Info Technology

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The technology that allows more computing power to be packed into the chassis of the computer system is called

Blade computing

Which of the following goals fit primarily within green computing? I. Reducing power consumption in data centers. II. Having computer vendors make self-healing computers. III. Consolidating the servers in data centers IV. Providing equal access to all Internet content providers.

I and III

A sales manager with supervisory responsibilities for a group of a account representatives can be called a knowledge worker.

False

Assume your firm wants to buy storage systems and it has received a bid from EMC in response to your firm's request. If you want to bring EMC down on the price they are asking, a good way of doing this would be to get a competing bid from Cisco.

False

Autonomic computing can be made possible by server virtualization.

False

Being ambidextrous means that the firm is better at finding new opportunities and targeting solutions for these opportunities than it is at managing its existing business.

False

Dell's build-to-order model arises from its position of low-cost leadership.

False

ERP software is responsible for managing the functions provided by a computer.

False

Early CRM systems that focused only on improving service delivery could be classified as enterprise systems.

False

One important benefit of the client/server era was to split the processing between the client and the server machines to increase performance.

True

Packets may carry priority information in the header of the packet which would cause routers to give preferential treatment to those packets as they are forwarded to their final destination.

True

If a packet has been damaged while being transmitted to the other end of a communications link, the IP protocol will retransmit the packet as many times as needed to ensure that a clean copy reaches the other end of the link.

False

If the CEO of Tesla, Elon Musk, were to combine his two businesses, Tesla and SpaceX, the resulting corporate structure could then be viewed as an ambidextrous company.

False

Information systems literacy describes the behavioral approach to information systems, whereas computer literacy describes the technical approach.

False

Instant Messaging and twitter are both forms of asynchronous collaboration.

False

Intel and Cisco are viewed as close competitors in the IT market landscape.

False

MySQL and Linux are the two most common open-source databases.

False

Regardless of whether this measure is used or not, a theoretically correct measure of the bandwidth of transmission lines is bytes/minute.

True

SANs and server virtualization can be used together.

True

SANs can reduce the cost of storage by pooling storage discs together.

True

TPS systems are mainly used by the operational workers of a firm.

True

The Digital World has been a key enabler of outsourcing.

True

The Internet has made it easier to undermine an individual's right to privacy.

True

The Resource-Based View (RBV) of competitive advantage shares certain key similarities with the core competency theory.

True

Older people often complain about not being able to keep pace with the rapid advances in information technology. This issue best fits into the moral dimension of IS called System Quality.

False

Operational management is responsible for directing the day-to-day operations of the business and therefore needs to directly look at the raw transactional data from TPS systems to make managerial decisions.

False

During the financial crisis of 2007 to 2009, many lobbied the government to bail out GM. Which of the following ethical principles did those in favor of bailing out GM use?

Utilitarian principle

TCP is a link layer protocol.

False

The HTTP protocol encrypts the packets exchanged between a web browser and a web server.

False

Which of the following statements are true about VPN and SSL/TLS? I. A drawback of VPN is that the protocol header of a packet sent from a source computer to a destination computer is not encrypted. II. If you are using VPN over SSL/TLS, there are two levels of encryption applied to the body of the packets sent to a destination computer by a source computer. III. The SSL/TLS protocol encrypts only the body of a packet sent to a destination computer by a source computer. IV. An important benefit of using VPN over SSL/TLS is that the source IP address in the protocol header of a VPN packet is the IP address of the source computer.

II, III

Which of the following statements are true about communication and collaboration systems? I. A team using an Internet Wiki as a tool for collaboration means that the team has to work synchronously. II. Twitter is an asynchronous method of communication and collaboration. III. Video conferencing via Skype is a synchronous method of communication. IV. The rise of Instant Messaging means that Email has become an obsolete method of communication.

II, III

Which of the following statements are true about hyperconvergence? I. Hyperconvergence forms a virtual SAN by utilizing the storage discs connected to the physical SAN. II. In the physical SAN model, when a VM is moved from one host to another, the files associated with that VM do not have to move to the other host. III. Hyperconvergence forms a virtual SAN by utilizing the internal storage of the host computers. IV. In the hyperconvergence model, if a host computer which has the files of a VM in its internal storage fails, that VM can no longer function.

II, III

Which of the following statements are true about network protocols? I. Network protocols define the kind of information that can be legally stored on a web site. II. Network protocols define the structure, format, and types of messages exchanged by any two computers connected to the network. III. Network protocols for the Internet comprise a stack of three layers where each protocol layer performs a different value-added function. IV. Network protocols define the content of the information carried in the body of the packet.

II, III

Which of the following statements are true with regard to terminology? I. SAN refers to a security area network. II. A LAN is a front-end network. III. SLA refers to the agreement between a firm and a service provider. IV. SaaS refers to Security as a Service.

II, III

Which of the following statements are true? I. An ESS system is targeted mainly at the middle management of a company. II. A TPS system provides data to an MIS system. III. A CRM system can be called an enterprise system. IV. A business does not have any information system that is not an enterprise system.

II, III

Which of the following theories support Sony's market strategy of leveraging its strength in electronics miniaturization and various patents it holds in this area to determine the kinds of products it brings to the market? I. Porter's theory of competitive advantage II. Resource-based view III. Core competency theory IV. Agency cost theory

II, III

Which of the following statements are true about Ethernet, IP, and TCP? I. Ethernet is a network layer protocol, IP is a link layer protocol, and TCP is a transport layer protocol. II. IP is a network layer protocol and TCP is a transport layer protocol. III. In an Ethernet LAN, the Ethernet protocol is responsible for ensuring that packets are transmitted reliably over the transmission media. IV. Packet switching functions performed by the router are part of the IP protocol.

II, III, IV

Which of the following statements are true about the theories of competitive advantage? I. Porter's competitive forces model asserts that competitive advantage is built first and foremost around the internal strengths of the firm. II. The Resource-Based View complements Porter's theory of competitive advantage. III. IT can be used to support both the core competency theory and Porter's competitive forces model and market strategies. IV. IT systems can support both the exploratory and exploitative arms of an ambidextrous business.

II, III, IV

Which of the following statements are true about the worldwide web? I. Web 1.0 was mainly informational and it became transactional in Web 2.0. II. Universal blogging capability is a defining feature of Web 2.0. III. Searching for new information on the web is expected to become significantly more responsive to the user's profile and context in Web 3.0. IV. Pervasive access to the web where the web can be effectively accessed regardless of where you are is one of the key characteristics of Web 3.0.

II, III, IV

Which of the following statements are true? I. Tesla fully fits the notion of an ambidextrous company. II. Tesla does have exploitative and exploratory arms in the company. III. A key goal of Tesla's market strategy going forward is to create a mass market for electric cars. IV. Tesla has key internal resources from an RBV perspective that provide it with competitive advantage in the electric car market.

II, III, IV

Which of the following statements are true? I. Security policies would include stipulations on how much overtime a security person in the IT organization can be given. II. In certain special cases where you have some knowledge of how the encryption key was chosen by the user, it may be possible to break 128-bit encryption. III. The client IP address is disguised in VPN tunnelling. IV. Generally two-factor authentication is favored by the financial services industry for added security.

II, III, IV

Which of the following statements are true about IT and its impact on the organization? I. Wealthy countries such as the US did not outsource work in the 60's because labor in the outsourcing services provider countries was more expensive relative to the labor in the US in the 60's than it is today. II. The effect that IT has of shrinking the workforce by outsourcing work is supported by transaction cost theory. III. IT can both flatten and shrink the organization. IV. Flattening the organization is primarily about removing layers of management.

II, III, and IV

Which of the following statements are true? I. MIS systems are a major source of data for TPS systems. II. Some ESS systems have what-if capability and can be viewed as a hybrid MIS and DSS system. III. A CRM system can be classified as an enterprise system. IV. TPS systems mainly target the operational workers within a firm.

II, III, and IV

Which of the following applications runs on a grid computer?

II, IV

Which of the following statements are true about the CRM deployment in the city of San Francisco? I. This deployment is example of business automation and not business transformation. II. The Business Process Analysts involved in this deployment can be called knowledge workers. III. The manager in overall charge of the Department of Traffic in the city of San Francisco performs a purely supervisory role; hence this person can be called a knowledge worker. IV. The citizens of the city of San Francisco are the customers in this deployment.

II, IV

Which of the following statements are true about the Internet? I. The routers in the Internet are Ethernet routers because they look at the Ethernet protocol information in forwarding the packets to the destination computers. II. The main purpose of the IP protocol is to route packets to the destination computers. III. When a network packet arrives at a router on an incoming transmission link, the TCP protocol looks at the destination IP address of the packet and sends it out on an outgoing transmission link in the direction of the destination IP address. IV. The Ethernet protocol being a link-level protocol ensures the reliable transfer of packets over the Ethernet LAN.

II, IV

Which of the following statements are true? I. Two-factor authentication involves the use of a public key and a private key. II. Encryption using a 256-bit key is virtually impossible to break even if you use a bank of supercomputers. III. A Trojan has a reproductive function. IV. A firewall cannot guarantee that no malware will get into your PC.

II, IV

Which of the following statements are true about IT and an ambidextrous business? I. KMS, ERP systems are of most benefit to the exploratory arm of an ambidextrous business. II. BI, CRM systems are of most benefit to the exploitative arm of an ambidextrous business. III. ERP, CRM systems are most benefit to the exploitative arm of an ambidextrous business. IV. KMS, ERP systems are of most benefit to the exploitative arm of an ambidextrous business.

III

Which of the following statements are true about protocols and the different types of nodes in the Internet? I. The network and transport layer protocols are used by routers in the Internet to forward packets to their destinations. II. The IP protocol layer in Ethernet switches forwards packets to the end systems. III. The TCP protocol layer is present in all end systems connected to the Internet. IV. The TCP protocol layer in a WiFi router reassembles the packets into a file and delivers it to the user.

III

Which of the following statements are true about the rise of the phenomenon of firms focusing on their core competencies? I. Firms are becoming more vertically integrated than they were in previous decades. II. Agency cost theory explains why firms focus on their core competency. III. Transaction cost theory supports the phenomenon of firms focusing on their core competency. IV. Porter's view of competitive advantage places less importance on core competency relative to the firm's market strategy.

III and IV

Which of the following statements about Web 1.0, Web 2.0, and Web 3.0 are true? I. Social media was first introduced in Web 1.0 II. Web 2.0 did not support e-commerce transactions. III. The mobile web is viewed as one of the characteristics defining Web 3.0. IV. Web 3.0 will support a more intelligent form of the web where it will be able to decipher the meaning of the searches performed by users.

III, IV

Which of the following statements are true about IT and an ambidextrous business? I. KMS, BI systems are of most benefit to the exploitative arm of an ambidextrous business. II. ERP, CRM, SCM systems are most benefit to the exploratory arm of an ambidextrous business. III. KMS, BI systems are of most benefit to the exploratory arm of an ambidextrous business. IV. ERP, CRM, SCM systems are of most benefit to the exploitative arm of an ambidextrous business.

III, IV

Which of the following statements are true about VoIP? I. VoIP traffic is transported over the circuit-switched telephone network. II. VoIP has enhanced the prominence of circuit-switching technology. III. VoIP is causing the convergence of the circuit-switched and packet-switched networks. IV. The logical conclusion of the growth of VoIP traffic is that one day we may no longer need the traditional telephone network for telephone conversations.

III, IV

Which of the following statements are true about voice and data networks? I. The IT department of a firm is only responsible for the data network and not the voice network. II. Historically, voice networks have employed packet-switching while data networks have employed circuit-switching technology. III. The Internet is an example of a packet-switched network. IV. VoIP involves turning voice signals into packets and then sending the packets through the Internet.

III, IV

Which of the following statements are true? I. Autonomic computing involves using the unused processing power in idle computers. II. Automatic computing is the term given to computers that can automatically correct problems without the intervention of IT staff. III. Moore's law implies that the number of transistors that can be packed into a computer chip is progressively increasing with better chip manufacturing processes. IV. Social media was supported in Web 2.0.

III, IV

Which of the following statements are true? I. Bringing any kind of new and innovative IT will be opposed by the employees regardless of what the champion of that IT does. II. A technical person is the best suited to champion a major new IT initiative by the business. III. The champion of a major new IT must consider the technology, management, and organizational dimensions when bringing that IT into the business. IV. The champion of a new IT must understand the sociological and psychological aspects of bringing new IT into the business.

III, IV

The costs to firms for operating on a global scale have been significantly reduced by the

Internet

You notice that a fellow employee spends a lot of time on Facebook during the work day. You decide to talk to him about changing this habit from an ethical perspective. Which of the following ethical principles would be best to use in this scenario if you were approaching it from the standpoint of what would happen if everyone did this?

Kant's categorical imperative

Which of the following systems is not an example of application software?

Linux

A supply chain management (SCM) system tracks the flow of materials from the suppliers to the firm. It provides information on the performance of the suppliers such as their lead time in fulfilling orders, the percentage of orders that are filled correctly per the requirements of the purchase order, and the percentage of orders that had to be returned because they were defective. Based on just this information, an SCM system is best classified as a(n)

MIS

Which type of system would you use if you were interested in finding the three worst suppliers last year who had the longest lead times in shipping parts to your firm?

MIS

It is legitimate to classify information systems as hybrids of the major categories of information systems, such as TPS, MIS, DSS, and the types of information systems typically used by large firms, such as ERP, SCM, CRM, KMS, and BI. An information system in a manufacturing firm provides management with summaries of sales by product and by time period. It also provides customers with up-to-date information on the status of their orders. Based on this information alone, this information system is best described as a hybrid of

MIS and CRM

Which of the following is not a goal of the proponents of green computing and the green movement in general?

Move to a SOA architecture

Which of the following ethical principles does not apply in the scenario of a driver who is texting while driving?

No Free Lunch Rule

Which of the following statements are true about bitcoin? I. One satoshi is approximately equal in value to one cent today. II. The blockchain runs on a centralized computer. III. While there is a maximum limit on bitcoins, there is no maximum limit on how many satoshis can be generated. IV. Those who audit transactions before they are placed in the blockchain are paid in dollars for their work.

None of the statements are true

Which of the following statements are true about the IT market landscape? I. IBM acquired Lenovo's PC business II. Cisco is well known for making software for integrating different business applications. III. MySQL is an open-source operating system product. IV. Cisco and Oracle are close competitors.

None of the statements are true

The tool that enables users to view the data in different ways and in multiple dimensions is called

OLAP

Of the following types of communication links or networks, the one that offers the highest bandwidth is

T3

The point-of-sale Pulse system used by Domino's handles sales orders and provides management with information for the daily management of the restaurant. If we classify a system based not on its primary role but on the mix of functions it provides then Pulse can be best classified as a(n):

TPS and MIS

Which of the following statements is true about transaction costs and agency costs?

Transaction costs and agency costs are independent of each other

A Facebook blog is a form of asynchronous collaboration.

True

A UNIX computer with a TCP/IP protocol stack can communicate with an Apple computer if the Apple also has the TCP/IP protocol stack.

True

A firm builds customer and supplier intimacy to increase switching costs for the customer.

True

After the breakup of HP, IBM and HP Enterprise are close competitors in the IT market landscape.

True

Among the advantages of storing data in relational databases is that business applications now have a unified view of corporate data.

True

An airline reservation system is primarily a TPS type of system.

True

CRM systems can bring value to many different organizations including the government.

True

Client-server computing is a form of distributed processing.

True

Cloud computing is supportive of green computing.

True

Cloud computing providers can benefit from utilizing storage area network (SAN) technology.

True

Denormalizing tables improves the performance of queries.

True

Designing a new product, performing market analysis, and hiring new employees are all examples of business processes that can be supported by information systems.

True

DoS attacks do not access restricted areas of a company's information system and destroy information.

True

Fair Information Principles recognize that an individual has a right to privacy.

True

If we do a voice call over the Internet using Vonage rather than over the traditional telephone network, this would be an example of synchronous collaboration.

True

In a public key encryption system, the sender encrypts information transmitted with the public key of the recipient and the recipient decrypts it with their private key.

True

In addition to offering various types of IT products, IBM is also a key vendor of database products

True

In an electronic marketplace, a manufacturing firm can purchase raw materials and components needed in manufacturing from many different suppliers. Because multiple suppliers can supply the firm, the Internet has increased the bargaining power of the firm over its suppliers.

True

In the hyperconvergence model, the physical SAN has effectively been virtualized.

True

It is possible to purchase a CRM system from a software vendor that specializes in CRM systems or from vendors who offer a broad portfolio of enterprise applications such as ERP systems.

True

One important benefit of the client/server era was off-loading files from the PC to a file server.

True

Porter's competitive forces model suggests that a firm should increase its power over both its customers and its suppliers.

True

The behavioral approach to information systems focuses on the psychological, social, and economic impacts of information systems.

True

Using the Service-Oriented Architecture (SOA) saves costs by reusing software components.

True

Vonage was among the first few companies to introduce VoIP technology to the market.

True

Which of the of the following statements about UNIX is not true?

UNIX is open-source software

A manager who argues for the outsourcing of jobs is using which of the following ethical principles to support their position?

Utilitarian Principle

The open-source movement in the software industry is about producing software that is freely available. Which of the following ethical principles drives those programmers who willingly contribute their time without getting any compensation to develop open-source software?

Utilitarian Principle

In the financial crisis of 2007 to 2009, GM applied to the government for a bailout as without substantial help from the government, the company would be bankrupt. The government did decide to bail out GM. If we examine this action from the government's perspective, which of the following ethical principles provides the strongest support for the government's action?

Utilitarian principle

As the Procurement Manager of a firm, you are negotiating the purchase of certain types of IT products from Seagate. A good tactic to bring Seagate down on price would be to get a competing bid from

Western Digital

You would use a Bluetooth network to connect

Wireless mouse to a PC

In order to run a software application on a computer, the computer must have

an operating system

A characteristic of an entity is called a(n)

attribute

SOA refers to the notion of

building software as a set of reusable components

Having duplicate data in different tables in a database is called

data redundancy

A schematic of the database that describes the relationships in a database is called a(n)

entity relationship diagram

Data mining allows users to

find hidden relationships and patterns in data.

A relocation control system of a firm reports summaries of the total moving, house-hunting, and home financing costs of its employees. The system also embeds a "what if" capability that allows managers of the firm to assess the impact on total cost of changing the moving company the firm uses for relocating employees. Considering the various capabilities of this system, such a system would best be viewed as a:

hybrid MIS and DSS MIS only

The maximum number of daily downloads of a popular music file on a web site over a 30-day period is an example of

information

The Internet increases the bargaining power of customers by

making information about products and services offered by competing vendors more readily available to customers

When we take a 3-dimensional view of information systems, the three main dimensions to consider are:

management, technology, and organization

A column or set of columns in a table which serves as the unique identifier for the records in the table is called the

primary key

A business is considering deploying some new and innovative IT, which will have an impact in different ways. Which of the following is the IT the least likely to change?

regulations governing the industry the firm belongs to

SaaS refers to the notion of

renting software applications from providers of application services

Dell's build-to-order model best reflects its

strong customer and supplier relationships

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a

supply chain

The four components that must be considered by the champion of a new information technology are

tasks, technology, people, structure

The costs incurred when a firm buys on the open market what it does not make itself are called

transaction costs

The costs incurred when the firm buys in the open market what it does not produce itself is called

transaction costs

Which systems are typically a major source of data for other systems?

transaction processing systems

Which types of malicious software have a built-in capability to reproduce?

worms and viruses

An example of raw data from a national chain of automobile stores would be

1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky

The client-server architecture splits processing between how many tiers of computing?

2

Studies have show that ERP systems reduce approximately what percentage of operating expenses?

25%

How many of the six ethical principles apply to the scenario of texting and driving?

5

If your business needs to receive a significant amount of video traffic and you want to deploy a wireless network on your premises with the highest performance, then which of the following networks would best serve this purpose?

802.11n

Which of the following are actors in the environment of an information system? I. Customers II. Suppliers III. Regulatory Agencies IV. Stockholders

All of the above

A router that corrects itself after a malfunction can be called an

Autonomic router

A type of information system that can particularly benefit a niche player in further understanding trends in consumer preferences is a(n)

BI

A type of information system that can particularly benefit a niche player in terms of Porter's model is

BI

Toyota's supply chain has a just-in-time (JIT) mode of manufacturing in addition to the traditional mode where customer orders are satisfied from inventory. The JIT mode best reflects Toyota's

Close supplier and customer relationships

Which of the following is not one of the defining features of Web 2.0?

Cloud computing

The generic name for a system that supports different business functions of the firm is

Enterprise system

16.122.1.1.134 is an example of a valid IP address.

False

A CRM system primarily supports the three business functions of sales, marketing, and finance.

False

A business spends two times the industry average on information technology. Consequently, this business will get a return on IT that is at least more than the industry average.

False

A consequence of data normalization is data redundancy

False

A digital firm is defined as a firm that produces digital goods and services.

False

A drawback of hyperconvergence is that when a host machine which stores the files for a given Virtual Machine goes down, then that Virtual Machine cannot function.

False

A drawback of public keying is that it is difficult for the sender to securely send the encryption key to the receiver for decrypting the message.

False

A good strategy for a firm that lacks a core competency is to acquire some other successful firm to quickly gain a core competency.

False

A key ethical principle in the software industry is to ship software that is 100% free of any bugs.

False

A key function of an ERP system is to integrate the supply chain.

False

A router looks at the TCP protocol information in the header of a network packet to decide which direction to forward the packet to.

False

Firms typically get high returns from their IT investments as they are able to easily align information technology with their business models, processes and strategies.

False

Given the widespread deployment of ERP systems, the Resource-Based View would argue that using an ERP system is a major source of a firm's competitive advantage.

False

If we do a voice call over the Internet using a Vonage Internet phone rather than over the traditional telephone network, this would be an example of asynchronous collaboration.

False

In analyzing an IT decision with ethical aspects, it is not necessary to identify all the stakeholders or the people who have an interest in the outcome of that decision.

False

In making a decision about the level of advertising that would be best for launching a new product, an MIS system would be better to use than a DSS system.

False

In the SSL/TLS handshake, the session key is securely conveyed from the client machine to the server machine using symmetric encryption.

False

In training artificial intelligence (AI) systems, the unsupervised learning approach is best used when the goal is predict the response of a human to a set of input conditions.

False

Invoking a Web Service involves an exchange of HTML documents between the calling application and the Web Service.

False

It would be better to use an MIS type of information system rather than a DSS when making the decision on whether to introduce a new product line.

False

Netflix can be called a digital firm because it sells video streaming services.

False

Netflix is a firm that sells video streaming services, which is a digital good. Based on this information, Netflix can be called a digital firm.

False

SAN refers to the notion of lowering the cost of building software applications by reusing pre-built components.

False

Software companies are being unethical in shipping products that may still have some bugs in them despite the best efforts of their quality assurance departments to test the products thoroughly before shipping them.

False

Symmetric keying is more secure than public keying because you have to manage only one key for each sender/receiver pair.

False

Tesla is a fully ambidextrous firm.

False

The core competency theory and the agency cost theory both support the phenomenon of outsourcing.

False

The government cannot take advantage of cloud computing technology.

False

The performance of para-virtualization cannot be further improved by building virtualization capabilities into the processor.

False

The possession of a patent represents a core competency of a company.

False

The primary function of a DNS server is to translate the IP address of a computer to its domain name.

False

The primary goal of server virtualization technology is to reduce the number of storage discs in a data center.

False

The source IP address in a VPN packet is the IP address of the source computer.

False

Transaction costs are related to agency costs, with transaction costs being typically greater agency costs.

False

A business is deploying some new IT which will result in significant cost reduction through automation. Which of the following is the IT likely to change immediately? I. Information flows II. Routines for how work is done III. Compensation structure of its top executives IV. Mission of the company

I and II

Which of the following statements are true about SANs? I. SANs decrease the cost of storage II. A SAN is a backend network while Ethernet is a frontend network III. SANs are for the purpose of directly attaching storage discs to servers. IV. Cloud computing providers cannot benefit from the technology of SANs.

I and II

Which of the following statements are true about relational databases? I. Relational databases get their name from the fact that a relation corresponds to a table in a relational database. II. Firms may utilize databases other than relational databases. III. In mapping an E-R diagram to a set of tables in a relational database, only the entities in the E-R diagram are mapped to tables in the database. IV. In mapping an E-R diagram to a set of tables in a relational database, each attribute of an entity is given a separate table.

I and II

An Internet wiki can be used by a distributed team to create a report for a project the team is working on. Different members of the team can work on different pages of the project report without worrying about when other members will be working on their sections of the report. Which of the following statements would be true about wikis? I. A wiki is an example of collaboration software.II. A wiki is an example of software that is mainly used for integrating different business processes within a firm.III. If a wiki is used, the team members can work asynchronously.IV. Team members must work synchronously when using a wiki.

I and III

Which of the following may lead to competitive advantage for the firm: I. Having unique features in the product that delight customers. II. Handling the processing of product returns over the web per the norms of the industry. III. Using sophisticated business intelligence (BI) software to find hidden trends in consumer preferences and targeting products at these trends. IV. Complying with the standards of the industry that the firm belongs to.

I and III

Which of the following statements are true about cloud computing? I. Security and reliability issues with cloud computing have become less of a problem today. II. Large companies do not use cloud computing. III. Cloud computing providers can make use of the same types of technologies used in a firm's data center, for example SANs, to reduce costs. IV. Cloud computing triggered the era of grid computing.

I and III

Which of the following statements are true about the eras of digital computing? I. The world wide web was invented in the enterprise computing era. II. Grid computing defines one of the eras in digital computing. III. Local area networks did not exist in the mainframe era. IV. Distributed processing characterized the mainframe era.

I and III

Which of the following statements are true? I. Computer science, operations research, and psychology are some of the underlying disciplines of the MIS field. II. Sociology, history, and economics are some of the underlying disciplines of the MIS field. III. Economics, computer science, and sociology are some of the underlying disciplines of the MIS field. IV. Economics, biology, and management science are some of the underlying disciplines of the MIS field.

I and III

Which of the following may lead to competitive advantage for the firm? I. Providing products that are engineered so well that they require very little maintenance and servicing. II. Providing information on the status of the service order over the web per the norms of the industry. III. Offering service contracts for the products the firm sells per industry norms. IV. Having the service performed by a third-party provider.

I only

Which of the following statements are true about Ethernet networks?I. Some versions of Ethernet networks can support speeds in the 10 Gigabits/second range. II. There are both copper-based as well as fiber optic-based Ethernet networks. III. Ethernet is a network layer protocol. IV. Ethernet is an example of a backend network.

I, II

Which of the following statements are true about hyperconvergence? I. Hyperconvergence virtualizes the SAN. II. Hyperconvergence can reduce IT costs by eliminating the SAN and its associated costs. III. The problem with the SAN model is that when you move a VM from one hypervisor host to another, you have to move the all the files associated with that VM to the other host. IV. The problem with hyperconvergence is that if the host where the files of a VM reside goes down, that VM can no longer function. VM - Virtual Machine

I, II

Which of the following statements are true? I. Firms that innovate using IT have a competency that can result in competitive advantage. II. A core competency is a valuable resource from the standpoint of RBV theory, but a valuable resource need not necessarily be a core competency. III. IT can support the RBV and Core Competency theories but not Porter's theory of competitive advantage. IV. Porter's theory of competitive forces and sustainable market strategies provides a complete view of the phenomenon of competitive advantage.

I, II

Which of the following would be viewed as capabilities offered by data mining systems? I. Predicting turns in the market II. Identifying high-value customers III. Identifying associations between purchases IV. Identifying chronological sequences of purchases

I, II, III and IV

Which of the following statements about cloud computing are true? I. Cloud computing generally lowers the costs of delivering application services. II. Cloud computing providers deliver software as a service. III. The long-term business model of cloud computing, i.e., whether it will turn out to be cheaper over a 20-year period is yet to be proven. IV. SANs and virtualization can both be used in a cloud computing provider's data center.

I, II, III, and IV

Which of the following statements are true about business operations and the information systems that support operations? I. ERP systems help in reducing the cost of operations. II. Of the three types of systems, ERP, CRM, and SCM, CRM systems have the most direct impact on customer satisfaction. III. Long lead times is a form of operational inefficiency. IV. SCM helps synchronize activities in the supply chain.

I, II, III, and IV

Which of the following statements are true about enterprise systems? I. ERP systems are more internally oriented than SCM systems. II. SAP is an example of an enterprise system. III. Nowadays, it is possible to purchase an ERP system that bundles in CRM and SCM packages IV. Enterprise systems can help with enhancing operational efficiency

I, II, III, and IV

Which of the following choices may lead to competitive advantage? I. Introducing innovative products, services, and business models II. Charging less for superior products III. Responding to customers as quickly as required by the norms of the industry IV. Offering service plans for the products the firm sells that offer more value for the price relative to those of its competitors

I, II, IV

Which of the following statements about RFID are true? I. RFID is a technology that is expected to eventually replace optical bar code scanning. II. RFID is intended to make inventory management easier. III. The way RFID works is that a person holding an RFID reader goes to where an item of inventory with an RFID tag is located and moves the reader over the tag to obtain information about that item. IV. A firm such as Walmart can improve operational efficiency through the use of RFID technology.

I, II, IV

Which of the following choices may lead to competitive advantage: I. Introducing innovative products, services, and business models II. charging less for superior products III. Responding to customers more quickly than the industry average IV. Offering service plans on products per industry practices

I, II, and III

Consider the scenario of a manager making a decision to outsource 1,000 jobs to a low-cost service provider. Which of the following statements are true? I. Applying the Utilitarian Principle would indicate to the manager to proceed with the outsourcing decision. II. Applying the Golden Rule would indicate to the manager to proceed with the outsourcing decision. III. Applying the Golden Rule would indicate to the manager to not proceed with the outsourcing decision. IV. Applying the Utilitarian Principle would indicate to the manager to not proceed with the outsourcing decision.

I, III

Which of the following statements about cloud computing are true? I. Cloud computing together with mobile computing form the computing area we are currently in. II. Cloud computing providers cannot benefit from the technology of virtualization. III. Generally, small and medium businesses find the cloud computing model more attractive than large Fortune 500 enterprises. IV. The goals of cloud computing and green computing are inconsistent.

I, III

Which of the following statements are true about VPNs? I. VPN stands for virtual private network. II. VPN stands for voice packetized network. III. VPN can be used for sending encrypted information through the Internet. IV. If you are using the Internet, then there is no need for VPN.

I, III

Which of the following statements are true about the Internet? I. The majority of the computers currently connected to the Internet follow the IPv4 standard. II. A key difference between IPv4 and IPv6 is that IPv4 supports 16-byte addresses while IPv6 supports 4-byte addresses. III. Both IPv4 and IPv6 are network layer protocols. IV. We can expect that IPv6 deployment will be completed by the end of 2021.

I, III

Which of the following statements are true? I. An ESS provides a view of the overall state of the business. II. A portal is the same thing as a website. III. DSS systems can be used by both executives as well as middle management in supporting complex decisions. IV. MIS systems feed transactional data to TPS systems for processing.

I, III

Which of the following statements are true? I. Information systems transform data into information. II. The three main categories of information systems are TPS, MIS, and ESS. III. Stockholders are part of the environment of an information system. IV. An ERP system is one of the three main categories of information systems.

I, III

Which of the following statements are true about Internet traffic in terms of the usage of Internet resources such as bandwidth? I. Streaming video is the most dominant type of Internet traffic today. II. Peer-to-peer file sharing, which includes downloads of video files, is the most dominant form of Internet traffic today. III. Search traffic is a rapidly growing form of Internet traffic. IV. VPN is not a dominant form of Internet traffic today.

I, III, IV

Which of the following statements are true about artificial intelligence (AI)? I. Neural nets can be used for speech recognition. II. Neural net is a statistical method for predicting a human's response or decision based on a set of inputs. III. A neural net can have several hidden layers. IV. A neural net can be used to assess the credit worthiness of an individual

I, III, IV

Which of the following statements are true about networks? I. The Internet is an example of a wide area network. II. WiFi is an example of a wide area network. III. Ethernet is an example of a local area network. IV. SAN is also called a backend network.

I, III, IV

Which of the following statements are true about transmission lines or networks? I. There is more penetration of fiber-optic transmission lines in the backbone networks of the Internet than there is in customer premises networks. II. T3 lines offer higher speeds than FastEthernet. III. An advantage of fiber-optic transmission is that it is less susceptible to electromagnetic interference. IV. Fast Ethernet gives better performance than 802.11g networks.

I, III, IV

Which of the following statements are true? I. The HTTPS protocol encrypts data packets exchanged between the web browser and the web server. II. In the SSL/TLS handshake, the web browser on the client machine authenticates the web server on the server machine using symmetric encryption. III. In the SSL/TLS handshake, the web browser on the client machine sends the session key and other information to the web server on the server machine encrypted by the web server's public key. IV. In the HTTPS protocol, the data packets exchanged between the web browser and the web server are encrypted and decrypted using the same key.

I, III, IV

Which of the following statements are true? I. Linux and MySQL are often used together. II. The era of autonomic computing preceded that of enterprise computing. III. The semantic web is a defining characteristic of Web 3.0. IV. Fiber-optic transmission media generally offer higher bandwidth than copper-based media.

I, III, IV

Which of the following statements are true? I. Para-virtualization offers better performance than Hypervisor-based virtualization. II. The purpose of server virtualization is to increase the utilization of the storage discs attached to the server. III. Both Windows and UNIX applications can run simultaneously on a server with a hypervisor. IV. In kernel-based virtualization, all virtual machines must run the same operating system.

I, III, IV

In many situations, not just one but several ethical principles could be relevant. If a driver is texting while driving, which of the following ethical principles would apply? I. Golden rule II. No Free Lunch III. Kant's categorical imperative IV. Descartes rule of change

I, III, and IV

Which of the following statements are true about data normalization? I. It typically results in breaking up large denormalized tables into multiple smaller normalized tables. II. Normalization is done to improve the efficiency of querying databases. III. Normalization is done to improve the maintainability of databases. IV. Queries performed on a set of normalized tables would typically involve joining of tables.

I, III, and IV

Which of the following statements are true about dynamic keying? I. Dynamic keying is more secure than static keying. II. The WEP security protocol uses dynamic keying. III. Dynamic keying involves using a different key for each instance of access. IV. It is better to use dynamic keying over a wireless network than static keying.

I, III, and IV

Which of the following statements about the Internet are true? I. Even though HTML has become obsolete in that web pages are not built using HTML elements directly, HTML traffic is still there on the Internet. II. HTML is used between a Web Service and a software application invoking that Web Service. III. The main purpose of a domain name server is to map an IP address to its associated domain name. IV. The Internet is not an inherently secure medium.

I, IV

Which of the following statements are true about IT infrastructure and emerging technologies? I. Aligning the technology with the business remains a challenging task. II. Autonomic computing is widely deployed in businesses. III. Mobile computing is part of the era of enterprise computing. IV. SANs can lower the cost of storage.

I, IV

Which of the following statements are true about artificial intelligence (AI)? I. Neural nets cannot truly replicate human imagination, intuition, and creativity. II. Neural nets cannot be trained in an unsupervised learning environment. III. Deep learning refers to using a sophisticated statistical model in transforming input variables to response variables. IV. The transfer function of a neuron converts the weighted sum of its input signals to an output signal.

I, IV

Which of the following statements are true about packet switching? I. The packets resulting from the segmentation, or packetization, of a file can take different routes to the destination computer. II. There is no mechanism available in packet-switched networks to give some packets a higher priority than other other packets. III. Packet-switched networks cannot support voice traffic. IV. Packet-switched networks can support streaming video traffic.

I, IV

Which of the following are examples of an entity and an attribute of the entity? I. PRODUCT and PURCHASE ORDER II. PRODUCT and PRICE III. PRODUCT and PRODUCT DESCRIPTION IV PRODUCT and CUSTOMER

II and III

Which of the following statements are true about IT and its impact on the organization? I. Wealthy countries such as the US did not outsource work in the 60's because labor in the outsourcing services provider countries was more expensive relative to the labor in the US in the 60's than it is today. II. The effect that IT has of shrinking the workforce by outsourcing work is supported by transaction cost theory. III. IT can both flatten and shrink the organization. IV. Shrinking the organization is primarily about removing layers of management.

II and III

Which of the following statements are true about IT infrastructure and emerging technologies? I. Blade computing results in a doubling of the power of a computer every 18 months. II. Mobile computing is part of the current era of digital computing. III. Aligning the technology with the business is expected to remain a challenge going forward. IV. Businesses are moving to the grid computing model.

II and III

Which of the following statements are true about the different eras of digital computing? I. Distributed processing was invented in the PC era. II. Storing files on a file server rather than your PC is a form of client-server computing. III. A key application of wide area enterprise networks was the world-wide web. IV. Local area networks were used to connect PCs to servers in the PC era.

II and III

Which of the following are open-source products? I. DB2 II. MySQL III. SQL Server IV. Linux

II and IV

Which of the following statements about spoofing are true? I. Spoofing is a benign security threat and therefore not punishable by the law. II. Spoofing involves masquerading as a legitimate server. III. Spoofing refers to placing a tap on the communication line and picking up all the packets flowing over that line. IV. Passwords can be stolen by someone involved in spoofing.

II and IV

Which of the following statements are true about the IT market landscape? I. Profit margins are much thinner in the enterprise computing space than in the PC space. II. If you want to buy network equipment, Cisco would be a good choice of a vendor. III. Microsoft produces a version of the UNIX operating system. IV. Dell has acquired EMC.

II and IV

Which of the following statements are true about the various moral dimensions of IS? I. If software crashes and damages the firm's business, it is not difficult identify if the user or the software vendor is at fault. II. IT has made it easier to commit crimes. III. It is easy to deliver flawless software but vendors don't do it because they want higher profit margins for their product. IV. Software liability is an area of the law that is still evolving.

II and IV

Which of the following statements are true about trends in the IT infrastructure? I. Autonomic computing is widely deployed in businesses. II. The search for extra-terrestrial intelligence or SETI is an example of an application running on a grid computer. III. Mobile computing is part of the enterprise computing era. IV. Server virtualization helps in consolidating the number of servers.

II and IV

Which of the of the following statements about Linux are true? I. Linux is now owned by IBM. II. Linux is spreading quickly and Linux is now moving into mobile devices such as smartphones. III. Linux has 80% of the server operating system market. IV. Linux is freely downloadable from the Internet.

II and IV

What type of information system would best support the goal of reducing costs throughout the company?

ERP

Which of the following represents a collection of 4 enterprise systems?

ERP, KMS, CRM, SCM

Which of the following represents a collection of 4 enterprise systems?

ERP, KMS, CRM, and SCM

Invoking a Web Service involves an exchange of XML messages between the calling application and the Web Service.

True

Buying and selling goods over the Internet is called

E-commerce

A non-typical business problem whose causes and effects are not well understood is best modeled by a

DSS

Which type of system would be best for making a decision on where to open a new manufacturing plant?

DSS

Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records?

DSS

During the financial crisis of 2007 to 2009, many were against the government's action of bailing companies such as GM. They argued that the government simply cannot keep bailing out companies. Which of the following ethical principles were they applying in making this argument?

Descartes Rule of Change

Which of the following requires collaboration between employees as opposed to simply looking up the information in an information system?

Determining whether to change suppliers.

The type of information system that would be of most value to Walmart's low-cost leadership market strategy is a(n)

ERP

A system that provides a real-time view of the overall state of the business is called a(n)

ESS

Which type of player is likely to produce products for several different market segments?

Product Differentiator

The issue of outsourcing and its ethical implications such as job loss, worker retraining, and impact on the community falls within the moral dimension of

Quality Of Life

The outsourcing of jobs with all its moral implications best falls into which of the following moral dimensions of IS?

Quality of Life

When storage discs are pooled, computer servers access these storage discs via a

SAN

If you need a computer server to run both Windows and UNIX software applications at the same time, the technology that accomplishes this is called

Server virtualization

Which of the following costs does SOA directly reduce?

Software development

Redirecting a Web link to a different address is a form of

Spoofing


Set pelajaran terkait

Gen Bus 301 - Lectures 17.1 - 17.6 (Relationship of Principal and Agent)

View Set

Possible Ecology Exam Taylor University Reber

View Set

Chapter 33: International Macroeconomics

View Set

Schizophrenia and Substance Abuse EAQ

View Set

Public Speaking Final Exam Guide

View Set