MIS FINAL 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm

False

RFID technology is being gradually replaced by less costly technologies such as WSNs

False

Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.

False

WiMax has a wireless access range of up to 31 miles.

TRUE

Zero defects cannot be achieved in larger programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

TRUE

A business model describes how a company produces, delivers, and sells a product or service to create wealth.

True

A firm that invests in efficient business processes is making an investment in organizational complementary assets

True

Common Gateway Interface is a specification for processing data on a Web server.

True

Data cleansing is the same process as data scrubbing.

True

Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance.

True

Enterprise systems require fundamental changes in the way the business operates.

True

Firms can use social networking sites to improve their efficiency in customer service.

True

Inefficiencies in a supply chain are primarily caused by inaccurate information.

True

Internet advertising is growing at approximately 10 percent a year.

True

Supply chain management systems are more externally oriented than enterprise systems.

True

Total supply chain costs represent the majority of operating expenses for many businesses and in some industries approach 75 percent of the total operating budget.

True

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

True

Intellectual property refers to all forms of human expression, both tangible and intangible.

FALSE

Intelligent agents can discover underlying patterns, categories, and behaviors in large data sets

FALSE

Knowledge workers include all of a company's workers who are tasked with managing or creating knowledge, from top-level scientists to clerical and data workers

FALSE

Large corporations have been slow to adopt mobile computing as a platform

FALSE

More timely information is a tangible benefit of information systems.

FALSE

Podcasting allows subscribers to listen to live, streaming radio and other audio content.

FALSE

Predictive analysis is synonymous with data mining.

FALSE

RFID has been exceptionally popular from the technology's inception because of its low implementation costs.

FALSE

Retail e-commerce has grown consistently at double-digit rates since 1995.

FALSE

Semi-structured information is all the knowledge in a firm that resides in the heads of experienced employees

FALSE

In order to achieve maximum benefit from an enterprise software package, a business

changes the way it works to match the software's business processes.

instant messaging is a type of ______________ service

chat

Supply chain management systems are one type of ________ system because they automate the flow of information across organizational boundaries.

interorganizational

DoS attacks are one of the most economically damaging kinds of computer crime.

TRUE

ESSs draw summarized information from internal MIS and DSS.

TRUE

The cost of a project is based on the time taken to complete the project.

TRUE

The design of jobs, health issues, and the end-user interface of information systems are all considerations in the field of ergonomics.

TRUE

The operating system is used to manage the computer's activities

true

the operating system is used to manage the computer's activities

true

web 3.0 is an effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information

true

CAD is a type of intelligent technique

FALSE

You would use an MIS to help decide whether to introduce a new product line

FALSE

Common Gateway Interface is a specification for processing data on a Web server.

TRUE

Computer worms spread much more rapidly than computer viruses.

TRUE

Cryptography is the science & art of designing ciphers/codes

TRUE

Viruses can be spread through e-mail.

TRUE

Investment in IT is over 50% of all invested capital

True

What-if analysis works forward from known or assumed conditions. True False

True

milestone motel

the first motel in the world, The emergence and popularization of the automobile in the United States of the early 20th century inspired many car owners beyond commuting into town

copyright is the legal protection afforded intellectual property, such as a song, book, or video game

true

every record in a file should contain at least one key field

true

in N-tier computing, significant parts of Web site content, logic, and processing and performed by different servers

true

mobile search makes up 20% of all internet searches

true

most internet businesses do very little to protect the privacy of their customers

true

57) Which of the following was the leading online advertising format in 2012? A) display ads B) e-mail C) classifieds D) search engine

D

Web-based tools for videoconferencing and electronic meetings are the primary tools for GDSS. True False

False

34) Mintzberg's classification of managerial roles outlines which three main categories? A) interpersonal, informational, and decisional B) symbolic, decisional, and interpersonal C) symbolic, interpersonal, and technical D) technical, interpersonal, and informational

A

________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation. A) SCM B) SFA C) ERM D) PRM

C) ERM

34) A keylogger is a type of A) worm. B) Trojan horse. C) virus. D) spyware.

D

Enterprise software is built around thousands of predefined business processes that reflect

best practices.

Which signal types are represented by a continuous waveform? a) laser b) optical c) digital d) analog

d) analog

big data does not refer to

datasets with fewer than a billion records

Protection for trade secrets is enforced at the federal level

false

Which field of study focuses on both a behavioral and technical understanding of information systems

management information systems

WSNs are designed for

monitoring the physical environment

43) Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A) HIPAA B) Gramm-Leach-Bliley Act C) Privacy Protection Act D) Freedom of Information Act

A

To review a project's tasks and their interrelationships, you would use a A) PERT chart. B) Gantt chart. C) either A or B. D) neither A nor B.

A) PERT chart.

Enabling management to make better decisions regarding organizing and scheduling sourcing, production, and distribution is a central feature of A) SCMs. B) TPSs. C) KMSs. D) ERPs.

A) SCMs.

The criteria used for evaluation in a scoring model are usually determined by A) lengthy discussions among the decision-making group. B) portfolio analysis. C) the IS steering committee. D) systems analysts.

A) lengthy discussions among the decision-making group.

A substitute product of most concern for a cable TV distributor is A) satellite TV. B) broadcast TV. C) satellite radio. D) the Internet.

A) satellite TV.

In a relational database, a record is referred to in technical terms as a(n) A) tuple B) row C) entity D) field

A) tuple

The use of information systems because of necessity describes the business objective of A) survival. B) improved business practices. C) competitive advantage. D) improved flexibility.

A.) Survival

27) Which of the following is not one of the unique features of e-commerce technology? A) information density B) transparency C) richness D) social technology

B

59) In general, it is very difficult to hold software producers liable for their software products when those products are considered to be A) part of a machine. B) similar to books. C) services. D) artistic expressions.

B

Which type of planning tool shows each task as a horizontal bar whose length is proportional to the time required to complete it? A) PERT chart B) Gantt chart C) both A and B D) neither A nor B

B) Gantt chart

The specialized language programmers use to add and change data in the database is called A) a data access language B) a data manipulation language C) Structured Query Language D) a data definition language

B) a data manipulation language

The six important business objectives of information technology are new products, services and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and A) improved flexibility B) improved decision making C) improved business practices D) improved efficiency

B) improved decision making

Converting raw data into a more meaningful form is called A) capturing. B) processing. C) organizing. D) feedback.

B) processing

The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as A) switching costs. B) transaction costs. C) procurement. D) agency costs.

B) transaction costs.

60) Which type of fourth-generation language tools are end users most likely to work with? A) report generators and query languages B) report generators and application generators C) PC software tools and query languages D) PC software tools and report generators

C

On average, private sector IT projects underestimated budget and delivery time of systems by ________ percent. A) 30 B) 40 C) 50 D) 60

C) 50

Enterprise software is built around thousands of predefined business processes that reflect. A) the firm's organization B) industry goals C) best practices D) cutting edge workflow analyses

C) best practices

Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective? A) improved flexibility B) improved business practices C) competitive advantage D) survival

C.) Competitive Advantage

From your reading of the Cannondale case study, the firm implemented new information systems in order to achieve which of the main six business objectives? A) Customer and supplier intimacy B) survival C) competitive advantage D) operational excellence

D) Operational excellence

A data warehouse is composed of A) historical data from legacy systems B) current data C) internal and external data sources D) historic and current internal data

D) historic and current internal data

The HIPAA Act of 1997 A) requires financial institutions to ensure the security of customer data B) specifies best practices in information systems security and control C) imposes responsibility on companies and management to safeguard the accuracy of financial information D) outlines medical security and privacy rules

D) outlines medical security and privacy rules

Which of the following is not one of the three major categories of business problem solving? Answer

Environment

________ are private corporate networks extended to authorized users outside the organization.

Extranets

4) Middle management face primarily unstructured decisions.

FALSE

1) E-commerce refers to the use of any networking technologies to transact business.

False

A computer network consists of at least three computers.

False

Why is overstocking warehouses not an effective solution for a problem of low availability?

It increases inventory costs.

which types of systems consolidate the relevant knowledge and experience in the firm to make it available to improve business processes and management decision making

KMS

In one strategic approach to determining information requirements, managers select a small number of ________ that reflect firm success and profitability

KPIs (key performance indicators)

which type of network is used to connect digital devices within a half-mile or 500-meter radius

LAN

An information system for a building company that tracks construction costs for various projects across the United States would be categorized as a type of DSS. MIS. GIS. CDSS.

MIS

DBMS for midrange computers include all of the following except

Microsoft Access.

10) Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

TRUE

10) The classical model of management does not address what exactly managers do when they plan, decide things, and control the work of others.

TRUE

11) In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.

TRUE

The dimensions of information systems are people, organizations, and information technology

TRUE

A geographic information system is a decision support system designed specifically to work with spatial information. True False

True

A skype conference call using VOIP and webcams is an example of a remote, synchronous collaboration tool

True

A substantial part of management responsibility is creative work driven by new knowledge and information

True

A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business

True

Supply chain management systems are more externally oriented than enterprise systems

True

business processes are collections of standard operating procedures

True

the idea driving synergies is that when the output of some units can be used as inputs to other units, the relationship can lower cost and generate profits

True

antoine-henri jomini

a general in the French and later in the Russian service, and one of the most celebrated writers on the Napoleonic art of war. According to the historian John Shy, "he deserves the dubious title of founder of modern strategy. his ideas were a staple at military academies.

secret rebates

a kick-back that is made available to some customers or business partners but concealed from others, to the detriment of competition. The practice is usually illegal under state unfair business practice laws

To use the analog telephone system for sending digital data, you must also use

a modem.

ransom eli olds

a pioneer of the American automotive industry, for whom both the Oldsmobile and REO brands were named. The modern assembly line and its basic concept is credited to Olds, who used it to build the first mass-produced automobile, the Oldsmobile Curved Dash, beginning in 1901. luxorious automobile with engine being mounted in the rear.

pinkerton detective agency

a private security guard and detective agency established in the United States by Allan Pinkerton in 1850. A strike breaking organization

In a telecommunications network architecture, a protocol is

a standard set of rules and procedures for control of communications in a network.

today's nanotechnology-produced computer transistors are roughly equivalent in size to

a virus

Which of the following describes long-tail marketing? a) The unexpected growth of sales of a product long after its initial release b) The yearly sales of one or two copies each of thousands of obscure films c) The dwindling sales of a once-popular book d) The continued successful sales of a product over years

b) The yearly sales of one or two copies each of thousands of obscure films

What type of knowledge management system did Canadian Tire implement in order to improve the communication with dealers? a) digital asset management system b) content management system c) learning management system d) knowledge network system

b) content management system

A total quality management program is most likely to be associated with _________. a) EOQ b) continuous improvement c) return on equity d) breakeven analysis

b) continuous improvement

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) a) hub b) switch c) router d) NIC

b) switch

Which of the following statements is true? a) GSM is the primary U.S. digital cellular standard b) CDMA's strength is in its international roaming capabilities c) CDMA randomly assigns users to a range of frequencies over time d) GSM was developed by the military during World War II

c) CDMA randomly assigns users to a range of frequencies over time

The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is a) TCP/IP b) COBOL c) Ethernet d) ASCII

c) Ethernet

Two employees are talking about ethics in their workplaces. Jay says that ethics training and codes of ethical conduct are worthless; Maura says they are the only ways to ensure ethical behavior by all employees. Who is right and why? a) Jay- no one really cares about ethics at work b) Maura - only the organization can influence ethical behavior c) Neither Jay nor Maura - training and codes can encourage but never guarantee ethical behavior d) Neither Jay nor Maura - only the threat of legal punishment will make people act ethically

c) Neither Jay nor Maura - training and codes can encourage but never guarantee ethical behavior

A problem is a discrepancy between a/an _________ situation and desired situation. a) unexpected b) risk c) actual d) uncertain

c) actual

The research of Mintzburg and others concludes that managers _________. a) work at a leisurely pace b) have blocks of private time for planning c) always live with the pressures of performance responsibility d) have the advantages of short workweeks

c) always live with the pressures of performance responsibility

T lines a) operate over existing telephone lines to carry voice, data, and video b) operate over coaxial lines to deliver Internet access c) are high-speed, leased data lines providing guaranteed service levels d) have up to twenty-four 64-Kbps channels

c) are high-speed, leased data lines providing guaranteed service levels

When MBO is done right, who does the review of a team member's performance accomplishments? a) the team member b) the team leader c) both the team member and team leader d) the team leader, the team member, and a lawyer

c) both the team member and team leader

Bandwidth is the a) number of frequencies that can be broadcast through a medium b) number of cycles per second that can be sent through a medium c) difference between the highest and lowest frequencies that can be accommodated on a single channel d) total number of bytes that can be sent through a medium per second

c) difference between the highest and lowest frequencies that can be accommodated on a single channel

SaaS refers to a) supplying online access over networks to storage devices and storage area network technology b) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the internet c) hosting and managing access to software applications delivered over the internet to clients on a subscription basis d) none of the above

c) hosting and managing access to software applications delivered over the internet to clients on a subscription basis

The telephone system is an example of a _________ network. a) peer-to-peer b) wireless c) packet-switched d) circuit-switched

d) circuit-switched

Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.

e-business suites

The drawback to copyright protection is passing stringent criteria of nonobviousness

false

A data warehouse is composed of

historic and current internal data

Supply chain planning systems

identify the transportation mode to use for product delivery.

The three activities in an information system that produce the information organizations use to control operations are:

input, processing, and output

intellectual property can best be described as

intangible property created by individuals or corporations

Components or parts of finished products are referred to as

intermediate products.

The average number of tickets sold daily online is an example of

meaningful information

The average number of tickets sold daily online is an example of:

meaningful information

According to Mintzberg, managers in their informational role act as figureheads for the organization. leaders. nerve centers of the organization. negotiators.

nerve centers of the organization.

In terms of data relationships, associations refers to

occurrences linked to a single event.

Digital subscriber lines

operate over existing telephone lines to carry voice, data, and video.

which of the following is not an IT infrastructure service component

operating system software

The owners of Speed-EZ, a new bike messenger service, are concerned about how they will manage their messengers once they have left the office. This is a business problem that falls into the:

people dimension

Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain ________ systems.

planning

One of the five major variables in project management, ________ is an indicator of how well the project satisfies management objectives.

quality

the type of logical database model that treats data as if they were stored in two-dimensional tables is the

relational DBMS

Which of the following is not an example of next-generation enterprise applications?

solutions incorporating SCM

bayonet rule

southerners had bayonetts pointed at them and being forced against their will to change and industrialize

The world's largest and most widely used network is:

the Internet

The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called

the Web of things.

The failure of NASA's initial solution to preventing the space shuttle shedding foam illustrates:

the continuous nature of problem solving

Which of the following best illustrates the relationship between entities and attributes?

the entity CUSTOMER with the attribute PURCHASE

Journalist Thomas Friedman's description of the world as "flat" referred to: Answer

the flattening of economic and cultural advantages of developed countries

vertical integration

the term _________ describes a style of growth and management control also described management styles that bring large portions of the supply chain not only under a common ownership, but also into one corporation

The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as

transaction costs

Which systems are typically a major source of data for other systems

transaction processing systems

Output:

transfers processed information to the people who will use it or to the activities for which it will be used.

Research has shown that only 25% of firms are able to align their information technology with their business goals

true

Technostress is a computer-related malady whose symptoms include fatigue

true

The European Parliament has passed a ban on unsolicited commercial messaging

true

with in-memory computing, a computer's primary memory (RAM) is used for processing

true

which process is used to protect transmitted data in a VPN

tunneling

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends with

two short marks.

Uncertainties arise in any supply chain because of

unforeseeable events.

Intranets:

use Internet technology for a private company network

An example of a collaboration tool that supports colocated, asynchronous collaboration is A) a team room. B) e-mail. C) a MUD. D) a wall display

A) a team room.

Duplicate data in multiple data files is called data ______ A) redundancy B) repetition C) independence D) partitions

A) redundancy

61) The information system used by Caesar's Entertainment, which combines data from internal TPS with information from financial systems and external sources to deliver reports such as profit-loss statements and impact analyses, is an example of A) DSS. B) ESS. C) CDSS. D) MIS.

B

70) Smaller firms may outsource some or many security functions to A) ISPs. B) MISs. C) MSSPs. D) CAs.

C

A characteristic or quality describing an entity is called a(n) A) field B) tuple C) key field D) attribute

D) attribute

Intelligent agents are used primarily for specific, repetitive, and predictable tasks

TRUE

Internet advertising is growing at approximately 10% a year

TRUE

Investment in IT is over 50% of all invested capital

TRUE

Knowledge can reside in email, voice mail, and unstructured documents as well as structured documents

TRUE

MIS job growth is projected to be 50% greater than other jobs in the next five years.

TRUE

Which of the following services enables logging on to one computer system and working on another? a) FTP b) LISTSERV c) Telnet d) World Wide Web

a) FTP

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as a) software packages b) mashups c) outsourced software d) open source software

a) software packages

All network components connect to a single hub in a _________ topology a) star b) bus c) domain d) peer-to-peer

a) star

Which of the following businesses utilizes the content provider Internet business model? a) Amazon.com b) eBay.com c) CNN.com d) Motocross.com

c) CNN.com

Fuzzy logic is a type of _____ a) data mining b) neural network c) intelligent technique d) business intelligence

c) intelligent technique

A build-to-order supply-chain model is also called a ________ model

demand-driven

The mainframe market has grown steadily over the past decade

true

21) Through what channel did e-commerce first evolve? A) online advertising sales B) Internet portals C) online book sales D) Internet service providers

A

21) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms"

A

22) Which of the following is not one of the current main areas of growth in mobile e-commerce? A) sales of financial services B) retail sales at the top mobile companies C) sales of digital content D) sales of apps

A

24) In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of A) property rights and obligations. B) system quality. C) accountability and control. D) information rights and obligations.

A

25) All of the following are methods of ensuring software quality except for A) systems analysis. B) walkthroughs. C) software testing. D) internal corporate back-end system.

A

29) In order, what are the first three steps in BPM? A) 1. identifying processes for change, 2. analyzing existing processes, 3. designing the new process. B) 1. analyzing existing processes, 2. identifying processes for change, 3. designing the new process. C) 1. identifying processes for change, 2. designing the new process, 3. implementing the new process. D) 1. analyzing processes to change, 2. designing the new process, 3. measuring the optimized process.

A

33) Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? A) Assign responsibility. B) Identify the stakeholders. C) Identify the options you can reasonably take. D) Identify and clearly describe the facts.

A

42) Which types of decisions are automated for high-velocity decision making? A) highly-structured decisions B) semi-structured financial decisions C) unstructured financial decisions D) all of the above

A

46) Which of the following statements best describes the term business intelligence? A) the infrastructure for collecting and managing business data B) the tools and techniques used to analyze and understand business data C) software developed exclusively for business management D) information systems involved in business decision making

A

47) The Gramm-Leach-Bliley Act A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

A

49) The Online Privacy Alliance A) encourages self-regulation to develop a set of privacy guidelines for its members. B) protects user privacy during interactions with Web sites. C) has established technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information.

A

49) Which of the following best describes why small world theory is important to e-commerce? A) The products bought online by one individual will influence purchases by others. B) The greater the number of people using your product, the more valuable it becomes. C) You do not need to attract a large consumer base to become profitable. D) Global products create a global community.

A

54) ________ describes the concept that a large group of people is better at making correct decisions than a single person. A) The wisdom of crowds B) Outsourcing C) Crowdsourcing D) Social graphing

A

56) In which type of systems building are the development stages organized so that tasks in one stage are completed before the tasks in the next stage begin? A) traditional B) prototyping C) RAD D) all of the above

A

58) Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act

A

60) ________ are not held liable for the messages they transmit. A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials

A

62) Fourth-generation tools cannot replace conventional development tools because they A) cannot handle large numbers of transactions or extensive procedural logic. B) are not designed to integrate with legacy systems. C) do not incorporate methods for documentation. D) do not incorporate methods for testing.

A

64) A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n) A) exchange. B) vertical market. C) private exchange. D) e-hub.

A

65) A digital certificate system A) uses third-party CAs to validate a user's identity. B) uses digital signatures to validate a user's identity. C) uses tokens to validate a user's identity. D) is used primarily by individuals for personal correspondence.

A

65) What is the primary driving factor in firms to select domestic outsourcing firms to build system solutions? A) to take advantage of technical skills the firm does not have B) to save labor costs C) to avoid change management issues D) all of the above

A

65) Which of the five moral dimensions of the information age does spamming raise? A) quality of life B) system quality C) accountability and control D) information rights and obligations

A

66) The process of creating workable information systems in a very short period of time is called A) RAD. B) JAD. C) prototyping. D) B and C.

A

69) ________ development focuses on rapid delivery of working software by breaking a large project into a series of small sub-projects that are completed in short periods of time using iteration and continuous feedback. A) Agile B) Rapid application C) Joint application D) Object-oriented

A

70) You are advising an accounting firm that wants to establish its first Web site. Approximately how much of the Web site budget should you assign to purchasing software? A) 10 percent B) 25 percent C) 50 percent D) none, as no software will need to be purchased

A

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? A) Safety stock B) Continuous replenishment C) Just-in-time strategies D) Demand planning

A) Safety stock

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? A) Select the functions of the system you wish to use. B) Select the business processes you wish to automate C) Map the company's business processes to the software's business processes D) Map the software's business processes to the company's business processes

A) Select the functions of the system you wish to use.

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? A) Trojan horse B) virus C) worm D) spyware

A) Trojan horse

Phishing is a form of A) spoofing B) logging C) sniffing D) driving

A) spoofing

An example of a business using information systems for customer and supplier intimacy is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod.

B) the Mandarin Oriental hotel's customer-preference tracking system

To best evaluate, from a financial standpoint, an IT investment whose benefits cannot be firmly established in advance, you would use A) capital budgeting. B) the real option pricing model. C) a scoring model. D) the net present value

B) the real option pricing model.

24) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that A) are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error. B) are not secure because the technology to secure them did not exist at the time the files were created. C) have the potential to be accessed by large numbers of people and by groups outside of the organization. D) are frequently available on the Internet.

C

26) All of the following are current key technology trends raising ethical issues except A) data storage improvements. B) data analysis advancements. C) increase in multimedia quality. D) increase in use of mobile devices.

C

Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's A) data management environment. B) networked environment. C) IT infrastructure. D) information system.

C) IT infrastructure.

Smaller firms may outsource some or many security functions to A) ISPs B) MISs C) MSSPs D) CAs

C) MSSPs

All of the following are advantages, for a firm, of cloud computing except A) ability to support mobile computing. B) ability to support remote work C) ability to improve communication. D) ability to rely on markets to build value

C) ability to improve communication.

Which of the following is NOT one of the competitive forces? A) suppliers B) other competitors C) external environment D) customers

C) external environment

Producing bills of materials is a business process within the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing

C) manufacturing and production

Which of the following project management variables indicates how well the project satisfies management objectives? A) goals B) risk C) quality D) scope

C) quality

31) A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of A) phishing. B) pharming. C) spoofing. D) click fraud.

D

31) Categories of tools for BPM include all of the following except A) tools to integrate existing systems to support business processes' improvements. B) tools to automate business processes. C) tools to identify and document business processes. D) tools to test the security of business processes.

D

33) Behavioral models of managers find that, from observation, managers A) perform often fewer than 100 activities a day. B) operate best with standardized, predictable, printed information. C) create a formalized, hierarchic structure of contacts to provide filtered information. D) typically work in a fragmented manner, with only 10% of activities exceeding an hour in duration.

D

39) Compared to digital markets, traditional markets have A) lower search costs. B) stronger network effects. C) higher delayed gratification effects. D) higher transaction costs.

D

40) Acceptance testing A) includes all the preparations for the series of tests to be performed on the system. B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned. C) tests each program separately. D) provides the final certification that the system is ready to be used in a production setting.

D

46) The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. A) COPPA B) P3P C) PGP D) safe-harbor

D

46) Which of the following Internet business models does Amazon.com use? A) content provider B) portal C) market creator D) e-tailer

D

54) The oldest method for building information systems is A) component-based development. B) prototyping. C) object-oriented development. D) the systems development lifecycle.

D

55) Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of A) prediction markets. B) behavioral targeting. C) long-tail marketing. D) crowdsourcing.

D

55) Which of the following is not one of the main firewall screening techniques? A) application proxy filtering B) static packet filtering C) NAT D) secure socket filtering

D

Which of the following choices may lead to competitive advantage: (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real time? A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3

D) 1,2, and 3

A sales person clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of A) phishing B) pharming C) spoofing D) click fraud

D) click fraud

A rival of your company, AutoTown, is going to implement analytic software that mines customer data with a goal of enabling the building of automobiles that customers actually want. This can be categorized as using information systems for which competitive strategy? A) low-cost leadership B) product differentiation C) focus on market niche D) customer intimacy

D) customer intimacy

Which of the following is not one of the activities of the systems analyst? A) acting as a change agent B) communication with users C) mediating between competing interest groups D) formulation of capital budgeting models

D) formulation of capital budgeting models

An example of a highly structured decision is A) creating a new product. B) estimating the effect of changing costs of supply materials. C) calculating the best trucking routes for product delivery. D) granting credit to a customer.

D) granting credit to a customer.

Uncertainties arise in any supply chain because of A) inaccurate or untimely information B) poor integration between systems of suppliers, manufactures , and distributors C) Inefficient or inaccurate MIS D) unforeseeable events

D) unforeseeable events

Which of the following is not an organizational factor in systems planning and implementation? A) standards and performance monitoring B) government regulatory compliance C) health and safety D) user interface

D) user interface

10) DoS attacks are used to destroy information and access restricted areas of a company's information system

FALSE

9) A structure chart is a bottom-up chart, showing each level of design, its relationship to other levels, and its place in the overall design structure.

FALSE

A data warehouse is typically comprised of several smaller data marts.

False

All CRM packages contain modules for PRM and ERM.

False

ESSs are designed primarily to solve specific problems.

False

ESSs are designed to serve the middle management of the organization.

False

IT infrastructure consists of just those physical computing devices required to operate the enterprise

False

In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products

False

In a pull-based model of SCM systems,production master schedules are based on forecasts of demand for products.

False

In a push-based model of SCM systems, actual customer orders or purchases trigger events in the supply chain

False

In a push-based model of SCM systems, actual customer orders or purchases trigger events in the supply chain.

False

Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed

False

Management information systems typically support nonroutine decision making

False

Management information systems typically support nonroutine decision making.

False

Middle management tends to face more unstructured decision scenarios, but may include some structured components. True False

False

TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet

False

The Domain Name System (DNS) converts IP addresses to domain names.

False

The disadvantage of using a Web interface for a database is that it typically requires substantial changes to the internal database

False

The use of internet technologies allows companies to more easily sustain competitive advantage

False

Transaction processing systems are most commonly used by the senior management level of an organization.

False

Which protocol is the Internet based on?

TCP/IP

Computers are only part of an information system

TRUE

Transaction and clerical systems that displace labor and save space typically produce more measurable, tangible benefits than management information systems.

TRUE

________ is a global network that uses universal standards to connect millions of different networks around the world.

The Internet

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

True

Major CRM application software vendors include Sebel Sytems, PeopleSoft, SAP and Salesforce.com

True

Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information.

True

PRM provides a firm and its distributors trade information and distributes leads about customers.

True

The behavioral approach to information systems leaves aside technical solutions to instead analyze the psychological, social, and economic impacts of systems.

True

The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain

True

The dimensions of information systems are management, organizations, and information technology

True

UPS's use of Web-based tools that allow customers to embed UPS functions such as tracing and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy.

True

VoIP technology delivers voice information in digital form using packet switching.

True

Wal-mart's strategy of continuous replenishment of inventory based on actual customer purchases is an example a pull-based SCM model

True

Wikis allow visitors to change or add to the original posted material.

True

The average number of tickets sold daily online is an example of A) input. B) raw data. C) meaningful information. D) feedback.

c.) meaningful information

A company buys cloth in one country, has designs made in another country, sews the garments in another country, and sells the finished product in yet other countries. This firm is actively engaging in the practice of __________. a) job migration b) performance effectiveness c) value creation d) global outsourcing

d) global outsourcing

The strength of patent protection is that it a) puts the strength of law behind copyright b) allows protection from internet theft of ideas put forth publicly c) is easy to define d) grants a monopoly on underlying concepts and ideas

d) grants a monopoly on underlying concepts and ideas

samuel tilden

democratic candidate of the election of 1876 he won the popular vote over his opponent Rutherford B Hayes

Today most business firms have discontinued operating their legacy systems, replacing these with inexpensive Web services and hosted software

false

Whereas XML is limited to describing how data should be presented in the form of Web pages, HTML can perform presentation, communication, and data storage tasks

false

circuit switching makes much more efficient use of the communications capacity of a network than does packet switching

false

IT ________ includes the strategy and policies for using information technology within an organization.

governance

In a hierarchical organization, the upper levels consist of:

managerial, professional, and technical workers

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n)

switch.

each characteristic or quality describing a particular entity is called an attribute

true

privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations

true

telephone networks are fundamentally different from computer networks

true

A fully digital firm produces only digital goods or services?

FALSE

Fiber-optic cable is more expensive and harder to install than wire media

True

A grouping of characters into a word, a group of words, or a complete number is called a record.

FALSE

The bullwhip effect is countered by

reducing information uncertainty

Duplicate data in multiple data files is called data ________.

redundancy

7) In general, for digital goods, the marginal cost of producing another unit is about zero

True

A DBMS separates the logical and physical views of data.

True

A Skype conference call using VOIP and webcams is an example of a remote, synchronous collaboration tool.

True

A data warehouse may be updated by a legacy system

True

What is the estimated growth rate for information systems managers jobs through 2018?

17%

________ systems are designed to help firms manage their relationships with their customers. A) CRM B) MIS C) CLE D) CLU

A) CRM

An NOS must reside on a dedicated server computer in order to manage a network.

FALSE

_____ refers to policies, procedures, and technical measures used to prevent unauthorized accesses, alternation, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms"

A) "Security"

An example of a keystone firm within a business ecosystem is A) Apple and software application writers in the mobile platform ecosystem. B) GUESS and the fashion ecosystem. C) Citibank and the ATM ecosystem. D) American Airlines and the computerized reservation ecosystem.

A) Apple and software application writers in the mobile platform ecosystem.

32) The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called A) due process. B) accountability. C) the courts of appeal. D) the judicial system.

B

An acceptable use policy defines the acceptable level of access to information assets for different users.

FALSE

great rail strike

America's first interstate strike in 1877 which did not involve labor unions. Ended 45 days after it was put down by local and state militias.

Which of the following is an example of a business using information systems to create new products and services?

Apple's creation of the iPod

32) In contrast to the classical model of management, behavioral models see the actual behavior of managers as being more A) systematic B) informal C) reflective D) well organized

B

32) The effort required to locate a suitable product is called A) price discrimination. B) search costs. C) menu costs. D) shopping costs.

B

21) The 2012 FTC report on industry-best practices for protecting individuals' privacy focused on each of the following topics except A) mobile privacy. B) phasing out of self-regulatory codes. C) data brokers. D) large platform providers.

B

The three principal levels within a business organization hierarchy are A) senior management, operational management, and service workers. B) senior management, middle management, and operational management. C) senior management, operational management, and information systems. D) senior management, middle management, and service workers.

B) senior management, middle management, and operational management.

A(n) ________ is a set of logically related activities for accomplishing a specific business result.

Business process

Which of the following is not a method for performing a data quality audit? A) surveying entire data files B) surveying samples from data files C) surveying definition and query files D) surveying end users about their perceptions of data quality

C) surveying data definition and query files

A firm that must invest in new information systems capabilities in order to comply with federal legislation can be said to be investing to achieve which business objective? A) customer intimacy B) operational excellence C) survival D) improved reporting

C) survival

________ methods rely on measures of cash flows into and out of the firm.

Capital budgeting

As discussed in the chapter opening case, Disney's implementation of new information systems in their amusement parks can be seen as an effort to achieve which of the primary business objectives?

Customer and supplier intimacy

The key elements of an organization are its people, structure, business processes, politics, and ________.

Culture

Which of the following objectives best describes the business strategy behind the technologies implemented in Disney's Operational Command Center, as discussed in the chapter case?

Customer support

Government and private sector standards are examples of complementary social assets required to optimize returns from IT investments

True

Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.

False, information systems consist of something different.

Knowledge workers assist with paperwork at all levels of the firm.

False, not all levels do paperwork.

alexis de tocqueville

French sociologist and political theorist he traveled to the United States in 1831 to study its prisons and returned with a wealth of broader observations that he codified in "Democracy in America" (1835), one of the most influential books of the 19th century

Implementing an enterprise application typically requires organizational change as well as adjustments to existing business processes

True

which digital cellular standard is used widely throughout the world except the united states

GSM

which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed

HIPAA

Web browser software requests Web pages from the Internet using which protocol?

HTTP

Which organization helps define the overall structure of the Internet?

IAB

An example of a business using information systems for customer and supplier intimacy is:

JC Penney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced

according to the _____________, you should take the action that produces the least harm

Risk aversion principle

3) Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system.

TRUE

Based on your reading of the case discussing mobile handhelds, TCHO Chocolate's use of an iPhone app that connects to chocolate-making machines is an example of using information systems to enhance which of the following generic business objectives?

New products, services, and business models

The tool that enables users to view the same data in different ways using multiple dimensions is

OLAP.

mccormick strike

On May 3, 1886, striking employees of the McCormick International Harvester Company clashed with replacement workers. Chicago Police retaliated against the striking employees, killing two.

________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners.

PRM

Which of the following is not a characteristic of packet switching?

Packet switching requires point-to-point circuits.

Converting raw data into a more meaningful form is called:

Processing

________ are highly trained technical specialists who write the software instructions for computers

Programmers

________ management is an important capability for customer service processes that is found in most major CRM software products.

Returns

The most prominent data manipulation language today is

SQL.

20) Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.

TRUE

3) A structured decision can be made by following a well-defined set of procedures. No "feel" or intuition is necessary.

TRUE

Which of the following is not an example of the benefits enterprise systems provide to firms?

The cost of information systems falls, making the firm more productive

Which of the following statements is not true?

The impact of domestic IT outsourcing has been very disruptive to some regional areas of the U.S.

A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.

True

An IT infrastructure provides the platform on which the firm can build its information systems.

True

Analytical CRM uses tools to analyze customer data collected from the firm's customer touch points and from other sources.

True

CRM software can help organizations identify high-value customers for preferential treatments

True

duryea brothers

They were the first Americans to build a successful commercial automobile, and the first to incorporate an American business for the expressed purpose of building automobiles for sale to the public.

________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.

Unified communications

Web sites that enable users to share information, collaborate, and create new services and content are called ________ sites.

Web 2.0, second generation

The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called a) VPN b) IAB c) SEM d) SEO

d) SEO

alexander graham bell

a great American inventor and scientist. He is best known for his invention of the telephone. he was also the inventor of many other electronic devices. he was also a teacher for the deaf.

gottlieb daimer

an engineer, industrial designer and industrialist born in Germany. He was a pioneer of internal-combustion (gasoline) engines and improved it. He invented the high-speed petrol engine.

compromise of 1877

an informal deal that disputed the 1876 presidential election that pulled troops out of the south in exchange for letting the Republican candidate Rutherford B. Hayes win the election

Which signal types are represented by a continuous waveform?

analog

A characteristic or quality describing an entity is called a(n)

attribute.

In a hierarchical organization, the upper levels consist of A) managerial and professional employees. B) managerial, professional, and technical employees. C) professional and operational employees. D) managerial, professional, and operational employees.

b.)Managerial, professional, and technical employees

Expert systems a) solve problems too difficult for human experts b) are based on DO WHILE rules c) work in very limited domains d) share characteristics with mainframe computing

c) work in very limited domains

The measurement of the number of customers who stop using or purchasing products or services from a company is called

churn rate.

interpretations of Moore's law assert that

computing power doubles every 18 months

an information system can enhance core competencies by

encouraging the sharing of knowledge across business units

The final step in the four-step model of business problem solving is:

implementation

All of the following choices describe ways for a company to achieve a competitive advantage, except:

implementing information systems to support better management decision making

A hierarchy:

is a pyramid structure of rising authority and responsibility.

A VPN

is an encrypted private network configured within a public network.

a DBMS reduces data redundancy and inconsistency by

minimizing isolated files with repeated data

Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems.

planning; execution

A Web interface used to present integrated personalized business content to users is called a(n) ________.

portal

The logical view

presents data as they would be perceived by end users.

the Do-Not-Track Act of 2011

requires firms to notify customers that they are being tracked

In a(n) ________ perspective, the performance of a system is optimized when both the technology and the organization mutually adjust to one another until a satisfactory fit is obtained.

sociotechnical

Inadequate database capacity is an example of the ________ dimension of business problems

technology

specifications that establish the compatibility of products and the ability to communicate in a network are called

technology standards

Data management technology consists of:

the software governing the organization of data on physical storage media

Which of the following best describes the primary reason for implementing a new information system, from a business perspective

the system will create new value for the firm, beyond its costs

in a multi-tiered network

the work of the entire network is balanced over several levels of servers

which of the following best describes how new information systems result in legal gray areas?

they result in new situations that are not covered by old laws

erie canal

this was built in 1825 from the aftermath of the revolutionizing of transportation with steamboats

OLAP is a tool for enabling

users to obtain online answers to ad-hoc questions in a rapid amount of time.

A network that covers entire geographical regions is most commonly referred to as a(n)

wide area network

23) The type of decision that can made by following a definite procedure is called a(n) ________ decision. A) structured B) unstructured C) semistructured D) procedural

A

63) A mapping of a person's significant online, personal relationships is called a social A) Web. B) graph. C) community. D) map.

B

Tools for analyzing data to help users find patterns, relationships, and insights and make better business decisions are known as A) DSS B) Business intelligence C) OLAP D) Data mining

B) business intelligence

28) Checking store inventory is an example of a(n) ________ decision. A) semistructured B) unstructured C) structured D) none of the above

C

28) Which feature of Internet technology has had the most effect in the Internet's rapid spread across the globe? A) ubiquity B) global reach C) universal standards D) social technology

C

Which of the following would not be considered a contact point? A) E-mail B) Web site C) Intranet D) Retail store

C) Intranet

Which type of system would you use to determine the five suppliers with the worst record in delivering goods on time? A) ESS B) TPS C) MIS D) DSS

C) MIS

Components or parts of finished products are referred to as A) upstream materials. B) raw materials. C) secondary products. D) intermediate products.

D) intermediate products.

horizontal integration

In business, _______ is a strategy where a company creates or acquires production units for outputs which are alike - either complementary or competitive. One example would be when a company acquires competitors in the same industry doing the same stage of production

Which type of system would you use to determine the five suppliers with the worst record in delivering goods on time

MIS

Which type of system would you use to change a production schedule if a key supplier was late in delivering goods

TPS

1) The most common form of IT-enabled organizational change is automation.

TRUE

16) What-if analysis works forward from known or assumed conditions.

TRUE

Supply chain management systems are more externally oriented than enterprise systems.

TRUE

Telephone networks are fundamentally different from computer networks.

TRUE

Decision-support systems use internal information as well as information from external sources.

True

The ________ is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format

World Wide Web/WWW

karl benz

a German engine designer and car engineer, generally regarded as the inventor of the petrol-powered automobile, and pioneering founder of the automobile manufacturer Mercedes. patented all the processes that made the internal combustion engine feasible for use in an automobile.

A manager who decides against hiring a new employee who just graduated from Downstate University because the last person hired from there turned out to be a low performer, is falling prey to ________ error. a) availability b) adjustment c) anchoring d) representativeness

a) availability

Consumers selling goods and services electronically to other consumers best describes a) disintermediation b) C2C e-commerce c) M-Commerce d) B2C e-commerce

b) C2C e-commerce

Today's nanotechnology-produced computer transistors are roughly equivalent in size to a) the width of a fingernail b) a human hair. c) a virus d) an atom

c) a virus

Which of the following systems digitizes, indexes, and tags documents according to a coherent framework? a) wikis b) CAD c) document management d) LMS

c) document management

Varying a product's price according to the supple situation of the seller is called _______ pricing. a) menu b) flexible c) dynamic d) asymmetric

c) dynamic

Bluetooth can be used to link up to _______ devices within a 10-meter area using low-power, radio-based communication a) four b) six c) eight d) ten

c) eight

Expert systems are expensive and time-consuming to maintain because a) their rule base is so complex b) they rely on equipment that becomes outdated c) their rules must be reprogrammed every time there is a change in the environment, which in turn may change the applicable rules d) only the person who created the system knows exactly how it works, and may not be available when changes are needed

c) their rules must be reprogrammed every time there is a change in the environment, which in turn may change the applicable rules

gilded age

coined term by mark twain. extreme opulence of money flowing around. by 1902, 65 skyscrapers were built in manhattan, meant by the term "to plate in gold"

Which of the following statements is /not/ true about search engines? a) They are arguably the Internet's "killer app" b) They have solved the problem of how users instantly find information on the Internet c) They are monetized almost exclusively by search engine marketing d) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged

d) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged

When the members of a special task force are asked to develop a proposal for increasing the international sales of an existing product, this problem most likely requires __________ decisions. a) routine b) programmed c) crisis d) nonprogrammed

d) nonprogrammed

the child domain of the root is the

top-level domain

in a relational database, a record is referred to in technical terms as a(n)

tuple

In a relational database, a record is referred to in technical terms as a(n)

tuple.

the wright brothers

two american brothers, aviation pioneers who were credited with inventing the world's first successful airplane. the early planes were made up of internal combustion engines

a one-to-one relationship between two entities is symbolized in a diagram by a line that ends with

two short marks

46) An entire information system is broken down into its subsystems by using A) high-level data flow diagrams. B) low-level data flow diagrams. C) process specifications. D) structured diagrams.

A

51) ________ are visual tools for presenting performance data in a BI system. A) Dashboards and scorecards B) Paramaterized reports C) Reports and the drill-down feature D) Scenarios and models

A

53) Intellectual property can best be described as A) intangible property created by individuals or corporations. B) unique creative work or ideas. C) tangible or intangible property created from a unique idea. D) the expression of an intangible idea.

A

Which of the following activities would you perform to measure and compare your business processes to similar processes of other companies within your industry? A) benchmarking B) best practices C) value chain analysis D) strategic systems analysis

A) benchmarking

Application controls A) can be classified as input controls, processing controls, and output controls B) govern the design, security, and use of computer programs and the security data files in general throughout the organization C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D) include software controls, computer operations controls, and implementation controls

A) can be classified as input controls, processing controls, and output controls

When tailoring a particular aspects of a system to the way a company does business enterprise software can provide the company with A) configuration tables B) web services C) data dictionaries D) middleware

A) configuration tables

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its A) culture. B) environment. C) atmosphere. D) values.

A) culture

Telus's use of SharePoint for team sites is an example of using information systems to achieve which business objective? A) customer and supplier intimacy B) survival C) improved decision making D) operational excellence

A) customer and supplier intimacy

Buying or selling goods over the Internet is called A) e-commerce. B) e-business. C) an intranet. D) an extranet

A) e-commerce.

Sociologists study information systems with an eye to understanding A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods.

A) how systems affect individuals, groups, and organizations.

Executive support systems are information systems that support the A) long-range planning activities of senior management. B) knowledge and data workers in an organization. C) decision making and administrative activities of middle managers. D) day-to-day processes of production.

A) long-range planning activities of senior management.

A large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management making is classified by Mintzberg as a ________ bureaucracy. A) machine B) professional C) divisionalized D) multidivisional

A) machine

Internet technology A) makes it easy for rivals to compete on price alone. B) imposes a significant cost of entry, due to infrastructure requirements. C) increases the difference between competitors because of the wide availability of information. D) makes it easy to sustain operational advantages.

A) makes it easy for rivals to compete on price alone.

Customer relationship management systems typically provide software and online tools for sales, customer service, and: A) marketing. B) account management. C) advertising. D) public relations.

A) marketing.

You are creating a video and animation sharing Web sit whose content will be supplied by content, video, and applets stored in a database and you anticipate very high loads on the server. Which of the following DBMSs will most likely serve your needs? A) object-relational DBMS B) relational DBMS C) hierarchical DBMS D) OODBMS

A) object-relational DBMS

Which of the following objectives best describes the business strategy behind the development of smart grid initiatives by power companies, as discussed in the chapter case? A) operational excellence B) new products and services C) competitive advantage D) customer support

A) operational excellence

A DBMS makes the A) physical database available for different logical views. B) logical database available for different analytical views. C) physical database available for different analytical views. D) logical database available for different physical views.

A) physical database available for different logical views

A firewall allows the organization to A) prevent unauthorized communication both into and out of the network B) monitor network hot spots for signs of intruders C) prevent known spyware and malware from entering the system D) all of the above

A) prevent unauthorized communication both into and out of the network

Pharming involves A) redirecting users to a fraudulent Web sit even when the user has typed in the correct address in the Web browser B) pretending to be a legitimate business's representative in order to garner information about a security system C) Setting up fake Web sites to ask users for confidential information D) using e-mails for threats or harassment

A) redirecting users to a fraudulent Web sit even when the user has typed in the correct address in the Web browser

In sociotechnical design A) separate sets of technical and social design solutions are developed and compared. B) ergonomic features of a system and the system's technical design are given equal importance. C) systems analysts with proven backgrounds in sociological concerns rate and compare a system's social and technical aspects. D) all of the above

A) separate sets of technical and social design solutions are developed and compared.

The use of information systems because of necessity describes the business objective of A) survival. B) improved business practices. C) competitive advantage. D) improved flexibility.

A) survival

An example of a social complementary asset is A) technology and service firms in adjacent markets. B) training programs. C) distributed decision-making rights. D) all of the above.

A) technology and service firms in adjacent markets

An example of a social complementary asset is A) technology and service firms in adjacent markets. B) training programs. C) distributed decision-making rights. D) all of the above.

A) technology and service firms in adjacent markets.

From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called A) the information value chain. B) the IT value chain. C) information processing. D) feedback.

A) the information value chain.

Which of the following constitutes an organizational element in the UPS tracking system described in the chapter? A) the specification of procedures for identifying packages with sender and recipient information B) monitoring service levels C) promoting the company strategy of low-cost, superior service D) the use of handheld computers and networks for managing package delivery

A) the specification of procedures for identifying packages with sender and recipient information

Which of the following constitutes an organizational element in the UPS tracking system described in the chapter? A) the specification of procedures for identifying packages with sender and recipient information B) monitoring service levels C) promoting the company strategy of low-cost, superior service D) the use of handheld computers and networks for managing package delivery

A) the specification of procedures for identifying packages with sender and recipient information

Which systems are typically a major source of data for other systems? A) transaction processing systems B) management information systems C) executive support systems D) decision-support systems

A) transaction processing systems

Which of the following can force a business and its competitors to compete on price alone? A) transparent marketplace B) high product differentiation C) poor process efficiency D) demand control

A) transparent marketplace

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends with A) two short marks B) one short mark C) a crow's foot D) a crow's foot topped by a short mark

A) two short marks

OLAP is a tool for enabling A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data C) programmers to quickly diagram data relationships D) programmers to normalize data.

A) users to obtain online answers to ad-hoc questions in a rapid amount of time

A virtual company A) uses the capabilities of other companies without being physically tied to those companies. B) uses Internet technology to maintain a virtual storefront. C) uses Internet technology to maintain a networked community of users. D) provides entirely Internet-driven services, or virtual products.

A) uses the capabilities of other companies without being physically tied to those companies.

A digital certificate system A) uses third-party CAs to validate a user's identity B) uses digital signatures to validate a user's identity C) uses tokens to validate a user's identity D) is used primarily by individuals for personal correspondence

A) uses third-party CAs to validate a user's identity

22) Which of the following best describes how new information systems result in legal gray areas? A) They work with networked, electronic data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores.

B

40) The concern that data values of an information source fall within a defined range reflects which quality dimension of information? A) accuracy B) integrity C) validity D) consistency

C

25) The quality of ubiquity, as it relates to e-commerce, is illustrated by A) the same set of standards being used across the globe. B) the spread of plentiful, cheap information. C) the enabling of commerce worldwide. D) the availability of the Internet everywhere and anytime.

D

1) A drive-by download is a technique used by hackers to enable accessing files on a wireless network.

FALSE

Management information systems typically support nonroutine decision making.

FALSE

Mandatory use of a system is one effective way of overcoming user resistance to an information system.

FALSE

a data warehouse is typically comprised of several smaller data marts

False

18) Public key encryption uses two keys.

TRUE

Computers using cable modems to connect to the internet are more open to penetration than those connecting via dial-up.

TRUE

Data administration is a special organizational function that manages policies and procedures through which can be managed as an organizational resource.

TRUE

OLAP is a key tool of BI.

TRUE

________ is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format

The Web

Cross-selling is the marketing of complementary products to customers.

True

Cross-selling markets complementary products to customers

True

russell conwell

a man of modest riches who founded Temple University in Philadelphia where poor young men could study cheaply and improve their prospects. Also known for his speech "Acres of Diamonds" which said anybody could become wealthy

social darwinism

a modern name given to various theories of society that emerged in England and the United States in the 1870s, and which allegedly sought to apply biological concepts of "natural selection" and "survival of the fittest" to sociology and politics.

Hardware and software acquisition costs account for about ______ percent of TCO a) 20 b) 40 c) 60 d) 80

a) 20

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: (1) cloud computing era (2) Client/server (3) enterprise era, (4) personal computing, and (5) mainframe and minicomputer a) 4,5,3,2,1 b) 5,4,2,3,1 c) 4,5,2,3,1 d) 5,4,2,1,3

a) 4,5,3,2,1

Conflict between the mature adult personality and a rigid organization was a major concern of _______. a) Argyris b) Follett c) Gantt d) Fuller

a) Argyris

EBay is an example of a) C2C e-commerce b) B2B e-commerce c) B2C e-commerce d) M-commerce

a) C2C e-commerce

In this technique, descriptions of past experiences of human specialists are stored in a database for later retrieval when the user encounters a situation with similar characteristics a) CBR b) fuzzy logic c) data mining d) LMS

a) CBR

Interpretations of Moore's law assert that a) Computing power doubles every 18 months. b) Transistors decrease in size 50% every two years c) data storage costs decrease by 50% every 18 months. d) none of the above

a) Computing power doubles every 18 months.

Which of the following US laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? a) HIPAA b) gramm-leach-bliley act c) privacy protection act d) freedom of information act

a) HIPPA

Which of the following Internet connection types offers the greatest bandwidth? a) T3 b) DSL c) cable d) T1

a) T3

Which protocol is the Internet based on? a) TCP/IP b) FTP c) packet-switching d) HTTP

a) TCP/IP

The 802.11 set of standards for wireless LANs is known as a) Wi-Fi b) WiMax c) Bluetooth d) RFID

a) Wi-Fi

running a java program on a computer requires a) a Java virtual machine to be installed on the computer b) a Java virtual machine to be installed on the server hosting the Java applet c) a miniature program to be downloaded to the user's computer d) no specialized software, as Java is platform-independent

a) a Java virtual machine to be installed on the computer

To use the analog telephone system for sending digital data, you must also use a) a modem b) a router c) DSL d) twisted wire

a) a modem

The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called a) cloud computing b) autonomic computing c) virtualization d) multicore processing

a) cloud computing

In which of the following Internet business models does a merchant create an online digital environment that enables people with like interests to share information or buy and sell goods? a) community provider b) service provider c) market creator d) transaction broker

a) community provider

In CPM/PERT, "CPM" stands for __________. a) critical path method b) control planning management c) control plan map d) current planning matrix

a) critical path method

Genetic algorithms a) develop solutions to particular problems using fitness, crossover, and mutation b) represent knowledge as groups of characteristics c) do not work for most problems d) are based on logic

a) develop solutions to particular problems using fitness, crossover, and mutation

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? a) digital millennium copyright act b) privacy act c) freedom of information act d) electronic communications privacy act

a) digital millennium copyright act

In TCP/IP, IP is responsible for a) disassembling and reassembling of packets during transmission b) establishing an Internet connection between two computers c) moving packets over the network d) sequencing the transfer of packets

a) disassembling and reassembling of packets during transmission

When a manager denies promotion to a qualified worker simply because of a personal dislike for the fact that she is Hispanic, this is an example of ________. a) discrimination b) workforce diversity c) self-management d) free-agent economy

a) discrimination

Reducing the business process layers in a distribution channel is called a) disintermediation b) BPR c) market segmentation d) network effects

a) disintermediation

A third-part Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n) a) exchange b) vertical market c) private exchange d) e-hub

a) exchange

In a hierarchy of objectives, plans at lower levels are supposed to act as __________ for accomplishing higher-level plans. a) means b) ends c) scenarios d) benchmarks

a) means

After objectives and standards are set, what step comes next in the control process? a) measure results b) take corrective action c) compare results with objectives d) modify standards to fit circumstances

a) measure results

Most knowledge workers require specialized knowledge work systems, but they also rely on ____ a) office systems b) schools and universities c) imaging systems d) data transferring systems

a) office systems

Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use? a) on-demand b) grid c) edge d) autonomic

a) on-demand

Digital subscriber lines a) operate over existing telephone lines to carry voice, data, and video b) operate over coaxial lines to deliver Internet access c) are very-high-speed data lines typically leased from long-distance telephone companies d) have up to twenty-four 64-Kbps channels

a) operate over existing telephone lines to carry voice, data, and video

The practice of contracting custom software development to an outside firm is commonly referred to as a) outsourcing b) scaling c) service-oriented architecture d) application integration

a) outsourcing

When a team leader clarifies desired work targets and deadline for a work team, he or she is fulfilling the management function of __________. a) planning b) delegating c) controlling d) supervising

a) planning

Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called communities of ______ a) practice b) professionals c) interest d) knowledge

a) practice

Which US act restricts the information the federal government can collect and regulates what they can do with the information? a) privacy act of 1974 b) gramm-leach-bliley act of 1999 c) freedom of information act d) hipaa of 1996

a) privacy act of 1974

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of a) property rights and obligations b) system quality c) accountability and control d) information rights and obligations

a) property rights and obligations

Which of the five moral dimensions of the information age does spamming raise? a) quality of life b) system quality c) accountability and control d) information rights and obligations

a) quality of life

Which of the following would NOT be considered semi-structured knowledge? a) request for proposals b) voice-mail c) videos d) e-mail

a) request for proposals

A management consultant who advises managers to study jobs, carefully train workers to do those jobs with the most efficient motions, and offer financial incentives tied to job performance would most likely be using ideas from ________. a) scientific management b) contingency thinking c) Henri Fayol d) Theory Y

a) scientific management

An example of autonomic computing is a) spyware protection software that runs and updates itself automatically b) software programmed to run on any hardware platform c) cell phones taking on the functions of handheld computers d) programming languages that allow non-programmers to create custom applications

a) spyware protection software that runs and updates itself automatically

Based on your reading of the chapter, e-commerce is a) still in a revolutionary phase b) widely accepted by consumers, although technology is still quickly changing c) not yet fully accepted by consumers, although much of its driving technology is firmly in place d) well entrenched as a form of modern commerce

a) still in a revolutionary phase

If your local bank or credit union is a complex system, then the loan-processing department of the bank would be considered a ___________. a) subsystem b) closed system c) learning organization d) bureaucracy

a) subsystem

If a manager approaches problems in a rational and analytical way, trying to solve them in step-by-step fashion, he or she is well described as a/an _________. a) systematic thinker b) intuitive thinker c) problem seeker d) behavioral decision maker

a) systematic thinker

As referred to in the text, legacy systems are? a) traditional mainframe-based business information systems. b) electronic spreadsheets used on a PC. c) any pre-1990 Wintel systems d) systems found on older ASPs

a) traditional mainframe-based business information systems.

E-hubs are more _________ than private industrial networks a) transaction-oriented b) collaborative c) independent d) supply-chain oriented

a) transaction-oriented

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n) a) uniform resource locator b) IP address c) third level domain d) root domain

a) uniform resource locator

The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is? a) Unix b) Linux c) OS X d) COBOL

a) unix

Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to as a) web services b) EAI software c) SOA d) SOAP

a) web services

a classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. if you used the Utilitarian principle to evaluate this situation, you might argue that stealing the food is

acceptable, because the higher value is the survival of the family

john wilkes booth

an american actor who assassinated president lincoln at ford's theatre. lincoln's assassination hurt the south because that left only radical republicans in congress.

robert fulton

an american engineer and inventor who is credited with developing the first commercially successful steamboat in 1807. Adapted the steam engine into transportation. Also invents the clermont which was tested on the Hudson river.

charles f kettering

an american inventor, engineer, and businessman, who was the head of research at general motors. he invented the electrical starting motor and leaded gasoline.

Which of the following statements about trade secrets is not true

any intellectual product, regardless of its purpose, can be classified as a trade secret

What are the four layers of the TCP/IP reference model?

application, transport, Internet, and network interface

T1 lines

are high-speed, leased data lines providing guaranteed service levels.

Customer service modules in CRM systems provide tools for

assigning and managing customer service requests.

Virtually all expert systems deal with problems of a) policy development b) classification c) logic and control d) high complexity

b) classification

It is not feasible for companies to produce error-free software because a) any programming code is susceptible to error b) it is too expensive to create perfect software c) errors can be introduced in the maintenance stage of development d) any software of any complexity will have errors

b) it is too expensive to create perfect software

Verizon's implementation of a Web-based digital dashboard to provide managers with real-time information such as customer complaints is an example of A) improved flexibility. B) improved decision making. C) improved efficiency. D) customer and supplier intimacy

b.) improved decision making

Converting raw data into a more meaningful form is called A) capturing. B) processing. C) organizing. D) feedback.

b.) processing

Which of the following is /not/ an advantage of using VOIP? a) VOIP can reduce a firm's communication costs by 20 to 30 percent b) It allows e-mail and voice mail to be combined into a single directory c) It enables the creation of two distinct networks for voice and data d) It allows net phones to be added to a network without rewiring or reconfiguring the network

c) It enables the creation of two distinct networks for voice and data

Which of the following is /not/ a characteristic of packet switching? a) Packets travel independently of each other b) Packets are routed through many different paths c) Packet switching requires point-to-point circuits d) Packets include data for checking transmission errors

c) Packet switching requires point-to-point circuits

An example of raw data from a national chain of automobile stores would be A) an average of 13 Toyotas are sold daily in Kentucky. B) 30 percent increase in Toyota RAV4 sales during September in Kentucky. C) 1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky. D) all of the above.

c.) 1 Toyota RAV4 sold March 3,2008 in Louisville, Kentucky

Successful system building requires careful ________ management to minimize organizational resistance.

change

The introduction of the minicomputer. a) allowed computers to be customized to the specific needs of departments or business units. b) enable decentralized computing. c) Offered new, powerful machines at lower prices than mainframes. d) All the above

d) All the above

Which of the following best illustrates the sales revenue model? a) EBay receives a small fee from a seller if a seller is successful in selling an item b) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase c) Flickr provides basic services for free, but charges a premium for advanced services d) Apple accepts micropayments for single music track downloads

d) Apple accepts micropayments for single music track downloads

Why is overstocking warehouses not an effective solution for a problem of low availability? A) It does not speed product time to market. B) It is an inefficient use of raw materials. C) It increases sales costs. D) It increases inventory costs.

d) it increases inventory costs

An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support:

decision making and control in an organization

All of the following can be considered managerial responsibilities except:

designing new information systems

A state Web site that allows citizens to pay parking fines online is a form of ________.

e-governemnt

Autonomic computing is implemented primarily with enterprise or ISP servers

false

Client/server computing is a widely used form of centralized processing

false

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime

false

IT Infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise

false

Like an ASP, a Web hosting service provides shared applications to subscribed users, but does this through a web portal

false

karl marx

his theories about society, economics and politics - collectively known as Marxism - hold that human societies progress through class struggle: a conflict between an ownership class that controls production and a dispossessed labouring class that provides the labour for production

a data warehouse is composed of

historic and current internal data

one or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as

hotspots

Operations management, as a discipline, is directly relevant to three occupational categories:

industrial production managers, operations analysts, and administrative service managers

In contrast to the classical model of management, behavioral models see the actual behavior of managers as being more systematic. informal. reflective. well organized.

informal

The concern that the structure of data is consistent within an information source reflects which quality dimension of information? accuracy integrity validity consistency

integrity

Poor business processes is an example of the ________ dimension of business problems

organizational

You are a new manager at a plumbing supply manufacturer where there is an unusually high number of returns for a new aerator for a high-end faucet in production. In viewing the problem you determine that the primary cause is the improperly designed die cast for the aerator. Which dimension of a business problem does this reflect?

people

A supply chain driven by actual customer orders or purchases follows a ________ model.

pull-based model

The type of logical database model that treats data as if they were stored in two-dimensional tables is the

relational DBMS.

All of the following are elements of critical thinking except:

relying on gut instinct

Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix

remote/colocated

A ________ is a method of interaction with a customer, such as telephone or customer service desk.

touch point

Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.

true

In green computing, reducing computer power consumption is a top priority

true

Insofar as software is essentially an intangible good, procedures of software cannot be held liable for any damages that their software unintentionally causes

true

Java software is designed to run on any computer or computing device, regardless of specific microprocessor or operating system it uses

true

Most Internet businesses do very little to protect the privacy of their customers

true

N-tier computing is a multi-tier, load-balancing scheme for Web-based application in which significant parts of Web site content, logic, and processing are performed by smaller, less expensive servers located nearby the user.

true

7) Computer worms spread much more rapidly than computer viruses.

TRUE

A key logger is a type of A) worm B) Trojan horse C) virus D) spyware

D) spyware

Information systems literacy describes the behavioral approach to information systems, whereas computer literacy describes the technical approach.

False, computer literacy is the knowledge of information technology.

Studies have consistently shown that firms who invest greater amounts in information technology receive greater benefits than firms that invest less.

False, even though generally speaking it is true.

knights of labor

One of the very first worker's unions which promoted the social and cultural uplift of the worker. 8-hour workday. Equal pay for men and women. Government ownership of all public utilities.

andrew carnegie

a Scottish-American industrialist who led the enormous expansion of the American steel industry in the late 19th century. He built Pittsburgh's Carnegie Steel Company, which he sold to J.P. Morgan in 1901 for $480 million, creating the U.S. Steel Corporation. He implemented vertical integration in his business model by purchasing almost every phase of steel production.

wabash v illinois

a Supreme Court decision that severely limited the rights of states to control interstate commerce. It led to the creation of the Interstate Commerce Commission

john d rockefeller

a co-founder of the Standard Oil Company, which dominated the oil industry and was the first great U.S. business trust. he revolutionized the petroleum industry. he got into the oil refining business which was the intermediary of the drilling and processing of oil. by doing this he stabilized the oil market and eventually makes the standard oil company into a monopoly

what is the foundation technology for web services? a) XML b) HTML c) SOAP d) UDDI

a) XML

How are the Internet and e-commerce causing severe disruption to the existing advertising business model? a) ties between customer and businesses are being rethought b) technology players such as Yahoo! seek to dominate online advertising and expand into offline ad brokerage c) new methods of advertising, such as blog advertising, are emerging d) the market entry costs for online advertising services are extremely low

b) technology players such as Yahoo! seek to dominate online advertising and expand into offline ad brokerage

Technology that consists of computer-based systems that attempt to emulate human behavior is called ______. a) fuzzy logic b) neural networks c) AI technology d) genetic algorithms

c) AI technology

Which of the following is a technique used to allow users to interact with a Web page without having to wait for the Web server to reload the web page? a) UDDI b) widgets c) Ajax d) java

c) Ajax

The most common Web server today, controlling 54 percent of the market, is a) Microsoft IIS b) WebSTAR c) Apache HTTP Server d) Netscape Server

c) Apache HTTP Server

Which of the following factors provides an understanding of why computing resources today are ever more available than in previous decades? a) Network economics b) law of mass digital storage and Moore's law c) declining communications costs, universal standards, and the Internet. d) All of the above

d) All of the above

A network that covers broad geographical regions is most commonly referred to as a (n) a) local area network b) intranet c) peer-to-peer network d) wide area network

d) wide area network

In choosing the best solution for a business problem, one of the most important considerations is:

existing resources and skills

Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers

extranet

radical republicans

faction of the american politicians from 1854. opposed by moderates and conservative factions led by abraham lincoln. strongly opposed slavery during the war.

passive RFID tags

have a range of several feet

Amazon's use of the internet as a platform to sell books more efficiently than traditionally bookstores illustrates a use of information services for

low-cost leadership

rutherford b hayes

republican candidate of the election of 1876. due to the compromise of 1877 he was elected president. this indicates the reconstruction era coming to a close

an organization is a

stable, formal social structure that takes resources from the environment and processes them to produce outputs, formal, legal entity with internal rules and procedures that must abide by laws, and collection of social elements

b & o railroad

stands for baltimore and ohio was also the aftermath of revolutionized transportation and it also changed the way americans planned for war

Checking store inventory is an example of a(n) ________ decision. semistructured unstructured structured none of these

structured

The type of decision that can made by following a definite procedure is called a(n) ________ decision. structured unstructured semistructured procedural

structured

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a

supply chain.

An example of raw data from a national chain of automobile stores would be:

1 Toyota RAV4 sold January 7, 2008 in Louisville, Kentucky - $28000

23) Business processes are analyzed, simplified, and redesigned in A) business process redesign. B) rationalization of procedures. C) automation. D) paradigm shifts.

A

25) Which type of decision is calculating gross pay for hourly workers? A) structured B) unstructured C) semistructured D) none of the above

A

28) The Internet poses specific security problems because A) it was designed to be easily accessible. B) Internet data is not run over secure lines. C) Internet standards are universal. D) it changes so rapidly.

A

28) Which conversion process introduces the system first to a limited portion of the organization? A) the pilot study strategy B) the phased approach strategy C) the limited cutover strategy D) the parallel strategy

A

30) An independent computer program that copies itself from one computer to another over a network is called a A) worm. B) Trojan horse. C) bug. D) pest.

A

31) The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce? A) information density B) richness C) customization D) interactivity

A

32) In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? A) Trojan horse B) virus C) worm D) spyware

A

34) What is the purpose of responsive Web design? A) It allows one Web site to serve different platforms, such as tablets, PCs, and mobile phones. B) It allows Web sites to respond quickly to changing user needs. C) It enables Web sites to customize design according to user preferences. D) It enables Web sites to customize content based on user location and preferences

A

36) The role of entrepreneur falls into which of Mintzberg's managerial classifications? A) decisional B) informational C) interpersonal D) symbolic

A

36) Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A) DDoS B) DoS C) SQL injection D) phishing

A

37) Reducing the business process layers in a distribution channel is called A) disintermediation. B) BPR. C) market segmentation. D) network effects.

A

39) Approximately how many new threats from malware were detected by Internet security firms in 2012? A) 400 thousand B) 4 million C) 40 million D) 400 million

A

40) Compared to traditional goods, digital goods have A) greater pricing flexibility. B) lower marketing costs. C) higher production costs. D) higher inventory costs.

A

41) Compared to traditional markets, digital markets have A) lower distributed delivery costs. B) higher marginal costs per unit. C) equivalent copying costs. D) similar inventory costs.

A

42) Pharming involves A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. B) pretending to be a legitimate business's representative in order to garner information about a security system. C) setting up fake Web sites to ask users for confidential information. D) using e-mails for threats or harassment.

A

42) eBay is an example of A) C2C e-commerce. B) B2B e-commerce. C) B2C e-commerce. D) M-commerce.

A

43) Which of the following describes how the Simon framework of decision-making works in high-velocity decision environments? A) All four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow. B) The first three steps of the process are handled by software algorithms and the final step is handled by experienced managers. C) The first two steps of Simon's framework are eliminated and the final two steps are handled by software algorithms. D) All fours steps are performed by humans with the support of high-speed, high-volume DSS and ESS.

A

47) To understand and define the contents of data flows and data store, system builders use A) a data dictionary. B) process specifications diagrams. C) user documentation. D) data flow diagrams.

A

48) To show each level of a system's design, its relationship to other levels, and its place in the overall design structure, structured methodologies use A) structure charts. B) Gantt and PERT charts. C) process specifications. D) data flow diagrams.

A

48) Which of the following companies is not one of the top five producers of business intelligence and analytics products? A) Sun B) Microsoft C) SAP D) IBM

A

51) Application controls A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D) include software controls, computer operations controls, and implementation controls.

A

51) In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis? A) subscription B) free/freemium C) transaction fee D) sales

A

53) Which of the following are most likely to rely primarily on production reports for their decision-making needs? A) operational employees and supervisors B) senior managers C) analytic modelers D) business analysts

A

53) Which of the following best illustrates the transaction fee revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase. C) Flickr provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads.

A

54) A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access. A) identity management B) AUP C) authentication D) firewall

A

54) Which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitized maps? A) GIS B) DSS C) MIS D) TPS

A

59) A firewall allows the organization to A) prevent unauthorized communication both into and out of the network. B) monitor network hot spots for signs of intruders. C) prevent known spyware and malware from entering the system. D) all of the above.

A

60) A pivot table is a A) spreadsheet tool that displays two or more dimensions of data in a convenient format. B) type of relational database. C) chart tool that can rotate columnar data quickly and visually. D) tool for performing sensitivity analysis.

A

60) In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver? A) stateful inspection B) intrusion detection system C) application proxy filtering D) packet filtering

A

62) E-hubs are more ________ than private industrial networks. A) transaction-oriented B) collaborative C) independent D) supply-chain oriented

A

george westinghouse

A tireless inventor and businessman, he designed an air brake that made rail travel safer, and his promotion of an alternating current system revolutionized the power industry.

An alternative to using application server software for interfacing between a Web server and back-end databases is A) CGI B) HTML C) Java D) SQL

A) CGI

Oracle Database Lite is a(n) A) DBMS for small handheld computing devices B) Internet DBMS C) mainframe relational DBMS D) DBMS for midrange computers.

A) DBMS for small handheld computing devices.

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a _____ attack. A) DDos B) DoS C) SQL injection D) phishing

A) DDoS

Which type of system would you use to determine what trends in your supplier's industry will affect your firm the most in five years? A) ESS B) TPS C) MIS D) DSS

A) ESS

All of the following statements regarding Lotus Notes are true except which one? A) It began as an e-mail and messaging client. B) It is a widely used collaboration tool at larger firms. C) It provides capabilities for wikis and microblogging. D) It provides tools for full version control of all company documentation.

A) It began as an e-mail and messaging client.

Which of the following statements is NOT true about information technology's impacts on business firms? A) It helps firms expand in size. B) It helps firms lower the cost of market participation. C) It helps reduce internal management costs. D) It helps reduce transaction costs.

A) It helps firms expand in size.

________ is the ability to offer individually tailored products or services using the same production resources as bulk production. A) Mass customization B) Size customization C) Magnitude customization D) Dimension customization

A) Mass customization

________ management is an important capability for service processes that is found in most major CRM software products. A) Returns B) Lead C) Account D) Events

A) Returns

An example of a business using information systems to attain operational excellence is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod.

A) Wal-Mart's RetailLink system

An example of a business using information systems to attain operational excellence is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod.

A) Wal-Mart's RetailLink system.

A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because A) a data mart typically focuses on a single subject area or line of business B) all the information is historical C) a data mart uses a Web interface D) all of the information belongs to a single company

A) a data mart typically focuses on a single subject area or line of business

Which of the following projects is the riskiest? A) a project that managers are concerned will affect their roles and job descriptions B) a project that requires technical expertise that your firm's IT employees do not have C) a project that has a strict deadline, or sales will suffer D) a project that will automate many clerical duties

A) a project that managers are concerned will affect their roles and job descriptions

Users prefer systems that A) are oriented to facilitating organizational tasks and solving business problems. B) work with existing DBMS. C) are able to provide optimum hardware and software efficiency. D) are capable of storing much more data than they need.

A) are oriented to facilitating organizational tasks and solving business problems.

Customer service modules in CRM systems provide tools for: A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information.

A) assigning and managing customer service requests.

How are information systems used at the industry level to achieve strategic advantage? A) by building industry-wide, IT-supported consortia and symposia B) by raising the bargaining power of suppliers C) by encouraging the entry of new competitors D) by enforcing standards that reduce the differences between competitors

A) by building industry-wide, IT-supported consortia and symposia

Unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network? A) client computer B) communications lines C) corporate server D) internal corporate back-end system

A) client computer

The /join/ operation A) combines relational tables to provide the user with more information than is otherwise available. B) identifies the table from which the columns will be selected. C) creates a subset consisting of columns in a table. D) organizes elements in to segments

A) combines relational tables to provide the user with more information than is otherwise available.

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the A) data dictionary B) data definition diagram C) entity-relationship diagram D) relationship dictionary

A) data dictionary

Which of the following would NOT be used as an input for an information system? A) digital dashboard B) handheld computer C) bar-code scanner D) cell phone

A) digital dashboard

Which of the following would not be used as an input for an information system? A) digital dashboard B) handheld computer C) barcode scanner D) cell phone

A) digital dashboard

Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other. A) e-business suites B) ERP systems C) middleware D) legacy systems

A) e-business suites

Internal integration tools A) enable a project to have sufficient technical support for project management and development. B) enable a project manager to properly document and monitor project plans. C) portray a project as a network diagram with numbered nodes representing project tasks. D) consist of ways to link the work of the implementation team with users at all organization levels.

A) enable a project to have sufficient technical support for project management and development.

The CPO is responsible for A) ensuring that the company complies with existing data privacy laws. B) making better use of existing knowledge in organizational and management processes. C) enforcing the firm's information security policy. D) overseeing the use of information technology in the firm

A) ensuring that the company complies with existing data privacy laws.

You have been hired by Inspiration Inc., to help improve their profit margin. Inspiration Inc. is a business communications consultancy that services many clients in different industries throughout the United States. The end products of the company are customized recommendations for the best use of a client's existing resources for improving internal communications, typically delivered via documentation in different media. The company has approximately 100 consultants, all of whom are located in their central headquarters in Chicago. What system do you recommend to improve the company's business processes and increase their profit margin? A) extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed B) CRM, to maintain easily accessible customer records to minimize the time spent looking for client data C) KMS, for minimizing redundant work on similar clients D) marketing system, for improving sales levels

A) extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed

Sociologists study information systems with an eye to understanding A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods.

A) how systems affect individuals, groups, and organizations.

Capabilities of supply chain execution systems would /not/ include: A) identifying the optimal transportation mode B) tracking the flow of finished goods. C) managing materials. D) managing warehouse operations.

A) identifying the optimal transportation mode

A(n) _____ system is used to identify and authorized different categories of system users and specify which portions of the organization's system each user can access A) identity management B) AUP C) authentication D) firewall

A) identity management

The primary activities of a firm include A) inbound logistics, operations, outbound logistics, sales and marketing, and service. B) inbound logistics, operations, outbound logistics, technology, and service. C) procurement, inbound logistics, operations, technology, and outbound logistics. D) procurement, operations, technology, sales and marketing, and services.

A) inbound logistics, operations, outbound logistics, sales and marketing, and service.

The organizations rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n) A) information policy B) data definition file C) data quality audit D) data governance policy

A) information policy

Which of the following would NOT be considered a disruptive technology? A) instant messaging B) e-mail C) Internet telephony D) PCs

A) instant messaging

Which of the following is not a responsibility of effective change management? A) integrating legacy systems B) dealing with fear and anxiety about new systems C) training users of the new system D) enforcing user participation at all stages of system development

A) integrating legacy systems

Which of the following are key corporate assets? A) intellectual property, core competencies, and financial and human assets B) production technologies and business processes for sales, marketing, and finance C) knowledge and the firm's tangible assets, such as goods or services D) time and knowledge

A) intellectual property, core competencies, and financial and human assets

Which of the following are key corporate assets? A) intellectual property, core competencies, and financial and human assets B) production technologies and business processes for sales, marketing, and finance C) knowledge and the firm's tangible assets, such as goods or services D) time and knowledge

A) intellectual property, core competencies, and financial and human assets

The central method used in a portfolio analysis is to A) inventory all of the organization's information systems projects and assets. B) perform a weighted comparison of the criteria used to evaluate a system. C) survey a large sample of managers on their objectives, decision-making process, and uses and needs for data and information. D) interview a small number of top managers to identify their goals and criteria for achieving success.

A) inventory all of the organization's information systems projects and assets.

The Internet poses specific security problems because A) it was designed to be easily accessible B) Internet data is not run over secure lines C) Internet standards are universal D) it changes so rapidly

A) it was designed to be easily accessible

A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy. A) just-in-time B) stockless C) bullwhip D) safety stock

A) just-in-time

Which of the following non-digital data storage items is most similar to a database? A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet

A) library card catalog

Amazon's use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates a use of information services for A) low-cost leadership. B) marketing effectiveness. C) focusing on market niche. D) strengthening supplier intimacy.

A) low-cost leadership.

According to the ________ definition of organizations, an organization is seen as a means by which primary production factors are transformed into outputs consumed by the environment. A) microeconomic B) macroeconomic C) sociotechnical D) behavioral

A) microeconomic

A firm can exercise greater control over its suppliers by having A) more suppliers. B) fewer suppliers. C) global suppliers. D) local suppliers.

A) more suppliers.

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called A) normalization B) data scrubbing C) data cleansing D) data defining

A) normalization

A field identified in a table as holding the unique identifier of the table's records is called the A) primary key B) key field C) primary field D) unique ID

A) primary key

A supply chain driven by actual customer orders or purchases follows a ________ model. A) pull-based model B) build-to-stock C) push-based D) replenishment-driven

A) pull-based model

Order data for baseball tickets and bar code data are examples of A) raw input. B) raw output. C) customer and product data. D) sales information.

A) raw input

The Gramm-Leach-Bliley Act A) requires financial institutions to ensure the security of customer data B) specifies best practices in information systems security and control C) imposes responsibility on companies and management to safeguard the accuracy of financial information D) outlines medical security and privacy rules

A) requires financial institutions to ensure the security of customer data

Which of the following is not one of the primary environmental actors that interacts with an organization and its information systems? A) sales force B) regulatory agencies C) customers D) suppliers

A) sales force

According to your reading of the chapter, change management is a process that A) should be addressed before a project is developed. B) begins when a project is implemented. C) is used primarily to mandate user acceptance. D) must be addressed in all systems development

A) should be addressed before a project is developed.

In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver? A) stateful inspection B) intrusion detection system C) application proxy filtering D) packet filtering

A) stateful inspection

E-government refers to the application of ________ to digitally enable government and public sector agencies' relationships with citizens, businesses, and other arms of government. A) the Internet and networking technologies B) e-commerce C) e-business D) any computerized technology

A) the Internet and networking technologies

Thomas Friedman's declaration that the world was now "flat" meant that A) the Internet has reduced the economic advantages of developed countries. B) globalization is starting to offer less advantage to large corporations. C) the global economy is increasingly commanded by fewer and larger corporations. D) global capitalism is homogenizing culture and business practices throughout the world.

A) the Internet has reduced the economic advantages of developed countries

Thomas Friedman's declaration that the world was now "flat" meant that A) the Internet has reduced the economic advantages of developed countries. B) globalization is starting to offer less advantage to large corporations. C) the global economy is increasingly commanded by fewer and larger corporations. D) global capitalism is homogenizing culture and business practices throughout the world.

A) the Internet has reduced the economic advantages of developed countries.

From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called A) the information value chain. B) the IT value chain. C) information processing. D) feedback.

A) the information value chain

An example of an organizational complementary asset is A) using the appropriate business model. B) a collaborative work environment. C) laws and regulations. D) all of the above.

A) using the appropriate business model

An example of an organizational complementary asset is A) using the appropriate business model. B) a collaborative work environment. C) laws and regulations. D) all of the above.

A) using the appropriate business model.

Which of the following types of collaboration tools allows you to communicate with avatars using text messaging? A) virtual worlds B) screen sharing C) collaborative writing D) large audience Webinars

A) virtual worlds

An independent computer program that copies itself from one computer to another over a network is called a A) worm B) Trojan horse C) bug D) pest

A) worm

long depression

An effect of financial institutions collapsing in 1873, the economy does not find any recovery up until 1879. The economy contracted for 5 consecutive years.

new immigrants

Around 1880, these people who were from eastern and southern europe came to the U.S. to avoid political and poverty issues. Competed with native-born americans and offered to work for much less.

21) Which of the following statements best describes the business value of improved decision making? A) Improved decision making creates better products. B) Improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values. C) Improved decision making enables senior executives to more accurately foresee future financial trends. D) Improved decision making strengthens customer and supplier intimacy, which reduces costs.

B

22) When there is no well-understood or agreed-on procedure for making a decision, it is said to be A) undocumented. B) unstructured. C) documented. D) semistructured.

B

23) Which of the following is an example of a geosocial mobile service? A) Kickstarter.com B) Foursquare C) Shopkick D) Facebook

B

24) A bank has reworked its mortgage application process so that several steps are handled by computer software, and some steps are combined to reduce bottlenecks in processing. The goal is to gradually improve its efficiency over time. This is an example of A) automation. B) rationalization of procedures. C) paradigm shift. D) business process redesign.

B

24) How are the Internet and e-commerce causing severe disruption to the existing advertising business model? A) Ties between customer and businesses are being rethought. B) Technology players such as Yahoo! seek to dominate online advertising and expand into offline ad brokerage. C) New methods of advertising, such as blog advertising, are emerging. D) The market entry costs for online advertising services are extremely low.

B

24) Which type of decision is deciding whether to introduce a new product line? A) structured B) unstructured C) recurring D) nonrecurring

B

26) Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network? A) client computer B) communications lines C) corporate servers D) internal corporate back-end system

B

26) The decision to approve a capital budget is an example of a(n) ________ decision. A) semistructured B) unstructured C) structured D) undocumented

B

27) Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called A) a Trojan horse. B) an SQL injection attack. C) key logging. D) a DDoS attack.

B

27) ________ provide(s) a methodology and tools for dealing with the organization's ongoing need to revise and optimize its numerous business processes. A) Business process redesign B) Business process management C) CASE tools D) TQM

B

30) Which phase of decision making finds or recognizes a problem, need, or opportunity? A) design B) intelligence C) choice D) implementation

B

32) Which process develops a detailed description of the functions that a new information system must perform? A) feasibility study B) requirements analysis C) systems design D) test plan development

B

33) Redirecting a Web link to a different address is a form of A) snooping. B) spoofing. C) sniffing. D) war driving.

B

33) Systems design A) describes what a system should do to meet information requirements. B) shows how the new system will fulfill the information requirements. C) identifies which users need what information, where, when and how. D) is concerned with the logical view of the system solution.

B

35) Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party. A) transparency B) asymmetry C) complexity D) discrimination

B

36) Which of the following is not an example of fourth generation development tools? A) Microsoft Excel B) graphics software, such as Photoshop C) report generator D) very high-level programming language

B

39) System testing A) includes all the preparations for the series of tests to be performed on the system. B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned. C) tests each program separately. D) provides the final certification that the system is ready to be used in a production setting.

B

40) An example of phishing is A) setting up bogus Wi-Fi hot spots. B) setting up a fake medical Web site that asks users for confidential information. C) pretending to be a utility company's employee in order to garner information from that company about their security system. D) sending bulk e-mail that asks for financial aid under a false pretext.

B

41) The concern that the structure of data is consistent within an information source reflects which quality dimension of information? A) accuracy B) integrity C) validity D) consistency

B

42) In the direct cutover conversion strategy, the new system A) is tested by an outsourced company. B) replaces the old one at an appointed time. C) and the old are run together. D) is introduced in stages.

B

43) You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm? A) wireless network B) employees C) authentication procedures D) lack of data encryption

B

44) Consumers selling goods and services electronically to other consumers best describes A) disintermediation. B) C2C e-commerce. C) M-commerce. D) B2C e-commerce.

B

44) In what stage of systems development are design specifications created? A) systems analysis B) systems design C) testing D) conversion

B

44) Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called A) sniffing. B) social engineering. C) phishing. D) pharming.

B

45) How do software vendors correct flaws in their software after it has been distributed? A) issue bug fixes B) issue patches C) re-release software D) issue updated versions

B

45) Which of the following systems support a manager's role as leader of an organization? A) decision support systems B) telepresence systems C) e-mail D) MIS

B

47) Transaction brokers A) generate revenue from advertising or from directing buyers to sellers. B) save users money and time by processing online sales transactions. C) provide a digital environment where buyers and sellers can establish prices for products. D) sell physical products directly to consumers or individual businesses.

B

48) Market creators A) save users money and time by processing online sales transactions. B) provide a digital environment where buyers and sellers can establish prices for products. C) create revenue by providing digital content over the Web. D) sell physical products directly to consumers or individual businesses.

B

49) Which of the following is not one of the six main elements in the business intelligence environment discussed in this chapter? A) managerial users and methods B) organizational environment C) user interface D) data from the business environment

B

50) Electronic evidence on computer storage media that is not visible to the average user is called ________ data. A) defragmented B) ambient C) forensic D) fragmented

B

50) In an object-oriented development framework for a university, how would the classes Degree, Mathematics, and Physics be related? A) Degree would be a sister class to Mathematics and Physics. B) Degree is a superclass to Mathematics and Physics. C) Mathematics and Physics would be ancestors to Degree. D) Degree would be a subclass to Mathematics and Physics.

B

50) Which of the following is not one of the five main analytic functionalities of BI systems for helping decision makers understand information and take action? A) production reports B) business case archives C) parameterized reports D) forecasts, scenarios, and models

B

52) Which of the following are most likely to rely primarily on the drill-down functionality of BI for their decision-making needs? A) IT developers B) managers C) operational employees D) business analysts

B

52) Which of the following best illustrates the affiliate revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase. C) Flickr provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads.

B

56) Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as A) clickstream advertising. B) behavioral targeting. C) online profiling. D) long tail marketing.

B

56) Rigorous password systems A) are one of the most effective security tools. B) may hinder employee productivity. C) are costly to implement. D) are often disregarded by employees.

B

57) As a technical project manager, you have decided to propose implementing a prototyping methodology for a small Web-based design project. What is the order of steps you will follow in this project? A) Develop the prototype; use the prototype; revise and enhance the prototype. B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype. C) Define the requirements, develop solutions, select the best prototype, and implement the prototype. D) Define the requirements, develop the prototype, revise and enhance the prototype.

B

57) MIS typically produce A) new ways of looking at data that emphasize change, flexibility, and rapid response. B) fixed, regularly scheduled reports based on data extracted from the organization's TPS. C) solutions to semistructured problems appropriate for middle management decision making. D) assumptions, responses to ad-hoc queries, and graphic representations of existing data.

B

58) An information system for a building company that tracks construction costs for various projects across the United States would be categorized as a type of A) DSS. B) MIS. C) GIS. D) GDSS.

B

58) Which of the following statements about B2B commerce is not true? A) Eighty percent of online B2B e-commerce is still based on EDI. B) B2B e-commerce represents approximately three-quarters of the overall B2B marketplace. C) B2B e-commerce only includes commercial transactions between firms. D) B2B e-commerce revenues in 2012 were over $4 trillion.

B

59) A systems building approach in which the system is developed as successive versions, each version reflecting requirements more accurately, is described to be A) end-user oriented. B) iterative. C) object-oriented. D) agile.

B

59) EDI is A) the use of Internet technologies for electronic data transactions. B) the exchange between two organizations of standard transactions through a network. C) electronic data invoicing. D) electronic delivery infrastructure.

B

61) Which of the following is the greatest threat that employees pose to an organization's information systems? A) forgetting passwords B) lack of knowledge C) entering faulty data D) introducing software errors

B

62) The leading methodology for understanding the really important information needed by a firm's executives is called the ________ method. A) digital dashboard B) balanced scorecard C) KPI D) data visualization

B

64) In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A) SSL B) symmetric key encryption C) public key encryption D) private key encryption

B

64) Measures defined by management and used to internally evaluate the success of a firm's financial, business process, customer, and learning and growth are called A) benchmarks. B) KPIs. C) the balanced scorecard method. D) BPM.

B

65) Goods that are involved in the actual production process are referred to as A) raw materials. B) direct goods. C) purchasing goods. D) indirect goods.

B

66) Downtime refers to periods of time in which a A) computer system is malfunctioning. B) computer system is not operational. C) company or organization is not operational. D) computer is not online

B

66) ESS A) support the structured decision making of senior executives. B) have the ability to drill down into lower levels of detail. C) easily integrate data from different systems. D) are primarily driven by information derived from a company's transaction processing systems.

B

67) Which type of systems development is characterized by significantly speeding up the design phase and the generation of information requirements and involving users at an intense level? A) RAD B) JAD C) prototyping D) end-user development

B

67) You are building an e-commerce Web site that will sell e-books and are looking for a hosted solution. Which of the following functionalities is least important for your business goals? A) site tracking system B) inventory management C) digital catalog D) customer database

B

68) Groups of objects are assembled into software components for common functions, which can be combined into large-scale business applications, in which type of software development? A) object-oriented development B) component-based development C) structured methodologies D) RAD

B

68) In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. A) high availability computing B) deep-packet inspection C) application proxy filtering D) stateful inspection

B

69) The development and use of methods to make computer systems resume their activities more quickly after mishaps is called A) high availability computing. B) recovery oriented computing. C) fault tolerant computing. D) disaster recovery planning.

B

69) Which of the following is the least costly way to build a Web site? A) Outsource the Web site development to overseas vendors. B) Use a hosted solution and pre-built templates. C) Build your site yourself from scratch using existing software. D) Use a site-building package.

B

70) Compared to the use of proprietary components, Web services promise to be less expensive and less difficult to implement because of A) their ability to integrate seamlessly with legacy systems. B) the use of universal standards. C) the ubiquity of the Internet. D) the ability to reuse Web services components.

B

70) GDSS A) require a small number of attendees in order to maintain high levels of productivity. B) enable increasing a meeting size without reducing productivity. C) include specific procedures for priority ranking the order in which participants can respond. D) utilize shared desktop computers to foster collaboration.

B

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? A) Churn rate B) CLTV C) Cost per lead D) Cost per sale

B) CLTV

________ software deals with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training? A) Enterprise B) ERM C) PRM D) ERP

B) ERM

The emergence, for Amazon.com, of new competitors in the sphere of online shopping illustrates what disadvantage posed by the use of information systems to achieve competitive advantage? A) E-commerce is affected by the law of diminishing returns. B) Internet technologies are universal, and therefore usable by all companies. C) Internet shopping produces cost transparency. D) The Internet enables the production or sales of substitute products or services.

B) Internet technologies are universal, and therefore usable by all companies.

_____ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies

B) Intrusion detection systems

An example of synergy in business is A) Amazon's use of the Internet to sell books. B) JP Morgan Chase's mergers with other banks that provided JP Morgan with a network of retail branches in new regions. C) Blockbuster combining traditional video rental with online video rental. D) Wal-Mart's order entry and inventory management system to coordinate with suppliers.

B) JP Morgan Chase's mergers with other banks that provided JP Morgan with a network of retail branches in new regions.

Which of the following is an important capability for sales processes that is found in most major CRM software products? A) Returns management B) Lead management C) Channel promotions management D) Events management

B) Lead management

All of the following statements about enterprise applications are true except for? A) Enterprise applications are more successfully implemented when an organization has prepared for organizational change B) Once you have purchased an implemented a vendor's enterprise system, it is much less expensive to switch vendors. C) The total implementation cost of a large system runs into millions of dollars D) Enterprise applications are based on organization-wide definitions of data

B) Once you have purchased an implemented a vendor's enterprise system, it is much less expensive to switch vendors.

Which of the following statements best describes the effect that project structure has on overall project risk? A) Highly structured projects are more complex, and run a higher risk of programmers and users misunderstanding the ultimate goals. B) Projects with relatively undefined goals are more likely to be subjected to users changing requirements and to run a higher risk of not satisfying project goals. C) Highly structured projects tend to be larger, affecting more organizational units, and run both the risk of out-of-control costs and becoming too difficult to control. D) Less structured projects are more able to be quickly developed, tested, and implemented using cutting-edge RAD and JAD development techniques, and pose less risk of running up unforeseen costs.

B) Projects with relatively undefined goals are more likely to be subjected to users changing requirements and to run a higher risk of not satisfying project goals.

Which of the following decisions requires knowledge based on collaboration and interaction? A) How long will it take to manufacture this product? B) Should we work with outside vendors on new products and services? C) In which geographical locations are our products garnering the most sales? D) Which product design is the most efficient for the user in terms of energy use?

B) Should we work with outside vendors on new products and services?

________ systems integrate supplier, manufacturer, distributor, and customer logistics processes. A) Collaborative distribution B) Supply-chain management C) Reverse logistics D) Enterprise planning

B) Supply-chain management

Which type of system would you use to change a production schedule if a key supplier was late in delivering goods? A) ESS B) TPS C) MIS D) DSS

B) TPS

_____ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships. A) OLAP B) Text mining C) Web mining D) Web content mining

B) Text mining

48) Concurrent supply chains are made possible by which technology? A) ERP systems B) The Internet C) Supply chain management systems D) Just-in-time supply-chain technologies

B) The Internet

Which of the following best describes the primary reason for implementing a new information system, from a business perspective? A) The system enables the firm to create new products and services. B) The system will create new value for the firm, beyond its costs. C) The system will automate key business processes. D) The system is in use by our primary competitors.

B) The system will create new value for the firm, beyond its costs.

Apple Computer dominates the online legal music sales industry primarily because of a failure of recording label companies to A) invest in technology. B) adopt a new business model. C) invest in complementary assets. D) modernize their information value chain.

B) adopt a new business model

Apple Computer dominates the online legal music sales industry primarily because of a failure of recording label companies to A) invest in technology. B) adopt a new business model. C) invest in complementary assets. D) modernize their information value chain.

B) adopt a new business model.

Upon which of the following industries has the Internet as a whole been a disruptive technology? A) bill payments B) air travel C) books D) real estate

B) air travel

Electronic evidence on computer storage media that is not visible to the average user is called _____ data A) defragmented B) ambient C) forensic D) fragmented

B) ambient

Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called A) a Trojan horse B) an SQL injection attack C) key logging D) a DDoS attack

B) an SQL injection attack

You work for a highly successful advertiser that is just about to expand nationally. Of utmost importance will be finding a way to store and disseminate their clients' continually updated branding guides, which include multiple image files and text documents, to all of the firm's branches. What system will best serve these needs? A) an intranet with KMS capabilities B) an extranet with KMS capabilities C) a TPS with KMS capabilities D) a CRM

B) an extranet with KMS capabilities

Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications. A) operational CRM B) analytical CRM C) operational SCM D) analytical SFA

B) analytical CRM

Analyzing customer buying patterns is an example of: A) CLTV. B) analytical CRM. C) operational CRM. D) demand planning.

B) analytical CRM.

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect. A) network B) bullwhip C) ripple D) whirlpool

B) bullwhip

The interaction between information systems and organizations is influenced A) primarily by the decision making of middle- and senior-managers. B) by many factors, including structure, politics, culture, and environment. C) by two main microeconomic forces: capital and labor. D) primarily by the organization's business processes and culture.

B) by many factors, including structure, politics, culture, and environment.

The measurement of the number of customers who stop using or purchasing products or services from a company is called: A) switching costs. B) churn rate. C) CLTV. D) switch rate.

B) churn rate.

Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network? A) client computer B) communication lines C) corporate servers D) internal corporate back-end system

B) communication lines

The ________ model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete. A) network economics B) competitive forces C) competitive advantage D) demand control

B) competitive forces

Downtime refers to periods of time in which a A) computer system is malfunctioning B) computer system is not operational C) company or organization is not operational D) computer is not online

B) computer system is not operational

The project operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected

B) creates a subset consisting of columns in a table.

Which of the following is an example of a cross-functional business process? A) identifying customers B) creating a new product C) assembling a product D) paying creditors

B) creating a new product

The data dictionary serves as an important data management tool by A) assigning attributes to the data B) creating an inventory of the data elements contained in the database. C) presenting data as end users or business specialists would perceive them D) maintaining data in updated form

B) creating an inventory of the data elements contained in the database

The confusion created by _____ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. A) batch processing B) data redundancy C) data independence D) online processing

B) data redundancy

The special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design and maintenance, is called A) data administration B) database administration C) information policy administration D) data auditing

B) database administration

In controlling network traffic to minimize slow-downs, a technology called ______ is used to examine data files and sort low-priority data from high-priority data A) high availability computing B) deep-packet inspection C) application proxy filtering D) stateful inspection

B) deep-packet inspection

47) A build-to-order supply-chain model is also called a ________ model. A) supply-based B) demand-driven C) replenishment-driven D) push-based

B) demand-driven

DBMSs typically include report-generating tools in order to A) retrieve and display data B) display data in an easier-to-read format C) display data in graphs D) perform predictive analysis

B) display data in an easier-to-read format

The use of digital technology and the Internet to execute the major business processes in the enterprise is called A) e-commerce. B) e-business. C) enterprise applications. D) MIS.

B) e-business.

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm? A) wireless network B) employees C) authentication procedures D) lack of data encryption

B) employees

Formal planning and control tools A) enable a project to have sufficient technical support for project management and development. B) enable a project manager to properly document and monitor project plans. C) portray a project as a network diagram with numbered nodes representing project tasks. D) consist of ways to link the work of the implementation team with users at all organization levels.

B) enable a project manager to properly document and monitor project plans.

What is the most important function of an enterprise application? A) increasing speed of communicating B) enabling business functions and departments to share information C) enabling a company to work collaboratively with customers and suppliers D) enabling cost-effective e-business processes

B) enabling business functions and departments to share information

A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business. A) transaction B) enterprise C) automatic reporting D) management information

B) enterprise

Enterprise systems are also known as ________ systems. A) resource planning B) enterprise resource planning C) enterprise support D) management information

B) enterprise resource planning

Which systems often deliver information to senior executives through a portal, which uses a Web interface to present integrated personalized business content? A) transaction processing systems B) executive support systems C) management information systems D) decision-support systems

B) executive support systems

Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers? A) intranet B) extranet C) KMS D) TPS

B) extranet

Maintaining the organization's financial records is a central purpose of which main business function? A) manufacturing and accounting B) finance and accounting C) sales and manufacturing D) finance and sales

B) finance and accounting

Maintaining the organization's financial records is a central purpose of which main business function? A) manufacturing and accounting B) finance and accounting C) sales and manufacturing D) finance and sales

B) finance and accounting

Data mining is a tool for allowing users to A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports.

B) find hidden relationships in data

Which of the following is not one of the five main variables affecting project success? A) risk B) goals C) time D) quality

B) goals

Psychologists study information systems with an eye to understanding A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods.

B) how human decision makers perceive and use formal information.

Psychologists study information systems with an eye to understanding A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods.

B) how human decision makers perceive and use formal information.

Which main business function is responsible for maintaining employee records? A) sales and marketing B) human resources C) finance and accounting D) manufacturing and production

B) human resources

Which main business function is responsible for maintaining employee records? A) sales and marketing B) human resources C) finance and accounting D) manufacturing and production

B) human resources

Supply chain planning systems: A) track the physical status of goods. B) identify the transportation mode to use for product delivery. C) track the financial information involving all parties. D) track the status of orders.

B) identify the transportation mode to use for product delivery.

Verizon's implementation of a Web-based digital dashboard to provide managers with real-time information such as customer complaints is an example of A) improved flexibility. B) improved decision making. C) improved efficiency. D) customer and supplier intimacy.

B) improved decision making

One example of an implementation problem is A) poor user interface. B) inadequate user training. C) project running over budget. D) changes in job activities and responsibilities

B) inadequate user training.

An example of using an external integration tool would be to A) define task dependencies. B) include user representatives as active members of the project team. C) create a PERT chart. D) hold frequent project team meetings.

B) include user representatives as active members of the project team.

The principal capital budgeting models for evaluating information technology projects are the payback method, the accounting rate of return on investment (ROI), the net present value, and the A) future present value. B) internal rate of return. C) external rate of return. D) ROPM.

B) internal rate of return.

How do software vendors correct flaws in their software after it has been distributed? A) issue bug fixes B) issue patches C) re-release software D) issue updated versions

B) issue patches

A field identified in a record as holding the unique identifier for that record is called the A) primary key B) key field C) primary field D) unique ID

B) key field

The four major types of competitive strategy are A) low-cost leadership; substitute products and services; customers; and suppliers. B) low-cost leadership; product differentiation; focus on market niche; and customer and supplier intimacy. C) new market entrants; substitute products and services; customers; and suppliers. D) low-cost leadership; new market entrants; product differentiation; and focus on market niche.

B) low-cost leadership; product differentiation; focus on market niche; and customer and supplier intimacy.

In a hierarchical organization, the upper levels consist of A) managerial and professional employees. B) managerial, professional, and technical employees. C) professional and operational employees. D) managerial, professional, and operational employees.

B) managerial, professional, and technical employees

When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy. A) product differentiation B) market niche C) mass customization D) process efficiency

B) market niche

Rigorous passwords systems A) are one of the most effective security tools B) may hinder employee productivity C) are costly to implement D) are often disregarded by employees

B) may hinder employee productivity

Disciplines that contribute to the technical approach to information systems are A) computer science, engineering, and networking. B) operations research, management science, and computer science. C) engineering, utilization management, and computer science. D) management science, computer science, and engineering.

B) operations research, management science, and computer science.

Disciplines that contribute to the technical approach to information systems are A) computer science, engineering, and networking. B) operations research, management science, and computer science. C) engineering, utilization management, and computer science. D) management science, computer science, and engineering

B) operations research, management science, and computer science.

As discussed in the chapter, which of the following is not one of the immediate consequences of inadequate software project management? A) cost overruns B) organizational conflict C) time slippage D) technical shortfalls

B) organizational conflict

The central method used in a scoring model is to A) inventory all of the organization's information systems projects and assets. B) perform a weighted comparison of the criteria used to evaluate a system. C) survey a large sample of managers on their objectives, decision-making process, and uses and needs for data and information. D) interview a small number of top managers to identify their goals and criteria for achieving success.

B) perform a weighted comparison of the criteria used to evaluate a system.

Which of the following is /not/ one of the main problems with a traditional file environment? A) data inconsistency B) program-data independence C) lack of flexibility in creating ad-hoc reports D) poor security

B) program-data independence

The ________ consists of systems analysts, specialists from the relevant end-user business areas, application programmers, and perhaps database specialists. A) project management group B) project team C) IS steering committee D) corporate strategic planning committee

B) project team

The ________ is directly responsible for the individual systems project. A) project management group B) project team C) IS steering committee D) corporate strategic planning committee

B) project team

Wal-Mart's continuous replenishment system allows it to A) provide mass customization. B) provide an efficient customer response system. C) strengthen customer intimacy. D) achieve economy of scale.

B) provide an efficient customer response system.

The development and use of methods to make computer systems resume their activities more quickly after mishaps his called A) high availability computing B) recovery oriented computing C) fault tolerant computing D) disaster recovery planning

B) recovery oriented computing

In a table for customers, the information about a single customer would reside in a single A) field B) row C) column D) table

B) row

An example of a professional bureaucracy is a A) small startup firm. B) school system. C) mid-size manufacturing firm. D) consulting firm.

B) school system.

Which method is used to assign weights to various features of a system? A) information systems plan B) scoring model C) portfolio analysis D) TCO

B) scoring model

The three principle levels within a business organization hierarchy are A) senior management, operational management, and service workers. B) senior management, middle management, and operational management. C) senior management, operational management, and information systems. D) senior management, middle management, and service workers.

B) senior management, middle management, and operational management.

An example of phishing is A) setting up a bogus wi-fi hot spot B) setting up a fake medical Web site that asks users for confidential information C) pretending to be a utility company's employee in order to garner information from that company about their security system D) sending bulk e-mail that asks for financial aid under a false pretext

B) setting up a fake medical Web site that asks users for confidential information

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called A) sniffing B) social engineering C) phishing D) pharming

B) social engineering

Redirecting a Web link to a different address is a form of A) snooping B) spoofing C) sniffing D) war driving

B) spoofing

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a A) distribution channel. B) supply chain. C) value chain. D) marketing channel.

B) supply chain

The temp agency that you own is having serious difficulties placing temps because few of them are familiar with Internet research. Investing in training software to enhance your workers' skills is an example of using technology to achieve which business objective? A) customer and supplier intimacy B) survival C) competitive advantage D) improved decision-making

B) survival

The temp agency that you own is having serious difficulties placing temps because few of them are familiar with Internet research. Investing in training software to enhance your workers' skills is an example of using technology to achieve which business objective? A) customer and supplier intimacy B) survival C) competitive advantage D) improved decision making

B) survival

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A) SSL B) symmetric key encryption C) public key encryption D) private key encryption

B) symmetric key encryption

An example of a business using information systems for customer and supplier intimacy is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod.

B) the Mandarin Oriental hotel's customer-preference tracking system.

The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output. This is referred to as A) the point of no return. B) the law of diminishing returns. C) supply and demand. D) network inelasticity.

B) the law of diminishing returns

A ________ is a method of interaction with a customer, such as telephone or customer service desk. A) point of presence B) touch point C) sales point D) client channel

B) touch point

Which of the following best illustrates the relationship between entities and attributes? A)the entity CUSTOMER with the attribute PRODUCT B)the entity CUSTOMER with the attribute PURCHASE C)the entity PRODUCT with the attribute PURCHASE D)the entity product with the attribute CUSTOMER

B)the entity CUSTOMER with the attribute PURCHASE

The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and A) improved flexibility. B) improved decision making. C) improved business practices. D) improved efficiency.

B.) Improved decision making

21) The four kinds of structural organizational change enabled by IT, in order from least to most risky, are A) rationalization, automation, reengineering, and redesigning. B) rationalization, automation, reengineering, and paradigm shift. C) automation, rationalization, reengineering, and paradigm shift. D) automation, redesigning, restructuring, and paradigm shift.

C

23) Which of the following is not one of the challenges in securing wireless networks? A) broadcasted SSIDs B) scannability of radio frequency bands C) SQL injection attacks D) geographic range of wireless signals

C

25) An upscale organic foods grocery chain is implementing an information system that will enable it to add same-day home delivery of groceries to its customers. This is an example of A) automation. B) rationalization of procedures. C) paradigm shift. D) business process redesign.

C

26) Which of the following is not a recent development in e-commerce? A) Mobile e-commerce takes off. B) Social networking sites become a new platform for e-commerce. C) The music recording industry is disrupted as music creation and distribution become decentralized. D) Online entertainment business models surge.

C

29) Simon's description of decision making consists of which four stages? A) planning, financing, implementation, and maintenance B) planning, design, implementation, and maintenance C) intelligence, design, choice, and implementation D) intelligence, design, financing, and implementation

C

29) Which of the following statements about the Internet security is not true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network.

C

30) The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology? A) ubiquity B) personalization/customization C) richness D) interactivity

C

33) Information density refers to the A) richness—complexity and content—of a message. B) total amount and quantity of information delivered to consumers by merchants. C) total amount and quantity of information available to all market participants. D) amount of information available to reduce price transparency.

C

35) Hackers create a botnet by A) infecting Web search bots with malware. B) using Web search bots to infect other computers. C) causing other people's computers to become "zombie" PCs following a master computer. D) infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door.

C

35) The role of liaison falls into which of Mintzberg's managerial classifications? A) decisional B) informational C) interpersonal D) symbolic

C

36) Varying a product's price according to the supply situation of the seller is called ________ pricing. A) menu B) flexible C) dynamic D) asymmetric

C

37) According to Mintzberg, managers in their informational role act as A) figureheads for the organization. B) leaders. C) nerve centers of the organization. D) negotiators.

C

37) Which of the following is not an example of a computer used as a target of crime? A) knowingly accessing a protected computer to commit fraud B) accessing a computer system without authority C) illegally accessing stored electronic communication D) threatening to cause damage to a protected computer

C

38) Digital goods are goods that are A) produced digitally. B) sold over digital networks. C) delivered digitally. D) used with digital equipment

C

38) Unit testing A) includes all the preparations for the series of tests to be performed on the system. B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned. C) tests each program separately. D) provides the final certification that the system is ready to be used in a production setting.

C

41) In a parallel conversion strategy, the new system A) is tested by an outsourced company. B) replaces the old one at an appointed time. C) and the old are run together. D) is introduced in stages.

C

43) Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed A) compliance. B) production. C) maintenance. D) acceptance.

C

45) Which of the following businesses utilizes the content provider Internet business model? A) Amazon.com B) eBay.com C) CNN.com D) Motocross.com

C

48) The Sarbanes-Oxley Act A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

C

49) In object-oriented development A) the class is used as the basic unit of systems analysis and design. B) an object is a collection of data that is acted on by external processes. C) processing logic resides within objects. D) a strict, step-by-step development process is essential.

C

51) Object-oriented modeling is based on the concepts of A) objects and relationships. B) classes and objects. C) class and inheritance. D) objects and inheritance.

C

52) Object-oriented development could potentially reduce the time and cost of writing software because A) object-oriented programming requires less training. B) iterative prototyping is not required. C) objects are reusable. D) a single user interface object can be used for the entire application.

C

52) ________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. A) Software B) Administrative C) Data security D) Implementation

C

53) Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n) A) security policy. B) AUP. C) risk assessment. D) business impact analysis.

C

55) Predictive analytics is used for all of the following except A) anticipate customer response to price changes. B) identifying the most profitable customers. C) determining the best routes for product delivery. D) establishing consumer credit scores.

C

56) Which of the following is not an example of a BI predefined production report? A) workforce demographics B) order cycle time C) revenue forecasts D) supplier performance

C

57) An authentication token is a(n) A) device the size of a credit card that contains access permission data. B) type of smart card. C) gadget that displays passcodes. D) electronic marker attached to a digital authorization file.

C

58) Which of the following is not a trait used for identification in biometric systems? A) retinal image B) voice C) hair color D) face

C

59) Which of the following is not one of the five observed ways in which managerial behavior differs from the classical description of managers? A) Managers perform a great deal of work at an unrelenting pace. B) Managerial activities are fragmented. C) Managers prefer regular, written reports on firm activities. D) Managers prefer oral forms of communication.

C

60) The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called A) e-procurement. B) SCM. C) procurement. D) sourcing.

C

61) Which type of fourth-generation language tool contains preprogrammed modules that can be used to create entire applications? A) PC software tools B) report generators C) application generators D) application software packages

C

67) For 100% availability, online transaction processing requires A) high-capacity storage. B) a multi-tier server network. C) fault-tolerant computer systems. D) dedicated phone lines.

C

An example of raw data from a national chain of automobile stores would be A) an average of 13 Toyotas are sold daily in Kentucky. B) 30 percent increase in Toyota RAV 4 sales during September in Kentucky. C) 1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky. D) all of the above.

C) 1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky

A ________ is a senior manager who oversees the use of IT in the firm. A) CEO B) CFO C) CIO D) CTO

C) CIO

The ________ helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes. A) CTO B) CSO C) CKO D) CPO

C) CKO

_____ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. A) Software B) Administrative C) Data security D) Implementation

C) Data security

________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance. A) Management information B) Transaction processing C) Decision-support D) Knowledge management

C) Decision-support

Which supply chain planning function determines how much product is needed to satisfy all customer demands? A) Distribution management B) Replenishment planning C) Demand planning D) Order planning

C) Demand planning

Which of the following is /not/ true about enterprise systems? A) Enterprise systems help firms respond rapidly to customer requests for information or products B) Enterprise system data have standardized definitions and formats that are accepted by the entire organization C) Enterprise software is expressly built to allow companies to mimic their unique business practices. D) Enterprises software includes analytical tools to evaluate overall organizational performance

C) Enterprise software is expressly built to allow companies to mimic their unique business practices

The ________ reviews and approves plans for systems in all divisions. A) project management group B) project team C) IS steering committee D) corporate strategic planning committee

C) IS steering committee

Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's A) data management environment. B) networked environment. C) IT infrastructure. D) information system.

C) IT infrastructure

How does the technical view of organizations fall short of understanding the full impacts of information systems in a firm? A) It sees information systems as a way to rearrange the inputs and outputs of the organization. B) It sees capital and labor as primary production factors. C) It sees the inputs and outputs, labor and capital, as being infinitely malleable. D) It sees the organization as a social structure similar to a machine.

C) It sees the inputs and outputs, labor and capital, as being infinitely malleable.

Which types of systems consolidate the relevant knowledge and experience in the firm to make it available to improve business processes and management decision making? A) TPS B) extranets C) KMS D) CRM

C) KMS

The most widely used project management software today is A) Vertabase. B) IBM Project Guide. C) Microsoft Project. D) Microsoft Excel

C) Microsoft Project.

The tool that enables users to view the same data in different ways using multiple dimensions is A) predictive analysis B) SQL C) OLAP D) data mining

C) OLAP

You are consulting for a beverage distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step? A) Identify the business ecosystem the distributor is in. B) Implement a strategic transition to the new system. C) Perform a strategic systems analysis. D) Benchmark existing systems.

C) Perform a strategic systems analysis.

The most prominent data manipulation language today is A) Access B) DB2 C) SQL D) Crystal Reports

C) SQL

Which of the following does /not/ pose a security threat to wireless networks? A) broadcasted SSIDs B) scannability of radio frequency bands C) SQL injection attacks D) geographic range of wireless signals

C) SQL injection attacks

Which of the following statements about collaboration is not true? A) In business, a collaboration can last as little as a few minutes. B) Business collaboration relies on the formation of teams that are assigned a specific task or goal. C) Successful collaboration can be achieved through technology regardless of the organization's culture or structure. D) One business benefit of collaboration is improved innovation

C) Successful collaboration can be achieved through technology regardless of the organization's culture or structure.

You have been hired by a worldwide non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, sms, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? A) TPS B) TPS with DSS capabilities C) TPS with MIS capabilities D) TPS with ESS capabilities

C) TPS with MIS capabilities

Which of the following statistics from studies on failed projects is not true? A) Between 30 and 40 percent of software projects fail in terms of budget, schedule, and quality. B) Thirty-two percent of technology investments are completed on time, within budget, and with requirements met. C) The average cost overrun of IT projects is 60 percent. D) One in six IT projects have an average cost overrun of 200 percent.

C) The average cost overrun of IT projects is 60 percent.

Which of the following statements about the Internet security is /not/ true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one provides access C) VoIP is more secure than the switched voice network D) Instant messaging can provide hackers access to an otherwise secure network

C) VoIP is more secure than the switched voice network

Which of the following types of projects is most likely to fail? A) integration of a third-party automated payment system B) replacement of middleware with Web services for legacy application integration C) a business process redesign project that restructures workflow and responsibilities D) redesigning a user interface to an online investment site

C) a business process redesign project that restructures workflow and responsibilities

You are creating a database to store temperature and wind data from national airport locations. Which of the following field is the most likely candidate to use as the basis for a primary key in the airport table? A) address B) city C) airport code D) state

C) airport code

You have been hired by a pharmaceutical company to evaluate its inventory of systems and IT projects. Which types of projects would be best avoided? A) any high-risk projects B) any low-benefit projects C) all high-risk, low-benefit projects D) none, any project might be beneficial

C) all high-risk, low-benefit projects

Analytical CRM applications: A) include tools for marketing automation. B) provide consolidated data for operational CRM applications. C) are based on data warehouses consolidated from operational CRM applications. D) provide customer-facing applications.

C) are based on data warehouses consolidated from operational CRM applications

Hackers create a botnet by A) infecting Web search bots with malware B) by using Web search bots to infect other computers C) by causing other people's computers to become "zombie" PCs following a master computer D) by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door.

C) by causing other people's computers to become "zombie" Trojan horses that allow undetected access through a back door

Which of the following would not be a complementary asset for a solar panel manufacturer? A) international solar equipment certification standards B) government funding for green technology C) centralized hierarchical decision making D) innovation-driven management team

C) centralized hierarchical decision making

Which of the following would not be a complementary asset for a solar panel manufacturer? A) international solar equipment certification standards B) government funding for green technology C) centralized hierarchical decision making D) innovation-driven management team

C) centralized hierarchical decision making

In order to achieve maximum benefit from an enterprise software package a business A) Customizes the software to match all of its business processes B) uses only the processes in the software that match its own processes C) changes the way it works to match the software's business processes D) selects only the software that best matches its existing business processes

C) changes the way it works to match the software's business processes

Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective? A) improved flexibility B) improved business practices C) competitive advantage D) survival

C) competitive advantage

Selling a customer with a checking account a home improvement loan is an example of: A) operational CRM. B) direct marketing. C) cross-selling. D) cross-channel promotions.

C) cross-selling.

Detectign and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called A) data auditing B) defragmentation C) data scrubbing D) data optimization

C) data scrubbing

Which of the following occupations would not be categorized as an "interaction" job? A) sales representative B) business manager C) engineer D) operations manager

C) engineer

A schematic for the entire database that describes the relationships in a database is called a(n) A) data dictionary B) intersection relationship diagram C) entity-relationship diagram D) data definition diagram

C) entity-relationship diagram

You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. Which type of system will most efficiently provide a solution? A) CRM B) enterprise system C) extranet D) intranet

C) extranet

For 100% availability, online transaction processing requires A) high-capacity storage B) a multi-tier server network C) fault-tolerant computer systems D) dedicated phone lines

C) fault-tolerant computer syste,s

Hilton Hotels' use of customer information software to identify the most profitable customers to direct services to is an example of using information systems to A) strengthen customer intimacy. B) differentiate their service. C) focus on market niche. D) increase efficiency.

C) focus on market niche.

Which type of tool helps project managers identify bottlenecks in project development? A) internal integration tools B) external integration tools C) formal planning and control tools D) both B and C

C) formal planning and control tools

An authentication token is a(n) A) device the size of a credit card that contains access permission data B) type of smart card C) gadget that displays passcodes D) electronic marker attached to digital authorization file

C) gadget that displays passcodes

Which of the following is not a trait used for identification in biometric systems? A) retinal image B) voice C) hair color D) face

C) hair color

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that A) are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error B) are not secure because the technology to secure them did not exist at the time the files were created C) have the potential to be accessed by large numbers of people and groups outside of the organization D) are frequently available on the Internet

C) have the potential to be accessed by large numbers of people and groups outside of the organization

Marketing modules in CRM systems would provide tools for: A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information.

C) identifying profitable and unprofitable customers.

You work for a retail chain whose primary outlets are in shopping mall and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software that is capable of. A) identifying associations B) identifying clusters C) identifying sequences D) classification

C) identifying sequences

Which of the following is /not/ an example of a computer used as a target of crime? A) knowingly accessing a protected computer to commit fraud B) accessing a computer system without authority C) illegally accessing stored electronic communication D) threatening to cause damage to a protected computer

C) illegally accessing stored electronic communication

The organizational activities working toward the adoption, management, and routinization of a new information system are called A) production. B) maintenance. C) implementation. D) acceptance

C) implementation.

The Sarabanes-Oxley Act A) requires financial institutions to ensure the security of customer data B) specifies best practices in information systems security and control C) imposes responsibility on companies and management to safeguard the accuracy of financial information D) outlines medical security and privacy rules

C) imposes responsibility on companies and management to safeguard the accuracy of financial information

Which of the following is not a tangible benefit of information systems? A) reduced rate of growth in expenses B) lower computer expenses C) improved resource control D) increased productivity

C) improved resource control

Overproduction or underproduction of goods and services, misallocation of resources, and poor response times are the results of a firm's having A) poor relationships with suppliers. B) poor relationships with customers. C) inadequate information. D) a surplus of information.

C) inadequate information.

A road map indicating the direction of systems development, the rationale, the current systems, new developments to consider, the management strategy, the implementation plan, and the budget is called a(n) A) project plan. B) portfolio analysis. C) information systems plan. D) enterprise analysis.

C) information systems plan.

ROPMs value information systems similar to stock options, in that A) ROPMs can be bought and sold like stocks. B) a company's worth can be evaluated by the worth of their ROPMs. C) initial expenditures on IT projects are seen as creating the right to pursue and obtain benefits from the system at a later date. D) expenditures and benefits from IT projects are seen as inflows and outflows of cash that can be treated themselves like options.

C) initial expenditures on IT projects are seen as creating the right to pursue and obtain benefits from the system at a later date.

The three activities in an information system that produce the information organizations use to control operations are A) information retrieval, research, and analysis. B) input, output, and feedback. C) input, processing, and output. D) data analysis, processing, and feedback.

C) input, processing, and output

Engineers, scientists, or architects, who design new products or services for a firm, belong to which level of a business hierarchy? A) middle management B) production workers C) knowledge workers D) data workers

C) knowledge workers

Engineers, scientists, or architects, who design new products or services for a firm, belong to which level of a business hierarchy? A) middle management B) production workers C) knowledge workers D) data workers

C) knowledge workers

The Internet raises the bargaining power of customers by A) creating new opportunities for building loyal customer bases. B) making more products available. C) making information available to everyone. D) lowering transaction costs.

C) making information available to everyone.

The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called A) information systems literacy. B) information systems architecture. C) management information systems. D) information technology infrastructure.

C) management information systems

The average number of tickets sold daily online is an example of A) input. B) raw data. C) meaningful information. D) feedback.

C) meaningful information

Which of the following business objectives best describes the strategy behind the use of technology in the new Yankee Stadium? A) competitive advantage B) improved decision making C) new products and services D) survival

C) new products and services

In terms of data relationships, /associations/ refers to A) events linked over time B) patterns that describe a group to which an item belongs C) occurrences linked to a single event D) undiscovered groupings

C) occurrences linked to a single event

The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is A) management science. B) MIS. C) operations research. D) utilization management.

C) operations research.

The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is A) management science. B) MIS. C) operations research. D) utilization management

C) operations research.

Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain ________ systems. A) demand B) delivery C) planning D) execution

C) planning

Which method would you use to develop risk profiles for a firm's information system projects and assets? A) information systems plan B) scoring model C) portfolio analysis D) TCO

C) portfolio analysis

Supply chain complexity and scale increase when firms A) move to globalization B) manage the procurement, manufacturing, and distribution functions themselves C) produce products and services that coordinate with hundreds or more firms and suppliers D) Modify their existing workflows to comply with supply-chain management systems

C) produce products and services that coordinate with hundreds or more firms and suppliers

Which of the following roles in a firm would be least affected by using mobile devices to access firm information systems? A) senior executives B) sales executives C) production workers D) operational managers

C) production workers

Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and services depend on the expertise and knowledge of professionals as a(n) A) entrepreneurial structure. B) divisionalized bureaucracy. C) professional bureaucracy. D) adhocracy.

C) professional bureaucracy.

The type of logical database model that treats data as if they were stored in two-dimensional tables is the A) OODBMS B) pre-digital DBMS C) relational DBMS D) hierarchical DBMS

C) relational DBMS

Which of the following industries has a low barrier to entry? A) automotive B) computer chip C) restaurant D) airline

C) restaurant

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n) A) security policy B) AUP C) risk assessment D) business impact analysis

C) risk assessment

Business processes are collections of A) informal practices and behaviors. B) formalized and documented practices. C) routines. D) rights and privileges.

C) routines

Operational CRM applications include tools for: A) identifying buying patterns. B) calculating CLTV. C) salesforce automation. D) pinpointing unprofitable customers.

C) salesforce automation

Network economics A) applies the law of diminishing returns to communities of users. B) applies traditional economics to networked users. C) sees the cost of adding new members as inconsequential. D) balances the high cost of adding new members to a community against the lower cost of using network infrastructure.

C) sees the cost of adding new members as inconsequential.

In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and where B) select, join, and where C) select, project, and join D) select, from, and join

C) select, project, and join

A corporation that funds a political action committee, which in turn promotes and funds a political candidate who agrees with the values of that corporation, could be seen as investing in which main category of complementary assets? A) managerial B) governmental C) social D) organizational

C) social

A corporation that funds a political action committee, which in turn promotes and funds a political candidate who agrees with the values of that corporation, could be seen as investing in which main category of complementary assets? A) managerial B) governmental C) social D) organizational

C) social

Data management technology consists of the A) physical hardware and media used by an organization for storing data. B) detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. C) software governing the organization of data on physical storage media. D) hardware and software used to transfer data.

C) software governing the organization of data on physical storage media

Data management technology consists of the A) physical hardware and media used by an organization for storing data. B) detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. C) software governing the organization of data on physical storage media. D) hardware and software used to transfer data.

C) software governing the organization of data on physical storage media.

Which of the following is not an example of next-generation enterprise applications? A) open-source solutions B) on-demand solutions C) solutions incorporating SCM D) solutions incorporating SOA

C) solutions incorporating SCM

To what competitive force did the printed encyclopedia industry succumb? A) positioning and rivalry among competitors B) low cost of entry C) substitute products or services D) customer's bargaining power

C) substitute products or services

A firm that must invest in new information systems capabilities in order to comply with federal legislation can be said to be investing to achieve which business objective? A) customer intimacy B) operational excellence C) survival D) improved reporting

C) survival

The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information systems to achieve which business objective? A) improved efficiency B) customer and supplier intimacy C) survival D) competitive advantage

C) survival

If two organizations pool markets and expertise that result in lower costs and generate profits it is often referred to as creating A) a value web. B) a value chain. C) synergies. D) core competencies.

C) synergies

The principal liaison between the information systems groups and the rest of the organization is a(n) A) programmer. B) information systems manager. C) systems analyst. D) CTO.

C) systems analyst.

The costs for firms operating on a global scale have been drastically reduced by A) networking technology. B) investments in organizational complementary assets. C) the Internet. D) the rise of digital content.

C) the Internet.

At the top of the management structure for information systems projects in a large company is A) project management. B) the CIO. C) the corporate strategic planning group. D) the board of directors

C) the corporate strategic planning group.

A managerial element in the UPS tracking system described in the chapter is A) taking inventory. B) providing package status reports to customers. C) the decision to use automation. D) in-house package tracking software.

C) the decision to use automation

The project risk will rise if the project team and the IS staff lack A) legacy applications as a starting point. B) good equipment. C) the required technical expertise. D) financial studies and plans.

C) the required technical expertise.

To monitor the status of internal operations and the firm's relations with the external environment, managers need ________ systems. A) decision-support B) knowledge C) transaction processing D) management information

C) transaction processing

A company's suppliers and the processes for managing relationships with them is the A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain.

C) upstream portion of the supply chain.

The three activities in an information system that produce the information organizations use to control operations are A) information retrieval, research, and analysis. B) input, output, and feedback. C) input, processing, and output. D) data analysis, processing, and feedback.

C.) Input, processing, and output

The _____________ helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes

CKO

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?

CLTV

in the united states, the claim to privacy primarily by each of the following except

COPPA

The culture of UPS places service to the customer among the company's highest business objectives, which is reflected in their use of information systems to enable customer tracking of their packages. Based on your reading of Chapter 1, why is "culture" an important factor to consider when building information system solutions to business problems?

Culture affects how information system solutions are implemented and used

) Which of the following is not an example of a computer used as an instrument of crime? A) theft of trade secrets B) intentionally attempting to intercept electronic communication C) unauthorized copying of software D) breaching the confidentiality of protected computerized data

D

22) In automation A) business processes are simplified. B) business processes are reorganized to cut waste and eliminate repetitive, paper-intensive tasks. C) standard operating procedures are streamlined to remove bottlenecks. D) employees are enabled to perform their tasks more efficiently.

D

22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards. A) "Legacy systems" B) "SSID standards" C) "Vulnerabilities" D) "Controls"

D

26) The idea that the achievement of quality control is an end in itself describes a main concept of A) BPM. B) BPR. C) six sigma. D) TQM.

D

27) The decisions involved in creating and producing a corporate intranet can be classified as ________ decisions. A) procedural B) unstructured C) structured D) semistructured

D

29) The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology? A) ubiquity B) personalization/customization C) richness D) interactivity

D

30) What is the greatest barrier to successful business process change? A) ineffective project management B) usability of implemented solution C) selecting the correct process to change D) organizational change

D

34) Selling the same goods to different targeted groups at different prices is called A) cost customization. B) cost optimization. C) price gouging. D) price discrimination.

D

35) Transferring data from a legacy system to the new system would be defined by which category of system design specifications? A) input B) database C) manual procedures D) conversion

D

37) The entire system-building effort is driven by A) organizational change. B) feasibility studies. C) the information value chain. D) user information requirements.

D

38) Which of the following managerial roles is not supported by information systems? A) liaison B) nerve center C) leader D) negotiator

D

39) As discussed in the chapter text, the three main reasons that investments in information technology do not always produce positive results are A) management support, technical logistics, and user compliance. B) organization, environment, culture. C) information quality, information integrity, and information accuracy. D) information quality, organizational culture, and management filters.

D

41) Evil twins are A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to users.

D

43) Selling products and services directly to individual consumers via the Internet best describes A) B2B e-commerce. B) C2C e-commerce. C) M-commerce. D) B2C e-commerce.

D

44) Which of the following is a disadvantage of high-velocity, automated decision-making systems? A) inability to handle high volumes of decisions B) inability to handle structured decisions C) inability to handled semi-structured decisions D) inability to control themselves and respond to new environments

D

45) The primary tool for representing a system's component processes and the flow of data between them is the A) data dictionary. B) process specifications diagram. C) user documentation. D) data flow diagram.

D

46) The HIPAA Act A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

D

47) Business intelligence would be useful for analyzing and decision making in which of the following situations? A) deciding what marketing techniques are most successful with high-value customers B) identifying the most efficient methods for packing and delivering finished products to destinations C) forecasting the effect on sales given projected future variations in weather and other environmental variables D) all of the above

D

49) The most common type of electronic evidence is A) voice-mail. B) spreadsheets. C) instant messages. D) e-mail.

D

50) Which of the following best illustrates the sales revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase. C) Flickr provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads.

D

53) CASE tools automate A) documentation. B) code generation. C) creating data dictionaries. D) all of the above.

D

55) In the traditional systems development lifecycle, end users A) are important and ongoing members of the team from the original analysis phase through maintenance. B) are important only in the testing phases. C) have no input. D) are limited to providing information requirements and reviewing the technical staff's work.

D

58) You are an IT project manager for an advertising firm. The firm wishes to create an online tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements during the course of development. What development method would be most successful for this project? A) RAD B) JAD C) end-user development D) prototyping

D

61) An extranet that links a large firm to its suppliers and other key business partners is called a(n) A) e-hub. B) marketspace. C) exchange. D) private industrial network

D

62) Currently, the protocols used for secure information transfer over the Internet are A) TCP/IP and SSL. B) S-HTTP and CA. C) HTTP and TCP/IP. D) SSL, TLS, and S-HTTP.

D

63) Most antivirus software is effective against A) only those viruses active on the Internet and through e-mail. B) any virus. C) any virus except those in wireless communications applications. D) only those viruses already known when the software is written.

D

63) When systems are created rapidly, without a formal development methodology A) end users can take over the work of IT specialists. B) the organization quickly outgrows the new system. C) hardware, software, and quality standards are less important. D) testing and documentation may be inadequate

D

63) Which of the following types of systems would be used to present senior marketing executives with in-depth information about customer retention, satisfaction, and quality performance? A) CDSS B) MIS C) DSS D) ESS

D

64) Which of the following is not a top priority in mobile application development? A) designing for multitouch B) saving resources C) limiting the use of keyboards D) designing for keyboard data entry

D

65) The management methodology of using a firm's strategy to generate operational targets for the business and measuring progress towards them using the firm's enterprise systems is called A) benchmarks. B) KPIs. C) the balanced scorecard method. D) BPM.

D

66) Which of the following statements about m-commerce is not true? A) In 2012, m-commerce represented less than 10 percent of all e-commerce. B) M-commerce is the fastest growing form of e-commerce. C) M-commerce annual revenues are approximately $30 billion. D) In 2012, the top-grossing category of m-commerce was e-book sales.

D

67) A well-designed ESS will allow management to A) have greater span of control. B) assign lower levels of management greater control. C) reduce their need to review lower levels of operation. D) all of the above.

D

68) GDSS A) are designed to allow meeting attendees to share their thoughts in real-time with their peers. B) support decisions that require knowledge about the geographic distribution of resources. C) are typically used with geographically dispersed attendees. D) implement structured methods for organizing and evaluating ideas.

D

68) You are planning the requirements for a site tracking and reporting system for your company Web site. Which of the following information requirements would not be essential for this function? A) number of unique visitors B) pages visited C) products purchased D) secure credit card clearing

D

69) An essential component in the ability of GDSS to contribute to a collaborative environment is A) allowing users to contribute simultaneously. B) using structured methods for evaluating ideas. C) identifying users informally. D) the guarantee of user anonymity.

D

_____ refers to all of the methods, policies ,and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards. A) "Legacy systems" B) "SSID standards" C) "Vulnerabilities" D) "Controls"

D) "Controls"

According to agency theory, the firm is viewed as a(n) A) unified, profit-maximizing entity. B) task force organization that must respond to rapidly changing environments. C) entrepreneurial endeavor. D) "nexus of contracts" among self-interested individuals.

D) "nexus of contracts" among self-interested individuals.

An example of a business using information systems to create new products and services is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod.

D) Apple Inc.'s iPod

An example of a business using information systems to create new products and services is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod.

D) Apple Inc.'s iPod.

You are planning the launch of your new company, an application service provider that provides an online timesheet and project tracking application. To best communicate with and manage your relationship with your users, you would want to implement a(n) A) extranet. B) intranet. C) KMS. D) CMS.

D) CMS.

Microsoft SQL Server is a(n) A) DBMS for small handheld computing devices. B) Internet DBMS. B) Desktop relational DBMS. D) DBMS for midrange computers.

D) DBMS for midrange computers.

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system? A) MIS B) TPS C) ESS D) DSS

D) DSS

Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records? A) ESS B) TPS C) MIS D) DSS

D) DSS

________ are designed to support organization-wide process coordination and integration. A) Decision-support systems B) Management information systems C) CRM systems D) Enterprise applications

D) Enterprise applications

Organizational culture is best described by which of the following statements? A) It encompasses the sum of beliefs and assumptions by all members. B) It enables the organization to transcend the different levels and specialties of its employees. C) It reflects the senior management's perspective on the organization and goals. D) It is a set of assumptions and values accepted by most members.

D) It is a set of assumptions and values accepted by most members.

DBMS for midrange computers include all of the following EXCEPT A) DB2. B) Oracle. C) Microsoft SQL Server. D) Microsoft Access.

D) Microsoft Access.

From your reading of the Southwest Airlines, the company implemented a new inventory management system to achieve which of the following six business objectives? A) Customer and supplier intimacy B) new products, services and business models C) survival D) Operational excellence

D) Operational excellence

________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners. A) SCM B) SFA C) ERM D) PRM

D) PRM

Currently, the protocols used for secure information transfer over the Internet are A) TCP/IP and SSL B) S-HTTP and CA C) HTTP and TCP/IP D) SSL, TLS, AND S-HTTP

D) SSL, TLS, and S-HTTP

________ integrate(s) multiple applications from multiple business functions, business units, or business partners to deliver a seamless experience for the customer, employee, manager, or business partner and provide a greater degree of cross-functional integration than the traditional enterprise applications. A) PRM software B) SFA software C) ERP suites D) Service platforms

D) Service platforms

All of the following are major features of organizations that impact the use of information systems EXCEPT for A) business processes. B) environments. C) goals. D) agency costs.

D) agency costs.

Which of the following are environmental actors that interact with an organization and its information systems? A) customers B) suppliers C) regulatory agencies D) all of the above

D) all of the above

In using a portfolio analysis to determine which IT projects to pursue, you would A) select the most low-risk projects from the inventory. B) limit work to those projects with great rewards. C) select only low-risk, high-reward projects. D) balance high-risk, high reward projects with lower-risk projects.

D) balance high-risk, high reward projects with lower-risk projects.

The most successful solutions or methods for achieving a business objective are called A) value activities. B) best processes. C) core competencies. D) best practices.

D) best practices.

Evil twins are A) Trojan horses that appears to the user to be a legitamate commercial software application B) e-mail messages that mimic the e-mail messages of a legitimate business C) fraudulent Web sites that mimic a legitimate business's Web site D) bogus wireless network access points that look legitimate to users

D) bogus wireless network access points that look legitimate to users

Which of the following is /not/ an example of a computer used as an instrument of crime? A) theft of trade secrets B) intentionally attempting to intercept electronic communication C) unauthorized copying of software D) breaching the confidentiality of protected computerized data

D) breaching the confidentiality of protected computerized data

You work for an national car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use data mining software that is capable of A) identifying associations B) identifying clusters C) identifying sequences D) classification

D) classification

External integration tools A) enable a project to have sufficient technical support for project management and development. B) enable a project manager to properly document and monitor project plans. C) portray a project as a network diagram with numbered nodes representing project tasks. D) consist of ways to link the work of the implementation team with users at all organization levels.

D) consist of ways to link the work of the implementation team with users at all organization levels.

The /select/ operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset of consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria.

D) creates a subset consisting of all records in the file that meet stated criteria.

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) data normalization B) data accuracy C) data redundancy D) data inconsistency

D) data inconsistency

A company's organizations and processes for distributing and delivering products to the final customers is the A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain.

D) downstream portion of the supply chain

The most common type of electronic evidence is A) voice mail B) spread sheets C) instant messages D) e-mail

D) e-mail

All of the following are indications of a failed information systems project except A) employees are refusing to switch to the new system. B) employees have created a spreadsheet solution to manipulate the data generated by the system. C) a redesigned Web site has fewer visits to the customer support pages. D) employees require training to properly use the system.

D) employees require training to properly use the system.

An information system can enhance core competencies by A) providing better reporting facilities. B) creating educational opportunities for management. C) allowing operational employees to interact with management. D) encouraging the sharing of knowledge across business units.

D) encouraging the sharing of knowledge across business units.

Data cleansing not only corrects errors but also A) establishes logical relationships between data B) structures data C) normalizes data D) enforces consistency among different sets of data

D) enforces consistency among different sets of data

The four major enterprise applications are A) SCMs, CRMs, DSSs, and KMSs. B) SCMs, CRMs, ESSs, and KMSs. C) enterprise systems, SCMs, DSSs, and CRMs. D) enterprise systems, SCMs, CRMs, and KMSs.

D) enterprise systems, SCMs, CRMs, and KMSs.

Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner. A) demand B) delivery C) planning D) execution

D) execution

The value chain model A) categorizes five related advantages for adding value to a firm's products or services. B) sees the supply chain as the primary activity for adding value. C) categorizes four basic strategies a firm can use to enhance its value chain. D) helps a firm identify points at which information technology can most effectively enhance its competitive position.

D) helps a firm identify points at which information technology can most effectively enhance its competitive position.

An example of using an internal integration tool would be to A) define task dependencies. B) include user representatives as active members of the project team. C) create a PERT chart. D) hold frequent project team meetings.

D) hold frequent project team meetings.

All of the following are direct business benefits of collaboration except for A) improved quality. B) improved financial performance. C) improved customer service. D) improved compliance with government regulations

D) improved compliance with government regulations

Which of the following is a limitation of using a financial approach to evaluate information systems? A) inability to measure ROI B) inability to control vendor costs C) inability to assess risk D) inability to assess costs from organizational disruption

D) inability to assess costs from organizational disruption

The business value of an effective supply chain management system includes all of the following except: A) faster time to market. B) cost reduction. C) supply matched to demand. D) increased inventory levels.

D) increased inventory levels.

An information system can enable a company to focus on a market niche through A) complex trend forecasting. B) tailoring products to the client. C) intensive product trend analysis. D) intensive customer data analysis.

D) intensive customer data analysis.

Which field of study focuses on both a behavioral and technical understanding of information systems? A) sociology B) operations research C) economics D) management information systems

D) management information systems

Which field of study focuses on both a behavioral and technical understanding of information systems? A) sociology B) operations research C) economics D) management information systems

D) management information systems

A relocation control system that reports summaries on the total moving, house hunting, and home financing costs for employees in all company divisions would fall into the category of A) knowledge management systems. B) transaction processing systems. C) executive support systems. D) management information systems.

D) management information systems.

Which of the following roles falls into the duties of an information systems manager? A) writing software instructions for computers B) acting as liaison between the information systems group and the rest of the organization C) translating business problems into information requirements D) managing data entry staff

D) managing data entry staff

SFA modules in CRM systems would provide tools for: A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information.

D) managing sales prospect and contact information.

The term "management information systems" designates a specific category of information systems serving A) integrated data processing throughout the firm. B) transaction process reporting. C) employees with online access to historical records. D) middle management functions.

D) middle management functions.

A DBMS reduces data redundancy and inconsistency by A) enforcing referential integrity B) uncoupling program and data C) utilizing a data dictionary D) minimizing isolated files with repeated data

D) minimizing isolated files with repeated data

The hardware and software used to transfer data in an organization is called A) data management technology. B) networking and data management technology. C) data and telecommunications technology. D) networking and telecommunications technology.

D) networking and telecommunications technology

A manufacturer of deep-sea oil rigs may be least concerned about this marketplace force. A) product differentiation B) traditional competitors C) low number of suppliers D) new market entrants

D) new market entrants

The type of database management approach that can handle multimedia is the A) hierarchical DBMS B) relational DBMS C) network DBMS D) object-oriented DBMS

D) object-oriented DBMS

Most antivirus software is effective against A) only those viruses active on the Internet and through e-mail B) any virus C) any virus except those in wireless communications applications D) only those viruses already known when the software is written

D) only those viruses already known when the software is written

In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is A) middle management. B) service workers. C) production management. D) operational management.

D) operational management

In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is A) middle management. B) service workers. C) production management. D) operational management.

D) operational management.

You have been hired to implement an enterprise system that will automate much of the billing and accounting work for a statewide HVAC services company. Which of the following would you prepare to describe how the new system will affect a firm's structure and operations? A) information systems plan B) internal integration report C) sociotechnical design report D) organizational impact analysis

D) organizational impact analysis

Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems. A) push; pull B) demand; continual C) upstream; downstream D) planning; execution

D) planning; execution

The logical view A) shows how data are organized and structured on the storage media. B) presents an entry screen to the user. C) allows the creation of supplementary reports. D) presents data as they would be perceived by end users.

D) presents data as they would be perceived by end users.

As discussed in the chapter opening case, which of the four generic strategies did Verizon employ to combat the competition offered by AT&T? A) low-cost leadership B) focus on market niche C) customer and supplier intimacy D) product differentiation

D) product differentiation

All of the following are intangible benefits of information systems except A) improved asset utilization. B) increased organizational learning. C) improved operations. D) reduced workforce

D) reduced workforce

Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix? A) synchronous/colocated B) same time/remote C) different time/remote D) remote/colocated

D) remote/colocated

The worth of systems from a financial perspective essentially revolves around the issue of A) total cost of ownership. B) adherence to information requirements. C) asset utilization. D) return on invested capital

D) return on invested capital

In working with ROPMs and options valuation, a call option is a(n) A) obligation to purchase an asset at a later date at a fixed price. B) obligation to either purchase or sell an asset at a later date at a strike price. C) right to purchase an asset at a later date at a strike price. D) right to purchase or sell an asset at a later date at a fixed price.

D) right to purchase or sell an asset at a later date at a fixed price.

Identifying customers is a responsibility of the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing

D) sales and marketing

Which of the following is not one of the main firewall screening techniques? A) application proxy filtering B) static packet filtering C) NAT D) secure socket filtering

D) secure socket filtering

ESS are specifically designed to serve which level of the organization? A) operational B) end-user C) middle management D) senior management

D) senior management

According to Leavitt's model of organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are A) environment, organization, structure, tasks. B) technology, people, culture, and structure. C) organization, culture, management, and environment D) tasks, technology, people, and structure.

D) tasks, technology, people, and structure.

Which of the following is one of the support activities in a firm's value chain? A) inbound logistics B) operations C) sales and marketing D) technology

D) technology

Which of the following is not one of the reasons for the increased business focus on collaboration and teamwork? A) the need for creating innovative products and services B) growth of "interaction" jobs C) greater global presence D) the need for more efficient work hierarchies

D) the need for more efficient work hierarchies

Output A) is feedback that has been processed to create meaningful information. B) is information that is returned to appropriate members of the organization to help them evaluate the input stage. C) transfers data to the people who will use it or to the activities for which it will be used. D) transfers processed information to the people who will use it or to the activities for which it will be used.

D) transfers processed information to the people who will use it or to the activities for which it will be used

Output A) is feedback that has been processed to create meaningful information. B) is information that is returned to appropriate members of the organization to help them evaluate the input stage. C) transfers data to the people who will use it or to the activities for which it will be used. D) transfers processed information to the people who will use it or to the activities for which it will be used.

D) transfers processed information to the people who will use it or to the activities for which it will be used.

Which of the following is not one of the techniques used in Web mining? A) content mining B) structure mining C) usage mining D) user mining

D) user mining

Which of the following choices may lead to competitive advantage: 1. new products, services, and business models; 2. charging less for superior products; 3. responding to customers in real time? A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3

D.) 1,2, and 3

Which of the following objectives best describes the business strategy behind the technologies implemented in Disney's Operational Command Center, as discussed in the chapter case? A) operational excellence B) new products and services C) competitive advantage D) customer support

D.) Customer support

Microsoft SQL Server is a(n)

DBMS for midrange computers

Microsoft SQL server is a(n)

DBMS for midrange computers

Oracle Database Lite is a(n)

DBMS for small handheld computing devices.

What service converts IP addresses into more recognizable alphanumeric names?

DNS

Which type of information system supports decision-making by enabling users to extract useful information that was previously buried in large quantities of data? GSS. ESS. TPS. DSS.

DSS

An organization is a A) stable, formal social structure that takes resources from the environment and processes them to produce outputs. B) formal, legal entity with internal rules and procedures that must abide by laws. C) collection of social elements. D) B and C E) A, B, and C

E) A, B, and C

Based on the examples in the chapter, if you were asked to formulate a plan for a regional drive-in restaurant chain's efforts to use information technology to develop a loyal customer base, what would be the best use of information technology from the list below? A) Use IT to increase supplier loyalty. B) Use IT to increase operational efficiency. C) Use IT to create new products and business models. D) Use IT to help survive government reporting requirements. E) Use IT to achieve customer intimacy.

E) Use IT to achieve customer intimacy.

________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation.

ERM

________ software deals with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training.

ERM

________ are representatives of departments outside of the information systems group for whom applications are developed.

End users

________ applications span the entire firm, integrating information from multiple functions and business processes to enhance the performance of the organization as a whole.

Enterprise

Which of the following statements about enterprise applications is not true?

Enterprise applications are best implemented when few changes in business processes are required.

Which of the following is not true about enterprise systems?

Enterprise software is expressly built to allow companies to mimic their unique business practices.

________ is the interaction of people and machines in the work environment, including the design of jobs, health issues, and the end-user interface of information systems.

Ergonomics

Which of the following would NOT be considered part of the implementation phase of problem solving?

Evaluating a selection of software packages for implementing a new business process

Which of the following tools would you use to control risk factors in an information systems project? A) internal integration tools B) external integration tools C) formal planning tools and formal control tools D) A and B E) A and C F) all of the above

F) all of the above

You are using a capital budgeting method to assess the worth of your company's new information system. Which of the following costs would you include in measuring the cash outflow? A) increased sales of products B) hardware and software expenditures C) labor expenditures D) reduced costs in production and operation E) both A and D F) both B and C G) A, B, C and D

F) both B and C

10) Objects are grouped into hierarchies, and hierarchies into classes.

FALSE

11) DSS are a special category of GIS.

FALSE

11) In a walkthrough, hackers are able to bypass security controls of a system with little opposition.

FALSE

13) An acceptable use policy defines the acceptable level of access to information assets for different users.

FALSE

15) DSS primarily address structured problems.

FALSE

15) Packet filtering catches most types of network attacks.

FALSE

18) The three main platforms for mobile apps are iPhone/iPad, iOS, and Android.

FALSE

2) Rationalization of procedures describes a radical rethinking of the business models.

FALSE

20) During a GDSS meeting, the attendees control the use of GDSS tools.

FALSE

8) The implementation phase of Simon's decision-making model includes choosing among solution alternatives.

FALSE

9) The first stage in Simon's decision-making process model is the design stage.

FALSE

A Gantt chart graphically depicts project tasks and their interrelationships.

FALSE

A data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database.

FALSE

A data warehouse is typically comprised of several smaller data marts.

FALSE

A hub is a networking device that connects network components and is used to filter forward data to specified destinations on the network.

FALSE

A network requires at least three computers and a shared resource

FALSE

An example of the service provider business model is Netflix, an online video store and streaming media outlet.

FALSE

As described in the opening case of the chapter, Disney is implementing new information systems in order to create new products, games, and rides

FALSE

Because neural network applications cannot always explain why they arrive at a particular solution, they are not well suited for use in the medical profession

FALSE

Business processes are logically related tasks for accomplishing tasks that have been formally encoded by an organization

FALSE

Business processes are those logically related tasks for accomplishing tasks that have been formally encoded by an organization

FALSE

Central large mainframe computing has largely replaced client/server computing.

FALSE

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.

FALSE

E-commerce refers to the use of any networking technologies to transact business.

FALSE

EDI standards that take advantage of network communications have yet to be fully implemented at the industry level.

FALSE

ESSs are designed primarily to solve specific problems

FALSE

Enrolling employees in benefits plans is a business process handled by the finance and accounting function

FALSE

Enterprise content management systems are designed to manage structured information, while other systems, such as KWS, are designed to manage semi-structured and unstructured information

FALSE

Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the hardware and software needed

FALSE

Information technology consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software & business processes needed

FALSE

Intranets are private corporate networks extended to authorized users outside the organization

FALSE

Knowledge is universally applicable and easily moved

FALSE

Knowledge residing in the minds of employees that has not been documented is called explicit knowledge

FALSE

Knowledge workers assist with paperwork at all levels of the firm

FALSE

Most MISs use sophisticated mathematical models or statistical techniques.

FALSE

Packet filtering catches most types of network attacks.

FALSE

The goal of sociotechnical design is to create systems with better user interfaces and contribute to fewer health issues

FALSE

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.

FALSE

Whereas marketing and financial careers have been transformed by the growth in information systems, management has-so far-remained relatively unaffected

FALSE

Wi-Fi enables users to freely roam from one hotspot to another even if the next hotspot is using different Wi-Fi network services.

FALSE

nternet advertising is growing at a rate of more than 30 percent a year

FALSE

1) Improving the quality of high-value decision making by an executive will save an organization far more money than improving the quality of lesser-value decisions made at a lower level.

False

10) Amazon's recommender system is an example of the network notification feature of social e-commerce.

False

13) The oldest method for building information systems is prototyping.

False

2) Consumer e-commerce is still growing at approximately 25% annually.

False

6) Disintermediation provides major benefits to the distributor.

False

A data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database.

False

A fully digital firm produces only digital goods or services

False

A grouping of characters into a word, a group of words, or a complete number is called a record.

False

A hotel reservation system is a typical example of a management information system.

False

A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network.

False

An NOS must reside on a dedicated server computer in order to manage a network.

False

Because HTML was designed as a cross-platform language, it is the preferred method of communicating with back-end databases.

False

Central large mainframe computing has largely replaced client/server computing

False

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching

False

Dell Inc. is an example of a push-based model.

False

Enrolling employees in benefits plans is a business process handled by the finance and accounting function.

False

Enterprise systems are designed primarily to allow communication between an organization and outside partners and suppliers.

False

Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers.

False

Enterprise systems are typically built around one or two major business workflows.

False

Most MISs use sophisticated mathematical models or statistical techniques.

False

OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases.

False

Over 80% of U.S. Internet users access the Internet via mobile devices.

False

RFID technology is being gradually replaced by less costly technologies such as WSNs.

False

Safety stock acts as an inefficiencies buffer for the lack of flexibility in the supply chain

False

Safety stock acts as an inexpensive buffer for the lack of flexibility in the supply chain.

False

Studies have consistently shown that firms that invest greater amounts in information technology receive greater benefits than firms that invest less

False

Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product

False

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes

False

The upstream portion of the supply chain consists of the organization and processes for distributing and delivering products to the final suppliers

False

The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.

False

There are four major business functions: sales and marketing; manufacturing and production; finance and accounting; and information technology

False

You would use an MIS to help decide whether to introduce a new product line

False

You would use an MIS to help decide whether to introduce a new product line.

False

a data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database

False

a primary example of centralized processing is client/server computing

False

a transparent marketplace means there is higher product differentiation

False

advances in data storage have made routine violation of individual privacy more difficult

False

any unsolicited e-mail is legally considered spam

False

autonomic computing is implemented primarily with enterprise or ISP servers

False

in an efficient customer response system, digital answering systems are used to monitor and respond to customer inquiries

False

knowledge workers assist with paperwork at all levels of the firm

False

over 80% of U.S. internet users access the internet via mobile devices

False

the disadvantage of using a web interface for a database is that it typically requires substantial changes to the internal database

False

A fully digital firm produces only digital goods or services.

False, an example is eBAY

There are four major business functions: Sales and marketing; manufacturing and production; finance and accounting; and information technology.

False, instead of information technology the fourth function is human resources.

Intranets allow firms to work easily with third-party suppliers and vendors.

False, intranet is only applied within the business.

________ is output returned to appropriate members of the organization to help them evaluate or correct the input stage

Feedback

uriah p stephens

Founded the Knights of Labor organization. It began as a clandestine organization.

Assume you work for a package delivery service in a major metropolitan area and that the business has been losing customers for several years. You have been asked to find a solution to this problem, perhaps one which uses modern information technologies. What is the correct way to proceed?

Identify the problem, design alternative solutions, choose the best solution, and then implement the solution

________ is data that has been shaped into a form that is meaningful to human beings.

Information

Which of the following would not be considered a contact point?

Intranet

Which type of network is used to connect digital devices within a half-mile or 500-meter radius?

LAN

A network that spans a city, and sometimes its major suburbs as well, is called a

MAN.

________ refers to the application of knowledge, skills, tools and techniques to achieve specific targets within specified budget and time constraints.

Project Mangement

which of the following statements about RFID is not true

RFIDs require line-of-sight contact to be read

Which of the following statements about RFID is not true?

RFIDs require line-of-sight contact to be read.

what technology allows people to have content pulled from Web sites and fed automatically to their computers

RSS

haymarket square riot

Radicals (mostly anarchists and communists) in a peaceful rally in support of workers striking at Haymarket square. An unknown person threw a dynamite bomb at the crowd resulting in a brutal event. Setback for the union movement

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?

Select the functions of the system you wish to use.

________ makes long-range strategic decisions about the firm's products and services

Senior Management

Computer ________ consists of the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system.

Software

11) Object-oriented development is more incremental than traditional structured development.

TRUE

12) A geographic information system is a decision support system designed specifically to work with spatial information.

TRUE

12) CASE tools facilitate the creation of clear documentation and the coordination of team development efforts.

TRUE

12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

TRUE

13) MIS typically produce fixed, regularly scheduled reports based on data extracted and summarized from the firm's underlying transaction processing systems.

TRUE

14) Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

TRUE

14) Data visualization technologies are used to help human users see patterns and relationships in large amounts of data.

TRUE

14) Prototyping is more iterative than the conventional lifecycle.

TRUE

15) A problem with prototyping is that the systems constructed using this method may not be able to handle large quantities of data in a production environment.

TRUE

16) End-user-developed systems can be completed more rapidly than those developed through the conventional systems lifecycle.

TRUE

16) NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

TRUE

17) Backward sensitivity analysis software is used for goal seeking.

TRUE

17) Responsive Web design enables Web sites to change layouts according to the user's screen size.

TRUE

17) SSL is a protocol used to establish a secure connection between two computers.

TRUE

18) GDSS facilitate the solution of unstructured problems by a set of decision makers working together as a group in either the same location or different locations.

TRUE

2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up

TRUE

2) Unstructured decisions are novel and nonroutine, and there is no well-understood or agreed-on procedure for making them.

TRUE

3) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

TRUE

4) Mobile devices are not targeted as extensively by malware as traditional computers.

TRUE

5) A Trojan horse is a software program that appears to be benign but then does something other than expected.

TRUE

5) Structured decision making is most prevalent at lower organizational levels.

TRUE

6) Big data is commonly used to analyze and predict consumer preferences.

TRUE

6) The system is not in production until conversion is complete.

TRUE

7) The intelligence phase of decision making consists of discovering, identifying, and understanding the problems occurring in the organization.

TRUE

8) A data flow diagram offers a logical and graphical model of information flow, partitioning a system into modules that show manageable levels of detail.

TRUE

8) One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

TRUE

9) Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

TRUE

A Skype conference call using VOIP and webcams is an example of a remote, synchronous collaboration tool

TRUE

A firm that invests in efficient business processes is making an investment in organizational complementary assets.

TRUE

A protocol is a standard set of rules and procedures for the control of communications in a network.

TRUE

A substantial part of management responsibility is creative work driven by new knowledge & information

TRUE

A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.

TRUE

All previous mass media in modern history, including the printing press, used a broadcast model where content is created in a central location by experts.

TRUE

Amazon.com uses Web personalization as a major marketing tool.

TRUE

An IT infrastructure provides the platform on which the firm can build its information systems

TRUE

An example of the content provider business model is Salon.com, an online magazine.

TRUE

An information system project's scope is directly related to its business requirements.

TRUE

An information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals

TRUE

An understanding of enterprise-wide systems for customer relationship management is one of the skills relevant to careers in marketing

TRUE

As a result of new public laws, accountants are beginning to perform more technical duties, such as auditing systems and networks

TRUE

Automotive manufacturing is an example of a vertical market.

TRUE

Because of outsourcing and increased automation, the costs of system maintenance and content creation have fallen and typically make up less than a quarter of Web site budgets.

TRUE

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

TRUE

Both software metrics and software testing are techniques used to improve software quality.

TRUE

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

TRUE

Counterimplementation refers to a deliberate strategy to thwart the implementation of an information system or an innovation in an organization

TRUE

Data cleansing is the same process as data scrubbing.

TRUE

Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance.

TRUE

Decision-support systems use internal information as well as information from external sources.

TRUE

Developing a new product, fulfilling an order, & hiring a new employee are examples of business processes?

TRUE

Developing a new product, fulfilling an order, or hiring a new employee are all examples of business processes

TRUE

Each characteristic or quality describing a particular entity is called an attribute.

TRUE

Employee attitudes about their jobs, employers, or technology can have a powerful effect on their abilities to use information systems productively

TRUE

Encouraging employees to adapt to new business processes is an important factor in change management

TRUE

Enterprise systems often include transactions with customers and vendors.

TRUE

Every record in a file should contain at least one key field.

TRUE

Expert systems are typically used in business in discrete, highly structured decision-making situations

TRUE

Expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization

TRUE

Feedback is output returned to appropriate members of the organization to help them evaluate or correct the input stage

TRUE

Fiber-optic cable is more expensive and harder to install than wire media.

TRUE

Functional systems that support business processes within a single functional group, such as human resources, are being phased out in favor of cross-functional systems.

TRUE

Fuzzy logic can describe a particular phenomenon or process linguistically and then represent that description in a small number of flexible rules

TRUE

Government and private sector standards are examples of complementary social assets required to optimize returns from IT investments.

TRUE

Identifying a problem includes agreeing that a problem exists

TRUE

In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web server for delivery in the form of a Web page to the user.

TRUE

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

TRUE

In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships.

TRUE

In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks.

TRUE

In general, for digital goods, the marginal cost of producing another unit is about zero.

TRUE

In general, the cost of hardware, software, and telecommunications for building and operating a Web site has fallen by over 50 percent since 2000.

TRUE

In order to understand how a specific business firm uses information systems, you need to know something about the hierarchy and culture of the company

TRUE

Intangible benefits cannot be immediately quantified but may lead to quantifiable gains in the long run.

TRUE

One form of spoofing involves forging the return address on an e-mail so that the e-mail messages appears to come from someone other than the sender.

TRUE

Real options pricing models use the concept of options valuation borrowed from the financial industry.

TRUE

SSL is a protocol used to establish a secure connection between two computers.

TRUE

Scoring models are used most commonly to support decisions rather than as the final arbiters of system selection

TRUE

Shipping a product to a customer is an example of a business process.

TRUE

Shopping bots are a form of intelligent agent

TRUE

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

TRUE

Synchronous collaboration tools allow global firms to collaborate from different locations at the same time.

TRUE

The Domain Name System (DNS) converts IP addresses to domain names.

TRUE

The Internet shrinks information asymmetry.

TRUE

The WEP specification calls for an access point and its users to share the same 40-bit encrypted password.

TRUE

The behavioral approach to information systems leaves aside technical solutions to instead analyze the psychological, social, and economic impacts of systems.

TRUE

The dimensions of information systems are management, organizations, & information technology

TRUE

The larger the systems project, the more risk the project runs in terms of being completed on time, within budget, and according to project requirements.

TRUE

The relationship between users and information systems specialists has traditionally been a problem area for information systems implementation efforts.

TRUE

UPS's use of Web-based tools that allow customers to embed UPS functions such as tracking and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy

TRUE

UPS's use of Web-based tools that allow customers to embed UPS functions, such as tracking and cost calculations, into their own Web sites was an information systems solution used to achieve customer intimacy

TRUE

VoIP technology delivers video information in digital form using packet switching.

TRUE

Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.

TRUE

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

TRUE

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

Text mining

pony express

This was an express mail service. only existed for about 2 years, 1860-1862. It was outdated because of the invention of the telegraph.

motion picture camera

Thomas Edison's interest in this began before 1888, however, the visit of Eadweard Muybridge to the inventor's laboratory in West Orange in February of that year certainly stimulated Edison's motives to invent this

An example of a business using information systems to attain competitive advantage is:

Toyota's legendary TPS that has created superlative efficiencies and enabled Toyota to become the world's largest auto maker

/Program-Data dependence/ refers to the coupling of data stored in files and software programs that use this data such that changes in programs require changes to the data.

True

5) All previous mass media in modern history, including the printing press, use a broadcast model where content is created in a central location by experts.

True

A firm that invests in efficient business processes is making an investment in organizational complementary assets.

True

A substantial part of management responsibility is creative work driven by new knowledge and information.

True

Analytical CRM uses a customer data warehouse and tools to analyze customer data warehouse and tools to analyze customer data collected from the firm's customer touch points and from other sources.

True

CRM software can help organizations identify high-value customers for preferential treatments.

True

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

True

Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business.

True

Computers are only part of an information system.

True

Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource.

True

Data governance deals with the policies and processes for managing the integrity and security of data in a firm.

True

Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.

True

ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.

True

Each characteristic or quality describing a particular entity is called an attribute.

True

Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business

True

Enterprise systems often include transactions with customers and vendors.

True

Enterprise systems require fundamental changes in the way business operates.

True

Every record in a file should contain at least one key field.

True

Functional systems that support business processes within a single functional group, such as human resources, are being phased out in favor of cross-functional systems

True

Functional systems that support business processes within a single functional group, such as human resources, are being phased out in favor of cross-functional systems.

True

In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web server for delivery in the form of a Web page to the user.

True

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

True

In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships.

True

In order to understand how a specific business firm uses information systems, you need to know something about the hierarchy and culture of the company.

True

In the pre-Internet environment, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes

True

Information supplied by an enterprise system is structured around cross-functional business processes.

True

Major CRM application software vendors include Oracle and SAP

True

Managers need TPSs to monitor the status of internal operations and the firm's relations with the external environment.

True

NoSQL technologies are used to manage sets of data that don't require the flexibility of tables and relations.

True

OLAP is used for multidimensional data analysis.

True

Online collaboration tools eliminate the need for global firms to have synchronous collaboration.

True

Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information

True

Program-data dependence refers to the coupling of data stored in files and software programs that use this data such that changes in programs require changes to the data.

True

Shipping a product to a customer is an example of a business process

True

Supply chain inefficiencies can waste as much as 25 percent of a companies operating costs

True

Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.

True

Telephone networks are fundamentally different from computer networks.

True

The dimensions of information systems are management, organizations, and information technology.

True

To minimize the expense of implementing an enterprise system, businesses can opt to curtail the customization of an enterprise package and instead change business processes to match the software.

True

Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information

True

With in-memory computing, a computer's primary memory (RAM) is used for processing.

True

You would expect to find PRM and ERM modules in the most comprehensive CRM software packages

True

a firm can be said to have competitive advantage when they have higher stock market valuations than their competitors

True

data governance deals with the policies and processes for managing the integrity and security of data in a firm

True

decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance

True

in the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer

True

the competitive forces model can be used to analyze today's digital firm as well as traditional firms

True

Making web more "intelligent" and intuitive, increased cloud computing & mobile computing

Web 3.0

wade-davis bill

a bill vetoed by lincoln because he thought it was too punitive to the south. made re-admittance to the union by taking an ironclad oath.

The specialized language programmers use to add and change data in the database is called

a data manipulation language.

Which of the following is NOT an IT infrastructure service component? a) Operating system software b) Computing platforms to provide a coherent digital environment c) physical facility management to manage the facilities housing physical components d) IT management services to plan and develop the infrastructure and provide project management

a) Operating system software

When a worker has a family, makes car payments, has a mortgage, and is active in supporting community organizations, how might Argyris explain her poor performance at work? a) She isn't treated as an adult at work b) Managers are using Theory Y assumptions c) Organizational subsystems are inefficient d) She doesn't have the right work skills

a) She isn't treated as an adult at work

Hardware and software that attempts to emulate the processing patterns of the biological brain best describes ____ a) a neural network b) an expert system c) case-based reasoning d) fuzzy logic

a) a neural network

Forward chaining is a) a strategy for searching the rule base in an expert system that begins with information entered by the user b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a strategy for searching the rule base in an expert system that begins with a hypothesis

a) a strategy for searching the rule base in an expert system that begins with information entered by the user

Which of the following businesses uses the market creator business model? a) an online auction house b) an online newspaper c) a video-sharing site d) an online bookseller

a) an online auction house

Which of the following is NOT one of the five steps discussed in the chapter as a process for analyzing an ethical issue? a) assign responsibility b) identify the stakeholders c) identify the options you can reasonably take d) identify and clearly describe the facts

a) assign responsibility

The total amount of digital information that can be transmitted through any telecommunications medium is measured in a) bps b) Hertz c) baud d) gigaflops

a) bps

The most common Ethernet topology is a) bus b) star c) ring d) mesh

a) bus

__________ work by using radio waves to communicate with radio antennas placed within adjacent geographic areas a) cell phones b) microwaves c) satellites d) WANs

a) cell phones

Instant messaging is a type of _______ service a) chat b) cellular c) e-mail d) wireless

a) chat

When one team member advises another team member that "your behavior is crossing the line in terms of our expectations for workplace civility" she is exercising a form of ________ control over the other's inappropriate private behaviors. a) clan b) market c) internal d) preliminary

a) clan

The Online Privacy Alliance a) encourages self-regulation to develop a set of privacy guidelines for its members b) protects user privacy during interactions with web sites c) has established technical guidelines for ensuring privacy d) is a government agency regulating the use of customer information

a) encourages self-regulation to develop a set of privacy guidelines for its members

Costs, benefits, timelines, and ______ are among the recommended criteria for evaluating alternative courses of action in the decision-making process. a) ethical soundness b) past history c) availability d) simplicity

a) ethical soundness

CVS refers to a) eyestrain related to computer display screen use b) carpal vision syndrome c) wrist injuries brought about by incorrect hand position when using a keyboard d) stress induced by technology

a) eyestrain related to computer display screen use

Compared to traditional goods, digital goods have a) greater pricing flexibility b) lower marketing costs c) higher production costs d) higher inventory costs

a) greater pricing flexibility

Which of the following is NOT one of the current software platform trends? a) grid computing b) open source software c) mashups and apps d) software outsourcing

a) grid computing

The benefits of planning should include ___________. a) improved focus b) less need for controlling c) more accurate forecasts d) increased business profits

a) improved focus

Re-designing and automating business processes can be seen as a double-edged sword because a) increases in efficiency may be accompanied by job losses b) increases in efficiency may be accompanied by poor data quality c) support for middle-management decision making may be offset by poor data quality d) reliance on technology results in the loss of hands-on knowledge

a) increases in efficiency may be accompanied by job losses

The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce? a) information density b) richness c) customization d) interactivity

a) information density

When a soccer coach tells her players at the end of a losing game, "You really played well and stayed with the game plan," she is using a/an __________ as a measure of performance. a) input standard b) output standard c) historical comparison d) relative comparison

a) input standard

Intellectual property can best be described as a) intangible property created by individuals or corporations b) the expression of an intangible idea c) unique creative work or ideas d) tangible or intangible property called from a unique idea

a) intangible property created by individuals or corporations

Software programs that work in the background without direct human intervention to carry out specific, repetitive, and predictable tasks for individual users, business processes, or software applications are called __________ a) intelligent agents b) intelligent techniques c) business intelligence d) AI hybrid systems

a) intelligent agents

A VPN a) is an encrypted private network configured within a public network b) is more expensive than a dedicated network c) provides secure, encrypted communications using Telnet d) is an Internet-based service for delivering voice communications

a) is an encrypted private network configured within a public network

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? a) kant's categorical imperative b) the golden rule c) the risk aversion principle d) the "no free lunch" rule

a) kant's categorical imperative

Which is meant by the statement "knowledge is sticky"? a) knowledge is hard to move b) knowledge is universally applicable c) knowledge works only in certain situations d) knowledge is intangible

a) knowledge is hard to move

Compared to traditional markets, digital markets have a) lower distributed delivery costs b) higher marginal costs per unit c) equivalent copying costs d) similar inventory costs

a) lower distributed delivery costs

In respect to the link between bad management and ethical behavior, research shows that ______________. a) managers who set unrealistic goals can cause unethical behavior b) most whistleblowers just want more pay c) only top managers really serve as ethics role models d) a good code of ethics makes up for any management deficiencies

a) managers who set unrealistic goals can cause unethical behavior

Software presents liability problems in terms of legal protections for users because a) of the difficulty in classifying its role as a machine, a service, or a book b) of the inability to review the actual programming behind the software c) of its inherent similarity to books and periodicals, and therefore it is protected by the First Amendment d) there are so many parties involved in its creation and distribution

a) of the difficulty in classifying its role as a machine, a service, or a book

The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called a) procurement b) e-procurement c) SCM d) sourcing

a) procurement

The use of computers to combine data form multiple sources and create electronic dossiers of detailed information on individuals is called a) profiling b) phishing c) spamming d) targeting

a) profiling

CAD workstations a) provide engineers, designers, and factory managers with precise control over industrial design and manufacturing b) provide an important source of expertise for organizations c) allow groups to work together on documents d) are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management

a) provide engineers, designers, and factory managers with precise control over industrial design and manufacturing

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as a) responsibility b) accountability c) liability d) due process

a) responsibility

In which decision environment does a manger deal with probabilities regarding possible courses of action and their consequences? a) risk b) certainty c) uncertainty d) optimal

a) risk

A manager is not living up to the concept of MBO if he or she _____________. a) sets performance objectives for subordinates b) stays in touch and tries to support subordinates in their work c) jointly reviews performance results with subordinates d) keeps a written record of subordinates' performance objectives

a) sets performance objectives for subordinates

In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis? a) subscription b) free/freemium c) transaction fee d) sales

a) subscription

Once a knowledge taxonomy is developed, documents are all _____ with the proper classification a) tagged b) linked c) tupled d) referenced

a) tagged

If an organization was performing poorly and Henri Fayol was called in as a consultant, what would he most likely advise as a way to improve things? a) teach managers to better plan, organize, lead, and control b) give workers better technology c) promote only the best workers to management d) find ways to improve total quality management

a) teach managers to better plan, organize, lead, and control

A person's desires for a comfortable life and family security represent _________ values, while his of her desires to be honest and hard working represent _________ values. a) terminal; instrumental b) instrumental; terminal c) universal; individual d) individual; universal

a) terminal; instrumental

Which of the following events signified the beginning of e-commerce? a) the first online advertisements b) the first telephone sales c) the first online retail store d) the first website

a) the first online advertisements

In a phenomenon called ________, some argue that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts a) the wisdom of crowds b) outsourcing c) crowdsourcing d) social networking

a) the wisdom of crowds

The child domain of the root is the a) top-level domain b) second-level domain c) host name d) domain extension

a) top-level domain

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? a) total cost of ownership b) return on investment c) breakeven point d) cost benefit analysis

a) total cost of ownership

Which of the following would you be most likely to use RFID technology for? a) tracking inventory b) enabling CRM systems c) lowering network costs d) enabling client communication

a) tracking inventory

A business owner makes a decision to reduce a plant's workforce by 10% in order to cut costs and be able to save jobs for the other 90% of employees. This decision could be justified as ethical using the __________ approach to moral reasoning. a) utilitarian b) individualism c) justice d) moral rights

a) utilitarian

Someone who expects the ethical misdeeds of others in an organization is usually called a/an _____________. a) whistleblower b) ethics advocate c) ombudsman d) stakeholder

a) whistleblower

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its A) culture. B) environment. C) atmosphere. D) values.

a.) Culture

Order data for baseball tickets and bar code data are examples of A) raw input. B) raw output. C) customer and product data. D) sales information.

a.) raw input

james king

american inventor who patented the first washing machine to use a drum in 1851, the drum made his machine resemble a modern machine, however it was still hand powered

j.p. morgan

an American financier, banker, dominated corporate finance and industrial consolidation during his time. epitome of the investment banker. Demanded his people sit on the governing boards of investment companies. His crowning achievement came in the steel industry, not the rails. in 1891 he buys Carnegie steel and formed United States Steel America's first billion-dollar company

Analytical CRM applications

are based on data consolidated from operational CRM applications

Which of the following statements about B2B commerce is /not/ true? a) Eighty percent of online B2B e-commerce is still based on EDI b) B2B e-commerce represents approximately three-quarters of the overall B2B marketplace c) B2B e-commerce only includes commercial transactions between firms d) B2B e-commerce revenues in 2009 were over $3 trillion.

b) B2B e-commerce represents approximately three-quarters of the overall B2B marketplace

The leading networking hardware providers include a) Dell, HP/Comaq, and IBM. b) Cisco, Alcatel-lucent, and nortel c) Seagate, maxtor, and western digital. d) IBM, oracle, and sun.

b) Cisco, Alcatel-lucent, and nortel

A suite of integrated software modules for finance and accounting human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple function and business processes best describes. A) SCM software B) ERP systems C) ERM systems D) CRM modules

b) ERP systems

Which of the following best illustrates the affiliate revenue model? a) EBay receives a small fee from a seller if a seller is successful in selling an item b) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase c) Flickr provides basic services for free, but charges a premium for advanced services d) Apple accepts micropayments for single music track downloads

b) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase

Web browser software requests Web pages from the Internet using which protocol? a) URL b) HTTP c) DNS d) HTML

b) HTTP

Which of the following is NOT a typical component or capability of an enterprise-wide knowledge management system a) collaboration tools b) KWS c) document management d) LMS

b) KWS

Which type of network is used to connect digital devices within a half-mile or 500-meter radius? a) microwave b) LAN c) WAN d) MAN

b) LAN

A network that spans a city, and sometimes its major suburbs as well, is called a a) CAN b) MAN c) LAN d) WAN

b) MAN

What technology allows people to have content pulled from Web sites and fed automatically to their computers? a) FTP b) RSS c) HTTP d) Bluetooth

b) RSS

The best goals or objectives for planning purposes would have which of the following characteristics? a) Easy enough so that no one fails to reach them b) Realistic and possible to achieve, while still challenging c) Open ended, with no clear end point identified d) No set timetable or due dates

b) Realistic and possible to achieve, while still challenging

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n) a) SOA b) SLA c) TCO d) RFQ

b) SLA

A SAN is a ______ network a) Server area b) Storage area c) scalable architecture d) service-oriented architecture

b) Storage area

A proponent of the classical view of corporate social responsibility would most likely agree with which of these statements? a) Social responsibility improves the public image of business b) The primary responsibility of business is to maximize profits c) By acting responsibly, businesses avoid government regulation d) Businesses should do good while they are doing business

b) The primary responsibility of business is to maximize profits

In a multi-tiered network a) the work of the entire network is centralized. b) The work of the entire network is balanced over several levels of servers. c) Processing is split between clients and servers. d) processing is handled by multiple, geographically remote clients.

b) The work of the entire network is balanced over several levels of servers.

In a telecommunications network architecture, a protocol is a) a device that handles the switching of voice and data in a local area network b) a standard set of rules and procedures for control of communications in a network c) a communications service for microcomputer users d) the main computer in a telecommunications network

b) a standard set of rules and procedures for control of communications in a network

Which ethical position has been criticized as a source of "ethical imperialism"? a) individualism b) absolutism c) utilitarianism d) relativism

b) absolutism

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is a) acceptable, because the grocer suffers the least harm b) acceptable, because the higher value is the survival of the family c) wrong, because the man would not want the grocery to steal from him d) wrong, because if everyone were to do this, the concept of personal property is defeated

b) acceptable, because the higher value is the survival of the family

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called a) due process b) accountability c) the courts of appeal d) the judicial system

b) accountability

In CPM/PERT analysis, the focus is on ________ and the event ___________ that link them together with the finished project. a) costs; budgets b) activities; sequences c) timetables; budgets d) goals; costs

b) activities; sequences

Net marketplaces a) focus on continuous business process coordination between companies for supply chain management b) are industry owned or operate as independent intermediaries between buyers and sellers c) are geared towards short-term spot purchasing d) are more relationship oriented than private industrial networks

b) are industry owned or operate as independent intermediaries between buyers and sellers

Legacy systems are still used because they a) can only be run on the older mainframe computers. b) are too expensive to redesign c) integrate well using Web services technologies. d) contain valuable data that would be lost during redesign.

b) are too expensive to redesign

Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party a) transparency b) asymmetry c) complexity d) discrimination

b) asymmetry

Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as a) clickstream advertising b) behavioral targeting c) online profiling d) long-tail marketing

b) behavioral targeting

Which of the following is a type of intelligent technique? a) knowledge networks b) case based reasoning c) computer-aided design d) VRML

b) case based reasoning

The _________ decision model views managers as making optimizing decisions, whereas the _________ decision model views them as making satisfying decisions. a) behavioral; judgmental heuristics b) classical; behavioral c) judgmental heuristics; ethical d) crisis; routine

b) classical; behavioral

According to thinking by Robert Katz, _________ skills are more likely to be emphasized by top managers than by first-line managers. a) human b) conceptual c) informational d) technical

b) conceptual

At what Kohlberg calls the ________ level of moral development, an individual can be expected to act consistent with peers, meet obligations, and follow rules of social conduct. a) postconventional b) conventional c) preconventional d) nonconventional

b) conventional

IPv6 is being developed in order to a) update the packet transmission protocols for higher bandwidth b) create more IP addresses c) allow for different levels of service d) support Internet2

b) create more IP addresses

The flow of events or transactions captured by an organization's system describes _______. a) information b) data c) wisdom d) knowledge

b) data

In order, which are the value-adding steps in the knowledge business value chain? a) acquire, store, disseminate, apply, feedback b) data and information acquisition, acquire, store, disseminate, apply c) acquire, disseminate, apply, feedback, management and organizational activities d) data and information acquisition, store, disseminate, feedback, apply

b) data and information acquisition, acquire, store, disseminate, apply

The first step in the planning process is to ____________. a) decide how to get where you want to go b) define your objectives c) identify possible future conditions or scenarios d) act quickly to take advantage of opportunities

b) define your objectives

You are advising a multimedia company on the best type of knowledge management system to help them archive digital video and sound clips. Which of the following will suit their needs? a) enterprise content management system b) digital asset management system c) knowledge network system d) VRML system

b) digital asset management system

The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called a) liability b) due process c) the courts of appeal d) accountability

b) due process

The triple bottom line of organizational performance would include measures of financial, social, and _________ performance. a) philanthropic b) environmental c) legal d) economic

b) environmental

Which decision-making error is most associated with the old adage: "If you don't succeed, try and try again?" a) satisficing b) escalating commitment c) confirmation d) too late to fail

b) escalating commitment

The last step in the decision-making process is to _________. a) choose a preferred alternative b) evaluate results c) find and define the problem d) generate alternatives

b) evaluate results

Management by exception means __________. a) managing only when necessary b) focusing attention where the need for action is the greatest c) the same thing as concurrent control d) the same thing as just-in-time delivery

b) focusing attention where the need for action is the greatest

One of the conclusions from the Hawthorne studies was that ____________. a) motion studies could improve performance b) groups can sometimes restrict the productivity of their members c) people respond well to monetary incentives d) supervisors should avoid close relations with their subordinates

b) groups can sometimes restrict productivity of their members

Passive RFID tags a) have their own power source b) have a range of several feet c) enable data to be rewritten and modified d) are used in automated toll-collection systems

b) have a range of several feet

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as a) touch points b) hotspots c) hot points d) wireless hubs

b) hotspots

Which of the following is one of the characteristics of Weber's ideal bureaucracy? a) few rules and procedures b) impersonality c) promotion by privilege not by merit d) ambiguous hierarchy of authority

b) impersonality

The business case for using grid computing involves all of the following EXCEPT a) cost savings b) increased accuracy c) speed of computation d) agility

b) increased accuracy

The system functionalities of an e-commerce site are best described as the a) general capabilities wanted b) information systems capabilities wanted c) information elements needed d) software and hardware required

b) information systems capabilities wanted

What type of intelligent technique helped Procter & Gamble determine the most efficient methods for their trucks to deliver goods? a) fuzzy logic b) intelligent agents c) genetic algorithms d) none of the above

b) intelligent agents

Which of the following is NOT a Web 2.0 tool firms are using to foster collaboration? a) blogs b) intranets c) wikis d) social bookmarking

b) intranets

In the United States, m-commerce a) has become widely adopted b) is still in its infancy c) now represents a major fraction of total e-commerce transactions d) is growing slowly

b) is still in its infancy

_____ often are designed and optimized for the specific tasks to be performed. a) graphics programs b) knowledge workstations c) virtual simulators d) CAD stations

b) knowledge workstations

One of the expected benefits of participatory planning is ________. a) faster planning b) less need for forecasting c) greater attention to contingencies d) more commitment to implementation

b) less need for forecasting

A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location is called a(n) a) exchange b) marketspace c) online marketplace d) e-hub

b) marketspace

_______ are created by combining and customizing components from different online software applications a) apps b) mashups c) SaaS d) web services

b) mashups

Your firm, an auto parts manufacturer, has just merged with an automobile engine manufacturer, and the two companies have different SCM systems. Which of the following strategies would be the most likely course to help reduce the TCO of the merged firms' technology investments? a) use web services to join the two systems b) move one firm into using the other's system in order to centralize management and support services c) develop a single ERP system that encompasses the information needs and business processes of both firms d) purchase a hosted, on-demand ERP system that encompasses the needs and processes of both firms

b) move one firm into using the other's system in order to centralize management and support services

When a cookie is created during a Web site visit, it is stored a) on the web site computer b) on the visitor's computer c) on the ISP's computer d) in a web directory

b) on the visitor's computer

A(n) _______ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected a) opt-in b) opt-out c) P3P d) PGP

b) opt-out

If an organization's top management establishes a target of increasing new hires of minority and female candidates by 15% in the next six months, this is an example of a/an __________ standard for control purposes. a) input b) output c) management by exception d) concurrent

b) output

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called a) multiplexing b) packet switching c) packet routing d) ATM

b) packet switching

An effective manager is someone who helps others to achieve high levels of both ________ and __________. a) pay; satisfaction b) performance; satisfaction c) performance; pay d) pay; quality work life

b) performance; satisfaction

A manager who is reactive and works hard to address problems after they occur is described as a ________. a) problem seeker b) problem solver c) rational thinker d) strategic opportunist

b) problem solver

Your firm needs to implement electronic timesheet software and needs to keep within a small budget. Which of the following would be the most costly method of implementing this new software? a) purchasing a software package b) programming the new software in-house c) leasing the software over the Internet d) outsourcing the software programming to an overseas vendor

b) programming the new software in-house

Market creators a) save users money and time by processing online sales transactions b) provide a digital environment where buyers and sellers can establish for products c) create revenue by providing digital content over the Web d) sell physical products directly to consumers or individual businesses

b) provide a digital environment where buyers and sellers can establish prices for products

The robotics startup you work for has developed an AI-controlled robotic nurse, intended to care for end-of-life patients who are often unconscious. Which five moral dimensions does this raise? a) system quality b) quality of life c) accountability and control d) property rights and obligations

b) quality of life

The US CAN-SPAM Act of 2003 a) makes spamming illegal b) requires spammers to identify themselves c) has dramatically cut down spamming d) does not override state anti-spamming laws

b) requires spammers to identify themselves

The introduction of new information technology has a a) dampening effect on the new discourse of business ethics b) ripple effect raising new ethical, social, and political issues c) beneficial effect for society as a whole, while raising dilemmas for consumers d) waterfall effect in raising ever more complex ethical issues

b) ripple effect raising new ethical, social, and political issues

According to the _______, you should take the action that produces the least harm a) categorical imperative b) risk aversion principle c) utilitarian principle d) golden rule

b) risk aversion principle

Transaction brokers a) generate revenue from advertising or from directing buyers to sellers b) save users money and time by processing online sales transactions c) provide a digital environment where buyers and sellers can establish prices for products d) sell physical products directly to consumers or individual businesses

b) save user money and time by processing online sales transactions

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? a) modality b) scalability c) expandability d) disintermediation

b) scalability

The effort required to locate a suitable product is called a) price discrimination b) search costs c) menu costs d) shopping costs

b) search costs

In a bus network a) signals are broadcast to the next station b) signals are broadcast in both directions to the entire network c) multiple hubs are organized in a hierarchy d) messages pass from computer in a loop

b) signals are broadcast in both directions to the entire network

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be a) part of a machine b) similar to books c) services d) artistic expressions

b) similar to books

_______ unleash powerful economies of scale and result in declines in manufactured computer products a) internet and web technologies b) technology standards c) linux and open-source software d) client/server technologies

b) technology standards

"Look and feel" copyright infringement lawsuits are concerned with a) the distinction between tangible and intangible ideas b) the distinction between an idea and its expression c) using the graphical elements of another product d) using the creative elements of another product

b) the distinction between an idea and its expression

EDI is a) the use of Internet technologies for electronic data transactions b) the exchange between two organizations of standard transactions through a network c) electronic data invoicing d) electronic delivery infrastructure

b) the exchange between two organizations of standard transactions through a network

Which of the following best describes how new information systems result in legal gray areas? a) they work with networked, electronic data, which are more difficult to control than information stored manually b) they result in new situations that are not covered by old laws c) they are implemented by technicians rather than managers d) they are created from sets of logical and technological rules rather than social or organizational mores

b) they result in new situations that are not covered by old laws

If an organization is considered an open system, work activities that turn resources into outputs are part of the ________ process. a) input b) transformation c) output d) feedback

b) transformation

Which of the following is not one of the unique features of e-commerce technology? a) information density b) transparency c) richness d) social topology

b) transparency

From a time management perspective, which manager is likely to be in best control of his or her time? One who ____________. a) tries to never say "no" to requests from others b) works on the most important things first c) immediately responds to instant messages d) always has "an open office door"

b) works on the most important things first

all of the following are physical components of an RFID system except

bar code

All of the following are physical components of an RFID system except

bar code.

The enormous volume of data generated by Internet activity, such as Web traffic and e-mail, is referred to as ________.

big data

stanley steamer

big rivals for the alternatives of gasoline engines. they were known for their manufacturing of steam-engine vehicles

The total amount of digital information that can be transmitted through any telecommunications medium is measured in

bps

the total amount of digital information that can be transmitted through any telecommunications medium is measured in

bps

Applications that allow managers to interactively manipulate current and historical data to discover patterns and trends that will help their decision making are referred to as ________.

business intelligence

How are information systems used at the industry level to achieve strategic advantage

by building industry-wide, IT-supported consortia and symposia

In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? a) "http://", myspace, blogging, com b) "http://", com, blogging, myspace c) ".", com, blogging, myspace d) ".", myspace, blogging, com

c) ".", com, blogging, myspace

The WiMax standard can transmit up to a distance of approximately a) 30 meters b) 500 meters c) 30 miles d) 5 miles

c) 30 miles

The percentage of gross domestic product of the United States that is produced by the knowledge and information sectors is estimated to be about ________ percent. a) 20 b) 40 c) 60 d) 80

c) 60

The _________ chart graphically displays the scheduling of tasks required to complete a project. a) exception b) Taylor c) Gantt d) after-action

c) Gantt

_______ can be induced by tens of thousands of repetitions under low-impact loads a) CTS b) CVS c) RSI d) technostress

c) RSI

A set of self-contained services that communicate with each other to create a working software application is called a) web services b) EAI software c) SOA d) SOAP

c) SOA

__________ planning identifies alternative courses of action that can be taken if problems occur with the original plan. a) Benchmark b) Participatory c) Staff d) Contingency

c) Staff

Specifications that establish the compatibility of products and the ability to communicate in a network are called a) network standards b) Telecommunications standards c) Technology standards. d) internet standards

c) Technology standards

Which of the following is /not/ a recent development in e-commerce? a) Wireless Internet connections grow rapidly b) Social networking sites become a new platform for e-commerce c) The music recording industry is disrupted as music creation and distribution become decentralized d) Online entertainment business models surge.

c) The music recording industry is disrupted as music creation and distribution become decentralized

The next evolution in wireless communication is a) 3G networks b) 2.5G networks c) WiMax d) RFID

c) WiMax

Linux is a) primarily concerned with the tasks of end users b) designed for specific machines and specific microprocessors c) an example of open-source software d) especially useful for processing numeric data

c) an example of open-source software

When a manager makes a decision about someone's annual pay raise only after looking at the person's current salary, the risk is that the decision will be biased because of _________. a) a framing error b) escalating commitment c) anchoring and adjustment d) strategic opportunism

c) anchoring and adjustment

What are the four layers of the TCP/IP reference model? a) physical, application, transport, and network interface b) physical, application, Internet, and network interface c) application, transport, Internet, and network interface d) application, hardware, Internet, and network interface

c) application, transport, Internet, and network interface

___________ management assumes people are complex, with widely varying needs. a) Classical b) Neoclassical c) Behavioral d) Modern

c) behavioral

A software tool with a graphical user interface for displaying Web pages and for accessing the web and other internet resources is called a web _______ a) service b) client c) browser d) app

c) browser

The Internet is based on which three key technologies? a) TCP/IP, HTML, and HTTP b) TCP/IP, HTTP, and packet switching c) client/server computing, packet switching, and the development of communications standards for linking networks and computers d) client/server computing, packet switching, and HTTP

c) client/server computing, packet switching, and the development of communications standards for linking networks and computers

Which of the following is /not/ one of the four defining features of Web 2.0? a) interactivity b) real-time user control c) cloud computing d) social participation

c) cloud computing

The intellectual capital equation states that: Intellectual Capital = _______ X Commitment. a) Diversity b) Confidence c) Competency d) Communication

c) competency

When a supervisor working alongside of an employee corrects him or her when a mistake is made, this is an example of _________ control. a) feedforward b) external c) concurrent d) preliminary

c) concurrent

When a manger puts Kwabena in a customer relations job because he has strong social needs and gives Sherrill lots of daily praise because she has strong ego needs, the manager is displaying __________. a) systems thinking b) Theory X c) contingency thinking d) administrative principles

c) contingency thinking

The management function of __________ is being activated when a bookstore manager measures daily sales in the magazine section and compares them with daily sales targets. a) planning b) agenda setting c) controlling d) delegating

c) controlling

What legal mechanism protects the owners of intellectual property from having their work copied by others? a) patent protection b) intellectual property law c) copyright law d) fair use doctrine

c) copyright law

Among the financial ratios often used for control purposes, Current Assets. Current Liabilities is known as the ______. a) debt ratio b) net margin c) current ratio d) inventory turnover ratio

c) current ratio

Digital goods are goods that are a) produced digitally b) sold over digital networks c) delivered digitally d) used with digital equipment

c) delivered digitally

The term "_______ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations a) computer b) technology c) digital d) electronic

c) digital

In a social responsibility audit of a business firm, positive behaviors meeting which of the following criteria would measure the highest level of commitment to socially responsible practices? a) legal - obeying the law b) economic - earning a profit c) discretionary - contributing to community d) ethical - doing what is right

c) discretionary - contributing to community

If a manager fails to enforce a late-to-work policy for all workers, that is, by allowing favored employees to arrive late without penalties, this would be considered a violation of _____________. a) human rights b) personal values c) distributive justice d) cultural relativism

c) distributive justice

When managers use the benchmarking approach to planning, they usually try to _______. a) set up flexible budgets b) identify best practices used by others c) find the most accurate forecasts that are available d) use expert staff planners to set objectives

c) find the most accurate forecasts that are available

You are an automative engineer working on an application that will automatically parallel park a car. The intelligent technique you may find most useful is a) case-based reasoning b) artificial intelligence c) fuzzy logic d) expert system

c) fuzzy logic

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called a) co-location b) edge computing c) grid computing d) utility computing

c) grid computing

Two of the three principal sources of poor system performance are a) software bugs and errors and outdated standards b) hardware or facility failures and malware c) hardware or facility failures and poor input data quality d) poor input data quality and insufficient integration with legacy systems

c) hardware or facility failures and poor input data quality

How could you determine the market demand for your firm's IT services? a) perform a TCO analysis b) benchmark your services c) hold focus groups to assess your services d) analyze sales return on key investments

c) hold focus groups to assess your services

The first step in the decision-making process is to _______. a) generate a list of alternatives b) assess the costs and benefits of each alternative c) identify and define the problem d) perform the ethics double-check

c) identify and define the problem

In addition to providing better focus, good planning offers the benefit of ________. a) guaranteed performance success b) eliminating the need to change c) improved action orientation d) less emphasis on coordination and control

c) improved action orientation

If a manager takes a lot of time explaining to a subordinate why he did not get a promotion and sincerely listens to his concerns, this is an example of an attempt to act ethically according to _________. a) utilitarian b) commutative c) interactional d) universal

c) interactional

A common mistake by managers facing crisis situations is _________________. a) trying to get too much information before responding b) relying too much on group decision making c) isolating themselves to make the decision alone d) forgetting to use their crisis management plan

c) isolating themselves to make the decision alone

Which of the following statements about Linux is NOT true? a) it plays a major role in the back office running local area networks b) it is available in free versions downloadable from the Internet c) it has garnered 80 percent of the server operating system market d) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices

c) it has garnered 80 percent of the server operating system market

A limitation of trade secret protection for software is that a) it does not protect against copying the underlying ideas behind the software b) it is difficult to compare one piece of software to another c) it is difficult to prevent the ideas in the work from falling into the public domain d) few software programs contain truly unique elements

c) it is difficult to prevent the ideas in the work from falling into the public domain

Which of the following is NOT one of the main four dimensions of knowledge described in the chapter? a) knowledge is a firm asset b) knowledge has different forms c) knowledge has no locations d) knowledge is situational

c) knowledge has no locations

Which of the following statements best describes the relationship between collaboration and knowledge management? a) without knowledge, collaboration is difficult b) knowledge doesn't exist without collaboration c) knowledge is useful only when shared with others d) as knowledge increases, so does collaboration

c) knowledge is useful only when shared with others

The Internet has made the protection of intellectual property a) more difficult, because of the lack of enforceable regulations b) easier, because of proliferation of creative and professional software c) more difficult, because of the ease of copying and transmitting digitized media d) easier, because of the ability to track user behavior and visits to web sites and file-sharing services

c) more difficult, because of the ease of copying and transmitting digitized media

FIP principles are based on the notion of the a) accountability of the record holder b) responsibility of the record holder c) mutuality of interest between the record holder and the individual d) privacy of the individual

c) mutuality of interest between the record holder and the individual

Which of the following does grid computing utilize to create enormous supercomputing power? a) massive unused data centers b) underutilized mainframe computers c) networked computers with idle resources d) networks with low usage

c) networked computers with idle resources

The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) _______ a) advances in wireless networking b) international standards for data protection c) networking advances and the Internet d) increased ease in file sharing and copying

c) networking advances and the Internet

It is unlikely you could represent the knowledge in the Encyclopedia Britannica with an expert system because a) there is no one expert who understands all the material contained within the encyclopedia b) the knowledge changes radically over a short time c) not all the knowledge in the encyclopedia can be represented in the form of IF-THEN rules d) the knowledge is too general

c) not all the knowledge in the encyclopedia can be represented in the form of IF-THEN rules

The set of business processes, culture, and behavior required to obtain value from investments in information systems is one type of _______ a) knowledge culture b) knowledge discovery c) organizational and management capital d) organizational routine

c) organizational and management capital

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? a) wireless network in infrastructure mode b) domain-based LAN c) peer-to-peer network d) campus area network

c) peer-to-peer network

The Hawthorne studies were important in management history because they raised awareness about the importance of ______ as possible influences on productivity. a) organization structures b) human factors c) physical work conditions d) pay and rewards

c) physical work conditions

One of the reasons why certainty is the most favorable environment for problem solving is that it can be addressed through ______ decisions. a) satisfying b) optimizing c) programmed d) intuitive

c) programmed

The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology? a) ubiquity b) personalization/customization c) richness d) interactivity

c) richness

The highest level in Maslow's hierarchy is _______. a) safety b) esteem c) self-actualization d) physiological

c) self-actualization

Emotional intelligence helps us to manage ourselves and our relationships effectively. Someone that is high in emotional intelligence will have the capacity to __________ an ability to think before acting and to control potentially disruptive emotions and actions. a) set agendas b) show motivation c) self-regulate d) act as a leader

c) self-regulate

The manager's role in the "upside-down pyramid" view of organizations is best described as providing _________ so that operating workers can directly serve ________. a) direction; top management b) leadership; organizational goals c) support; customers d) agendas; networking

c) support, customers

Which of the following statements about the use of wikis by firms is NOT true? a) they are inexpensive and easy to implement b) users are able to modify wiki content contributed by others c) they are most appropriate for information that must be revised but does not need to be available 24/7 d) they can be used as a central repository for all types of corporate data such as spreadsheets and e-mail

c) they are most appropriate for information that must be revised but does not need to be available 24/7

Information density refers to the a) richness, complexity, and content of a message b) total amount of quantity of information delivered to consumers by merchants c) total amount of quantity of information available to all market participants d) amount of information available to reduce price transparency

c) total amount of quality of information available to all market participants

If Douglas McGregor heard an instructor complaining that her students were lazy, didn't want to come to class, lacked creativity, and were irresponsible, he would worry that she might __________. a) violated scientific management ideas b) focused too much on needs c) would create a negative self-fulfilling prophecy d) showed contingency thinking

c) would create a negative self-fulfilling prophecy

The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called A) information systems literacy. B) information systems architecture. C) management information systems. D) information technology infrastructure.

c.) Management information systems

Which of the following is not one of the current changes taking place in information systems technology? A) growing business use of "big data" B) growth in cloud computing C) development of videopresence software D) emerging mobile platform

c.) development of videopresence software

The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information systems to achieve which business objective? A) improved efficiency B) customer and supplier intimacy C) survival D) competitive advantage

c.) survival

laissez-faire

capitalism term from the latin phrase meaning "hands off". no limitations placed on businesses period. from this companies that emerge start to have immense power

Instant messaging is a type of ________ service.

chat

The telephone system is an example of a ________ network.

circuit-switched

the telephone system is an example of a ____________ network

circuit-switched

You work for a national car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use data mining software that is capable of

classification.

The Internet is based on which three key technologies?

client/server computing, packet switching, and the development of communications standards for linking networks and computers

The join operation

combines relational tables to provide the user with more information than is otherwise available.

A user-designer ________ occurs when there is a difference in background, interests and priorities that impedes discussion and problem solving among users and IS specialists

communication gap

The use of information systems because of necessity describes the business objective of

competitive advantage

When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the company with

configuration tables.

The select operation

creates a subset consisting of all records in the file that meet stated criteria.

The project operation

creates a subset consisting of columns in a table.

Which of the following is an example of a cross-functional business process?

creating a new product

The data dictionary serves as an important data management tool by

creating an inventory of the data elements contained in the database.

Selling a customer with a checking account a home improvement loan is an example of

cross-selling.

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its

culture

To make sure they stock clothes that their customers will purchase, a department store implements a new application that analyzes spending levels at their stores and cross references this data to popular clothing styles. This is an example of using information systems to support a business strategy of:

customer and supplier intimacy

Selling products and service directly to individual consumers via the Internet best describes a) B2B e-commerce b) C2C e-commerce c) M-commerce d) B2C e-commerce

d) B2C e-commerce

Which of the following standards is most appropriate for creating a PAN? a) WiMax b) IEEE 802.11b c) WiFi d) Bluetooth

d) Bluetooth

Which of the following is NOT an example of the emerging mobile computing platforms? a) netbooks b) the Kindle c) cell phones d) CRM

d) CRM

_________ is the active oversight by boards of directors of top management decisions in such areas as corporate strategy and financial reporting. a) Value chain analysis b) Productivity c) Outsourcing d) Corporate governance

d) Corporate governance

Which organization helps define the overall structure of the Internet? a) none (no one "owns" the Internet) b) W3C c) ICANN d) IAB

d) IAB

Which of the following statements about m-commerce is /not/ true? a) In 2010, m-commerce represented less than 10 percent of all e-commerce b) M-commerce is the fastest growing form of e-commerce c) M-commerce applications are especially popular in Europe, Japan, and South Korea d) In 2010, the top-grossing category of m-commerce was e-book sales

d) In 2010, the top-grossing category of m-commerce was e-book sales

Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers? a) networking b) Telephone c) VOIP d) Telecommunications

d) Telecommunications

________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience a) Wireless networks b) Intranets c) Virtual private networks d) Unified communications

d) Unified communications

Which of the following distinguishes wikis from blogs? a) Wikis allow users to add content, whereas blogs are created by a single person b) Blogs are personal publishing tools, while Wikis have business uses c) Wikis require some knowledge of Web programming, whereas blogs are designed to be created by people without HTML skills of any kind d) Wikis allow users to modify content created by other users, whereas blogs only allow comments to posted material

d) Wikis allow users to modify content created by other users, whereas blogs only allow comments to posted material

Backward chaining is a) a strategy for searching the rule base in an expert system that begins with information entered by the user b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a strategy for searching the rule base in an expert system that begins with a hypothesis

d) a strategy for searching the rule base in an expert system that begins with a hypothesis

An interface engine is a) a strategy for searching the rule base in case-based reasoning b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a strategy used to search through the rule base in an expert system by forward chaining or backward chaining

d) a strategy used to search through the rule base in an expert system by forward chaining or backward chaining

An amoral manager ____________. a) always acts in consideration of ethical issues b) chooses to behave unethically c) makes ethics a personal goal d) acts unethically but does so unintentionally

d) acts unethically but does so unintentionally

Investment workstations a) provide engineers, designers, and factory managers with precise control over industrial design and manufacturing b) provide an important source of expertise for organizations c) allow groups to work together on documents d) are used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management

d) are used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management

An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called a) grid computing b) utility computing c) virtualization d) autonomic computing

d) autonomic computing

The P3P standard is concerned with a) controlling pop-up ads based on user profiles and preventing ads from collecting or sending information b) allowing users to surf the web anonymously c) scrambling data so that it can't be read d) blocking or limiting cookies

d) blocking or limiting cookies

The "do anything anywhere" computing environment can a) make work environments much more pleasant b) create economies of efficiency c) centralize power at corporate headquarters d) blur the traditional boundaries between work and family time

d) blur the traditional boundaries between work and family time

A good performance objective is written in such a way that it ___________. a) has a flexible timetable b) is general and not too specific c) is impossible to accomplish d) can be easily measured

d) can be easily measured

If the direction in managerial work today is away from command and control, what is it towards? a) coaching and facilitating b) telling and selling c) pushing and pulling d) carrot and stick

d) carrot and stick

When a manger is asked to justify a new budget proposal on the basis of projected activities rather than as an incremental adjustment to the prior year's budget, this is an example of ______. a) zero-based budgeting b) strategic planning c) operational planning d) contingency planning

d) contingency planning

Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of a) prediction markets b) behavioral targeting c) long-tail marketing d) crowdsourcing

d) crowdsourcing

Which of the following techniques is used for knowledge discovery? a) expert system b) transaction processing systems c) case-based reasoning d) data mining

d) data mining

The most common source of business systems failure is a) software bugs b) software errors c) hardware or facilities failures d) data quality

d) data quality

If a sales department supervisor is held accountable by a middle manager for the department's performance, whom is the department supervisor dependent upon to make this performance possible? a) board of directors b) top management c) customers or clients d) department sales persons

d) department sales persons

Which of the following are the three major types of knowledge management systems? a) management information systems, decision support systems, and transaction processing systems b) enterprise systems, customer support systems, and supply chain management systems c) database management systems, expert systems, and knowledge work systems d) enterprise-wide knowledge management systems, knowledge work systems, and intelligent techniques

d) enterprise-wide knowledge management systems, knowledge work systems, and intelligent techniques

The process of building and maintaining good working relationships with others who may someday help a manager implement his or her work agendas is called ________. a) governance b) networking c) emotional intelligence d) entrepreneurship

d) entrepreneurship

The ethical "no free lunch" rule states that a) if an action cannot be taken repeatedly, then it is not right to be taken at any time b) one should take the action that produces the least harm or incurs the least cost c) one can put values in rank order and understand the consequences of various courses of action d) everything is owned by someone else, and that the creator wants compensation for this work

d) everything is owned by someone else, and that the creator wants compensation for this work

Which of the following would NOT be classified as a knowledge work system? a) computer-aided design system b) 3D visualization system c) investment workstations d) expert system

d) expert system

When an automobile manufacturer is careful to purchase only the highest-quality components for use in production, this is an example of an attempt to ensure high performance through _________ control. a) concurrent b) statistical c) inventory d) feedforward

d) feedforward

Your company provides online tax preparation software. Users can download forms and read tips online without paying, but a fee is charged for using the advanced tax form management services. This is an example of which type of revenue model? a) subscription b) affiliate c) transaction fee d) free/freemium

d) free/freemium

What organizational stakeholder would get priority attention if a corporate board is having a serious discussion regarding how the firm could fulfill its obligations in respect to sustainable development? a) owners or investors b) customers c) suppliers d) future generations

d) future generations

Your company wants to develop intelligent techniques to create a "smart" oven that can perfectly cook basic foodstuffs, such as roasts and bread, using sensors and minimal input from the user. The system would know the difference between rare, medium rare, medium, and well done roasts. The category of intelligent technique that would describe this system is _______ a) expert system b) neural network c) care based reasoning d) fuzzy logic

d) fuzzy logic

Compared to digital markets, traditional markets have a) lower search costs b) stronger network effects c) higher delayed gratification effects d) higher transaction costs

d) higher transaction costs

Immanuel Kant's Categorical Imperative states that a) if an action cannot be taken repeatedly, then it is not right to be taken at any time b) one should take the action that produces the least harm or incurs the least cost c) one can put values in rank order and understand the consequences of various courses of action d) if an action is not right for everyone to take, it is not right for anyone to take

d) if an action is not right for everyone to take, it is not right for anyone to take

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? a) property rights and obligations b) system quality c) accountability and control d) information rights and obligations

d) information rights and obligations

To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management a firm would most likely use a) CAD systems b) virtual reality systems c) fuzzy logic systems d) intelligent agents

d) intelligent agents

The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology? a) ubiquity b) personalization/customization c) richness d) interactivity

d) interactivity

The practice of spamming has been growing because a) telephone solicitation is no longer legal b) it is good advertising practice and brings in many new customers c) it helps pay for the internet d) it is so inexpensive and can reach so many people

d) it is so inexpensive and can reach so many people

Which of the following statements is NOT an accurate description of the importance of knowledge to a firm? a) knowledge experiences network effects as more people share it b) knowledge should be seen as an intangible key asset c) knowledge enables firms to become more efficient in their use of scarce resources d) knowledge is unconditional

d) knowledge is unconditional

Tools for the management, delivery, tracking, and assessment of various types of employee learning best describes a ______ a) investment workstation b) organizational learning system c) employee enrichment system d) learning management system

d) learning management system

The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as a) accountability b) responsibility c) due process d) liability

d) liability

Which of the following is NOT a challenge being faced by Salesforce.com, as discussed in the chapter case? a) increased competition from traditional industry leaders such as Microsoft and SAP b) continuing to differentiate its product and develop complementary new products and services c) maintaining 24/7 availability for clients d) moving into a more scalable, on-demand environment

d) moving into a more scalable, on-demand environment

European privacy protection is _______ than in the United States a) less far-reaching b) less liable to laws c) much less stringent d) much more stringent

d) much more stringent

Which of the following systems is NOT used to capture tacit knowledge? a) expert system b) case-based reasoning c) fuzzy logic d) neural network

d) neural network

Which type of software is created and updated by a worldwide community of programmers and available for free? a) software packages b) mashups c) outsourced d) open source

d) open source

Changing organizational behavior by sensing and responding to new experience and knowledge is called ______ a) change management b) knowledge networking c) the knowledge value chain d) organizational learning

d) organizational learning

Selling the same goods to different targeted groups at different prices is called a) cost customization b) cost optimization c) price gouging d) price discrimination

d) price discrimination

An extranet that links a large firm to its suppliers and other key business partners is called a(n) a) e-hub b) marketspace c) exchange d) private industrial network

d) private industrial network

In order to help implement her firm's strategic plans, the CEO of a business firm would most likely want marketing, manufacturing, and fiance executives to develop ________. a) means-ends chains b) operational plans c) flexible budgets d) project management

d) project management

Virtual reality systems a) provide engineers, designers, and factory managers with precise control over industrial design and manufacturing b) provide an important source of expertise for organizations c) allow groups to work together on documents d) provide architects, engineers, and medical workers with precise, photorealistic simulations of objects

d) provide architects, engineers, and medical workers with precise, photorealistic simulations of objects

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of a) family and home b) property rights and obligations c) system quality d) quality of life

d) quality of life

According to research on ethics in the workplace, ________ is/are often a major and frequent source of pressures that create ethical dilemmas for people in their jobs. a) declining morals in society b) long work hours c) low pay d) requests or demands from bosses

d) requests or demands from bosses

Which of the following is /not/ one of the categories of services that are popular for m-commerce? a) location-based services b) financial services c) games and entertainment d) retail shopping

d) retail shopping

The US Department of Commerce, developed a _______ framework in order to enable US businesses to legally use personal data from EU countries a) COPPA b) P3P c) PGP d) safe-harbor

d) safe-harbor

In a business firm, a marketing plan would most likely deal with _________. a) production methods and technologies b) money and capital investments c) facilities and workforce recruiting d) sales and product distribution

d) sales and product distribution

Which of the following was the leading marketing format in 2010? a) display ads b) e-mail c) classifieds d) search engine

d) search engine

You are planning the requirements for a site tracking and reporting system for your company Web site. Which of the following information requirements would /not/ be essential for this function? a) number of unique visitors b) pages visited c) products purchased d) secure credit card clearing

d) secure credit card clearing

Planning is best described as the process of ____________ and __________. a) developing premises about the future; evaluating them b) measuring results; taking corrective action c) measuring past performance; targeting future performance d) setting objectives; deciding how to accomplish them

d) setting objectives; deciding how to accomplish them

Expertise and experience of organizational members that has not been formally documented best describes ______. a) wisdom b) information c) data d) tacit knowledge

d) tacit knowledge

Personal creativity drivers include creativity skills, task expertise, and __________. a) strategic opportunism b) management support c) organizational culture d) task motivation

d) task motivation

The quality of ubiquity, as it relates to e-commerce, is illustrated by a) the same set of standards being used across the globe b) the spread of plentiful, cheap information c) the enabling of commerce worldwide d) the availability of the Internet everywhere and anytime

d) the availability of the Internet everywhere and anytime

One of the difficulties of patent protection is a) that only the underlying ideas are protected b) digital media cannot be patented c) preventing the ideas from falling into public domain d) the years of waiting to receive it

d) the years of waiting to receive it

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) a) service-oriented architecture b) on-demand architecture c) multi-tiered client/server architecture d) two-tiered client/server architecture

d) two-tiered client/server architecture

Which principle states that a person should only receive orders from one boss in an organization? a) scalar b) contingency c) Hawthorne d) unity of command

d) unity of command

all of the following are contemporary and growing hardware platform trends except a) green computing b) virtualization c) cloud computing d) unix

d) unix

A _____ is very important to a knowledge worker's system. a) careful filing system b) financial analysis system c) CAD capability d) user-friendly interface

d) user-friendly interface

The Federal Trade Commission FIP principle of Notice/Awareness states that a) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction b) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use c) there is a mechanism in place to enforce FIP principles d) web sites must disclose their information practices before collecting data

d) web sites must disclose their information practices before collecting data

Which of the following is NOT one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure? a) your firm's business strategy b) the IT investments made by competitor firms c) market demand for your firm's services d) your firm's organizational culture

d) your firm's organizational culture

an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the

data dictionary

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the

data dictionary.

the most common source of business system failure is

data quality

The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources.

data redundancy

12) Intellectual property refers to all forms of human expression, both tangible and intangible.

false

14) Behavioral targeting occurs at two levels: individual Web sites and through ISPs.

false

15) EDI standards that take advantage of network communications have yet to be fully implemented at the industry level.

false

17) Exchanges have become one of the most popular types of Net marketplace because they encourage competitive bidding that drives prices down.

false

20) Because of outsourcing and increased automation, the costs of system maintenance and content creation have fallen and typically make up less than a quarter of Web site budgets.

false

9) An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.

false

According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law

false

Advances in data storage have made routine violation of individual privacy more difficult

false

Application server software is responsible for locating and managing stored Web pages.

false

Most American and European privacy law is based on a set of five principles called COPPA

false

P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly

false

TCO refers to the original cost of purchased technology: both hardware and software

false

The key concepts in patent law are originality, novelty, and value

false

data mining is a tool for allowing users to

find hidden relationships in data

Data mining is a tool for allowing users to

find hidden relationships in data.

white castle

first fast food industry in 1921 that took advantage of the impact of automobiles

federal aid road act

first federal highway funding law, was instrumental in extending and improving the country's road system

Marketing modules in CRM systems would provide tools for

identifying profitable and unprofitable customers.

You work for a retail clothing chain whose primary outlets are in shopping malls, and you are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use data mining software that is capable of

identifying sequences.

Capabilities of supply chain execution systems would not include

identifying the optimal transportation mode.

The first step in the four-step model of business problem solving is:

identifying the problem

The three activities in an information system that produce the information organizations use to control operations are

input, processing, and output

Which of the following are key corporate assets?

intellectual property, core competencies, and financial and human assets

samuel morse

inventor of the telegraph in 1844. First transcontinental telegraph line in 1861, transatlantic lines by the 1870s

Which of the following non-digital data storage items is most similar to a database?

library card catalog

which of the following non-digital data storage items is most similar to a database

library card catalog

Which of the following is not one of the main challenges in implementing enterprise applications?

loss of ownership of data

the four major types of competitive strategy are

low-cost leadership; product differentiation; focus on market niche; and customer and supplier intimacy

a large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management making is classified by Mintzberg as a ______________ bureaucracy

machine

The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called:

management information systems

SFA modules in CRM systems would provide tools for

managing sales prospect and contact information.

Customer relationship management systems typically provide software and online tools for sales, customer service, and

marketing.

A DBMS reduces data redundancy and inconsistency by

minimizing isolated files with repeated data.

Electronic computers and related software programs are the technical foundation, the tools and materials, of:

modern information systems

a firm can exercise greater control over its suppliers by having

more suppliers

FIP principles are based on the notion of the

mutuality of interest between the record holder and the individual

which of the following factors provides an understanding of why computing resources today are ever more available than in previous decades

network economics; law of mass digital storage and Moore's law; and declining communications costs, universal standards, and the internet

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called

normalization.

when a cookie is created during a web site visit, it is stored

on the visitor's computer

which type of computing refers to firms purchasing computing power form remote providers and paying only for the computing power they use

on-demand

national league

one of the two baseball leagues constituting major league baseball in the U.S. and canada

Consider an information system in a moving company that analyzes travel patterns and decides which routes are the most efficient for every van. The need for employees to follow procedures to update this system with arrival and departure times would be considered a(n) ________ element of the system

organizational

Flapjack Flats, a new pancake chain, is having difficulty finding pancake chefs. This is a business problem that falls into the:

organizational dimension

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called

packet switching

Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server?

peer-to-peer

Legal and regulatory compliance is an example of the ________ dimension of business problems

people

a DBMS makes the

physical database available for different logical views

A DBMS makes the

physical database available for different logical views.

In a table for customers, the information about a single customer would reside in a single

row

The decisions involved in creating and producing a corporate intranet can be classified as ________ decisions. procedural unstructured structured semistructured

semistructured

Financial managers work directly with ________ to ensure investments in information systems help achieve corporate goals

senior managers

Detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system describes:

software

Data management technology consists of the

software governing the organization of data on physical storage media

The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the information system business objective of:

survival

The six important business objectives of information technology are: new products, services, and business models; customer and supplier intimacy; improved decision making; competitive advantage; operational excellence, and:

survival

19) In general, the cost of hardware, software, and telecommunications for building and operating a Web site has fallen by over 50 percent since 2000.

true

A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site

true

An application server may reside on the same computer as a Web server or on its own dedicated computer

true

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations

true

SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers

true

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down

true

Spyware is software that comes hidden in downloaded applications and can track your online movements

true

The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture

true

The most common type of computer-related RSI is CTS

true

Trade secret law protects the actual ideas in a work product, not just their manifestations

true

VoIP technology delivers video information in digital form using packet switching

true

Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based

true

an application server may reside on the same computer as a web server or on its own dedicated computer

true

the drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product

true

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n)

uniform resource locator.

Which of the following is not a potential "switching cost"?

upgrading software

A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the

upstream portion of the supply chain.

A major criterion in deciding the most important perspectives of a business problem is:

usefulness

The ________ is the part of the system that users interact with.

user interface

Which of the following is not one of the techniques used in Web mining?

user mining

29) NORA is a A) profiling technology used by the EU. B) federal privacy law protecting networked data. C) data analysis technology that finds hidden connections between data in disparate sources. D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.

C

40) FIP principles are based on the notion of the A) accountability of the record holder. B) responsibility of the record holder. C) mutuality of interest between the record holder and the individual. D) privacy of the individual.

C

62) The most common source of business system failure is A) software bugs. B) software errors. C) hardware or facilities failures. D) data quality.

D

9) Data gathered by online behavioral tracking firms is limited to the user's behavior on a single Web site.

FALSE

DSS are a special category of GIS. True False

False

38) According to the ________, you should take the action that produces the least harm. A) Categorical Imperative B) Risk Aversion Principle C) Utilitarian Principle D) Golden Rule .

B

1) Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

FALSE

70) ________ can be induced by tens of thousands of repetitions under low-impact loads. A) CTS B) CVS C) RSI D) Technostress

C

28) Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? A) property rights and obligations B) system quality C) accountability and control D) information rights and obligations

D

51) In the United States, the claim to privacy is protected primarily by each of the following except A) Constitutional guarantees of freedom of speech and association. B) Privacy Act of 1974. C) Fourth Amendment protections against unreasonable search and seizure. D) COPPA.

D

57) One of the difficulties of patent protection is A) that only the underlying ideas are protected. B) digital media cannot be patented. C) preventing the ideas from falling into public domain. D) the years of waiting to receive it.

D

63) The "do anything anywhere" computing environment can A) make work environments much more pleasant. B) create economies of efficiency. C) centralize power at corporate headquarters. D) blur the traditional boundaries between work and family time.

D

The chapter case discussing Dick's Sporting Goods stores illustrates the use of DSS to enable greater supplier intimacy. MIS to achieve greater operational excellence. ESS to enable better decision-making. CDSS to enable greater customer intimacy.

DSS to enable greater supplier intimacy

14) According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.

FALSE

As discussed in the chapter case, the system used in South Carolina to estimate and map the regional damage and losses resulting from an earthquake was a type of CDSS GSS GIS GDSS

GIS

A well-designed ESS will allow management to have greater span of control. assign lower levels of management greater control. reduce their need to review lower levels of operation. all of these.

all of these

american tobacco company

controlled 90% of america's tobacco at this time. James buchannan aka buck duke undersells the competition by 1890 he convinces a few of his competitors to merge together forming this company

The five classical functions of managers are planning, organizing, deciding, controlling, and coordinating. leading. managing. negotiating.

coordinating

The last step in analyzing an ethical issue should be to identify the stakeholders people who have a vested interest in the outcome of the decision

false

The last step in analyzing an ethical issue should be to identify the stakeholders, people who have a vested interest in the outcome of the decision

false

at&t

first telephone company founded by edison in 1885. connected people, and began to eliminate regional differences. Virtual monopoly over long-distance calling. Used a party-line system, one line runs between many.

alva fisher

inventor of the washing machine by using electric motors and galvanizing the tub to wash the clothing. He invented the first washing machine in the year 1908

A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy.

just-in-time

A field identified in a record as holding the unique identifier for that record is called the

key field.

Which of the following is an important capability for sales processes that is found in most major CRM software products?

lead management

A managerial element in the UPS tracking system described in the chapter is A) taking inventory. B) providing package status reports to customers. C) the decision to use automation. D) in-house package tracking software

C) the decision to use automation.

A collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively is called a(n) A) industry value chain. B) business ecosystem. C) value web. D) consortia.

C) value web

A benefit of using TCO analysis to evaluate an information technology investment is that it is able to incorporate intangible and "soft" factors such as benefits and complexity costs

FALSE

A hotel reservation system is a typical example of a management information system.

FALSE

Case-based reasoning is not well suited for diagnostic systems in medicine

FALSE

Data is information that has been shaped into a form that is meaningful to human beings

FALSE

Disintermediation provides major benefits to the distributor.

FALSE

DoS attacks are used to destroy information and access restricted areas of a company's information system.

FALSE

Exchanges have become one of the most popular types of Net marketplace because they encourage competitive bidding that drives prices down.

FALSE

Expert systems are the primary tools used for knowledge discovery

FALSE

Expert systems work by applying a set of AND/OR rules against a knowledge base, both of which are extracted from human experts

FALSE

Fuzzy logic systems "learn" patterns from large quantities of data by sifting through data, searching for relationships, building models, and correcting over and over again the model's own mistakes

FALSE

High-availability computing is also referred to as fault tolerance.

FALSE

In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment.

FALSE

In social business, firms use social networks for coordinating production tasks.

FALSE

In the technique of product customization, merchants customize marketing messages to specific individuals by adjusting the message for the person's name and interests.

FALSE

Information systems literacy describes the behavioral approach to information systems, whereas computer literacy describes the technical approach

FALSE

Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach

FALSE

Intranets allow firms to work easily with third-party suppliers & vendors

FALSE

OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases.

FALSE

One of the drawbacks to OODBMS are that they cannot work with applets

FALSE

Political conflict is an example of the people dimension of business problems

FALSE

Structured knowledge is explicit knowledge that exists in informal documents

FALSE

Studies have consistently shown that firms that invest greater amounts in information technology receive greater benefits than firms that invest less.

FALSE

The disadvantage of using a Web interface is that it typically requires substantial changes to the internal database.

FALSE

The goal of behavioral targeting is to increase the size of the audience to whom the advertiser can market a product.

FALSE

The information systems steering committee is composed of information systems managers and end-user managers responsible for overseeing several specific information systems projects.

FALSE

The range of Wi-Fi networks can be extended up to two miles by using external antennae.

FALSE

There are 4 major business functions: Sales & Marketing, Manufacturing & production, finance & accounting, and information technology

FALSE

There are two types of outsourcing: offshore outsourcing and foreign outsourcing

FALSE

Transaction processing systems are most commonly used by the senior management level of an organization.

FALSE

User concerns and designer concerns are usually the same at the beginning of the project but may diverge later as the system is built.

FALSE

VRML requires the use of a powerful server as well as large amounts of bandwidth

FALSE

Business processes are logically related tasks for accomplishing tasks that have been formally encoded by an organization.

False, they are called business functions not processes.

nicola tesla

Father of AC Current, Father of the Radio. His discoveries laid the groundwork for many of the 20th century's technological advances.

Computers are only part of an information system.

TRUE

If an intended benefit of an IT project is improved decision making, managers should develop a set of metrics to quantify the value of an improved decision

TRUE

In order to understand how a specific business firm uses information systems, you need to know something about the history and culture of the company

TRUE

Increasingly, voice, video, and data communications are all based on Internet technology.

TRUE

Information asymmetry exists when one party in a transaction has more information for the transaction than the other party.

TRUE

Many applications today require databases that can store and retrieve multimedia.

TRUE

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

TRUE

Net marketplaces may either support contractual purchasing based on long-term relationships with designated suppliers or short-term spot purchasing.

TRUE

OODBMS are slower than relational DBMS

TRUE

Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information.

TRUE

Public key encryption uses two keys.

TRUE

The systems analyst is the catalyst for the entire change process and is responsible for making sure that everyone involved accepts the changes created by a new system.

TRUE

To create a computer network, you must have at least two computers.

TRUE

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

TRUE

The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.

True

31) The five classical functions of managers are planning, organizing, deciding, controlling, and A) coordinating. B) leading. C) managing. D) negotiating.

A

19) A primary benefit of offshore outsourcing is that this can substantially reduce hidden costs.

FALSE

19) High-availability computing is also referred to as fault tolerance.

FALSE

4) Eighty-five percent of online retailers now have m-commerce Web sites.

FALSE

4) TQM describes the measurement of quality as 3.4 defects per million.

FALSE

19) Web-based tools for videoconferencing and electronic meetings are the primary tools for GDSS.

FALSE

20) Systems development activities always take place in sequential order.

FALSE

MIS job growth is projected to be 50% greater than other jobs in the next five years

True

5) In component-based development, applications are developed one small portion at a time, with each portion able to function independently.

FALSE

6) Most American and European privacy law is based on a set of five principles called COPPA.

FALSE

7) Documentation reveals how well the system has met its original objectives.

FALSE

the WiMax standard can transmit up to a distance of approximately

30 miles

terrence powderly

An important leader of the Knights of Labor who dropped the clandestine aspect. Eventually began to grow as an organiztion that started at 100,000 members to nearly 800,000 in 1886.

A business model describes how a company produces, delivers, and sells a product or service to create wealth

TRUE

A data warehouse may be updated by a legacy system.

TRUE

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?

Peer-to-peer network

6) Viruses can be spread through e-mail.

TRUE

Mobile search makes up 20% of all Internet searches.

True

3) The Internet shrinks information asymmetry.

True

imperial tobacco company

a british multinational tobacco company that controlled the areas that the british empire had. divided the new world into zones of influence. Buck duke recognized as the largest shareholder

horatio alger

a prolific 19th-century American author. His writings were characterized by the "rags-to-riches" narrative, which had a formative effect on America during the Gilded Age. He secured his literary niche in 1868 with the publication of his fourth book Ragged Dick, the story of a poor bootblack's rise to middle-class respectability, which was a huge success.

charles sumner

a radical republican who pointed people out for being pro-slaery/pro-south. almost dies from being hit with a cane.

interstate commerce commission

a regulatory agency in the United States created by the Interstate Commerce Act of 1887. The agency's original purpose was to regulate railroads (and later trucking) to ensure fair rates, to eliminate rate discrimination, and to regulate other aspects of common carriers, including interstate bus lines and telephone companies

Which of the following best illustrates the transaction fee revenue model? a) EBay receives a small fee from a seller if a seller is successful in selling an item b) Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase c) Flickr provides basic services for free, but charges a premium for advanced services d) Apple accepts micropayments for single music track downloads

a) EBay receives a small fee from a seller if a seller is successful in selling an item

Specialized systems built for engineers, scientists, and other knowledge workers charged with discovering and creating new knowledge for a company are called ______ a) KWS b) LMS c) wikis d) CAD systems

a) KWS

Software that manages the resources of the computer is called a) Operating system software b) application software. c) Data management software. d) network software

a) Operating system software

Which of the following is a responsibility that is most associated with the work of a CEO or chief executive officer of a large company? a) linking the company with the external environment b) reviewing annual pay raises for all employees c) monitoring short-term performance by task forces and committees d) conducting hiring interviews for new college graduates

a) linking the company with the external environment

A "No Smoking" rule and a sexual harassment policy are examples of __________ that are types of __________ in organizations. a) long-range plans; policies b) single-use plans; means-ends chains c) policies; standing-use plans d) operational plans; short-range plans

a) long-range plans; policies

all of the following are major features of organizations that impact the use of information systems except for

agency costs

louis sullivan

american architect, gateway to the west, father of the skyscraper, 9 stories tall, wainright building, downtown real estate skyrockets because of expanding business

henry bessemer

an English engineer, inventor, and businessman. his name is chiefly known in connection with the Bessemer process for the manufacture of steel.

An information skill important for an accounting major would be:

an understanding of online transaction and reporting systems

An information skill important for a marketing major would be:

an understanding of product management enterprise systems

Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications.

analytical CRM

Analyzing customer buying patterns is an example of

analytical CRM.

Which of the following describes a difference between neural networks and genetic algorithms? a) genetic algorithms are designed to process large amounts of information b) genetic algorithms are a type of knowledge discovery, while neural networks are an intelligent technique c) neural networks are programmed to "learn" d) all of the above

c) neural networks are programmed to "learn"

NORA is a a) profiling technology used by the EU b) federal privacy law protecting networked data c) new data analysis technology that finds hidden connections between data in disparate sources d) sentencing guideline adopted in 1987 mandating stiff sentences on business executives

c) new data analysis technology that finds hidden connections between data in disparate sources

The planning process isn't complete until _________. a) future conditions have been identified b) stretch goals have been set c) plans are implemented and results evaluated d) budgets commit resources to plans

c) plans are implemented and results evaluated

Which supply chain planning function determines how much product is needed to satisfy all customer demands?

demand planning

Which of the following is not one of the current changes taking place in information systems technology

development of videopresence software

Bandwidth is the

difference between the highest and lowest frequencies that can be accommodated on a single channel.

An ESS commonly uses a(n) ________ to display an array of charts and graphs of a business's key performance indicators.

digital dashboard/dashboard

In TCP/IP, IP is responsible for

disassembling and reassembling of packets during transmission.

DBMSs typically include report-generating tools in order to

display data in an easier-to-read format

DBMSs typically include report-generating tools in order to

display data in an easier-to-read format.

military reconstruction act

divided the south into 5 military districts, and essentially put the south into military control

A company's organizations and processes for distributing and delivering products to the final customers is the

downstream portion of the supply chain.

GDSS require a small number of attendees in order to maintain high levels of productivity. enable increasing a meeting size without reducing productivity. include specific procedures for priority ranking the order in which participants can respond. utilize shared desktop computers to foster collaboration.

enable increasing a meeting size without reducing productivity.

the four major enterprise applications are

enterprise systems, SCMs, CRMs, and KMSs.

A schematic of the entire database that describes the relationships in a database is called a(n)

entity-relationship diagram.

the network standard for connecting desktop computers into local area networks that enable the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is

ethernet

the ethical "no free lunch" rule states that

everything is owned by someone else, and that the creator wants compensation for this work

Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.

execution

which of the following is not one of the competitive forces

external environment

11) Podcasting allows subscribers to listen to live, streaming radio and other audio content.

false

connecting geographically remote computers in a single network to create a "virtual supercomputer" is called

grid computing

which of the following is not one of the current software platform trends

grid computing

the marketplace for computer hardware

has become increasingly concentrated in top firms

ESS support the structured decision making of senior executives. have the ability to drill down into lower levels of detail. easily integrate data from different systems. are primarily driven by information derived from a company's transaction processing systems.

have the ability to drill down into lower levels of detail.

herbert spencer

he applied charles darwin's theory of natural selection to society and economics. Gives us the phrase "survival of the fittest"

henry ford

he implemented the assembly line model into his automobile factories. mass-production brought the price of automobiles down considerably. first big seller was the Model T in 1914. He made automobiles a necessity to american life.

buck duke

he was a u.s. tobacco industrialist known for the introduction of modern cigarette manufacture and marketing. acquired a license to use the first automated cigarette making machine , by 1890 he supplied 40% of the american cigarette market

From your reading of the chapter's opening case, NVIDIA implemented new information systems in order to achieve which of the following business objectives?

improved decision making

The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and

improved decision making

Verizon's implementation of a Web-based digital dashboard to provide managers with real-time information, such as customer complaints, is an example of:

improved decision making

Which of the following is not one of the key challenges facing global supply chains?

increased costs

The business value of an effective supply chain management system includes all of the following except

increased inventory levels.

All of the following describe the effects of globalization, except:

increases in transaction costs

A field identified in a table as holding the unique identifier of the table's records is called the

primary key.

Supply chain complexity and scale increases when firms

produce products and services that coordinate with hundreds or more firms and suppliers.

Which of the following is not one of the main problems with a traditional file environment?

program-data independence

A planned series of related activities for achieving a specific business goal is called a(n) ________.

project

thomas edison

regarded as one of history's most influential inventors, whose contributions to the modern era transformed the lives of people the world over. He is best known for having invented the electric light bulb, the phonograph, and the first motion-picture camera

One of the most frequent errors in problem solving is:

rushing to judgment

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?

safety stock

Identifying customers is a responsibility of the _______________ function

sales and marketing

Operational CRM applications include tools for

salesforce automation.

which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down

scalability

A(n) ________ is a method for deciding among alternative systems based on a system of ratings for selected objectives

scoring model

james watt

scottish inventor who was known for making improvements to the steam engine

In a relational database, the three basic operations used to develop useful sets of data are

select, project, and join

in a relational database, the three basic operations used to develop useful sets of data are

select, project, and join

A pivot table is a spreadsheet tool that displays two or more dimensions of data in a convenient format. type of relational database. chart tool that can rotate columnar data quickly and visually. tool for performing sensitivity analysis.

spreadsheet tool that displays two or more dimensions of data in a convenient format.

The use of information systems because of necessity describes the business objective of:

survival

according to Leavitt's model of organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are

tasks, technology, people, and structure

which type of infrastructure services provides voice and video connectively to employees, customers, and suppliers

telecommunications

Which of the following services enables logging on to one computer system and working on another?

telnet

A database that receives employee manual input of customer names and addresses is riddled with errors and you have been charged with rectifying the situation. In taking an organizational perspective of this problem, you would be considering:

the types of reviews in place for selecting data input personnel

royal air force

the united states led the world in pioneering aviation but then the british incorporated it into their military first. they were known as the ________

The child domain of the root is the

top-level domain.

industrial revolution

transition to new manufacturing processes in the period from about 1760 to 1840. this transition marks a major turning point in history. in particular, average income and population produced a sustained growth.

13) Ninety-six percent of all U.S. households with Internet access use a broadband connection.

true

16) Net marketplaces may either support contractual purchasing based on long-term relationships with designated suppliers or short-term spot purchasing

true

18) Automobile manufacturing is an example of a vertical market.

true

8) Telecommunications hardware and software is typically the least costly portion of a Web site budget

true

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game

true

Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.

true

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect

true

39) Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information? A) Privacy Act of 1974 B) Gramm-Leach-Bliley Act of 1999 C) Freedom of Information Act D) HIPAA of 1996

A

27) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called A) profiling. B) phishing. C) spamming. D) targeting.

A

30) Accepting the potential costs, duties, and obligations for the decisions you make is referred to as A) responsibility. B) accountability. C) liability. D) due process.

A

34) A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? A) Kant's Categorical Imperative B) the Golden Rule C) the Risk Aversion Principle D) the "No free lunch" rule

A

67) Re-designing and automating business processes can be seen as a double-edged sword because A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge.

A

69) Which two of the following issues are privacy advocates and advertising industry most in conflict over? (Select two of the following.) A) an opt-in policy required at all sites B) a national Do-Not-Track list C) an opt-out policy required at all sites D) disclosure and transparency in the use of Flash or super cookies

A & B

23) The introduction of new information technology has a A) dampening effect on the discourse of business ethics. B) ripple effect raising new ethical, social, and political issues. C) beneficial effect for society as a whole, while raising dilemmas for consumers. D) waterfall effect in raising ever more complex ethical issues.

B

31) The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called A) liability. B) due process. C) the courts of appeal. D) accountability.

B

36) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is A) acceptable, because the grocer suffers the least harm. B) acceptable, because the higher value is the survival of the family. C) wrong, because the man would not want the grocer to steal from him. D) wrong, because if everyone were to do this, the concept of personal property is defeated.

B

47) When a cookie is created during a Web site visit, it is stored A) on the Web site computer. B) on the visitor's computer. C) on the ISP's computer. D) in a Web directory.

B

50) A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. A) opt-in B) opt-out C) P3P D) PGP

B

52) Which of the following statements about trade secrets is not true? A) Trade secret protections vary from state to state. B) Any intellectual product, regardless of its purpose, can be classified as a trade secret. C) Software that contains unique elements can be claimed as a trade secret. D) Trade secret law protects the actual ideas in a product.

B

55) "Look and feel" copyright infringement lawsuits are concerned with A) the distinction between tangible and intangible ideas. B) the distinction between an idea and its expression. C) using the graphical elements of another product. D) using the creative elements of another product.

B

61) It is not feasible for companies to produce error-free software because A) any programming code is susceptible to error. B) it is too expensive to create perfect software. C) errors can be introduced in the maintenance stage of development. D) any software of any complexity will have errors.

B

66) The Do-Not-Track Act of 2011 A) allows firms to track customers if default given is opt-in. B) requires firms to notify customers that they are being tracked. C) allows firms to track customers if they do not sell the information to third parties. D) requires firms to get customer sign-off before tracking them.

B

45) U.S. businesses are allowed to use personal data from EU countries if they A) have informed consent. B) create a safe harbor. C) develop equivalent privacy protection policies. D) make their privacy protection policies publicly available.

C

48) Flash cookies are different from ordinary cookies in that they A) are installed only at the user's request. B) are not stored on the user's computer. C) cannot be easily detected or deleted. D) monitor the user's behavior at a Web site.

C

54) What legal mechanism protects the owners of intellectual property from having their work copied by others? A) patent protection B) intellectual property law C) copyright law D) Fair Use Doctrine

C

68) A tiny software object embedded in a Web page and used by tracking programs to monitor online user behavior is called A) spyware. B) a super cookie. C) a Web beacon. D) a cookie.

C

Saturn.com's "Build Your Own" feature, allowing customers to select the trim, transmission, engine, and other features of a car model is an example of a CDSS GSS GIS GDSS

CDSS

25) In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of A) family and home. B) property rights and obligations. C) system quality. D) quality of life.

D

35) Immanuel Kant's Categorical Imperative states that A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if an action is not right for everyone to take, it is not right for anyone to take.

D

37) The ethical "no free lunch" rule states that A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) everything is owned by someone else, and that the creator wants compensation for this work.

D

41) The Federal Trade Commission FIP principle of Notice/Awareness states that A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there is a mechanism in place to enforce FIP principles. D) Web sites must disclose their information practices before collecting data.

D

42) Which of the following is not one of the practices added in 2010 by the FTP to its framework for privacy? A) Firms should build products and services that protect privacy. B) Firms should increase the transparency of their data collection. C) Firms should require consumer consent and provide clear options to opt out of data collection. D) Firms should limit the length of time that any personal data is stored to six months or less.

D

44) European privacy protection is ________ than in the United States. A) less far-reaching B) less liable to laws C) much less stringent D) much more strict

D

56) The strength of patent protection is that it A) puts the strength of law behind copyright. B) allows protection from Internet theft of ideas put forth publicly. C) is easy to define. D) grants a monopoly on underlying concepts and ideas.

D

64) The practice of spamming has been growing because A) telephone solicitation is no longer legal. B) it is good advertising practice and brings in many new customers. C) it helps pay for the Internet. D) it is so inexpensive and can reach so many people.

D

12) The Copyright Office began registering software programs in the 1990s

FALSE

15) The key concepts in patent law are originality, novelty, and value.

FALSE

16) Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

FALSE

17) Any unsolicited e-mail is legally considered spam.

FALSE

2) Advances in data storage have made routine violation of individual privacy more difficult.

FALSE

3) The last step in analyzing an ethical issue should be to identify the stakeholders—people who have a vested interest in the outcome of the decision.

FALSE

13) The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.

TRUE

18) The European Parliament has passed a ban on unsolicited commercial messaging.

TRUE

4.) Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

TRUE

5) Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

TRUE

7) Spyware is software that comes hidden in downloaded applications and can track your online movements.

TRUE

8) Most Internet businesses do very little to protect the privacy of their customers.

TRUE

Crypto-Currency is a digital/virtual currency that uses cryptography methods for security, thus increasing the difficulty associated with counterfeiting measures.

TRUE

The classical model of management does not address what exactly managers do when they plan, decide things, and control the work of others. True False

True

The intelligence phase of decision making consists of discovering, identifying, and understanding the problems occurring in the organization. True False

True

The leading methodology for understanding the really important information needed by a firm's executives is called the ________ method. digital dashboard balanced scorecard KPI data visualization

balanced scorecard

The components of a DSS are the internal corporate database, external data sources, and analysis tools. data visualization tools, software, and graphics capabilities. database, graphics capabilities, and analysis tools. database, software system, and user interface.

database, software system, and user interface.

Backward sensitivity analysis software is used for supply chain optimization. historical what-if analysis. goal seeking. reverse forecasting.

goal seeking

As discussed in the chapter text, the three main reasons that investments in information technology do NOT always produce positive results are management support, technical logistics, and user compliance. organization, environment, culture. information quality, information integrity, and information accuracy. information quality, organizational culture, and management filters.

information quality, organizational culture, and management filters.

Simon's description of decision making consists of which four stages? planning, financing, implementation, and maintenance. planning, design, implementation, and maintenance. intelligence, design, choice, and implementation. intelligence, design, financing, and implementation.

intelligence, design, choice, and implementation.

The easy use of graphics in an ESS allows the user to look at more data in less time with greater clarity. use creative analysis. quickly manipulate TPS and historical data. decentralize decision making.

look at more data in less time with greater clarity.

When there is no well-understood or agreed-on procedure for making a decision, it is said to be undocumented. unstructured. documented. semistructured.

unstructured


संबंधित स्टडी सेट्स

Ch. 5 Short Term & Working Memory

View Set

American Literature - 6.09 Unit Test: The American Voice Part 1

View Set

IGCSE CIE ICT: 1 Types and components of computer systems

View Set

Possible Questions Chapter 11 - 14

View Set

Science Chapter 10: Energy-Lesson 1-What is Energy?

View Set

What is the relationship between millimeters, centimeters, meters and kilometers?

View Set