Info Systems Final
Which phase of decision making finds or recognizes a problem? - Implementation - Choice - Intelligence - Design
Intelligence
Operational management typically makes which type of decisions? - Semistructured - Structured - Procedural - Documented
Structured
To what competitive force did the printed encyclopedia industry succumb? - Positioning and rivalry among competitors - Substitute products or services - Customer's bargaining power - Low cost of entry
Substitute products or services
Which of the following types of computer is used for weather forecasting? - Server - Supercomputer - Mainframe - Minicomputer
Supercomputer
A point of sale system, such as the one selected by Macy's to to capture retail sales, falls into which category of information system? - Transaction processing systems - Knowledge worker support system - Management information systems - Decision support systems
Transaction processing systems
In an Excel workbook sheet, the cell B10 contains the number 320 (giving number of students enrolled in a course) and the cell D15 contains the formula = If (B10 <= 100, "Do nothing", If (B10>= 400, "Hire a new faculty", "Use a lab assistant")) The result of the formula in cell D15 is : - Use a lab assistant - Hire a new faculty - Do nothing - None of the above -- This formula is in error
Use a lab assistant
In MS Excel as we copy and paste formulas, we use _____________ reference if the copied formulas are to refer to the same cell - relative - fixed - absolute - mixed
absolute
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called: - accountability. - the judicial system. - due process. - the courts of appeal.
accountability
Linux is: - designed for specific machines and specific microprocessors. - an example of open-source software. - primarily concerned with the tasks of end users. - especially useful for processing numeric data.
an example of open-source software
A sales and marketing information system aids middle management in: - tracking sales. - preparing sales forecasts. - analyzing sales performance. - planning new products and services.
analyzing sales performance
Software used to apply the computer to a specific task for an end user is called: - data management software. - network software. - system software. - application software.
application software
The total amount of digital information that can be transmitted through any telecommunications medium is measured in: - Hertz. - MIPS. - gigaflops. - bps.
bps
The ________ divide refers to large disparities in access to computers and the Internet among different social groups and different locations? - digital - information - computer - technology
digital
Reducing the business process layers in a distribution channel is called: - disintermediation. - market segmentation. - business process re-engineering - network effects.
disintermediation
In MS Excel, the PMT function is a(n) ________ function - financial - date - statistical - IF
financial
Software that manages the resources of the computer is called: - application software. - network software. - operating - data management software.
operating
Which of the following range accurately represent the consumer spending on the Internet in 2008. (As a reference point the over all consumer spending is around $4 trillion.) - $100 Million - $1Billion - $1Billion -$100Billion - $100 Billion - $500 Billion - $500 Billion - 1Trillion
$100 Billion - $500 Billion
Which type of network is used to connect digital devices within a half-mile or 500-meter radius? - Microwave - WAN - LAN - MAN
LAN
In an MS Excel workbook sheet, cell H6 contains the formula =C4*E9. If we use copy and paste to copy this formula t o cell J10, the formula in cell J10 will be - =E8*G13 - =C8*E13 - =E4*G9 - =C4*E9
=E8*G13
In an MS Excel, the correct function to calculate the present value of a future annuity (regular payments of equal value) is - =PV ( ) - =IPMT ( ) - =NPV ( ) - =PMT( )
=PV ( )
In MS Excel, a line break within a cell (so that the text after line break appears on a separate line) is inserted by pressing the keys - Ctrl+Enter - Alt+Enter - Enter - Shift + Enter - Tab
Alt+Enter
In Microsoft Access, a query specifies - User password - Attributes of a table - An information request - Definition of a table
An information request
In MS Excel, you have already created a line chart, but now decide that you want to change this chart to a pie chart. To do this, you click ____ from the Type group in the Chart Tools Design tab. - Alter Existing Chart - Modify Chart - Change Chart Type - New Chart
Change Chart Type
What service converts IP addresses into more recognizable alphanumeric names? - DNS - HTTP - HTML - IP
DNS
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. - Software - Administrative - Data security - Implementation
Data security
These systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance. - Knowledge management systems - Transaction processing systems - Management information systems - Decision-support systems
Decision-support systems
These systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance. - Transaction processing systems - Management information systems - Decision-support systems - Knowledge management systems
Decision-support systems
In MS Excel when you select a chart, the ____ Chart Tools contextual tabs appear on the Ribbon - Format, Print, and Layout - Design, Layout, and Format - Insert, Layout, and Design - Insert, Design, and Format
Design, Layout, and Format
By business and IT alignment we mean - IT supports development and execution of strategic business plans - past enterprise data has been properly archived - CIO job has been outsourced - IT is set up as a different functional area in the organization
IT supports development and execution of strategic business plans
Which of the following is not one of the competitive forces of Porter's model? - Suppliers - Other competitors - Customers. - External environment
External environment
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. - Application proxy filtering technologies - Packet filtering technologies - Stateful inspections - Intrusion detection systems
Intrusion detection systems
These systems are designed to summarize and report on the company's basic operations. - Decision-support systems - Transaction processing systems - Executive information systems - Management information systems
Management information systems
Executive Support Systems are specifically designed to serve the ________ level of the organization: - End-user - Senior management - Operational - Middle management
Senior management
These systems are typically a major source of data for other systems: - Decision-support systems - Transaction processing systems - Executive support systems - Management information systems
Transaction processing systems
To use an analog telephone system for sending digital data, you must use: - a modem. - twisted wire. - DSL. - a router.
a modem
NORA (Non Obvious Relationship Awareness) is: - a federal privacy law protecting networked data. - a sentencing guideline adopted in 1987 mandating stiff sentences on business executives. - a new data analysis technology that finds hidden connections between data in disparate sources. - profiling technology used by the EU.
a new data analysis technology that finds hidden connections between data in disparate sources
In a telecommunications network architecture, a protocol is: - a standard set of rules and procedures for control of communications in a network. - a communications service for microcomputer users. - the main computer in a telecommunications network. - a device that handles the switching of voice and data in a local area network.
a standard set of rules and procedures for control of communications in a network
Biometric authentication: - can use a person's voice as a unique, measurable trait. - is used widely in Europe for security applications. - uses physical lock and key to prevent unauthorized access - only uses physical measurements for identification.
can use a person's voice as a unique, measurable trait
An example of technology convergence is: - virus protection software that runs and updates itself automatically. - cell phones taking on the functions of handheld computers. - software programmed to run on any hardware platform. - programming languages that allow non-programmers to create custom applications.
cell phones taking on the functions of handheld computers
In "SUM(number1 [, number2, number3, ...])", number 1, number 2, and number 3 may be numbers or ____ - operators - letters - cell references - symbols
cell references
If you want to create a query that retrieves data from multiple tables, the tables must have a(n) ____. - hyperlink - primary key - integration - common field
common field
eBay is an example of: - business-to-consumer electronic commerce. - consumer-to-consumer electronic commerce. - an online exchange. - a click-and-mortar business.
consumer-to-consumer electronic commerce
A DSS database is a collection of: - current or historical data from several applications or groups. - the corporation's current transaction data. - external data typically mined from the Internet and other third-party sources. - None of the above - DSS do not use any data
current or historical data from several applications or groups
Which of the following determines what type of values can be entered for a field. - data element - primary key - data integrity - data type
data type
A firewall allows the organization to: - check the accuracy of all transactions between its network and the Internet. - check the content of all incoming and outgoing e-mail messages. - enforce a security policy on traffic between its network and the Internet. - create an enterprise system on the Internet.
enforce a security policy on traffic between its network and the Internet
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes: - groupware - enterprise systems - decision support system - application software.
enterprise systems
To keep internal data secure, a company employing an extranet must be sure to put a(n) ________ in place. - switch - firewall - server - router
firewall
Porter's Value chain model of the firm describes - organizational structure - a strategic planning approach - social and moral values - value of firm's physical assets - firms primary and support activities that add value in transforming inputs into outputs
firms primary and support activities that add value in transforming inputs into outputs
Porter's Value chain model of the firm describes - value of firm's physical assets - firms primary and support activities that add value in transforming inputs into outputs - a strategic planning approach - organizational structure - social and moral values
firms primary and support activities that add value in transforming inputs into outputs
The value chain model: - categorizes five related advantages for adding value to a firm's products or services. - categorizes four basic strategies a firm can use to enhance its value chain. - helps a firm identify points at which information technology can most effectively to enhance its competitive position. - sees the supply chain as the primary activity for adding value.
helps a firm identify points at which information technology can most effectively to enhance its competitive position
Marketing modules in Customer Relationship Management (CRM) systems would provide tools for: - managing sales prospect and contact information. - identifying profitable and unprofitable customers. - managing an advice telephone line. - sales quote generation.
identifying profitable and unprofitable customers
The first step in the four-step model of business problem solving is: - outlining the problem's causes. - assigning the problem to a problem solver. - agreeing that a problem exists. - identifying the problem.
identifying the problem.
The Sarbanes-Oxley Act: - imposes responsibility on companies and management to safeguard the accuracy of financial information. - specifies best practices in information systems security and control. - requires financial institutions to ensure the security of customer data. - outlines medical security and privacy rules.
imposes responsibility on companies and management to safeguard the accuracy of financial information
The primary activities of a firm include: - procurement, operations, technology, sales and marketing, and service. - inbound logistics, operations, outbound logistics, sales and marketing, and service. - procurement, inbound logistics, operations, technology, and outbound logistics. - inbound logistics, operations, outbound logistics, technology, and service.
inbound logistics, operations, outbound logistics, sales and marketing, and service
The business value of an effective supply chain management system includes all of the following except: - faster time to market. - supply matched to demand. - cost reduction. - increased inventory levels.
increased inventory levels
In network economics, the value of a commercial software vendor's software products: - increases as more people use them. - decreases as more people use them. - decreases according to the law of diminishing returns. - increases due to higher marginal gain in output.
increases as more people use them
The three activities in an information system that produce the information organizations use to control operations are: - input, output, and feedback. - input, processing, and output. - data analysis, processing, and feedback. - information retrieval, research, and analysis.
input, processing, and output.
A management hierarchy: - is composed primarily of experts trained for different functions. - results in a clear-cut division of labor. - is a pyramid structure of rising authority and responsibility. - is used primarily in large organizations to define responsibilities of customer service staff.
is a pyramid structure of rising authority and responsibility.
A VPN: - provides secure, encrypted communications using Telnet. - is an encrypted private network configured within a public network. - is more expensive than a dedicated network. - is an Internet-based service for delivering voice communications.
is an encrypted private network configured within a public network
Executive support systems are information systems that support the: - day-to-day processes of production. - knowledge and data workers in an organization. - decision-making and administrative activities of middle managers. - long-range planning activities of senior management.
long-range planning activities of senior management
The Internet raises the bargaining power of customers by: - making information available to everyone. - lowering transaction costs. - creating new opportunities for building loyal customer bases. - making more products available.
making information available to everyone
Rigorous password systems - may hinder employee productivity. - are often disregarded by employees. - are costly to implement. - are one of the most effective security tools.
may hinder employee productivity.
Tactical planning for information systems is typically done by - CEO of the firm - mid to senior IT managers within the organization in collaboration with user managers - by outside consultants in collaboration with technology vendors - board of directors in collaboration with data center operators
mid to senior IT managers within the organization in collaboration with user managers
FIP (Fair Information Practices) principles are based on the notion of the: - mutuality of interest between the record holder and the individual. - privacy of the individual. - responsibility of the record holder. - accountability of the record holder.
mutuality of interest between the record holder and the individual
The contracting of custom software development to outside firms is commonly referred to as: - application integration. - scaling. - outsourcing. - service-oriented architecture.
outsourcing
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: - packet switching. - ATM. - multiplexing. - packet routing.
packet switching
Converting raw data into a more meaningful form is called: - capturing. - organizing. - feedback. - processing.
processing.
Moore's law that capacity doubles in about two years applies to - processor chips - database management systems - data captured in a transaction processing environment - operating systems - Decision support systems
processor chips
A supply chain driven by actual customer orders or purchases follows a: - pull-based model. - build-to-stock model. - replenishment-driven model. - push-based model.
pull-based model
In MS Access, in a table for customers in an MS Access database, the information about a single customer would reside in a single: - column. - field. - row. - table.
row
Pricing analysis is an example of a: - sales and marketing information system serving senior management. - finance and accounting information system serving middle management. - sales and marketing information system serving middle management. - finance and accounting information system serving senior management.
sales and marketing information system serving middle management.
A gigahertz is a measure of - capacity of a hard disk - size of the memory - speed of the internal clock - size of the registers in the CPU
speed of the internal clock
In MS Excel , in the following formula: =IF(A1="YES", "DONE", "RESTART"), what happens if A1= "NO"? - the formula returns the text "RESTART" - the formula returns the text "NO" - the formula returns the text "DONE" - the formula returns the text "NO, RESTART"
the formula returns the text "RESTART"
To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: - cost benefit analysis. - total cost of ownership model. - return on investment model. - breakeven point.
total cost of ownership model
In batch processing: - transactions are processed by arrays of multiple, less expensive servers. - transactions are accumulated in batches until it is time to process them. - transactions are processed by arrays of multiple, less expensive workstations. - transactions are processed immediately in batches.
transactions are accumulated in batches until it is time to process them
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a: - unified resource locator. - third-level domain. - uniform resource locator. - root domain.
uniform resource locator
Deciding whether to introduce a new product line is an example of a(n): - procedural decision. - semistructured decision. - non-procedural decision. - unstructured decision.
unstructured decision
A virtual company: - provides entirely Internet-driven services, or virtual products. - uses the capabilities of other companies without being physically tied to those companies. - uses Internet technology to maintain a virtual storefront. - uses Internet technology to maintain a networked community of users.
uses the capabilities of other companies without being physically tied to those companies
A ________ is a collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively. - business network - value web - consortia - value chain
value web
A network that covers a large geographic area is most commonly referred to as a(n): - wide area network. - Intranet. - peer-to-peer network. - local area network.
wide area network