.
a
Business travel can pose headaches for employees and finance departments alike. Concur software streamlines the process by automating travel and expense management. Its web-based solutions enable employees to book travel plans according to their own preferences, while also making sure all bookings fall within company spending limits. Concur is an example of: A. function IT. B. on-premise computing. C. infrastructure-as-a-service. D. All of the above.
b
Chasing the hottest IT (Wang) Scholars from the _____ perspective focus on the extent to which an organization realizes its objectives, often measured in financial or economic terms. A. management fashion B. economic-rationalistic C. institutional D. organizational legitimacy
c
Chen & Kamal build their hypotheses on... A. diffusion of innovations theory. B. agency theory. C. transaction cost theory. D. prospect theory
d
Consultancy firms that follow a codification strategy to knowledge management... A. focus on maintaining high profit margins. B. are likely to emphasise the internalization process of knowledge creation over the combination process. C. train people through one-on-one mentoring. D. invest heavily in information technology.
b
Customer churn analysis is an example of ... A. prescriptive analytics. B. predictive analytics. C. big data. D. data mart appliances.
b
Data warehousing encompasses data extraction, transformation and loading (ETL). Which of the following statements about the ETL process is false? A. The ETL process will become more complicated if the number of source systems becomes larger. B. Data cleansing is done during the extraction phase of the ETL process. C. Companies that require up-to-date data for decision making purposes, are more likely to use trickle loading than bulk loading of data. D. Instead of developing their own ETL software, companies may also buy commercial ETL software.
d
Davenport argues that the main reason why so many ERP implementations fail is... A. the enormous technical challenge of rolling out enterprise systems. B. the tendency of top managers to implement ERP systems in a top-down fashion. C. the fact that ERP systems mandate data formats that may not be suitable for the adopting organization. D. the failure to reconcile the technological imperatives of the ERP system with the business needs of the enterprise.
c
During the ___ era, practitioners considered an information system successful if it resulted in only minimal changes in the organization's structure, goals and culture. A. customer-focused era B. enterprise system and networking era C. management reporting & decision support era D. strategic and personal computing era
b
Employee blogs are an example of ... A. IT consumerization. B. network IT. C. platform-as-a-service. D. software-as-a-service.
c
Firth & Burton Swanson classify users and non-users of IT R&A services in several categories. The interviews with users of IT R&A services show that ... A. IT R&A services are deemed most useful during the implementation phase of new IT innovations. B. The most popular (i.e. most often used) service of IT R&A firms is the direct interaction with analysts via telephone. C. Proactive users consider IT R&A services to be more useful than reactive and situational users. D. All of the above statements are correct.
a
Gurbaxani & Whang argue that decision rights in an organizational hierarchy should be located where the sum of decision information costs and ___ is minimized. A. agency costs B. internal coordination costs C. internal coordination and operations costs D. information processing costs
b
Gurbaxani & Whang argue that decision rights in an organizational hierarchy should be located where the sum of decision information costs and ___ is minimized. A. internal coordination costs B. agency costs C. bonding costs D. monitoring costs
b
Gurbaxani & Whang argue that decision rights in an organizational hierarchy should be located where the sum of agency costs and ___ is minimized. A. bonding costs B. decision information costs C. information processing costs D. internal coordination costs
c
Gurbaxani & Whang argue that decision rights in an organizational hierarchy should be located where the sum of agency costs and ________ is minimized a. monitoring costs b. information processing costs c. decision information cost d. internal coordination costs
c
Horizontal chunkification can be used to mitigate the risks of ... A. poaching and shirking. B. opportunistic renegotiation and poaching. C. opportunistic renegotiation and shirking. D. opportunistic renegotiation, poaching and shirking.
b
IT departments are often concerned about the security risks that accompany IT consumerization. One of the tools/methods that can be used to address these security concerns is: A. the use of 4G rather than 3G mobile technology. B. remote locking. C. the use of Platform-as-a-Service. D. the provision of a gadget budget.
b
IT departments are often concerned about the security risks that accompany IT consumerization. One of the tools/methods that can be used to address these security concerns is: A. employee segmentation. B. remote wiping. C. the provision of a gadget budget. D. the use of 4G rather than 3G mobile technology.
a
IT projects may be subject to the mum effect. This effect... A. occurs if individuals conceal negative information about the IT project from their superiors. B. occurs mainly in those organizations where association with an unsuccessful project does not automatically have adverse effects on chances for advancements in the organization. C. can help to de-escalate projects that are spinning out of control. D. is associated with the premature cancellation of projects that would eventually have yielded benefits for the organization (type 1 error).
d
Iansiti & Lakhani argue that Bitcoin payments can be characterised as: A. High novelty; high complexity. B. Low novelty; high complexity. C. High novelty; low complexity. D. Low novelty; low complexity.
b
Iansiti & Lakhani draw an analogy between the development of blockchain technology and the development of _____ A. client-server technology. B. the TCP/IP protocol. C. enterprise resource planning software. D. electricity.
a
In "Methodologies of purchased software packages", Brow et al. discuss the systems development lifecycle methodology. The generic SDLC methodology consists of 3 phases and 8 steps. The second step in the SDLC is a. requirements definition b. installation c. feasibility analysis d. construction
a
In Nonaka's model, a traditional apprenticeship in which an apprentice learns the skills of a master through observation and practice is called... A. socialization B. articulation C. combination D. internalization
d
In a data warehouse, it is important that all users are working with the same data. This is why data warehouses are a. subject oriented b. integrated c. time variant d. nonvolatile
b
In cloud computing, _____ makes it possible that a single instance of an application software serves multiple clients. A. scalability B. multitenancy C. infrastructure-as-a-service D. platform-as-a-service
d
In comparison with the enterprise data warehouse approach, the data mart strategy... A. can not use the ERP system as a source system. B. has a lower risk of resulting in the creation of multiple data mart 'silos'. C. has higher financial risk. D. is a 'start small, think big' approach.
a
In contract software development, vendors may reduce efforts allocated to testing while claiming testing was performed completely. This is an example of the risk of... A. shirking B. atrophy C. information asymmetry D. poaching
a
In contrast to the enterprise data warehouse approach, the data mart strategy a. is typically initiated by a specific part of the business b. has a lower risk of resulting in the creation of multiple data mart silos c. typically requires more development time and is therefore associated with a higher financial risk d. cannot use ERP systems as resource system
d
In her paper 'Smart cities and the Internet of Everything...', Clarke maps the stages of maturity that cities traverse on their journey to become a smart city. 17.One of the drivers behind the increased use of smart city technologies is... A. the growth of urban populations. B. the climate crisis. C. citizens' expectations regarding their interactions with the government. D. all of the above.
a
In her paper 'Smart cities and the Internet of Everything...', Clarke maps the stages of maturity that cities traverse on their journey to become a smart city. Typical for the ad hoc stage in the maturity model is ... A. the deployment of smart city projects on a department-by-department basis. B. leveraging the smart city investments that were made in earlier stages of the maturity model. C. the establishment of a formal committee that governs all smart city projects. D. increased operational costs due to initial investments in smart city projects.
d
In his paper 'IT doesn't matter', Carr argues that information technology is nowadays an infrastructural technology. 16.In contrast to proprietary technologies, infrastructural technologies... A. do not have an influence on competition. B. can be owned by a single company. C. can be the foundation for long term strategic advantages. D. offer more value when shared than when used in isolation.
d
In outsourcing, opportunistic renegotiation is less likely to occur if ... A. information asymmetry between the client and the vendor is high. B. it can be detected by the client firm. C. the client firm employs vertical chunkification. D. the client firm can easily reinternalize the outsourced business process
d
In prototyping, ... A. the construction phase precedes the definition phase. B. developers try to obtain a complete set of user specifications for the system at the outset. C. it is difficult to account for evolving requirements during the project. D. the management of the development process is a joint IS and user management responsibility.
a
In the IT innovation wave machine model, Gartner's meeting would typically be part of a. causing a squawk b. sending out ripples c. building the swell d. riding the crest
b
In the IT innovation wave machine model, publishing a white paper would typically be part of a. causing a squawk b. sending out ripples c. building the swell d. riding the crest
c
In the ___ stage, managers' main responsibility is to extract the maximum benefit from technologies once they are in place. A. IT selection B. IT adoption C. IT exploitation D. IT implementation
d
In the article 'Disrupting and transforming the university', Lucas discusses how advances in technology will lead to changes in the business model of universities. For universities, a threat associated with technology-enabled education is... A. the emergence of new (startup) competitors. B. a shift towards competition at the level of individual courses. C. the high investment costs associated with setting up new learning platforms. D. all of the above.
c
In the article 'IT doesn't matter', Nicolas Carr argues that IT has become a commodity. Which of the following is a manifestation of this commoditization process? A. The fact that IT is far more valuable when used in isolation than when shared. B. The fact that IT is subject to rapid price inflation. C. The high replicability of IT. D. All of the above.
a
In the article 'IT doesn't matter', Nicolas Carr argues that IT has become a commodity. 3. Which of the following is not a manifestation of this commoditization process? A. The use of platform-as-a-service tools to add functionality missing in cloud software. B. The use of software-as-a-service. C. The tumbling cost of computing power. D. The use of off-the-shelf software.
c
In the article 'Investing in the IT that makes a competitive difference', McAfee & Brynjolfsson argue that IT investments have been intensifying competitiveness over the last ten years. McAfee & Brynjolfsson support this statement by documenting: A. decreases in industry concentration since the mid 1990s, especially concentrated in those industries that rely heavily on IT. B. decreases in performance spread in high IT-industries, suggesting that IT is making it more difficult to outpace competitors. C. increased sales turbulence in those industries that rely heavily on IT. D. all of the above.
b
In the article 'Mastering the three worlds of information technology', McAfee describes a taxonomy of information systems. Across the different IT categories, executives have three tasks: IT selection, IT adoption and IT exploitation. 5. Which of the following statements is in line with McAfee's view? A. Companies should use an outside-in approach to IT selection. B. Managers' main responsibility in the adoption of function IT is to help identify the complements that will maximize IT's value. C. Managers should intervene forcefully throughout the adoption of network IT. D. Managers should select IT based on recommendations from consultants, analysts, and journalists.
a
In the article 'Mastering the three worlds of information technology', McAfee discusses the managerial responsibilities in organizational change processes that involve new IT. In the ___ stage, managers' main responsibility is to help create the complements that will maximize IT's value. A. IT adoption B. IT exploitation C. IT maintenance D. IT selection
d
In the article 'Putting the enterprise into the enterprise system', Davenport discusses the use of enterprise resource planning systems in organizations. 18.Which of the following statements is not in line with Davenport's article? A. Most enterprise systems are modular, enabling the company to implement the system for some functions but not for others. B. Some firms run the risk of putting their competitive advantage at stake when they implement an enterprise system. C. With ERP implementation, the business often must be modified to the system. D. ERP implementation typically results in more hierarchical, command-and- control organizations with uniform cultures.
a
In the article 'Recent developments in data warehousing', Watson reviews various data warehousing concepts. Data warehouses are: A. used to support decision-making. B. updated by users. C. organized by business process. D. all of the above.
d
In the article 'Recent developments in data warehousing', Watson reviews various data warehousing concepts. In a data warehouse, it is important that all users are working with the same data. This is why data warehouses need to be: A. subject oriented. B. integrated. C. time variant. D. nonvolatile.
c
In the article 'Recent developments in data warehousing', Watson reviews various data warehousing concepts. A data warehouse is created to provide a dedicated source of data to support decision-making applications. In order to detect deviations, trends and long-term relationships, it is necessary for organizational decision makers to have access to historical data. This is why data warehouses are: A. integrated. B. nonvolatile. C. time variant. D. subject oriented.
b
Internet photo website Smugmug has relatively stable computing workloads throughout the year; however during the months of December and January the required resources spike to five times the usual workload. Which cloud computing feature would allow Smugmug to meet these excess requirements during the months of December and January? A. virtualization. B. scalability. C. multitenancy. D. web services.
b
In the article 'The impact of information systems on organizations and markets', Gurbaxani & Whang analyze how information systems affect organizations and markets. Their paper is based on cost concepts from agency and transaction cost theory. 19.Which of the following statements about the theoretical effects of IT on organizations and markets is false? A. IT provides the ability to improve monitoring and performance measurement, reducing agency costs and thus inducing the decentralization of decision rights. B. IT reduces external coordination costs, leading firms to integrate vertically with suppliers rather than turn to markets. C. IT enables organizations to process decision-relevant information in a more cost-effective way, leading to centralization of decision rights. D. IT has been instrumental in creating and reaping economies of scale in operations, leading to horizontal growth of firms.
b
In the article 'The knowledge-creating company', Nonaka discusses the knowledge creation processes of Japanese firms. The exchange between tacit and explicit knowledge happens during ... A. the combination process. B. the articulation process. C. the socialization process. D. all of the above processes.
b
In the article 'The past, present, and future of IS success', Petter et al. discuss five eras of information systems evolution and explain how perceptions and measures of successful information systems have changed across these eras. The use of the balanced scorecard is typical for the _____ era. A. strategic and personal computing B. customer-focused C. enterprise system and networking D. management reporting & decision support
c
In the article 'What's your strategy for managing knowledge?', Hansen et al. compare two knowledge management strategies: personalization and codification. 1. Which of the following economic models is most likely to be employed by consultancy firms adhering to a personalization strategy? A. A focus on generating large overall revenues. B. The use of large teams with a high ratio of associates to partners. C. A focus on maintaining high profit margins. D. Heavy investments in IT assets that are reused many times.
a
In the field of data analytics, the role of ___ is to discover patterns and relationships that no one else has seen or wondered about, and turn these discoveries into actionable information that creates value for the organization. A. data scientists B. end users C. BI vendors D. system analysts
a
In their article 'Is it all a game? Understanding the principles of gamification', Robson et al. present a framework of gamification principles. The rules of a game are considered to be part of the gamification_____ A. mechanics. B. behavior. C. dynamics. D. emotions.
d
In their paper 'Bayer HealthCare delivers a dose of reality for cloud payoff mantras in multinationals', Winkler et al. discuss the strategies that multinationals must adopt to benefit from cloud computing. The article identifies several inhibitors that made it difficult for Bayer to achieve payoffs from cloud computing. Which of the following was shown to be an inhibitor to cloud computing payoff? A. Regulatory differences across countries B. The use of legacy systems C. Business process complexity D. All of the above
d
In their paper 'Cloud computing - the business perspective', Marston et al. provide a SWOT analysis of cloud computing. According to Marston et al., ... A. general-purpose applications (like office, e-mail) are prime candidates to be moved to the cloud. B. cloud computing makes eminent sense for SMEs, but is not always cost effective for large enterprises. C. standalone applications will be easier to deploy on a cloud than a combination of internally developed applications. D. all of the above statements are correct.
a
In their paper 'Managing Employees' Use of Mobile Technologies to Minimize Work-Life Balance Impacts', Sarker et al. discuss four management strategies that can be used to address the work-life relationship issue. The __ strategy is concerned with setting up incentives that are provided to employees as a fair exchange for allowing a specific (and limited) amount of work to spill over to their personal life domain. A. compensation B. integration C. negotiation D. protection
b
In their paper 'Why software projects escalate: an empirical analysis and test of four theoretical models', Keil et al. provide a theoretical explanation for the escalation of software projects. The authors report the results of a survey among information system auditors. One of the questionnaire items used is 'Association with an unsuccessful project would have an adverse effect on the primary decision maker(s) chance for advancement in the organization'. Which theory does this survey item pertain to? A. self-justification theory. B. agency theory. C. approach avoidance theory. D. prospect theory.
c
In their study, Ugrin et al. observe that.... A. the performance impact of ERP systems is similar for publically traded companies as for privately held companies. B. after ERP adoption, the performance of early-stage ERP adopters improves more than the performance of late-stage adopters. C. the performance impact of ERP systems is more pronounced in the manufacturing sector. D. underperforming firms have few economic benefits from ERP adoption.
c
Keil et al. report the results of a survey with items measuring constructs associated with agency theory, approach avoidance theory, prospect theory and self-justification theory. One of the questionnaire items used is 'the primary decision maker seemed to be emotionally attached to this project'. What does this survey item pertain to? A. the need for social self-justification. B. the agency conflict. C. the need for psychological self-justification. D. the completion effect.
a
Larger vertical firm size is associated with a. higher internal coordination costs and lower transaction cost b. higher operations costs and lower internal coordination costs c. higher transaction costs and higher operations costs d. lower operations costs and higher transaction costs
d
Luo & Strong make a distinction between expert, novice, ___ and technician organizations. A. global B. IT-enabled C. nonadopting D. organizer
d
Managerial IT skills according to Mata et al. ... a. are causally ambiguous b. are developed through a socially complex process c. are developed over a relatively long period of time d. all of the above statements are correct
b
Marston et al. identify four categories of cloud computing stakeholders: consumers, providers, enablers, regulators. ithin this taxonomy, specialized software firms that provide platform migration software are classified as... A. Consumers B. Enablers C. Providers D. Regulators
b
McAfee & Brynjolfsson argue that IT investments have been intensifying competitiveness over the last ten years. They support this statement by documenting... a. a dramatic increase in ERP investments in the US since the mid 1990s b. increases in industry concentration since the mid 100s, especially concentrated in those industries that rely heavily on IT c. decreases in performance spread in high IT-industries, suggesting that IT is making it more difficult to outpace competitors d. shifts in industry dynamics in those industries that are characterized by high M&A activities and high R&D spending
d
McAfee & Brynjolfsson support this statement by documenting: A. Decreases in industry concentration since the mid 1990s, especially concentrated in those industries that rely heavily on IT. B. Decreases in performance spread in high IT-industries, suggesting that IT is making it more difficult to outpace competitors. C. A dramatic increase in the total stock of IT hardware and software in the United States since the mid 1990s. D. Increased sales turbulence in those industries that rely heavily on IT.
a
Nicolaou hypothesizes that... A. the impact of ERP adoption is influenced by the ERP vendor that gets chosen. B. ERP implementations will have a larger impact in organizations that adopt the full suite of ERP modules (i.e. primary and support modules). C. firms that justify ERP adoption based on business-led objectives will outperform firms that base their adoption decision on system-led objectives. D. firms in the manufacturing industry will have more to gain from ERP adoption than firms in the service industry.
c
Nowadays, some firms are adopting big data analytics because they want to emulate more successful firms and industry norms as a means of legitimizing their decisions. This phenomenon can be best explained by ... A. self-justification theory. B. economic theory. C. institutional theory. D. prospect theory
b
Nowadays, some firms are adopting cloud computing because they want to conform to the trend and improve their reputation in the eye of external stakeholders. This phenomenon can be best explained by ... A. economic theory. B. institutional theory. C. self-justification theory. D. transaction cost theory.
a
Nowadays, some firms are jumping on the gamification bandwagon, i.e. they adopt gamification because they observe that other firms are also doing this and they want to gain organizational legitimacy by following the trend. This phenomenon can be best explained by ... A. institutional theory. B. prospect theory. C. self-justification theory. D. transaction cost theory.
c
One key characteristic of the enterprise system and networking era is... A. that information systems are no longer purely utilitarian in their function. B. the shift of power from the organization to the consumer. C. the use of interorganizational systems. D. the shift of information systems from the 'back office' to the 'front office'.
c
One key characteristic of the strategic and personal computing era is... A. the use of information systems to support routine decisions. B. the use of information systems for hedonic purposes. C. that employees need less training to use information systems than before. D. the shift of information systems from the 'front office' to the 'back office'.
b
One key difference between enterprise resource planning (ERP) and data warehousing is that... A. in contrast to data warehouses, ERP users are not allowed to change data in an ERP system. B. in contrast to data warehouses, ERP systems are used for transaction processing. C. in contrast to data warehouses, ERP systems must cope with dirty data. D. in contrast to data warehouses, ERP systems can be bought off-the-shelf.
a
One key difference between enterprise resource planning (ERP) and data warehousing is that... A. in contrast to ERP systems, users cannot change data in a data warehouse. B. in contrast to ERP systems, data warehouses are not used for decision support. C. in contrast to ERP systems, data warehouses must cope with dirty data. D. in contrast to ERP systems, data warehouse software can be bought off-the- shelf.
b
One of the drivers behind the increased use of text mining technologies is: A. IT consumerization. B. the adoption of Facebook by businesses. C. the proliferation of enterprise IT. D. Gartner's hype cycle.
b
One of the drivers behind the increased use of text mining technologies is: A. the bring your own device trend. B. the wide adoption of social media tools. C. the proliferation of enterprise resource planning systems. D. advances in cloud computing.
b
Opportunistic renegotiation... A. can not be mitigated by horizontal chunkification. B. is also known as vendor holdup. C. is hidden from the client. D. occurs during the contract.
b
Out of the technical customization options, ___ is considered to be a low cost and low risk approach. A. code customization. B. module customization C. process customization D. table customization
d
Out of the technical customization options, ___ offers companies the greatest flexibility in adapting the ERP system to organizational needs. A. table customization B. module customization C. process customization D. code customization.
c
Over time, if a company outsources an activity completely, it loses the core group of people who were familiar with it. They retire, they leave for employment where theirskills are more valued, or they simply become less technically competent and out of date. The outsourcing risk described above is: A. the risk of poaching. B. the risk of vendor holdup. C. the risk of atrophy. D. the sociopolitical risk of outsourcing.
c
People who hold an overlapping perspective on the work-life relationship tend to have _____ feelings about the use of mobile technologies for work purposes after hours. A. positive B. outright negative C. mixed D. predominantly negative
a
Petter et al. One key characteristic of the customer-focused era is... A. that information systems are no longer purely utilitarian in their function. B. the use of interorganizational systems. C. the shift of information systems from the 'back office' to the 'front office'. D. the emergence of the technology acceptance model.
b
Petter et al. The evaluation of information systems success based on the service quality of the IS functions is typical for: A. the data processing era. B. the enterprise system and networking era. C. the management reporting & decision support era. D. the strategic and personal computing era.
a
Plausible deniability is a term associated with... A. horizontal chunkification B. the intrinsic risk of atrophy C. opportunistic renegotiation D. vertical chunkification
b
The approach of reviewing a program after each phase or step, with options to continue, continue with changes, or terminate the project, is called: A. agile development. B. incremental commitment. C. the phasing strategy. D. the ripple effect.
b
Prototyping is a(n) ___ development process. A. agile B. evolutionary C. highly structured D. all of the above
d
Prototyping is such a powerful approach because... A. most people find it very difficult to specify in great detail what they need from a new system. B. an initial working system is available for user testing much more quickly than with the use of traditional system development methods. C. most people find it quite easy to point out what they do not like about computer screens that they can try out. D. all of the above are correct.
b
Rite Solutions builds mission-critical software for the Navy and defense contractors. Employees at Rite Solutions are invited - on a voluntary basis - to play a role in influencing the destiny of the company by joining their colleagues in a stock market- based game called 'Mutual Fun'. Imagine a typical stock market portfolio, but instead of buying and selling shares of stock, players float, advance and develop portfolios of ideas. Every person in the company gets an initial $10,000 in 'opinion' money to invest in their colleagues' ideas. Any player can propose an idea, from a cost saving or efficiency measure to a truly disruptive venture into a new business or technology. The stock prices will reflect whether the idea is deemed valuable by the market, i.e. by the employees that participate in the market. 6. Within McAfee's taxonomy, the Mutual Fun game described above is an example of: A. Function IT B. Network IT C. Enterprise IT D. Decision IT
d
Scholars from the ___ perspective stress organizational legitimacy, which refers to a generalized perception or assumption that the actions of an organization are desirable or appropriate within the organization's socially constructed environment of norms, values, and beliefs. a. management fashion theory b. economic-rationalistic c. self-justification theory d. institutional
a
Sentiment analysis is an example of a _____ method. A. text analytics B. community detection C. predictive analytics D. social media analytics
a
Several conversion strategies can be used to transition users from an old information system to a new one. 2. The parallel strategy can be labelled as a ___ strategy. A. conservative B. high risk C. agile D. cold turkey
c
Several strategies can be used to transition users from an old information system to a new one. 1. An important disadvantage of a ___ strategy is that it results in a lengthy implementation period. A. cutover B. parallel C. phased D. pilot
a
Shirking is a manifestation of ... A. the principal-agent problem. B. vendor holdup. C. an operational outsourcing risk. D. all of the above.
a
The 'laissez faire' strategy... A. appeals to many employees, because they can make their own technology choices. B. offers greater data security than the 'broadening the scope' strategy. C. allows companies to reduce IT spending through standardization. D. all of the above statements are correct.
c
The actions that are effective when dealing with poaching, have ___ effect on shirking. A. an opposed B. a similar C. little D. an even better
a
The actual programming of software code is done during the _______ step in the SDLC a. system building b. maintenance c. system design d. operations
a
The analysis of Frey & Osborne builds on a task categorisation, that distinguishes between... A. routine versus non-routine, and manual versus cognitive tasks. B. explicit versus tacit, and manual versus cognitive tasks. C. well-defined versus ill-defined, and explicit versus tacit tasks. D. perception versus manipulation, and routine versus non-routine tasks.
a
The article 'The manager's guide to IT innovation waves' by Burton Swanson tries to help managers in understanding the IT wave phenomenon. The article presents an overview of questions that managers should ask when trying to make sense of IT innovation waves. 3. One of the first questions that managers should ask during the attention stage is... A. What is the current business and trade press coverage devoted to the innovation? Is it growing or declining, and at what rate? B. What is the current gap, among organizations that have implemented the innovation, in achieving promised business value? C. What is the current level of adoption of the innovation among companies? What is the growth rate, and is it increasing or declining? D. Which consultancies provide implementation services for the innovation? What are their capacities, and at what rate are those practices growing?
d
The article 'The manager's guide to IT innovation waves' by Burton Swanson tries to help managers in understanding the IT wave phenomenon. The article presents an overview of questions that managers should ask when trying to make sense of IT innovation waves. One of the first questions that managers should ask during the attention stage is... A. What are the compelling success stories among organizations that have adopted and implemented the innovation and gained value from it? B. Which consultancies provide implementation services for the innovation? What are their capacities, and at what rate are those practices growing? C. How large is the gap between the number of companies who have announced they will adopt the technology and the number who have successfully implemented it? D. What conferences are devoted to the innovation? Is attendance growing or declining, and at what rate?
c
The empirical findings of Piccoli & Lui: A. show that self-service kiosks only impact the small percentage of the hotel customer base that actually uses these kiosks. B. show that self-service kiosks can be easily replicated by competitors, and can therefore only provide hotels with temporary competitive advantage. C. suggest that even apparently simple IT applications can be a source of competitive advantage. D. support Nicholas Carr's view that IT can no longer be a source of competitive advantage.
c
The first step in the practical application of Luo & Strong's framework is... A. to develop a long-term implementation plan that takes the feasibility of ERP implementation into account. B. to assess the company's technical change capabilities. C. to assess how well the selected ERP system matches the business processes. D. to assess the company's organizational change capabilities.
b
The integration strategy... A. offers monetary rewards to address the work-life imbalance. B. is most relevant to employees with an encompassing perspective on the worklife relationship. C. is appropriate only for environments where the overlapping perception of the work-life relationship is predominant. D. starts from the acknowledgement that individuals perceive the relationship between work and life very differently.
d
The interviews with non-users of IT R&A services show that all non-users ... A. are put off by the significant costs of such services. B. were not impacted that much by IT and therefore were not interested in R&A services. C. simply don't need the information that IT R&A companies provide. D. gather similar market information from alternative (internal and external) sources.
a
Ugrin et al. base their hypotheses on.... A. neo-institutional theory. B. agency theory. C. economic-rationalistic theory. D. management fashion theory.
a
The mum effect is associated with.... A. agency theory. B. approach avoidance theory. C. prospect theory. D. self-justification theory.
d
The ripple effect is associated with the ____ step in the systems development lifecycle. A. systems design B. operations C. systems building D. maintenance
a
The three V's have emerged as a common framework to describe big data. _____ refers to the magnitude of data. A. volume B. variety C. velocity D. veracity
c
The traditional SDLC approach has often been referred to as a. a form out outsourcing b. an agile development methodology c. the waterfall model d. an evolutionary development methodology
c
The use of _____ is considered to be part of a broader phenomenon called the Internet of Things. A. Big data. B. Enterprise IT. C. Wearable technologies. D. Cloud computing.
c
W_hich of the following questions is most applicable to enterprise IT? a. how do our people collaborate? do we know what technologies they're using? b. if we wanted to get broad feedback on an important topic, how would we do it? c. in what ways are our current processes not supporting the needs of the business? which ones need to be redesigned d. will any of the new software on the market enable our salesforce to do their jobs more efficiently?
c
Wang defines IT fashion as: A. a technology with at best some short-lived benefits, but ultimately without sustainable practical merits. B. a trivial technology tool that will ultimately be rejected or abandoned. C. a transitory collective belief that an information technology is new, efficient, and at the forefront of practice. D. the collective perception held by an organization's stakeholders that the organization's leaders have adopted, implemented and utilized important new IT.
b
Wang defines engagement with IT fashion as a. a transitory collective belief that an information technology is new, efficient, and at the forefront of practice b. a material or informational relationship between the organization and the IT innovation in fashion c. the collective perception held by an organization's internal stakeholders that their organization's leaders adopt, implement and utilitze new and fashionable IT d. the collective perception held by an organization's external stakeholders that their organization's leaders adopt, implement and utilitze new and fashionable IT
a
Wang's findings suggest that... A. internal legitimacy - an organization's internal stakeholders' confidence in its leader - stems in part from the leader's advocacy of IT in fashion. B. organizations that associate themselves with IT fashions increase their financial performance. C. organizations that follow IT fashion perform better. D. all of the above.
a
What do all strategic outsourcing risks have in common? a. they arise from opportunistic behavior of a supplier b. they can be effectively mitigated by horizontal chunkification c. they can be effectively mitigated by monitoring d. all of the above answers are correct
a
What do shirking and poaching have in common? A. Both are hidden from the client. B. Both can be mitigated by horizontal chunkification. C. Both can be mitigated by vertical chunkification. D. They arise from insufficient vendor effort.
a
Which of the following SDLC steps requires heavy participation from prospective users and their management? A. requirements definition. B. system design. C. system building. D. maintenance.
d
Which of the following actions is most likely to be observed in the first 'wave' of the BYOD voyage? A. Organizations monitor their networks to stop ineffective technologies before they spread. B. The implementation of mobile device management suites to monitor and control the types of devices that can connect. C. Implementation of clear incentives in order to get employees to voluntarily accept the BYOD policy. D. The BYOD policy is released to a select group of employees only.
b
Which of the following conversion methods are incompatible (i.e. can not be combined)? A. Parallel and phased B. Parallel and cutover C. Parallel and pilot D. All of the combinations are incompatible.
a
Which of the following explanations for escalation is based on prospect theory? A. Managers commit resources to a failing project because the decision is framed as a choice between losses which leads to risk seeking behavior. B. Managers commit resources to a failing project because it is in their best interest to do so due to goal incongruence between the manager and his/her superior(s). C. Managers commit resources to a failing project because the forces encouraging them to do so are stronger than those forces which suggest discontinuation. D. Managers commit resources to a failing project in order to uphold the correctness of an earlier decision to pursue a particular course of action.
a
Which of the following human resource management practices is most likely to be observed in a consultancy firm adhering to a codification strategy? A. New employees are trained in groups and through IT-based distance learning. B. People are encouraged to develop a personal network that can be used to share tacit knowledge. C. People are rewarded for directly sharing their knowledge with others. D. The use of one-on-one mentoring.
d
Which of the following is not a core principle of blockchain technology? A. No single party controls the data or information on the blockchain. B. Each party on a blockchain has access to the entire database and its complete history. C. Once a transaction is entered in the database and the accounts are updated, the records cannot be altered. D. Communication occurs through a central node in the network.
d
Which of the following is not an example of an external coordination costs category? A. transportation costs. B. costs of enforcing contracts. C. inventory holding costs. D. residual loss.
a
Which of the following is not an example of network IT? A. Software for supply chain management B. E-mail C. A corporate wiki D. Instant messaging
c
Which of the following is not an example of the market transaction costs category? A. Costs of enforcing contracts. B. Inventory holding costs. C. Opportunity costs due to poor information. D. Search costs.
c
Which of the following job categories is most susceptible to computerisation? A. Archaeologists B. Dietitians and nutritionists C. Loan officers D. Photographers
b
Which of the following practices is least likely to be observed in a consultancy firm adhering to a codification strategy? A. The organization invests heavily in electronic document systems. B. People are encouraged to write a blog to signal their areas of expertise to colleagues. C. People are rewarded for contributing to the firm wiki. D. New employees are trained in groups and through IT-based distance learning.
b
Which of the following statements about FIT is false? a. Fit assists with the execution of discrete tasks b. Fit is more difficult to implement than other categories of It c. Fit technologies are available off-the-shelf d. Fit can be adopted without complements
b
Which of the following statements about data loading is correct? a. once the data is extracted from the source systems, it is ready for loading into the data warehouse b. for small volumes of data, bulk loading is a feasible loading method c. whereas companies mainly relied on trickle loading of data warehouses in the past, the trend has now moved towards bulk loading d. firms that need 24/7 access to data warehouses should make sure they have long load windows when updating the data warehouse
b
Which of the following statements about the ETL process is correct? A. The ETL process is only needed for data warehouses, but not for data marts. B. Data cleansing is done during the transformation phase of the ETL process. C. For large volumes of data, bulk loading is the most practical loading method. D. Once data is transformed, it is commonly placed in a staging area where it is loaded.
d
Which of the following statements about the ETL process is false? A. The ETL process is needed for both data warehouses and data marts. B. Data cleansing is part of the ETL process. C. For large volumes of data, trickle loading is more practical than bulk loading. D. Data extraction software is not commercially available, and hence organizations are forced to custom-write data extraction programs.
d
Which of the following statements about the Keil et al. study is correct? a. sunk cost effect decreases the chances of prospect escalation b. the data for the study were gathered using a survey among IT project managers c. the model derived from self-justification theory is the most accurate in classifying escalated and nonescalated projects d. it project escalation is a frequently occuring problem
a
Which of the following statements about the Keil et al. study is false? A. The data for the study were gathered using a survey among IT project managers. B. IT project escalation is a frequently occurring problem. C. The completion effect increases the chances of project escalation. D. Constructs derived from approach avoidance theory perform well in classifying both escalated and nonescalated projects.
c
Which of the following statements about the study by Wang is correct? a. wang provides a fashion explanation for the early phase of IT diffusion b. engagement with IT that is out of fashion results in higher executive compensation c. companies are considered more reputable when they are informationally linked to and invest in IT innovations in fashion d. organizations that follow IT fashions perform better
a
Which of the following statements about the theoretical effects of IT on organizations and markets is correct? A. IT provides the ability to improve monitoring and performance measurement, reducing agency costs and thus inducing the decentralization of decision rights. B. IT reduces external coordination costs, leading firms to integrate vertically with suppliers rather than turn to markets. C. IT enables organizations to process decision-relevant information in a more cost-effective way, leading to either decentralization or centralization of decision rights. D. IT generically leads to increases in both horizontal and vertical firm size.
d
Which of the following statements is correct accoriding to McAffee a. executives need to look at IT projects as technology installations that need to be finished within time and budget b. managers should refrain from intervening too often or forcefully in the adoption of enterprise IT c. managers' main responsibility in the section of IT is to monitor recommendations for consultants, analysts, and IT journalists d. companies should use an inside-out approach to IT selection
a
Which of the following statements is correct? A. Firms that adhere to a codification strategy employ an economic model based on reuse economics. B. Firms that adhere to a personalization strategy emphasize the combination mode of knowledge creation. C. Firms that generate a large part of their sales revenues with products that have been introduced in the last three years, are more likely to choose a codification strategy. D. All of the above statements are correct.
a
Which of the following statements is false, according to Davenport... a. most companies installing enterprise systems will opt to rewrite large portions of the software code to ensure a tight fit between the system and the company b. some degree of enterprise system customization is possible c. it is now common for a single ERP package to be used by virtually every company in the industry d. companies that compete on distinctive products do not undermine their source of differentiation when adopting ERP system
c
Which of the following statements is false? a. firms that adhere to a codification strategy employ an economic model based on reuse economics b. firms that adhere to a personalization strategy typically invest moderately in IT in order to create networks so that tacit knowledge can be shared
d
Which of the following tools is not part of the infrastructure needed for big data analytics? A. analytical sandboxes. B. data warehouses. C. Hadoop/MapReduce. D. groupware.
a
Which theory has been used in the management information systems course to analyze the effect of IT investments on the location of decision making rights? A. Agency theory. B. Institutional theory. C. The resource-based view of the firm. D. Transaction cost theory.
d
Within the SDLC method, the systems design step produces the following: A. an assessment of the technical, economic, organizational and behavioural feasibility of the proposed project. B. the software code. C. a system requirements document. D. none of the above.
c
_______ spend most of their time in the beginning stages of the SDLC talking with end users, gathering information, documenting system requirements and proposing solutions a. project managers b. it managers c. information system analysts d. business managers
c
when converting to the new system a company uses the ______ strategy by using the new system at a test site util it is deemed ready for implementation throughout the company a. cutover b. phasing c. pilot d. parallel
b
which of the following is not a manifestation of the commoditization process? a. the adoption of cloud computing b. the low scalability of certain IT functions c. the diffusion of off-the-shelf software packages such as ERP systems d. the fact that hardware is subject to rapid price deflation
b
which of the following statements about general purpose technologies is false? a. general purpose technologies offer the potential for considerable economies of scale if their supply can be consolidated b. in contrast to other types of technology, general purpose technologies can be furnished centrally even in the early stages of development c. in the earliest phase of its buildout, a general purpose technology can take the form of a proprietary technology d. steam power and electricity are examplex of gpt
d
which of the following statements about prototyping is false? a. prototyping is particularly attractive when the system requirements are difficult to define upfront b. only basic system requirements are needed at the front end of a prototyping project c. the end prototype is unlikely to have undergone the same type of rigorous testing one would use in the SDLC approach d. strong top-down commitment based on well-substantiated investment justification is needed at the outset of the project
d
which of the following statements is false. According to Burton Swanson... a. the rate at which value is achieved by an IT innovation is likely to peak long after the community's attention to the original organizing vision has dissipated b. it's generally not a good sign if a new technology is known under more than one name c. managers should beware of any new technology that does not have clear, verifiable success stories attached d. the IT innovation wave machine has almost unlimited capacity in terms of the attention of its institutional participants