CIS Exam 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to the chapter case, ABB decided to switch from its existing corporate intranet for all of the following reasons except: a. the intranet was too expensive to maintain. b. the intranet was too static and outmoded to meet its current needs. c. the intranet had poor capabilities for searching for information. d. the intranet lacked collaboration tools. e. the intranet was confusing and inefficient.

a

In ________, raw data is systematically acquired and transformed during various stages that add value to that information. a. an information value chain b. the firm value chain c. information processing d. the feedback process e. the dissemination process

a

In network economics, the value of a commercial software vendor's software products: Select one: a. increases as more people use them. b. decreases as more people use them. c. increases due to higher marginal gain in output. d. decreases according to the law of diminishing returns. e. is unrelated to the number of people that use them.

a

Sociologists study information systems with an eye to understanding: a. how systems affect individuals, groups, and organizations. b. how human decision makers perceive and use formal information. c. how new information systems change the control and cost structures within the firm. d. the production of digital goods. e. mathematically based models and physical technology.

a

The Online Privacy Alliance: Select one: a. encourages self-regulation to develop a set of privacy guidelines for its members. b. protects user privacy during interactions with websites. c. has established technical guidelines for ensuring privacy. d. is a government agency regulating the use of customer information. e. is a safe harbor program established by the U.S. government.

a

Using the Internet to buy or sell goods is called: a. e-commerce. b. e-business. c. an intranet. d. an extranet. e. e-government.

a

Which of the following constitutes an organizational element in the UPS tracking system described in the chapter? a. The specification of procedures for identifying packages with sender and recipient information b. Monitoring service levels c. Promoting the company strategy of low-cost, superior service d. The use of handheld computers and networks for managing package delivery e. A web-based Post Sales Order Management System

a

Which of the following is an example of an organizational complementary asset? a. Using the appropriate business model b. A collaborative work environment c. Laws and regulations d. The Internet and telecommunications infrastructure e. Strong senior management

a

Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry? Select one: a. Benchmarking b. Best practices c. Value chain analysis d. Strategic systems analysis e. Secondary activities

a

If your main supplier was late in delivering goods, which type of system would you use to update your production schedule? a. ESS b. TPS c. MIS d. DSS e. BIS

b

In ________, digital technology and the Internet are used to execute the major business processes in the enterprise. a. e-commerce b. e-business c. enterprise applications d. MIS e. SCM

b

Maintaining the organization's financial records is a central purpose of which main business function? a. Manufacturing and accounting b. Finance and accounting c. Sales and manufacturing d. Finance and sales e. Human resources

b

The NAI is an industry association formed to help with which of the following? Select one: a. Copyright protection b. Online privacy issues c. Patent protection d. Trademark protection e. Trade secret protection

b

The enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as: a. IoT. b. big data. c. the mobile digital platform. d. cloud computing. e. business intelligence.

b

Which of the following best describes the effect that new information technology has on society? Select one: a. It has a dampening effect on the discourse of business ethics. b. It has a ripple effect, raising new ethical, social, and political issues. c. It is beneficial for society as a whole, while raising dilemmas for consumers. d. It has a waterfall effect in raising ever more complex ethical issues. e. It has a magnifying effect, creating increasing numbers of ethical issues.

b

Which of the following decisions requires knowledge based on collaboration and interaction? a. How long will it take to manufacture this product? b. Should we work with outside vendors on new products and services? c. In which geographical locations are our products garnering the most sales? d. Which product design is the most efficient for the user in terms of energy use? e. How can we produce this product more cheaply?

b

Which of the following statements is not true? a. Many Fortune 500 U.S. firms derive more than half their revenues from foreign operations. b. Most PCs manufactured in China use microprocessor chips manufactured in Korea. c. Eighty percent of the toys sold in the United States are manufactured in China. d. In 2015, 60 percent of Apple's revenue was generated outside of the United States. e. Technology companies are particularly dependent on offshore revenue.

b

Which of the following systems would you expect to deliver integrated, personalized business content through a web-based interface? a. TPS b. ESS c. MIS d. DSS e. SCM

b

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. Select one: a. Liability b. Due process c. Responsibility d. Accountability e. The judicial system

b

Producing a bill of materials is a business process in which of the following functional areas? a. Finance and accounting b. Human resources c. Manufacturing and production d. Research and development e. Sales and marketing

c

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? Select one: a. HIPAA b. FIP c. NORA d. COPPA e. Spyware

c

Which of the following statements about collaboration is not true? a. In business, a collaboration can last as little as a few minutes. b. Business collaboration relies on the formation of teams that are assigned a specific task or goal. c. Successful collaboration can be achieved through technology regardless of the organization's culture or structure. d. One business benefit of collaboration is improved innovation. e. Businesses need special systems for collaboration.

c

Which of the following would not be a complementary asset for a solar panel manufacturer? a. International solar equipment certification standards b. Government funding for green technology c. Centralized hierarchical decision making d. Innovation-driven management team e. Subsidies for adoption of solar energy

c

According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are: Select one: a. environment, organization, structure, and tasks. b. technology, people, culture, and structure. c. organization, culture, management, and environment. d. tasks, technology, people, and structure. e. costs, tasks, structure, and management.

d

All of the following laws apply to actions by the federal government except the: Select one: a. Freedom of Information Act. b. Privacy Act. c. Computer Security Act. d. Children's Online Privacy Protection Act. e. E-Government Act.

d

The ethical "no free lunch" rule states that: Select one: a. if an action cannot be taken repeatedly, then it is not right to be taken at any time. b. one should take the action that produces the least harm or incurs the least cost. c. one can put values in rank order and understand the consequences of various courses of action. d. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. e. if an action is not right for everyone to take, it is not right for anyone to take.

d

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? Select one: a. Kant's categorical imperative b. the risk aversion principle c. the utilitarian principle d. the Golden Rule e. the "no free lunch" rule

d

Which of the following is not a true statement about value webs? Select one: a. Value webs involve a collection of independent firms that use information technology to coordinate their value chains. b. Value webs are more customer-driven than traditional value chains. c. Value webs operate in a less linear fashion than traditional value chains. d. Value webs are inflexible and cannot adapt quickly to changes in supply and demand. e. Value webs involve highly synchronized industry value chains.

d

Which of the following is not one of the current changes taking place in information systems technology? a. Growing business use of big data b. Growth in cloud computing c. Growth in the PC platform d. Emerging mobile digital platform e. Increased usage of data generated by the Internet of Things

d

Which of the following statements about organizations is not true? Select one: a. An organization is a stable, formal social structure that takes resources from the environment and processes them to produce outputs. b. An organization is a formal, legal entity with internal rules and procedures that must abide by laws. c. An organization is a collection of people and other social elements. d. An informal group can be considered to be an organization. e. An organization is a collection of rights, privileges, obligations, and responsibilities delicately balanced over a period of time through conflict and conflict resolution.

d

Which of the following systems is designed to support organization-wide process coordination and integration? a. DSS b. MIS c. CRM d. Enterprise applications e. SCM

d

A(n) ________ social networking tool creates business value by connecting the members of an organization through profiles, updates, and notifications that are tailored to internal corporate uses. a. cloud-based b. social-commerce c. collaborative d. remote, asynchronous e. enterprise

e

All of the following are technical solutions to protecting user privacy except: Select one: a. e-mail encryption. b. anonymous surfing. c. anonymous email. d. preventing client computers from accepting cookies. e. data use policies.

e

The three activities in an information system that produce the information organizations use to control operations are: a. information, research, and analysis. b. input, output, and feedback. c. data, information, and analysis. d. data analysis, processing, and feedback. e. input, processing, and output.

e

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? Select one: a. Property rights and obligations b. System quality c. Accountability and control d. Quality of life e. Information rights and obligations

e

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person. Select one: True False

false

An inventory control system is an example of an MIS. True False

false

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on. Select one: True False

false

Cross-functional systems are being phased out in favor of systems that support business processes within a single functional group, such as human resources. True False

false

For nonroutine decision making, senior managers rely on management information systems. True False

false

Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue. Select one: True False

false

Middle managers make long-range strategic decisions about the firm's products and services. True False

false

Routine violations of individual privacy are made more difficult by advances in data storage. Select one: True False

false

The competitive forces model cannot be used to analyze modern digital firms which face new competitive forces that are not true of traditional firms. Select one: True False

false

The use of Internet technologies allows companies to more easily sustain competitive advantage. Select one: True False

false

There is little variation in returns on IT investment across firms. True False

false

A DSS uses internal information as well as information from external sources. True False

true

A Facebook user's visit to a website can be tracked even if they do not click a Like button. Select one: True False

true

A business model describes how a company produces, delivers, and sells a product or service to create wealth. True False

true

According to the network economics perspective, the more people offering products on eBay's site, the greater the value of the site to all who use it. Select one: True False

true

An organization's MIS and DSS supply an ESS with summarized information. True False

true

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret. Select one: True False

true

Copyright is a legal protection given to creators of certain types of intellectual property. Select one: True False

true

Creative work driven by new knowledge and information is a significant part of management responsibility. True False

true

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior. Select one: True False

true

Global firms can collaborate from different locations at the same time using synchronous collaboration tools. True False

true

IT governance refers to the overall decision-making that guides the IT strategy of a firm. True False

true

In 2016, the median wage for IT/MIS jobs is about twice the level for all occupations. True False

true

Information systems are used to enable new products and services via product differentiation. Select one: True False

true

Information technology (IT) consists of all hardware and software that a firm needs to use in order to achieve its business objectives. True False

true

Laws and regulations creating fair, stable market environments are examples of complementary social assets required to optimize returns from IT investments. True False

true

One example of a business process is shipping a product to a customer. True False

true

One of the key concepts in patent law is novelty. Select one: True False

true

Private business investment in information technology constituted 37 percent of all invested capital in 2015. True False

true

Smart products generally raise switching costs. Select one: True False

true

Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded. Select one: True False

true

Supply chain management systems are more externally oriented than enterprise systems. True False

true

The key elements of an organization are its structure, business processes, politics, culture, and people. True False

true

The three main dimensions of information systems are management, organizations, and information technology. True False

true

UPS's use of web-based tools that allow customers to embed UPS functions such as tracking and cost calculations into their own Web sites is an information systems solution used to achieve customer intimacy. True False

true


Set pelajaran terkait

Test - TST 102 Module 0-1 Exam: Test and Evaluation within the Acquisition Life Cycle

View Set

Chapter 1, Chapter 2, Chapter 3, Chapter 4, Chapter 5, Chapter 6

View Set

Sociology 1301 Final Chapter 14:2

View Set

International Business Vocabulary

View Set

Chapter 22 Respiratory (Matching), Respiration

View Set

中1 理科 生物の観察 身近な生物の生活と種類

View Set