CIS 2050 Final (Chapters 1-9, 11 & 12)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The main problem with radio transmission is which of the following? Select one: a. Devices are expensive to install. b. When you travel too far from the source, the signal fades. c. Radio waves cannot travel through walls. d. Radio waves are slow. e. Devices are difficult to install.

B

Voice and signature recognition are examples of: Select one: a. something the user wants. b. something the user does. c. something the user has. d. something the user is. e. something the user knows.

B

Which of the following is not an example of the growing initiative called green IT?

Building computer applications that use less energy

Data are sent through a fiber-optic cable by a(n) _______. Select one: a. Optical modem b. Electromagnetic switch c. Laser d. Optical switch e. Multiplexer

C

Which of the following tools are not used by marketing professionals to compile market research? Select one: a. Blogs b. Online forums c. Wikis d. RSS e. Social networking sites

D

With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. Select one: a. Instant connectivity b. Ubiquity c. Convenience d. Localization of products and services e. Personalization

D

Data dictionaries provide which of the following advantages to the organization? Select one: a. They reduce data inconsistency. b. They enable faster program development. c. They make it easier to modify data and information. d. Only B and C e. All of the above

E

Networks enable which of the following applications? Select one: a. Discovery b. Communications c. Collaboration d. Web services e. All of the above

E

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability

E.

Data consolidation and 360-degree view mean the same thing. True or False

False

Transactional CRM systems provide interactive communication with the customer throughout the organization. True or False

False

Managing account collections is an example of a(n):

Finance business process

____ include b2b and b2c

Functional area information systems

Refer to Opening Case- What to do About Wikileaks? Which of the following is false about WikiLeaks?

Governments and companies are using network forensics to identify intruders who break into systems

Collecting sales tax is an example of a(n):

Marketing Business Process

____ activities create value for which customers are willing to pay, whereas ____ activities do not add value directly to the firms products or services

Primary, support

____ issues involve collecting, storing, and disseminating information about individuals.

Privacy

Managing purchasing is an example of a(n):

Production business process

_ Means accepting the consequences of your decisions and actions

Responsibility

Which of the following statements about your future role as a manager is false?

The size of my team will likely be smaller than teams of today.

Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes?

operational effectiveness

A(n) _____ allows unauthorized entry into a wireless network. Select one: a. Open node b. Lack of encryption c. Rogue access point d. Disgruntled employee e. Illegal server

c

Computer support is greatest for which of the following problems? a) semistructured and strategic planning b) unstructured and operational control c) structured and operational control d) semistructured and management control e) structured and management control

c

In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time. Select one: a. sell-side b. electronic exchange c. buy-side d. auctions e. group purchasing

c

One of the problems that HR departments have with using social computing to recruit is Select one: a. social sites each have their own special niche b. all candidates seek them out c. they receive many more applications than they can process. d. they cannot be used for internal tasks. e. they only receive qualified applications

c

The most common wireless technology for TV and DVD remote control devices is _______. Select one: a. Ultra-wideband b. Near-field communications c. Infrared d. Bluetooth e. WiMAX

c

Which of the following is not a limitation of barcodes? Select one: a. They are useless in determining expiration date. b. They are difficult to use in a manufacturing plant. c. They identify the manufacturer, product, and item. d. They are printed on paper. e. They require line-of-sight to the scanning device.

c

Which of the following is not inhibiting faster Wi-Fi expansion? Select one: a. Wi-Fi services may not survive in the face of free hotspot access. b. A lack of security. c. The growth of WiMAX d. Unless the service is free, users have to log on to separate accounts for each hotspot. e. Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services.

c

Which of the following social shopping methods contributes to environmental sustainability? Select one: a. Shopping clubs b. Social marketplaces c. Peer-to-peer shopping d. Group shopping

c

Building relationships, anticipating needs, and providing special deals for the community's members is a function of which category of Web 2.0 applications? Select one: a. Social networking b. Aggregators c. Blogs d. Crowdsourcing e. Social commerce

e

If you are an worker managing your fringe benefits over your company's intranet, you are engaging in _________ e-commerce. Select one: a. business-to-consumer b. government-to-citizen c. consumer-to-consumer d. business-to-business e. business-to-employee

e

The practice of using similar but not identical domain names is called _____. Select one: a. domain spoofing b. cybersquatting c. domain fraud d. domain masquerading e. domain tasting

e

_____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. Select one: a. A satellite b. Ultra-wideband c. Near-field communications d. Bluetooth e. Cell phones

e

_____ provides users with a view of what is happening, whereas _____ addresses why it is happening. a) Multidimensional data analysis, Structured Query Language b) Data mining, multidimensional data analysis c) Data mining, expert system d) Multidimensional data analysis, neural networks e) Multidimensional data analysis, data mining

e

_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. Select one: a. Wi-Fi b. Location-based services c. Pervasive services d. RFID e. Telematics

e

Explicit knowledge has which of the following characteristics? Select one: a. objective b. slow c. ambiguous d. personal e. costly to transfer

A

Internet advertising improves on traditional advertising in all of the following ways except: Select one: a. Internet ads are always more effective than other types of advertising. b. Internet ads can be updated at any time at minimal cost. c. Internet ads are current. d. Internet ads can reach large numbers of potential buyers all over the world. e. Internet ads can make effective use of multimedia.

A

Ratings, reviews, and recommendations Select one: a. Are an aspect of social shopping. b. Are posted by experts. c. Are always provided by businesses on their Web site. d. Are not beneficial to the business e. Are posted without compensation.

A

Social marketplaces act as online ______________ that harness the power of social networks for introducing, buying, and selling products and services. Select one: a. intermediaries b. collaborative consumption c. communities d. shopping carts e. mashup

A

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious. Select one: a. Alien software b. Back door c. Virus d. Logic bomb e. Worm

A

Trends that have led to the supply chain concept include all of the following except: a. modern organizations are buying their suppliers in order to have more transparency along the supply chain b. modern organizations are focusing on their core competencies c. modern organizations are concentrating on becoming more agile and flexible d. modern organizations are relying on other companies to supply necessary goods and services e. modern organizations are relying on an increasing number of suppliers

A

Which of the following is a problem that e-commerce can cause for the airline industry? Select one: a. Mistakes in fares b. Too many fares offered on certain routes c. Too few fares d. No fares offered on certain routes e. Too many fares

A

_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. Select one: a. Transaction data, master data b. Business dimensional data, databases c. Source data, transaction data d. Master data, source data e. Operational data, master data

A

Consider this domain name, www.business.gsu.edu. The "gsu" is the __________. Select one: a. Name of the organization b. URL c. Address of the Webmaster d. Top-level domain e. Name of the specific computer

A.

If there are _____ substitutes for an organization's products or services, then the threat of substitutes is _____. A. many, high B. few, few C. few, high D. many, few E. few, negligible

A.

In a database, the primary key field is used to _____. Select one: a. uniquely identify a record b. specify an entity c. identify duplicated data d. uniquely identify an attribute e. create linked lists

A.

In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved. Select one: a. whitelisting, blacklisting b. whitelisting, encryption c. encryption, blacklisting d. blacklisting, whitelisting e. encryption, whitelisting

A.

Portals are an example of which network application? Select one: a. Discovery b. Collaboration c. Communications d. Web services e. None of the above

A.

The cable medium with the highest bandwidth is: Select one: a. Fiber-optic cable b. Cellular radio c. Copper cable d. Coaxial cable e. Twisted-pair wire

A.

The data in a data warehouse have which of the following characteristics? Select one: a. They are organized by subject. b. They are typically retained for a defined, but limited, period of time. c. They are organized in a hierarchical structure. d. They are updated in real time. e. They are coded in different formats.

A.

Which of the following statements concerning firewalls is not true? Select one: a. Firewalls filter messages the same way as anti-malware systems do. b. Firewalls prevent unauthorized Internet users from accessing private networks. c. Firewalls filter network traffic according to categories of activities that are likely to cause problems. d. Firewalls are sometimes located inside an organization's private network. e. Firewalls examine every message that enters or leaves an organization's network.

A.

___ issues involve who may obtain information and how much they should pay for this information

Accesibility

____ determines who is responsible for the actions taken

Accountability

Reconciling bank accounts is an example of an

Accounting Business Process

____ issues involve the authenticity and fidelity of information that is collected and processed.

Accuracy

____ creates statistical models of customer behavior and the value of customer relationships over time.

Analytical CRM

_____ systems study customer behavior and perceptions to provide business intelligence.

Analytical CRM

A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________. Select one: a. Microblogs b. Enterprise Social Networks c. Mashups d. RSS

B

A(n) _____ is a logical grouping of related fields. Select one: a. Field b. Record c. Byte d. Database e. File

B

As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. Select one: a. representative b. instance c. entity d. relationship e. individual

B

In _____, the organization purchases insurance as a means to compensate for any loss. Select one: a. risk acceptance b. risk transference c. risk analysis d. risk management e. risk mitigation

B

Over time, the customer relationship with vendors has become more impersonal for all of the following reasons except: a. consumers became mobile b. customer relationship management systems were developed c. the Internet grew rapidly d. people move from farms to cities e. supermarkets and department stores proliferated

B

Refer to IT's About Business 9.1 - Tiger Tans and Gifts: Which of the following is true about Lisa's use of Facebook to grow her business? Select one: a. Lisa had to build her own Web site b. Lisa does not do online selling via Facebook. c. Lisa is using crowdsourcing to get new product designs. d. Lisa only posts on her page when she has a new product.

B

Refer to Opening Case - The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality? Select one: a. Net neutrality might hinder U.S. competitiveness. b. Telecommunications and cable companies are in favor of net neutrality. c. Network providers could censor certain content by slowing down or blocking access. d. The amount of video traffic on the Internet is increasing. e. Under current models, the investment required to meet future demand exceeds projected revenue growth.

B

The area of the earth reached by a satellite's transmission is referred to as its _____. Select one: a. Hotspot b. Footprint c. Wireless area d. Zone e. Coverage

B

_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. Select one: a. Data, knowledge b. Knowledge, information c. Information, data d. Data, information e. Information, knowled

B

_____ is a method for analyzing and reducing a relational database to its most streamlined form. Select one: a. Joining b. Normalization c. Structured query d. Relational analysis e. Query by example

B

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. Select one: a. Decision support b. Knowledge management c. Online analytical processing d. Discovery e. Data mining

B

_____ tell the database management system which records are joined with others in related tables. Select one: a. Common attributes b. Primary keys c. Common files d. Secondary keys e. Common field

B

What are the benefits of interoganizational information systems?

Benefits of this are: 1.)reduced cost of routine business transactions 2.) Improved quality of information flow and elimination of errors 3.) compressed cycle time when fulfilling business transactions 4.) elimination of paper processing 5.) making the transfer and processing of information easier for users

A _____ is automatically launched by some trigger and appears behind the active window. Select one: a. random banner b. pop-up ad c. pop-under ad d. text box e. keyword banner

C

Biometrics are an example of: Select one: a. something the user knows. b. something the user does. c. something the user is. d. something the user has. e. something the user wants

C

_____ includes those areas where customers directly interact with the company.

Customer-facing CRM

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. A. The public, the individual B. The public, ethics C. Freedom of speech, privacy D. The individual, freedom of speech E. Ethics, security C.Freedom of speech, privacy

C

In IT's About Business 7.3: Macy has involved external companies to perform the following service Select one: a. Track customer details on Macy's website b. Create a mobile version on Macy's website c. Increase traffic to the Macy's website d. Analyze Macy's website performance e. Track Macy's website traffic

C

In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? Select one: a. affiliate marketing b. name-your-own-price c. electronic tendering system d. online direct marketing e. find-the-best-price

C

Internet service providers connect to one another through _____. Select one: a. Common carrier connection points b. An extranet c. Network access points d. Internet connection points e. Network connection points

C

Which of the following can be used for reading utility meters without a person having to get out of a truck? Select one: a. Wi-Fi b. Near-field communications c. ZigBee d. RuBee e. RFID

C

Which of the following is not a component of a local area network? Select one: a. File server b. Client computers c. Bridge d. Network interface cards e. All of the above

C

Which of the following is not a possible solution to supply chain problems? a. vertical integration b. building inventories c. horizontal integration d. the bullwhip effect e. information sharing

C

Which of the following is true about the impact of social computing on customer service? Select one: a. Businesses will only get negative comments on social media posts. b. It's harder for customers to be heard by a company. c. Customers themselves can be used to reduce problems. d. Businesses can take their time responding to social media posts.

C

With _____, phone calls are treated as just another kind of data. Select one: a. Plain old telephone service b. Internet relay chat c. Voice over IP d. Chat rooms e. Teleconference

C

_____ occurs when the same data are stored in many places. Select one: a. Application/Data dependence b. Data consistency c. Data redundancy d. Data isolation e. Data integrity

C

61) Knowledge workers: a) handle day-to-day operations within an organization. b) make tactical decisions. c) advise middle managers d) make routine decisions. e) are generalists

C.

65) Which of the following statements about the potential impact of IT on non-managerial workers is true? a) IT will create more jobs than it eliminates. b) Employees will feel a higher degree of loyalty towards their company. c) IT could cause employees to experience a loss of identity. d) The flexibility of IT can minimize stress on the job.

C.

A database management system is primarily a(n) _____. Select one: a. interface between queries and a database b. file-handling program c. interface between applications and a database d. interface between data and a database e. data-modeling program

C.

Applying copyrights and trademarks is an example of a(n): A. Accounting business process B. Finance business process C. Marketing business process D. Production business process E. Management information systems business process

C.

Competitive advantage for an organization manifests as all of the following except: A. lower costs B. higher quality C. increased time to market D. increased profits E. increased speed

C.

Employees in which functional areas of the organization pose particularly grave threats to information security? Select one: a. operations management, management information systems b. finance, marketing c. human resources, management information systems d. human resources, finance e. finance, management information systems

C.

Which of the following is not an ethical issue related to IT? A. Privacy B. Accuracy C. Accountability D. Property (such as intellectual property) E. Accessibility to information

C.

The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the?

CIO

Various organizations that promote fair and responsible use of information systems often develop

Code of Ethics

A check-in kiosk at the airport would be what type of CRM application?

Customer touching CRM

A _____ sends messages through several connected LANs or to a wide-area network. Select one: a. File server b. Bridge c. Gateway d. Router e. Network interface card

D

In TCP/IP, IP is responsible for: Select one: a. Error checking. b. Sequencing the transfer of packets across the network. c. Establishing the Internet connection between two computers. d. Disassembling and reassembling of packets during transmission. e. Moving packets over the network.

D

The degree of digitization relates to all of the following except: Select one: a. the product or service sold b. the process by which the product is produced c. the delivery agent or intermediary d. the size of e-commerce transactions e. none of the above

D

The monitoring, collection, and analysis of socially generated data is called Select one: a. Social networking b. Social advertising c. Social capital d. Social intelligence e. Social commerce

D

You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use? Select one: a. Tags b. RSS feeds c. Netcasts d. Wikis e. Blogs

D

_____ networks use multiple Wi-Fi access points to create a wide area network. Select one: a. Pervasive b. Fixed c. Global d. Mesh e. Ubiquitous

D

_____ portals support communities such as hobby groups or political parties. Select one: a. Commercial b. Corporate c. Personal d. Affinity e. Industrywide

D

_____ signals convey information in wave form, whereas _____ signals convey information in binary form. Select one: a. Packet, analog b. Digital, analog c. Digital, packet d. Analog, digital e. Analog, packet

D

________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen. Select one: a. Direct sales b. Disintegration c. Value-added services d. Disintermediation e. Supply chain integration

D

38) Which of the following statements concerning the complexity of management of information resources is not true? a) Information systems have an enormous strategic value within an organization and therefore firms rely on them heavily. b) Information systems are expensive to acquire, operate, and maintain. c) Computers are decentralized throughout the organization, which makes it harder to manage. d) Managing mainframes has become more difficult. e) Managing information resources is divided between the MIS department and end users and there is no standard way to divide responsibility between them.

D.

Dumpster diving is: Select one: a. always illegal because individuals own the material in the dumpster. b. always legal because the dumpster is not owned by private citizens. c. never illegal because it is not considered trespassing. d. typically committed for the purpose of identity theft. e. always illegal because it is considered trespassing.

D.

New technologies can produce new products very _____, which _____ the threat from substitute products. A. slowly, decreases B. slowly, increases C. slowly, does not affect D. quickly, increases E. quickly, does not affect

D.

The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. A. Common good B. Fairness C. Rights D. Utilitarian E. Well-being

D.

Why are many organizations turning to NoSQL databases to manage big data? Select one: a. NoSQL databases have a finite amount of data they can handle b. NoSQL databases are less expensive than other databases c. NoSQL databases do not allow for missing data d. NOSQL databases can process unstructured as well as structured data

D.

Which of the following is not a Section Reference 1 by organizations to business pressures?

Delay releases of innovated products

Refer to Closing Case - Retailer Gains Many Benefits with RFID Item-Level Tagging: Which of the following is the primary advantage of using RFID tags for retailers? Select one: a. Cost savings on tags b. Cost savings on scanner installations c. Storing more information about each item d. Easy to see tags on items e. Cost savings from time and labor

E

The benefits of e-learning include which of the following? Select one: a. Increased content retention b. Current, high-quality content c. Consistency d. Flexibility e. All of the above

E

The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. Select one: a. Security, mobility b. Security, broad reach c. Mobility, lack of expense d. Broad reach, localization e. Mobility, broad reach

E

Which of the following is not an example of Web 2.0 applications? Select one: a. Blogs b. Crowdsourcing c. Netcasting d. Wikis e. AJAX

E

_____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form. Select one: a. Electronic credit cards b. Electronic cash transactions c. Electronic debit cards d. Electronic wallets e. Electronic checks

E

_____ are segments of computer code embedded within an organization's existing computer programs that activate and perform a destructive action at a certain time or date. Select one: a. Worms b. Back doors c. Viruses d. Trojan horses e. Logic bombs

E

_____ auctions are the most common auction model for large purchases. Select one: a. Static b. Physical c. Simple d. Forward e. Reverse

E

A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail. Select one: a. Distributed denial-of-service b. Denial-of-service c. Brute force dictionary d. Zero-day e. Phishing

E.

A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following? Select one: a. A knowledge base b. Copyrighted material c. Patented material d. Public property e. A trade secret

E.

A(n) _____ connects two or more devices in a limited geographical area. Select one: a. Enterprise network b. Wide-area network c. Personal area network d. Value added network e. Local area network

E.

An organization's information technology architecture: A. provides a guide for current operations B. provides a blueprint for future directions C. integrates the information requirements of the organization and all users D. is analogous to the architecture of a house E. all of the above

E.

Place the following members of the data hierarchy in their correct order: Select one: a. Bit - field - byte - record - file - database b. Byte - bit - record - field - database c. Bit - record - field - byte - file -- database d. Bit - byte - field - record - database - file e. Bit - byte - field - record - file - database

E.

Refer to IT's About Business 5.4: Hospital Improves Patient Care with Data Warehouse: A single source of all patient data, accessible to multiple hospitals will have the following benefit Select one: a. aid in medical research b. reduce duplicate tests c. eliminate the need for patients to do their own record keeping d. faster transfer of high-volume image data across different locations e. all of the above

E.

The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. Select one: a. Extranet b. Ethernet c. Intranet d. World Wide Web e. Internet

E.

The workforce in developed countries has which of the following characteristics? A. more diversified B. more women C. more single parents D. more persons with disabilities E. all of the above

E.

Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers? Select one: a. Worms b. Adware c. Viruses d. Spyware e. Spamware

E.

_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. Select one: a. Data security b. Input c. Administrative d. Physical e. Access

E.

IT personnel use ___ to produce ___.

IT components, IT services

____ conveys understanding, accumulated learning, and expertise as they apply to a current problem

Knowledge

Collaborative CRM systems provide interaction with customers throughout the entire organization. T or F

True

Vendor Managed Inventory is a form of outsourcing. True or False

True

37. Which of the following is not a benefit of being an informed user of IT?

Working in the IT side of the organization

A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor's site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model? Select one: a. affiliate marketing b. online direct marketing c. find-the-best-price d. electronic tendering system e. name-your-own-price

a

Refer to IT's About Business 9.1 - Tiger Tans and Gifts: Lisa Kelling is able to use her business's Facebook page to do the following: Select one: a. Let customers place orders online b. Post pictures of new product designs c. Provide information (e.g., location and times) about her business d. Create an online presence for her business

a

Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases. a) implementation b) choice c) design d) intelligence e) consideration

a

The generic term for technologies that use radio waves to automatically identify individual items is __________. Select one: a. Radio-frequency identification b. Telemetry c. Wireless access points d. Bar codes e. Shipping labels

a

Today, geographical information systems are being combined with _____ to form geospatial technologies. a. global positioning systems b. expert systems c. neural networks d. decision support systems e. dashboards

a

Which of the following is not a reason why managers need IT support? a) The number of alternatives is decreasing. b) Decisions must typically be made under time pressure. c) Decisions are becoming more complex. d) There is a growing need to access remote information sources. e) Decision makers are often based in different locations.

a

_____ contain a chip that can store information and be used for several purposes. Select one: a. Smart cards b. Purchasing cards c. Stored-value money cards d. Person-to-person payments e. Electronic checks

a

_____ enable two individuals to transfer funds without using a credit card. Select one: a. Person-to-person payments b. Stored-value money cards c. Electronic checks d. Smart cards e. Purchasing cards

a

Refer to Closing Case: Baxter: Coming to Work Right next to you. Modern industrial robots must be suited to the following situations.

all of the above

Computer support is least for which of the following problems? a) semistructured and strategic planning b) unstructured and strategic planning c) semistructured and management control d) unstructured and operational control e) structured and strategic planning

b

Digital dashboards provide all of the following capabilities except: a) drill-down b) transaction processing c) status access d) key performance indicators e) exception reporting

b

In the _____ phase of the decision-making process, managers test potential solutions "on paper." a) implementation b) choice c) design d) intelligence e) consideration

b

The development of mobile commerce is driven by all of the following factors except: Select one: a. It eliminates the need for a PC. b. Increasing prices. c. The widespread availability of mobile devices. d. The cell phone culture. e. Bandwidth improvement.

b

Which of the following is not a basic role of managers? a) interpersonal b) processor c) informational d) decisional

b

Which of the following statements about Wi-Fi is not correct? Select one: a. Wi-Fi requires encryption for secure transmissions. b. Wi-Fi is expensive to set up. c. Wi-Fi provides simple Internet access. d. Laptop PC scans contain chips that can send and receive Wi-Fi signals. e. Many companies offer free Wi-Fi access in their stores.

b

Which of the following statements regarding the relationship between electronic commerce and search is not correct? Select one: a. Shopping carts are often abandoned after unsuccessful online searches. b. Purchases often follow successful online searches. c. Retailers will provide fewer product details to avoid information overload for customers. d. Customers will be able to find the closest store offering the product that they want. e. Customers will have more relevant product information in the near future.

c

Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called

customer intimacy

In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem. a) implementation b) choice c) design d) intelligence e) consideration

d

Which of the following is a type of collaborative consumption? Select one: a. Renting a car from Hertz or Avis b. Buying a new book from Amazon c. Buying a e-textbook from your bookstore d. Craigslist

d

_____ attempts to find the value of the inputs necessary to achieve a desired level of output. a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) Simulation

d

Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down?

digital dashboards

What is the relationship between advances in information technology and the practice of profiling? A. Advances in IT make it more difficult to profile individuals. B. Advances in IT have no impact on profiling. C. Advances in IT make it more expensive to profile individuals. D. Advances in IT make it easier to profile individuals.

d.

A purchase of books in the college bookstore is _____. The report at the end of the day showing sales totals for the day is ___.

data, information

As a manager in your company you expect to retrieve ____ from operational systems and present it as ___ to your boss, who will react based on his ____.

data, information, knowledge

Which of the following is the correct hierarchy from the lowest level to the highest level?

data, information, knowledge

Being an entrepreneur, disturbance handler, and negotiator is part of the ______ managerial role.

decisional

Which of the following statements is correct?

determining and enforcing privacy regulations can be difficult

Cybercriminals can obtain the information they need in order to assume another person's identity by: Select one: a. Infiltrating an organization that stores large amounts of personal information. b. Phishing. c. Hacking into a corporate database. d. Stealing mail. e. All of the above are strategies to obtain information to assume another person's identity.

e.

Which of the following statements is false?

government deregulation reduces competition

An organization's _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization.

information technology infrastructure

Being a figurehead and leader is part of the _________ managerial role.

interpersonal

You are registering for the next semester at your university. You take into account your major, the courses you need, the prereqs for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using ____ to select your class schedule.

knowledge

The threat of competitors entering the automobile manufacturing industry is ____ because barriers to entry are so ____.

low, high


Ensembles d'études connexes

Pharm review - Cardiovascular, Hematologic, and Lymphatic Systems

View Set

Chapter 30: Abdominal and Genitourinary Injuries

View Set

Chapter 3 Financial Accounting Quiz

View Set

AP U.S. Government & Politics: Chapter 6

View Set

PrepU Chapter 36: Management of Patients with Musculoskeletal Disorders

View Set

chapter 17 Prep U- Implementation

View Set

NURS 212 (Final and last chapter)

View Set