is ch 2, MIS Chapter 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

________ systems are designed to help firms manage their relationships with their customers. A) CRM B) MIS C) CLE D) CLU

A) CRM

Which type of system would you use to determine what trends in your supplier's industry will affect your firm the most in five years? A) ESS B) TPS C) MIS D) DSS

A) ESS

All of the following statements regarding Lotus Notes are true except which one? A) It began as an e-mail and messaging client. B) It is a widely used collaboration tool at larger firms. C) It provides capabilities for wikis and microblogging. D) It provides tools for full version control of all company documentation.

A) It began as an e-mail and messaging client.

Enabling management to make better decisions regarding organizing and scheduling sourcing, production, and distribution is a central feature of A) SCMs. B) TPSs. C) KMSs. D) ERPs.

A) SCMs.

An example of a collaboration tool that supports colocated, asynchronous collaboration is A) a team room. B) e-mail. C) a MUD. D) a wall display.

A) a team room.

Telus's use of SharePoint for team sites is an example of using information systems to achieve which business objective? A) customer and supplier intimacy B) survival C) improved decision making D) operational excellence

A) customer and supplier intimacy

Buying or selling goods over the Internet is called A) e-commerce. B) e-business. C) an intranet. D) an extranet.

A) e-commerce.

The CPO is responsible for A) ensuring that the company complies with existing data privacy laws. B) making better use of existing knowledge in organizational and management processes. C) enforcing the firm's information security policy. D) overseeing the use of information technology in the firm.

A) ensuring that the company complies with existing data privacy laws.

________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance. A) Management information B) Transaction processing C) Decision-support D) Knowledge management

C) Decision-support

Which types of systems consolidate the relevant knowledge and experience in the firm to make it available to improve business processes and management decision making? A) TPS B) extranets C) KMS D) CRM

C) KMS

Which type of system would you use to determine the five suppliers with the worst record in delivering goods on time? A) ESS B) TPS C) MIS D) DSS

C) MIS

The most economically damaging kinds of computer crime are e-mail viruses. - True - False

False

The potential for unauthorized access is usually limited to the communications lines of a network. - True - False

False

The range of Wi-Fi networks can be extended up to two miles by using external antennae. - True - False

False

Smaller firms can outsource security functions to - MISs - CSOs - MSSPs - CAs

MSSPs

Fault-tolerant computers contain redundant hardware, software, and power supply components. - True - False

True

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs. - True - False

True

Public key encryption uses two keys. - True - False

True

SSL is a protocol used to establish a secure connection between two computers. - True - False

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. - True - False

True

The WEP specification calls for an access point and its users to share the same 40-bit encrypted password. - True - False

True

Viruses can be spread through e-mail. - True - False

True

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. - True - False

True

An analysis of the firm's most critical systems and the impact a system's outage would have on the business is included in a(n) - security policy. - AUP. - risk assessment. - business impact analysis.

business impact analysis.

Online transaction processing requires - more processing time. - a large server network. - fault-tolerant computer systems. - dedicated phone lines.

fault-tolerant computer systems.

An authentication token is a(n) - device the size of a credit card that contains access permission data. - type of smart card. - gadget that displays passcodes. - electronic marker attached to a digital authorization file.

gadget that displays passcodes

An authentication token is a(n) - device the size of a credit card that contains access permission data. - type of smart card. - gadget that displays passcodes. - electronic marker attached to a digital authorization file.

gadget that displays passcodes.

Specific security challenges that threaten corporate servers in a client/server environment include - tapping; sniffing; message alteration; radiation. - hacking; vandalism; denial of service attacks. - theft, copying, alteration of data; hardware or software failure. - unauthorized access; errors; spyware.

hacking; vandalism; denial of service attacks.

The Sarbanes-Oxley Act - requires financial institutions to ensure the security of customer data. - specifies best practices in information systems security and control. - imposes responsibility on companies and management to safeguard the accuracy of financial information. - outlines medical security and privacy rules.

imposes responsibility on companies and management to safeguard the accuracy of financial information.

How do software vendors correct flaws in their software after it has been distributed? - issue bug fixes - issue patches - re-release software - issue updated versions

issue patches

The Internet poses specific security problems because - it was designed to be easily accessible. - everyone uses the Internet. - Internet standards are universal. - it changes so rapidly.

it was designed to be easily accessible

Synchronous collaboration tools allow global firms to collaborate from different locations at the same time.

t

Specific security challenges that threaten the communications lines in a client/server environment include - tapping; sniffing; message alteration; radiation. - hacking; vandalism; denial of service attacks. - theft, copying, alteration of data; hardware or software failure. - unauthorized access; errors; spyware.

tapping; sniffing; message alteration; radiation.

You have been hired by Inspiration Inc., to help improve their profit margin. Inspiration Inc. is a business communications consultancy that services many clients in different industries throughout the United States. The end products of the company are customized recommendations for the best use of a client's existing resources for improving internal communications, typically delivered via documentation in different media. The company has approximately 100 consultants, all of whom are located in their central headquarters in Chicago. What system do you recommend to improve the company's business processes and increase their profit margin? A) extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed B) CRM, to maintain easily accessible customer records to minimize the time spent looking for client data C) KMS, for minimizing redundant work on similar clients D) marketing system, for improving sales levels

A) extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed

Executive support systems are information systems that support the A) long-range planning activities of senior management. B) knowledge and data workers in an organization. C) decision making and administrative activities of middle managers. D) day-to-day processes of production.

A) long-range planning activities of senior management.

E-government refers to the application of ________ to digitally enable government and public sector agencies' relationships with citizens, businesses, and other arms of government. A) the Internet and networking technologies B) e-commerce C) e-business D) any computerized technology

A) the Internet and networking technologies

Which systems are typically a major source of data for other systems? A) transaction processing systems B) management information systems C) executive support systems D) decision-support systems

A) transaction processing systems

Which of the following types of collaboration tools allows you to communicate with avatars using text messaging? A) virtual worlds B) screen sharing C) collaborative writing D) large audience Webinars

A) virtual worlds

Which of the following decisions requires knowledge based on collaboration and interaction? A) How long will it take to manufacture this product? B) Should we work with outside vendors on new products and services? C) In which geographical locations are our products garnering the most sales? D) Which product design is the most efficient for the user in terms of energy use?

B) Should we work with outside vendors on new products and services?

________ systems integrate supplier, manufacturer, distributor, and customer logistics processes. A) Collaborative distribution B) Supply-chain management C) Reverse logistics D) Enterprise planning

B) Supply-chain management

Which type of system would you use to change a production schedule if a key supplier was late in delivering goods? A) ESS B) TPS C) MIS D) DSS

B) TPS

You work for a highly successful advertiser that is just about to expand nationally. Of utmost importance will be finding a way to store and disseminate their clients' continually updated branding guides, which include multiple image files and text documents, to all of the firm's branches. What system will best serve these needs? A) an intranet with KMS capabilities B) an extranet with KMS capabilities C) a TPS with KMS capabilities D) a CRM

B) an extranet with KMS capabilities

Which of the following is an example of a cross-functional business process? A) identifying customers B) creating a new product C) assembling a product D) paying creditors

B) creating a new product

The use of digital technology and the Internet to execute the major business processes in the enterprise is called A) e-commerce. B) e-business. C) enterprise applications.

B) e-business.

What is the most important function of an enterprise application? A) increasing speed of communicating B) enabling business functions and departments to share information C) enabling a company to work collaboratively with customers and suppliers D) enabling cost-effective e-business processes

B) enabling business functions and departments to share information

A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business. A) transaction B) enterprise C) automatic reporting D) management information

B) enterprise

Enterprise systems are also known as ________ systems. A) resource planning B) enterprise resource planning C) enterprise support D) management information

B) enterprise resource planning

Which systems often deliver information to senior executives through a portal, which uses a Web interface to present integrated personalized business content? A) transaction processing systems B) executive support systems C) management information systems D) decision-support systems

B) executive support systems

Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers? A) intranet B) extranet C) KMS D) TPS

B) extranet

A ________ is a senior manager who oversees the use of IT in the firm. A) CEO B) CFO C) CIO D) CTO

C) CIO

The ________ helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes. A) CTO B) CSO C) CKO D) CPO

C) CKO

Which of the following statements about collaboration is not true? A) In business, a collaboration can last as little as a few minutes. B) Business collaboration relies on the formation of teams that are assigned a specific task or goal. C) Successful collaboration can be achieved through technology regardless of the organization's culture or structure. D) One business benefit of collaboration is improved innovation.

C) Successful collaboration can be achieved through technology regardless of the organization's culture or structure.

You have been hired by a worldwide non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, sms, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? A) TPS B) TPS with DSS capabilities C) TPS with MIS capabilities D) TPS with ESS capabilities

C) TPS with MIS capabilities

Which of the following occupations would not be categorized as an "interaction" job? A) sales representative B) business manager C) engineer D) operations manager

C) engineer

You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click- throughs about their current banner ads. Which type of system will most efficiently provide a solution? A) CRM B) enterprise system C) extranet D) intranet

C) extranet

Producing bills of materials is a business process within the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing

C) manufacturing and production

The principal liaison between the information systems groups and the rest of the organization is a(n) A) programmer. B) information systems manager. C) systems analyst. D) CTO.

C) systems analyst.

To monitor the status of internal operations and the firm's relations with the external environment, managers need ________ systems. A) decision-support B) knowledge C) transaction processing D) management information

C) transaction processing

You are planning the launch of your new company, an application service provider that provides an online timesheet and project tracking application. To best communicate with and manage your relationship with your users, you would want to implement a(n) A) extranet. B) intranet. C) KMS. D) CMS.

D) CMS.

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system? A) MIS B) TPS C) ESS D) DSS

D) DSS

Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records? A) ESS B) TPS C) MIS D) DSS

D) DSS

________ are designed to support organization-wide process coordination and integration. A) Decision-support systems B) Management information systems C) CRM systems D) Enterprise applications

D) Enterprise applications

The four major enterprise applications are A) SCMs, CRMs, DSSs, and KMSs. B) SCMs, CRMs, ESSs, and KMSs. C) enterprise systems, SCMs, DSSs, and CRMs. D) enterprise systems, SCMs, CRMs, and KMSs.

D) enterprise systems, SCMs, CRMs, and KMSs.

An example of a highly structured decision is A) creating a new product. B) estimating the effect of changing costs of supply materials. C) calculating the best trucking routes for product delivery. D) granting credit to a customer.

D) granting credit to a customer.

All of the following are direct business benefits of collaboration except for A) improved quality. B) improved financial performance. C) improved customer service. D) improved compliance with government regulations.

D) improved compliance with government regulations.

A relocation control system that reports summaries on the total moving, house hunting, and home financing costs for employees in all company divisions would fall into the category of A) knowledge management systems. B) transaction processing systems. C) executive support systems. D) management information systems.

D) management information systems.

Which of the following roles falls into the duties of an information systems manager? A) writing software instructions for computers B) acting as liaison between the information systems group and the rest of the organization C) translating business problems into information requirements D) managing data entry staff

D) managing data entry staff

The term "management information systems" designates a specific category of information systems serving A) integrated data processing throughout the firm. B) transaction process reporting. C) employees with online access to historical records. D) middle management functions.

D) middle management functions.

Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix? A) synchronous/colocated B) same time/remote C) different time/remote D) remote/colocated

D) remote/colocated

Identifying customers is a responsibility of the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing

D) sales and marketing

ESS are specifically designed to serve which level of the organization? A) operational B) end-user C) middle management D) senior management

D) senior management

Which of the following is not one of the reasons for the increased business focus on collaboration and teamwork? A) the need for creating innovative products and services B) growth of "interaction" jobs C) greater global presence D) the need for more efficient work hierarchies

D) the need for more efficient work hierarchies

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. - Software - Administrative - Data security - Implementation

Data security

An acceptable use policy defines the acceptable level of access to information assets for different users. - True - False

False

Biometric authentication is the use of physical characteristics such as retinal images to provide identification. - True - False

False

High-availability computing is also referred to as fault tolerance. - True - False

False

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. - Stateful inspections - Intrusion detection systems - Application proxy filtering technologies - Packet filtering technologies

Intrusion detection systems

Currently, the protocols used for secure information transfer over the Internet are - TCP/IP and SSL. - S-HTTP and CA. - HTTP and TCP/IP. - SSL, TLS, and S-HTTP.

SSL, TLS, and S-HTTP.

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? - Trojan horse - virus - worm - spyware

Trojan horse

Computer worms spread much more rapidly than computer viruses. - True - False

True

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. - True - False

True

How do hackers create a botnet? - by infecting Web search bots with malware - by using Web search bots to infect other computers - by causing other people's computers to become "zombie" PCs following a master computer - by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door

by causing other people's computers to become "zombie" PCs following a master computer

Application controls - can be classified as input controls, processing controls, and output controls. - govern the design, security, and use of computer programs and the security of data files in general throughout the organization. - apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. - include software controls, computer operations controls, and implementation controls.

can be classified as input controls, processing controls, and output controls.

Biometric authentication - is inexpensive. - is used widely in Europe for security applications. - can use a person's face as a unique, measurable trait. - only uses physical traits as a measurement.

can use a person's face as a unique, measurable trait.

Downtime refers to periods of time in which a - computer system is malfunctioning. - computer system is not operational. - corporation or organization is not operational. - computer is not online.

computer system is not operational.

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. - high availability computing - deep-packet inspection - application proxy filtering - stateful inspection

deep-packet inspection

A firewall allows the organization to - enforce a security policy on traffic between its network and the Internet. - check the accuracy of all transactions between its network and the Internet. - create an enterprise system on the Internet. - check the content of all incoming and outgoing e-mail messages.

enforce a security policy on traffic between its network and the Internet.

A hotel reservation system is a typical example of a management information system.

f

ESSs are designed primarily to solve specific problems.

f

Enrolling employees in benefits plans is a business process handled by the finance and accounting function.

f

In social business, firms use social networks for coordinating production tasks.

f

Management information systems typically support nonroutine decision making.

f

Most MISs use sophisticated mathematical models or statistical techniques.

f

Transaction processing systems are most commonly used by the senior management level of an organization.

f

You would use an MIS to help decide whether to introduce a new product line.

f

Rigorous password systems - are one of the most effective security tools. - may hinder employee productivity. - are costly to implement. - are often disregarded by employees.

may hinder employee productivity.

Most antivirus software is effective against - only those viruses active on the Internet and through e-mail. - any virus. - any virus except those in wireless communications applications. - only those viruses already known when the software is written.

only those viruses already known when the software is written.

The HIPAA Act of 1997 - requires financial institutions to ensure the security of customer data. - specifies best practices in information systems security and control. - imposes responsibility on companies and management to safeguard the accuracy of financial information. - outlines medical security and privacy rules.

outlines medical security and privacy rules.

Supply chain management systems are more externally oriented than enterprise systems.

t

Pharming involves - redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. - pretending to be a legitimate business's representative in order to garner information about a security system. - setting up fake Web sites to ask users for confidential information. - using e-mails for threats or harassment.

redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.

The Gramm-Leach-Bliley Act - requires financial institutions to ensure the security of customer data. - specifies best practices in information systems security and control. - imposes responsibility on companies and management to safeguard the accuracy of financial information. - outlines medical security and privacy rules.

requires financial institutions to ensure the security of customer data.

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n) - security policy. - AUP. - risk assessment. - business impact analysis.

risk assessment.

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called - sniffing - social engineering - phishing - pharming

social engineering

Phishing is a form of - spoofing. - spinning. - snooping. - sniffing.

spoofing.

A key logger is a type of - worm. - Trojan horse. - virus. - spyware.

spyware.

In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver? - stateful inspection - intrusion detection system - application proxy filtering - packet filtering

stateful inspection

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? - SSL - symmetric key encryption - public key encryption - private key encryption

symmetric key encryption

A Skype conference call using VOIP and webcams is an example of a remote, synchronous collaboration tool.

t

A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.

t

Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance.

t

Decision-support systems use internal information as well as information from external sources.

t

ESSs draw summarized information from internal MIS and DSS.

t

Enterprise systems often include transactions with customers and vendors.

t

Functional systems that support business processes within a single functional group, such as human resources, are being phased out in favor of cross-functional systems.

t

MIS job growth is projected to be 50% greater than other jobs in the next five years.

t

Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information.

t

Shipping a product to a customer is an example of a business process.

t

Specific security challenges that threaten clients in a client/server environment include - tapping; sniffing; message alteration; radiation. - hacking; vandalism; denial of service attacks. - theft, copying, alteration of data; hardware or software failure. - unauthorized access; errors; spyware.

unauthorized access; errors; spyware.

An independent computer program that copies itself from one computer to another over a network is called a - worm. - Trojan horse. - bug. - pest.

worm.

Sobig.F and MyDoom.A are - viruses that use Microsoft Outlook to spread to other systems. - worms attached to e-mail that spread from computer to computer. - multipartite viruses that can infect files as well as the boot sector of the hard drive. - Trojan horses used to create bot nets.

worms attached to e-mail that spread from computer to computer.


Ensembles d'études connexes

MEAN, MEDIAN, MODE, Mean, Median, Mode, Range

View Set

MH Module 4 Bipolar Spectrum Disorders

View Set

Chapter 12 Inventories and Cost of Goods Sold

View Set

Ch.7 Quiz CTS1134, Chapter 7, Ch 8 Network, Ch 8, Networking Quiz: Ch. 08

View Set

Chapter 1: Concepts and Checkpoints

View Set

Small Steps: The Year I Got Polio

View Set