MIS CH 1-5 TEST

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to agency theory, the firm is viewed as a(n)

"nexus of contracts" among self-interested individuals.

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation?

Correct His action is acceptable, because the higher social value is the survival of the family.

Which of the following describes Immanuel Kant's Categorical Imperative?

Correct If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following best describes the effect that new information technology has on society?

Correct It has a ripple effect, raising new ethical, social, and political issues.

Which of the following statements about Linux is not true?

Correct It has garnered 20 percent of the server operating system market.

As discussed in the chapter, all of the following are steps in the process for analyzing an ethical issue except

Correct assigning responsibility.

Interpretations of Moore's law assert that

Correct computing power doubles every 18 months.

You have been hired by Inspiration Inc., to help improve their profit margin. Inspiration Inc. is a business communications consultancy that services many clients in different industries throughout the United States. The end products of the company are customized recommendations for the best use of a client's existing resources for improving internal communications, typically delivered via documentation in different media. The company has approximately 100 consultants, all of whom are located in their central headquarters in Chicago. What system do you recommend to improve the company's business processes and increase their profit margin?

Correct extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed

In 2010, the FTC added all of the following recommendations to its privacy guidelines except

Correct firms should limit the length of time that any personal data is stored to six months or less.

The strength of patent protection is that it

Correct grants a monopoly on underlying concepts and ideas.

the value chain model

Correct highlights specific activities in the business where competitive strategies can best be applied.

Key differences between software and books include all of the following except

Correct software products are more easily compared to each other than books.

All of the following are cloud computing services except

Correct virtualization as a service.

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system?

DSS

Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records?

DSS

The ________ brought copyright law to the Internet age by outlawing the circumvention of technology-based protections of copyrighted materials.

Digital Millennium Copyright Act

________ is a societal practice of having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

Due process

To forecast trends in your supplier's industry that could affect your firm over the next five years, you would use a(n)

ESS

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPPA

Which of the following describes Immanuel Kant's Categorical Imperative?

If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

It blurs the traditional boundaries between work and family time.

To consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making, you would use a(n)

KMS

A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

Kant's Categorical Imperative

You would use a(n) ________ in order to determine which of your suppliers has the best and worst records for keeping to your production schedule?

MIS

A relocation control system that reports summaries on the total moving, house hunting, and home financing costs for employees in all company divisions would fall into the category of

Management information systems

The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called

Management informations systems

________ are created by combining and customizing components from different online software applications.

Mashups

________ states that the value or power of a network grows exponentially as a function of the number of network members.

Metcalfe's law

________ is a new data analysis technology that finds hidden connections between data in disparate sources.

NORA

________ uses individual atoms and molecules to create computer chips and other devices thinner than a human hair.

Nanotechnology

Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?

RSI

________ means that you accept the potential costs and obligations for the decisions you make.

Responsibility

Taking the action that produces the least harm best describes the

Risk Aversion Principle.

________ enable management to make better decisions regarding organizing and scheduling sourcing, production, and distribution.

SCMs

Which of the following decisions requires knowledge based on collaboration and interaction?

Should we work with outside vendors on new products and services?

Which of the following statements about collaboration is not true?

Successful collaboration can be achieved through technology regardless of the organization's culture or structure.

If your main supplier was late in delivering goods, which type of system would you use to update your production schedule?

TPS

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

The opt-in model

Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.

True

________ allows a single computing resource, such as a server, to appear to the user as multiple logical resources.

Virtualization

The Federal Trade Commission FIP principle of Notice/Awareness states that

Web sites must disclose their information practices before collecting data.

________ provides a standard format for data exchange, enabling Web services to pass data from one process to another.

XML

Running a Java program on a computer requires

a Java Virtual Machine to be installed on that computer.

Today's nanotechnology-produced computer transistors are roughly equivalent in size to

a virus

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

accountability

Walmart's continuous replenishment system allows it to

achieve low-cost leadership

walmarts attempts to increase its online presence is an example of a firm using information systems to

achieve low-cost leadership

Nike's forays into information technology represent an effort to

achieve product differentiation

Which of the following is not a major feature of organizations that impacts the use of information systems?

agency costs

the introduction of the minicomputer

allowed computers to be customized to specific needs of departments or business units

The introduction of the minicomputer

allowed computers to be customized to the specific needs of departments or business units.

Which of the following is the most popular mobile operating system?

android

An example of a keystone firm within a business ecosystem is

apple and software application writers in the mobile platform ecosystem

A(n) ________ server is used to communicate between a Web server and an organization's back-end systems.

application server

Legacy systems are still used because they

are too expensive to redesign

an example of synergy in business is

bank of america

________ enables advertisers to display more relevant ads based on user's search and browsing history.

behavioral targeting

An activity businesses perform to measure and compare business processes to similar processes of other companies within their industry is

benchmarking

What are the most successful solutions or methods for achieving a business objective?

best practices

Which of the following is not one of the types of information gathered by Web site tracking tools?

birthplace

________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks.

blade servers

The phenomenon of employees using their own devices in the workplace is known as

bod

A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a Web

browser

How are information systems used at the industry level to achieve strategic advantage?

by building industry-wide, IT-supported consortia and symposia

How do information systems enhance core competencies?

by encouraging the sharing of knowledge across business units

The interaction between information systems and organizations is influenced

by the development of new information technologies

Unlike regular browser cookies, Flash cookies

cannot be easily detected or deleted

Which of the following is a leading networking hardware provider?

cisco

All of the following industries have been disrupted by the Internet except

clothing

The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called

cloud computing

Which of the following objectives best describes the business strategy behind the technologies implemented by the San Francisco Giants, as discussed in the chapter case?

competitive advantage

Interpretations of Moore's law assert that

computing power doubles every 18 months

________ protects the creators of intellectual property from having their work copied by others.

copyright law

A(n) ________ is an activity at which a firm excels as a world-class leader.

core competency

An example of a cross-functional business process is

creating a new product

The most common reason business systems fail is

data quality

________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance.

decision-support

U.S. businesses are allowed to use personal data from EU countries if they

develop equivalent privacy protection policies

The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide.

digital

In ________, digital technology and the Internet are used to execute the major business processes in the enterprise.

e-business

Using the Internet to buy or sell goods is called

e-commerce

What is the most important function of an enterprise application?

enabling business functions and departments to share information

The Online Privacy Alliance

encourages self regulation to develop a set of privacy guidelines for its members.

Which of the following is a firm's CPO responsible for?

ensuring that the company complies with existing data privacy laws

A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.

enterprise

Which of the following systems is designed to support organization-wide process coordination and integration?

enterprise applications

The development of TCP/IP occurred during the ________ era.

enterprise computing

________ systems are also known as enterprise systems.

enterprise resource planning

The four major enterprise applications are

enterprise systems, SCMs, CRMs, and KMSs.

The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is

ethernet

The ethical "no free lunch" rule states that

everything is owned by someone else, and that the creator wants compensation for this work.

Which of the following systems would you expect to deliver integrated, personalized business content through a Web portal interface?

executive support systems

All of the following are competitive forces except

external environment

Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers?

extranet

You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. Which type of system will most efficiently provide a solution?

extranet

CVS refers to

eyestrain related to computer display screen use

CVS refers to

eyestrain related to computer display screen use.

A primary example of centralized processing is client/server computing.

false

According to several court findings, the general functional features of software are protected by copyright law.

false

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person.

false

An inventory control system is an example of an MIS.

false

Application server software is responsible for locating and managing stored Web pages.

false

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

false

Creative work driven by new knowledge and information is an insignificant part of management responsibility.

false

Cross-functional systems are being phased out in favor of systems that support business processes within a single functional group, such as human resources.

false

Decision-support systems are most commonly used by the operations management level of an organization.

false

For nonroutine decision making, senior managers rely on management information systems.

false

Gaining unapproved access to a computer is not a federal crime.

false

High product differentiation is a sign of a transparent marketplace.

false

IT infrastructure consists of just those physical computing devices required to operate the enterprise.

false

Identifying customers is a business process handled by the human resources function.

false

In today's legal environment, business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted.

false

Most TPSs use sophisticated mathematical models or statistical techniques.

false

Operational managers use ESS primarily to solve specific problems.

false

Production tasks are coordinated through the use of social networks in social business.

false

Quantum computing is implemented primarily with enterprise or ISP servers.

false

SANs maintain a series of servers and provide fee-paying subscribers with space to maintain their Web sites.

false

Software programs were unprotected by copyright law until the early 1990s.

false

Some organizations lack bedrock, unassailable assumptions that define their goals and products.

false

Spam is legally defined as any e-mail that is unsolicited.

false

TCO refers to the original cost of purchased technology: both hardware and software.

false

The European Parliament has yet to ban unsolicited commercial messaging.

false

The effect of the Internet has been to decrease the bargaining power of customers.

false

The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle.

false

The routine violation of individual privacy is made more difficult by advances in data storage.

false

The technology trends exhibited by Portugal Telecom, as discussed in the chapter opening case, illustrate the shift away from green computing.

false

The use of Internet technologies allows companies to more easily sustain competitive advantage.

false

Web services can exchange information between two different systems only if the operating systems and programming languages upon which the systems are based are identical.

false

You would use an MIS to help determine if your business should introduce a new product line.

false

an inventory control system is an example of an MIS

false

in he value chain model, support activities are most directly related to the production and distribution of the firm's products and services, which create value

false

In 2010, the FTC added all of the following recommendations to its privacy guidelines except

firms should limit the length of time that any personal data is stored to six months or less.

An example of a divisionalized bureaucracy is a An example of a divisionalized bureaucracy is a

fortune 500 firm

Which of the following is a highly structured decision?

granting credit to a customer

The strength of patent protection is that it

grants a monopoly on underlying concepts and ideas.

the value chain model

highlight specific activities in the business where competitive strategies can best be applies

How would you determine the market demand for your firm's IT services?

hold focus groups to assess your services

SaaS refers to

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

In environmental scanning, a firm may use information systems to

identify external events that may affect it

Which of the following is not a business benefit of collaboration?

improved compliance with government regulations

FWO's use of SharePoint for project management is an example of using information systems to achieve which business objective?

improved decision making

The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and

improved decision making

Verizon Corporation's use of a Web-based digital dashboard to provide managers with precise real-time information illustrates which business objective?

improved decision making

Which of the following represent the primary activities of a firm?

inbound logistics, operations, outbound logistics, sales and marketing, and service

Which of the following is not one of the current key technology trends that raises ethical issues?

increase in multimedia quality

Re-designing and automating business processes can be seen as a double-edged sword because

increases in efficiency may be accompanied by job losses.

The central business activities of ChoicePoint raise which of the five moral dimensions?

information rights and obligations

All of the following are considered disruptive technologies except

instant messaging

Which of the following best describes intellectual property?

intangible property created by individuals or corporations

Which of the following are key corporate assets?

intellectual property, core competencies, and financial and human assets

Why does Amazon.com need to worry about competitors in online shopping?

internet technologies are universal, and therefore usable by all companies

All of the following statements regarding IBM Notes are true except which one?

it began as an e-mail and messaging client

All of the following statements are true about information technology's impact on business firms except

it helps firms expand in size

Which of the following is the primary reason that the practice of spamming has grown exponentially?

it is very inexpensive and can reach so many people

How does the technical view of organizations fall short of understanding the full impacts of information systems in a firm?

it sees the inputs and outputs, labor and capital, as being infinitely malleable

Executive support systems are information systems that support the

long-range planning activities of senior management.

Amazon's use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates a use of information services for

low-cost leadership

The four major competitive strategies are

low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy.

Mintzberg classifies a large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management as a ________ bureaucracy.

machine

The Internet raises the bargaining power of customers by

making information available to everyone

An information systems manager

manages data entry stuff

A business process in the ________ function is producing bills of material.

manufacturing and production

Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors.

market niche

________ are created by combining and customizing components from different online software applications.

mashups

The ability to offer individually tailored products or services using the same production resources as bulk production is known as

mass customization

The term "management information systems" designates a specific category of information systems serving

middle management functions.

A firm can exercise greater control over its suppliers by having

more suppliers

Privacy protection in the United States is ________ in Europe.

much less stringent than

A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.

multicore processor

Which of the following is not one of the current software platform trends?

multicore processors

________ surfaces allow users to gesture on a screen with several fingers to execute commands.

multitouch

________ uses individual atoms and molecules to create computer chips and other devices thinner than a human hair.

nanotechnology

A manufacturer of deep-sea oil rigs may be least concerned about this marketplace force.

new market entrants

Cookies created during Web site visits are stored

on the users computer

Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use?

on-demand

Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use? on-

on-demand

Which type of software is created and updated by a worldwide community of programmers and available for free?

open source

Software that manages the resources of the computer is called

operating system software

Which of the following is not an IT infrastructure service component?

operating system software

Software that manages the resources of the computer is called

operating system software.

In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is

operational management

The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is

operations research

Disciplines that contribute to the technical approach to information systems are

operations research, management science, and computer science.

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

opt-out

The practice of contracting custom software development to an outside firm is commonly referred to as

outsourcing

Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years?

patent

You are consulting for a cosmetics distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step?

perform a strategic systems analysis

The divergent viewpoints about how resources, rewards, and punishments should be distributed, and the struggles resulting from these differences are known as

politics

Which of the following roles in a firm would be least affected by using mobile devices to access firm information systems?

production workers

Under Mintzberg's classification of organizational structure, the knowledge-based organization where goods and services depend on the expertise and knowledge of professionals falls under the category of

professional bureaucracies

________ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.

profiling

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

quality of life

The ability to be in many different states at once, dramatically increasing processing power, is a hallmark of

quantum computing

The ability to be in many different states at once, dramatically increasing processing power, is a hallmark of

quantum computing.

Order data for baseball tickets and bar code data are examples of

raw input

Which of the following is not one of the NIST defined characteristics of cloud computing?

reduced elasticity

________ are not held liable for the messages they transmit.

regulated common carriers

Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix?

remote/colocated

The U.S. CAN-SPAM Act of 2003

requires spammers to identify themselves

________ means that you accept the potential costs and obligations for the decisions you make.

responsibility

Which of the following industries has a low barrier to entry?

restaurant

Business processes are collections of

routines

Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?

rsi

The ________ framework developed by the U.S. Department of Commerce allows U.S. businesses to legally use personal data from EU countries.

safe-harbor

The ________ function is responsible for identifying customers.

sales and marketing

a substitute product of most concern for a cable tv distributor is

satellite tv

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

scalability

network economics

sees the cost of adding new members as inconsequential

Which level of the organization are ESS specifically designed to serve?

senior management

When a software product is considered ________, it becomes difficult to hold software producers liable for flaws in their product.

similar to books

As per the ________, if an action cannot be taken repeatedly, it is not right to take at all.

slippery-slope rule

A corporation that funds a political action committee, which in turn promotes and funds a political candidate who agrees with the values of that corporation, could be seen as investing in which main category of complementary assets?

social

Data management technology consists of the

software governing the organization of data on physical storage media.

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as

software packages.

A SAN is a ________ network.

storage area

Sociotechnical changes affecting a firm adopting new information systems requiring organizational change can be considered

strategic transitions

A competitive force challenging the publishing industry is

substitute products or services

Which type of system integrates supplier, manufacturer, distributor, and customer logistics processes?

supply-chain management system

The parts of an organization's infrastructure, human resources, technology, and procurement that make the delivery of the firm's products or services possible are known as ________ activities.

support

The temp agency that you own is having serious difficulties placing temps because few of them are familiar with Internet research. Investing in training software to enhance your workers' skills is an example of using technology to achieve which business objective?

survival

When two organizations pool markets and expertise that result in lower costs and generate profits, it is referred to as creating

synergies

The principal liaison between the information systems groups and the rest of the organization is a(n)

system-analyst

According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are

tasks, technology, people, and structure

Which of the following is one of the support activities in a firm's value chain?

technology

Specifications that establish the compatibility of products and the ability to communicate in a network are called

technology standards

Specifications that establish the compatibility of products and the ability to communicate in a network are called

technology standards.

Which type of infrastructure service provides voice and video connectivity to employees, customers, and suppliers?

telecommunications

Thomas Friedman's declaration that the world was now "flat" meant that

the Internet has reduced the economic advantages of developed countries.

A managerial element in the UPS tracking system described in the chapter is

the decision to use automation.

"Look and feel" copyright infringement lawsuits are concerned with

the distinction between an idea and its expression.

"Look and feel" copyright infringement lawsuits are concerned with

the distinction between idea and its expression

From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called

the information value chain

Using ________ to enable government relationships with citizens, businesses, and other arms of government is called e-government.

the internet and networking technologies

The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output. This is referred to as

the law of diminishing returns

Which of the following best describes the basis for the FIP principles?

the mutuality of interest between the record holder and the individual

All of the following are reasons for the increased business focus on collaboration and teamwork, except for

the need for more efficient work hierarchies

________ restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information.

the privacy act of 1974

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when

the software is widely distributed

Which of the following tools would you use to evaluate and choose a collaboration tool for your organization?

the time/space collaboration and social tool matrix

In a multi-tiered network

the work of the entire network is balanced over several levels of servers.

One of the drawbacks of patent protection is

the years of waiting to receive it.

Which of the following best describes how new information systems result in legal gray areas?

they result in new situations that are not covered by old laws

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

total cost of ownership

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

total cost of ownerships

As referred to in the text, legacy systems are

traditional mainframe-based business information systems.

When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as

transaction costs

To monitor the status of internal operations and the firm's relations with the external environment, managers need ________ systems.

transaction processing

A(n) ________ is typically a major source of data for other systems.

transaction processing system

'Synergies' occur when the output of some units in a firm can be used as inputs to other units, lowering cost and generating profits.

true

A Facebook users' visit to a Web site can be tracked even if they do not click a Like button.

true

A company's competitive advantages ultimately translate into higher stock market valuations than its competitors.

true

A key word in social business is "conversations."

true

A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals.

true

An application server may reside on the same computer as a Web server or on its own dedicated computer.

true

An efficient customer response system directly links consumer behavior to distribution and production and supply chains.

true

An organization's MIS and DSS supply an ESS with summarized information.

true

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.

true

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

true

Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical.

true

Copyright is the legal protection afforded intellectual property, including drawings, movies, and maps.

true

Customers are one of the competitive forces that affect an organization's ability to compete.

true

DSS are used by managers to make decisions about problems that are unusual and not easily specified in advance.

true

DSS use internal information as well as information from external sources.

true

Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.

true

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

true

Global firms can collaborate from different locations at the same time using synchronous collaboration tools.

true

Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.

true

In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers.

true

In a demonstration of network economics, the more people that use eBay's site, the greater the value of the site.

true

In recent years, the illegal sharing of music files has declined with the improvement of technological prevention.

true

Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses.

true

Laws and regulations creating fair, stable market environments are examples of complementary social assets required to optimize returns from IT investments.

true

Liability is a feature of political systems and allows individuals to recover damages done to them by others.

true

MIS job growth is projected to be 50% greater than other jobs in the next five years.

true

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

true

Mass customization offers individually tailored products or services using the same resources as mass production.

true

Most Internet businesses do very little to protect the privacy of their customers.

true

One example of a business process is shipping a product to a customer.

true

One of the key concepts in patent law is novelty.

true

Research has shown that a majority of firms are able to align their information technology with their business goals.

true

Routines are also called standard operating procedures.

true

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

true

Supply chain management systems are more externally oriented than enterprise systems.

true

Switching costs increase when customers are strongly linked to products and platforms.

true

The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.

true

The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.

true

The operating system is used to manage the computer's activities.

true

The problem with Web browsers' Do Not Track options is that Web sites aren't obligated to honor these settings.

true

The rate of global piracy is approximately 42%.

true

The symptoms of technostress include aggravation and hostility toward humans.

true

The term business ecosystem describes the loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers.

true

Today, many business firms continue to operate their legacy systems that meet a business need and would be costly to replace.

true

Transaction-level information is essential for operational management to be able to direct the day-to-day operations of the business.

true

Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user's online behavior.

true

Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks.

true

an organization is a

true

routines are also called standard operating procedures

true

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

trueSpam is legally defined as any e-mail that is unsolicited.

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n)

two-tiered client/server architecture

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n)

two-tiered client/server architecture.

All of the following are current hardware platform trends except

unix

The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is

unix

a virtual company

uses networks to link people, assets, and ideas

An example of an organizational complementary asset is

using the appropriate business model.

A collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively is called a(n)

value web

A(n) ________ is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market.

value web

________ is a collaboration tool that supports remote (different place), synchronous (same time) collaboration.

video conferencing

________ allows a single computing resource, such as a server, to appear to the user as multiple logical resources.

virtualization

All of the following are cloud computing services except

virtualization as a service.

All of the following are IT-enabled products and services providing competitive advantage except

walmart's retailing system

A recent addition to the mobile digital platform is

wearable computing devices

A recent addition to the mobile digital platform is

wearable computing devices.

Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to as

web services

The Federal Trade Commission FIP principle of Notice/Awareness states that

web sites must disclose their information practices before collecting data.

Which of the following factors does not help explain why computing resources today are ever more available than in previous decades?

widespread rejection of technology standards

The ________ PC, becoming the standard PC in the Personal Computer Era, uses the Windows operating system software on a computer with an Intel microprocessor.

wintel

________ provides a standard format for data exchange, enabling Web services to pass data from one process to another.

xml

Network economics

yes the cost of adding new members as inconsequential

Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?

your firm's organizational culture

At what percent of capacity do most servers operate?

15-20%

Hardware and software acquisition costs account for about ________ percent of TCO.

20

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer.

5,4,3,2,1

________ allows you to communicate with avatars using text messaging.

A virtual world

The phenomenon of employees using their own devices in the workplace is known as

BYOD

A ________ is a senior manager who oversees the use of IT in the firm.

CIO

The ________ helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes.

CKO

Which of the following is a leading networking hardware provider?

Cisco


Set pelajaran terkait

Chapter 5: Thinking Critically to Analyze Data and Make Informed Nursing Judgments PrepU

View Set

Chapter 14: The War to Save the Union

View Set

Georgia Real Estate License Laws and Rules

View Set

USC Valerio Jazz and Pop Music Exam 4

View Set

Chapter 3 Questions book & online

View Set

Intermediate Accounting 2 - Chapter 18 - Shareholders Equity

View Set

Human Growth and Development Perrigo NEMCC

View Set