Exam 1
Information is simply a collection of raw facts such as an employee number or the total hours worked in a week.
False
KnowledgeAnother name for the World Wide Web is the Internet of Things.
False
Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as well as other users' resources if those resources are beneficial.
False
Organizations can collect many types of data from a wide variety of sources, but typically they only collect structured data that fits neatly into traditional relational database management systems.
False
Organizations cannot have many value chains.
False
Over time, disruptive innovation tends to become less attractive to users in a new market.
False
QuickBooks is an accounting application used by many large, multinational organizations.
False
Since the 1950s, computers have been used to perform common business applications.
False
Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rather than local computers.
False
Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system.
False
Suppose an organization wishes to change for the better. It can accomplish that just by changing people's roles, responsibilities, and lines of authorities.
False
Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and inventory management. She would need to purchase separate software to meet each functional requirement.
False
Systems development projects should always be outsourced in order to allow an organization to focus on what it does best.
False
The activities that lead to getting the right product into the right consumer's hands in the right quantity at the right time at the right cost are known as value chain management.
False
The concept of a value chain is not significant to organizations unless they manufacture products.
False
The diffusion of innovation theory states that adoption of any innovation happens all at once for all members of the targeted population.
False
The role of a systems analyst is narrowly defined and seldom involves communications with others.
False
Today, many organizations can function and compete effectively without computer-based information systems.
False
Today, most organizations use the traditional approach to data management, where multiple information systems share a pool of related data.
False
Two sets of fields can have a common primary key.
False
Using a computer to forecast future sales and order more inventory before a shortage can occur is an example of information system feedback.
False
When a business finds that many of its business applications have to be updated or rewritten, it will be better if they replace them with an ERP system.
False
Windows 10 is an example of application software.
False
In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT:
Finance and accounting
A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is ___________.
Flexible
The value of information is directly linked to how it helps decision makers achieve their organization's _____.
Goals
All of the following are potential drawbacks to outsourcing EXCEPT:
Greater focus on core business
_____ is a visa program that allows skilled employees from foreign lands into the United States.
H-1B
One of the disadvantages of proprietary software is that ______________.
it can take a long time and significant resources to develop the required software features
A set of random or unrelated tasks performed to achieve a definite outcome is called a process.
True
A software suite is a collection of programs packaged together as a bundle and typically includes a word processor, spreadsheet program, graphics program, and more.
True
A traditional view of information systems holds that organizations use them to control and monitor processes and ensure effectiveness and efficiency.
True
According to Lewin's Change Model, an organization must deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job.
True
An embedded system is a computer system that is implanted in and dedicated to the control of another device.
True
An example of the concept of feedback is a factory information system that is programmed to alert the manager if there is any decrease in productivity so the manager can take corrective steps to improve productivity.
True
An operating system is a set of programs that controls the computer hardware and acts as an interface with applications.
True
Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database.
True
Components of a computer-based information system include people such as the CIO (chief information officer) and end-users.
True
Data represents real-world things including raw facts such as image and audio data.
True
Electronic business (e-business) goes beyond e-commerce and e-procurement by using information systems and the Internet to perform business-related tasks and functions.
True
For each data item, a data dictionary usually contains information such as the name of the data item, the range of values that can be used, and the amount of storage needed for the item.
True
If "color" is an attribute, then "green" is a data item.
True
In the context of the relational database model, projecting involves eliminating columns in a table.
True
It is possible to restrict access to data depending on the database user's privileges.
True
Linux is an open-source operating system.
True
Mobile commerce (m-commerce) is the use of mobile, wireless devices to place orders and conduct business.
True
Most operating systems support virtual memory which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.
True
Natural language processing involves the computer interacting in natural languages - like spoken English.
True
One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically.
True
Opportunities in information systems are available to people from different parts of the world.
True
Perceived usefulness and ease of use of a system influence an individual's attitude toward the system.
True
Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corrected or deleted through data cleansing.
True
Suppose a retail business has an unwritten rule that "every sales person cooperates with others." This is an example of organizational culture.
True
Suppose a stock analyst wants to automate the retrieval of stock trade data, process the data, and produce analysis reports. His requirements can be met by writing custom software.
True
The diffusion of innovation theory can be useful in planning the rollout of a new information system.
True
The information systems operations group is responsible for the day-to-day running of IS hardware to process the organization's information systems workload.
True
The operating system converts a basic user request into the set of detailed instructions that the computer hardware requires, thus acting as an intermediary between the application and the hardware.
True
The operating system's application programming interface (API) provides software developers with tools they use to build application software without needing to understand the inner workings of the operating system and hardware.
True
The primary function of application software is to apply the power of the computer to enable people, workgroups, and the entire enterprise to solve problems and perform specific tasks.
True
The term data is used to label raw facts such as height and weight of a patient.
True
Unstructured data comes from sources such as word-processing documents and scientific research.
True
Usability and user-interface design are key factors in delivering apps that business users will adopt and use.
True
Utility programs help to perform maintenance, correct problems, merge and sort sets of data, keep track of computer jobs, and compress data files.
True
When an organization uses cloud computing, they do not have to buy and maintain expensive hardware.
True
When organizational learning occurs, what is revealed can be small, incremental adjustments known as continuous improvement.
True
Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it to run Windows also.
True
A single computer can be used by a single user or by multiple, simultaneous users.
True
Suppose a new tech startup wants to define the data model. They would then ____.
create the entity-relationship model
The performance levels of radically new 'high-tech' products usually improve with newer versions. Such types of products are known as
disruptive innovations
Suppose a small manufacturing business wishes to have a system to manage all its vital business operations, they should go for a(n) _______.
enterprise resource planning (ERP) system
You would use Query by Example, if _____.
you wish to use a visual approach to query building
All of the following are examples of someone using personal productivity software EXCEPT _________.
Callie entering a customer's order into a restaurant's ordering system
All of the following are examples of activities performed by an operating system EXCEPT ________.
allowing a user to do word processing
The smallest piece of data used by a computer is a(n) _____.
Bit
A friend's computer came with Windows 8 operating system. Which of the following years was the computer most likely bought in?
2012
Ongoing research conducted by the Standish Group shows that ____% of very large, multimillion dollar software projects fail or are challenged.
94
In terms of information systems, Wikipedia would be an example of _________.
A group IS
Suppose an oil exploration company wishes to collect, codify, and store knowledge that is used in the organization, they should use _______.
A knowledge management system
Which of the following statements is NOT true about a mainframe computer?
A single computer with a single user is typical of a mainframe computer.
You cannot boot a computer from ____________.
A wireless network
When the IS organization and its resources are focused on efforts that support the key objectives defined in the managers' strategic plan for the business, the organization is in _________.
Alignment
Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test, (3) customer adding an item to the online shopping cart, are considered transactions in an information system?
All of them
In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________.
All of these
The Internet of Things connects wireless identifiable objects ________.
All of these -with each other, with a central server, to their owners
New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc. The software is known as ____.
An embedded system
Which of the following does not is NOT an application software?
Android
According to Lewin and Schein's 3-stage model of organizational change, which of the following tasks would be found in the 'unfreezing' stage?
Assign leaders and implementation team
_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.
Big data
Suppose, you need to advise someone about getting a certification. Which of the following will be appropriate advice?
Certifications are vendor-specific
The idea of _____ is a form of innovation that constantly seeks ways to improve business processes and add value to products and services.
Continuous improvement
To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?
Currency
Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are _________.
Cybercriminals
Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______.
Data Steward
A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
Data definition language
Increasingly, companies are no longer incorporating computer-based information systems into their products and services.
False
At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________.
Data lifecycle management
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
Data mart
With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.
Database as a Service
All of the following are functions of a knowledge management system EXCEPT:
Designing information systems
Which of the following theories explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization?
Diffusion of innovation theory
Each attribute in a relational database model can be constrained to a range of allowable values called a _____.
Domain
_____ involves reducing the number of employees to cut costs.
Downsizing
Starting from monthly sales data, if you wish to get weekly sales data, use the ___ feature.
Drill down
A global positioning system (GPS) device uses a(n) _____ to help people find their way around town or more remote areas.
Embedded system
_____ are people who work directly with information systems to get results.
End users
_____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization.
Enterprise data modeling
"Adapting" is the second stage in Lewin's Change Model, which involves learning new work methods, behaviors, and systems.
False
A command-based user interface employs icons and menus that people use to send commands to the computer system.
False
A computer-based information system (CBIS) is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, and process data into information, but the CBIS does not include software.
False
A database administrator (DBA) is an important nontechnical position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization.
False
A sustaining innovation is one that initially provides a lower level of performance than the marketplace has grown to accept.
False
An attribute is a general class of people, places, or things for which data is collected, stored, and maintained.
False
An organization's structure is independent of its goals and approach to management.
False
Application software, such as Microsoft Word, manages basic computer operations such as start-up.
False
Cybercriminals are hackers who try to steal business information or government data related to a nation's infrastructure, all for personal gain.
False
DBMSs are used primarily for modeling data.
False
Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.
False
Each programming language has a set of rules, called the program code of the language.
False
For someone to be a good CIO, technical ability is the most important characteristic.
False
If a large organization wants software that will benefit the entire organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required.
False
In the context of the relational database model, selecting involves combining two or more tables.
False
Which of the following statements is true of a database?
It helps companies analyze information to open new market opportunities.
Which of the following is NOT one of the common types of utility programs?
Spreadsheet application
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
Structured Query Language (SQL)
The process of defining relationships among data to create useful information requires ______.
Knowledge
Calligraph Publishing Company has created a system for storing every piece of data about every one of its books, both those that have already published and those that are still in production. The production team can input and access information about each book's format, editors can specify which procedures are in use, salespeople can input and access information about each book's sales history and availability, and even some external partners are allowed to access some data. This is an example of a(n) __________.
Knowledge management system
An operating system with _____ capabilities allows a user to run more than one program concurrently.
Multitasking
Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals to study, change, and improved it. Their software is an example of _________.
Open-source software
After entering data into a relational database, users can make all of the following basic data manipulations except:
Organizing
_____ is/are considered to be the most important element in computer-based information systems.
People
In a supply chain, _____ involve the transformation, movement, and storage of supplies and raw materials.
Physical flows
A(n) _____ is a field or set of fields in a record that uniquely identifies the record.
Primary Key
A collection of fields all related to a single object, activity, or individual is a(n) _____.
Record
To keep information beyond reach of unauthorized users, is to keep the information _____.
Secure
The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.
Service-oriented architecture
_____ encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery.
Supply chain management
Which of the following is NOT one of the four main components in Leavitt's Diamond?
Systems
A database is essential to the operation of a computer-based information system.
True
A database management system (DBMS) serves as an interface between an application program and a database.
True
A database must reflect the business processes of an organization.
True
A database, a database management system, and the application programs that use the data, make up a database environment.
True
A field is typically a name, number, or combination of characters that describes an aspect of a business object.
True
Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this data into a database. In terms of the characteristics of big data, Haley is dealing with ________.
Variety
Suppose you wish to run two different operating systems on one computer, you can accomplish it by using _______.
Virtualization Software
One of the advantages of off-the-shelf software is that ________________.
the initial cost is lower because the software firm can spread the development costs over many customers
Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides?
presentation graphics