MIS CH 1-5 TEST
According to agency theory, the firm is viewed as a(n)
"nexus of contracts" among self-interested individuals.
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation?
Correct His action is acceptable, because the higher social value is the survival of the family.
Which of the following describes Immanuel Kant's Categorical Imperative?
Correct If an action is not right for everyone to take, it is not right for anyone to take.
Which of the following best describes the effect that new information technology has on society?
Correct It has a ripple effect, raising new ethical, social, and political issues.
Which of the following statements about Linux is not true?
Correct It has garnered 20 percent of the server operating system market.
As discussed in the chapter, all of the following are steps in the process for analyzing an ethical issue except
Correct assigning responsibility.
Interpretations of Moore's law assert that
Correct computing power doubles every 18 months.
You have been hired by Inspiration Inc., to help improve their profit margin. Inspiration Inc. is a business communications consultancy that services many clients in different industries throughout the United States. The end products of the company are customized recommendations for the best use of a client's existing resources for improving internal communications, typically delivered via documentation in different media. The company has approximately 100 consultants, all of whom are located in their central headquarters in Chicago. What system do you recommend to improve the company's business processes and increase their profit margin?
Correct extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed
In 2010, the FTC added all of the following recommendations to its privacy guidelines except
Correct firms should limit the length of time that any personal data is stored to six months or less.
The strength of patent protection is that it
Correct grants a monopoly on underlying concepts and ideas.
the value chain model
Correct highlights specific activities in the business where competitive strategies can best be applied.
Key differences between software and books include all of the following except
Correct software products are more easily compared to each other than books.
All of the following are cloud computing services except
Correct virtualization as a service.
Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system?
DSS
Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records?
DSS
The ________ brought copyright law to the Internet age by outlawing the circumvention of technology-based protections of copyrighted materials.
Digital Millennium Copyright Act
________ is a societal practice of having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
Due process
To forecast trends in your supplier's industry that could affect your firm over the next five years, you would use a(n)
ESS
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPPA
Which of the following describes Immanuel Kant's Categorical Imperative?
If an action is not right for everyone to take, it is not right for anyone to take.
Which of the following is a primary drawback to the "do anything anywhere" computing environment?
It blurs the traditional boundaries between work and family time.
To consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making, you would use a(n)
KMS
A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Kant's Categorical Imperative
You would use a(n) ________ in order to determine which of your suppliers has the best and worst records for keeping to your production schedule?
MIS
A relocation control system that reports summaries on the total moving, house hunting, and home financing costs for employees in all company divisions would fall into the category of
Management information systems
The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called
Management informations systems
________ are created by combining and customizing components from different online software applications.
Mashups
________ states that the value or power of a network grows exponentially as a function of the number of network members.
Metcalfe's law
________ is a new data analysis technology that finds hidden connections between data in disparate sources.
NORA
________ uses individual atoms and molecules to create computer chips and other devices thinner than a human hair.
Nanotechnology
Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?
RSI
________ means that you accept the potential costs and obligations for the decisions you make.
Responsibility
Taking the action that produces the least harm best describes the
Risk Aversion Principle.
________ enable management to make better decisions regarding organizing and scheduling sourcing, production, and distribution.
SCMs
Which of the following decisions requires knowledge based on collaboration and interaction?
Should we work with outside vendors on new products and services?
Which of the following statements about collaboration is not true?
Successful collaboration can be achieved through technology regardless of the organization's culture or structure.
If your main supplier was late in delivering goods, which type of system would you use to update your production schedule?
TPS
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
The opt-in model
Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.
True
________ allows a single computing resource, such as a server, to appear to the user as multiple logical resources.
Virtualization
The Federal Trade Commission FIP principle of Notice/Awareness states that
Web sites must disclose their information practices before collecting data.
________ provides a standard format for data exchange, enabling Web services to pass data from one process to another.
XML
Running a Java program on a computer requires
a Java Virtual Machine to be installed on that computer.
Today's nanotechnology-produced computer transistors are roughly equivalent in size to
a virus
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.
accountability
Walmart's continuous replenishment system allows it to
achieve low-cost leadership
walmarts attempts to increase its online presence is an example of a firm using information systems to
achieve low-cost leadership
Nike's forays into information technology represent an effort to
achieve product differentiation
Which of the following is not a major feature of organizations that impacts the use of information systems?
agency costs
the introduction of the minicomputer
allowed computers to be customized to specific needs of departments or business units
The introduction of the minicomputer
allowed computers to be customized to the specific needs of departments or business units.
Which of the following is the most popular mobile operating system?
android
An example of a keystone firm within a business ecosystem is
apple and software application writers in the mobile platform ecosystem
A(n) ________ server is used to communicate between a Web server and an organization's back-end systems.
application server
Legacy systems are still used because they
are too expensive to redesign
an example of synergy in business is
bank of america
________ enables advertisers to display more relevant ads based on user's search and browsing history.
behavioral targeting
An activity businesses perform to measure and compare business processes to similar processes of other companies within their industry is
benchmarking
What are the most successful solutions or methods for achieving a business objective?
best practices
Which of the following is not one of the types of information gathered by Web site tracking tools?
birthplace
________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks.
blade servers
The phenomenon of employees using their own devices in the workplace is known as
bod
A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a Web
browser
How are information systems used at the industry level to achieve strategic advantage?
by building industry-wide, IT-supported consortia and symposia
How do information systems enhance core competencies?
by encouraging the sharing of knowledge across business units
The interaction between information systems and organizations is influenced
by the development of new information technologies
Unlike regular browser cookies, Flash cookies
cannot be easily detected or deleted
Which of the following is a leading networking hardware provider?
cisco
All of the following industries have been disrupted by the Internet except
clothing
The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called
cloud computing
Which of the following objectives best describes the business strategy behind the technologies implemented by the San Francisco Giants, as discussed in the chapter case?
competitive advantage
Interpretations of Moore's law assert that
computing power doubles every 18 months
________ protects the creators of intellectual property from having their work copied by others.
copyright law
A(n) ________ is an activity at which a firm excels as a world-class leader.
core competency
An example of a cross-functional business process is
creating a new product
The most common reason business systems fail is
data quality
________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance.
decision-support
U.S. businesses are allowed to use personal data from EU countries if they
develop equivalent privacy protection policies
The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide.
digital
In ________, digital technology and the Internet are used to execute the major business processes in the enterprise.
e-business
Using the Internet to buy or sell goods is called
e-commerce
What is the most important function of an enterprise application?
enabling business functions and departments to share information
The Online Privacy Alliance
encourages self regulation to develop a set of privacy guidelines for its members.
Which of the following is a firm's CPO responsible for?
ensuring that the company complies with existing data privacy laws
A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.
enterprise
Which of the following systems is designed to support organization-wide process coordination and integration?
enterprise applications
The development of TCP/IP occurred during the ________ era.
enterprise computing
________ systems are also known as enterprise systems.
enterprise resource planning
The four major enterprise applications are
enterprise systems, SCMs, CRMs, and KMSs.
The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is
ethernet
The ethical "no free lunch" rule states that
everything is owned by someone else, and that the creator wants compensation for this work.
Which of the following systems would you expect to deliver integrated, personalized business content through a Web portal interface?
executive support systems
All of the following are competitive forces except
external environment
Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers?
extranet
You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. Which type of system will most efficiently provide a solution?
extranet
CVS refers to
eyestrain related to computer display screen use
CVS refers to
eyestrain related to computer display screen use.
A primary example of centralized processing is client/server computing.
false
According to several court findings, the general functional features of software are protected by copyright law.
false
Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person.
false
An inventory control system is an example of an MIS.
false
Application server software is responsible for locating and managing stored Web pages.
false
COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.
false
Creative work driven by new knowledge and information is an insignificant part of management responsibility.
false
Cross-functional systems are being phased out in favor of systems that support business processes within a single functional group, such as human resources.
false
Decision-support systems are most commonly used by the operations management level of an organization.
false
For nonroutine decision making, senior managers rely on management information systems.
false
Gaining unapproved access to a computer is not a federal crime.
false
High product differentiation is a sign of a transparent marketplace.
false
IT infrastructure consists of just those physical computing devices required to operate the enterprise.
false
Identifying customers is a business process handled by the human resources function.
false
In today's legal environment, business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted.
false
Most TPSs use sophisticated mathematical models or statistical techniques.
false
Operational managers use ESS primarily to solve specific problems.
false
Production tasks are coordinated through the use of social networks in social business.
false
Quantum computing is implemented primarily with enterprise or ISP servers.
false
SANs maintain a series of servers and provide fee-paying subscribers with space to maintain their Web sites.
false
Software programs were unprotected by copyright law until the early 1990s.
false
Some organizations lack bedrock, unassailable assumptions that define their goals and products.
false
Spam is legally defined as any e-mail that is unsolicited.
false
TCO refers to the original cost of purchased technology: both hardware and software.
false
The European Parliament has yet to ban unsolicited commercial messaging.
false
The effect of the Internet has been to decrease the bargaining power of customers.
false
The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle.
false
The routine violation of individual privacy is made more difficult by advances in data storage.
false
The technology trends exhibited by Portugal Telecom, as discussed in the chapter opening case, illustrate the shift away from green computing.
false
The use of Internet technologies allows companies to more easily sustain competitive advantage.
false
Web services can exchange information between two different systems only if the operating systems and programming languages upon which the systems are based are identical.
false
You would use an MIS to help determine if your business should introduce a new product line.
false
an inventory control system is an example of an MIS
false
in he value chain model, support activities are most directly related to the production and distribution of the firm's products and services, which create value
false
In 2010, the FTC added all of the following recommendations to its privacy guidelines except
firms should limit the length of time that any personal data is stored to six months or less.
An example of a divisionalized bureaucracy is a An example of a divisionalized bureaucracy is a
fortune 500 firm
Which of the following is a highly structured decision?
granting credit to a customer
The strength of patent protection is that it
grants a monopoly on underlying concepts and ideas.
the value chain model
highlight specific activities in the business where competitive strategies can best be applies
How would you determine the market demand for your firm's IT services?
hold focus groups to assess your services
SaaS refers to
hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
In environmental scanning, a firm may use information systems to
identify external events that may affect it
Which of the following is not a business benefit of collaboration?
improved compliance with government regulations
FWO's use of SharePoint for project management is an example of using information systems to achieve which business objective?
improved decision making
The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and
improved decision making
Verizon Corporation's use of a Web-based digital dashboard to provide managers with precise real-time information illustrates which business objective?
improved decision making
Which of the following represent the primary activities of a firm?
inbound logistics, operations, outbound logistics, sales and marketing, and service
Which of the following is not one of the current key technology trends that raises ethical issues?
increase in multimedia quality
Re-designing and automating business processes can be seen as a double-edged sword because
increases in efficiency may be accompanied by job losses.
The central business activities of ChoicePoint raise which of the five moral dimensions?
information rights and obligations
All of the following are considered disruptive technologies except
instant messaging
Which of the following best describes intellectual property?
intangible property created by individuals or corporations
Which of the following are key corporate assets?
intellectual property, core competencies, and financial and human assets
Why does Amazon.com need to worry about competitors in online shopping?
internet technologies are universal, and therefore usable by all companies
All of the following statements regarding IBM Notes are true except which one?
it began as an e-mail and messaging client
All of the following statements are true about information technology's impact on business firms except
it helps firms expand in size
Which of the following is the primary reason that the practice of spamming has grown exponentially?
it is very inexpensive and can reach so many people
How does the technical view of organizations fall short of understanding the full impacts of information systems in a firm?
it sees the inputs and outputs, labor and capital, as being infinitely malleable
Executive support systems are information systems that support the
long-range planning activities of senior management.
Amazon's use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates a use of information services for
low-cost leadership
The four major competitive strategies are
low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy.
Mintzberg classifies a large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management as a ________ bureaucracy.
machine
The Internet raises the bargaining power of customers by
making information available to everyone
An information systems manager
manages data entry stuff
A business process in the ________ function is producing bills of material.
manufacturing and production
Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors.
market niche
________ are created by combining and customizing components from different online software applications.
mashups
The ability to offer individually tailored products or services using the same production resources as bulk production is known as
mass customization
The term "management information systems" designates a specific category of information systems serving
middle management functions.
A firm can exercise greater control over its suppliers by having
more suppliers
Privacy protection in the United States is ________ in Europe.
much less stringent than
A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.
multicore processor
Which of the following is not one of the current software platform trends?
multicore processors
________ surfaces allow users to gesture on a screen with several fingers to execute commands.
multitouch
________ uses individual atoms and molecules to create computer chips and other devices thinner than a human hair.
nanotechnology
A manufacturer of deep-sea oil rigs may be least concerned about this marketplace force.
new market entrants
Cookies created during Web site visits are stored
on the users computer
Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use?
on-demand
Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use? on-
on-demand
Which type of software is created and updated by a worldwide community of programmers and available for free?
open source
Software that manages the resources of the computer is called
operating system software
Which of the following is not an IT infrastructure service component?
operating system software
Software that manages the resources of the computer is called
operating system software.
In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is
operational management
The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is
operations research
Disciplines that contribute to the technical approach to information systems are
operations research, management science, and computer science.
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.
opt-out
The practice of contracting custom software development to an outside firm is commonly referred to as
outsourcing
Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years?
patent
You are consulting for a cosmetics distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step?
perform a strategic systems analysis
The divergent viewpoints about how resources, rewards, and punishments should be distributed, and the struggles resulting from these differences are known as
politics
Which of the following roles in a firm would be least affected by using mobile devices to access firm information systems?
production workers
Under Mintzberg's classification of organizational structure, the knowledge-based organization where goods and services depend on the expertise and knowledge of professionals falls under the category of
professional bureaucracies
________ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.
profiling
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of
quality of life
The ability to be in many different states at once, dramatically increasing processing power, is a hallmark of
quantum computing
The ability to be in many different states at once, dramatically increasing processing power, is a hallmark of
quantum computing.
Order data for baseball tickets and bar code data are examples of
raw input
Which of the following is not one of the NIST defined characteristics of cloud computing?
reduced elasticity
________ are not held liable for the messages they transmit.
regulated common carriers
Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix?
remote/colocated
The U.S. CAN-SPAM Act of 2003
requires spammers to identify themselves
________ means that you accept the potential costs and obligations for the decisions you make.
responsibility
Which of the following industries has a low barrier to entry?
restaurant
Business processes are collections of
routines
Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?
rsi
The ________ framework developed by the U.S. Department of Commerce allows U.S. businesses to legally use personal data from EU countries.
safe-harbor
The ________ function is responsible for identifying customers.
sales and marketing
a substitute product of most concern for a cable tv distributor is
satellite tv
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?
scalability
network economics
sees the cost of adding new members as inconsequential
Which level of the organization are ESS specifically designed to serve?
senior management
When a software product is considered ________, it becomes difficult to hold software producers liable for flaws in their product.
similar to books
As per the ________, if an action cannot be taken repeatedly, it is not right to take at all.
slippery-slope rule
A corporation that funds a political action committee, which in turn promotes and funds a political candidate who agrees with the values of that corporation, could be seen as investing in which main category of complementary assets?
social
Data management technology consists of the
software governing the organization of data on physical storage media.
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as
software packages.
A SAN is a ________ network.
storage area
Sociotechnical changes affecting a firm adopting new information systems requiring organizational change can be considered
strategic transitions
A competitive force challenging the publishing industry is
substitute products or services
Which type of system integrates supplier, manufacturer, distributor, and customer logistics processes?
supply-chain management system
The parts of an organization's infrastructure, human resources, technology, and procurement that make the delivery of the firm's products or services possible are known as ________ activities.
support
The temp agency that you own is having serious difficulties placing temps because few of them are familiar with Internet research. Investing in training software to enhance your workers' skills is an example of using technology to achieve which business objective?
survival
When two organizations pool markets and expertise that result in lower costs and generate profits, it is referred to as creating
synergies
The principal liaison between the information systems groups and the rest of the organization is a(n)
system-analyst
According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are
tasks, technology, people, and structure
Which of the following is one of the support activities in a firm's value chain?
technology
Specifications that establish the compatibility of products and the ability to communicate in a network are called
technology standards
Specifications that establish the compatibility of products and the ability to communicate in a network are called
technology standards.
Which type of infrastructure service provides voice and video connectivity to employees, customers, and suppliers?
telecommunications
Thomas Friedman's declaration that the world was now "flat" meant that
the Internet has reduced the economic advantages of developed countries.
A managerial element in the UPS tracking system described in the chapter is
the decision to use automation.
"Look and feel" copyright infringement lawsuits are concerned with
the distinction between an idea and its expression.
"Look and feel" copyright infringement lawsuits are concerned with
the distinction between idea and its expression
From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called
the information value chain
Using ________ to enable government relationships with citizens, businesses, and other arms of government is called e-government.
the internet and networking technologies
The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output. This is referred to as
the law of diminishing returns
Which of the following best describes the basis for the FIP principles?
the mutuality of interest between the record holder and the individual
All of the following are reasons for the increased business focus on collaboration and teamwork, except for
the need for more efficient work hierarchies
________ restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information.
the privacy act of 1974
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when
the software is widely distributed
Which of the following tools would you use to evaluate and choose a collaboration tool for your organization?
the time/space collaboration and social tool matrix
In a multi-tiered network
the work of the entire network is balanced over several levels of servers.
One of the drawbacks of patent protection is
the years of waiting to receive it.
Which of the following best describes how new information systems result in legal gray areas?
they result in new situations that are not covered by old laws
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
total cost of ownership
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
total cost of ownerships
As referred to in the text, legacy systems are
traditional mainframe-based business information systems.
When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as
transaction costs
To monitor the status of internal operations and the firm's relations with the external environment, managers need ________ systems.
transaction processing
A(n) ________ is typically a major source of data for other systems.
transaction processing system
'Synergies' occur when the output of some units in a firm can be used as inputs to other units, lowering cost and generating profits.
true
A Facebook users' visit to a Web site can be tracked even if they do not click a Like button.
true
A company's competitive advantages ultimately translate into higher stock market valuations than its competitors.
true
A key word in social business is "conversations."
true
A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals.
true
An application server may reside on the same computer as a Web server or on its own dedicated computer.
true
An efficient customer response system directly links consumer behavior to distribution and production and supply chains.
true
An organization's MIS and DSS supply an ESS with summarized information.
true
Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.
true
Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.
true
Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical.
true
Copyright is the legal protection afforded intellectual property, including drawings, movies, and maps.
true
Customers are one of the competitive forces that affect an organization's ability to compete.
true
DSS are used by managers to make decisions about problems that are unusual and not easily specified in advance.
true
DSS use internal information as well as information from external sources.
true
Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.
true
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
true
Global firms can collaborate from different locations at the same time using synchronous collaboration tools.
true
Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.
true
In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers.
true
In a demonstration of network economics, the more people that use eBay's site, the greater the value of the site.
true
In recent years, the illegal sharing of music files has declined with the improvement of technological prevention.
true
Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses.
true
Laws and regulations creating fair, stable market environments are examples of complementary social assets required to optimize returns from IT investments.
true
Liability is a feature of political systems and allows individuals to recover damages done to them by others.
true
MIS job growth is projected to be 50% greater than other jobs in the next five years.
true
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
true
Mass customization offers individually tailored products or services using the same resources as mass production.
true
Most Internet businesses do very little to protect the privacy of their customers.
true
One example of a business process is shipping a product to a customer.
true
One of the key concepts in patent law is novelty.
true
Research has shown that a majority of firms are able to align their information technology with their business goals.
true
Routines are also called standard operating procedures.
true
Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
true
Supply chain management systems are more externally oriented than enterprise systems.
true
Switching costs increase when customers are strongly linked to products and platforms.
true
The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.
true
The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.
true
The operating system is used to manage the computer's activities.
true
The problem with Web browsers' Do Not Track options is that Web sites aren't obligated to honor these settings.
true
The rate of global piracy is approximately 42%.
true
The symptoms of technostress include aggravation and hostility toward humans.
true
The term business ecosystem describes the loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers.
true
Today, many business firms continue to operate their legacy systems that meet a business need and would be costly to replace.
true
Transaction-level information is essential for operational management to be able to direct the day-to-day operations of the business.
true
Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user's online behavior.
true
Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks.
true
an organization is a
true
routines are also called standard operating procedures
true
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
trueSpam is legally defined as any e-mail that is unsolicited.
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n)
two-tiered client/server architecture
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n)
two-tiered client/server architecture.
All of the following are current hardware platform trends except
unix
The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is
unix
a virtual company
uses networks to link people, assets, and ideas
An example of an organizational complementary asset is
using the appropriate business model.
A collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively is called a(n)
value web
A(n) ________ is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market.
value web
________ is a collaboration tool that supports remote (different place), synchronous (same time) collaboration.
video conferencing
________ allows a single computing resource, such as a server, to appear to the user as multiple logical resources.
virtualization
All of the following are cloud computing services except
virtualization as a service.
All of the following are IT-enabled products and services providing competitive advantage except
walmart's retailing system
A recent addition to the mobile digital platform is
wearable computing devices
A recent addition to the mobile digital platform is
wearable computing devices.
Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to as
web services
The Federal Trade Commission FIP principle of Notice/Awareness states that
web sites must disclose their information practices before collecting data.
Which of the following factors does not help explain why computing resources today are ever more available than in previous decades?
widespread rejection of technology standards
The ________ PC, becoming the standard PC in the Personal Computer Era, uses the Windows operating system software on a computer with an Intel microprocessor.
wintel
________ provides a standard format for data exchange, enabling Web services to pass data from one process to another.
xml
Network economics
yes the cost of adding new members as inconsequential
Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?
your firm's organizational culture
At what percent of capacity do most servers operate?
15-20%
Hardware and software acquisition costs account for about ________ percent of TCO.
20
Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer.
5,4,3,2,1
________ allows you to communicate with avatars using text messaging.
A virtual world
The phenomenon of employees using their own devices in the workplace is known as
BYOD
A ________ is a senior manager who oversees the use of IT in the firm.
CIO
The ________ helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes.
CKO
Which of the following is a leading networking hardware provider?
Cisco