BMIS 311

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements about Internet security is not true? A. VoIP is more secure than the switched voice network. B. The use of P2P networks can expose a corporate computer to outsiders. C. A corporate network without access to the Internet is more secure than one that provides access. D. Smartphones have the same security weaknesses as other Internet devices. E. Instant messaging can provide hackers access to an otherwise secure network.

A. VoIP is more secure than the switched voice network.

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? A. War driving B. Snooping C. Cybervandalism D.Sniffing E. Drive-by tapping

A. War driving

Which of the following factors does not help explain why computing resources today are even more available than in previous decades? A. Widespread rejection of technology standards B. Moore's law C. Law of mass digital storage D. Declining communications costs and the Internet E. Network economic

A. Widespread rejection of the technology standards

Which of the following is the foundation technology for web services? A. XML B. SCSI C. SOAP D. HTML E. UDDI

A. XML

Running a Java program on a computer requires: A. a Java Virtual Machine to be installed on that computer. B. a Java Virtual Machine to be installed on the server hosting the Java applet. C. the Mozilla Firefox browser and no other browsers. D. a miniature program to be downloaded to the user's computer. E. no specialized software, as Java is platform-independent.

A. a Java Virtual Machine to be installed on that computer.

All of the following are steps in the process for analyzing an ethical issue except: A. assigning responsibility. B. identifying the potential consequences of your options. C. identifying the options you can reasonably take. D. identifying the stakeholders. E. identifying and clearly describing the facts

A. assigning responsibility.

The most successful solutions or methods for achieving a business objective are called: A. best practices. B. best processes. C. benchmarks. D. core competencies. E. value activities

A. best practices.

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A. bps. B. Hertz. C. RPMs. D. gigaflops. E. baud

A. bps

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect. A. bullwhip B. network C. diffraction D. ripple E. whirlpool

A. bullwhip

The measurement of the number of customers who stop using or purchasing products or services from a company is called: A. churn rate. B. CLTV. C. switch rate. D. switching costs. E. turnover percentage.

A. churn rate.

All of the following job categories are expected to grow over the next eight years except: A. computer programmers. B. software engineers. C. computer support specialists. D. systems analysts. E. database administrators

A. computer programmers

All of the following are technical solutions to protecting user privacy except: A. data use policies. B. e-mail encryption. C. anonymous email. D. preventing client computers from accepting cookies. E. anonymous surfing.

A. data use policies

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A. digital B. broadband C. analog D. modulated E. T1

A. digital

Which of the following best illustrates the transaction fee revenue model? A. eBay receives a small fee from a seller if a seller is successful in selling an item. B. Yelp receives a fee after steering a customer to a participating website where he or she makes a purchase. C. Pandora provides basic services for free, but charges a premium for advanced services. D. Apple accepts micropayments for single music track downloads. E. Netflix charges customers a monthly fee for access to its library of movies.

A. eBay receives a small fee from a seller if a seller is successful in selling an item.

A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business. A. enterprise B. knowledge management C. transaction processing D. automatic reporting E. management information

A. enterprise

All of the following are competitive forces in Porter's model except: A. external environment. B. substitute products. C. new market entrants. D. customers. E. suppliers.

A. external environment

Data mining allows users to: A. find hidden relationships in data. B. summarize massive amounts of data into much smaller, traditional reports. C. access the vast amounts of data in a data warehouse. D. quickly compare transaction data gathered over many years. E. obtain online answers to ad-hoc questions in a rapid amount of time.

A. find hidden relationships in data.

In the ________ revenue models, a firm offers some services for free but charges a subscription fee for premium services. A. free/freemium B. transaction fee C. subscription D. sales E. affiliate

A. free/freemium

The value chain model: A. highlights specific activities in the business where competitive strategies can best be applied. B. categorizes four basic strategies a firm can use to enhance its value chain. C. sees the supply chain as the primary activity for adding value. D. enables more effective product differentiation. E. categorizes five related advantages for adding value to a firm's products or services.

A. highlights specific activities in the business where competitive strategies can be best applied.

The Sarbanes-Oxley Act: A. imposes responsibility on companies and management to safeguard the accuracy of financial information. B. identifies computer abuse as a crime and defines abusive activities. C. specifies best practices in information systems security and control. D. outlines medical security and privacy rules. E. requires financial institutions to ensure the security of customer data.

A. imposes responsibility on companies and management to safeguard the accuracy of financial information.

GDSS capabilities have improved along with all of the followingexcept: A. increase in dedicated conference rooms. B. growth of cellular networks. C. improved power of desktop PCs. D. explosion of mobile computing. E. expansion of Wi-Fi bandwidth

A. increase in dedicated conference rooms.

Components or parts of finished products are referred to as: A. intermediate products. B. secondary products. C. raw materials. D. mid-chain products. E. upstream materials

A. intermediate products.

A ________ is an example of pre-digital data storage that is comparable to a database. A. library card catalog B. cash register receipt C. schedule of due dates on a project outline D. list of sales totals on a spreadsheet E. doctor's office invoice

A. library card catalog

Which of the following best describes the digital social graph? A. A mapping of all online social relationships B. All of a person's closest digital relationships C. A person's direct and indirect relationships D. All of the online and offline relationships a person has E. All of the relationships in an online community

A. A mapping of all online social relationships

Which of the following is the best description of a protocol in a telecommunications network architecture? A. A standard set of rules and procedures for control of communications in a network B. The main computer in a telecommunications network C. A pathway through which packets are routed D. A device that handles the switching of voice and data in a local area network E. A communications service for microcomputer users.

A. A standard set of rules and procedures for control of communications in a network

What are the four layers of the TCP/IP reference model? A. Application, Transport, Internet, and Network Interface B. Application, Hardware, Internet, and Network Interface C. Software, Hardware, Network Interface, Internet D. Physical, Application, Internet, and Network Interface E. Physical, application, transport, and network interface

A. Application, Transport, Internet, and Network Interface

Firms that allow employees to use their own devices are embracing which of the following? A. BYOD B. Cloud computing C. Mobile consolidation D. Self computing E. Wearable computing

A. BYOD

Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry? A. Benchmarking B. Strategic systems analysis C. Secondary activities D. Value chain analysis E. Best practices

A. Benchmarking

Which of the following techniques is used for knowledge discovery? A. Data mining B. Fuzzy logic C. Expert system D. CBR E. Transaction processing systems

A. Data mining

Which of the following is the most common reason that business systems fail? A. Data quality B. Hardware failures C. Software errors D. Facilities failures E. Software bugs

A. Data quality

________ creates confusion that hampers the creation of information systems that integrate data from different sources. A. Data redundancy B. Batch processing C. Data quality D. Data independence E. Online processing

A. Data redundancy

Which supply chain planning function determines how much product is needed to satisfy all customer demands? A. Demand planning B. Order planning C. Customer planning D. Replenishment planning E. Distribution management

A. Demand planning

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A. Due process B. Liability C. Accountability D. Responsibility E. The judicial system

A. Due process

Amazon.com is known primarily for its use of which of the following business models? A. E-tailer B. Market creator C. Portal D. Content provider E. Transaction broker

A. E-tailer

Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes? A. ERP systems B. Process management software C. Supply chain management systems D. Groupware E. CRM software

A. ERP systems

What is the most important function of an enterprise application? A. Enabling business functions and departments to share information B. Increasing speed of communicating C. Enabling cost-effective e-business processes D. Enabling inventory and supply chain management E. Enabling a company to work collaboratively with customers and suppliers

A. Enabling business functions and departments to share information

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? A. Slippery-slope rule B. Utilitarian principle C. Golden Rule D. High-failure cost rule E. Lemming rule

A. Slippery-slope rule

On which of the following protocols is the Internet based? A. TCP/IP B. HTTP C. FTP D. DNS E. IMA

A. TCP/IP

Which of the following best illustrates the relationship between entities and attributes? A. The entity CUSTOMER with the attribute PURCHASE B. The entity PURCHASE with the attribute CUSTOMER C. The entity CUSTOMER with the attribute PRODUCT D. The entity PRODUCT with the attribute CUSTOMER E. The entity PRODUCT with the attribute PURCHASE

A. The entity CUSTOMER with the attribute PURCHASE.

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? A. Trade secret B. Patent C. Trademark D. All forms of intellectual property protection E. Copyright

A. Trade secret

Which of the following is an example of a legacy system? A. Transaction processing system running on a mainframe B. Scalable grid computing system C. Web services running on a cloud computing platform D. MDM software E. Quantum computing system

A. Transaction processing system running on a mainframe

Which quality dimension of information is concerned that the data values of an information source fall within a defined range? A. Validity B. Consistency C. Accessibility D. Timeliness E. Completeness

A. Validity

Which of the following statements about botnets is not true? A. Eighty percent of the world's malware is delivered by botnets. B. It is not possible to make a smartphone part of a botnet. C. Ninety percent of the world's spam is delivered by botnets. D. Botnets are often used to perpetrate DDoS attacks. E. Botnets are often used for click fraud.

B. It is not possible to make a smartphone part of a botnet.

Measures defined by management and used to internally evaluate the success of a firm's financial, business process, customer, and learning and growth are called: A. BPM. B. KPIs. C. the balanced scorecard method. D. parameters. E. benchmarks.

B. KPIs.

Which of the following is not one of the main four dimensions of knowledge described in the chapter? A. Knowledge has a location. B. Knowledge is timeless. C. Knowledge is a firm asset. D. Knowledge is situational. E. Knowledge has different forms

B. Knowledge is timeless.

An ESS supports which of the following? A. Decision making and administrative activities of middle managers B. Long-range planning activities of senior management C. Day-to-day processes of production D. Knowledge and data workers in an organization E. Transactional needs of the organization

B. Long-range planning activities of senior managment

________ states that the value or power of a network grows exponentially as a function of the number of network members. A. Law of networks B. Metcalfe's Law C. Law of scalability D. Law of outsourcing E. Moore's Law

B. Metcalfe's Law

Which of the following are most likely to rely primarily on the drill-down functionality of BI for their decision making needs? A. Business analysts B. Middle managers C. IT developers D. Senior executives E. Operational employees

B. Middle managers

Which of the following marketplace forces would be of least concern to a manufacturer of deep-sea oil rigs? A. Product differentiation B. New market entrants C. Low number of customers D. Traditional competitors E. Low number of suppliers

B. New market entrants

Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? A. MAN B. Peer-to-peer C. LAN D. Windows domain network E. Wireless

B. Peer-to-peer

Which of the following would not be considered semistructured knowledge? A. Email B. Request for proposals C. Brochures D. Voice mail E. Videos

B. Requests for proposals

_______ means that you accept the potential costs and obligations for the decisions you make. A. Accountability B. Responsibility C. Liability D. Due process E. Duty

B. Responsibility

Which level of the organization is an ESS specifically designed to serve? A. Knowledge workers B. Senior management C. Operational D. End-user E. Middle management

B. Senior management

________ knowledge exists in formal documents, as well as in formal rules that organizations derive by observing experts and their decision-making behaviors. A. Explicit B. Structured C. Tacit D. Management E. Unstructured

B. Structured

Removing the business process layers in a distribution channel is called: A. network effects. B. disintermediation. C. market transparency. D. market segmentation. E. BPR

B. disintermediation.

Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other. A. ERP systems B. e-business suites C. legacy systems D. middleware E. cloud solutions.

B. e-business suites

The concept of management ________ describes situations in which managers act on preconceived notions that reject information that does not conform to their prior conceptions. A. biases B. filters C. backgrounds D. inefficiency E. politics

B. filters

Which of the following types of e-commerce involves businesses selling goods and services directly to individuals via the Internet? A. M-commerce B. P2P e-commerce C. B2B e-commerce D. B2C e-commerce E. C2C e-commerce

B2C e-commerce

Which of the following is a highly structured decision? A. Calculating the best trucking routes for product delivery B. Estimating the effect of changing costs of supply materials C. Granting credit to a customer D. Creating a new product E. Forecasting new industry trends

C. Granting credit to a customer

Which of the following technologies would you use to analyze the social media data collected by a major online retailer? A. OLAP B. Data mart C. Hadoop D.DBMS E. Data warehouse

C. Hadoop

Forward chaining is: A. a method of organizing expert system knowledge into chunks. B. a strategy for searching the rule base in an expert system that begins with a hypothesis. C. a strategy for searching the rule base in an expert system that begins with information entered by the user. D. the programming environment of an expert system. E. a programming algorithm used to create a virtual world using VRML

C. a strategy for searching the rule base in an expert system that begins with information entered by the user.

Walmart's attempt to increase its online presence is an example of a firm using information systems to: A. focus on market niche. B. simplify the industry value chain. C. achieve low-cost leadership. D. strengthen ties to its customers. E. develop synergies

C. achieve low-cost leadership.

The introduction of the minicomputer: A. strengthened centralized computing. B. was dominated by IBM. C. allowed computers to be customized to the specific needs of departments or business units. D. represented the rise of Microsoft. E. offered new, powerful machines at higher prices than mainframes.

C. allowed computers to be customized to the specific needs of departments or business units.

Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party. A. complexity B. transparency C. asymmetry D. discrimination E. competition

C. asymmetry

Enterprise software is built around thousands of predefined business processes that reflect: A. cutting edge workflow analyses. B. industry benchmarks. C. best practices. D. government regulations. E. the firm's culture.

C. best practices.

The interaction between information technology and organizations is influenced: A. by the rate of growth of the organization. B. solely by the decision making of middle and senior managers. C. by many factors, including structure, politics, culture, and environment. D. by two main macroeconomic forces: capital and labor. E. by the development of new information technologies.

C. by many factors, including structure, politics, culture, and environment.

Instant messaging is a type of ________ service. A. wireless B. network C. chat D. cellular E. e-mail

C. chat

The telephone system is an example of a ________ network. A. wireless B. packet-switched C. circuit-switched D. peer-to-peer E. client/server

C. circuit-switched

A drawback to high velocity, automated decision-making systems is that they are unable to: A. handle structured decisions. B. be applied to situations outside of the financial world. C. control themselves and respond to new environments. D. handle semi structured decisions. E. handle high volumes of decisions

C. control themselves and respond to new environments.

Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of: A. long-tail marketing. B. prediction markets. C. crowdsourcing. D. social shopping. E. behavioral targeting.

C. crowdsourcing.

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its: A. atmosphere. B. mission. C. culture. D. business process. E. environment.

C. culture

The total time it takes to complete a business process, from start to finish, is called its ________ time. A. fulfillment B. development C. cycle D. service E. actualization

C. cycle

DBMSs typically include report generating tools in order to: A. display data in graphs. B. retrieve and display data. C. display data in an easier-to-read format. D. analyze the database's performance. E. perform predictive analysis

C. display data in an easier-to-read format

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: A. consumers should be able to review and contest the accuracy and completeness of data. B. firms should require consumer consent and provide clear options to opt out of data collection. C. firms should limit the length of time that any personal data is stored to six months or less. D. firms should increase the transparency of their data collection. E. firms should build products and services that protect privacy

C. firms should limit the length of time that any personal data is stored to six months or less.

Psychologists study information systems with an eye to understanding: A. how systems affect individuals, groups, and organizations. B. the production of digital goods. C. how human decision makers perceive and use formal information. D. how new information systems change the control and cost E. mathematically based models and physical technology.

C. how human decision makers perceive and use formal information

The expenses incurred by a customer or company in lost time and resources when changing from one supplier or system to a competing supplier or system are known as: A. retention costs. B. differentiation costs. C. switching costs. D. preservation costs. E. variation costs.

C. switching costs.

The principal liaison between the information systems groups and the rest of the organization is a(n): A. CIO. B. CTO. C. systems analyst. D. information systems manager. E. programmer.

C. systems analyst

Specifications that establish the compatibility of products and the ability to communicate in a network are called: A. network standards. B. Internet standards. C. technology standards. D. compatibility standards. E. telecommunications standards.

C. technology standards.

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A. the utilitarian principle B. the risk aversion principle C. the Golden Rule D. the "no free lunch" rule E. Kant's categorical imperative

C. the Golden Rule

The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as: A. the point of no return. B. network inelasticity. C. the law of diminishing returns. D. virtual economics. E. supply and demand.

C. the law of diminishing returns.

Output: A. is information that is returned to appropriate members of the organization to help them evaluate the input stage. B. converts raw input into a meaningful form. C. transfers processed information to the people who will use it or to the activities for which it will be used. D. is feedback that has been processed to create meaningful information. E. transfers data to the people who will use it or to the activities for which it will be used

C. transfers processed information to the people who will use it or to the activities for which it will be used.

All of the following are unique features of e-commerce technology, except: A. global reach. B. interactivity. C. transparency. D. richness. E. personalization/customization

C. transparency.

A(n) ________ is software for locating and managing stored web pages. A. net server B. router C. web server D. modem E. hub

C. web server

According to Ponemon Institute's 2015 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately: A. $1.5 billion. B. $150 million. C. $15 billion. D. $15 million. E. $1.5 million

D. $15 million.

________ is malware that logs and transmits everything a user types. A. Spyware B. A worm C. A Trojan horse D. A keylogger E. A sniffer

D. A keylogger

How much did American businesses spend on information systems hardware, software, and telecommunications equipment in 2015? A. About $100 million B. About $10 trillion C. About $100 billion D. About $1 trillion E. About $1 billion

D. About $1 trillion

Which signal types are represented by a continuous waveform? A. Digital B. Laser C. Optical D. Analog E. RFID

D. Analog

The most appropriate wireless networking standard for creating PANs is: A. I-mode. B. IEEE 802.11b. C. RFID. D. Bluetooth. E. Wi-Fi.

D. Bluetooth.

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? A. Legacy systems B. Security policy C. Vulnerabilities D. Controls E. SSID standards

D. Controls

Which of the following types of information systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance? A. TPS B. RPS C. MIS D. DSS E. KMS

D. DSS

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? A. Technostress B. CVS C. CTS D. Digital divide E. RSI

D. Digital divide

Which of the following would you use to forecast trends in your supplier's industry that could affect your firm over the next five years? A. MIS B. DSS C. TPS D. ESS E. KMS

D. ESS

An information system that combines data from internal TPS with information from financial systems and external sources to deliver reports such as profit loss statements and impact analyses, is an example of: A. DSS. B. CDSS. C. MIS. D. ESS. E. GIS

D. ESS.

Geoadvertising sends ads to users based on their: A. shopping preferences. B. Google Maps settings. C. home addresses. D. GPS locations. E. website behaviors

D. GPS locations.

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? A. Cloud computing B. Capacity planning C. Utility computing D. Green computing E. On-demand computing

D. Green computing

Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? A. IoP application B. GPS application C. BLE application D. IoT application E. Web 3.0 application

D. IoT application

Which of the following statements about the technical view of organizations is not true? A. It sees the organization as a social structure similar to a machine. B. It emphasizes group relationships, values and structures. C. It sees information systems as a way to rearrange the inputs and outputs of the organization. D. It sees the inputs and outputs, labor and capital, as being infinitely malleable. E. It sees capital and labor as primary production factors

D. It sees the inputs and outputs, labor and capital, as being infinitely malleable.

Which of the following statements best describes the relationship between collaboration and knowledge management? A. Knowledge is impossible without collaboration. B. Knowledge is the result of collaboration. C. Collaboration is impossible without knowledge. D. Knowledge is useful only when shared with others. E. As knowledge improves, so does collaboration

D. Knowledge is useful only when shared with others.

Which of the following is a tool for the management, delivery, tracking, and assessment of various types of employee learning? A. Investment workstation B. Organizational learning system C. Employee enrichment system D. LMS E. Employee management system

D. LMS

________ attempts to leverage the fact that there is always some demand, however small, for a product. A. Demand prediction software B. Behavioral targeting C. Crowdsourcing D. Long tail marketing E. Lead generation marketing

D. Long tail marketing

Which of the following deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm? A. Information technology infrastructure B. Business processes C. Information systems literacy D. Management information systems E. Information systems architecture

D. Management information systems

Information systems enhance core competencies by: A. providing better reporting facilities. B. fostering synergies among departments. C. allowing operational employees to interact with management. D. encouraging the sharing of knowledge across business units. E. creating educational opportunities for management.

D. encouraging the sharing of knowledge across business units.

A schematic of the entire database that describes the relationships in a database is called a(n): A. data definition diagram. B. data analysis table. C. intersection relationship diagram. D. entity-relationship diagram. E. data dictionary.Chapter

D. entity-relationship diagram.

Compared to traditional goods, digital goods have: A. higher inventory costs. B. lower marketing costs. C. lower menu costs. D. greater pricing flexibility. E. higher production costs.

D. greater pricing flexibility

A data warehouse is composed of: A. internal and external data sources. B. current data. C. historic external data. D. historic and current internal data. E. historical data from legacy systems

D. historic and current internal data.

Sociologists study information systems with an eye to understanding: A. the production of digital goods. B. how human decision makers perceive and use formal information. C. how new information systems change the control and cost structures within the firm. D. how systems affect individuals, groups, and organizations. E. mathematically based models and physical technology

D. how systems affect individuals, groups, and organizations

The ________ phase of decision making finds or recognizes a problem, need, or opportunity. A. implementation B. design C. analysis D. intelligence E. choice

D. intelligence

Apple's Siri application is an example of: A. machine learning. B. neural networks. C. CBR. D. intelligent agents. E. AI.

D. intelligent agents.

Along with capital, ________ is the primary production input that the organization uses to create products and services. A. culture B. structure C. feedback D. labor E. politics

D. labor

Content providers use ________ systems to process large amounts of very small monetary transactions cost-effectively. A. mobile payment B. affiliate revenue C. subscription D. micropayment E. transaction fee

D. micropayment

All of the following are increased in traditional markets compared to digital markets except: A. information asymmetry. B. switching costs. C. search costs. D. network effects. E. menu cost

D. network effects.

Converting raw data into a more meaningful form is called: A. capturing. B. feedback. C. organizing. D. processing. E. analysis

D. processing

The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called: A. e-procurement. B. production. C. sourcing. D. procurement. E. SCM.

D. procurement.

The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of: A. co-location. B. edge computing. C. grid computing. D. quantum computing. E. utility computing.

D. quantum computing.

A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address. A. modem B. packet C. hub D. router E. telnet

D. router

In a table for customers, the information about a single customer resides in a single: A. field. B. column. C. table. D. row. E. entity

D. row.

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as: A. service level agreements. B. open-source software. C. mashups. D. software packages. E. outsourced software

D. software packages.

When two organizations pool markets and expertise that result in lower costs and generate profits, they are creating: A. net marketplaces. B. a value chain. C. core competencies. D. synergies. E. a value web

D. synergies

The text defines ________ as expertise of organizational members that has not been formally documented. A. experience B. information C. wisdom D. tacit knowledge E.data

D. tacit knowledge

Information density refers to the: A. richness,complexity, and content of a message. B. amount of information available to reduce price transparency. C. amount of physical storage space needed to store data about a specific entity, such as a product or consumer D. total amount and quantity of information available to all market participants. E. total amount and quantity of information delivered to consumers by merchants.

D. total amount and quantity of information available to all market participants.

A ________ is a method of interaction with a customer, such as telephone or customer service desk. A. client channel B. point of presence C. sales point D. touch point E. point of service

D. touch point

A well designed ESS will allow management to: A. create routine production reports as well as view overall business performance. B. facilitate group decision making. C. analyze big data. D. track the activities of competitors. E. create pivot charts

D. track the activities of competitors.

A network that covers entire geographical regions is most commonly referred to as a(n): A. local area network. B. metropolitan area network. C. intranet. D. wide area network. E. peer-to-peer network.

D. wide area network.

Which of the following may lead to competitive advantage? 1. New products, services, and business models; 2. Charging less for superior products; 3. Responding to customers in real time A. 1 only B. 1 and 2 C. 2 and 3 D. 1 and 3 E. 1, 2, and 3

E. 1, 2, and 3

Which of the following is a computer-based system that attempts to emulate human behavior? A. Neural networks B. Genetic algorithms C. LMS D. Fuzzy logic E. AI technology

E. AI technology

All of the following are typical components or capabilities of an ECM system except: A. knowledge portals. B. digital asset management. C. tagging tools. D. communication tools. E. AR tools.

E. AR tools.

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A. data defining. B. data scrubbing. C. optimization. D. data cleansing. E. normalization.

E. normalization.

Software that manages the resources of the computer is called: A. network software. B. web services software. C. data management software. D. application software. E. operating system software.

E. operating system software

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. A. PGP B. P3P C. safe harbor D. opt-in E. opt-out

E. opt-out

The logical view of a database: A. allows the creation of supplementary reports. B. includes a digital dashboard. C. displays the organization and structure of data on the physical storage media. D. enables users to manipulate the logical structure of the database. E. presents data as they would be perceived by end users.

E. presents data as they would be perceived by end users.

A field identified in a table as holding the unique identifier of the table's records is called the: A. primary entity. B. unique ID. C. primary field. D. key field. E. primary key.

E. primary key.

VR systems: A. automate the creation and revision of designs. B. enable acquiring, storing, and disseminating knowledge documents in a virtual world. C. provide engineers, designers, and factory managers with precise control over industrial design and manufacturing. D. use machines to make solid objects. E. provide architects, engineers, and medical workers with precise, photorealistic simulations of objects

E. provide architects, engineers, and medical workers with precise, photorealistic simulations of objects

CAD workstations: A. are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management. B. facilitate employee learning. C. provide an important source of expertise for organizations. D. allow groups to work together on documents. E. provide engineers, designers, and factory managers with precise control over industrial design and manufacturing.

E. provide engineers, designers, and factory managers with precise control over industrial design and manufacturing.

RFID sensor-generated data on stored food items such as storage location is an example of: A. information systems. B. customer and product data. C. sales information. D. raw output E. raw input

E. raw input

As they move through the supply chain, ________ are transformed into finished products and shipped to retailers and customers. A. natural resources B. intermediate products C. nascent products D. basic products E. raw materials

E. raw materials

The bullwhip effect can be countered by: A. globalization. B. product differentiation. C. disintermediation. D. implementing a CRM. E. reducing information uncertainty.

E. reducing information uncertainty.

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called: A. sniffing. B. snooping C. pharming. D. phishing. E. social engineering.

E. social engineering.

In planning a robust e-commerce presence, you will want to consider the blog platform as part of your ________ presence. A. website B. e-mail C. community D. offline media E. social media

E. social media

A SAN is a ________ network. A. service-oriented architecture B. scalable architecture C. server area D. software arrangement E. storage area

E. storage area

If you can follow a definite procedure to make a business decision, you are making a(n) ________ decision. A. semi-structured B. ad hoc C. procedural D. unstructured E. structured

E. structured

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A. root domain. B. child domain. C. IP address. D. third-level domain. E. uniform resource locator.

E. uniform resource locator.

When there is no well-understood or agreed on procedure for making a decision, it is said to be: A. undocumented. B. documented. C. semi structured. D. ad hoc. E. unstructured.

E. unstructured.

Look and feel" copyright infringement lawsuits are concerned with: A. violation of a monopoly on the ideas behind a product. B. using the graphical elements of another product. C. the distinction between tangible and intangible ideas. D. using the creative elements of another product. E. the distinction between an idea and its expression

E. using the distinction between an idea and its expression

Which of the following statements about disruptive technologies is not true? A. Firms that invent disruptive technologies as first movers always become market leaders. B. Disruptive technologies may sometimes simply extend the marketplace. C. Disruptive technologies radically change the business landscape and environment. D. Disruptive technologies may put entire industries out of business. E. Disruptive technologies may be substitute products that perform better than other products currently being produced.

A. Firms that invent disruptive technologies as first movers always become market leaders.

In data mining, which of the following involves using a series of existing values to determine what other future values will be? A. Forecasting B. Associations C. Classifications D. Clustering E. Sequences

A. Forecasting

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A. HIPAA B. Freedom of Information Act C. Privacy Protection Act D. Gramm-Leach-Bliley Act E. COPPA

A. HIPAA

Web browser software requests web pages from the Internet using which of the following protocols? A. HTTP B. HTML C. FTP D. URL E. DNS

A. HTTP

Which of the following statements best describes the business value of improved decision making? A. Improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values. B. Improved decision making creates better products. C. Improved decision making strengthens customer and supplier intimacy, which reduces costs. D. Improved decision making strengthens customer and supplier intimacy, which reduces costs. E. Improved decision making enables senior executives to more accurately foresee future financial trends.

A. Improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values.

Which of the following is not one of the current key technology trends that raises ethical issues? A. Increase in data quality B. Data analysis advancements C. Data storage improvements D. Increase in use of mobile devices E. Advances in networking technology

A. Increase in data quality

Which of the following dimensions of e-commerce technology involves engaging consumers in a dialog that dynamically adjusts the experience to the individual? A. Interactivity B. Personalization/customization C. Richness D. Ubiquity E. Information density

A. Interactivity

Which of the following best describes the effect that new information technology has on society? A. It has a ripple effect, raising new ethical, social, and political issues. B. It has a dampening effect on the discourse of business ethics. C. It is beneficial for society as a whole, while raising dilemmas for consumers. D. It has a waterfall effect in raising ever more complex ethical issues. E. It has a magnifying effect, creating increasing numbers of ethical issues.

A. It has a ripple effect, raising new ethical, social, and political issues.

Why isn't overstocking warehouses an effective solution for a problem of low availability? A. It increases inventory costs. B. It increases sales costs. C. It does not speed product time to market. D. It lowers fill rate. E. It is an inefficient use of raw materials

A. It increases inventory costs.

Which of the following statements about 3-D printing is not true? A. It is incompatible with the cloud. B. It is also called additive manufacturing. C. It creates solid objects. D. It uses specifications in a digital file. E. It creates objects layer by layer

A. It is incompatible with the cloud.

Which of the following does not describe the dimensions of knowledge in a firm? A. It is subject to the laws of diminishing returns. B. It is intangible. C. It is contextual and applicable only in relevant situations. D. It is a cognitive event involving mental models. E. It is enmeshed in a firm's culture

A. It is subject to the laws of diminishing returns.

Which of the following statements about Plan International's new human resources system, as described in the chapter case, is not true? A. It took six months to implement a working system at Plan International's international headquarters. B. The new system is cloud-based and delivers information on a secure mobile platform. C. The new system provides a bird's-eye view of the entire Plan workforce. D. The new system enables employees to update their own personal information. E. The new system helps manage grants and donations received by Plan International.

A. It took six months to implement a working system at Plan International's international headquarters.

What is meant by the statement "knowledge is sticky"? A. Knowledge is hard to move. B. Knowledge is universally applicable. C. Knowledge is intangible. D. Knowledge is difficult to replace. E. Knowledge works only in certain situations.

A. Knowledge is hard to move.

The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? A. Lack of flexibility B. Lack of data sharing C. Program-data dependence D. Data redundancy E. Poor security

A. Lack of flexibility

Verizon's use of a web-based digital dashboard to provide managers with precise real-time information enabled it to improve which of the following? A. Managerial decision making B. Employee morale C. Efficiency in creation of new products D. Intimacy with its suppliers E. Compliance with regulation

A. Managerial decision making

The total number of food items with storage temperatures problems is an example of which of the following? A. Meaningful information B. Raw data C. Input D. Processing E. Feedback

A. Meaningful information

In a business hierarchy, which of the following levels is responsible for monitoring the daily activities of the business? A. Operational management B. Knowledge workers C. Service workers D. Production management E. Middle management

A. Operational management

Which of the following types of system enables management to make better decisions regarding organizing and scheduling sourcing, production, and distribution? A. SCM B. ERP C. KMS D. MIS E. TPS

A. SCM

Which of the following industries has the lowest barrier to entry? A. Airline B. Automotive C. Computer chip D. Solar energy E. Small retailer

E. Small retailer

The four major competitive strategies are: A. low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy. B. low-cost leadership, substitute products and services, customers; and suppliers. C. new market entrants, substitute products and services, customers, and suppliers. D. low-cost leadership, new market entrants, product differentiation, and focus on market niche. E. customers, suppliers, new market entrants, and substitute products.

A. low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy.

Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors. A. market niche B. product differentiation C. process efficiency D. mass customization E. low-cost leadership

A. market niche

The term management information systems refers to a specific category of information systems serving: A. middle management functions. B. integrated data processing throughout the firm. C. the information technology function. D. employees with online access to historical records. E. transaction process reporting

A. middle management functions

A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption. A. multicore processor B. legacy processor C. scalable processor D. aggregate circuit E. green circuit

A. multicore processor

The backbone networks of the Internet are typically owned by long-distance telephone companies called: A. network service providers. B. internet bulk providers. C. regional network providers. D. backbone providers. E. enhanced service providers

A. network service providers.

BI that is designed to determine the most likely effects of changes in the business environment is called: A. predictive analytics. B. parameterized reports. C. big data analytics. D. environmental analytics. E. statistical modeling

A. predictive analytics.

The decisions involved in creating and producing a corporate intranet can be classified as ________ decisions. A. semi structured B. structured C. ad hoc D. procedural E. unstructured

A. semi structured

In a multi-tiered network: A. the work of the entire network is balanced over several levels of servers. B. the work of the entire network is centralized. C. processing is located in the cloud. D. processing is handled by multiple, geographically-remote clients. E. processing is split between clients and servers.

A. the work of the entire network is balanced over several levels of servers.

All of the following are examples of business intelligence systems except a system that: A. tracks the flows of materials in a factory. B. addresses nonroutine decisions. C. summarizes and reports on a company's basic operations. D. compares total annual sales figures for specific products to planned targets. E. focuses on problems that are unique and rapidly changing

A. tracks the flows of materials in a factory

When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as A. transaction costs. B. procurement. C. agency costs. D. network costs. E. switching costs.

A. transaction costs

According to the 2016 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2015? A. $15 million B. $15 billion C. $1.5 million D. $150 million E. $1.5 billion

B. $15 billion

About ________ percent of the United States GDP is produced by the knowledge and information sectors. A. 15 B. 55 C. 25 D. 65 E. 85

B. 55

Which of the following seeks to enhance human perception by combining a live direct view of the physical world with computer-generated images? A. VRML B. AR C. LMS D. KWS E. CAD

B. AR

_______ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A. The judicial system B. Accountability C. The courts of appeal D. Liability E. Due process

B. Accountability

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A. Address B. Airport code C. Day D. City E. State

B. Airport code

Which of the following is a private corporate network extended to authorized users outside the organization? A.The World Wide Web B. An extranet C. FTP D. The Internet E. An Intranet

B. An extranet

Which of the following statements about organizations is not true? A. An organization is a collection of rights, privileges, obligations, and responsibilities delicately balanced over a period of time through conflict and conflict resolution. B. An informal group can be considered to be an organization. C. An organization is a formal, legal entity with internal rules and procedures that must abide by laws. D. An organization is a stable, formal social structure that takes resources from the environment and processes them to produce outputs. E. An organization is a collection of people and other social elements

B. An informal group can be considered to be an organization.

Which of the following dimensions of e-commerce technology has the potential to raise the quality of information? A. Interactivity B. Information density C. Customization D. Global reach E. Richness

B. Information density

Which of the following statements about wireless security is not true? A. Intruders can force a user's NIC to associate with a rogue access point. B. Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers. C. Radio frequency bands are easy to scan. D. An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network. E. SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs

B. Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Which of the following enables a company to tailor a particular aspect of enterprise software to the way a company does business? A. Data dictionaries B. Configuration tables C. Web services D. Middleware E. Groupware

B. Configuration tables

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A. SQL injection B. DDoS C. phishing D. botnet E. DoS

B. DDoS

What service converts IP addresses into more recognizable alphanumeric names? A. FTP B. DNS C. IP D. HTTP E. HTML

B. DNS

Which type of information system would you use to forecast the return on investment if your firm planned to switch to a new supplier that offered products at a lower cost? A. CRM B. DSS C. ESS D. MIS E. TPS

B. DSS

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A. Data table B. Data dictionary C. Entity-relationship diagram D. Data definition diagram E. Relationship dictionary

B. Data dictionary

Which of the following occurs when the same attribute in related data files has different values? A. Data duplication B. Data inconsistency C. Data redundancy D. Data discrepancy E. Data dependence

B. Data inconsistency

Which of the following would not be used as an input for an information system? A. Tablet computer B. Digital dashboard C. Bar code scanner D. RFID reader E. Smartphone

B. Digital Dashboard

Which of the following is the most common type of electronic evidence? A. Instant messages B. E-mail C. Voice-mail D. VOIP data E. Spreadsheets

B. E-mail

Which of the following types of systems typically use a digital dashboard to display an array of charts and graphs of a business's key performance indicators? A. TPS B. ESS C. MIS D. CRM E. SCM

B. ESS

Which of the following is a firm's CPO responsible for? A. Acting as liaison between the information systems group and the rest of the company B. Ensuring that the company complies with existing data privacy laws C. Overseeing the use of information technology in the firm D. Enforcing the firm's information security policy E. Making better use of existing knowledge in organizational and management processes

B. Ensuring that the company complies with existing data privacy laws

Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers? A. COBOL B. Ethernet C. ASCII D. TCP/IP E. Linux

B. Ethernet

Which of the following is a grouping of characters into a word, a group of words, or a complete number? A. Tuple B. Field C. Table D. File E. Entity

B. Field

Which of the following is the key business metric behind the technologies implemented by Kroger, as discussed in the chapter-opening case? A. Reduced cost of supplies B. Higher customer satisfaction levels C. Improved employee morale D. Survival E. Improved decision making

B. Higher customer satisfaction levels

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A. NFP B. ISP C. FTP D. RSS E. WAN

B. ISP

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else. A. Pharming B. Identity theft C. Evil twins D. Social engineering E. Spoofing

B. Identity theft

Which of the following best describes Immanuel Kant's categorical imperative? A. One should take the action that produces the least harm or incurs the least cost. B. If an action is not right for everyone to take, it is not right for anyone to take. C. You should act towards others as you would like them to act towards you. D. One can put values in rank order and understand the consequences of various courses of action. E. If an action cannot be taken repeatedly, then it is not right to be taken at any time

B. If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following is not a business benefit of collaboration? A. Improved innovation B. Improved compliance with government regulations C. Improved financial performance D. Improved quality E. Improved customer service

B. Improved compliance with government regulations

Which of the following statements is not true? A. In 2015, American businesses invested about $1 trillion in information systems hardware,software, and telecommunications equipment. B. In 2015, American businesses spent $500 billion on business and management consulting and information technology services. C. Private business investment in information technology has grown from 21 percent of total invested capital in 1999 to 37 percent of all invested capital in 2015. D. Much of the money spent by American businesses on business and management consulting involves redesigning firms' business operations to take advantage of new technologies. E. Most of the business value of IT investment derives from organizational, management, and cultural changes inside firms.

B. In 2015, American businesses spent $500 billion on business and management consulting and information technology services.

From your reading of the LG Electronics case study, the company implemented JDA software solutions to solve what problems? A. Lack of brand recognition B. Inefficient logistics C. Shoddy record-keeping D. Poor supply chain visibility for management E. Lack of coordination among production facilities

B. Inefficient logistics

Which of the following statements about collaboration is not true? A. In business, a collaboration can last as little as a few minutes. B. Successful collaboration can be achieved through technology regardless of the organization's culture or structure. C. Businesses need special systems for collaboration. D. Business collaboration relies on the formation of teams that are assigned a specific task or goal. E. One business benefit of collaboration is improved innovation

B. Successful collaboration can be achieved through technology regardless of the organization's culture or structure.

A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives? A. Operational excellence B. Survival C. Competitive advantage D. Customer intimacy E. Improved decision making

B. Survival

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? A. The Gramm-Leach-Bliley Act B. The Privacy Act C. HIPPA D. COPPA E. The Freedom of Information Act

B. The Privacy Act

Which of the following is not true about the changes to EU data protection rules proposed in 2012? A. The new rules would apply only to all companies providing services in Europe. B. The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data. C. The new rules would require Internet companies to delete information at the user's request. D. The new rules would reject the right to be forgotten. E. The new rules would require Internet companies to retain information only as long as absolutely necessary

B. The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data.

Which of the following statements about EDI is not true? A. Each major industry in the United States has EDI standards. B. Today, EDI is only used for document automation. C. About 80 percent of online B2B e-commerce is still based on EDI. D. EDI systems are increasingly web-enabled. E. Many organizations still use private networks for EDI.

B. Today, EDI is only used for document automation.

Which type of decision is deciding whether to introduce a new product line? A. Structured B. Unstructured C. Procedural D. Recurring E. Nonrecurring

B. Unstructured

Which of the following is a recent addition to the mobile digital platform? A. Quantum computing devices B. Wearable computing devices C. Green computing devices D. Grid computing devices E. Cloud computing devices

B. Wearable computing devices

The 802.11 set of standards is known as: A. WLAN. B. Wi-Fi. C. WAN. D. WiMax. E. WSN.

B. Wi-Fi.

Backward chaining is: A. a method of organizing expert system knowledge into chunks. B. a strategy for searching the rule base in an expert system that begins with a hypothesis. C. a programming algorithm used to create a virtual world using VRML. D. the programming environment of an expert system. E. a strategy for searching the rule base in an expert system that begins with information entered by the user

B. a strategy for searching the rule base in an expert system that begins with a hypothesis.

Today's nanotechnology-produced computer transistors are roughly equivalent in size to: A. a human hair. B. a virus. C. the width of a fingernail. D. a grain of sand. E. an atom

B. a virus.

All of the following are physical components of an RFID system except: A. antennas. B. bar codes. C. a stationary or handheld device. D. radio transmitters. E. tags

B. bar codes.

Evil twins are: A. fraudulent websites that mimic a legitimate business's website. B. bogus wireless network access points that look legitimate to users. C. e-mail messages that mimic the e-mail messages of a legitimate business. D. Trojan horses that appears to the user to be a legitimate commercial software application. E. computers that fraudulently access a website or network using the IP address and identification of an authorized computer

B. bogus wireless network access points that look legitimate to users.

Enterprise application vendors are now including ________ features, such as tools for data visualization, flexible reporting, and ad-hoc analysis, as part of the application. A. SOA B. business intelligence C. social media D. PRM E. ERM

B. business intelligence

In order to achieve maximum benefit from an enterprise software package, a business should: A. use only the processes in the software that match its own processes. B. change the way it works to match the software's business processes. C. retain legacy systems that best work with the software. D. customize the software to match all of its business processes. E. select only the software that best matches its existing business processes

B. change the way it works to match the software's business processes.

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of: A. spoofing. B. click fraud. C. evil twins. D. phishing. E. pharming

B. click fraud.

Interpretations of Moore's law assert that: A. data storage costs decrease by 50% every 18 months. B. computing power doubles every 18 months. C. transistors decrease in size 50% every two years. D. computing power will eventually level off. E. PCs decrease in market share by 9% every 5 years.

B. computing power doubles every 18 months.

IPv6 has been developed in order to: A. support Internet2. B. create more IP addresses. C. update the packet transmission protocols for higher bandwidth. D. reduce excess IP addresses. E. allow for different levels of service

B. create more IP addresses.

Selling a customer with a checking account a home improvement loan is an example of: A. cross-channel promotions. B. cross-selling. C. sales force automation. D. direct marketing. E. operational CRM

B. cross-selling.

The term big data refers to all of the following except: A. data from Web traffic. B. datasets with fewer than a billion records. C. datasets with unstructured data. D. machine-generated data (i.e. from sensors). E. data created by social media (i.e. tweets, Facebook Likes).

B. datasets with fewer than a billion records.

CompletenessMIS typically produce: A. scorecards of overall firm performance along predefined key indicators. B. fixed, regularly scheduled reports based on data extracted from the organization's TPS. C. new ways of looking at data that emphasize change, flexibility, and rapid response. D. solutions to semi structured problems appropriate for middle management decision making. E. assumptions, responses to ad hoc queries, and graphic representations of existing data.

B. fixed, regularly scheduled reports based on data extracted from the organization's TPS.

Compared to digital markets, traditional markets have: A. reduced asymmetry. B. higher transaction costs. C. stronger network effects. D. higher delayed gratification effects. E. lower search costs

B. higher transaction costs.

Redesigning and automating business processes can be seen as a double-edged sword because: A. it can concentrate power in the hands of senior executives. B. increases in efficiency may be accompanied by job losses. C. increases in efficiency may be accompanied by poor data quality. D. support for middle-management decision making may be offset by poor data quality. E. reliance on technology results in the loss of hands-on knowledge

B. increases in efficiency may be accompanied by job losses.

All of the following are intangible assets of a firm except its: A. brand. B. information systems. C. knowledge. D. unique business processes. E. reputation

B. information systems

Mintzberg outlined three categories of managerial roles: A. middle management, senior management, executive. B. interpersonal, informational, and decisional. C. control, leadership, oversight. D. cultural, organizational, and technical. E. operational, management, and executive.

B. interpersonal, informational, and decisional.

A Trojan horse: A. is a virus that replicates quickly. B. is software that appears to be benign but does something other than expected. C. installs spyware on users' computers. D. is malware named for a breed of fast-moving Near-Eastern horses. E. is a type of sniffer used to infiltrate corporate network

B. is software that appears to be benign but does something other than expected.

If manufacturers had perfect information, they could implement a: A. streamlined strategy. B. just-in-time strategy. C. bullwhip strategy. D. frictionless strategy. E. hyper-efficient strategy.

B. just-in-time strategy.

The ability to offer individually tailored products or services using the same production resources as bulk production is known as: A. micro customization. B. mass customization. C. mass marketing. D.niche customization. E. micromarketing.

B. mass customization

Implementing enterprise software from Oracle enabled Alcoa to achieve all of the following except: A. centralize financial activities. B. obtain lower prices for raw materials. C. reduce requisition-to-pay cycle times. D. centralize procurement activities. E. reduce accounts payable transaction processing

B. obtain lower prices for raw materials.

The practice of contracting custom software development to an outside firm is commonly referred to as: A. service-oriented architecture. B. outsourcing. C. application integration. D. utility computing. E. scaling.

B. outsourcing.

A DBMS makes the: A. relational database available for different analytic views. B. physical database available for different logical views. C. logical database available for different analytic views. D. physical database available for different analytic views. E. relational database available for different logical views.

B. physical database available for different logical views.

Walmart's continuous replenishment system allows it to do all of the following except: A. transmit orders to restock directly to its suppliers. B. provide mass customization. C. better meet customer demands. D. fine-tune merchandise availability. E. keep costs low

B. provide mass customization.

According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are: A. organization, culture, management, and environment. B. tasks, technology, people, and structure. C. technology, people, culture, and structure. D. costs, tasks, structure, and management. E. environment, organization, structure, and tasks

B. tasks, technology, people, and structure.

A(n) ________ is a scheme for classifying information and knowledge in such a way that it can be easily accessed. A. enterprise-wide knowledge management system B. taxonomy C. COP D. KWS E. Intelligent technique

B. taxonomy

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called: A. Internet2. B. the Internet of Things. C. a 3-D Web. D. Web 2.0. E. the Semantic Web.

B. the Internet of Things

Thomas Friedman's description of the world as "flat" refers to: A. the reduction in travel times and the ubiquity of global exchange and travel. B. the flattening of economic and cultural advantages of developed countries. C. the growth of globalization. D. the use of the Internet and technology for instantaneous communication. E. the increased use of global currencies

B. the flattening of economic and cultural advantages of developed countries

According to ________, you should take the action that produces the least harm. A. the utilitarian principle B. the risk aversion principle C. Kant's categorical imperative D. the Golden Rule E. the "no free lunch" rule

B. the risk aversion rule

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n): A. on-demand architecture. B. two-tiered client/server architecture. C. service-oriented architecture. D. divided architecture. E. multi-tiered client/server architecture.

B. two-tiered client/server architecture.

OLAP enables A. users to view both logical and physical views of data. B. users to obtain online answers to ad-hoc questions in a rapid amount of time. C. programmers to normalize data. D. users to quickly generate summary reports. E. programmers to quickly diagram data relationships

B. users to obtain online answers to ad-hoc questions in a rapid amount of time.

To monitor the status of internal operations and the firm's relations with the external environment, managers need which of the following types of system? A. BIS B. KWS C. DSS D. MIS E. TPS

E. TPS

GDSS such as Cisco Collaboration Meeting Rooms Hybrid can handle up to: A. 5 participants. B. 5000 participants. C. 500 participants. D. 1000 participants. E. 50 participants

C. 500 participants

What percent of online retailers now have m-commerce websites? A. 15 percent B. 85 percent C. 55 percent D. 75 percent E. 25 percent

C. 55 percent

Which of the following is not an example of the potential dark side of big data? A. Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. B. Use of computerized systems to filter and hire job applicants. C. Analyzing data from sensors installed in local parks to monitor soil moisture. D. Police visits to individuals whom a computer system identified as likely to commit a crime in the future. E. Use of a device installed in a car to analyze driving habits

C. Analyzing data from sensors installed in local parks to monitor soil moisture.

Which of the following is the last step in the knowledge management value chain? A. Store B. Disseminate C. Apply D. Feedback E. Acquire

C. Apply

Which of the following is not an example of a computer used as an instrument of crime? A. Intentionally attempting to intercept electronic communication B. Theft of trade secrets C. Breaching the confidentiality of protected computerized data D. Schemes to defraud E. Unauthorized copying of software

C. Breaching the confidentiality of protected computerized data

Which of the following statements about business processes is not true? A. Business processes influence the relationship between an organization and information technology. B. Business processes are a collection of standard operating procedures. C. Business processes are typically unaffected by changes in information systems. D. Business processes are usually ensconced in an organization's culture. E. A business firm is a collection of business processes

C. Business processes are typically unaffected by changes in information systems.

Which of the following types of system would you use to manage relationships with your customers? A. CLE B. KMS C. CRM D. MIS E. CLU

C. CRM

Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete? A. Competitive advantage model B. Demand control model C. Competitive forces model D. Network economics model E. Agency costs model

C. Competitive forces model

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and thecompany? A. Churn rate B. Cost per lead C. Customer lifetime value D. Cost per sale E. Customer average value

C. Customer lifetime value

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which of the following types of information system? A. KMS B. TPS C. DSS D. MIS E. ESS

C. DSS

________ are visual tools for presenting performance data in a BI system. A. Reports and the drill down feature B. Scenarios and models C. Dashboards and scorecards D. Parameterized reports E. Ad hoc report creation

C. Dashboards and scorecards

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. A. Implementation B. Software C. Data security D. Administrative E. Input

C. Data security

The role of entrepreneur falls into which of Mintzberg's managerial classifications? A. Informational B. Interpersonal C. Decisional D. Symbolic E. Leading

C. Decisional

Which of the following statements about enterprise applications is not true? A. Enterprise applications are based on organization-wide definitions of data. B. Enterprise applications introduce "switching costs." C. Enterprise applications are best implemented when few changes in business processes are required. D. Enterprise applications require organizational learning. E. Enterprise applications require fundamental changes in the way a business operates.

C. Enterprise applications are best implemented when few changes in business processes are required.

Which of the following would not be classified as a KWS? A. CAD system B. 3D visualization system C. Expert system D. AR applications E. VR system

C. Expert system

Which of the following statements about genetic algorithms is not true? A. Genetic algorithms are used to solve problems that are very dynamic and complex, involving hundreds or thousands of variables or formulas. B. Genetic algorithms use an iterative process to refine initial solutions so that better ones are more likely to emerge as the best solution. C. Genetic algorithms discover knowledge by using hardware and software that parallel the processing patterns of the biological or human brain. D. Genetic algorithms are able to evaluate many solution alternatives quickly to find the best one. E. Genetic algorithms are based on techniques inspired by evolutionary biology

C. Genetic algorithms discover knowledge by using hardware and software that parallel the processing patterns of the biological or human brain.

Behavioral models of management see managers as being ________ than does the classical model. A. more reflective B. more well organized C. more systematic D. less reactive E. more informal

E. more informal

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? A. His action is acceptable, because the grocer suffers the least harm. B. His action is wrong, because the grocery store owner is harmed. C. His action is acceptable, because the higher social value is the survival of the family. D. His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E. His action is wrong, because the man would not want the grocer to steal from him.

C. His action is acceptable, because the higher social value is the survival of the family.

The role of liaison falls into which of Mintzberg's managerial classifications? A. Symbolic B. Leading C. Interpersonal D. Informational E. Decisional

C. Interpersonal

Personnel who design new products or services for a firm belong to which level of a business hierarchy? A. Production workers B. Service workers C. Knowledge workers D. Data workers E. Middle management

C. Knowledge workers

Which of the following tools enables users to view the same data in different ways using multiple dimensions? A. Data mining B. Hadoop C. OLAP D. Predictive analysis E. SQL

C. OLAP

To make sure they stock clothes that their customers will purchase, a department store implements a new application that analyzes spending levels at their stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support? A. Customer intimacy B. New products and services C. Operational excellence D. Improved decision making E. Survival

C. Operational excellence

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A. Packet routing B. Multiplexing C. Packet switching D. ATM E. Packet shifting

C. Packet switching

Which of the following statements about RFID is not true? A. RFIDs use an antenna to transmit data. B. Microchips embedded in RFIDs are used to store data. C. RFIDs require line-of-sight contact to be read. D. RFID tags and antennas come in a variety of shapes and sizes. E. RFIDs transmit only over a short range.

C. RFIDs require line-of-sight contact to be read.

From your reading of the chapter's opening case, Skullcandy chose enterprise resource planning software from which of the following ERP vendors? A. Microsoft B. Infor Global Solutions C. SAP D. IBM E. Oracle

C. SAP

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n) A. SOA. B. TCO. C. SLA. D. SaaS. E. RFQ

C. SLA.

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? A. Just-in-time strategies B. Continuous replenishment C. Safety stock D. Perfect information E. Demand planning

C. Safety stock

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? A. Map the company's business processes to the software's business processes. B. Select the business processes you wish to automate. C. Select the functions of the system you wish to use. D. Rewrite the software to support the way the company's business processes work. E. Map the software's business processes to the company's business processes.

C. Select the functions of the system you wish to use.

Which of the following is an example of a direct good in the automobile industry? A. Office furniture B. Roofing shingles C. Sheet steel D. Computer equipment E. Paper

C. Sheet steel

Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination? A. Router B. NIC C. Switch D. Modem E. Hub

C. Switch

Which of the following job categories is expected to experience the most growth over the next eight years? A. Software engineers B. Database administrators C. Systems analysts D. Computer support specialists E. Computer programmers

C. Systems analysts

Which of the following is an example of a social complementary asset? A. Distributed decision-making rights B. Incentives for management innovation C. Technology and service firms in adjacent markets D. A strong IS development team E. Training programs

C. Technology and service firms in adjacent markets

_______ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A. P3P B. FIP principles C. The opt-in model D. A safe harbor E. The opt-out model

C. The opt-in model

Which of the following is the greatest obstacle in enabling collaboration between employees at different, distant corporate locations? A. Corporate culture B. Permissions C. Time zones D. Language E. Privacy

C. Time zones

Which of the following is the single greatest cause of network security breaches? A. Viruses B. Bugs C. User lack of knowledge D. Trojan horses E. Cyberwarfare

C. User lack of knowledge

Which of the following is an example of an organizational complementary asset? A. Laws and regulations B. The Internet and telecommunications infrastructure C. Using the appropriate business model D. Strong senior management E. A collaborative work environment

C. Using the appropriate business model

Which of the following is a milestone for the website development phase of building an e-commerce presence? A. Social media plan B. Web mission statement C. Website plan D. Web presence map E. Functional website

C. Website plan

To use the analog telephone system for sending digital data, you must also use: A. TCP/IP. B. DSL. C. a modem. D. twisted wire. E. a router

C. a modem.

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a/an: A. marketing channel. B. distribution channel. C. supply chain. D. value chain. E. information system

C. supply chain.

The ethical "no free lunch" rule states that: A. one can put values in rank order and understand the consequences of various courses of action. B. one should take the action that produces the least harm or incurs the least cost. C. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. D. if an action cannot be taken repeatedly, then it is not right to be taken at any time. E. if an action is not right for everyone to take, it is not right for anyone to take

C. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

As discussed in the chapter text, the three main reasons that investments in information technology do not always produce positive results are: A. information quality, information integrity, and information accuracy. B. organization, environment, culture. C. information quality, organizational culture, and management filters. D. management support, technical logistics, and user compliance. E. organization, culture, and technology

C. information quality, organizational culture, and management filters.

The three activities in an information system that produce the information organizations use to control operations are: A. input, output, and feedback. B. data, information, and analysis. C. input, processing, and output. D. data analysis, processing, and feedback. E. information, research, and analysis.

C. input, processing, and output.

All of the following statements are true about information technology's impact on business firms except: A. it helps firms lower the cost of market participation. B. it helps reduce internal management costs. C. it helps firms expand in size. D. it helps reduce agency costs. E. it helps reduce transaction costs.

C. it helps firms expand in size

Order fulfillment involves all of the following business processes except:' A. assembling the product. B. checking the customer's credit. C. making customers aware of the product. D. submitting the order. E. shipping the product.

C. making customers aware of the product.

The Internet increases the bargaining power of customers by A. enabling the development of new services. B. making more products available. C. making information available to everyone. D. creating new opportunities for building loyal customer bases. E. lowering transaction costs

C. making information available to everyone.

A firm can exercise greater control over its suppliers by having: A. global suppliers. B. local suppliers. C. more suppliers. D. fewer suppliers. E.only a single supplier.

C. more suppliers.

Disciplines that contribute to the technical approach to information systems include: A. economics, sociology, and psychology. B. computer science, engineering, and networking. C. operations research, management science, and computer science. D. engineering, utilization management, and computer science. E. management science, computer science, and engineering.

C. operations research, management science, and computer science.

Predictive search in Google's search engine: A. uses a tracking service and cookies on your browser to predict search results. B. uses a knowledge graph of what similar people searched on to predict your search interests. C. predicts what you are looking for as you enter words into the query box. D. uses a semantic approach to predict what you are looking for. E. maintains a history of your searches and then predicts what you will search on next.

C. predicts what you are looking for as you enter words into the query box.

Manufacturing and production processes include all of the following except: A. transportation execution. B. material requirements planning. C. product configuration. D. procurement. E. quality control.

C. product configuration.

Market creators: A. save users money and time by processing online sales transactions. B. sell physical products directly to consumers or individual businesses. C. provide a digital environment where buyers and sellers can establish prices for products. D. generate revenue from advertising or from directing buyers to sellers. E. create revenue by providing digital content over the web.

C. provide a digital environment where buyers and sellers can establish prices for products.

All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A. hardware failure. B. theft of data. C. radiation. D. copying of data. E. alteration of data

C. radiation.

Pharming involves: A. using e-mails for threats or harassment. B. setting up a fake website to ask users for confidential information. C. redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. D. pretending to be a legitimate business's representative in order to garner information about a security system. E. setting up fake Wi-Fi access points that look as if they are legitimate public networks.

C. redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

The Gramm-Leach-Bliley Act: A. specifies best practices in information systems security and control. B. outlines medical security and privacy rules. C. requires financial institutions to ensure the security of customer data. D. identifies computer abuse as a crime and defines abusive activities. E. imposes responsibility on companies and management to safeguard the accuracy of financial information.

C. requires financial institutions to ensure the security of customer data.

Transaction brokers: A. provide online meeting places where people with similar interests can communicate. B. provide a digital environment where buyers and sellers can establish prices for products. C. save users money and time by processing online sales transactions. D. generate revenue from advertising or from directing buyers to sellers. E. sell physical products directly to consumers or individual businesses.

C. save users money and time by processing online sales transactions.

The three principal levels within a business organization hierarchy are: A. senior management, middle management, and service workers. B. senior management, operational management, and information systems. C. senior management, middle management, and operational management. D. senior management, operational management, and service workers. E. senior management, data workers, and service workers.

C. senior management, middle management, and operational management.

Which of the following is not one of the five observed ways in which managerial behavior differs from the classical description of managers? A. Managers perform a great deal of work at an unrelenting pace. B. Managers prefer current, specific, ad hoc information. C. Managers give high priority to maintaining a diverse web of contacts. D. Managers perform a low number of activities for a high percentage of time. E. Managers prefer oral forms of communication

D. Managers perform a low number of activities for a high percentage of the time.

Selling the same goods to different targeted groups at different prices is called: A. cost personalization. B. cost customization. C. price gouging. D. price discrimination. E. cost optimization.

D. Price discrimination.

________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors. A. Low-cost leadership B. Focusing on market niche C. Strengthening supplier intimacy D. Product differentiation E. Strengthening customer intimacy

D. Product differentiation

Which of the following roles in a firm would be least affected by using mobile devices to access firm information systems? A. Knowledge workers B. Senior executives C. Operational managers D. Production workers E. Sales executives

D. Production workers

________ is malware that hijacks a user's computer and demands payment in return for giving back access. A. A virus B. A Trojan horse C. An evil twin D. Ransomware E. Spyware

D. Ransomware

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? A. Benchmarking B. Algorithms C. Controls D. Security E. Identity management

D. Security

A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data? A. Data mining software B. Data governance software C. Text mining tools D. Sentiment analysis software E. Web mining technologies

D. Sentiment analysis software

Which of the following is not one of the techniques used in web mining? A. Content mining B. Structure mining C. Data mining D. Server mining E. Usage mining

D. Server mining

Which type of decision is calculating gross pay for hourly workers? A. Ad hoc B. Semi-structured C. Procedural D. Structured E. Unstructured

D. Structured

The parts of an organization's infrastructure, human resources, technology, and procurement that make the delivery of the firm's products or services possible are known as ________ activities. A. auxiliary B. primary C. secondary D. support E. service

D. Support

Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers? A. Networking B. Telephone C. Data management D. Telecommunications E. VOIP

D. Telecommunications

________tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships. A. OLAP B. Classification C. Text mining D. In-memory E. Clustering

D. Text mining

All of the following are current hardware platform trends except: A. quantum computing. B. cloud computing. C. virtualization. D. Unix. E. green computing.

D. Unix.

Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources? A. Multicore processing B. Ubiquitous computing C. Autonomic computing D. Virtualization E. Cloud computing

D. Virtualization

An inference engine is: A. a strategy for searching the rule base in case-based reasoning. B. a programming algorithm used to create a virtual world using VRML. C. a method of organizing expert system knowledge into chunks. D. a strategy used to search through the rule base in an expert system by forward chaining or backward chaining. E. the programming environment of an expert system.

D. a strategy used to search through the rule base in an expert system by forward chaining or backward chaining.

A MOOC is: A. a VR system. B. an intelligent technique. C. a type of content management system. D. a type of online course. E. a machine learning system.

D. a type of online course.

A characteristic or quality that describes a particular database entity is called a(n): A. field. B. key field. C. tuple. D. attribute. E. relationship.

D. attribute.

A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web: A. client. B. service. C. beacon. D. browser. E. app.

D. browser.

Application controls: A. monitor the use of system software and prevent unauthorized access to software and programs. B. apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. C. include software controls, computer operations controls, and implementation controls. D. can be classified as input controls, processing controls, and output controls. E. govern the design, security, and use of computer programs and the security of data files in general throughout the organization

D. can be classified as input controls, processing controls, and output controls.

All of the following are technologies used to analyze and manage big data except: A. noSQL. B. Hadoop. C. analytic platforms. D. cloud computing. E. in-memory computing

D. cloud computing.

Varying a product's price according to the supply situation of the seller is called ________ pricing. A. customized B. flexible C. asymmetric D. dynamic E. menu

D. dynamic

Using the Internet to buy or sell goods is called: A. e-business. B. an extranet. C. an intranet. D. e-commerce. E. e-government

D. e-commerce

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following? A. Security policy B. Business impact analysis C. Business continuity plan D. AUP E. Risk assessment

E. Risk assessment

Which of the following describes how the Simon framework of decision making works in high velocity decision environments? A. The first three steps of the process are handled by software algorithms and the final step is handled by experienced managers. B. The first two steps of Simon's framework are eliminated and the final two steps are handled by software algorithms. C. The first three steps of the process are handled by software algorithms and the final step is handled by experienced managers. D. Only the initial step is performed by the software; the final three steps are handled by humans. E. All four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow.

E. All four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow.

Which of the following defines acceptable uses of a firm's information resources and computing equipment? A. A MSSP B. A CA policy C. A UTM system D.An information systems audit policy E. An AUP

E. An AUP

Which of the following is not one of the Simon's four stages of decision making? A. Implementation B. Choice C. Intelligence D. Design E. Analysis

E. Analysis

________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks. A. Mainframes B. Hybrid servers C. Rack servers D. Cloud servers E. Blade servers

E. Blade servers

A ________ is a senior manager who oversees the use of IT in the firm. A. CFO B. CEO C. CTO D. CKO E. CIO

E. CIO

Which of the following protects the authors of a book from having their work copied by others? A. Trade Secret law B. Fair Use Doctrine C. Patent protection D. Due process E. Copyright law

E. Copyright law

Which of the following is an example of a cross-functional business process? A. Transporting the product B. Paying creditors C. Identifying customers D. Assembling a product E. Creating a new product

E. Creating a new product

Which of the following systems would you expect to deliver integrated, personalized business content through a web-based interface? A. SCM B. TPS C. MIS D. DSS E. ESS

E. ESS

CRM systems help businesses achieve which of the following business objectives? A. Automated accounting processes B. Enhanced supplier intimacy C. Faster time to market with new products and services D. Automated production forecasts E. Enhanced customer intimacy

E. Enhanced customer intimacy

Which of the following is not true about enterprise systems? A. Enterprise software includes analytical tools to evaluate overall organizational performance. B. Enterprise systems help firms respond rapidly to customer requests for information or products. C. Enterprise systems provide firm-wide information to help managers make better decisions. D. Enterprise system data have standardized definitions and formats that are accepted by the entire organization. E. Enterprise software is expressly built to allow companies to mimic their unique business practices

E. Enterprise software is expressly built to allow companies to mimic their unique business practices

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? A. Accountability and control B. System quality C. Property rights and obligations D. Quality of life E. Information rights and obligations

E. Information rights and obligations

Which of the following is a primary drawback to the "do anything anywhere" computing environment? A. It leads to employees being paid less for the total amount of work performed. B. It makes work environments less pleasant. C. It centralizes power at corporate headquarters. D. It creates a digital divide. E. It blurs the traditional boundaries between work and family time

E. It blurs the traditional boundaries between work and family time

Which of the following would you use to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making? A. An extranet B. MIS C. TPS D. CRM E. KMS

E. KMS

Which of the following statements is not an accurate description of the importance of knowledge to a firm? A. Much of the firm's value relies on being able to create knowledge. B. Knowledge should be seen as an intangible key asset. C. Knowledge experiences network effects as more people share it. D. Knowledge enables firms to become more efficient in their use of scarce resources. E. Knowledge is unconditional.

E. Knowledge is unconditional.

Which of the following is not one of the five classical functions of managers? A. Planning B. Organizing C. Deciding D. Controlling E. Leading

E. Leading

Which field of study focuses on both a behavioral and technical understanding of information systems? A. Operations research B. Sociology C. Economics D. Behavioral computing E. Management information systems

E. Management information systems

________ uses individual atoms and molecules to create computer chips and other devices. A. A minicomputer B. On-demand computing C. Virtualization D. Quantum computing E. Nanotechnology

E. Nanotechnology

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used? A. Grid B. Quantum C. Edge D. Autonomic E. On-demand

E. On-demand

Walmart exemplifies the power of information systems coupled with state-of-the-art business practices and supportive management to achieve which of the following? A. New products and services B. Customer intimacy C. Competitive advantage D. Survival E. Operational efficiency

E. Operational efficiency

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? A. Property rights and obligations B. Family and home C. System quality D. Accountability and control E. Quality of life

E. Quality of life

Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience? A. Ubiquity B. Interactivity C. Personalization/customization D. Social technology E. Richness

E. Richness

Which of the following best describes how new information systems can result in legal gray areas? A. They are little understood by politicians or lawyers. B. They are created from sets of logical and technological rules rather than social or organizational mores. C. They work with networked, digital data, which are more difficult to control than information stored manually. D. They are implemented by technicians rather than managers. E. They result in new situations that are not covered by old laws.

E. They result in new situations that are not covered by old laws.

________ integrate disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A. Modems B. Virtual private networks C. Intranets D. Wireless networks E. Unified communications

E. Unified communications

In ________, raw data is systematically acquired and transformed during various stages that add value to that information. A. the firm value chain B. the feedback process C. information processing D. the dissemination process E. an information value chain

E. an information value chain

Customer service modules in CRM systems provide tools for: A. identifying profitable and unprofitable customers. B. managing sales prospect and contact information. C. capturing prospect and customer data. D. organizing effective marketing campaigns. E. assigning and managing customer service requests.

E. assigning and managing customer service requests.

Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as: A. crowdsourcing. B. clickstream advertising. C. online profiling. D. long tail marketing. E. behavioral targeting.

E. behavioral targeting.

Computer forensics tasks include all of the following except: A. presenting collected evidence in a court of law. B. securely storing recovered electronic data. C. finding significant information in a large volume of electronic data. D. recovering data from computers while preserving evidential integrity. E. collecting physical evidence on the computer.

E. collecting physical evidence on the computer.

The dimension of ________ describes whether data elements are consistently defined. A. accuracy B. validity C. completeness D. integrity E. consistency

E. consistency

A(n) ________ is an activity for which a firm is a world-class leader. A. expertise area B. competitive advantage C. growth driver D. efficiency E. core competency

E. core competency

The intentional defacement or destruction of a website is called: A. phishing. B. spoofing. C. pharming. D. cyberwarfare. E. cybervandalism.

E. cybervandalism.

A foreign country attempting to access government networks in order to disable a national power grid is an example of: A. evil twins. B. cyberterrorism. C. denial-of-service attacks. D. phishing. E. cyberwarfare.

E. cyberwarfare.

The text defines ________ as the flow of events or transactions captured by an organization's system. A. wisdom B. experience C. information D. knowledge E. data

E. data

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: A. data normalization. B. data auditing. C. data optimization. D. defragmentation. E. data scrubbing

E. data scrubbing

In ________, digital technology and the Internet are used to execute the major business processes in the enterprise. A. MIS B. enterprise applications C. e-commerce D. SCM E. e-business

E. e-business

All of the following are considered to be knowledge workers except: A. engineers. B. architects. C. designers. D. researchers. E. executives.

E. executives.

High velocity decision making systems are growing rapidly for decisions classed as: A. semi structured. B. ad hoc. C. financial. D. predefined. E. highly structured.

E. highly structured.

SaaS refers to: A. easy-to-use software tools for displaying Web pages. B. managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C. self-contained services that communicate with each other to create a working software application. D. supplying online access over networks to storage devices and storage area network technology. E. hosting and managing access to software applications delivered over the Internet to clients on a subscription basis

E. hosting and managing access to software applications delivered over the Internet to clients on a subscription basis

All of the following are issues with the traditional file environment except: A. data sharing. B. poor security. C. data inconsistency. D. lack of flexibility in creating ad-hoc reports. E. inability to develop specialized applications for functional areas

E. inability to develop specialized applications for functional areas.

The business value of an effective supply chain management system includes all of the following except: A. cost reduction. B. supply matched to demand. C. improved delivery service. D. faster time to market. E. increased inventory levels.

E. increased inventory levels.

An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n): A. data governance policy. B. data policy. C. data quality audit. D. data definition file. E. information policy

E. information policy

A VPN: A. is more expensive than a dedicated network. B. is an Internet-based service for delivering voice communications. C. provides secure, encrypted communications using Telnet. D. is a proprietary networking service technology developed by individual corporations. E. is an encrypted private network configured within a public network.

E. is an encrypted private network configured within a public network.

Expert systems: A. share characteristics with mainframe computing. B. are capable of solving wide ranges of problems. C. are used for knowledge discovery. D. are based on DO WHILE rules. E. lack the general intelligence of human beings.

E. lack the general intelligence of human beings.


Ensembles d'études connexes

Chapter 1: Completing the Application, Underwriting, and Delivering the Policy

View Set

micro chapter 3 terms - demand and supply

View Set

ESTRUCTURA | 7.3 Preterite of ser and ir- Viaje a Perú

View Set

How To Eat Fried Worms Vocabulary

View Set

Chemistry Chapter 9 Homework Assignment

View Set

Level 1.5 - RNSG 1341 - Legal & Ethical

View Set