BCIS 3610 Exam 1

Ace your homework & exams now with Quizwiz!

A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs. A) collaboration B) experimentation C) interpersonal D) systems thinking

B

Abstract reasoning is the ability to ________. A) work with others when performing tasks B) make and manipulate models C) act quickly on a problem D) perform routine tasks

B

The number of transistors per square inch on an integrated chip doubles every 18 months according to Moore's Law.

TRUE

Today, because of Moore's Law, any routine skill is liable to be outsourced to the lowest bidder.

TRUE

Which of the following is an example of nonvolatile memory? a magnetic disk b main memory c cache memory d RAM drive

a magnetic disk

When individuals buy a computer program, they buy a license to ________. a use the program b convert the program into open source software c modify the features of the program d sell the program

a use the program

The five-component framework of an information system consists of computer hardware, software, data, people, and ________. a. documents b. procedures c. results d. objectives

b. procedures

A ________ is a subset of the activities in a business process that is performed by an actor. a. resource b. role c. sequence flow d. swimlane

b. role

The bargaining power of a customer is weak if ________. a. the cost of switching to a substitute is low b. the availability of a substitute is limited c. competitors offer products with same benefits at lower prices d. new entrants are offering a product that uses more recent technology

b. the availability of a substitute is limited

Substitutions may not be viable options for some industrial clients due to ________ or physical distance limitations. a. the loss of investors b. the lack of internal technical expertise c. the lack of rival suppliers d. the loss of customers

b. the lack of internal technical expertise

If the contents of a device are lost when the power is turned off, the memory of the device is said to be ________. a. nonvolatile b. volatile c. discrete d. random

b. volatile

When considering different information systems alternatives, it will be helpful to consider the low-tech versus high-tech alternatives in light of the amount of work that is being moved from people to computers.

true

Users should take an active role in system development to create an information system that meets their needs.

true

An operating system like Windows or Linux is an example of the ________ component of an information system. A) software B) hardware C) data D) procedure

A

Carlos is a business student doing an internship at Bruno and Venus, a firm specializing in exports of sophisticated equipment to other countries. He finds that he is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that he lacks ________ skills. A) abstract reasoning B) collaborative C) experimental D) systems thinking

A

Identify how information technology differs from information systems. A) One can buy information technology, but not information systems. B) People are an important component of information technology, but not of information systems. C) Information systems are a subset of information technology. D) Unlike information systems, information technology is used for producing information.

A

Jeff is the IT manager of his organization. He needs to use his coworker's account to access some information. In keeping with password etiquette, how should he go about getting his coworker's password? A) He should request the coworker to type in the password on the system without Jeff looking at it. B) He should explain the urgency of the situation and ask the coworker to send the password through email. C) He should submit a formal letter to his coworker's manager, explaining the situation and requesting that the password be sent to him. D) He should try out various combinations to see if he can guess his coworker's password.

A

Mark follows certain steps to access the supplementary readings for a course when using his organization's library management system. These steps that he follows are examples of the ________ component of an information system. A) procedure B) data C) software D) hardware

A

Sandra is the production manager at a soda manufacturer's bottling plant. She receives a report that contains the list of raw materials stored in the warehouse. She notices that the list also includes items that are not present in the warehouse. The list that she received would not qualify as good information because it is ________. A) inaccurate B) late C) voluminous D) too narrow in scope

A

The storage disk in a computer is an example of the ________ component of information systems. A) hardware B) software C) database D) virtual

A

Which of the following components of an information system is the easiest to change and results in the least amount of organizational disruption? A) hardware B) software C) database D) procedures

A

Which of the following is an example of computer hardware? A) a monitor B) a browser C) a spreadsheet D) a user manual

A

Which of the following ratios has fallen as a result of Moore's Law? A) price/performance B) demand/supply C) profit/loss D) debt/equity

A

Which of the following statements is true about the quality of information? A) Information should be just barely sufficient for its purpose. B) Data that arrives after a prolonged period of time is of the highest quality. C) Information needs to be relevant to the subject, not necessarily to the context. D) Freely available data is always accurate and timely.

A

Which of the following statements is true of information technology (IT)? A) Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information. B) Information technology is an umbrella term that covers information systems and the products, methods, inventions, and standards used to produce information. C) Information technology and information systems are synonymous with each other and can be used interchangeably. D) Information technology is an assembly of hardware, software, data, procedures, and people that produces information.

A

Your company uses a software tool to manage its supply chain. This software tool is an ________ of your company's information system. A) instruction on the computer side B) actor on the human side C) instruction on the human side D) actor on the computer side

A

A customer relationship management (CRM) system contains the names and phone numbers of customers. Such details stored in a CRM system are part of the ________ component. A) hardware B) data C) procedure D) people

B

Erin is a manager for a reputed software firm. She typically monitors and evaluates the existing working procedures of her subordinates. She constantly changes these working procedures so that they are consistent with the company's resources. This shows her ability to ________. A) participate in systems thinking B) experiment C) make abstractions D) collaborate

B

The ________ component of the five-component framework of an information system includes individuals who maintain the data and support the networks of computers. A) procedural B) people C) data D) networking

B

The words that an individual types in an MS Word document exemplify the ________ component of the information system. A) procedure B) data C) hardware D) software

B

When presenting an idea to his colleagues, Marcus failed to consider others' views and got defensive when people asked him questions. This situation indicates that Marcus lacks ________ skills. A) systems thinking B) collaboration C) abstract reasoning D) experimentation

B

Which of the following components in the five-component model of information systems is considered an actor? A) software B) hardware C) data D) procedure

B

Which of the following is a critical characteristic of good information? A) abundance of details B) accuracy C) low cost D) ease of creation

B

Which of the following is a low-tech information system? A) an inventory tracking system that produces reports every 24 hours B) a file of email addresses stored in an email program C) a customer support system that keeps track of product issues D) a decision support system that analyzes multiple variables

B

Which of the following is considered information rather than mere data? A) a list of property prices in a neighborhood B) the return on investment of an advertising campaign C) the total number of students in a school D) the price of a company's shares on a given day

B

Which of the following statements is true of business users who administer the development of information systems? A) It is mandatory that they hold a degree in database management. B) They should take an active role in the system's development. C) They should refrain from specifying the system's requirements. D) When the system fails, they must refrain from performing tasks related to system recovery.

B

Which of the following statements is true of data characteristics in the context of information systems? A) Data generated should be in excess of what is required. B) An appropriate relationship should exist between the cost of data and its value. C) Data should be relevant to the context, not necessarily to the subject. D) Freely available data is always accurate and timely.

B

Which of the following types of skills is most likely to be outsourced to the lowest bidder? A) ability to experiment B) accounting skills C) ability to collaborate D) abstract reasoning skills

B

You have a spreadsheet that provides the airfares to different cities from Chicago. If the contents of the spreadsheet are used to make a decision, it will be considered ________. A) knowledge B) data C) information D) intuition

B

________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. A) Abstract reasoning B) Systems thinking C) Collaboration D) Experimentation

B

________ is the activity of two or more people working together to achieve a common goal, result, or work product. A) Systems thinking B) Abstract reasoning C) Collaboration D) Experimentation

C

________ states that the number of transistors per square inch on an integrated chip doubles every 18 months. A) Nielsen's Law B) Faraday's Law C) Moore's Law D) Newton's Law

C) moore's law

According to Moore's Law, the ________. A) price of integrated chips increases once in 18 months B) size of computing devices and integrated chips doubles every year C) number of transistors per square inch on an integrated chip doubles every 18 months D) size of computing devices and integrated chips reduces by fifty percent every year

C

Caroline asks her secretary to send information on the meetings that she needs to attend next month. Her secretary, Joanne, provides her with the details immediately, but leaves out certain additional details that are irrelevant to Caroline's requirements. Which of the following statements is true about this scenario? A) The information that Joanne provided was partly good as it was timely but insufficient. B) Joanne provided adequate and timely information, but the information was of no value to Caroline. C) The information that Joanne gave was accurate and sufficient for Caroline's purpose. D) The information that Caroline obtained through Joanne was not timely or worth its cost.

C

Meredith constantly analyzes her work in terms of her individual contribution that she makes to the overall output of the organization. This shows her ________ skills. A) collaboration B) experimentation C) systems thinking D) problem-solving

C

The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________. A) inaccurate B) not timely C) irrelevant D) too expensive

C

The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side. A) software B) procedure C) data D) hardware

C

Which of the following best describes data? A) information presented in a meaningful context B) processed information C) recorded facts or figures D) knowledge derived from facts or figures

C

Which of the following is a common description of information? A) collection of unprocessed data B) unbiased, noncontextual data C) knowledge derived from data D) list of recorded facts or figures

C

Which of the following is a component of an information system, but not of information technology? A) hardware B) data C) people D) software

C

Which of the following is the least critical aspect of good information? A) data accuracy B) timeliness of data C) additional data D) relevance of data

C

Which of the following pairs of components constitutes the human side of information systems? A) software and procedures B) software and people C) people and procedures D) hardware and people

C

Which of the following statements is true of good information? A) Good information should go well beyond the scope of the purpose for which it is generated. B) Information should be relevant to the subject, not necessarily to the context. C) Good information should be based on correct and complete data. D) Good information is only received from sources that provide information for free.

C

You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________. A) inaccurate B) late C) irrelevant D) not reliable

C

According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems. A) software B) data C) hardware D) procedure

D

Adobe Acrobat is an application that allows users to create and edit digital documents. Adobe Acrobat is an example of a ________. A) hardware B) procedure C) database D) software

D

Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. As part of its expansion strategy, the company decides to open outlets in four more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization? A) collecting demographic data from the new markets B) developing new CRM software for the existing and new outlets C) relocating existing employees and hiring new employees D) buying and installing new computers in the new outlets

D

Graham & Hilda Corp. is a firm that offers enterprise software solutions to independent retailers. The firm recently entered into a contract with a major national retail chain to develop and implement proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system? A) upgrading the computer systems used by the retail chain B) writing the programs to create the software C) changing the structure of existing databases that reflect supplier and customer data D) training the employees to use and manage the new system

D

Information is considered inefficient if ________. A) it is highly accurate B) it is made available ahead of time C) it is just barely sufficient D) it is irrelevant to the subject

D

It is generally more difficult to make changes to the ________ of an information system than to the database itself. A) software B) hardware C) programs D) procedures

D

The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the list of products sold in the previous quarter. These details do not qualify as good information because they are ________. A) too narrow in scope B) too expensive C) not timely D) not relevant

D

The hardware components of an information system will act as a(n) ________. A) bridge between the computer side and the human side B) instruction on the human side C) instruction on the computer side D) actor on the computer side

D

The process of automation is a process of moving work from ________. A) processes to procedures B) procedures to people C) instructions to actors D) human side to computer side

D

Which among the following is the most appropriate technique for creating memorable, strong passwords? A) using the first letters of the words in a phrase B) using names of movies C) using dictionary words or phrases as passwords D) using a collection of randomly picked letters, numbers, and special characters

D

Which of the following is a major implication of Moore's Law? A) Data processing activities have become complex and time consuming. B) Costs of computing and processing have increased. C) The size of integrated chips has increased. D) Costs of communications and storage have become very low.

D

Which of the following is categorized as a nonroutine cognitive skill? A) computer programming B) marketing knowledge C) tax accounting D) systems thinking

D

Which of the following pairs of components constitutes the computer side of information systems? A) software and data B) data and hardware C) people and procedures D) hardware and software

D

Which of the following would be the most disruptive to an organization when implementing an information system? A) installing new hardware components B) creating new databases C) developing new programs D) changing reporting relationships

D

________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. A) Systems thinking B) Abstract reasoning C) Collaboration D) Experimentation

D

A person who is good at collaboration will avoid giving critical feedback to others.

FAlse

A system is a group of components that interact without a specific purpose.

False

Brad, an employee who works in the production department, has the ability to collaborate well with others. Brad's ability to collaborate is an example of a routine skill.

False

Moore's Law predicts that the price to performance ratio of computers will double once in eighteen months.

False

Systems thinking refers to the skill that helps make a reasoned analysis of a problem and envision potential solutions to the problem.

False

Abstract reasoning is the ability to construct and manipulate models.

True

Because of Moore's Law, the cost of data processing, communications, and storage is essentially zero.

True

Experimentation involves making a reasoned analysis of an opportunity and developing the most promising solutions, consistent with the resources one has.

True

The most important skill for effective collaboration is to be able to give and receive critical feedback.

True

The term management information systems refers to the management and use of information systems that help businesses achieve their strategies.

True

Which of the following is TRUE if the threat from a substitute is strong? a. Customers are likely to switch to competitors' products. b. Competitors' products are of a lower quality. c. Competitors are yet to overcome the entry barriers. d. Prices of competitors' products are higher.

a. Customers are likely to switch to competitors' products.

Which of the following precautions should be taken to protect one's password? a. Do not write it down or share it with others. b. Do not have multiple special characters in it. c. Do not use virtual keyboards to enter it. d. Do not base it on the first letter of the words in a phrase.

a. Do not write it down or share it with others.

Which of the following statements is TRUE about information systems? a. They are a group of components that produce information. b. They can be bought off the shelf. c. They are not susceptible to the changing needs of the market. d. They drive the development of information technology.

a. They are a group of components that produce information.

Business professionals need to answer all of these questions pertaining to business processes EXCEPT ________. a. Who should we hire to create a business plan? b. Why is it so hard to get something done? c. Can we change the way work to better achieve our goals? d. Can we improve processes by using information systems?

a. Who should we hire to create a business plan?

If your company's competitive strategy was focus and differentiation, then the company would be known for ________. a. better products/service within an industry segment b. lowest cost within an industry segment c. better product/service across the industry d. lowest cost across the industry

a. better products/service within an industry segment

According to the business process modeling notation, the end of a business process is symbolized by a ________. a. circle having a thick border b. circle having a narrow border c. square having a thick border d. square having a narrow border

a. circle having a thick border

Patricia, the marketing manager of a manufacturing firm, plans new marketing strategies with the help of her subordinates by providing and receiving critical feedback. Patricia is displaying effective ________. a. collaboration b. abstraction c. cognitive acceleration d. virtualization

a. collaboration

For any new system, you will always have these obstacles EXCEPT ________. a. developing a social media page b. raining tasks c. overcoming employee's resistance to change d. managing employees as they use the new system

a. developing a social media page

Which of the following is a product implementation principle of competitive advantage? a. enhance existing products or services b. lock in customers and buyers c. establish alliances with other organizations d. raise barriers to market entry

a. enhance existing products or services

In a grocery store, a clerk uses a barcode scanner to read the barcode on an item. Which of the following components of an information system includes this scanning device? a. hardware b. procedure c. software d. data

a. hardware

Which of the following is an example of a competitive strategy employed by a firm? a. launching a unique product targeted at a section of consumers b. advertising its products nationwide like its competitor organizations c. increasing the price of its product when raw material prices increase d. laying off staff in order to cut down costs during a recession period

a. launching a unique product targeted at a section of consumers

A manufacturing system uses sales forecasts to plan production. It uses the production plan to determine raw material needs and then uses the material needs to schedule purchases. This ultimately leads to reduced inventory costs. Which of the following is being used to reduce the inventory cost? a. linkages b. support activities c. margins d. competitive strategy

a. linkages

When an activity is automated, processes formerly done by ________ are moved to computers. a. people b. the swimlane process c. software d. machines

a. people

The ________ component of the information systems framework provides instructions for people. a. procedure b. software c. hardware d. data

a. procedure

A ________ is a graphical arrangement in which all activities for a job type are shown in a single vertical lane. a. swimlane format b. Business Process Modeling Notation c. vendor d. bike process

a. swimlane format

The bargaining power of a customer is weak if ________. a. the availability of a substitute is limited b. competitors offer products with same benefits at lower prices c. new entrants are offering a product that uses more recent technology d. the cost of switching to a substitute is low

a. the availability of a substitute is limited

Simpson's Lawn Services decides to offer two free mowing services for all customers who booked garden landscaping in the fall. Which of the following forces is Simpson's Lawn Services addressing? a. the threat posed by Roger's Landscapes, a new competitor b. the control exercised by Acme Corp., which supplies Simpson's with lawn mowers c. the power held by the landlord of the Simpson's office space d. the bargaining power of the City Football Club, who are Simpson's customers

a. the threat posed by Roger's Landscapes, a new competitor

Which of the following primary activities describes collecting, storing, and physically distributing products to buyers? a. customer service b. outbound logistics c. sales and marketing d. operations/management

b. outbound logistics

Computers represent data using binary digits called ________. a pixels b bits c tags d dots

b bits

The ________ selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. a random access memory (RAM) b central processing unit (CPU) c plotter d hard disk

b central processing unit (CPU)

Open source succeeds because ________. a it is easy to use b of collaboration c people are tired of Microsoft d it is free

b of collaboration

Which of the following refers to software that is developed for a specific and unique need? a simulation software b one-of-a-kind application software c horizontal-market application software d open source software

b one-of-a-kind application software

A ________ is used to receive and process thousands of requests from a large number of users. a. stand-alone server b server farm c cache memory d. client computer

b server farm

Which of the following passwords is the weakest? a. 3B47qq<3>5!7bdE b. Bird999 c. TuRning243 d. As60$T1dd?dc

b. Bird999

________ is the ratio of benefits to costs. a. Performance rating b. Efficiency c. Scalability d. Effectiveness

b. Efficiency

________ is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the available resources. a. Abstraction b. Experimentation c. Systems thinking d. Collaboration

b. Experimentation

Which of the following statements is TRUE of an operating system? a. It does only little or no memory management. b. It comes in particular versions that are written for particular types of hardware. c. It does a lot of application-specific work. d. It has to be the same across all computers in a network in order to process application programs.

b. It comes in particular versions that are written for particular types of hardware.

Which of the following is TRUE of a value chain? a. It nullifies the importance of support activities. b. It is a network of value-creating activities. c. It consists of only primary activities. d. It is specific to manufacturing industries.

b. It is a network of value-creating activities.

Which of the following statements is TRUE about roles in a business process? a. A particular role can be fulfilled by just one person. b. The name of a role is written at the top of a swimlane. c. Roles are grouped in swimlane diagrams according to the number of actors involved. d. A role is the superset of the activities in a business process.

b. The name of a role is written at the top of a swimlane.

Which of the following statements is TRUE of business processes? a. If a value chain's margin is negative, the value should be decreased. b. The processes implementing a value chain must create sufficient value to cover their costs. c. If a value chain's margin is negative, the costs of the value chain should be increased. d. Value chain activities differ based on the business processes being used.

b. The processes implementing a value chain must create sufficient value to cover their costs.

According to the business process modeling notation standard, the start of a business process is symbolized by a ________. a. circle having a thick border b. circle having a narrow border c. square having a thick border d. square having a narrow border

b. circle having a narrow border

Which of the following describes suppliers in a position of strong bargaining power? a. providers of logistic support when fuel prices have been reduced b. coffee planters during a season of frost that decreases production c. temporary part-time gym instructor at a well-known gym d. domestic suppliers of corn in the event of removal of import duties on corn

b. coffee planters during a season of frost that decreases production

All of the following are examples of characteristics of good data EXCEPT ________. a. worth its costs b. current c. accurate d. just barely sufficient

b. current

In Porter's five forces model, the threat of new entrants concerns the danger of ________. a. suppliers favoring rival companies b. customers taking their business elsewhere c. employees not working toward organizational goals d. investors refusing to back new projects

b. customers taking their business elsewhere

In an information systems framework, ________ is the bridge between the computer side on the left and the human side on the right. a. procedure b. data c. hardware d. software

b. data

The fact that Joe works nine hours per day is an example of ________. a. content b. data c. information d. sample

b. data

Which of the following is necessary for effective collaboration? a. modeling the components of a system b. giving and receiving critical feedback c. proper division of tasks d. focusing on individual goals

b. giving and receiving critical feedback

Which of the following is an open-source operating system? a Unisys b Windows c Linux d Mac OS

c Linux

________ is the process by which one physical computer hosts many different virtual computers within it. a License sharing b Cloud computing c Virtualization d Machine coding

c Virtualization

If you purchased a pair of glasses that showed you virtual arrows on the street so you know when to turn, the glasses use ________. a virtual reality b mixed reality c augmented reality d a sense of presence

c augmented reality

A(n) ________ is a program that controls a computer's resources. a cache b central processing unit c operating system d data bus

c operating system

________ is the ability to make and manipulate models. a. Cognitive acceleration b. Holacracy c. Abstract reasoning d. Adaptive learning

c. Abstract reasoning

What is one reason information technology has changed from a minor support function to a primary driver of corporate profitability? a. Because technology is much cheaper than in the past. b. Because Apple, Inc. became a publicly traded company. c. Because technology fundamentally changes business. d. Because corporate executives like computers.

c. Because technology fundamentally changes business.

________ represent the movement of data from one activity to another. a. Data modules b. Data charts c. Data flows d. Data buses

c. Data flows

Which of the following statements is TRUE of using an information system to improve process quality? a. Information systems are most effective at improving process quality if they are developed solely by technical personnel. b. Information systems that are most user friendly are also most cost effective. c. Information systems that are labor saving may not be efficient. d. Information systems can improve process efficiency but not process effectiveness.

c. Information systems that are labor saving may not be efficient.

A user has created a password that meets all the criteria for a strong password. What is a potential drawback of such a password? a. It can be easily guessed. b. It might be the password of another computer. c. It will be difficult to remember. d. It will be very short.

c. It will be difficult to remember.

Which of the following is most likely to be a disadvantage of self-driving cars? a. There will be more accidents. b. More parking lots will have to be built. c. More people will use cars and avoid planes or trains. d. There will be more stress during commute.

c. More people will use cars and avoid planes or trains.

Which of the following is TRUE of supporting activities? a. Customer service is considered as a supporting activity. b. Their contribution toward a product's value is negligible. c. Negotiation of prices is considered as a supporting activity. d. Their contributions to margin can be calculated easily.

c. Negotiation of prices is considered as a supporting activity.

Which of the following statements is TRUE about data characteristics of quality information? a. Accurate information can be conceived from inaccurate data. b. Information systems that produce real-time data are less expensive than those that produce data at a later time. c. The timeliness of information can be measured against events. d. Data that appears on any Web page is reliable.

c. The timeliness of information can be measured against events.

Which of the following refers to information that is based on correct and complete data and has been processed correctly, as expected? a. measurable information b. timely information c. accurate information d. relevant information

c. accurate information

In the swimlane format, the specific tasks that need to be accomplished as part of a business process are known as ________. a. resources b. databases c. activities d. decisions

c. activities

Security systems ultimately depend on ________. a. the devices on the network b. the security budget c. behavior of users d. the firewalls installed

c. behavior of users

According to the business process modeling notation, the end of a business process is symbolized by a ________. a. circle having a narrow border b. square having a thick border c. circle having a thick border d. square having a narrow border

c. circle having a thick border

In a job interview, Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members. In this case, which of the following skills is the interviewer trying to test? a. systems thinking b. cognitive acceleration c. collaboration d. facilitation

c. collaboration

According to Porter, the processes and systems in an organization pursuing differentiation strategy must ________ to avoid negative margins. a. increase procurement b. provide products at lowest costs to customers c. create sufficient value to cover their costs d. develop and adopt new technologies

c. create sufficient value to cover their costs

In Porter's five forces model, the intensity of each of the five forces determines the characteristics of the industry, how profitable it is, and ________. a. the power held by employee unions b. the quality and the nature of products sold c. how sustainable that profitability will be d. how competent the customer services will be

c. how sustainable that profitability will be

If a company implements a policy that states if a customer leaves their firm, they will have to pay a $1,500 penalty, the company is implementing which of Porter's competitive advantages? a. lock in buyers b. improving customer service c. lock in customers d. establishing alliances

c. lock in customers

As the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be ________. a. considered a nonroutine cognitive skill b. sufficient to attain job security c. outsourced to the lowest bidder d. a strong marketable skill

c. outsourced to the lowest bidder

The five-component framework of an information system consists of computer hardware, software, data, people, and ________. a. objectives b. documents c. procedures d. results

c. procedures

Activities within a business process are shown in ________. a. squares b. circles c. rectangles with rounded corners d. diamonds with rounded corners

c. rectangles with rounded corners

Jupiter Shop is an online store. Customers have to create an online account to purchase products. The purchased products are delivered free of cost. The address of delivery is stored, so that customers can choose the same address for future purchases. Jupiter Shop features seasonal discounts and exchange offers. It also accumulates redeemable points for regular shoppers. Which of the following statements describes the use of information systems (IS) by Jupiter Shop to lock in customers? a. providing free home delivery b. offering seasonal discounts c. saving the delivery addresses d. collecting feedback online

c. saving the delivery addresses

For data to be worth its costs, an appropriate relationship must exist between ________. a. hardware and software b. the manager and vice-president c. the cost of data and its value d. the timeliness of data and its costs

c. the cost of data and its value

If the price of an alternative is lower than the price of an existing product, and customers perceive similar benefits from both the products, then the ________. a. price of the product should be increased to retain market share b. switching cost is high c. threat from the substitute is strong d. customers' bargaining power decreases

c. threat from the substitute is strong

A ________ is a collection of 1,024 bytes. a megabyte b gigabyte c terabyte d kilobyte

d kilobyte

________ does NOT flow automatically from one activity to another. a. Efficiency b. Work c. Effectiveness d. Data

d. Data

Which of the following is most likely to be an advantage of self-driving cars? a. More auto loans will be taken. b. Fewer cars will be shared by family members. c. More insurance policies will be taken. d. Fewer accidents will occur.

d. Fewer accidents will occur.

Which of the following best describes collaboration? a. It is the ability of an individual to model the components of the system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. b. It is the ability to assess, evaluate, and apply emerging information technology to business. c. It is the activity of constructing or modifying models with the help of one's nonroutine cognitive skills. d. It is the activity of two or more people working together to achieve a common goal, result, or work product.

d. It is the activity of two or more people working together to achieve a common goal, result, or work product.

Which of the following statements is TRUE of a server? a. It creates a backup of all information within a system. b. It stores the results of computations in the main memory. c. It provides access only for one user at a time. d. It supports processing requests from remote computers.

d. It supports processing requests from remote computers.

________ states that the value of a network is equal to the square of the number of users connected to it. a. Moore's Law b. Kryder's Law c. Nielsen's Law d. Metcalfe's Law

d. Metcalfe's Law

The effectiveness of new online ad programs needs to be evaluated based on the frequency at which a customer clicks those ads. Identify the most effective and efficient method to analyze this data. a. The click ratios must be tracked in real time. b. The sample time at which the maximum data is accumulated is assumed to prevail for the entire cycle. c. The clicks can be monitored for a short period of time and can be integrated for the total time. d. The data must be saved in batches and processed a few hours later.

d. The data must be saved in batches and processed a few hours later.

Which of the following statements is TRUE about business process modeling notation? a. A circle with a thin border represents a decision. b. Sequence flows are indicated by dashed lines. c. Data flows are indicated by solid labeled lines. d. The medium of data flow is unimportant.

d. The medium of data flow is unimportant.

Which of the following statements is TRUE about data characteristics of quality information? a. Data that appears on any Web page is reliable. b. Information systems that produce real-time data are less expensive than those that produce data at a later time. c. Accurate information can be conceived from inaccurate data. d. The timeliness of information can be measured against events.

d. The timeliness of information can be measured against events.

Which of the following statements is TRUE of thick-client applications? a. They require nothing more than a browser to function. b. They do not need a server connection to run. c. They are application programs that need not be preinstalled on the client computer. d. They mostly run on a single operating system.

d. They mostly run on a single operating system.

Which of the following is TRUE about the impact of Moore's Law on business professionals? a. They no longer need to focus on skills such as abstract reasoning and collaboration. b. They have to concentrate more on developing routine skills than nonroutine skills. c. They need to be able to develop better communication and information technologies. d. They need to be able to assess, evaluate, and apply emerging information technology to business.

d. They need to be able to assess, evaluate, and apply emerging information technology to business.

A password is said to be weak if it contains ________. a. the numbers 9 and 3 b. three special characters c. both uppercase and lowercase letters d. a complete dictionary word

d. a complete dictionary word

Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________. a. collaboration skills b. routine skills c. ability to outsource work d. ability to experiment

d. ability to experiment

Each stage of the value chain not only adds value to the product but also ________. a. improves supplier relationships b. attracts competitors c. devalues the final product d. accumulates costs

d. accumulates costs

Each stage of the value chain not only adds value to the product but also ________. a. improves supplier relationships b. attracts competitors c. devalues the final product d. accumulates costs

d. accumulates costs

What must facilitate the organization's competitive strategy? a. hardware for the company b. the organization's goals c. a few information systems d. all information systems

d. all information systems

Virtual reality uses ________ to create a completely immersive experience for the user. a. glasses b. a strong sense of presence c. mixed reality d. augmented reality

d. augmented reality

When activities formerly done by people following procedures are moved to computers that perform the work by following instructions in software, the activities are said to be ________. a. documented b. outsourced c. systematized d. automated

d. automated

Porter's five competitive forces can be grouped into forces related to competition and forces related to supply chain ________ power. a. labor b. consumers c. rivalry d. bargaining

d. bargaining

Why did Jennifer lose her job at Falcon Security? a. because of a downturned economy b. because the company moved to another city c. because she did not agree with Joni d. because she did not experiment with any ideas

d. because she did not experiment with any ideas

A firm introduces a new range of laptops that concentrate on delivering good graphics performance. Which of the following competitive strategies has the firm adopted if these laptops have relatively low prices? a. industry-wide low cost b. focused differentiation c. industry-wide differentiation d. focused low cost

d. focused low cost

Which of the following competitive strategies does a company follow if it produces a uniquely formulated anti-aging face cream targeted at women above the age of forty? a. providing a better product across the industry b. providing the lowest cost across the industry c. focusing on lowering the cost within an industry-segment d. focusing on product differentiation within an industry-segment

d. focusing on product differentiation within an industry-segment

Since 1990 the most significant determinate of employment and salary is ________. a. the ability to experiment b. education c. industry d. nature of work performed.

d. nature of work performed.

If a value chain's margin is ________ the company can not cover its costs and must make some changes. a. not part of the process b. positive c. zero d. negative

d. negative

What does an organization themselves do? a. build information systems b. create products c. create services d. nothing

d. nothing

The software and procedure components of the information systems framework are ________. a. bridges between the human side and the computer side b. actors c. the outermost components d. sets of instructions

d. sets of instructions

A group of components that interact to achieve some purpose is referred to as a(n) ________. a. entity b. element c. unit d. system

d. system

Whatever career you choose you must ________ systems development. a. know how to create b. wait for the c. know how much it costs to create a d. take an active role in

d. take an active role in

Porter defined ________ as the amount of money that a customer is willing to pay for a resource, product, or service. a. price b. margin c. profit d. value

d. value

Which of the following statements represents information? a. Any record fact is information. b. Jeff earns $30.00 per hour. c. The average hourly wage of photographers is $55.00 per hour. d. Amazon's stock price was $54 two years ago.

d?

A company should only develop information systems if its competitors have developed information systems.

false

A good information system is one that provides the users with more information than what is required.

false

According to the five-component framework, the number of components in an information system increases in proportion to its complexity.

false

According to the five-component model of an information system, software is the most important component of an information system.

false

According to the five-component model of information systems, the data and software components of information systems are capable of performing actions.

false

Applications such as MS Word and Excel are examples of procedures.

false

Data refers to the knowledge derived from information.

false

Data should be relevant to the subject, not necessarily to the context.

false

Good information is conceived from accurate, correct, and complete data.

false

In the five-component model of an information system, hardware and software are part of the human side.

false

Information system refers to the products, methods, inventions, and standards that are used for the purpose of producing information.

false

Information technology and information systems are synonymous terms.

false

Information technology is an assembly of hardware, software, data, procedures, and people that produces information.

false

Microsoft defines a strong password as one that contains no more than seven characters.

false

People can buy information systems, but they cannot buy information technology.

false

The lower the amount of work to be moved from the human side to the computer side of an information system, the higher the complexity of that system.

false

a good password is one that contains the user&#39;s name or company name.

false

According to the five-component framework, the five components of an information system are present in every information system.

true

Changing personnel responsibilities to suit an information system is more disruptive to an organization than ordering additional hardware for the information system.

true

Data accuracy is a critical requirement for good information.

true

Data becomes information when it is presented in a meaningful context.

true

Data is worth its cost when an appropriate relationship exists between the cost of data and its value.

true

Data needs to be sufficient for the purpose for which it is generated, but just barely so.

true

Good information requires that data be timely.

true

If you need someone&#39;s password to access a system, you should ask her to enter her password and look away while she does that.

true

In the five-component model of an information system, data acts as a bridge between the computer and the human sides.

true

Information systems become a waste of time and money when users work with inaccurate data.

true

Information systems differ in the amount of work that is moved from the human side to the computer side.

true

Information systems exist to help people who work in an organization achieve the strategies of that business.

true

Information systems should be subject to the same financial analyses to which other assets are subjected.

true

Mary processes employee statistics to obtain a meaningful understanding of her organization. The data that she derives by processing becomes information.

true

Obtaining or developing new programs is more difficult than ordering additional hardware.

true

The five components of information systems are symmetrical.

true

The five-component framework applies to simple and complex information systems.

true


Related study sets

1st Quarter Literature Exam 1 PT 2

View Set

SmartBook Chapter 10 (MKTG 4400)

View Set