Management of Info Systems Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is the best definition of an information system? A) A set of interrelated components that collects (or retrieve), process, store, and distribute information to support decision making and control in an organization B) Computers, keyboards, printers, and telecommunications devices C) A set of detailed programmed instructions that transform raw data into information D) Physical devices and software that can be connected to share voice, data, images, sound, and video

A) A set of interrelated components that collects (or retrieve), process, store, and distribute information to support decision making and control in an organization

How are information systems used at the industry level to achieve strategic advantage? A) By building industry-wide, IT-supported consortia and symposia B) By raising the bargaining power of suppliers C) By encouraging the entry of new competitors D) By enforcing standards that reduce the differences between competitors E) By enabling companies to develop customer intimacy

A) By building industry-wide, IT-supported consortia and symposia

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A) DDoS B) DoS C) SQL injection D) phishing E) botnet

A) DDoS

In TCP/IP, IP is responsible for which of the following? A) Disassembling and reassembling packets during transmission B) Establishing an Internet connection between two computers C) Moving packets over the network D) Sequencing the transfer of packets E) Breaking messages down into packets

A) Disassembling and reassembling packets during transmission

Which of the following refers to the purchase or sale of goods and services over the Internet? A) E-commerce B) E-business C) CRM D) MIS E) SCM

A) E-commerce

Which are the three major dimensions of business problem solving? A) Organizational dimensions, people dimensions, and technology dimensions B) Organizational dimensions, people dimensions, and environmental dimensions C) People dimensions, technology dimensions, and environmental dimensions D) Technology dimensions, organizational dimensions, and environmental dimensions E) Organizational dimensions, technology dimensions, and cultural dimensions

A) Organizational dimensions, people dimensions, and technology dimensions

Which of the following devices collects data directly from the environment for input into a computer system? A) Sensor B) Touch screen C) Audio input D) Trackball E) Digital scanner

A) Sensor

A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives? A) Survival B) Improved decision making C) Competitive advantage D) Operational excellence E) Customer intimacy

A) Survival

On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS

A) TCP/IP

________ technology allows a videoconference participant to give the appearance of being present at a location other than his or her true physical location A) Telepresence B) Virtual reality C) Screen sharing D) Mind mapping E) Virtual world

A) Telepresence

What would be a reason for using a workstation rather than a personal computer? A) When you need more powerful computational abilities B) When you need to access a network C) When you need to serve applications and data to client computers D) When you need to share resources E) When you need to connect to a cloud computing platform

A) When you need more powerful computational abilities

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history A) behavioral targeting B) Web bugs C) NORA D) intelligent agents E) FIP principles

A) behavioral targeting

Benchmarking: A) compares the efficiency and effectiveness of your business processes against strict standards. B) allows industry participants to develop industry-wide standards. C) is used to measure the speed and responsiveness of information technology. D) synchronizes the business processes of customers, suppliers, and trading partners. E) coordinates the value chains of independent firms to enable them to collectively produce a product or service

A) compares the efficiency and effectiveness of your business processes against strict standards.

Redesigning and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. E) it can concentrate power in the hands of senior executives.

A) increases in efficiency may be accompanied by job losses.

A VPN A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. E) is a proprietary networking service technology developed by individual corporation

A) is an encrypted private network configured within a public network.

A Trojan horse A) is software that appears to be benign but does something other than expected. B) is a virus that replicates quickly. C) is malware named for a breed of fast-moving Near-Eastern horses. D) installs spyware on users' computers. E) is a type of sniffer used to infiltrate corporate networks

A) is software that appears to be benign but does something other than expected.

An ESS is an information system that supports the: A) long-range planning activities of senior management. B) knowledge and data workers in an organization. C) decision-making and administrative activities of middle managers. D) day-to-day processes of production. E) management of customer relationships

A) long-range planning activities of senior management.

A field identified in a table as holding the unique identifier of the table's records is called the A) primary key. B) key field. C) primary field. D) foreign key. E) identifying field

A) primary key.

An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except A) the minimum response time for processing business transactions. B) lost productivity if hardware or software failures cause the system to be unavailable for processing and user tasks. C) real estate and utility costs for housing and providing power for the technology. D) the purchase or license of software for each user. E) the cost to provide training to information systems specialists and end users

A) the minimum response time for processing business transactions.

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n) A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. E) child domain

A) uniform resource locator.

A(n) ________ is software for locating and managing stored web pages. A) web server B) net server C) router D) modem E) hub

A) web server

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A) Liability B) Due process C) Responsibility D) Accountability E) The judicial system

B) Due process

Which of the following illustrates the use of information systems to achieve product differentiation? A) A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy B) A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers C) A PC manufacturer's use of information systems to facilitate direct access from suppliers to production schedules D) A grocery store chain's use of information systems to produce products and services at a lower price than competitors E) A hotel chain's use of information systems to analyze detailed data on guests to determine each guest's profitability

B) A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers

Which of the following is the best description of a protocol in a telecommunications network architecture? A) A device that handles the switching of voice and data in a local area network B) A standard set of rules and procedures for control of communications in a network C) A communications service for microcomputer users D) The main computer in a telecommunications network E) A pathway through which packets are routed

B) A standard set of rules and procedures for control of communications in a network

The enormous volume of data generated by Internet activity such as web traffic, email, and social media is referred to as: A) IoT B) Big data C) The mobile digital platform D) cloud computing E) Business intelligence

B) Big data

The six important business objectives of information system investment include all of the following except A) Competitive Advantage B) Employee Morale C) Improved decision making D) Survival E) New products

B) Employee Morale

Web browser software requests web pages from the Internet using which of the following protocols? A) URL B) HTTP C) DNS D) HTML E) FTP

B) HTTP

Which of the following best describes the effect that new information technology has on society? A) It has a dampening effect on the discourse of business ethics. B) It has a ripple effect, raising new ethical, social, and political issues. C) It is beneficial for society as a whole while raising dilemmas for consumers. D) It has a waterfall effect in raising ever more complex ethical issues. E) It has a magnifying effect, creating increasing numbers of ethical issues.

B) It has a ripple effect, raising new ethical, social, and political issues.

An example of a business using information systems for supplier intimacy is: A) Apple's creation of the iPad B) JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced. C) Citibank's ATM system D) Verizon's web-based digital dashboard providing real-time company information for managers. E) The Mandarin Orientals use of computers to keep track of guest's preferences.

B) JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced.

________ provides users with free access to its program code. A) An app B) Open source software C) Cloud-based software D) A web service E) Office software

B) Open source software

________ is malware that hijacks a user's computer and demands payment in return for giving back access A) A Trojan horse B) Ransomware C) Spyware D) A virus E) An evil twin

B) Ransomware

All of the following are tools or technologies for extracting information from unstructured data sets except A) sentiment analysis software. B) SQL queries. C) Hadoop. D) a non-relational DBMS. E) text mining

B) SQL queries.

________ systems integrate and share information from suppliers, manufacturers, distributors, and logistics companies A) Collaborative distribution B) Supply chain management C) Reverse logistics D) Enterprise planning E) Digital dashboard

B) Supply chain management

The ability of a person booking a flight on Southwest.com's website to reserve a car from Dollar Rent-A-Car without having to leave the airline'swebsite is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following? A) Cloud computing B) Web services C) Nanotechnology D) SaaS E) PaaS

B) Web services

Software used to apply the computer to a specific task for an end user is called A) system software. B) application software. C) data management software. D) network software. E) web services software.

B) application software.

When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy A) product differentiation B) market niche C) mass customization D) process efficiency E) market transparency

B) market niche

When a cookie is created during a website visit, it is stored: A) on the website's server. B) on the hard drive of the visitor's computer. C) on the ISP's servers. D) in the browser's application settings. E) nowhere because they are only used during a visit and are discarded once a visitor leaves the Web site.

B) on the hard drive of the visitor's computer.

The three principal levels of hierarchies within a business organization are: A) senior management, knowledge workers, and service workers. B) senior management, middle management, and operational management. C) senior management, data workers, and operational management. D) senior management, operational management, and workers. E) senior management, operational management, and data workers

B) senior management, middle management, and operational management.

Which of the following illustrates the use of information systems to strengthen customer and supplier intimacy? A) A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy B) A shoe manufacturer's use of information systems in selling custom, made-to-order shoes directly to customers C) A PC manufacturer's use of information systems to facilitate direct access from suppliers to their production schedules D) A grocery store chain's use of information systems to produce products and services at a lower price than competitors E) An airline's use of information systems to analyze detailed data on customers to determine each customer's profitability

C) A PC manufacturer's use of information systems to facilitate direct access from suppliers to their production schedules

________ is spyware that logs and transmits everything a user types A) Spyware B) A Trojan horse C) A keylogger D) A worm E) A sniffer

C) A keylogger

What are the four layers of the TCP/IP reference model? A) Physical, Application, Transport, and Network Interface B) Physical, Application, Internet, and Network Interface C) Application, Transport, Internet, and Network Interface D) Application, Hardware, Internet, and Network Interface E) Software, Hardware, Network Interface, Internet

C) Application, Transport, Internet, and Network Interface

The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP E) Email, instant messaging, and newsgroups

C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers

Which of the following systems is especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance? A) MIS B) TPS C) DSS D) KMS E) CRM

C) DSS

Which of the following is not an example of a computer used as a target of crime? A) Knowingly accessing a protected computer to commit fraud B) Accessing a computer system without authority C) Illegally accessing stored electronic communication D) Threatening to cause damage to a protected computer E) Breaching the confidentiality of protected computerized data

C) Illegally accessing stored electronic communication

The three activities in an information system that produce the information organizations use to control operations are: A) information, research, and analysis B) Input, output, and feedback C) Input, processing, and output D) Data analysis, processing, and feedback E) information, data, and processing

C) Input, processing, and output

Which of the following fields deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm? A) Information systems literacy B) Information systems architecture C) Management information systems D) Information technology infrastructure E) Computer information systems

C) Management information systems

Which of the following statements about spam is not true A) Most spam originates from bot networks. B) Cell phone spam usually comes in the form of SMS text messages. C) Over 75 percent of all email is spam. D) Spamming has mushroomed because it is so inexpensive and can reach so many people. E) Spamming is more tightly regulated in Europe than in the United States.

C) Over 75 percent of all email is spam.

Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors. E) Packets are reassembled into the original message when they reach their destinations

C) Packet switching requires point-to-point circuits.

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address? A) Hub B) Switch C) Router D) NIC E) Modem

C) Router

Which of the following is not a defining feature of Web 2.0? A) Interactivity B) Real-time user control C) Semantic search D) Social participation (sharing) E) User-generated content

C) Semantic search

Which business objective was competitors seeking when they rushed to provide ATMs after Citibank introduced the first ATMs in New York? A) Improved efficiency B) Customer and supplier intimacy C) Survival D) Competitive advantage E) Improved decision making

C) Survival

Which of the following would you use to find out which websites with content related to database design were the most often linked to by other websites? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining E) Web protocol mining

C) Web structure mining

Linux is A) primarily concerned with the tasks of end users. B) designed for specific machines and specific microprocessors. C) an example of open source software. D) especially useful for processing numeric data. E) the operating system for the Macintosh computer.

C) an example of open source software.

Rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is referred to as A) data cleansing. B) data mining. C) an information policy. D) logical database design. E) a data quality audit

C) an information policy.

Non-relational databases A) store information in an unstructured format. B) use rows and columns to organize data. C) are used to store structured and unstructured data. D) are used to store low volumes of transactional data. E) use database-mapping to normalize relations

C) are used to store structured and unstructured data.

Virtualization A) allows one operating system to manage several physical machines. B) has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. C) can boost server utilization rates to 70% or higher. D) allows smartphones to run full-fledged operating systems. E) uses the principles of quantum physics to represent data.

C) can boost server utilization rates to 70% or higher.

Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called A) system software. B) application software. C) data management software. D) network software. E) web services software

C) data management software.

As described in the chapter case, the Charlotte Hornets used a ________ to consolidate fan data from multiple sources A) database management system B) relational database C) data warehouse D) data model E) fan management system

C) data warehouse

All of the following can be considered managerial responsibilities except: A) making action plans to solve organizational problems. B) creating new products and services. C) designing new information systems. D) allocating human resources to coordinate the work to be done. E) setting strategy for responding to business challenges in the environment

C) designing new information systems.

Producing a bill of materials is a responsibility of the ________ function A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing E) technology

C) manufacturing and production

All of the following are considered primary activities of a firm except: A) inbound logistics. B) sales and marketing. C) procurement. D) service. E) outbound logistics

C) procurement.

In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and where. B) select, join, and where. C) select, project, and join. D) select, from, and join. E) who, what, and where

C) select, project, and join.

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of A) click fraud. B) DDOS attack. C) spear phishing. D) pharming. E) identity theft

C) spear phishing.

Instant messaging, videoconferencing, and shared screens are all examples of ________ collaboration tools A) bimodal B) colocated C) synchronous D) spontaneous E) asynchronous

C) synchronous

The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) IEEE 802.11b. C) Wi-Fi. D) Bluetooth. E) RFID

D) Bluetooth.

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers A) RSS B) WAN C) NFP D) ISP E) FTP

D) ISP

All of the following describe the effects of globalization except: A) Significant decreases in operating costs B) Reduction of labor costs through outsourcing C) Ability to find low-cost suppliers D) Increases in transaction costs E) Replication of business models in multiple countries

D) Increases in transaction costs

A human resources system that summarizes the total moving, house-hunting, and home financing costs for employees in all company divisions is an example of which of the following A) KMS B) TPS C) ESS D) MIS E) CRM system

D) MIS

A manufacturer of deep-sea oil rigs may be least concerned about which of these marketplace forces? A) Product differentiation B) Traditional competitors C) Low number of suppliers D) New market entrants E) Substitute products

D) New market entrants

Which of the following is not an essential characteristic of cloud computing? A) On-demand self-service B) Rapid elasticity C) Measured service D) Open source software E) Ubiquitous network access

D) Open source software

Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFID tags and antennas come in a variety of shapes and sizes

D) RFIDs require line-of-sight contact to be read

The most successful solutions or methods for achieving a business objective are called: A) core processes. B) best processes. C) benchmarks. D) best practices. E) value webs

D) best practices.

The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched E) client/server

D) circuit-switched

All of the following are traditional storage technologies except A) magnetic disks. B) optical drives. C) magnetic tape. D) cloud computing. E) storage networks

D) cloud computing.

A ________ is a repository for raw unstructured data or structured data that for the most part have not yet been analyzed. A) data mart B) data warehouse C) dashboard D) data lake E) relational DBMS

D) data lake

Client/server computing is a: A) network that connects sensors to desktop computers. B) network where centralized mainframe computers serve local devices. C) centralized model of computing for large corporations. D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer. E) centralized computing model where local computers are connected to one another by a network.

D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

An information system can enhance core competencies by: A) providing better reporting facilities. B) creating educational opportunities for management. C) allowing operational employees to interact with management. D) encouraging the sharing of knowledge across business units. E) synchronizing the value chains of business partners with an industry

D) encouraging the sharing of knowledge across business units.

The most basic business database is comprised of A) three tables: for suppliers, parts, and sales. B) four tables: for customers, suppliers, parts, and sales. C) four tables: for customers, suppliers, sales, and employees. D) five tables: for customers, employees, suppliers, parts, and sales. E) attributes instead of tables

D) five tables: for customers, employees, suppliers, parts, and sales.

The value chain model: A) categorizes five related advantages for adding value to a firm's products or services. B) sees the supply chain as the primary activity for adding value. C) categorizes four basic strategies a firm can use to enhance its value chain. D) helps a firm identify points at which information technology can most effectively enhance its competitive position. E) focuses primarily on collaboration with suppliers

D) helps a firm identify points at which information technology can most effectively enhance its competitive position.

In a ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. A) scalable B) quantum C) grid D) hybrid cloud E) private cloud

D) hybrid cloud

The ethical "no free lunch" rule states that: A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E) if an action is not right for everyone to take, it is not right for anyone to take.

D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

The support activities of a firm include: A) inbound logistics, technology, outbound logistics, sales and marketing, and service. B) inbound logistics, organization infrastructure, outbound logistics, technology, and procurement. C) organization infrastructure, human resources, sales and marketing, and technology. D) organization infrastructure, human resources, technology, and procurement. E) sales and marketing, procurement, human resources, and technology

D) organization infrastructure, human resources, technology, and procurement

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule

D) the Golden Rule

A(n) ________ performs and records the daily activities of a firm necessary to conduct business A) executive support system B) management-level system C) decision support system D) transaction processing system E) business intelligence system

D) transaction processing system

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture A) service-oriented B) on-demand C) multitiered client/server D) two-tiered client/server E) grid

D) two-tiered client/server

All of the following are new technology-related trends in MIS except: A) Cloud computing B) Big Data C) IoT D) The mobile digital platform E) Co-creation of business value

E) Co-creation of business value

Which of the following is the most common reason that business systems fail? A) Software bugs B) Software errors C) Hardware failures D) Facilities failures E) Data quality

E) Data quality

Which of the following statements about botnets is not true A) Eighty percent of the world's malware is delivered by botnets. B) Botnets are often used to perpetrate DDoS attacks. C) Ninety percent of the world's spam is delivered by botnets. D) Botnets are often used for click fraud. E) It is not possible to make a smartphone part of a botnet

E) It is not possible to make a smartphone part of a botnet

Which of the following enables users to view the same data in different ways using multiple dimensions? A) Hadoop B) SQL C) Big data D) Data mining E) OLAP

E) OLAP

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A) Multiplexing B) Packet shifting C) Packet routing D) ATM E) Packet switching

E) Packet switching

Which of the following is not one of the competitive forces in an industry's environment in Porter's model? A) Suppliers B) Suppliers C) New market entrants D) Customers E) Technology

E) Technology

Telepresence is an example of which of the following? A) Business intelligence B) Social business C) IoT D) Mobil digital platform E) Virtual meeting

E) Virtual meeting

All of the following are technical solutions to protecting user privacy except: A) email encryption. B) anonymous surfing. C) anonymous email. D) preventing client computers from accepting cookies. E) data use policies

E) data use policies

A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, usable by many, parts of the business. A) TPS B) DSS C) automatic reporting system D) MIS E) enterprise system

E) enterprise system

A schematic of the entire database that describes the relationships in a database is called a(n) A) data dictionary. B) intersection relationship diagram. C) field key diagram. D) data definition diagram. E) entity-relationship diagram

E) entity-relationship diagram

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) net centers. C) hot points. D) wireless hubs. E) hotspots

E) hotspots

The backbone networks of the Internet are typically owned by long-distance telephone companies called A) regional network providers. B) enhanced service providers. C) internet bulk providers. D) backbone providers. E) network service providers.

E) network service providers.

All of the following are examples of wearable computing devices except A) smartwatches. B) smart badges. C) activity trackers. D) smart glasses. E) smartphones.

E) smartphones.

In choosing the best solution for a business problem, all of the following are important considerations except: A) the cost of the solution. B) the feasibility of the solution given existing resources and skills. C) the length of time to implement the solution. D) the attitudes of employees. E) the ability to forget about the problem once it has been solved

E) the ability to forget about the problem once it has been solved

All of the following are techniques being used to make data centers more "green" except A) air-cooling. B) virtualization. C) use of wind power. D) use of hydropower. E) use of backup generators.

E) use of backup generators.


Set pelajaran terkait

PR&R: Ch. 14 Instructions & Procedures

View Set

MKT 3031: Principles of Marketing: Test 2- Chapter 6

View Set

Worksheet 5.3: Online Defamation & Privacy

View Set

Lecture 1: Computers and Networking (+ chapters 2-4)

View Set

Merchant of Venice Character List

View Set

UNIT: INPUT-OUTPUT RELATIONSHIPS

View Set

AP Human Geography Chapter 4 Multiple Choice

View Set