Ch 1-6 IS 3310
An example of raw data from an automobile manufacturer would be: Answers: an average of 130 Subarus sold daily in New York in 2015. 1,300 Subaru Outbacks sold during the first quarter 2015 in New York. 1 Subaru Outback sold January 7, 2015 in Mount Kisco, New York for $25,000. annual sales of Subaru Outbacks increased 4.5 percent. an average sale price of $26,000 for all Subaru Outbacks sold during January 2015 in Mount Kisco, New York.
1 Subaru Outback sold January 7, 2015 in Mount Kisco, New York for $25,000.
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? 1) HIPAA 2) Gramm-Leach_Bililey Act 3) Privacy Protection Act 4) Freedom of Information Act
1) HIPPA
1. The world's data centers use as much energy as the output of ________ nuclear power plants, which is about ________ percent of all the energy use in the world. 10; 1 20; 2.5 30; 1.5 50; 10 100; 25
30; 1.5
1. Linux plays a major role in supporting business information systems, and has garnered about ________ of the U.S. server market. 10 percent 25 percent 35 percent 50 percent 80 percent
35 percent
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of 1) Family and Home 2) Property rights and obligations 3) system quality 4) Quality of life
4) Quality of Life
The Federal Trade Commission FIP principle of Notice/Awareness states that 1) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. 2) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. 3) there is a mechanism in place to enforce FIP principles. 4) Web sites must disclose their information practices before collecting data.
4) Websites must disclose their information practices before collecting data.
the most common source of business system failure is 1) software bugs 2) software errors 3) hardware or facilities failures 4) data quality
4) data quality
1. Data center traffic is expected to increase by ________ percent by 2016. 50 100 200 300 400
400
What percent of U.S. businesses have some form of remote work program? Answers: 15 percent 25 percent 35 percent 55 percent 75 percent
55 percent
What percent of the Fortune 500 companies uses Twitter to communicate with their customers? Answers: 20 percent 40 percent 50 percent 60 percent 80 percent
80 percent
1. At the client level, ________ percent of PCs use some form of the Microsoft Windows operating system. 50 70 80 90 100
90
1. Which of the following would be primarily responsible for enterprise-wide governance and usage of information to maximize the value of an organization's data? CKO CPO end users CDO CSO
CDO
1. A ________ is a senior manager who oversees the use of IT in the firm. CEO CFO CIO CIT CPO
CIO
1. Which of the following is most likely to have direct responsibility for ensuring that his or her company complies with existing data privacy laws? CPO CKO CIO CIP CSO
CPO
1. Which of the following is a type of optical disc storage? CD-ROM Hard drive USB flash drive Magnetic tape SSD
CD-ROM
1. Which of the following is an example of a key force in a firm's broader, less immediate environment? Competitors Regulations Suppliers Economic trends Customers
Economic trends
BPM (business processes management) is considered concluded when the new processes are both implemented and accepted.
FALSE
Benchmarks are specific standards for business processes set by industry leaders.
FALSE
In some instances, BPM will lead to a paradigm shift that transforms the nature of the business itself.
FALSE
Quality control is seen as an end in itself in Six Sigma.
FALSE
The activities that measure the performance of your business processes against strict standards are called best practices.
FALSE
The first movers of a disruptive technology typically benefit the most from the technology; and it is rare that fast followers catch up quickly.
FALSE
The greatest barrier to changing business processes is, ironically, management itself.
FALSE
The law of diminishing returns always applies to digital, as well as traditional products.
FALSE
The more people that use Microsoft Office software and related products, the lower its value.
FALSE
1. Which of the following is an example of a company whose business model is based on access to large databases through the web? Gartner Fortune IBM Microsoft Facebook
1. Which of the following is not an example of the consumerization of IT? Google Apps Dropbox Facebook Gmail Amazon Web Services
Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy?
Firms should limit the length of time that any personal data is stored to six months or less.
In 2015, what percent of Internet users will access the web through mobile devices? Answers: Less than 15 percent Around 25 percent 50 percent More than 60 percent More than 75 percent
More than 60 percent
1. A(n) ________ is a set of self-contained services that communicate with each other to create a working software application. web service hybrid cloud SOA ERP mashup
SOA
1. Which of the following is the most prominent data manipulation language today? Access DB2 SQL Crystal Reports Hadoop
SQL
1. All of the following are tools or technologies for extracting information from unstructured data sets except: sentiment analysis software. SQL queries. Hadoop. a non-relational DBMS. text mining.
SQL queries.
1. ________ technology allows a videoconference participant to give the appearance of being present at a location other than his or her true physical location. Telepresence Virtual reality Screen sharing Mind mapping Virtual world
Telepresence
1. Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? Modifiability Scalability Expandability Disintermediation SLA
Scalability
Radiation from computer display screens has been proved to be a factor in CVS 1) True 2)False
True
1. Which of the following devices collects data directly from the environment for input into a computer system? Sensor Touch screen Audio input Trackball Digital scanner
Sensor
1. Which of the following types of computer would you use to support a computer network? Server Mainframe Workstation PC Tablet
Server
________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. Answers: Software Programming Enterprise applications Business intelligence Data management technology
Software
Which of the following statements about spam is not true?
Spamming is less regulated in Europe than in the United States.
1. Which of the following software tools would you use to prepare a break-even analysis? Word processing Spreadsheet Desktop publishing Personal information management Presentation graphics
Spreadsheet
The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output is referred to as: A) the point of no return. B) the law of diminishing returns. C) supply and demand. D) inelasticity.
b) the law of diminishing returns
1. You use ________ to predict when a computer hardware system becomes saturated. capacity planning virtualization localization measured service SLAs
capacity planning
The ________ strategy concentrates financial management and control out of a central home base while decentralizing production, sales, and marketing operations to units in other countries. A) domestic exporter B) multinational C) franchise D) transnational
b) multinational
The emergence of the World Wide Web acted as a disruptive technology for: A) the typewriter industry. B) print publishing. C) PC manufacturers. D) microprocessor firms.
b) print publishing
Walmart's continuous replenishment system allows it to: A) provide mass customization. B) provide an efficient customer response system. C) strengthen customer intimacy. D) achieve economy of scale.
b) provide an efficient customer response system
1. The business case for using grid computing involves all of the following except: cost savings. centralized maintenance. speed of computation. agility. increased computational power.
centralized maintenance.
1. The main challenge coming to Microsoft's Office software suite will be: open-source, Linux-based suites such as OpenOffice. cloud-based productivity software such as Google Docs and Google Apps. mobile software. in-house, custom software created using open-source web services. Apple's iWork.
cloud-based productivity software such as Google Docs and Google Apps.
All of the following are new technology-related trends in MIS except: Answers: cloud computing. big data. IoT. the mobile digital platform. co-creation of business value.
co-creation of business value.
1. The select operation: combines relational tables to provide the user with more information than is otherwise available. creates a subset consisting of columns in a table. identifies the table from which the columns will be selected. creates a subset consisting of all records in the file that meet stated criteria. specifies the content of the database.
creates a subset consisting of all records in the file that meet stated criteria.
1. DBMS typically include report-generating tools in order to: retrieve and display data. display data in tables. display data in graphs. perform predictive analysis. display data in an easier-to-read-format.
display data in an easier-to-read-format.
1. The use of multiple computers linked by a communications network for processing is called: grid computing. distributed processing. client/server computing. centralized processing. supercomputing.
distributed processing.
1. The use of digital technology and the Internet to execute the major business processes in the enterprise is called: e-commerce. e-business. enterprise applications. MIS. KWM.
e-business.
The six important business objectives of information system investment include all of the following except: Answers: competitive advantage. employee morale. improved decision making. survival. new products.
employee morale.
1. A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, usable by many parts of the business. TPS DSS automatic reporting system MIS enterprise system
enterprise system
1. A schematic of the entire database that describes the relationships in a database is called a(n): data dictionary. intersection relationship diagram. field key diagram. data definition diagram. entity-relationship diagram.
entity-relationship diagram.
1. In terms of the data relationships found by data mining, sequences refers to: events linked over time. patterns that describe a group to which an item belongs. occurrences linked to a single event. undiscovered groupings. classifications when no groups have yet been defined.
events linked over time.
CVS refers to 1) eyestrain related to computer display screen use 2) carpal vision syndrome 3) wrist injuries brought about by incorrect hand position when using a keyboard 4) stress induced by technology
eyestrain related to computer display screen use
RSI is unavoidable for a computer keyboard worker. 1) true 2) false
false
The Copyright Office began registering software programs in the 1990s 1) true 2) false
false
Web sites use "cookies" in order to obtain the names and addresses of their visitors 1) true 2) false
false
All of the following are examples of environmental actors in an information system except: Answers: customers. stockholders. feedback. competitors. regulatory agencies.
feedback.
1. Suppliers, customers, employees, products and services, and ________ are the five basic components with which businesses must deal. the environment manufacturing and production sales and marketing invoices and payments technology
invoices and payments
1. All of the following are examples of wearable computing devices except: smartwatches. smart badges. activity trackers. smart glasses. smartphones.
smartphones.
1. Translating software to different languages is commonly referred to as: software localization. scaling. service-oriented architecture. outsourcing. open sourcing.
software localization.
1. Microsoft Excel is an example of: data management software. spreadsheet software. presentation graphics. word processing software. presentation graphics software.
spreadsheet software
1. Key forces in a business's immediate environment include: stockholders. technological innovations. economic conditions. politic conditions. global events.
stockholders.
1. A computerized system that performs and records the daily activities necessary to conduct business is classified as a(n): executive support system. management-level system. decision support system. transaction processing system. business intelligence system.
transaction processing system.
A transparent marketplace means that there is high product differentiation.
FALSE
The Online Privacy Alliance 1) encourages self-regulation to develop a set of privacy guidelines for its members 2) protects user privacy during interaction with web sites 3) has established technical guidelines for ensuring privacy 4)is a government agency regulating the use of customer information
1) encourages self-regulation to develop a set of privacy guidelines for its members.
What is the estimated growth rate for information systems managers' jobs through 2020? Answers: -10% -1% 15% 5% 45%
15%
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called 1) due process. 2) accountability 3) the courts of appeal 4) the judicial system
2) accountability
Approximately how many adult Americans are online? Answers: 118 million 170 million 205 million 220 million 227 million
227 million
U.S. businesses are allowed to use personal data from EU countries if they 1) have informed consent 2) create a safe harbor 3) develop equivalent privacy protection policies 4) make their privacy protection policies publicly available
3 Develop equivalent privacy protection policies
Which of the following is not one of the three principal sources of poor system performance? 1) software bugs and errors 2) hardware of facility failures caused by natural or other causes. 3) insufficient integration with external systems. 4) poor input data quality
3) insufficient integration with external systems
NORA is a 1) profiling technology used by the E.U 2) federal privacy law protecting networked data 3) new data analysis technology that finds hidden connections between data in disparate sources. 4) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.
3) new data analysis technology that finds hidden connections between data in disparate sources.
1. Which of the following is an example of a pre-digital database? A library's card-catalog A cash register receipt A doctor's office invoice A list of sales totals on a spreadsheet An SQL database
A library's card-catalog
Which of the following is the best definition of an information system? Answers: A set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization Computers, keyboards, printers, and telecommunications devices A set of detailed programmed instructions that transform raw data into information Physical devices and software that can be connected to share voice, data, images, sound, and video A global network that uses universal standards
A set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization
1. You work for a highly successful advertiser that is about to expand nationally. Of utmost importance will be finding a way to store and disseminate its clients' frequently updated branding and style guides throughout the organization. The guides include multiple image files and text documents. What system will best serve these needs? A wiki An extranet with KMS capabilities A TPS with KMS capabilities A telepresence system A virtual world
An extranet with KMS capabilities
Which of the following is an important skill for an accounting major? Answers: An understanding of online transaction and reporting systems An understanding of product management enterprise systems An understanding of supplier management enterprise systems An understanding of enterprise systems that enhance leadership An understanding of enterprise systems for customer relationship management
An understanding of online transaction and reporting systems
Which of the following is an important skill for a marketing major? Answers: An understanding of online transaction and reporting systems An understanding of product management enterprise systems An understanding of supplier management enterprise systems An understanding of enterprise systems that enhance leadership An understanding of financial reporting systems
An understanding of product management enterprise systems
1. Which of the following is an open-source operating system designed for mobile devices? iOS OS X Chrome Android Apache HTTP
Android
Which of the following is an example of a business using information systems to create new products and services? Answers: Apple's creation of the iPad JC Penney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced The Mandarin Oriental's use of computers to keep track of guests' preferences Verizon's web-based digital dashboard providing real-time company information for managers Walmart's Retail Link's system
Apple's creation of the iPad
1. ________ provide information to coordinate all of the business processes that deal with customers in sales, marketing, and service to optimize revenue, customer satisfaction, and customer retention. TPS MIS ESS CPS CRM systems
CRM systems
1. Which of the following best describes the type of information systems FWO implemented, as discussed in the chapter case? ESS DSS TPS KMS Cloud collaboration service
Cloud collaboration service
1. Which of the following is considered to be the fastest growing form of computing? Wearable computing Green computing Nanocomputing Enterprise computing Cloud computing
Cloud computing
1. Which of the following statements is not true about collaboration in a business setting? Collaboration may be a short-lived activity, lasting just a few minutes. Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity. Meaningful collaboration requires a supportive business firm culture and the right, decentralized structure. The evidence of the business benefits of collaboration is largely anecdotal. Special types of information systems are available to support collaboration.
Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity.
Which of the following is not a U.S. federal law affecting private institutions?
Computer Matching and Privacy Protection Act
Which of the following protects the authors of a book from having their work copied by others?
Copyright law
The culture of UPS places service to the customer among the company's highest business objectives, which is reflected in their use of information systems to enable customer tracking of their packages. Based on your reading of Chapter 1, why is "culture" an important factor to consider when building information system solutions to business problems? Answers: Culture is one element that can be radically changed, not always for the better, by new information systems. Culture affects how information system solutions are implemented and used. Culture is a cauldron of employee perspectives and conflicts, which can be used to improve business processes. Culture is the driving force behind decision making and innovation. Culture is the basis for organizational politics.
Culture affects how information system solutions are implemented and used.
To make sure they stock clothes that their customers will purchase, a department store implements a new application that analyzes spending levels at their stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support? Answers: New products Survival Customer intimacy Improved decision making Operational excellence
Customer intimacy
1. Access is a: DBMS for mobile devices. popular open-source DBMS. DBMS for midrange computers. DBMS for desktop PC systems. DBMS for mainframe computers.
DBMS for desktop PC systems.
1. Which of the following systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance? MIS TPS DSS KMS CRM
DSS
1. ________ support making decisions that are unique, rapidly changing, and not easily specified in advance. MIS TPS ESS DSS KWM
DSS
1. Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? Referential integrity module Data definition diagram Entity-relationship diagram Relationship dictionary Data dictionary
Data dictionary
1. Which of the following allows users to add, change, delete, or retrieve data in a database? Attribute generation Report generation tools Data dictionary Query wizard tool Data manipulation language
Data manipulation language
1. Which of the following statements about data warehouses is not true? They store supply data to be used across the enterprise for management analysis and decision making. Data warehouse systems provide a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities. They may include data from website transactions. Data warehouse systems provide easy-to-use tools for managers to easily update data. Data warehouses make data available for anyone to access as needed.
Data warehouse systems provide easy-to-use tools for managers to easily update data.
1. Which type of software provides more control over text and graphic placement in the layout of a page than word processing software? Desktop publishing software Spreadsheet software Graphics software Presentation software Data management software
Desktop publishing software
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
Digital Millennium Copyright Act
1. Which of the following refers to the purchase or sale of goods and services over the Internet? E-commerce E-business CRM MIS SCM
E-commerce
1. Which type of system would you use to determine what trends in your supplier's industry will affect your firm the most in five years? ESS TPS MIS DSS KWM
ESS
1. What is the most important benefit of an enterprise application? Enabling speed of communicating Enabling business functions and departments to share information Enabling a company to work collaboratively with customers and suppliers Enabling cost-effective, e-business processes Enabling managers to make better decisions
Enabling business functions and departments to share information
As discussed in the chapter opening case, the San Francisco Giants are taking advantage of wireless technology to do which of the following? Answers: Improve decision making Achieve operational excellence Implement dynamic ticket pricing Perform data analysis Enhance fan experience
Enhance fan experience
1. Which of the following systems are designed to support organization-wide process coordination and integration? DSS MIS CRM Enterprise applications ESS
Enterprise applications
1. IBM Connections is an example of which of the following? MIS Enterprise social networking tool E-commerce system Intranet Extranet
Enterprise social networking tool
Which of the following would not be considered part of the implementation phase of problem solving? Answers: Change management Purchasing hardware for an information systems solution Training an employee on new systems software Evaluating a selection of software packages for implementing a new business process Determining the attitude of employees about the solution.
Evaluating a selection of software packages for implementing a new business process
1. Which of the following types of systems could be used to enable different firms to work collaboratively on a product? Intranet Extranet KMS CRM DSS
Extranet
1. You manage the Information Systems department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics, such as views and click-throughs, about their current display ads. Which type of system will most efficiently provide a solution? CRM Enterprise system Extranet Intranet KWM
Extranet
1. You have been hired by Inspiration Inc. to help improve its profit margin. Inspiration Inc. is a business communications consulting firm that services many clients in different industries throughout the world. The firm provides its clients with customized written recommendations about how to best use the client's existing resources to improve the client's internal communications. The company has approximately 100 consultants, all of whom are located in its central headquarters in Chicago. What system do you recommend to improve Inspiration Inc.'s business processes and increase its profit margin? Extranet, to enable quick collaboration via the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed CRM, to maintain easily accessible customer records to minimize the time spent looking for client data KMS, to minimize redundant work on similar clients Video conferencing system, to improve collaboration MIS, to produce reports on the firm's operations
Extranet, to enable quick collaboration via the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed
Which of the following statements about Flash cookies is not true?
Flash cookies are installed only at the user's request.
1. Which of the following Google tools allows people to engage in group video chat? Google Drive Google Docs Google Apps for Business Google Circles Google Hangouts
Google Hangouts
1. ________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices. Capacity planning Cloud computing Green computing Utility computing On-demand computing
Green computing
1. Which of the following is not a service typically provided by an information systems department? Telecommunications services Physical facilities management services Data management services Project management services Human resources services
Human resources services
1. Policies that determine which information technology will be used, when, and how, are provided by: IT educational services. IT management services. application software services. IT standards services. data management services.
IT standards services.
1. What is the first step you should take in managing data for a firm? Identify the data needed to run the business. Cleanse the data before importing it to any database. Normalize the data before importing to a database. Audit your data quality. Remove redundancy.
Identify the data needed to run the business.
Assume you work for a package delivery service in a major metropolitan area and that the business has been losing customers for several years. You have been asked to find a solution to this problem. What is the correct way to proceed? Answers: Look for solutions, evaluate the solutions, identify the problem more clearly, and then implement the solution. Think about what solutions can be implemented, look for solution designs, evaluate the designs, and then implement the solution. Identify the problem, design alternative solutions, choose the best solution, and then implement the solution. Design solutions, evaluate and identify the problems, choose the best solution, and then implement the solution. Identify relevant information technologies, interview employees, choose a technology, and implement the technology.
Identify the problem, design alternative solutions, choose the best solution, and then implement the solution.
1. From your reading of the chapter-opening case study discussing ABB's use of enterprise social networking, which of the following statements best expresses ABB's experience? ABB's primary motivation for replacing its existing corporate intranet was to enhance its security. Implementing Yammer improved employee productivity and collaboration. Efforts to implement Yammer were met with significant resistance from employees. Yammer provided ABB with a single entry point to all the information and tools ABB employees need for their jobs.
Implementing Yammer improved employee productivity and collaboration.
1. Which type of system would you use to determine the five suppliers with the worst record in delivering goods on time? ESS TPS MIS DSS CRM
MIS
1. What type of device gathers data and converts them into electronic form for use by the computer? Output device Input device Optical storage Magnetic storage SAN
Input device
1. Common data quality problems include all of the following except: misspelled names. transposed numbers. incorrect codes. missing codes. Internet connectivity problems.
Internet connectivity problems.
Which of the following is a primary drawback of the "do anything anywhere" computing environment?
It blurs the traditional boundaries between work and family time.
1. Which of the following best describes the importance of creating an accurate data model for your business's database? It is not essential, as the data model itself is modified by the database continuously. It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve. It is essential, as table relationships cannot be created without an accurate data model. It is somewhat important, as the type of data model will define what kinds of data will be stored. It is unnecessary, as a well-designed database should not require one.
It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.
1. Which of the following statements is not true about cloud computing? It is the fastest-growing form of computing. It removes the concern about data and systems security for businesses. It allows smaller firms to use resources previously unaffordable. It relies on the Internet as the platform for delivering services to users. Charges for cloud resources are based on resources actually used.
It removes the concern about data and systems security for businesses.
1. Which of the following statements about Plan International's new human resources system, as described in the chapter case, is not true? It took six months to implement a working system at Plan International's international headquarters. The new system helps manage grants and donations received by Plan International. The new system is cloud-based and delivers information on a secure mobile platform. The new system enables employees to update their own personal information.
It took six months to implement a working system at Plan International's international headquarters.
1. As discussed in the chapter case, what is the primary reason why Spacebook failed? It was too expensive to implement. It was designed and developed without taking the organization's culture into consideration. It did not include enough collaboration tools. Its user interface was confusing. It was riddled with technical issues.
It was designed and developed without taking the organization's culture into consideration.
An example of a business using information systems for supplier intimacy is: Answers: Apple's creation of the iPad. JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced. Citibank's ATM system. Verizon's web-based digital dashboard providing real-time company information for managers. the Mandarin Oriental's use of computers to keep track of guests' preferences.
JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced.
______ is an operating system-independent, processor-independent, object-oriented programming language that has become a leading interactive programming environment for the web. XML SOA HTML Java COBOL
Java
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? 1) Kant's Categorical Imperative 2) the golden rule 3) the risk aversion principle 4) the no free lunch rule
Kant's Categorical Imperative
1. Which of the following is not a type of output device? Speakers Cathode ray tube Ink jet printer Keyboard Sensor
Keyboard
1. Which of the following statements about Linux is not true? Linux is a UNIX-like operating system. Linux plays a major role in running web servers and local area networks. Linux is the primary OS used in quantum computing. Linux is a robust alternative to Windows operating systems. Linux is an example of open source software.
Linux is the primary OS used in quantum computing.
1. Which of the following systems are designed to summarize and report on the company's basic operations? KMS DSS ESS TPS MIS
MIS
1. A relocation control system that reports summaries on the total moving, house-hunting, and home financing costs for employees in all company divisions would fall into the category of a/an: KMS. TPS. ESS. MIS. CRM system
MIS.
1. Which of the following storage technology stores data sequentially? CD-ROM RAID Magnetic disks Magnetic tape USB flash drive
Magnetic tape
Which of the following fields deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm? Answers: Information systems literacy Information systems architecture Management information systems Information technology infrastructure Computer information systems
Management information systems
What percent of global Internet users use Google Search and other Google services?
Nearly 80 percent
The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) _________ 1) advances in wireless networking 2) international standards for data protection 3) networking advances and the internet 4) increased ease in file sharing and copying
Networking advances and the internet
1. MongoDB and SimpleDB are both examples of: open-source databases. SQL databases. NoSQL databases. cloud databases. big data databases.
NoSQL databases.
1. Which of the following database types would be best suited for storing multimedia? SQL DBMS Open-source DBMS Non-relational DBMS Cloud-based database NoSQL DBMS.
Non-relational DBMS
1. Which of the following enables users to view the same data in different ways using multiple dimensions? Hadoop SQL Big data Data mining OLAP
OLAP
1. In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): TCO. SOA. SLA. API. capacity plan.
SLA.
1. You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table? One-to-many One-to-one Many-to-many Many-to-one One-to-all
One-to-one
1. Cisco's WebEx is an example of which of the following types of collaboration tools? Blog Team room Online meeting Group calendar Wiki
Online meeting
1. Which of the following is not an essential characteristic of cloud computing? On-demand self-service Rapid elasticity Measured service Open source software Ubiquitous network access
Open source software
1. ________ is free software created and updated by a worldwide community of programmers. An app Open-source software Cloud-based software A web service Office software
Open-source software
Walmart exemplifies the power of information systems coupled with excellent business practices and supportive management to achieve which of the following? Answers: New business models Operational efficiency Customer intimacy Competitive advantage Survival
Operational efficiency
1. Which of the following is an interorganizational business process? Hiring an employee Identifying a customer Creating financial statements Ordering raw materials Checking product quality
Ordering raw materials
Which are the three major dimensions of business problem solving? Answers: Organizational dimensions, people dimensions, and technology dimension Organizational dimensions, people dimensions, and environmental dimensions People dimensions, technology dimensions, and environmental dimensions Technology dimensions, organizational dimensions, and environmental dimensions Organizational dimensions, technology dimensions, and cultural dimensions
Organizational dimensions, people dimensions, and technology dimension
You are a new manager at a plumbing supply manufacturer where there are an unusually high number of returns for a new aerator used in the production of high-end faucets. In examining the problem you determine that the primary cause is the improperly designed die cast for the aerator. Which dimension of a business problem does this reflect? Answers: People Technology Management Organizational Cultural
People
P3P stands for 1) Privacy for personal protection 2) Platform for Privacy Preferences. 3) Personal Privacy Policy 4) Personal Privacy Protection
Platform for Privacy Preferences
Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information? 1) privacy act of 1974 2) Gramm-Leach_Bliley Act of 1999 3) Freedom of Information Act 4) HIPAA of 1996
Privacy Act of 1974
1. Which of the following would a CSO not be responsible for? Educating and training users about security Keeping management aware of security threats Maintaining tools chosen to implement security Providing physical security Enforcing the firm's information security policy
Providing physical security
Which of the five moral dimensions of the information age does spamming involve?
Quality of life
___________ are not held liable for the messages they transmit 1) Regulated common carriers 2) Private individuals 3) Organizations and businesses 4) Elected officials
Regulated common carriers
1. Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables? Two-tiered DBMS Pre-digital DBMS Open source DBMS Hierarchical DBMS Relational DBMS
Relational DBMS
1. What are the relationships that the relational database is named for? Relationships between rows and columns Relationships between entities Relationships between fields and records Relationships between databases Relationships between attributes
Relationships between entities
1. Which of the following is a high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers? SSN ASP LAN SAN Grid
SAN
1. Which type of system would you use to change a production schedule if a key supplier was late in delivering goods? ESS CRM system MIS DSS SCM system
SCM system
1. What is the purpose of a DBMS's data definition function? Storing and managing the data in the database Storing definitions of data elements Normalizing the database Structuring the database Ensuring consistency of relationships
Structuring the database
1. Which of the following types of computer is used for weather forecasting on a national or worldwide scale? Mainframe Server Minicomputer Supercomputer PC
Supercomputer
1. ________ systems integrate and share information from suppliers, manufacturers, distributors, and logistics companies. Collaborative distribution Supply chain management Reverse logistics Enterprise planning Digital dashboard
Supply chain management
A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives? Answers: Survival Improved decision making Competitive advantage Operational excellence Customer intimacy
Survival
A firm that must invest in a new information system in order to comply with federal legislation is investing to achieve which of the following business objectives? Answers: Customer intimacy Operational excellence New products. Improved decision making Survival
Survival
Which business objective were competitors seeking when they rushed to provide ATMs as well after Citibank introduced the first ATMs in New York? Answers: Improved efficiency Customer and supplier intimacy Survival Competitive advantage Improved decision making
Survival
1. Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records? ESS TPS MIS DSS CRM
TPS
A firm can be said to have competitive advantage when it has higher stock market valuations than its competitors.
TRUE
A micromultinational is a small firm operating on a global scale.
TRUE
A primary challenge in BPM is employee resistance.
TRUE
A value web is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market.
TRUE
Business process reengineering is the radical redesign of business processes.
TRUE
Customers are one of the competitive forces that affect an organization's ability to compete.
TRUE
Franchisers are firms that have their product created, designed, financed, and initially produced in the home country but rely heavily on foreign personnel for further production, marketing, and human resources.
TRUE
In the age of the Internet, Porter's traditional competitive forces model is still at work, but competitive rivalry has become much more intense.
TRUE
In the strategy of product differentiation, information systems are used to enable new products and services.
TRUE
In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer.
TRUE
Mass customization allows a company to offer individually tailored products using the same production resources as mass production.
TRUE
Probably the best single way to reduce quality problems is to reduce cycle time.
TRUE
Strong linkages to customers and suppliers increase switching costs.
TRUE
Studies show that about half of a business firm's profits can be explained by alignment of IT with business.
TRUE
The effect of the Internet has been to raise bargaining power over suppliers.
TRUE
The idea driving synergies is that when the output of some units can be used as inputs to other units, the relationship can lower cost and generate profits.
TRUE
The value chain model classifies all company activities as either primary or support.
TRUE
Which of the following is a global network that uses universal standards to connect millions of different networks around the world? Answers: An extranet The World Wide Web The Internet An intranet Verizon
The Internet
________ is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format. Answers: FTP Email The World Wide Web HTML An extranet
The World Wide Web
1. Which of the following statements about client/server computing is not true? The client provides the user interface. The bulk of processing occurs on the client. Computing on the Internet is based on the client/server model. The client is normally a desktop or laptop computer. The server provides security, remote access, and user authentication.
The bulk of processing occurs on the client.
As described in the chapter case, which of the following constitutes a managerial element of the UPS tracking system? Answers: The web-based Post Sales Order Management System The ability to provide package status reports to customers The decision to use automation The implementation of in-house package tracking software The ability to embed UPS functions in external sites
The decision to use automation
1. Which of the following is not a true statement with respect to business processes? Every business can be seen as a collection of business processes. Analyzing business processes can enable you to achieve a clear understanding of how a business actually works. The efficiency of a business firm is not related to its business processes. Information systems can automate many steps in business processes that were formerly performed manually. A business process may involve a unique way in which work, information, and knowledge are coordinated within an organization.
The efficiency of a business firm is not related to its business processes.
1. Which of the following best illustrates the relationship between entities and attributes? The entity CUSTOMER with the attribute PRODUCT The entity CUSTOMER with the attribute ADDRESS The entity PRODUCT with the attribute PURCHASE The entity PRODUCT with the attribute CUSTOMER The entity ADDRESS with the attribute CUSTOMER
The entity CUSTOMER with the attribute ADDRESS
1. Which of the following can typically access a company's intranet? The general public The firm's employees The firm's customers The firm's suppliers The firm's outside contractors
The firm's employees
Which of the following statements is not true? Answers: The most common and successful offshore outsourcing projects involve production programming and system maintenance programming work, along with call center work. Inflation in Indian wages for technology work is leading to a counter movement of some IT jobs back to the United States. The fear that offshore outsourcing will reduce demand for new information system hires in the United States is mitigated by the fact that reduced IT expenditures results in increased IT investments and the creation of domestic jobs. The impact of domestic IT outsourcing has been very disruptive to some regional areas of the United States. Management and organizational tasks required in systems development usually are not outsourced.
The impact of domestic IT outsourcing has been very disruptive to some regional areas of the United States.
_________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
The opt-in model
As described in the chapter case, which of the following constitutes an organizational element in the UPS tracking system? Answers: The specification of procedures for identifying packages with sender and recipient information Monitoring service levels Promoting the company strategy of low-cost, superior service The use of handheld computers and networks for managing package delivery Routing software that creates the most efficient delivery route for each driver
The specification of procedures for identifying packages with sender and recipient information
1. What analytical framework discussed in the chapter helps understand and evaluate the benefits and uses of collaboration tools? Cost/use matrix Task/time matrix Space/cost matrix Time/space matrix Time/cost matrix
Time/space matrix
1. Which of the following is an example of a legacy system? Transaction processing system running on a mainframe Scalable grid computing system Web services running on a cloud computing platform MDM software Quantum computing system
Transaction processing system running on a mainframe
1. Which of the following is an interactive, multiuser operating system developed by Bell Laboratories in 1969 to be highly supportive of communications and networking? UNIX Linux OS X COBOL Chrome
UNIX
Telepresence is an example of which of the following? Answers: Business intelligence Social business IoT Mobile digital platform Virtual meeting
Virtual meeting
1. Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating systems? Java C++ XML Visual Basic COBOL
Visual Basic
1. The ability of a person booking a flight on Southwest.com's website to reserve a car from Dollar Rent-A-Car without having to leave the airline's website is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following? Cloud computing Web services Nanotechnology SaaS PaaS
Web services
1. The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution? Mashups Extranet Web services Cloud computing Intranet
Web services
1. Which of the following would you use to find out which websites with content related to database design were the most often linked to by other websites? Web usage mining Web server mining Web structure mining Web content mining Web protocol mining
Web structure mining
1. Which of the following would you use to find patterns in user interaction data recorded by web servers? Web usage mining Web server mining Web structure mining Web content mining Web protocol mining
Web usage mining
1. What would be a reason for using a workstation rather than a personal computer? When you need more powerful computational abilities When you need to access a network When you need to serve applications and data to client computers When you need to share resources When you need to connect to a cloud computing platform
When you need more powerful computational abilities
Which of the following statements is not true? Answers: In 2015, American businesses will invest nearly $600 billion in information systems hardware, software, and telecommunications equipment. In 2015, American businesses will spend $400 billion on business and management consulting and information technology services, In 2015, about 25 percent of all capital investment in the United States will be for information systems hardware, software, and telecommunications equipment. Expenditures in the United States for information systems are growing at a faster rate than the U.S. economy as a whole. Worldwide expenditures for information were around $1 trillion.
Worldwide expenditures for information were around $1 trillion.
1. What is the foundation technology for web services? HTML XML SOAP UDDI Java
XML
1. Running a Java program on a computer requires: a Java Virtual Machine to be installed on the computer. a Java Virtual Machine to be installed on the server hosting the Java applet. an applet to be downloaded to the user's computer. no extra or specialized software, as Java is platform-independent. an Intel processor and the Windows operating system.
a Java Virtual Machine to be installed on the computer.
1. ZipRealty, which combines Google Maps with real estate data, is an example of: cloud computing. SOA. a widget. a mashup. a web service.
a mashup.
Which of the following illustrates the use of information systems to focus on market niche? A) A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy B) A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers C) A PC manufacturer's use of information systems to facilitate direct access from suppliers to production schedules D) A grocery store chain's use of information systems to produce products and services at a lower price than competitors
a) A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy
How are information systems used at the industry level to achieve strategic advantage? A) By building industry-wide, IT-supported consortia and symposia B) By raising the bargaining power of suppliers C) By encouraging the entry of new competitors D) By enforcing standards that reduce the differences between competitors
a) By building industry-wide, IT-supported consortia and symposia
Which of the following does not describe a difference between the way customers and producers see quality? A) For a consumer, quality means uniformity of the product. B) Consumers are concerned with the quality of the service. C) A consumer view of quality includes its durability and safety. D) For a producer, quality can be measured with a test.
a) For a consumer, quality means uniformity of the product
Benchmarking: A) compares the efficiency and effectiveness of your business processes against strict standards. B) allows industry participants to develop industry-wide standards. C) is used to measure the speed and responsiveness of information technology. D) synchronizes the business processes of customers, suppliers, and trading partners.
a) compares the efficiency and effectiveness of your business processes against strict standards
The ________ strategy is characterized by heavy centralization of corporate activities in the home country of origin. A) domestic exporter B) multinational C) franchise D) transnational
a) domestic exporter
All of the following are psychological aspects of quality except: A) effective marketing. B) company's knowledge of its products. C) the product's reputation. D) the courtesy of salespeople.
a) effective marketing
In network economics, the value of a commercial software vendor's software products: A) increases as more people use them. B) decreases as more people use them. C) increases due to higher marginal gain in output. D) decreases according to the law of diminishing returns.
a) increases as more people use them
Legal compliance is an example of the ________ dimension of business problems. Answers: management organizational people technology cultural
people
Internet technology: A) makes it easy for rivals to compete on price alone. B) imposes a significant cost of entry, due to infrastructure requirements. C) increases the difference between competitors because of the wide availability of information. D) makes it easy to sustain operational advantages.
a) makes it easy for rivals to compete on price alone
________ is the ability to offer individually tailored products or services using the same production resources as bulk production. A) Mass customization B) Size customization C) Personalization D) Demand customization
a) mass customization
A firm can exercise greater control over its suppliers by having: A) more suppliers. B) fewer suppliers. C) global suppliers. D) local suppliers.
a) more suppliers
The iPad can be seen as a disruptive technology for the ________ industry. A) publishing B) music C) software D) travel
a) publishing
A substitute product of most concern for a cable TV distributor is: A) satellite TV. B) broadcast TV. C) satellite radio. D) the Internet.
a) satellite TV
The reduction of errors to 3.4 defects per million opportunities is central to the concept of: A) Six Sigma. B) TQM. C) benchmarking. D) cycle time reduction.
a) six sigma
A virtual company: A) uses the capabilities of other companies without being physically tied to those companies. B) uses Internet technology to maintain a virtual storefront. C) uses Internet technology to maintain a networked community of users. D) provides entirely Internet-driven services, or virtual products.
a) uses the capabilities of other companies without being physically tied to those companies
1. In a business environment, the focus of collaboration is to: accomplish the task at hand. provide a sense of community. foster better communication. prevent miscommunication. increase a firm's profit margin.
accomplish the task at hand.
1. Linux is: primarily concerned with the tasks of end users. designed for specific machines and specific microprocessors. an example of open-source software. especially useful for processing numeric data. the operating system for the Macintosh computer.
an example of open-source software.
1. Pre-configured hardware-software systems that use both relational and non-relational technology optimized for analyzing large datasets are referred to as: hybrid DBMS. Hadoop. BI. analytic platforms. data marts.
analytic platforms.
1. Development and support services for a firm's business systems are provided by: IT educational services. IT management services. data management services. IT standards services. application software services.
application software services.
1. Software used to apply the computer to a specific task for an end user is called: system software. application software. data management software. network software. web services software.
application software.
1. A characteristic or quality describing an entity is called a(n): field. tuple. key field. attribute. table.
attribute.
Which of the following illustrates the use of information systems to achieve product differentiation? A) A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy B) A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers C) A PC manufacturer's use of information systems to facilitate direct access from suppliers to production schedules D) A grocery store chain's use of information systems to produce products and services at a lower price than competitors
b) A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers
Which of the following best describes business globalization? A) Businesses whose suppliers are located overseas B) Businesses selling their products worldwide C) Businesses moving manufacturing overseas D) All of the above.
b) Businesses selling their products worldwide
You are the production manager for a manufacturer of bicycle parts. Which of the following tools or technologies would you use to improve production precision? A) value chain B) CAD software C) benchmarking D) industry best practices
b) CAD software
All of the following industries have been severely disrupted by the Internet except: A) air travel. B) PC manufacturer. C) publishing. D) software.
b) PC manufacturer
Based on your reading of the chapter case, which of the four generic business strategies was Ford Motor company following in implementing its new software and apps? A) Low-cost leadership B) Product differentiation C) Focus on market niche D) Customer and supplier intimacy
b) Product differentiation
Seeing quality as the responsibility of all people and functions in an organization is central to the concept of: A) Six Sigma. B) TQM. C) quality control. D) cycle time reduction.
b) TQM
A firm that locates all systems development and operations at its headquarters is using a ________ system configuration. A) unilateral B) centralized C) decentralized D) networked
b) centralized
When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy. A) product differentiation B) market niche C) mass customization D) process efficiency
b) market niche
A firm's value chain is linked to the: A) value webs of its industry. B) value chains of its suppliers, distributors, and customers. C) value webs of its suppliers and distributors. D) value chains of its suppliers and customers.
b) value chains of its supplier, distributors, and customers
The enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as: Answers: IoT. big data. the mobile digital platform. cloud computing. business intelligence.
big data.
1. The smallest unit of data a computer can handle is called a: file. record. field. byte. bit.
bit.
1. DSS and MIS are also referred to as ________ systems. business information business intelligence executive support business model expert
business intelligence
1. Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as: DSS. business intelligence. OLAP. data mining. in-memory computing.
business intelligence.
Which of the following illustrates the use of information systems to strengthen customer and supplier intimacy? A) A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy B) A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers C) A PC manufacturer's use of information systems to facilitate direct access from suppliers to production schedules D) A grocery store chain's use of information systems to produce products and services at a lower price than competitors
c) A PC manufacturer's use of information systems to facilitate direct access from suppliers to production schedules
________ systems are those in which development occurs at the home base, but operations are handed over to autonomous units in foreign locations. A) Transnational B) Decentralized C) Duplicated D) Networked
c) Duplicated
To what competitive force did the printed encyclopedia industry succumb? A) Positioning and rivalry among competitors B) Low cost of entry C) Substitute products or services D) Customer's bargaining power
c) Substitute products or services
In a ________ system configuration, separate information systems are designed and managed by each foreign unit. A) duplicated B) centralized C) decentralized D) networked
c) decentralized
Which of the following is not one of the competitive forces of Porter's model? A) Suppliers B) Other competitors C) External environment D) Customers
c) external environment
Hilton Hotels' use of customer information software to identify the most profitable customers to direct services to is an example of using information systems to: A) strengthen customer intimacy. B) differentiate their service. C) focus on market niche. D) increase efficiency.
c) focus on market niche
________ typically develop a single information system, usually at the home base, and then replicate it around the world. A) Domestic exporters B) Multinational firms C) Franchisers D) Transnational firms
c) franchisers
All of the following are ways to improve quality except: A) improving products and services based on customer demands. B) simplifying the production process. C) implementing a new information system. D) improving production precision.
c) implementing a new information system
The Internet raises the bargaining power of customers by: A) creating new opportunities for building loyal customer bases. B) making more products available. C) making information available to everyone. D) lowering transaction costs.
c) making information available to everyone
All of the following have been disruptive technologies except: A) the PageRank algorithm. B) the flash drive. C) minicomputers. D) the iPod.
c) minicomputers
All of the following are considered primary activities of a firm except: A) inbound logistics. B) sales and marketing. C) procurement. D) service.
c) procurement
Which of the following industries has the lowest barrier to entry? A) Automotive B) Computer-chip C) Restaurant D) Airline
c) restaurant
Network economics: A) applies the law of diminishing returns to communities of users. B) applies traditional economics to networked users. C) sees the cost of adding new members as inconsequential. D) balances the high cost of adding new members to a community against the lower cost of using network infrastructure.
c) sees the cost of adding new members as inconsequential
When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, it is often referred to as creating: A) value webs. B) value chains. C) synergies. D) core competencies.
c) synergies
A ________ is a collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively. A) value chain B) business network C) value web D) consortia
c) value web
1. Virtualization: allows one operating system to manage several physical machines. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. can boost server utilization rates to 70% or higher. allows smartphones to run full-fledged operating systems. uses the principles of quantum physics to represent data.
can boost server utilization rates to 70% or higher.
The ethical rules discussed in the textbook 1) are based on political philosophies 2) cannot be guides to actions. 3) cannot be applied to many e-commerce situations 4) do not allow for competing values
cannot be guides to actions
1. The project operation: combines relational tables to provide the user with more information than is otherwise available. creates a subset consisting of columns in a table. organizes elements into segments. identifies the table from which the columns will be selected. stores definitions of data elements.
creates a subset consisting of columns in a table.
The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its: Answers: business process. environment. atmosphere. values. culture.
culture.
Which of the following is not an advantage for new companies entering the marketplace? A) They can implement new systems and equipment. B) They are not locked into an existing brand image. C) They are more highly motivated. D) They can establish new relationships with suppliers.
d) They can establish new relationships with suppliers
The most successful solutions or methods for achieving a business objective are called: A) core processes. B) best processes. C) benchmarks. D) best practices.
d) best practices
Which of the following is not one of the four basic strategies a company can employ to deal with competitive forces? A) Strengthen customer and supplier intimacy B) Focus on market niche C) Differentiate products D) Compete on employee loyalty
d) compete on employee loyalty
A ________ is an activity at which a firm excels as a world-class leader. A) best practice B) competitive advantage C) primary activity D) core competency
d) core competency
An information system can enhance core competencies by: A) providing better reporting facilities. B) creating educational opportunities for management. C) allowing operational employees to interact with management. D) encouraging the sharing of knowledge across business units.
d) encouraging the sharing of knowledge across business units
The greatest impact the Internet has had on globalization is in lowering the costs of: A) labor. B) telecommunications. C) network infrastructure. D) entry to global-scale operations.
d) entry to global-scale operations
The value chain model: A) categorizes five related advantages for adding value to a firm's products or services. B) sees the supply chain as the primary activity for adding value. C) categorizes four basic strategies a firm can use to enhance its value chain. D) helps a firm identify points at which information technology can most effectively enhance its competitive position.
d) helps a firm identify points at which information technology can most effectively enhance its competitive position
An information system can enable a company to focus on a market niche through: A) complex trend forecasting. B) tailoring products to the client. C) intensive product trend analysis. D) intensive customer data analysis.
d) intensive customer data analysis
A manufacturer of deep-sea oil rigs may be least concerned about which of these marketplace forces? A) Product differentiation B) Traditional competitors C) Low number of suppliers D) New market entrants
d) new market entrants
The support activities of a firm include: A) inbound logistics, technology, outbound logistics, sales and marketing, and service. B) inbound logistics, organization infrastructure, outbound logistics, technology, and procurement. C) organization infrastructure, human resources, sales and marketing, and technology. D) organization infrastructure, human resources, technology, and procurement.
d) organization infrastructure, human resources, technology, and procurement
Which of the following can force a business and its competitors to compete on price alone? A) High product differentiation B) Poor process efficiency C) Demand control D) Transparent marketplace
d) transparent marketplace
1. Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called: system software. application software. data management software. network software. web services software.
data management software.
1. A(n) ________ is a structured survey of the accuracy and level of completeness of the data in an information system. data quality audit systems analysis systems audit data analysis data overview
data quality audit
1. The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. batch processing data redundancy data independence online processing data freedom
data redundancy
1. Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: data auditing. defragmentation. data scrubbing. data optimization. data repair.
data scrubbing.
1. Employees that assist with paperwork at all levels of the firm are called: data workers. knowledge workers. operational management. service workers. senior managers.
data workers.
1. Within a corporate information services department, the task of establishing the physical database and its logical relations are responsibilities of the ________ function. data management data administration server administration data modeling database administration
database administration
1. A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS. web server online server database server client server application server
database server
All of the following can be considered managerial responsibilities except: Answers: making action plans to solve organizational problems. creating new products and services. designing new information systems. allocating human resources to coordinate the work to be done. setting strategy for responding to business challenges in the environment.
designing new information systems.
1. Data mining is more ________ than OLAP. data-focused multidimensional query oriented discovery driven streamlined
discovery driven
1. Data mining is a tool for allowing users to: quickly compare transaction data gathered over many years. perform multidimensional data analysis. obtain online answers to ad hoc questions in a rapid amount of time. summarize massive amounts of data into much smaller, traditional reports. find hidden relationships in data.
find hidden relationships in data.
1. The most basic business database is comprised of: three tables: for suppliers, parts, and sales. four tables: for customers, suppliers, parts, and sales. four tables: for customers, suppliers, sales, and employees. five tables: for customers, employees, suppliers, parts, and sales. attributes instead of tables.
five tables: for customers, employees, suppliers, parts, and sales.
1. Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: co-location. cloud computing. grid computing. client/server computing. centralized processing.
grid computing.
1. All of the following are features of smartwatches except a(n): accelerometer. altimeter. compass. gyrometer. barometer.
gyrometer.
1. In a ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. scalable quantum grid hybrid cloud private cloud
hybrid cloud
The first step in the model of business problem solving discussed in the chapter is: Answers: interviewing the people involved in the problem. identifying the problem. outlining the problem's causes. assigning the problem to a problem solver. evaluating possible solutions to the problem.
identifying the problem.
The final step in the four-step model of business problem solving is: Answers: outcome. implementation. change management. feedback. employee re-training.
implementation.
Verizon's implementation of a web-based digital dashboard to provide managers with real-time information, such as customer complaints, is an example of: Answers: improved flexibility. improved decision making. competitive advantage. supplier intimacy. a new product.
improved decision making.
1. A one-to-one relationship between two entities is symbolized in a diagram by a line that ends: in two short marks. in one short mark. with a crow's foot. with a crow's foot topped by a short mark. with a crow's foot topped by two short marks.
in two short marks.
All of the following are current key technology trends raising ethical issues except:
increase in data quality.
Redesigning and automating business processes can be seen as a double-edged sword because:
increases in efficiency may be accompanied by job losses.
All of the following describe the effects of globalization except: Answers: significant decreases in operating costs. reduction of labor costs through outsourcing. ability to find low-cost suppliers. increases in transaction costs. replication of business models in multiple countries.
increases in transaction costs.
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? 1) property rights and obligations 2) system quality 3) accountability and control 4) information rights and obligations
information rights and obligations
The three activities in an information system that produce the information organizations use to control operations are: Answers: information, research, and analysis. input, output, and feedback. input, processing, and output. data analysis, processing, and feedback. information, data, and processing.
input, processing, and output.
1. Supply chain management systems are considered to be a(n) ________ because they automate the flow of information across company boundaries. KMS enterprise system MIS interorganizational system cross-functional system
interorganizational system
1. A table that links two tables that have a many-to-many relationship is often called a(n): derived table. intersection relation. foreign table. entity-relationship table. derived relation.
intersection relation.
1. A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because: it typically focuses on a single subject area or line of business. all the information is historical. it uses a web interface. all of the information belongs to a single company. it is open-source.
it typically focuses on a single subject area or line of business.
1. A field identified in a record as holding the unique identifier for that record is called the: primary key. key field. primary field. foreign key. identifying field.
key field.
1. Engineers and scientists are examples of: senior management. production workers. knowledge workers. middle management. operational management.
knowledge workers.
1. An ESS is an information system that supports the: long-range planning activities of senior management. knowledge and data workers in an organization. decision-making and administrative activities of middle managers. day-to-day processes of production. management of customer relationships.
long-range planning activities of senior management.
In a hierarchical organization, the upper levels consist of: Answers: managerial, professional and knowledge workers. managerial, professional, and technical workers. professional and operational workers. managerial, professional, and operational workers. knowledge, technical and operational workers.
managerial, professional, and technical workers.
1. Producing a bill of materials is a responsibility of the ________ function. finance and accounting human resources manufacturing and production sales and marketing technology
manufacturing and production
Which of the following is not protected by copyright law?
maps
1. Software applications that combine different components of online software applications are referred to as: integrated software. widgets. mashups. grid computing. web services.
mashups.
The average number of baseball tickets sold at a particular price is an example of: Answers: input. raw data. meaningful information. output. feedback.
meaningful information.
1. The term management information systems refers to a specific category of information systems serving: integrated data processing throughout the firm. transaction process reporting. senior management. middle management functions. knowledge workers.
middle management functions.
European privacy protection is ________ than in the United States 1) less far-reaching 2 less liable to laws 3) much less stringent 4) much more stringent
much more stringent
FIP principles are based on the notion of the 1) accountability of the record holder. 2) responsibility of the record holder 3) mutuality of interest between the record holder and the individual 4) privacy of the individual
mutuality of interest between the record holder and the individual
1. In clustering, a data mining tool will find: new groupings within data. related predictions from existing values. several events grouped by time. new associations. forecasts for future events.
new groupings within data.
1. The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: normalization. data scrubbing. data cleansing. data administration. data management.
normalization.
1. OLAP is a tool that enables users to: obtain online answers to ad hoc questions in a rapid amount of time. view both logical and physical views of data. quickly diagram data relationships. normalize data. find hidden patterns in large databases.
obtain online answers to ad hoc questions in a rapid amount of time.
1. In terms of the data relationships found by data mining, associations refers to: events linked over time. patterns that describe a group to which an item belongs. occurrences linked to a single event. undiscovered groupings. classification when no groups have yet been defined.
occurrences linked to a single event.
When a cookie is created during a Web site visit, it is stored 1) on the web site computer 2) on the visitor's computer 3) on the ISP's computer 4) in a web directory
on the visitor's computer
1. Hadoop is a(n): NoSQL database technology that stores both data and procedures acting on the data as objects. data mining platform designed for storing and analyzing big data produced by web communications and transactions. open-source software framework designed for distributing data-processing over inexpensive computers. pre-configured hardware-software system designed for analyzing big data. high-speed platform used to analyze large data sets.
open-source software framework designed for distributing data-processing over inexpensive computers.
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. Correct!
opt-out
Consider an information system in a moving company that analyzes travel patterns and decides which routes are the most efficient for every van. The need for employees to follow procedures to update this system with arrival and departure times would be considered a(n) ________ dimension of the system. Answers: organizational managerial people technology cultural
organizational
Poor business processes are an example of the ________ dimension of business problems. Answers: management organizational people infrastructure cultural
organizational
Flapjack Flats, a new pancake chain, is having difficulty finding pancake chefs. This is a business problem that falls into the: Answers: management dimension. people dimension. organizational dimension. technical dimension. cultural dimension.
organizational dimension.
The owners of Speed-EZ, a new bike messenger service, are concerned about how they will manage their messengers once the messengers have left the office. This is a business problem that falls into the: Answers: management dimension. people dimension. organizational dimension. technology dimension. cultural dimension.
people dimension.
1. A DBMS makes the: relational database available for different analytical views. logical database available for different analytical views. physical database available for different relational views. relational database available for different physical views. physical database available for different logical views.
physical database available for different logical views.
1. MySQL is a: DBMS for mobile devices. programming language. mainframe relational DBMS. DBMS for desktop systems. popular open-source DBMS.
popular open-source DBMS.
1. Links pointing to an online document are a sign of: richness or variety of topics covered. popularity. data quality. data usage. marketing.
popularity.
1. The logical view of a database: shows how data are organized and structured on the storage media. presents an entry screen to the user. allows the creation of supplementary reports. presents data as they would be perceived by end users. shows the relationships between entities and attributes.
presents data as they would be perceived by end users.
1. A field identified in a table as holding the unique identifier of the table's records is called the: primary key. key field. primary field. foreign key. identifying field.
primary key.
Converting raw data into a more meaningful form is called: Answers: capturing. processing. organizing. feedback. inputting.
processing.
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
property rights and obligations.
1. In co-location, a firm: purchases and owns its web server but locates the server in the physical facility of a hosting service. contracts with an external vendor to run its computer center and networks. off-loads peak demand for computing power to remote, large-scale data centers. utilizes an external, distributed computing grid. uses only open source software to operate its computer systems.
purchases and owns its web server but locates the server in the physical facility of a hosting service.
Information systems 1) pose traditional ethical situations in new manners 2) raise new ethical questions 3) raise the same ethical questions created by the industrial revolution 4) raise ethical questions primarily related to information rights and obligations
raise new ethical questions
1. Relational database systems use ________ to ensure that relationships between coupled tables remain consistent. intersection relations one-to-one ordering entity-relationship diagrams foreign keys referential integrity rules
referential integrity rules
1. Interaction jobs are those jobs which: require close coordination and collaboration. involve knowledge that can't be put into an information system. are performed typically by operational-level employees. require intense levels of interaction with clients. require an emphasis on innovation.
require close coordination and collaboration.
1. Links coming out of an online document are a sign of: richness or variety of topics covered. popularity. data quality. data usage. marketing.
richness or variety of topics covered.
1. In a table for customers, the information about a single customer would reside in a single: field. entity. column. table. row.
row.
Perhaps the most frequent error in problem solving is: Answers: rushing to judgment about the nature of a problem. not being aware of personal limitations. being too doubtful. following a rote pattern of decision making. failing to consider all dimensions of a problem.
rushing to judgment about the nature of a problem.
The U.S. Department of Commerce developed a(n) ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
safe harbor
1. Identifying potential customers for the businesses' products or services is an activity associated with the ________ function. finance and accounting human resources manufacturing and production technology sales and marketing
sales and marketing
1. In a relational database, the three basic operations used to develop useful sets of data are: select, project, and where. select, join, and where. select, project, and join. select, from, and join. who, what, and where.
select, project, and join.
1. The three principal levels of hierarchies within a business organization are: senior management, knowledge workers, and service workers. senior management, middle management, and operational management. senior management, data workers, and operational management. senior management, operational management, and workers. senior management, operational management, and data workers.
senior management, middle management, and operational management.
Financial managers work directly with ________ to ensure investments in information systems help achieve corporate goals. Answers: operations managers senior managers marketing managers accounting managers knowledge workers
senior managers
1. The goal of social commerce applications is to: connect through personal and business profiles. use social media to connect with customers. share opinions about purchasing products or services. upload and share business documents. harness collective knowledge to generate new ideas.
share opinions about purchasing products or services.
1. The primary storage technologies are: storage networks, magnetic tape, magnetic disk, and optical disk. hard drives, magnetic tape, magnetic disk, and optical disk. storage networks, magnetic disks, hard disks, and optical disks. hard drives, removable drives, storage networks, and magnetic tape. flash drives, SSDs, storage networks and magnetic disks.
storage networks, magnetic tape, magnetic disk, and optical disk.
1. Each of the following is required for successful collaboration, except: open culture. strong hierarchy. decentralized structure. breadth of collaboration. appropriate collaboration technology.
strong hierarchy.
1. Instant messaging, videoconferencing, and shared screens are all examples of ________ collaboration tools. bimodal colocated synchronous spontaneous asynchronous
synchronous
1. Software that manages the resources of the computer is called: system software. application software. data management software. network software. web services software.
system software.
1. The principal liaison between the information systems groups and the rest of the organization is a(n): programmer. information systems manager. systems analyst. CIO. CSO.
systems analyst.
Inadequate database capacity is an example of the ________ dimension of business problems. Answers: technology organizational people management cultural
technology
1. Businesses use ________ tools to search and analyze unstructured data sets, such as emails and memos. Hadoop web mining text mining OLAP DBMS
text mining
In choosing the best solution for a business problem, all of the following are important considerations except: Answers: the cost of the solution. the feasibility of the solution given existing resources and skills. the length of time to implement the solution. the attitudes of employees. the ability to forget about the problem once it has been solved.
the ability to forget about the problem once it has been solved.
A database into which employees manually input customer names and addresses is riddled with errors and you have been charged with rectifying the situation. In considering the organizational dimensions of this problem, you should consider: Answers: the skill levels of the employees inputting the data. the training given to the employees inputting the data. the business processes in place governing the manual input of the data. the types of automatic error checking provided by the input software. the storage capacity of the database.
the business processes in place governing the manual input of the data.
The failure of NASA's initial solution to preventing the space shuttle shedding foam illustrates: Answers: the importance of training employees on new business processes. the need to prepare for measuring outcomes of a business solution. the continuous nature of problem solving. the need to quickly adapt to new technological innovations. the importance of organizational change in problem solving.
the continuous nature of problem solving.
"Look and feel" copyright infringement lawsuits are concerned with:
the distinction between an idea and its expression.
Journalist Thomas Friedman's description of the world as "flat" refers to: Answers: the flattening of economic and cultural advantages of developed countries. the use of the Internet and technology for instantaneous communication. the reduction in travel times and the ubiquity of global exchange and travel. the growth of globalization. the increased use of global currencies.
the flattening of economic and cultural advantages of developed countries.
1. An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except: the minimum response time for processing business transactions. lost productivity if hardware or software failures cause the system to be unavailable for processing and user tasks. real estate and utility costs for housing and providing power for the technology. the purchase or license of software for each user. the cost to provide training to information systems specialists and end users.
the minimum response time for processing business transactions.
1. An analyst asked to perform capacity planning for a system would need to take into account all of the following factors except: the maximum number of users a system can accommodate at one time. the minimum response time for processing business transactions. the impact of future software applications. the purchase price of new computer hardware equipment. the volume of transactions.
the purchase price of new computer hardware equipment.
Data management technology consists of: Answers: the physical hardware and media used by an organization for storing data. the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. the software governing the organization of data on physical storage media. the hardware and software used to transfer data. the universally accepted standards for storing data.
the software governing the organization of data on physical storage media.
1. In a multitiered network: the work of the entire network is centralized. the work of the entire network is balanced over several levels of servers. processing is split between clients and servers. processing is handled by multiple, geographically remote clients. users interface with the server rather than the client.
the work of the entire network is balanced over several levels of servers.
1. To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: total cost of ownership model. return on investment model. break-even point. cost benefit analysis. capacity plan.
total cost of ownership model.
Output: Answers: is feedback that has been processed to create meaningful information. is information that is returned to appropriate members of the organization to help them evaluate the input stage. transfers raw data to the people who will use it or to the activities for which it will be used. transfers processed information to the people who will use it or to the activities for which it will be used. is a stream of raw facts representing events occurring in organizations or the physical environment.
transfers processed information to the people who will use it or to the activities for which it will be used.
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. 1) true 2) false
true
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. 1) true 2) false
true
Spam is unsolicited e-mail 1) true 2) false
true
Spyware is software that comes hidden in downloaded applications and can track your online movements. 1) true 2) false
true
The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their manifestation in a product. 1) True 2) false
true
1. In a relational database, a record is also called a(n): tuple. key field. entity. field. table.
tuple.
1. A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. service-oriented on-demand multitiered client/server two-tiered client/server grid
two-tiered client/server
Intranets: Answers: are based on mainframe technology. are multiple networks joined together. are typically used to communicate with the business's trusted vendors. use Internet technology for a private company network. provide the platform on which a firm builds its information systems.
use Internet technology for a private company network.
1. Second Life is an example of a(n): virtual world. wiki. social networking site. mind mapping tool. extranet.
virtual world.
1. A data ________ stores current and historical data of potential interest to decision makers throughout the company. warehouse mart archive mine center
warehouse
1. A wiki is a type of collaborative: social network. blogging. virtual world. website. MIS.
website.
1. A one-to-many relationship between two entities is symbolized in a diagram by a line that ends: in two short marks. in one short mark. with a crow's foot. with a crow's foot preceded by a short mark. in three short marks.
with a crow's foot preceded by a short mark.
1. Microsoft Word is an example of: open-source software. word-processing software. software productivity suite. data management software. presentation graphics software.
word-processing software.