MIS FINAL EXAM STUDY SET

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A(n) ________ represent data as two-dimensional tables. A) non-relational DBMS B) mobile DBMS C) relational DBMS D) hierarchical DBMS E) object-oriented DBMS

C

In data mining, which of the following involves using a series of existing values to determine what other future values will be? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting

E

Which of the following defines acceptable uses of a firm's information resources and computing equipment? A) An information systems audit policy B) A CA policy C) A MSSP D) A UTM system E) An AUP

E

Wikis allow visitors to change or add to the original posted material. A) TRUE B) FALSE

A

Which of the following is the most prominent data manipulation language today? A) Access B) DB2 C) SQL D) Crystal Reports E) NoSQL

C

Which of the following job categories is expected to experience the most growth over the next eight years? A) Computer support specialists B) Software engineers C) Systems analysts D) Computer programmers E) Database administrators

C

Which of the following best describes how new information systems can result in legal gray areas? A) They work with networked, digital data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. E) They are little understood by politicians or lawyers.

B

Which of the following best describes the effect that new information technology has on society? A) It has a dampening effect on the discourse of business ethics. B) It has a ripple effect, raising new ethical, social, and political issues. C) It is beneficial for society as a whole, while raising dilemmas for consumers. D) It has a waterfall effect in raising ever more complex ethical issues. E) It has a magnifying effect, creating increasing numbers of ethical issues.

B

Which of the following decisions requires knowledge based on collaboration and interaction? A) How long will it take to manufacture this product? B) Should we work with outside vendors on new products and services? C) In which geographical locations are our products garnering the most sales? D) Which product design is the most efficient for the user in terms of energy use? E) How can we produce this product more cheaply?

B

Which of the following is a recent addition to the mobile digital platform? A) Quantum computing devices B) Wearable computing devices C) Cloud computing devices D) Grid computing devices E) Green computing devices

B

Which of the following is a service provided by the Internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format? A) HTML B) The World Wide Web C) E-mail D) An extranet E) FTP

B

Target has had to pay out over $100 million to U.S. banks, credit card companies and consumers as a result of a data breach in 2013. A) TRUE B) FALSE

A

The "Internet of Things" refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet. A) TRUE B) FALSE

A

The Gramm-Leach-Bliley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities.

A

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called: A) the Internet of Things. B) the Semantic Web. C) Internet2. D) a 3-D Web. E) Web 2.0.

A

The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision. A) TRUE B) FALSE

A

The emerging Internet of People is based on sensors attached to clothing and personal effects that monitor physical states and locations of individuals. A) TRUE B) FALSE

A

The number of IS/MIS jobs is projected to grow 50% faster than the average job growth for the economy as a whole in the next eight years. A) TRUE B) FALSE

A

The practice of contracting custom software development to an outside firm is commonly referred to as: A) outsourcing. B) scaling. C) service-oriented architecture. D) application integration. E) utility computing.

A

The problem with web browsers' Do Not Track options is that websites aren't obligated to honor these settings. A) TRUE B) FALSE

A

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data defining. E) optimization.

A

The term big data refers to all of the following except: A) datasets with fewer than a billion records. B) datasets with unstructured data. C) machine-generated data (i.e. from sensors). D) data created by social media (i.e. tweets, Facebook Likes). E) data from Web traffic.

A

The term data governance refers to the policies and processes for managing the integrity and security of data in a firm. A) TRUE B) FALSE

A

Today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace. A) TRUE B) FALSE

A

Using the Internet to buy or sell goods is called: A) e-commerce. B) e-business. C) an intranet. D) an extranet. E) e-government.

A

Viruses can be spread through e-mail. A) TRUE B) FALSE

A

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging. A) TRUE B) FALSE

A

Which of the following is not an IT infrastructure service component? A) Operating system software B) Computing platforms to provide a coherent digital environment C) Physical facilities management to manage the facilities housing physical components D) IT management services to plan and develop the infrastructure and provide project management E) IT education services that provide training to employees

A

Which of the following is the key business metric behind the technologies implemented by Kroger, as discussed in the chapter-opening case? A) Higher customer satisfaction levels B) Survival C) Improved employee morale D) Improved decision making E) Reduced cost of supplies

A

A SAN is a ________ network. A) server area B) storage area C) scalable architecture D) service-oriented architecture E) software arrangement

B

A computer virus replicates more quickly than a computer worm. A) TRUE B) FALSE

B

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n): A) SOA. B) SLA. C) TCO. D) RFQ. E) SaaS.

B

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person. A) TRUE B) FALSE

B

An acceptable use policy defines the acceptable level of access to information assets for different users. A) TRUE B) FALSE

B

Data mining allows users to: A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad-hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports. E) access the vast amounts of data in a data warehouse.

B

Disciplines that contribute to the technical approach to information systems include: A) computer science, engineering, and networking. B) operations research, management science, and computer science. C) engineering, utilization management, and computer science. D) management science, computer science, and engineering. E) economics, sociology, and psychology.

B

If your main supplier was late in delivering goods, which type of system would you use to update your production schedule? A) ESS B) TPS C) MIS D) DSS E) BIS

B

In a large organization, which of the following functions would be responsible for physical database design and maintenance? A) Data administration B) Database administration C) Information policy administration D) Data auditing E) Database management

B

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses. A) TRUE B) FALSE

B

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer. A) 5, 2, 3, 4, 1 B) 5, 4, 2, 3, 1 C) 4, 5, 2, 3, 1 D) 5, 4, 2, 1, 3 E) 4, 5, 3, 2, 1

B

Psychologists study information systems with an eye to understanding: A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods. E) mathematically based models and physical technology.

B

Research has shown that a majority of firms are able to align their information technology with their business goals. A) TRUE B) FALSE

B

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses. A) TRUE B) FALSE

B

Sociotechnical changes affecting a firm adopting new information systems requiring organizational change can be considered: A) organizational adjustments. B) strategic transitions. C) systems alterations. D) business goal transitions. E) sociotechnical transitions.

B

TCO refers to the original cost of purchased technology: both hardware and software. A) TRUE B) FALSE

B

The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? A) Program-data dependence B) Lack of flexibility C) Poor security D) Lack of data sharing E) Data redundancy

B

The four major competitive strategies are: A) low-cost leadership, substitute products and services, customers; and suppliers. B) low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy. C) new market entrants, substitute products and services, customers, and suppliers. D) low-cost leadership, new market entrants, product differentiation, and focus on market niche. E) customers, suppliers, new market entrants, and substitute products.

B

The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as: A) the point of no return. B) the law of diminishing returns. C) supply and demand. D) network inelasticity. E) virtual economics

B

The interaction between information technology and organizations is influenced: A) solely by the decision making of middle and senior managers. B) by the development of new information technologies. C) by many factors, including structure, politics, culture, and environment. D) by two main macroeconomic forces: capital and labor. E) by the rate of growth of the organization.

B

The use of Internet technologies allows companies to more easily sustain competitive advantage. A) TRUE B) FALSE

B

What is the most important function of an enterprise application? A) Increasing speed of communicating B) Enabling business functions and departments to share information C) Enabling a company to work collaboratively with customers and suppliers D) Enabling cost-effective e-business processes E) Enabling inventory and supply chain management

B

Which of the following is not a major feature of organizations that impacts the use of information systems? A) Business processes B) Environments C) Goals D) Agency costs E) Leadership styles

D

Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix? A) Synchronous/colocated B) Same time/remote C) Different time/remote D) Remote/colocated E) Same time/same place

D

Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFID tags and antennas come in a variety of shapes and sizes.

D

Which of the following statements is not true? A) In 2016, the median wage for IT/MIS jobs is about $80,000. B) In the next eight years to 2024, IS/MIS will add about 500,000 jobs. C) Out of 114 occupations, MIS is ranked 15th in terms of salaries. D) In general, the technical occupations in IT are showing faster expansion than occupations involved with the management of IT. E) The growth of online software services and cloud computing is impacting the job prospects for computer programmers.

D

Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers? A) Networking B) Telephone C) VOIP D) Telecommunications E) Data management

D

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A) modulated B) broadband C) T1 D) analog E) digital

E

All of the following are IT-enabled products and services providing competitive advantage except: A) Amazon's one-click shopping. B) Apple's iPod and iTunes. C) Ping's golf club customization. D) PayPal's online person-to-person payment system. E) Nike's use of celebrities to market their products.

E

All of the following are new technology-related trends in MIS except: A) cloud computing. B) big data. C) IoT. D) the mobile digital platform. E) co-creation of business value.

E

Along with capital, ________ is the primary production input that the organization uses to create products and services. A) structure B) culture C) politics D) feedback E) labor

E

SaaS refers to: A) supplying online access over networks to storage devices and storage area network technology. B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C) self-contained services that communicate with each other to create a working software application. D) easy-to-use software tools for displaying Web pages. E) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

E

The term management information systems refers to a specific category of information systems serving: A) integrated data processing throughout the firm. B) transaction process reporting. C) employees with online access to historical records. D) the information technology function. E) middle management functions.

E

The three activities in an information system that produce the information organizations use to control operations are: A) information, research, and analysis. B) input, output, and feedback. C) data, information, and analysis. D) data analysis, processing, and feedback. E) input, processing, and output.

E

When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as: A) switching costs. B) network costs. C) procurement. D) agency costs. E) transaction costs.

E

Which field of study focuses on both a behavioral and technical understanding of information systems? A) Sociology B) Operations research C) Economics D) Behavioral computing E) Management information systems

E

Which of the five moral dimensions of the information age does spamming involve? A) Quality of life B) System quality C) Accountability and control D) Information rights and obligations E) Property rights and obligations

E

Which of the following deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm? A) Information systems literacy B) Information systems architecture C) Business processes D) Information technology infrastructure E) Management information systems

E

Which of the following is not a business benefit of collaboration? A) Improved quality B) Improved financial performance C) Improved customer service D) Improved innovation E) Improved compliance with government regulations

E

Which of the following is not an example of the potential dark side of big data? A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future. B) Use of a device installed in a car to analyze driving habits. C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. D) Use of computerized systems to filter and hire job applicants. E) Analyzing data from sensors installed in local parks to monitor soil moisture.

E

Which of the following is the most common reason that business systems fail? A) Software bugs B) Software errors C) Hardware failures D) Facilities failures E) Data quality

E

Which of the following occurs when the same attribute in related data files has different values? A) Data redundancy B) Data duplication C) Data dependence D) Data discrepancy E) Data inconsistency

E

Which of the following statements about business processes is not true? A) Business processes influence the relationship between an organization and information technology. B) Business processes are a collection of standard operating procedures. C) A business firm is a collection of business processes. D) Business processes are usually ensconced in an organization's culture. E) Business processes are typically unaffected by changes in information systems.

E

Which of the following statements about disruptive technologies is not true? A) Disruptive technologies radically change the business landscape and environment. B) Disruptive technologies may be substitute products that perform better than other products currently being produced. C) Disruptive technologies may sometimes simply extend the marketplace. D) Disruptive technologies may put entire industries out of business. E) Firms that invent disruptive technologies as first movers always become market leaders.

E

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following? A) Security policy B) AUP C) Risk assessment D) Business impact analysis E) Business continuity plan

C

Competitors were seeking which of the following business objectives when they rushed to provide ATMs after Citibank introduced the first ATMs in New York? A) Improved efficiency B) Customer and supplier intimacy C) Survival D) Competitive advantage E) Improved decision making

C

The Sarbanes-Oxley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities.

C

The four major types of enterprise applications are: A) SCM, CRM, DSS, and KMS. B) SCM, CRM, ESS, and KMSs. C) ERP, SCM, DSS, and CRM. D) ERP, SCM, CRM, and KMS. E) TPS, MIS, DSS, and ESS.

C

To make sure they stock clothes that their customers will purchase, a department store implements a new application that analyzes spending levels at their stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support? A) Customer intimacy B) Survival C) Operational excellence D) Improved decision making E) New products and services

C

What are the four layers of the TCP/IP reference model? A) Physical, application, transport, and network interface B) Physical, Application, Internet, and Network Interface C) Application, Transport, Internet, and Network Interface D) Application, Hardware, Internet, and Network Interface E) Software, Hardware, Network Interface, Internet

C

Which of the following focuses primarily on the technical issues of keeping systems up and running? A) Business continuity planning B) Security policies C) Disaster recovery planning D) An AUP E) An information systems audit

C

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? A) Capacity planning B) Cloud computing C) Green computing D) Utility computing E) On-demand computing

C

Which of the following is an example of a cross-functional business process? A) Identifying customers B) Transporting the product C) Creating a new product D) Assembling a product E) Paying creditors

C

Which of the following is not one of the current key technology trends that raises ethical issues? A) Data storage improvements B) Data analysis advancements C) Increase in data quality D) Increase in use of mobile devices E) Advances in networking technology

C

Which of the following is the greatest obstacle in enabling collaboration between employees at different, distant corporate locations? A) Privacy B) Permissions C) Time zones D) Language E) Corporate culture

C

In 2016, the median wage for IT/MIS jobs is about twice the level for all occupations. A) TRUE B) FALSE

A

A Facebook user's visit to a website can be tracked even if they do not click a Like button. A) TRUE B) FALSE

A

A ________ is an example of pre-digital data storage that is comparable to a database. A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet E) schedule of due dates on a project outline

A

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else. A) Identity theft B) Spoofing C) Social engineering D) Evil twins E) Pharming

A

________ means that you accept the potential costs and obligations for the decisions you make. A) Responsibility B) Accountability C) Liability D) Due process E) Duty

A

Which of the following is the best description of a protocol in a telecommunications network architecture? A) A device that handles the switching of voice and data in a local area network B) A standard set of rules and procedures for control of communications in a network C) A communications service for microcomputer users D) The main computer in a telecommunications network E) A pathway through which packets are routed

B

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A) Liability B) Due process C) Responsibility D) Accountability E) The judicial system

B

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A) Due process B) Accountability C) The courts of appeal D) The judicial system E) Liability

B

Which of the following is not an example of a wearable computing device? A) Smartwatch B) Smart glasses C) Smartphones D) Activity trackers E) Smart ID badges

C

You are consulting for a natural food products distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step? A) Identify the business ecosystem the distributor is in B) Implement a strategic transition to the new system C) Perform a strategic systems analysis D) Benchmark existing systems E) Set up a strategic transition

C

1) Which of the following is not one of the six strategic business objectives of information systems? A) New products and services B) Improved decision making C) Competitive advantage D) Improved employee morale E) Survival

D

According to agency theory, the firm is viewed as a(n): A) unified, profit-maximizing entity. B) task force organization that must respond to rapidly changing environments. C) entrepreneurial endeavor. D) "nexus of contracts" among self-interested individuals. E) entrepreneurial structure.

D

Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) RFID E) Analog

E

A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) primary entity.

A

According to the chapter case, ABB decided to switch from its existing corporate intranet for all of the following reasons except: A) the intranet was too expensive to maintain. B) the intranet was too static and outmoded to meet its current needs. C) the intranet had poor capabilities for searching for information. D) the intranet lacked collaboration tools. E) the intranet was confusing and inefficient.

A

All of the following are physical components of an RFID system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device.

A

All of the following are technologies used to analyze and manage big data except: A) cloud computing. B) noSQL. C) in-memory computing. D) analytic platforms. E) Hadoop

A

All of the following statements are true about information technology's impact on business firms except: A) it helps firms expand in size. B) it helps firms lower the cost of market participation. C) it helps reduce internal management costs. D) it helps reduce transaction costs. E) it helps reduce agency costs.

A

An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n): A) information policy. B) data definition file. C) data quality audit. D) data governance policy. E) data policy.

A

Authentication refers to verifying that a person is who he or she claims to be. A) TRUE B) FALSE

A

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. A) TRUE B) FALSE

A

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. A) TRUE B) FALSE

A

Computer networks are fundamentally different from telephone networks. A) TRUE B) FALSE

A

Data ________ occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy

A

Fiber-optic cable is more expensive and harder to install than wire media. A) TRUE B) FALSE

A

IT governance refers to the overall decision-making that guides the IT strategy of a firm. A) TRUE B) FALSE

A

Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless E) network

A

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware. A) TRUE B) FALSE

A

Middleware is an application that transfers information from an organization's internal database to a web server for delivery to a user as part of a web page. A) TRUE B) FALSE

A

Most Internet businesses do very little to protect the privacy of their customers. A) TRUE B) FALSE

A

On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS

A

Redesigning and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. E) it can concentrate power in the hands of senior executives.

A

SSL is a protocol used to establish a secure connection between two computers. A) TRUE B) FALSE

A

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down. A) TRUE B) FALSE

A

Sociologists study information systems with an eye to understanding: A) how systems affect individuals, groups, and organizations. B) how human decision makers perceive and use formal information. C) how new information systems change the control and cost structures within the firm. D) the production of digital goods. E) mathematically based models and physical technology.

A

Software that manages the resources of the computer is called: A) operating system software. B) application software. C) data management software. D) network software. E) web services software.

A

According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are: A) environment, organization, structure, and tasks. B) technology, people, culture, and structure. C) organization, culture, management, and environment. D) tasks, technology, people, and structure. E) costs, tasks, structure, and management.

D

All of the following are reasons for the increased business focus on collaboration and teamwork, except for: A) the need for creating innovative products and services. B) growth of "interaction" jobs. C) greater global presence. D) the need for more efficient work hierarchies. E) the need to reduce communication costs.

D

How much did American businesses spend on information systems hardware, software, and telecommunications equipment in 2015? A) About $100 million B) About $1 billion C) About $100 billion D) About $1 trillion E) About $10 trillion

D

Information systems enhance core competencies by: A) providing better reporting facilities. B) creating educational opportunities for management. C) allowing operational employees to interact with management. D) encouraging the sharing of knowledge across business units. E) fostering synergies among departments.

D

Order fulfillment involves all of the following business processes except: A) checking the customer's credit. B) assembling the product. C) submitting the order. D) making customers aware of the product. E) shipping the product.

D

The HIPAA Act of 1996: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities.

D

The Mandarin Oriental's use of computer systems to keep track of guests' preferences is an example of which of the following? A) Improved flexibility B) Improved decision making C) Improved efficiency D) Customer intimacy E) Operational excellence

D

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) Data normalization B) Data accuracy C) Data redundancy D) Data inconsistency E) Data duplication

D

Which of the following best illustrates the use of information systems to focus on market niche? A) A car manufacturer's Web site that lets you customize the features on the car you are purchasing. B) A restaurant chain analyzing local sales figures to determine which menu items to serve. C) A bookseller selling an e-book reader that reads only the bookseller's books. D) A department store creating specialized products for preferred customers. E) A clothes manufacturer expanding its offerings to new styles.

D

Which of the following is a DBMS for desktop computers? A) DB2 B) Oracle Database C) Microsoft SQL Server D) Microsoft Access E) Microsoft Exchange

D

Which of the following is a highly structured decision? A) Creating a new product B) Estimating the effect of changing costs of supply materials C) Calculating the best trucking routes for product delivery D) Granting credit to a customer E) Forecasting new industry trends

D

Which of the following is a primary drawback to the "do anything anywhere" computing environment? A) It makes work environments less pleasant. B) It creates a digital divide. C) It centralizes power at corporate headquarters. D) It blurs the traditional boundaries between work and family time. E) It leads to employees being paid less for the total amount of work performed.

D

Which of the following is a private corporate network extended to authorized users outside the organization? A) An intranet B) The World Wide Web C) The Internet D) An extranet E) FTP

D

Which of the following is an example of a business using information systems to create a new product? A) Walmart's RetailLink system B) The Mandarin Oriental's use of computers to keep track of guest preferences C) Verizon's use of a web-based digital dashboard to provide real-time company information for managers D) Apple's creation of the iPod E) Kroger's use of sensors to monitor cold food storage temperatures

D


Set pelajaran terkait

Ch 2 An Intro to Cost Terms and Purposes

View Set

Capítulo 7: Qué te gusta comer?

View Set

Mobility, Clotting, Transfusion Quiz

View Set

Quiz #5 - Persepolis and Monsieur Ibrahim

View Set

Chapter 3 Part 2 Cells the Living Units

View Set

Business Law Consideration Chapter 6

View Set

Writing and Argumentative Essay about the Nobel Prize in Literature 100%

View Set