CH 1-7
"Look and feel" copyright infringement lawsuits are concerned with A) the distinction between tangible and intangible ideas. B) the distinction between an idea and its expression. C) using the graphical elements of another product. D) using the creative elements of another product. E) preventing the use of another product's graphical user interface.
B
Maintaining the organization's financial records is a central purpose of which main business function? A) manufacturing and accounting B) finance and accounting C) sales and manufacturing D) finance and sales E) human resources
B
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as A) wireless hubs. B) hotspots. C) touch points. D) hot points. E) netcenters.
B
An alternative to using application server software for interfacing between a Web server and back-end databases is A) CGI. B) HTML. C) Java. D) SQL. E) NoSQL
A
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n) A) uniform resource locator. B) IP address. C) child domain. D) root domain. E) third-level domain.
A
Using ________ to enable government relationships with citizens, businesses, and other arms of government is called e-government. A) the Internet and networking technologies B) e-commerce C) e-business D) any computerized technology E) telecommunications
A
Using the Internet to buy or sell goods is called A) e-commerce. B) e-business. C) an intranet. D) an extranet. E) digital commerce
A
Web sites that enable users to share information, collaborate, and create new services and content are called ________ sites. A) second generation B) mashup C) first generation D) third generation E) new wave
A
What is the foundation technology for Web services? A) XML B) HTML C) SOAP D) UDDI E) SCSI
A
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A) HIPAA B) Gramm-Leach-Bliley Act C) Privacy Protection Act D) Freedom of Information Act E) COPPA
A
Which of the following are key corporate assets? A) intellectual property, core competencies, and financial and human assets B) production technologies and business processes for sales, marketing, and finance C) knowledge and the firm's tangible assets, such as goods or services D) time and knowledge E) significant business relationships
A
________ states that the value or power of a network grows exponentially as a function of the number of network members. A) Metcalfe's Law B) Moore's Law C) Law of scalability D) Law of outsourcing E) Law of networks
A
Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete? A) network economics model B) competitive forces model C) competitive advantage model D) demand control model E) agency costs model
B
Which of the following best describes how new information systems result in legal gray areas? A) They work with networked, electronic data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. E) They are little understood by politicians or lawyers.
B
Verizon Corporation's use of a Web-based digital dashboard to provide managers with precise real-time information illustrates which business objective? A) improved flexibility B) improved decision making C) competitive advantage D) survival E) customer and supplier intimacy
B
Web browser software requests Web pages from the Internet using which protocol? A) FTP B) HTTP C) DNS D) URL E) HTML
B
What is the most important function of an enterprise application? A) increasing speed of communicating B) enabling business functions and departments to share information C) enabling a company to work collaboratively with customers and suppliers D) enabling cost-effective e-business processes E) enabling inventory and supply chain management
B
What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) DNS C) FTP D) HTTP E) IP
B
When a software product is considered ________, it becomes difficult to hold software producers liable for flaws in their product. A) to be part of a machine B) similar to books C) a service D) to be an artistic expression E) a tangible product rather than a service
B
Which main business function is responsible for maintaining employee records? A) sales and marketing B) human resources C) finance and accounting D) manufacturing and production E) middle management
B
In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is A) middle management. B) service workers. C) production management. D) operational management. E) knowledge workers.
D
4) Which of the following is a leading networking hardware provider? A) Dell B) Intel C) Seagate D) IBM E) Cisco
E
The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is A) management science. B) MIS. C) computer science. D) utilization management. E) operations research.
E
The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called A) information systems literacy. B) information systems architecture. C) business processes. D) information technology infrastructure. E) management information systems.
E
The logical view of a database: A) displays the organization and structure of data on the physical storage media B) includes a digital dashboard C) allows the creation of supplemental support D) enables users to manipulate the logical structure of the database E) presents data as they would be perceived by the end user
E
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called A) ATM. B) multiplexing. C) packet shifting. D) packet routing. E) packet switching.
E
The most appropriate wireless networking standard for creating PANs is A) Wi-Fi. B) I-mode. C) RFID. D) IEEE 802.11b. E) Bluetooth.
E
The most common reason business systems fail is A) software bugs. B) software errors. C) hardware failures. D) facilities failures. E) data quality.
E
The parts of an organization's infrastructure, human resources, technology, and procurement that make the delivery of the firm's products or services possible are known as ________ activities. A) primary B) auxiliary C) secondary D) service E) support
E
A computer network consists of at least three computers.
FALSE
A database record is a grouping of characters into a word, a group of words, or a complete number.
FALSE
A database server is software that handles all application operations between browser-based computers and a company's back-end business applications or databases.
FALSE
A fully digital firm produces only digital goods or services.
FALSE
A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network.
FALSE
All business processes are formally documented by an organization.
FALSE
An NOS must reside on a dedicated server computer in order to manage a network.
FALSE
Central large mainframe computing has largely replaced client/server computing
FALSE
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.
FALSE
Computers make up the entirety of an information system.
FALSE
Creative work driven by new knowledge and information is an insignificant part of management responsibility.
FALSE
Data scrubbing is a more intensive corrective process than data cleansing
FALSE
HTML has become the preferred method of communicating with back-end databases because it is a cross-platform language
FALSE
Implementing a Web interface for an organization's internal database usually requires substantial changes to be made to the database.
FALSE
In a client/server environment, a DBMS is located on a dedicated computer called a Web server.
FALSE
In associations, a data mining tool discovers different groupings within data, such as finding affinity groups for bank cards.
FALSE
In data mining, the technique of predicting uses a series of existing values to determine what other future values will be.
FALSE
Information systems literacy describes the behavioral approach to information systems, whereas computer literacy describes the sociotechnical approach.
FALSE
Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.
FALSE
Knowledge workers make long-range strategic decisions about products and services.
FALSE
Multiple data marts are combined and streamlined to create a data warehouse
FALSE
OLAP is unable to manage and handle queries with very large sets of data
FALSE
RFID technology is being gradually replaced by less costly technologies such as WSNs.
FALSE
Relational DBMSs use key field rules to ensure that relationships between coupled tables remain consistent
FALSE
TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet
FALSE
The DBMS programming language that end users and programmers use to manipulate data in the database is called CGI
FALSE
The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.
FALSE
There are four major business functions: human resources; manufacturing and production; finance and accounting; and information technology.
FALSE
There is little variation in returns on IT investment across firms.
FALSE
A primary example of centralized processing is client/server computing.
False
According to several court findings, the general functional features of software are protected by copyright law.
False
Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person.
False
An inventory control system is an example of an MIS.
False
Application server software is responsible for locating and managing stored Web pages.
False
COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.
False
Cross-functional systems are being phased out in favor of systems that support business processes within a single functional group, such as human resources.
False
Decision-support systems are most commonly used by the operations management level of an organization.
False
For nonroutine decision making, senior managers rely on management information systems.
False
Gaining unapproved access to a computer is not a federal crime.
False
High product differentiation is a sign of a transparent marketplace.
False
IT infrastructure consists of just those physical computing devices required to operate the enterprise.
False
Identifying customers is a business process handled by the human resources function.
False
Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue.
False
In the value chain model, support activities are most directly related to the production and distribution of the firm's products and services, which create value for the customer.
False
In today's legal environment, business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted.
False
Most TPSs use sophisticated mathematical models or statistical techniques.
False
Operational managers use ESS primarily to solve specific problems.
False
Production tasks are coordinated through the use of social networks in social business.
False
Quantum computing is implemented primarily with enterprise or ISP servers.
False
Research has shown that a majority of firms are able to align their information technology with their business goals.
False
SANs maintain a series of servers and provide fee-paying subscribers with space to maintain their Web sites.
False
Software programs were unprotected by copyright law until the early 1990s.
False
Some organizations lack bedrock, unassailable assumptions that define their goals and products.
False
Spam is legally defined as any e-mail that is unsolicited.
False
TCO refers to the original cost of purchased technology: both hardware and software.
False
The European Parliament has yet to ban unsolicited commercial messaging.
False
The competitive forces model cannot be used to analyze modern digital firms which face new competitive forces that are not true of traditional firms
False
The effect of the Internet has been to decrease the bargaining power of customers.
False
The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle.
False
The routine violation of individual privacy is made more difficult by advances in data storage.
False
The technology trends exhibited by Portugal Telecom, as discussed in the chapter opening case, illustrate the shift away from green computing.
False
The use of Internet technologies allows companies to more easily sustain competitive advantage.
False
The value chain model classifies all company activities as primary activities.
False
Web services can exchange information between two different systems only if the operating systems and programming languages upon which the systems are based are identical.
False
You would use an MIS to help determine if your business should introduce a new product line.
False
A business model describes how a company produces, delivers, and sells a product or service to create wealth.
TRUE
A firm that invests in a strong IS development team is making an investment in organizational complementary assets.
TRUE
A physical view shows data as it is actually organized and structured on the data storage media.
TRUE
An application that transfers information from an organization's internal database to a Web server for delivery as part of a Web page to the user is called middleware
TRUE
An attribute is a characteristic or quality used to describe a particular entity
TRUE
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire
TRUE
Complicated groupings of data in a relational database need to be adjusted to eliminate awkward many-to-many relationships
TRUE
DBMS have a data definition capability to specify the structure of the content of the database
TRUE
Databases record information about general categories of information referred to as entities
TRUE
Developing a new product, hiring a new employee, and fulfilling an order are examples of business processes.
TRUE
Every record in a file should contain at least one key field
TRUE
Fiber-optic cable is more expensive and harder to install than wire media.
TRUE
High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.
TRUE
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
TRUE
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
TRUE
Internet advertising is growing at approximately 15 percent a year.
TRUE
Intranets link different systems and networks within a firm.
TRUE
Investment in IT is 33% of all invested capital.
TRUE
Laws and regulations creating fair, stable market environments are examples of complementary social assets required to optimize returns from IT investments.
TRUE
Legacy systems are used to populate and update data warehouses
TRUE
Mobile search makes up at least 50% of all Internet searches.
TRUE
More than 50% of U.S. Internet users access the Internet via mobile devices.
TRUE
NoSQL technologies are used to manage sets of data that don't require the flexibility of tables and relations
TRUE
Telephone networks are fundamentally different from computer networks.
TRUE
The Domain Name System (DNS) converts domain names to IP addresses.
TRUE
The behavioral approach to information systems leaves aside technical solutions to instead analyze the psychological, social, and economic impacts of systems.
TRUE
The coupling of data with the software programs that manipulate the data, such that changes in programs requires changes to the data, is called program-data dependence .
TRUE
The logical and physical views of data are separated in a DBMS.
TRUE
The organizational function that is in charge of policies and procedures for managing internal data resources is called data administration.
TRUE
The policies and processes for managing the integrity and security of data in a firm are referred to as data governance
TRUE
The three main dimensions of information systems are management, organizations, and information technology.
TRUE
To analyze unstructured data, such as memos and legal cases, you would use text mining tools.
TRUE
To perform multidimensional data analysis, you would use OLAP.
TRUE
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
TRUE
UPS's use of Web-based tools that allow customers to embed UPS functions such as tracking and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy.
TRUE
VoIP technology delivers voice information in digital form using packet switching.
TRUE
Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.
TRUE
Wikis allow visitors to change or add to the original posted material.
TRUE
With in-memory computing, a computer's primary memory (RAM) is used for processing
TRUE
You can manipulate data on a Web server by using a CGI script.
TRUE
You need to know something about the hierarchy and culture of the company in order to understand how a specific business firm uses information systems
TRUE
A collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively is called a(n) A) industry value chain. B) business ecosystem. C) value web. D) consortia. E) synergy chain.
C
A competitive force challenging the publishing industry is A) positioning and rivalry among competitors. B) low cost of entry. C) substitute products or services. D) customers' bargaining power. E) suppliers' bargaining power.
C
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
True
Global firms can collaborate from different locations at the same time using synchronous collaboration tools.
True
Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.
True
In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers.
True
In a demonstration of network economics, the more people that use eBay's site, the greater the value of the site.
True
In green computing, reducing computer power consumption is a top priority.
True
In recent years, the illegal sharing of music files has declined with the improvement of technological prevention.
True
Information systems are used to enable new products and services via product differentiation.
True
Information systems technology can be viewed as a factor of production that can be substituted for traditional capital and labor from the point of view of economics.
True
Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses.
True
Liability is a feature of political systems and allows individuals to recover damages done to them by others.
True
MIS job growth is projected to be 50% greater than other jobs in the next five years.
True
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
True
Mass customization offers individually tailored products or services using the same resources as mass production.
True
Most Internet businesses do very little to protect the privacy of their customers.
True
One example of a business process is shipping a product to a customer.
True
One of the key concepts in patent law is novelty.
True
Routines are also called standard operating procedures.
True
Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
True
Supply chain management systems are more externally oriented than enterprise systems.
True
Switching costs increase when customers are strongly linked to products and platforms.
True
The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.
True
The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.
True
The operating system is used to manage the computer's activities.
True
The problem with Web browsers' Do Not Track options is that Web sites aren't obligated to honor these settings.
True
The rate of global piracy is approximately 42%.
True
The symptoms of technostress include aggravation and hostility toward humans.
True
The term business ecosystem describes the loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers.
True
Today, many business firms continue to operate their legacy systems that meet a business need and would be costly to replace
True
Transaction-level information is essential for operational management to be able to direct the day-to-day operations of the business.
True
Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user's online behavior.
True
Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks.
True
In terms of data relationships, associations refers to A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings. E) relationships between different customers
c
26) The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is A) Unix. B) Linux. C) OS X. D) COBOL. E) DOS.
A
4G networks use which standards? A) LTE and WiMax B) T-Mobile and AT&T C) GSM and LTD D) CDMA and PAN E) LTE and LTD
A
A DBMS makes the A) physical database available for different logical views. B) relational database available for different logical views. C) physical database available for different analytical views. B) relational database available for different analytical views. D) logical database available for different analytical views.
A
A field identified in a table as holding the unique identifier of the table's records is called: A) primary key B) key field C) primary field D) unique ID E) primary entity
A
A firm can exercise greater control over its suppliers by having A) more suppliers. B) fewer suppliers. C) global suppliers. D) local suppliers. E) regional suppliers.
A
A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle? A) Kant's Categorical Imperative B) The Golden Rule C) The Risk Aversion Principle D) The "No free lunch" rule E) The slippery-slope rule
A
A substitute product of most concern for a cable TV distributor is A) satellite TV. B) broadcast TV. C) satellite radio. D) the Internet. E) terrestrial radio.
A
A virtual company A) uses networks to link people, assets, and ideas. B) uses Internet technology to maintain a virtual storefront. C) uses Internet technology to maintain a networked community of users. D) provides entirely Internet-driven services, or virtual products. E) is limited by traditional organizational boundaries.
A
A(n) ________ is an example of non-digital data storage that is comparable to a database. A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet E) schedule of due dates on a project outline
A
A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption. A) multicore processor B) legacy processor C) scalable processor D) aggregate circuit E) green circuit
A
A(n) ________ is typically a major source of data for other systems. A) transaction processing system B) management information system C) executive support system D) decision-support system E) knowledge management system
A
All of the following are considered disruptive technologies except A) instant messaging. B) e-mail. C) Internet telephony. D) PCs. E) smartphones
A
All of the following are technologies used to analyze and manage big data except A) cloud computing B) noSQL C) in-memory computing D) analytic platforms E) Hadoop
A
All of the following statements are true about information technology's impact on business firms except A) it helps firms expand in size. B) it helps firms lower the cost of market participation. C) it helps reduce internal management costs. D) it helps reduce transaction costs. E) it helps reduce agency costs.
A
All of the following statements regarding IBM Notes are true except which one? A) It began as an e-mail and messaging client. B) It is a widely used collaboration tool at larger firms. C) It provides capabilities for wikis and microblogging. D) It provides tools for full version control of all company documentation. E) It is designed to provide security for sensitive corporate information.
A
Amazon's use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates a use of information services for A) low-cost leadership. B) marketing effectiveness. C) focusing on market niche. D) strengthening supplier intimacy. E) developing synergies.
A
An activity businesses perform to measure and compare business processes to similar processes of other companies within their industry is A) benchmarking. B) best practices. C) value chain analysis. D) strategic systems analysis. E) secondary activities.
A
An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the A) data dictionary. B) data definition diagram. C) entity-relationship diagram. D) relationship dictionary. E) Data Table
A
An example of a business using information systems to attain operational excellence is A) Wal-Mart's Retail Link system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod. E) Citibank's ATMs.
A
An example of a keystone firm within a business ecosystem is A) Apple and software application writers in the mobile platform ecosystem. B) GUESS and the fashion ecosystem. C) Citibank and the ATM ecosystem. D) American Airlines and the computerized reservation ecosystem. E) Nike and the athletic apparel ecosystem.
A
An example of a social complementary asset is A) technology and service firms in adjacent markets. B) training programs. C) distributed decision-making rights. D) incentives for management innovation. E) a strong IS development team.
A
An example of an organizational complementary asset is A) using the appropriate business model. B) a collaborative work environment. C) laws and regulations. D) the Internet. E) strong senior management.
A
An organization is seen as a means by which primary production factors are transformed into outputs consumed by the environment according to the ________ definition of organizations. A) microeconomic B) macroeconomic C) sociotechnical D) behavioral E) psychological
A
As discussed in the chapter opening case, which of the four generic strategies did T.J. Maxx employ to combat the competition offered by Target, Kohls, Walmart, Macy's and pure online stores likeRue LaLa and Gilt Groupe?
A
As discussed in the chapter, all of the following are steps in the process for analyzing an ethical issue except A) assigning responsibility. B) identifying the stakeholders. C) identifying the options you can reasonably take. D) identifying and clearly describing the facts. E) identifying the potential consequences of your options.
A
As per the ________, if an action cannot be taken repeatedly, it is not right to take at all. A) slippery-slope rule B) lemming rule C) high-failure cost rule D) utilitarian principle E) Golden Rule
A
Big data does not refer to A) datasets with fewer than a billion records B) datasets with unstructured data C) machine-generated data D) data created by social media E) data from Web Traffic
A
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) eight B) five C) twenty D) two E) fifteen
A
CVS refers to A) eyestrain related to computer display screen use. B) a business practice that attempts to evaluate the intangible values of computer systems. C) carpal vision syndrome. D) a type of antivirus protection software. E) wrist injuries brought about by incorrect hand position when using a keyboard.
A
Data ________ occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy
A
Executive support systems are information systems that support the A) long-range planning activities of senior management. B) knowledge and data workers in an organization. C) decision making and administrative activities of middle managers. D) day-to-day processes of production. E) transactional needs of the organization.
A
From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called A) the information value chain. B) the IT value chain. C) information processing. D) feedback. E) dissemination.
A
Hardware and software acquisition costs account for about ________ percent of TCO. A) 20 B) 40 C) 50 D) 75 E) 90
A
How are information systems used at the industry level to achieve strategic advantage? A) by building industry-wide, IT-supported consortia and symposia B) by raising the bargaining power of suppliers C) by encouraging the entry of new competitors D) by enforcing standards that reduce the differences between competitors E) by decreasing switching costs
A
In TCP/IP, IP is responsible for A) disassembling and reassembling of packets during transmission. B) moving packets over the network. C) establishing an Internet connection between two computers. D) breaking messages down into packets. E) sequencing the transfer of packets.
A
In a relational database, a record is referred to in technical terms as a(n) A) tuple B) row C) entity D) field E) key
A
Mintzberg classifies a large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management as a ________ bureaucracy. A) machine B) professional C) divisionalized D) multidivisional E) ad hoc
A
OLAP is a tool for enabling A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data. E) users to quickly generate
A
Order data for baseball tickets and bar code data are examples of A) raw input. B) raw output. C) customer and product data. D) sales information. E) information systems.
A
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as A) software packages. B) mashups. C) outsourced software. D) open-source software. E) service level agreements.
A
Re-designing and automating business processes can be seen as a double-edged sword because A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. E) senior executives may not approve the changes.
A
Running a Java program on a computer requires A) a Java Virtual Machine to be installed on that computer. B) a Java Virtual Machine to be installed on the server hosting the Java applet. C) a miniature program to be downloaded to the user's computer. D) no specialized software, as Java is platform-independent. E) the Mozilla Firefox browser and no other browsers.
A
Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to as A) Web services. B) EAI software. C) SOA. D) SOAP. E) SaaS.
A
Sociologists study information systems with an eye to understanding A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods. E) mathematically based models and physical technology.
A
Software that manages the resources of the computer is called A) operating system software. B) application software. C) data management software. D) network software. E) partitioning software.
A
Spamming raises the moral dimension of A) quality of life. B) system quality. C) accountability and control. D) information rights and obligations. E) property rights and obligations.
A
T1 lines A) are high-speed, leased data lines providing guaranteed service levels. B) operate over coaxial lines to deliver Internet access. C) have up to twenty-four 64-Kbps channels. D) operate over existing telephone lines to carry voice, data, and video. E) do not provide guaranteed service levels, but simply "best effort."
A
The Online Privacy Alliance A) encourages self regulation to develop a set of privacy guidelines for its members. B) protects user privacy during interactions with Web sites. C) has established technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information. E) is a lobbying organization promoting the online privacy interests of consumers.
A
The ________ PC, becoming the standard PC in the Personal Computer Era, uses the Windows operating system software on a computer with an Intel microprocessor. A) Wintel B) Dell C) IBM D) Altair E) Digital Equipment Corporation
A
The ________ brought copyright law to the Internet age by outlawing the circumvention of technology-based protections of copyrighted materials. A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act E) Computer Software Copyright Act
A
The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its A) culture. B) environment. C) atmosphere. D) values. E) ethos.
A
The introduction of the minicomputer A) allowed computers to be customized to the specific needs of departments or business units. B) strengthened centralized computing. C) offered new, powerful machines at higher prices than mainframes. D) represented the rise of Microsoft. E) was dominated by IBM.
A
The join operation A) combines relational tables to provide the user with more information than is otherwise available. B) identifies the table from which the columns will be selected. C) creates a subset consisting of columns in a table. D) organizes elements into segments. E) creates a subset consisting of rows in a table
A
The marketplace for computer hardware A) has become increasingly concentrated in top firms. B) has expanded to include a wide variety of start-up and mobile-computing firms. C) has moved significantly to Asian firms. D) has been decimated by mobile and cloud computing. E) has begun moving away from blade servers.
A
The moral dimension of ________ can be described as the obligations that individuals and organizations have concerning rights to intellectual property. A) property rights and obligations B) system quality C) accountability and control D) information rights and obligations E) quality of life
A
The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n) A) information policy B) data definition file C) data quality audit D) data governance policy E) data policy
A
The practice of contracting custom software development to an outside firm is commonly referred to as A) outsourcing. B) scaling. C) service-oriented architecture. D) application integration. E) utility computing.
A
The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called A) cloud computing. B) autonomic computing. C) virtualization. D) multicore processing. E) ubiquitous computing.
A
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called A) normalization. B) data scrubbing. C) data cleansing. D) data defining. E) optimization.
A
The total amount of digital information that can be transmitted through any telecommunications medium is measured in A) bps. B) Hertz. C) baud. D) gigaflops. E) RPMs
A
Thomas Friedman's declaration that the world was now "flat" meant that A) the Internet has reduced the economic advantages of developed countries. B) globalization is starting to offer less advantage to large corporations. C) the global economy is increasingly commanded by fewer and larger corporations. D) global capitalism is homogenizing culture and business practices throughout the world. E) global shipping rates have reached historic lows.
A
To forecast trends in your supplier's industry that could affect your firm over the next five years, you would use a(n) A) ESS. B) TPS. C) MIS. D) DSS. E) KMS.
A
To manage relationships with your customers, you would use a(n) ________ system. A) CRM B) MIS C) CLE D) CLU E) KMS
A
To use the analog telephone system for sending digital data, you must also use A) a modem. B) a router. C) DSL. D) twisted wire. E) TCP/IP.
A
Which of the following best describes intellectual property? A) intangible property created by individuals or corporations B) unique creative work or ideas C) tangible or intangible property created from a unique idea D) the expression of an intangible idea E) any tangible or intangible property within the creative arts
A
Which of the following constitutes an organizational element in the UPS tracking system described in the chapter? A) the specification of procedures for identifying packages with sender and recipient information B) monitoring service levels C) promoting the company strategy of low-cost, superior service D) the use of handheld computers and networks for managing package delivery E) a Web-based Post Sales Order Management System
A
Which of the following is a firm's CPO responsible for? A) ensuring that the company complies with existing data privacy laws B) making better use of existing knowledge in organizational and management processes C) enforcing the firm's information security policy D) overseeing the use of information technology in the firm E) acting as liaison between the information systems group and the rest of the company
A
Which of the following is not an IT infrastructure service component? A) operating system software B) computing platforms to provide a coherent digital environment C) physical facilities management to manage the facilities housing physical components D) IT management services to plan and develop the infrastructure and provide project management E) IT education services that provide training to employees
A
Which of the following represent the primary activities of a firm? A) inbound logistics, operations, outbound logistics, sales and marketing, and service B) inbound logistics, operations, outbound logistics, technology, and service C) procurement, inbound logistics, operations, technology, and outbound logistics D) procurement, operations, technology, sales and marketing, and services E) organization infrastructure, human resources, technology, and procurement
A
Which of the following would not be used as an input for an information system? A) digital dashboard B) handheld computer C) barcode scanner D) cell phone E) RFID reading
A
Which organization helps define the overall structure of the Internet? A) IAB B) W3C C) none (no one "owns" the Internet) D) The Department of Commerce (U.S.) E) ICANN
A
Which signal types are represented by a continuous waveform? A) analog B) RFID C) laser D) digital E) optical
A
Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use? A) on-demand B) grid C) edge D) autonomic E) quantum
A
You have been hired by Inspiration Inc., to help improve their profit margin. Inspiration Inc. is a business communications consultancy that services many clients in different industries throughout the United States. The end products of the company are customized recommendations for the best use of a client's existing resources for improving internal communications, typically delivered via documentation in different media. The company has approximately 100 consultants, all of whom are located in their central headquarters in Chicago. What system do you recommend to improve the company's business processes and increase their profit margin? A) extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed B) CRM, to maintain easily accessible customer records to minimize the time spent looking for client data C) KMS, for minimizing redundant work on similar clients D) marketing system, for improving sales levels E) TPS, to help manage all daily activities and transactions
A
You would use a(n) ________ in order to determine which of your suppliers has the best and worst records for keeping to your production schedule? A) MIS B) TPS C) UPS D) DSS E) CRM
A
________ allows you to communicate with avatars using text messaging. A) A virtual world B) Screen sharing C) Collaborative writing D) A large audience Webinar E) Telepresence
A
________ are not held liable for the messages they transmit. A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials E) European ISPs
A
________ enable management to make better decisions regarding organizing and scheduling sourcing, production, and distribution. A) SCMs B) TPSs C) KMSs D) ERPs E) MISs
A
________ enables advertisers to display more relevant ads based on user's search and browsing history. A) Behavioral targeting B) A Web bug C) NORA D) An intelligent agent E) FIP
A
________ integrate disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Unified communications B) Modems C) Virtual private networks D) Wireless networks E) Intranets
A
________ is a collaboration tool that supports remote (different place), synchronous (same time) collaboration. A) Video conferencing B) E-mail C) A MUD D) A wall display E) A virtual world
A
________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors. A) Product differentiation B) Low-cost leadership C) Customer efficiency D) Mass customization E) Switching cost
A
________ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals. A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware
A
________ means that you accept the potential costs and obligations for the decisions you make. A) Responsibility B) Accountability C) Liability D) Due process E) Duty
A
________ monetizes the value of the data stored by search engines. A) Search engine marketing B) TCP/IP C) WiMax D) Wireless sensor networks E) RSS
A
________ restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information. A) The Privacy Act of 1974 B) The Gramm-Leach-Bliley Act of 1999 C) The Freedom of Information Act D) The FIP set of principles E) COPPA
A
A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n) A) SOA. B) SLA. C) TCO. D) RFQ. E) SaaS.
B
1) The relationship between entities and attributes is best illustrated by A) the entity CUSTOMER with the attribute PRODUCT. B) the entity CUSTOMER with the attribute PURCHASE. C) the entity PRODUCT with the attribute PURCHASE. D) the entity PRODUCT with the attribute CUSTOMER. E) the entity PURCHASE with the attribute CUSTOMER
B
A SAN is a ________ network. A) server area B) storage area C) scalable architecture D) service-oriented architecture E) software arrangement
B
A field identified in a record as holding the unique identifier for that record is called: A) primary key B) key field C) primary field D) unique ID E) key attribute
B
A household appliances manufacturer has hired you to help analyze their social media datasets to determine which of their refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data? A) text mining tools B) sentiment analysis software C) Web usage mining technologies D) data mining software for identifying associations E) data mining software for forecasting
B
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation? A) His action is acceptable, because the grocer suffers the least harm. B) His action is acceptable, because the higher social value is the survival of the family. C) His action is wrong, because the man would not want the grocer to steal from him. D) His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E) His action is wrong, because the grocery store owner is harmed.
B
A network that spans a city, and sometimes its major suburbs as well, is called a A) CAN. B) MAN. C) LAN. D) WAN. E) WSN.
B
A recent addition to the mobile digital platform is A) quantum computing. B) wearable computing devices. C) cloud computing. D) grid computing. E) consumerization of IT.
B
A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business. A) transaction B) enterprise C) automatic reporting D) management information E) knowledge management
B
An example of a business using information systems for customer and supplier intimacy is A) Wal-Mart's Retail Link system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod. E) Citibank's ATMs.
B
An example of synergy in business is A) Amazon's use of the Internet to sell books. B) Bank of America acquiring Countrywide Financial to reach a large pool of new customers. C) Blockbuster combining traditional video rental with online video rental. D) Walmart's order entry and inventory management system to coordinate with suppliers. E) Nike's use of technology to improve its product offerings.
B
Companies can't realistically create error-free software because A) any programming code is susceptible to error. B) it is too expensive to create perfect software. C) errors can be introduced in the maintenance stage of development. D) any software of any complexity will have errors. E) many errors are brought on by the user's operating system.
B
Converting raw data into a more meaningful form is called A) capturing. B) processing. C) organizing. D) feedback. E) analysis.
B
Cookies created during Web site visits are stored A) on the Web site's server. B) on the user's computer. C) on servers owned by advertising networks. D) in the browser's application settings. E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site.
B
DBMSs typically include report-generating tools in order to A) retrieve and display data. B) display data in an easier-to-read format. ]C) display data in graphs. D) perform predictive analysis. E) analyse the database's performance.
B
Data mining is a tool for allowing users to A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad-hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports. E) access the vast amounts of data in a data software
B
Disciplines that contribute to the technical approach to information systems are A) computer science, engineering, and networking. B) operations research, management science, and computer science. C) engineering, utilization management, and computer science. D) management science, computer science, and engineering. E) economics, sociology, and psychology.
B
Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors. A) product differentiation B) market niche C) mass customization D) process efficiency E) low-cost leadership
B
If your main supplier was late in delivering goods, which type of system would you use to update your production schedule? A) ESS B) TPS C) MIS D) DSS
B
In ________, digital technology and the Internet are used to execute the major business processes in the enterprise. A) e-commerce B) e-business C) enterprise applications D) MIS E) SCM
B
In a hierarchical organization, the upper levels consist of A) managerial and professional employees. B) managerial, professional, and technical employees. C) professional and operational employees. D) managerial, professional, and operational employees. E) knowledge workers.
B
In a multi-tiered network A) the work of the entire network is centralized. B) the work of the entire network is balanced over several levels of servers. C) processing is split between clients and servers. D) processing is handled by multiple, geographically-remote clients. E) processing is located in the cloud.
B
In a table for customers, the information about a single customer would reside in a single A) field B) row C) column D) table E) entity
B
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. A) opt-in B) opt-out C) P3P D) PGP E) IPA
B
In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? A) none; there is no second-level domain in this name B) azimuth-interactive C) books.azimuth-interactive D) com E) books
B
Legacy systems are still used because they A) can only be run on the older mainframe computers. B) are too expensive to redesign. C) integrate well using new Web services technologies. D) contain valuable data that would be lost during redesign. E) incorporate cloud technologies.
B
Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer. A) 5, 2, 3, 4, 1 B) 5, 4, 2, 3, 1 C) 4, 5, 2, 3, 1 D) 5, 4, 2, 1, 3 E) 4, 5, 3, 2, 1
B
Psychologists study information systems with an eye to understanding A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods. E) mathematically based models and physical technology.
B
Sociotechnical changes affecting a firm adopting new information systems requiring organizational change can be considered A) organizational adjustments. B) strategic transitions. C) systems alterations. D) business goal transitions. E) sociotechnical transitions.
B
Taking the action that produces the least harm best describes the A) Categorical Imperative. B) Risk Aversion Principle. C) Utilitarian Principle. D) Golden Rule. E) "no free lunch" rule.
B
The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) client/server computing, packet switching, and the development of communications standards for linking networks and computers C) TCP/IP, HTTP, and packet switching D) client/server computing, packet switching, and HTTP E) e-mail, instant messaging, and newsgroups
B
The U.S. CAN-SPAM Act of 2003 A) makes spamming illegal. B) requires spammers to identify themselves. C) has dramatically cut down spamming. D) does not override state anti-spamming laws. E) does not outlaw the use of fake return addresses.
B
The WiMax standard can transmit up to a distance of approximately A) 70 miles. B) 30 miles. C) 500 meters. D) 5 miles. E) 30 meters.
B
The ________ model highlights the primary or support activities that add a margin of value to a firm's products or services where information systems can best be applied to achieve a competitive advantage. A) competitive forces B) value chain C) bargaining power D) new entrant E) rivalry
B
The data dictionary serves as an important data management tool by A) assigning attributes to the data. B) creating an inventory of data contained in the database. C) presenting data as end users or business specialists would perceive them. D) maintaining data in updated form. E) providing a guide to data
B
The divergent viewpoints about how resources, rewards, and punishments should be distributed, and the struggles resulting from these differences are known as A) culture. B) politics. C) structure. D) viewpoints. E) variance.
B
The four major competitive strategies are A) low-cost leadership, substitute products and services, customers; and suppliers. B) low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy. C) new market entrants, substitute products and services, customers, and suppliers. D) low-cost leadership, new market entrants, product differentiation, and focus on market niche. E) customers, suppliers, new market entrants, and substitute products.
B
The interaction between information systems and organizations is influenced A) primarily by the decision making of middle and senior managers. B) by the development of new information technologies. C) by many factors, including structure, politics, culture, and environment. D) by two main microeconomic forces: capital and labor. E) by management decisions.
B
The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output. This is referred to as A) the point of no return. B) the law of diminishing returns. C) supply and demand. D) network inelasticity. E) the invisible hand.
B
The most common Web server today is A) WebSTAR. B) Apache HTTP Server. C) Netscape Server. D) Microsoft IIS. E) IBM HTTP Server.
B
The project operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected. E) creates a subset consisting of rows in a table
B
The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and A) improved flexibility. B) improved decision making. C) improved business practices. D) improved efficiency. E) improved business value.
B
The special organizational function whose responsibilities include physical database design and maintenance is called A) data administration B) database administration C) information policy administration D) data auditing E) database management
B
The specialized language programmers use to add and change data in the database is called A) a data access language. B) a data manipulation language. C) structured query language. D) a data definition language. E) a DBMS
B
The temp agency that you own is having serious difficulties placing temps because few of them are familiar with Internet research. Investing in training software to enhance your workers' skills is an example of using technology to achieve which business objective? A) customer and supplier intimacy B) survival C) operational excellence D) improved decision making E) new products and services
B
The three principal levels within a business organization hierarchy are A) senior management, operational management, and service workers. B) senior management, middle management, and operational management. C) senior management, operational management, and information systems. D) senior management, middle management, and service workers. E) senior management, data workers, and service workers.
B
The traditional file environment does not typically have a problem with A) data inconsistency. B) program-data independence. C) lack of flexibility in creating ad-hoc reports. D) poor security. E) data sharing.
B
Instant messaging is a type of ________ service. A) network B) wireless C) chat D) e-mail E) cellular
C
Which of the following best describes the effect that new information technology has on society? A) It has a dampening effect on the discourse of business ethics. B) It has a ripple effect, raising new ethical, social, and political issues. C) It is beneficial for society as a whole, while raising dilemmas for consumers. D) It has a waterfall effect in raising ever more complex ethical issues. E) It has a magnifying effect, creating increasing numbers of ethical issues.
B
Which of the following best describes the primary reason for implementing a new information system, from a business perspective? A) The system enables the firm to create new products and services. B) The system will create new value for the firm, beyond its costs. C) The system will automate key business processes. D) The system is in use by our primary competitors. E) The system integrates well with the Web.
B
Which of the following decisions requires knowledge based on collaboration and interaction? A) How long will it take to manufacture this product? B) Should we work with outside vendors on new products and services? C) In which geographical locations are our products garnering the most sales? D) Which product design is the most efficient for the user in terms of energy use? E) How can we produce this product more cheaply?
B
Which of the following is not one of the types of information gathered by Web site tracking tools? A) health concerns B) birthplace C) income D) purchases E) marital status
B
Which of the following is the most popular mobile operating system? A) Linux B) Android C) Chrome OS D) iOS E) Unix
B
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) modality B) scalability C) expandability D) disintermediation E) customizability
B
Which of the following statements about RFID is not true? A) RFID tags and antennas come in a variety of shapes and sizes. B) RFIDs require line-of-sight contact to be read. C) RFIDs transmit only over a short range. D) RFIDs use an antenna to transmit data. E) Microchips embedded in RFIDs are used to store data
B
Which of the following systems would you expect to deliver integrated, personalized business content through a Web portal interface? A) transaction processing systems B) executive support systems C) management information systems D) decision-support systems E) supply chain management systems
B
Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers? A) intranet B) extranet C) KMS D) TPS E) TPS
B
Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-Fi B) LAN C) WAN D) MAN E) SAN
B
Which type of system integrates supplier, manufacturer, distributor, and customer logistics processes? A) collaborative distribution system B) supply-chain management system C) reverse logistics system D) enterprise planning system E) transaction processing system Answer: B
B
Why does Amazon.com need to worry about competitors in online shopping? A) E-commerce is affected by the law of diminishing returns. B) Internet technologies are universal, and therefore usable by all companies. C) Internet shopping produces cost transparency. D) The Internet enables the production or sales of substitute products or services. E) The Internet increases switching costs.
B
_______ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships. A) OLAP B) Text mining C) In-memory D) Clustering E) Classification
B
________ allows a single computing resource, such as a server, to appear to the user as multiple logical resources. A) Cloud computing B) Virtualization C) Quantum computing D) Nanotechnology E) Utility computing
B
________ combine the functionality of a cell phone with the computing of a laptop. A) Netbooks B) Smartphones C) E-readers D) Tablets E) iPods
B
________ creates confusion that hampers the creation of information systems that integrate data from different sources. A) Batch processing B) Data redundancy C) Data independence D) Online processing E) Data quality
B
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A) Due process B) Accountability C) The courts of appeal D) The judicial system E) Liability
B
________ is a societal practice of having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A) Liability B) Due process C) The courts of appeal D) Accountability E) The judicial system
B
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A) A legal safe harbor B) The opt-in model C) The FIP set of guidelines D) P3P
B
________ systems are also known as enterprise systems. A) Resource planning B) Enterprise resource planning C) Enterprise support D) Management information E) Decision-support
B
________ unleash powerful economies of scale and result in price declines in manufactured computer products. A) Internet and Web technologies B) Technology standards C) Linux and open-source software D) Client/server technologies E) Virtualization technologies
B
________ uses individual atoms and molecules to create computer chips and other devices thinner than a human hair. A) Virtualization B) Nanotechnology C) Quantum computing D) A minicomputer E) On-demand computing
B
"Predictive search" in Google's search engine A) uses a knowledge graph of what similar people searched on to predict your search interests. B) uses a semantic approach to predict what you are looking for. C) predicts what you are looking for as you enter words into the query box. D) uses a tracking service and cookies on your browser to predict search results. E) maintains a history of your searches and then predicts what you will search on next.
C
A ________ is a senior manager who oversees the use of IT in the firm. A) CEO B) CFO C) CIO D) CTO E) CKO
C
A business process in the ________ function is producing bills of material. A) finance and accounting B) human resources C) manufacturing and production D) research and development E) sales and marketing
C
A corporation that funds a political action committee, which in turn promotes and funds a political candidate who agrees with the values of that corporation, could be seen as investing in which main category of complementary assets? A) managerial B) governmental C) social D) organizational E) auxiliary
C
A firm that must invest in new information systems capabilities in order to comply with federal legislation can be said to be investing to achieve which business objective? A) customer intimacy B) operational excellence C) survival D) improved reporting E) improved decision making
C
A managerial element in the UPS tracking system described in the chapter is A) taking inventory. B) providing package status reports to customers. C) the decision to use automation. D) in-house package tracking software. E) ability to embed UPS functions in external sites.
C
A schematic of the entire database that describes the relationships in a database is called a(n) A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram. E) data analysis table.
C
A set of self-contained services that communicate with each other to create a working software application is called A) Web services. B) EAI software. C) SOA. D) SOAP. E) a software package.
C
A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a Web A) service. B) client. C) browser. D) app. E) beacon.
C
A(n) ______ organizes data in two-dimensional tables A) non-relational DBMS B) mobile DBMS C) relational DBMS D) hierarchical DBMS E) object-oriental DBMS
C
A(n) ________ is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market. A) value chain B) support web C) value web D) consortium E) firm network
C
A(n) ________ is software for locating and managing stored Web pages. A) net server B) hub C) Web server D) modem E) router
C
All of the following are advantages, for a firm, of cloud computing except A) ability to support mobile computing. B) ability to support remote work. C) ability to improve communication. D) ability to rely on markets to build value. E) ability to reduce data storage costs.
C
All of the following are competitive forces except A) suppliers. B) new market entrants. C) external environment. D) customers. E) substitute products.
C
All of the following are physical components of an RFID system except A) radio transmitters. B) tags. C) bar code. D) a stationary or handheld device. E) antenna.
C
An example of a cross-functional business process is A) identifying customers. B) transporting the product. C) creating a new product. D) assembling a product. E) paying creditors
C
An example of a divisionalized bureaucracy is a A) startup firm. B) university. C) Fortune 500 firm. D) midsize manufacturer. E) consulting firm.
C
An example of raw data from a national chain of automobile stores would be A) an average of 13 Toyotas are sold daily in Kentucky. B) 30-percent increase in Toyota RAV4 sales during September in Kentucky. C) 1 Toyota RAV4 sold March 3, 2013, in Louisville, Kentucky. D) 10-percent improvement in sales projections for Toyota sales next year. E) a demographic breakdown of all Toyota buyers in the past year.
C
Bandwidth is the A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. E) geographical distance spanned by a network.
C
Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? A) lowering network costs B) improving employee engagement C) managing the supply chain D) logging transactions E) enabling client communication
C
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called A) data auditing. B) defragmentation. C) data scrubbing. D) data optimization E) data normalization
C
Digital subscriber lines A) are assigned to every computer on the Internet. B) are very-high-speed data lines typically leased from long-distance telephone companies. C) operate over existing telephone lines to carry voice, data, and video. D) operate over coaxial cable lines to deliver Internet access. E) have up to twenty-four 64-Kbps channels.
C
Engineers, scientists, or architects, who design new products or services for a firm, belong to which level of a business hierarchy? A) middle management B) production workers C) knowledge workers D) data workers E) service workers
C
FWO's use of SharePoint for project management is an example of using information systems to achieve which business objective? A) customer and supplier intimacy B) survival C) improved decision making D) operational excellence
C
How would you determine the market demand for your firm's IT services? A) Perform a TCO analysis. B) Benchmark your services. C) Hold focus groups to assess your services. D) Analyze sales returns on key investments. E) Perform a stress test.
C
IPv6 is being developed in order to A) allow for different levels of service. B) update the packet transmission protocols for higher bandwidth. C) create more IP addresses. D) support Internet2. E) reduce excess IP addresses.
C
In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and where B) select, join, and where C) select, project, and join D) where, from, and join E) where, find, and select
C
In environmental scanning, a firm may use information systems to A) utilize sensors that track products through the value chain. B) analyze external Internet traffic to its Web sites. C) identify external events that may affect it. D) understand its carbon footprint and energy impacts on the environment. E) develop a unified organizational culture.
C
Key differences between software and books include all of the following except A) software contains more information than a book. B) software is less easily inspected than a book. C) software products are more easily compared to each other than books. D) software is understood to be more fallible than a book. E) it is more difficult to inspect software for flaws.
C
Linux is A) primarily concerned with the tasks of end users. B) designed for specific machines and specific microprocessors. C) an example of open-source software. D) especially useful for processing numeric data. E) poorly suited to power fast computers.
C
Network economics A) applies the law of diminishing returns to communities of users. B) applies traditional economics to networked users. C) sees the cost of adding new members as inconsequential. D) balances the high cost of adding new members to a community against the lower cost of using network infrastructure. E) uses networks to link people, assets, and ideas.
C
Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's A) data management environment. B) networked environment. C) IT infrastructure. D) information system. E) culture.
C
Specifications that establish the compatibility of products and the ability to communicate in a network are called A) network standards. B) telecommunications standards. C) technology standards. D) Internet standards. E) compatibility standards.
C
The Internet raises the bargaining power of customers by A) creating new opportunities for building loyal customer bases. B) making more products available. C) making information available to everyone. D) lowering transaction costs. E) enabling the development of new services.
C
The ________ helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes. A) CTO B) CSO C) CKO D) CPO E) CEO
C
The average number of tickets sold daily online is an example of A) input. B) raw data. C) meaningful information. D) feedback. E) processing.
C
The backbone networks of the Internet are typically owned by long-distance telephone companies called A) backbone providers. B) enhanced service providers. C) network service providers. D) regional network providers. E) internet bulk providers.
C
The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) A) modem. B) hub. C) switch. D) NIC. E) router.
C
The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide. A) computer B) technology C) digital D) electronic E) Internet
C
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when A) the courts become involved. B) hackers are able to break into the source code. C) the software is widely distributed. D) a new version of the software is released. E) the software's programming code is released.
C
The most prominent data manipulation language today is A) Access. B) DB2. C) SQL. D) Crystal Reports. E) NoSQL.
C
The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information systems to achieve which business objective? A) improved efficiency B) customer and supplier intimacy C) survival D) competitive advantage E) improved decision making
C
The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is A) TCP/IP. B) COBOL. C) Ethernet. D) ASCII. E) Linux.
C
The principal liaison between the information systems groups and the rest of the organization is a(n) A) programmer. B) information systems manager. C) systems analyst. D) CTO. E) CIO.
C
The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) circuit-switched D) client/server E) packet-switched
C
The tool that enables users to view the same data in different ways using multiple dimensions is A) predictive analysis B) SQL C) OLAP D) data mining E) Hadoop
C
To consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making, you would use a(n) A) TPS. B) extranet. C) KMS. D) CRM. E) MIS.
C
To monitor the status of internal operations and the firm's relations with the external environment, managers need ________ systems. A) decision-support B) knowledge C) transaction processing D) management information
C
Today's nanotechnology-produced computer transistors are roughly equivalent in size to A) the width of a fingernail. B) a human hair. C) a virus. D) an atom. E) a nanoparticle.
C
U.S. businesses are allowed to use personal data from EU countries if they A) have informed consent. B) create a safe harbor. C) develop equivalent privacy protection policies. D) make their privacy protection policies publicly available. E) register their activities with a central EU government databank.
C
Under Mintzberg's classification of organizational structure, the knowledge-based organization where goods and services depend on the expertise and knowledge of professionals falls under the category of A) entrepreneurial structures. B) divisionalized bureaucracies. C) professional bureaucracies. D) adhocracies. E) machine bureaucracies.
C
Unlike regular browser cookies, Flash cookies A) are installed only at the user's request. B) are not stored on the user's computer. C) cannot be easily detected or deleted. D) monitor the user's behavior at a Web site. E) are able to track much more of the user's personal information
C
What are the four layers of the TCP/IP reference model? A) application, hardware, Internet, and network interface B) physical, application, Internet, and network interface C) application, transport, Internet, and network interface D) physical, application, transport, and network interface E) software, hardware, network interface, Internet
C
What technology allows people to have content pulled from Web sites and fed automatically to their computers? A) FTP B) IPv6 C) RSS D) HTTP E) Bluetooth
C
Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years? A) copyright B) trademark C) patent D) trade secret protection
C
Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads? A) CTS B) CVS C) RSI D) technostress E) RSS
C
Which of the following best describes the basis for the FIP principles? A) the accountability of the record holder B) the responsibility of the record holder C) the mutuality of interest between the record holder and the individual D) the privacy of the individual E) the difference between the interests of the individual and commercial organizations
C
Which of the following is not a method for performing a data quality audit? A) surveying entire data files B) surveying samples from data files C) surveying data definition and query files D) surveying end users about their perceptions of data quality E) surveying managers about their perceptions of data quality
C
Which of the following is not one of the current changes taking place in information systems technology? A) growing business use of "big data" B) growth in cloud computing C) growth in the PC platform D) emerging mobile platform E) increased usage of social networking by business
C
Which of the following is not one of the current key technology trends that raises ethical issues? A) data storage improvements B) data analysis advancements C) increase in multimedia quality D) increase in use of mobile devices E) advances in networking technology
C
Which of the following is not one of the techniques used in Web mining? A) content mining B) structure mining C) server mining D) usage mining E) data mining
C
Which of the following is the greatest obstacle in enabling collaboration between employees at different, distant corporate locations? A) privacy B) permissions C) time zones D) language E) corporate culture
C
Which of the following objectives best describes the business strategy behind the technologies implemented by the San Francisco Giants, as discussed in the chapter case? A) customer and supplier intimacy B) survival C) competitive advantage D) customer support E) operational excellence
C
Which of the following roles in a firm would be least affected by using mobile devices to access firm information systems? A) senior executives B) sales executives C) production workers D) operational managers E) knowledge workers
C
Which of the following statements about Linux is not true? A) It plays a major role in the back office running local area networks. B) It is available in free versions downloadable from the Internet. C) It has garnered 20 percent of the server operating system market. D) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices. E) Linux works on all the major hardware platforms.
C
Which of the following statements about collaboration is not true? A) In business, a collaboration can last as little as a few minutes. B) Business collaboration relies on the formation of teams that are assigned a specific task or goal. C) Successful collaboration can be achieved through technology regardless of the organization's culture or structure. D) One business benefit of collaboration is improved innovation. E) Businesses need special systems for collaboration.
C
Which of the following statements is not true about search engines? A) Users are increasingly using search engines on mobile devices. B) They are monetized almost exclusively by search engine marketing. C) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. D) They are arguably the Internet's "killer app." E) They have solved the problem of how users instantly find information on the Internet.
C
Which of the following would not be a complementary asset for a solar panel manufacturer? A) international solar equipment certification standards B) government funding for green technology C) centralized hierarchical decision making D) innovation-driven management team E) subsidies for adoption of solar energy
C
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) MAN B) domain-based LAN C) peer-to-peer network D) WAN E) SAN
C
You are consulting for a cosmetics distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step? A) Identify the business ecosystem the distributor is in. B) Implement a strategic transition to the new system. C) Perform a strategic systems analysis. D) Benchmark existing systems. E) Set up a strategic transition.
C
You are creating a database to store temperature and wind data from national airport locations. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A) address B) city C) airport code D) state E) day
C
You have been hired by a non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, SMS, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? A) TPS B) TPS with DSS capabilities C) TPS with MIS capabilities D) TPS with ESS capabilities E) DSS with MIS capabilities
C
You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. Which type of system will most efficiently provide a solution? A) CRM B) enterprise system C) extranet D) intranet E) MIS
C
You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use data mining software that is capable of A) identifying associations B) identifying clusters C) identifying sequences D) classification E) forecasting
C
________ is a new data analysis technology that finds hidden connections between data in disparate sources. A) HIPAA B) FIP C) NORA D) COPPA E) Spyware
C
________ protects the creators of intellectual property from having their work copied by others. A) Patent protection B) Intellectual property law C) Copyright law D) Fair Use Doctrine E) Trade Secret law
C
________ surfaces allow users to gesture on a screen with several fingers to execute commands. A) Hypertouch B) Nanotech C) Multitouch D) Android E) Scalable
C
________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance. A) Management information B) Transaction processing C) Decision-support D) Knowledge management E) Resource planning
C
________ technologies radically change the business landscape and environment. A) Explosive B) Inventive C) Disruptive D) Subversive E) Divisive
C
) According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are A) environment, organization, structure, and tasks. B) technology, people, culture, and structure. C) organization, culture, management, and environment. D) tasks, technology, people, and structure. E) costs, tasks, structure, and management.
D
A VPN A) provides secure, encrypted communications using Telnet. B) is an Internet-based service for delivering voice communications. C) is a proprietary networking service technology developed by individual corporations. D) is an encrypted private network configured within a public network. E) is more expensive than a dedicated network.
D
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) A) service-oriented architecture. B) on-demand architecture. C) multi-tiered client/server architecture. D) two-tiered client/server architecture. E) divided architecture.
D
A data warehouse is composed of A) historical data from legacy systems B) current data C) internal and external data sources D) historic and current internal data E) historic external data
D
A manufacturer of deep-sea oil rigs may be least concerned about this marketplace force. A) product differentiation B) traditional competitors C) low number of suppliers D) new market entrants E) low number of customers
D
A network that covers entire geographical regions is most commonly referred to as a(n) A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. E) MAN.
D
A relocation control system that reports summaries on the total moving, house hunting, and home financing costs for employees in all company divisions would fall into the category of A) knowledge management systems. B) transaction processing systems. C) executive support systems. D) management information systems. E) decision support systems.
D
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) WiMax receiver B) RFID receiver C) hotspot D) access point E) hub
D
A(n) ________ is a characteristic or quality that describes a database entity. A) field B) tuple C) key field D) attribute E) relationship
D
A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address. A) telnet B) hub C) modem D) router E) packet
D
A(n)________ server is used to communicate between a Web server and an organization's back-end systems. A) public server B) private server C) legacy server D) application server E) blade server
D
According to agency theory, the firm is viewed as a(n) A) unified, profit-maximizing entity. B) task force organization that must respond to rapidly changing environments. C) entrepreneurial endeavor. D) "nexus of contracts" among self-interested individuals. E) entrepreneurial structure.
D
All of the following are current hardware platform trends except A) green computing. B) virtualization. C) cloud computing. D) Unix. E) quantum computing.
D
All of the following are reasons for the increased business focus on collaboration and teamwork, except for A) the need for creating innovative products and services. B) growth of "interaction" jobs. C) greater global presence. D) the need for more efficient work hierarchies. E) the need to reduce communication costs.
D
An example of a business using information systems to create new products and services is A) Wal-Mart's RetailLink system. B) the Mandarin Oriental hotel's customer-preference tracking system. C) Verizon's Web-based digital dashboard. D) Apple Inc.'s iPod. E) the San Francisco Giants play tracking system.
D
An information systems manager A) writes software instructions for computers. B) acts as liaison between the information systems group and the rest of the organization. C) translates business problems into information requirements. D) manages data entry staff. E) oversees the company's security policy.
D
Data cleansing not only corrects errors but also A) establishes logical relationships between data B) structures data C) normalizes data D) enforces consistency among different sets of data E) removes duplicate data
D
How do information systems enhance core competencies? A) by providing better reporting facilities B) by creating educational opportunities for management C) by allowing operational employees to interact with management D) by encouraging the sharing of knowledge across business units E) by fostering synergies among departments
D
In 2010, the FTC added all of the following recommendations to its privacy guidelines except A) firms should build products and services that protect privacy. B) firms should increase the transparency of their data collection. C) firms should require consumer consent and provide clear options to opt out of data collection. D) firms should limit the length of time that any personal data is stored to six months or less. E) consumers should be able to review and contest the accuracy and completeness of data.
D
In a telecommunications network architecture, a protocol is A) a device that handles the switching of voice and data in a local area network. B) a communications service for microcomputer users. C) a pathway through which packets are routed. D) a standard set of rules and procedures for control of communications in a network. E) the main computer in a telecommunications network
D
Microsoft SQL Server is a(n) A) DBMS for both desktops and mobile devices B) Internet DBMS C) desktop relational DBMS D) DBMS for midrange computers E) DBMS for mobile devices
D
Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system? A) MIS B) TPS C) ESS D) DSS E) KMS
D
One of the drawbacks of patent protection is A) that only the underlying ideas are protected. B) digital media cannot be patented. C) preventing the ideas from falling into public domain. D) the years of waiting to receive it. E) the limited period of protection.
D
Output A) is feedback that has been processed to create meaningful information. B) is information that is returned to appropriate members of the organization to help them evaluate the input stage. C) transfers data to the people who will use it or to the activities for which it will be used. D) transfers processed information to the people who will use it or to the activities for which it will be used. E) converts raw input into a meaningful form.
D
Privacy protection in the United States is ________ in Europe. A) more far reaching than B) more liable to laws than C) much more stringent than D) much less stringent than E) at about the same level of strictness as
D
Shopping bots use ________ software for searching the Internet. A) comparison B) Web 3.0 C) SEO D) intelligent agent E) Web 2.0
D
The 802.11 set of standards is known as A) WLAN. B) WAN. C) WSN. D) Wi-Fi. E) WiMax.
D
The Mandarin Oriental hotel's use of computer systems to keep track of guests' preferences is an example of A) improved flexibility. B) improved decision making. C) improved efficiency. D) customer and supplier intimacy. E) operational excellence.
D
The ________ function is responsible for identifying customers. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing E) distribution and logistics
D
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called A) the Semantic Web. B) a 3-D Web. C) Internet2. D) the Internet of things. E) Web 2.0.
D
The ethical "no free lunch" rule states that A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) everything is owned by someone else, and that the creator wants compensation for this work. E) anything of value should not be taken.
D
The expenses incurred by a customer or company in lost time and resources when changing from one supplier or system to a competing supplier or system are known as A) retention costs. B) preservation costs. C) differentiation costs. D) switching costs. E) variation costs.
D
The four major enterprise applications are A) SCMs, CRMs, DSSs, and KMSs. B) SCMs, CRMs, ESSs, and KMSs. C) enterprise systems, SCMs, DSSs, and CRMs. D) enterprise systems, SCMs, CRMs, and KMSs. E) TPSs, MISs, DSSs, and ESSs.
D
The phenomenon of employees using their own devices in the workplace is known as A) wearable computing. B) mobile consolidation. C) cloud computing. D) BYOD. E) self computing.
D
The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called A) VPN. B) SEM. C) RSS. D) SEO. E) IAB.
D
The select operation A) combines relational tables to provide the user with more information than is otherwise available B) creates a subset consisting of columns in a table C) identifies the table from which the columns will be selected D) creates a subset consisting of all records in the file that meet stated criteria E) creates a subset
D
The value chain model A) categorizes five related advantages for adding value to a firm's products or services. B) sees the supply chain as the primary activity for adding value. C) categorizes four basic strategies a firm can use to enhance its value chain. D) highlights specific activities in the business where competitive strategies can best be applied. E) enables more effective product differentiation.
D
What are the most successful solutions or methods for achieving a business objective? A) value activities B) best processes C) core competencies D) best practices E) benchmarks
D
Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) data normalization B) data accuracy C) data redundancy D) data inconsistency E) data duplication
D
Which digital cellular standard is used widely throughout the world except the United States? A) WLAN B) 4G C) CDMA D) GSM E) LTD
D
Which level of the organization are ESS specifically designed to serve? A) operational B) end-user C) middle management D) senior management E) knowledge workers
D
Which of the following best illustrates the use of information systems to focus on market niche? A) A car manufacturer's Web site that lets you customize the features on the car you are purchasing. B) A restaurant chain analyzing local sales figures to determine which menu items to serve. C) A bookseller selling an e-book reader that reads only the bookseller's books. D) A department store creating specialized products for preferred customers. E) A clothes manufacturer expanding its offerings to new styles.
D
Which of the following choices may lead to competitive advantage? 1. new products, services, and business models; 2. charging less for superior products; 3. responding to customers in real time? A) 1 only B) 1 and 2 C) 2 and 3 D) 1 and 3 E) 1, 2, and 3
D
Which of the following describes Immanuel Kant's Categorical Imperative? A) If an action cannot be taken repeatedly, then it is not right to be taken at any time. B) One should take the action that produces the least harm or incurs the least cost. C) One can put values in rank order and understand the consequences of various courses of action. D) If an action is not right for everyone to take, it is not right for anyone to take. E) You should act towards others as you would like them to act towards you.
D
Which of the following is a highly structured decision? A) creating a new product B) estimating the effect of changing costs of supply materials C) calculating the best trucking routes for product delivery D) granting credit to a customer E) forecasting new industry trends
D
Which of the following is a primary drawback to the "do anything anywhere" computing environment? A) It makes work environments less pleasant. B) It creates inequality between workers who have home computing power and those who don't. C) It centralizes power at corporate headquarters. D) It blurs the traditional boundaries between work and family time. E) It leads to employees being paid less for the total amount of work performed.
D
Which of the following is not a DBMS for midrange computers? A) DB2 B) Oracle C) Microsoft SQL Server D) Microsoft Access E) Microsoft Exchange
D
Which of the following is not a characteristic of packet switching? A) Packets include data for checking transmission errors. B) Packets travel independently of each other. C) Packets are reassembled into the original message when they reach their destinations. D) Packet switching requires point-to-point circuits. E) Packets are routed through many different paths.
D
Which of the following is not a major feature of organizations that impacts the use of information systems? A) business processes B) environments C) goals D) agency costs E) leadership styles
D
Which of the following is not an example of the emerging mobile digital platform? A) tablets B) the Kindle C) cell phones D) CRM E) apps
D
Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix? A) synchronous/colocated B) same time/remote C) different time/remote D) remote/colocated E) same time/same place
D
Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure? A) your firm's business strategy B) the IT investments made by competitor firms C) market demand for your firm's services D) your firm's organizational culture E) information technology assessment
D
Which of the following is the first generation of cellular systems suitable for watching videos? A) 2G B) 2.5G C) 3.5G D) 4G E) 3G
D
Which of the following is the primary reason that the practice of spamming has grown exponentially? A) Telephone solicitation is no longer legal. B) It is good advertising practice and brings in many new customers. C) It helps pay for the Internet. D) It is very inexpensive and can reach so many people. E) There are no legal preventions against it.
D
Which of the following systems is designed to support organization-wide process coordination and integration? A) decision-support systems B) management information systems C) CRM systems D) enterprise applications E) supply chain management systems
D
Which of the following technologies would you use to analyze the social media data collected by a major online retailer A) OLAP B) data warehouse C) datamart D) Hadoop E) DBMS
D
Which process is used to protect transmitted data in a VPN? A) VOIP B) chaining C) PPP D) tunneling E) packet-switching
D
Which type of infrastructure service provides voice and video connectivity to employees, customers, and suppliers? A) networking B) telephone C) VOIP D) telecommunications E) data management
D
Which type of software is created and updated by a worldwide community of programmers and available for free? A) software packages B) mashups C) outsourced D) open source E) closed source
D
You work for an national car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use data mining software that is capable of A) identifying associations B) identifying clusters C) identifying sequences D) classification E) forecasting
D
________ takes place when a firm contracts custom software development or maintenance of existing legacy programs to outside firms. A) Cloud computing B) Utility computing C) On-demand computing D) Outsourcing E) Consumerization of IT
D
________ provides a standard format for data exchange, enabling Web services to pass data from one process to another. A) HTML B) HTML5 C) Java D) Chrome OS E) XML
E
51) When two organizations pool markets and expertise that result in lower costs and generate profits, it is referred to as creating A) a value web. B) a value chain. C) net marketplaces. D) core competencies. E) synergies.
E
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with A) one short mark. B) two short marks. C) three short marks. D) a crow's foot. E) a crow's foot topped by a short mark.
E
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A) RSS B) FTP C) NFP D) WAN E) ISP
E
A(n) ________ is an activity at which a firm excels as a world-class leader. A) expertise area B) competitive advantage C) growth driver D) efficiency E) core competency
E
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A) modulated B) broadband C) T1 D) analog E) digital
E
A(n) ________ social networking tool creates business value by connecting the members of an organization through profiles, updates, and notifications that are tailored to internal corporate uses. A) cloud-based B) social-commerce C) collaborative D) remote, asynchronous E) enterprise
E
All of the following are IT-enabled products and services providing competitive advantage except A) Amazon's one-click shopping. B) Apple's iPod and iTunes. C) Ping's golf club customization. D) PayPal's online person-to-person payment system. E) Walmart's RetailLink system.
E
All of the following are cloud computing services except A) infrastructure as a service. B) platform as a service. C) software as a service. D) on-demand computing. E) virtualization as a service.
E
All of the following industries have been disrupted by the Internet except A) encyclopedias. B) newspapers. C) music. D) air travel. E) clothing.
E
Along with capital, ________ is the primary production input that the organization uses to create products and services. A) structure B) culture C) politics D) natural resources E) labor
E
An organization is a A) stable, formal social structure that takes resources from the environment and processes them to produce outputs. B) formal, legal entity with internal rules and procedures that must abide by laws. C) a collection of people and other social elements. D) B and C E) A, B, and C
E
Apple Computer dominates the online legal music sales industry primarily because of a failure of recording label companies to A) invest in technology. B) assemble accurate data. C) invest in complementary assets. D) modernize their information value chain. E) adopt a new business model.
E
As referred to in the text, legacy systems are A) systems that employ Unix. B) electronic spreadsheets used on a PC. C) any pre-1990 Wintel systems. D) systems found on older ASPs. E) traditional mainframe-based business information systems
E
At what percent of capacity do most servers operate? A) 100% B) 80-90% C) approximately 70 percent D) 40-50% E) 15-20%
E
Business processes are collections of A) informal practices and behaviors. B) formalized and documented practices. C) business rules. D) rights and privileges. E) routines.
E
Data management technology consists of the A) physical hardware and media used by an organization for storing data. B) detaile, preprogrammed instructions that control and coordinate the computer hardware components in an information system. C) two or more computers to share data or resources. D) hardware and software used to transfer data. E) software governing the organization of data on physical storage media.
E
How does the technical view of organizations fall short of understanding the full impacts of information systems in a firm? A) It sees information systems as a way to rearrange the inputs and outputs of the organization. B) It sees capital and labor as primary production factors. C) It sees an organization as a collection of rights, privileges, obligations, and responsibilities. D) It sees the organization as a social structure similar to a machine. E) It sees the inputs and outputs, labor and capital, as being infinitely malleable.
E
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of A) family and home. B) property rights and obligations. C) system quality. D) accountability and control. E) quality of life.
E
Interpretations of Moore's law assert that A) computing power will eventually level off. B) transistors decrease in size 50% every two years. C) data storage costs decrease by 50% every 18 months. D) PCs decrease in market share by 9% every 5 years. E) computing power doubles every 18 months.
E
Nike's forays into information technology represent an effort to A) maintain low-cost leadership. B) focus on market niche. C) strengthen customer and supplier intimacy. D) perform intensive customer data analysis. E) achieve product differentiation.
E
SaaS refers to A) supplying online access over networks to storage devices and storage area network technology. B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C) self-contained services that communicate with each other to create a working software application. D) easy-to-use software tools for displaying Web pages. E) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
E
The Federal Trade Commission FIP principle of Notice/Awareness states that A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there must be a mechanism in place to enforce FIP principles. D) consumers should be able to review the data collected about them. E) Web sites must disclose their information practices before collecting data.
E
The ________ framework developed by the U.S. Department of Commerce allows U.S. businesses to legally use personal data from EU countries. A) COPPA B) P3P C) PGP D) bilateral E) safe-harbor
E
The ability to be in many different states at once, dramatically increasing processing power, is a hallmark of A) co-location. B) edge computing. C) grid computing. D) utility computing. E) quantum computing.
E
The ability to offer individually tailored products or services using the same production resources as bulk production is known as A) customized response. B) size customization. C) magnitude customization. D) dimension customization. E) mass customization.
E
The central business activities of ChoicePoint raise which of the five moral dimensions? A) property rights and obligations B) system quality C) accountability and control D) quality of life E) information rights and obligations
E
The child domain of the root is the A) second-level domain. B) mid-tier domain. C) host name. D) domain extension. E) top-level domain.
E
The development of TCP/IP occurred during the ________ era. A) cloud and mobile computing B) general-purpose mainframe and minicomputer C) client/server era D) personal computer E) enterprise computing
E
The strength of patent protection is that it A) puts the strength of law behind copyright. B) allows protection from Internet theft of ideas put forth publicly. C) is easy to define. D) provides a clear distinction between software and books. E) grants a monopoly on underlying concepts and ideas.
E
The term "management information systems" designates a specific category of information systems serving A) integrated data processing throughout the firm. B) transaction process reporting. C) employees with online access to historical records. D) the information technology function. E) middle management functions.
E
The three activities in an information system that produce the information organizations use to control operations are A) information retrieval, research, and analysis. B) input, output, and feedback. C) data, information, and analysis. D) data analysis, processing, and feedback. E) input, processing, and output.
E
The use of information systems because of necessity describes the business objective of A) operational excellence. B) improved business practices. C) competitive advantage. D) improved flexibility. E) survival.
E
Walmart's attempts to increase its online presence is an example of a firm using information systems to A) strengthen ties to its customers. B) simplify the industry value chain. C) develop synergies. D) focus on market niche. E) achieve low-cost leadership.
E
Walmart's continuous replenishment system allows it to A) provide mass customization. B) differentiate products. C) strengthen customer intimacy. D) achieve economy of scale. E) achieve low-cost leadership.
E
When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as A) switching costs. B) network costs. C) procurement. D) agency costs. E) transaction costs.
E
When the same attribute in related data files has different values, this is called data A) redundancy. B) duplication. C) dependence. D) discrepancy. E) inconsistency.
E
Which field of study focuses on both a behavioral and technical understanding of information systems? A) sociology B) operations research C) economics D) behavioral computing E) management information systems
E
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? A) supply and demand B) return on investment C) breakeven point D) cost-benefit analysis E) total cost of ownership
E
Which of the following factors does not help explain why computing resources today are ever more available than in previous decades? A) network economics B) law of mass digital storage C) Moore's law D) declining communications costs and the Internet E) widespread rejection of technology standards
E
Which of the following features enables a DBMS to reduce data redundancy and inconsistency? A) enforces referential integrity B) couples program and data C) data dictionary D) two-dimensional tables E) minimizes isolated files with repeated data
E
Which of the following industries has a low barrier to entry? A) automotive B) computer chip C) national retailer D) airline E) restaurant
E
Which of the following is not a business benefit of collaboration? A) improved quality B) improved financial performance C) improved customer service D) improved innovation E) improved compliance with government regulations
E
Which of the following is not one of the NIST defined characteristics of cloud computing? A) ubiquitous network access B) location-independent resource pooling C) on-demand self service D) measured service E) reduced elasticity
E
Which of the following is not one of the current software platform trends? A) Web services and service-oriented architecture B) open-source software C) HTML5 D) software outsourcing E) multicore processors
E
Which of the following is not one of the primary environmental actors that interacts with an organization and its information systems? A) competitors B) regulatory agencies C) customers D) suppliers E) sales force
E
Which of the following is not one of the top five search engines? A) Yahoo B) Microsoft Bing C) Google D) Ask E) Facebook
E
Which of the following is one of the support activities in a firm's value chain? A) inbound logistics B) operations C) sales and marketing D) service E) technology
E
Which of the following statements best describes organizational culture? A) It encompasses the sum of beliefs and assumptions by all members. B) It enables the organization to transcend the different levels and specialties of its employees. C) It reflects the senior management's perspective on the organization and goals. D) It allows a company to achieve greater operational efficiency. E) It is a set of assumptions and values accepted by most members.
E
Which of the following tools would you use to evaluate and choose a collaboration tool for your organization? A) virtual meeting system B) cloud collaboration C) IBM Notes D) the collaboration matrix E) the time/space collaboration and social tool matrix
E
Which protocol is the Internet based on? A) HTTP B) FTP C) DNS D) packet-switching E) TCP/IP
E
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? A) MAN B) wireless C) LAN D) Windows domain network E) peer-to-peer
E
Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records? A) ESS B) TPS C) MIS D) CRM E) DSS
E
________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks. A) Mainframes B) Rack servers C) Cloud servers D) Hybrid servers E) Blade servers
E
________ are created by combining and customizing components from different online software applications. A) Apps B) Web browsers C) SaaS D) Web services E) Mashups
E
'Synergies' occur when the output of some units in a firm can be used as inputs to other units, lowering cost and generating profits.
True
A Facebook users' visit to a Web site can be tracked even if they do not click a Like button.
True
A TPS is an information system that keeps track of all of the daily routine transactions of a business.
True
A company's competitive advantages ultimately translate into higher stock market valuations than its competitors
True
A key word in social business is "conversations."
True
A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals
True
An application server may reside on the same computer as a Web server or on its own dedicated computer.
True
An efficient customer response system directly links consumer behavior to distribution and production and supply chains.
True
An example of a remote, synchronous collaboration tool is a Skype conference call using VOIP and webcams.
True
An organization's MIS and DSS supply an ESS with summarized information.
True
Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.
True
Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.
True
Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical.
True
Copyright is the legal protection afforded intellectual property, including drawings, movies, and maps.
True
Customers are one of the competitive forces that affect an organization's ability to compete.
True
DSS are used by managers to make decisions about problems that are unusual and not easily specified in advance.
True
DSS use internal information as well as information from external sources.
True
Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.
True