ISYS 363 MIS Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is an example of a cloud-based messaging tool? a) WhatsApp b) Instagram c) Facebook d) Twitter e) Flicker

a) WhatsApp

The type of testing that involves actual system users performing tests of the new system with actual data is called ___________ testing. a) beta b) developmental c) alpha d) usability e) performance

a) beta

With the _______ Web, search engines will be able to give richer and more accurate responses to search requests. a) syntactical b) grammar-driven c) meaningful d) mashup e) semantic

e) semantic

Which of the following is an important enabling technology that is used to share similar data across applications over the Web? a) HTML b) XML c) ISM d) URL e) SQL

b) XML

Which of the following helps visualize key CRM performance metrics? a) XBRL data b) Customer portal c) Digital dashboard d) Transaction processing system e) XML tag

c) Digital dashboard

Which type of systems maintenance is performed to enable the system to accommodate changes in functionality due to changing business needs? a) Adaptive maintenance b) Corrective maintenance c) Intuitive maintenance d) Preventative maintenance e) Perfective maintenance

a) Adaptive maintenance

Which of the following prevents an individual from including a favorite song without permission in a commercial business presentation? a) Copyright laws b) Patent protection c) Hacking concerns d) Federal customs laws e) Computer fraud fears

a) Copyright laws

Which of the following is NOT a recommended part of making an external acquisition of an information system? a) Prototyping b) Developing a request for proposal c) Vendor selection d) Systems planning and selection e) Systems analysis

a) Prototyping

Which of the following is a type of malware that holds a computer hostage by locking the computer or encrypting the computer's files? a) Ransomware b) Trojan horse c) Kidnapper d) Time bomb e) Virus

a) Ransomware

________________ is(are) sometimes attributed for productivity challenges related to the time when an organization makes an investment until benefits are actually realized. a) Time lags b) Time cycles c) Liabilities d) Assets e) Downtime

a) Time lags

A type of malware that appears to be a legitimate program but actually carries a destructive program is called a _____________. a) Trojan horse b) virus c) super worm d) worm e) superbug

a) Trojan horse

Traditional task forces are more strategically being replaced with _____________. a) Virtual teams b) Systems analysis c) Team goalies d) Entity relationship teams e) Team productivity

a) Virtual teams

The precautions taken to keep all aspects of information systems (e.g., all hardware, software, network equipment, and data) safe from destruction, manipulation, or unauthorized use or access, while providing the intended functionality to legitimate users are collectively referred to as __________________. a) information systems security b) information systems countermeasures c) cybermeasures d) information systems protections e) reverse engineering

a) information systems security

Collaborative CRM provides all of the following customer communication enhancements EXCEPT: a) less customer interaction with the company. b) better understanding of customer current needs. c) better customer service from any touch point. d) reduced communication barriers. e) better understanding of customer history.

a) less customer interaction with the company.

A(n) _______ is a new application or website that uses data from one or more service providers to create a unique application. a) mashup b) joint venture c) alliance d) partnership e) rumble

a) mashup

The phases of the systems development life cycle (SDLC), in order, are: a) planning and selection; analysis; design; implementation and operation b) analysis; design; planning and selection c) design; analysis; planning and selection; implementation and operations d) analysis; planning and selection; implementation and operation. e) design; planning and selection; implementation and operation.

a) planning and selection; analysis; design; implementation and operation

When examining overall IS productivity in an industry, ______________ occurs when benefits are difficult to identify because innovations may be beneficial for individual firms, but not the industry as a whole. a) redistribution b) mismanagement c) measurement d) competition e) lag times

a) redistribution

A critical task in the systems analysis phase of the SDLC is _________________. a) requirements collection b) estimating tangible benefits c) usability testing d) estimating tangible costs e) human-computer interaction design

a) requirements collection

The illegal practice of using proprietary software that you have not paid for is called _______________, and it costs the software industry billions of dollars a year. a) software piracy b) software stealing c) cyberharrassment d) cybersquatting e) software plundering

a) software piracy

When organizations use components of the supply chain management system to work with partners across the supply network to improve accuracy of demand forecasts, reduce inventory buffers, increase the velocity of materials, and improve customer service, they are using the ____________ function. a) supply network collaboration b) distribution planning c) safety stock planning d) order promising e) materials management

a) supply network collaboration

The act of _______ involves manually adding metadata to documents and other types of media to help in social cataloging. a) tagging b) uploading c) broadcasting d) spotting e) marking

a) tagging

When Walmart enables a supplier such as Proctor & Gamble to manage the inventory levels of P&G goods in Walmart warehouses by sharing inventory and sales data, it is using the ______________ business model. a) vendor-managed inventory b) supplier-sourced inventory c) vertical inventory management d) remote inventory management e) just-in-time

a) vendor-managed inventory

Which of the following statements best characterizes the purpose of a request for proposal? a) Request a list of the vendor's employees. b) Convey requirements to prospective vendors and invite them to submit a proposal to meet those requirements. c) Request a list of the vendor's previous clients. d) Request that a vendor send in information on its qualifications. e) Request some general information about a vendor's services.

b) Convey requirements to prospective vendors and invite them to submit a proposal to meet those requirements.

According to the text, the picture phone was first shown by ___________ in the 1960s. a) Kodak b) Disney c) Apple d) Google e) Microsoft

b) Disney

Which of the following is NOT a critical factor in a successful viral marketing campaign? a) Make a sequel. b) Make it difficult to find the ad on the Web. c) Do something unexpected. d) Make the content easy to access and share. e) Make people feel something.

b) Make it difficult to find the ad on the Web.

Which of the following involves using an external firm to provide some or all of an organization's information systems development? a) Rapid application development b) Outsourcing c) Franchising d) Prototyping e) Benchmarking

b) Outsourcing

Which of the following is NOT a challenge associated with creating an effective supply chain management strategy? a) Gain agreement among supply chain partners on the supply chain management system to use. b) Overcome database normalization challenges with relational databases. c) Overcome concerns about intellectual property theft. d) Overcome distrust among supply chain partners. e) The system is only as good as the data it receives.

b) Overcome database normalization challenges with relational databases.

Which of the following involves creating formal groups to identify and assess the volume and sentiment of what is being said about a company, individual, product, or brand? a) Mobile CRM b) Social media monitoring c) Competitive intelligence d) Web content mining e) Predictive CRM

b) Social media monitoring

Which of the following statements gives the best description of the purpose of collaboration management tools? a) These tools allow users to send files, documents, and pictures to one another and share information. b) These tools are used to facilitate virtual or collocated meetings and manage group activities c) These tools enable webinars. d) These tools allow information sharing and rich interactions among users. e) None of these statements correctly describes the purpose of collaboration management tools.

b) These tools are used to facilitate virtual or collocated meetings and manage group activities

Which of the following statements best describes collaboration? a) A supervisor schedules sales clerks for appointments during the upcoming week. b) Three people from different departments work together on a sales presentation. c) A payroll clerk reviews the employees' weekly time cards. d) One person schedules appointments for one or more employees. e) A sales manager reviews the monthly expense reports of the organization's sales staff.

b) Three people from different departments work together on a sales presentation.

An organization that uses an access point that automates the business processes that occur before, during, and after sales have been transacted between itself and multiple customers is using a _________________. a) procurement portal b) customer portal c) supplier portal d) sourcing portal e) customer exchange system

b) customer portal

When a company has a unique software need that cannot be satisfied by generic technologies, it will usually choose a(n) ____________ software option. a) embedded b) customized c) off-the-shelf d) generic e) personal productivity

b) customized

By creating an employee portal based on a company intranet, organizations can provide many human resource capabilities to their employees via _____________. a) decision support systems b) employee self-service c) transaction processing d) electronic meeting systems e) collocated teams

b) employee self-service

Limiting users' access to just the systems, data, or resources that are needed to perform their duties and restricting access to other resources is accomplished by implementing the principles of ________. a) user restraints b) least permissions and least privileges c) least permissions and maximum access d) limited scope and access e) restricted access

b) least permissions and least privileges

One of the challenges for smaller businesses in using collaborative Enterprise 2.0 tools is ________. a) unwillingness to change b) limited network effects because of failure to achieve critical mass c) the right organizational culture d) the right workforce composition e) failure to integrate the tools

b) limited network effects because of failure to achieve critical mass

The advantages of the just-in-time production strategies include all of the following EXCEPT: a) inventory storage costs are minimized. b) more frequent missed production schedules. c) parts and raw materials arrive just when they are needed for production. d) risks of inventory obsolescence are reduced. e) capital costs of inventory are minimized.

b) more frequent missed production schedules.

Reasons why radio-frequency identification (RFID) tags are becoming a very popular technology in supply chain management systems include all of the following EXCEPT: a) the need for hand-scanning is eliminated. b) the tags are much cheaper than bar codes. c) more information can be stored on the tags circuits. d) information on the tags can be easily modified e) the need for line-of-sight reading is eliminated.

b) the tags are much cheaper than bar codes.

Undesirable events that can cause harm, arising from agents internal or external to an organization, are called ________. a) risks b) threats c) impacts d) vulnerabilities e) controls

b) threats

A business that creates advertisements in a way that entices viewers to share the message with their friends through email or social networks is engaging in ________. a) crowdsourcing b) viral marketing c) social search d) open innovation e) microblogging

b) viral marketing

People who break into computer systems out of curiosity or to test security measures are often called ________. a) hacktivists b) white hats c) cracktivists d) smackers e) black hats

b) white hats

Which of the following features is a critical success factor for internal Enterprise 2.0 tools? a) Providing the tools b) Creating applications with no particular organizational objective c) A corporate culture of knowledge sharing, trust, and honest feedback d) Familiarity with the tools on a personal level e) Limited engagement by senior managers

c) A corporate culture of knowledge sharing, trust, and honest feedback

The purpose of a(n) _____________ is to support the communication preferences of customers, using multiple communication channels. a) Customer service center b) Digital dashboard c) Customer engagement center d) Sales force automation system e) Enterprise marketing management system

c) Customer engagement center

Which of the following is the component of the operational CRM that automates service requests, complaints, product returns, and information requests? a) Digital dashboard b) Customer engagement c) Customer service d) Enterprise marketing management e) Sales force automation system

c) Customer service

Which of the following is the stealing of another person's private information with the intention of executing financial transactions using the victim's accounts? a) Captcha b) Botnet c) Identity theft d) Spyware e) Spam

c) Identity theft

Which of the following is a process that a company like Netflix would use to develop, build, and maintain a system to improve movie recommendations? a) Net present value analysis b) Weighted multicriteria analysis c) Systems analysis and design d) Break-even analysis e) Risk analysis

c) Systems analysis and design

The notion that organizations will not adopt a new technology unless they see tangible benefits is called ________________. a) Technological integration b) Technological sound c) Technological inertia d) Enterprise inertia e) Enterprise integration

c) Technological inertia

_______ is the distribution of digital media for on-demand playback on digital media players. a) Online chats b) Microblogging c) Webcasts d) Discussion forums e) Instant messaging

c) Webcasts

When an organization provides its employees with policies stating, for instance, whether employees have permission to use Facebook during the day, the organization is providing its _____________ policies. a) technology b) privacy c) acceptable use d) copyright e) information systems

c) acceptable use

An organization that implements no information system countermeasures and decides to absorb any damages which are incurred has implemented a risk ________ strategy. a) reduction b) transference c) acceptance d) avoidance e) mitigation

c) acceptance

About 85% of all e-mail spam is sent by one of six major __________, which are destructive software robots working together on a collection of zombie computers. a) spy rings b) spear phishers c) botnets d) zombie webs e) bot webs

c) botnets

A ___________ analysis is used to determine when the costs of a new training program are equal to the benefits to the organization. a) net present value b) risk-assessment c) break-even d) systems e) weighted multicriteria

c) break-even

An integrated supply network can help reduce the impact of the ___________, which occurs when small forecasting errors at the end of the supply chain produce massive forecasting errors farther up in the supply chain. a) forecast error result b) demand swing effect c) bullwhip effect d) fluctuation effect e) saturation effect

c) bullwhip effect

To successfully implement CRM, organizations will have to implement all of the following organizational changes EXCEPT: a) employees must be trained to have a customer focus. b) policies and processes must reflect a customer focus. c) concerns about customer privacy can be relaxed. d) measures for customer satisfaction must be monitored. e) measures of the customer experience must be monitored and shared.

c) concerns about customer privacy can be relaxed.

The phenomenon of ________ enables companies to use everyday people as a cheap labor force. a) multisourcing b) groupsourcing c) crowdsourcing d) insourcing e) outsourcing

c) crowdsourcing

A widely-used tool for asynchronous group communication is the _____________. a) electronic meeting system b) shared whiteboard c) discussion forum d) video conferencing e) online chat

c) discussion forum

A company whose supply chain is focused on maximizing customer service is striving to achieve supply chain ______________. a) equilibrium b) efficiency c) effectiveness d) equality e) balance

c) effectiveness

When a company purchases an existing system from an outside vendor, it is obtaining the system through ______________. a) end-user development b) insourcing c) external acquisition d) in-house development e) outsourcing

c) external acquisition

The three types of arguments typically made in the business case for an information system are ________. a) costs, benefits, and facts b) facts, fear, and costs c) faith, fear, and facts d) fear, benefits, and competition e) faith, data, and profits

c) faith, fear, and facts

A person who breaks into a politician's website with plans to deface photos and add disturbing text is called a ____________________. a) smacker b) black hat c) hacktivist d) red hat e) cracktivist

c) hacktivist

Terrorists are using the Internet extensively to distribute propaganda to current and potential supporters, to influence international public opinion, and to notify potential enemies of pending plans. This is an example of ______________. a) recruiting b) training c) information dissemination d) networking e) data mining

c) information dissemination

An ________ can help organizations assess the state of their IS controls to determine necessary changes and to help ensure the information systems' availability, confidentiality, and integrity. a) information systems protocol b) information systems pact c) information systems audit d) information systems contract e) information systems standard

c) information systems audit

A popular synchronous Enterprise 2.0 application that enables multiple participants to communicate is _______. a) spreadsheet b) a microblogging tool c) instant messaging d) a discussion forum e) a blog

c) instant messaging

When the system fails to improve productivity because of poor design and implementation, the cause is often _______________________. a) intangible costs b) measurement problems c) mismanagement d) time lags e) redistribution

c) mismanagement

The most critical aspect of a successful outsourcing project's success is: a) limited interactions between the outsourcing firm and management b) casually-defined performance measures c) on-going management of the outsourcing alliance. d) a vague outsourcing contract. e) a weak CIO

c) on-going management of the outsourcing alliance.

A software license that allows users to use the software without restrictions is called ______________. a) private domain software b) non-protective open source c) public domain software d) proprietary e) open source

c) public domain software

What is the purpose of making a business case for an information system? a) Define the legal requirements of the new system. b) Define the hardware infrastructure that will support the new system. c) Define what the organization needs from the new system. d) Define the value expected from the investment in the system. e) Define the approach to take in acquiring the information system.

d) Define the value expected from the investment in the system.

Which of the following is a type of attack that could prevent the users of a website from being able to use the website? a) Spyware b) Spam c) Adware d) Denial of service e) Cookies

d) Denial of service

Which of the following terms refers to the difficulty of showing that information system investments generate significant productivity gains? a) Tangible cost phenomenon b) Proxy variability c) Inverted cost curve d) Productivity paradox e) Statistical anomaly

d) Productivity paradox

Which of the following is the component of the operational CRM that supports the day-to-day sales activities of an organization? a) Customer service b) Customer engagement c) Enterprise marketing management d) Sales force automation e) Digital dashboards

d) Sales force automation

The main innovation attributed to Web 2.0 is accredited to _____________________. a) Audio b) HTML c) HTTPS d) Social media e) Hypertext

d) Social media

Which of the following is NOT a form of cyberstalking? a) Posting incriminating pictures of the victim on social networking sites b) Making false accusations that damage the reputation of the victim on blogs, Web sites, chat rooms, or e-commerce sites c) Gaining information on a victim by monitoring online activities, accessing databases, and so on d) Using LinkedIn to find out where an acquaintance is employed e) Encouraging others to harass a victim by posting personal information about the victim on Web sites, chat rooms, or social networking sites

d) Using LinkedIn to find out where an acquaintance is employed

Which of the following is NOT a key process generally supported by supply chain planning modules? a) Inventory and safety stock planning b) Distribution planning c) Production planning d) Warehouse layout planning e) Demand planning and forecasting

d) Warehouse layout planning

A dangerous aspect of Enterprise 2.0 applications that allow close collaboration by increasing data sharing is_______. a) lengthy implementation procedures b) unwillingness to change c) high usability expectations d) concern about security e) impatience

d) concern about security

The business case for a new information system includes this argument: "We must have this new system to keep up with our competition." This is an example of a _________-based argument. a) faith b) fact c) benefit d) fear e) profit

d) fear

Enterprise 2.0 offers businesses all of the following advantages EXCEPT _______. a) improving organizational knowledge sharing b) making the business more innovative c) enhancing connections with customers d) increasing the difficulty of expanding their market share e) making the business more productive

d) increasing the difficulty of expanding their market share

Successful Web 2.0 applications rely on the ______, the notion that the value of the application increases as the number of users increases. a) exit rate b) bounce rate c) affiliate effect d) network effect e) conversion rate

d) network effect

A ______ automates the business processes involved in purchasing or procuring products between a single buyer and multiple suppliers. a) customer portal b) sourcing array c) vendor exchange d) supplier portal e) market portal

d) supplier portal

The ________________ has primary responsibility in a systems development project. a) database analyst b) data scientist c) infrastructure analyst d) systems analyst e) network administrator

d) systems analyst

The financial analysis associated with investing in a new information system should include ______________________, which includes all acquisition, use, and maintenance costs. a) intangible benefits b) recurring costs c) intangible costs d) the total cost of ownership e) both intangible costs and benefits

d) the total cost of ownership

A _______ is a Web site that allows people to post, add, edit, comment, and access information, including a database that keeps a history of all prior versions and changes. a) tweet b) blog c) chat d) wiki e) microblog

d) wiki

___________________ CRM systems include technologies such as data mining, decision support, and other business intelligence capabilities. a) Communicational b) Operational c) Collaborative d) Executive e) Analytical

e) Analytical

Amazon.com works with another commercial vendor to set up a web-based procurement system. Which of the following terms best describes this situation? a) Electronic data interchange b) Value chain management c) Supplier-to-business electronic commerce d) Supplier-to-supplier electronic commerce e) Business-to-business electronic commerce

e) Business-to-business electronic commerce

Organizations are using an automated system called ______________ to initiate conversations with customers. a) Horizon Live b) Facebook c) SQL d) Snapchat e) Chatbots

e) Chatbots

Which of the following terms refers to computer-to-computer communication following specific standards? a) Transaction data transfer (TDT) b) Transaction data exchange (TDE) c) Interchange data protocol (IDP) d) Electronic data transfer (EDT) e) Electronic data interchange (EDI)

e) Electronic data interchange (EDI)

Which of the following is the ultimate goal of cyberwar? a) Denial of service b) Intimidation c) Web vandalism d) Distribute propaganda e) Gain an information advantage over an opponent in order to diminish various capabilities

e) Gain an information advantage over an opponent in order to diminish various capabilities

If you were advising an organization about what to include in its information system security process, which of the following would you NOT include? a) Assess risks. b) Monitor security. c) Develop a security strategy. d) Implement controls and training. e) Once developed, the plan need not be changed.

e) Once developed, the plan need not be changed.

As a way to reduce the burden of managing the software infrastructure, firms may choose to use _______________ to access applications in the cloud on an as-needed basis using standard Web-enabled interfaces. a) software asset management b) Infrastructure as a Service (IaaS) c) FTP d) embedded software e) Software as a Service (SaaS)

e) Software as a Service (SaaS)

Which of the following statements is NOT true about cyberwar and cyberterrorism? a) Damages from a major attack could cost billions of dollars and endanger many citizens. b) Energy and transportation systems are extremely vulnerable. c) A major attack could cripple a country's economic system. d) Most experts believe cyberwar and cyberterrorism are imminent threats to the United States. e) The prospects for a significant attack are considered very low.

e) The prospects for a significant attack are considered very low.

One important security measure necessary for an organization to create a digital audit trail by ensuring that all actions can be traced is referred to as ________________. a) integrity b) confidentiality c) availability d) auditability e) accountability

e) accountability

A company that implements CRM software and strategy can expect all of the following benefits EXCEPT: a) improved product development. b) individualized service. c) better information. d) faster problem identification and resolution. e) higher customer turnover.

e) higher customer turnover.

"Making the business case" is best defined as ________ the value provided by a system. a) identifying and limiting b) limiting and presenting c) describing d) describing and presenting e) identifying, quantifying, and presenting

e) identifying, quantifying, and presenting

When companies deploy supply chain management systems, they are hoping to experience all of the following benefits EXCEPT: a) improved customer service. b) reduced inventory costs. c) improved coordination of suppliers. d) accelerated product development and innovation. e) increased time to market.

e) increased time to market.

Many popular movies today portray individuals who steal trade secrets to gain advantages over competitors. This activity is called __________________. a) hacktivism b) blackmail c) technological surveillance d) operational espionage e) industrial espionage

e) industrial espionage

One part of an organization's security measures involves ensuring that unauthorized manipulations of data and systems (that may compromise accuracy, completeness, or reliability) are prevented. This is referred to as ________________. a) confidentiality b) availability c) accountability d) privacy e) integrity

e) integrity

One troubling method computer criminals use to steal your passwords is called _________________, which involves collecting every keystroke. a) keyboard capture b) photo capturing c) key recording d) brute-force e) keylogging

e) keylogging

Based on the concept of collective intelligence, _______ is the creation of goods or services by self-organizing communities. a) representational delight b) structural enhancement c) functional convenience d) functional strength e) peer production

e) peer production

Issues that should be included in an organization's disaster recovery plan include all of the following EXCEPT: a) identify the hardware and software that is needed to recover from a disaster. b) define the chain of command. c) identify which events are considered disasters. d) identify the people that will be needed and their roles during the recovery. e) plan only for events with a high likelihood of occurring.

e) plan only for events with a high likelihood of occurring.

A _______ refers to a collection of companies and processes involved in moving a product from the suppliers of raw materials and parts to final production, and to the customer. a) production line b) production chain c) portal d) value chain e) supply chain

e) supply chain

A market comprised of firms operating within a certain industry sector is termed a _____________ market. a) horizontal b) captive c) non-competitive d) stable e) vertical

e) vertical

The _____________ is used to decide which of several different IS investments is the most desirable for the organization to accept. a) internal rate of return b) discount rate c) cost-benefit analysis d) break-even point e) weighted multicriteria analysis

e) weighted multicriteria analysis


Ensembles d'études connexes

Bio Chap 13, 14, 15 AP Classroom Questions

View Set

11HIS () Pearl Harbour -={Causes & Consequences}=-

View Set

U.S. History Quiz 3 - Reconstruction

View Set

Innovation Management Module 7 Trust in AI

View Set

Metals, Nonmetals, and Metalloids

View Set