BUS 321 - Exam 1
The enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as: 1. Big data. 2. IoT. 3. Business intelligence. 4. Cloud computing. 5. The mobile digital platform.
1. Big DATA
Which of the following is most likely to have direct responsibility for ensuring that his or her company complies with existing data privacy laws? 1. CPO 2. CKO 3. CSO 4. CIO 5. CIP
1. CPO CPO - A Chief Privacy Officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect employee and customer data from unauthorized access.
A firm that locates all systems development and operations at its headquarters is using a ________ system configuration. 1. Centralized 2. Virtual 3. Decentralized 4. Networked 5. Unilateral
1. Centralized
A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS. 1. Database server 2. Client server 3. Online server 4. Application server 5. Web server
1. Database server
You manage the Information Systems department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics, such as views and click-throughs, about their current display ads. Which type of system will most efficiently provide a solution? 1. Extranet 2. Intranet 3. Enterprise system 4. KWM 5. CRM
1. Extranet Extranet - a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers - normally to a subset of the information accessible from an organization's intranet.
Which of the following is an example of a company whose business model is based on access to large databases through the web? 1. Facebook 2. IBM 3. Gartner 4. Microsoft 5. Fortune
1. Facebook
In network economics, the value of a commercial software vendor's software products: 1. Increases as more people use them. 2. Decreases as more people use them. 3. Is unrelated to the number of people that use them. 4. Decreases according to the law of diminishing returns. 5. Increases due to higher marginal gain in output.
1. Increases as more people use them.
All of the following have been disruptive technologies except: 1. Minicomputers. 2. The PageRank algorithm. 3. The automobile. 4. Digital photography. 5. The iPod.
1. Minicomputers.
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: 1. Normalization. 2. Data management. 3. Data cleansing. 4. Data administration. 5. Data scrubbing.
1. Normalization.
Walmart's continuous replenishment system allows it to do all of the following except: 1. Provide mass customization. 2. Fine-tune merchandise availability. 3. Transmit orders to restock directly to its suppliers. 4. Keep costs low. 5. Better meet customer demands.
1. Provide mass customization.
Instant messaging, videoconferencing, and shared screens are all examples of ________ collaboration tools. 1. Synchronous 2. Spontaneous 3. Bimodal 4. Asynchronous 5. Colocated
1. Synchronous
As described in the chapter case, which of the following constitutes a people element of the UPS tracking system? 1. The decision to use automation 2. The ability to provide package status reports to customers 3. The web-based Post Sales Order Management System 4. The implementation of in-house package tracking software 5. The ability to embed UPS functions in external sites
1. The decision to use automation
A business is a formal organization created to sell services or products at a profit. 1. True 2. False
1. True
A value web is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market. 1. True 2. False
1. True
An MIS generally is not flexible and has little analytical capability. 1. True 2. False
1. True
Any intellectual work product that isn't based on public knowledge can be classed as a trade secret. 1. True 2. False
1. True
As a result of new public laws, accountants require an intimate knowledge of databases, reporting systems, and networks. 1. True 2. False
1. True
Copyright is a legal protection given to creators of certain types of intellectual property. 1. True 2. False
1. True
Identifying a problem includes agreeing that a problem exists. 1. True 2. False
1. True
In cloud computing, rapid elasticity refers to the ability of computing resources to be quickly obtained, increased, or decreased to meet demand. 1. True 2. False
1. True
In order to understand how a specific business firm uses information systems, you need to know something about the history and culture of the company. 1. True 2. False
1. True
Nearly all of the research on the business benefits of collaboration is anecdotal. 1. True 2. False
1. True
One of the key concepts in patent law is originality. 1. True 2. False
1. True
Some experts believe that exposure to computers reduces intelligence. 1. True 2. False
1. True
The efficiency of a business firm depends to a large extent on how well its internal and interorganizational business processes are designed and coordinated. 1. True 2. False
1. True
The primary goal of social business is to deepen interactions with employees and customers. 1. True 2. False
1. True
The problem with web browsers' Do Not Track options is that websites aren't obligated to honor these settings. 1. True 2. False
1. True
The value chain model classifies all company activities as either primary or support. 1. True 2. False
1. True
Two key services of Hadoop are HDFS and HBase non-relational database. 1. True 2. False
1. True
UPS's use of web-based tools that allow customers to embed UPS functions, such as tracking and cost calculations, into their own websites, described in the chapter case, is an information systems solution used to achieve customer intimacy. 1. True 2. False
1. True
A data warehouse extracts current and historical data from multiple operational systems in an organization. 1. True 2. False
1. True Data Warehouse - A central repository of information that can be analyzed to make better informed decisions.
End users are playing an increasing role in the design and development of information systems. 1. True 2. False
1. True End users - the person who actually uses a particular product.
A TPS helps managers monitor the firm's relations with the external environment. 1. True 2. False
1. True TPS (Transaction Processing Systems) - Keep track of basic activities and transactions of organization
Business organizations are hierarchies consisting of three principal levels. 1. True 2. False
1. True Three Principal Levels: Senior management (top) Middle management Operational management (bottom)
E-commerce and Internet advertising reached $83 billion in 2017, growing at about: 1. 5 percent 2. 15 percent 3. 20 percent 4. 10 percent 5. 25 percent
2. 15 percent
How many transactions per day can the IBM Z13 mainframe process? 1. 2.5 million 2. 2.5 billion 3. 25 billion 4. 25 million 5. 250 million
2. 2.5 billion
Linux plays a major role in supporting business information systems, and has garnered about ________ of the U.S. server market. 1. 10 percent 2. 35 percent 3. 80 percent 4. 50 percent 5. 25 percent
2. 35 percent
What percent of the Fortune 500 companies uses Twitter to communicate with their customers? 1. 40 percent 2. 80 percent 3. 50 percent 4. 20 percent 5. 60 percent
2. 80 percent
You use ________ to predict when a computer hardware system becomes saturated. 1. Virtualization 2. Capacity planning 3. Measured service 4. SLAs 5. Localization
2. Capacity planning
A network requires at least three computers and a shared resource. 1. True 2. False
2. False
Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support. 1. True 2. False
2. False
Business processes that impede organizational responsiveness are a source of competitive strength for a company. 1. True 2. False
2. False
Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach. 1. True 2. False
2. False
Purchase of information systems hardware, software, and telecommunications equipment will constitute more than half of all capital investment in the United States in 2017. 1. True 2. False
2. False
The inventors of a disruptive technology always benefit the most from the technology; and it is rare that fast followers catch up quickly. 1. True 2. False
2. False
Today, most system and application software is custom built by in-house programmers. 1. True 2. False
2. False
Whereas marketing and financial careers have been transformed by the growth in information systems, thus far managerial positions have remained relatively unaffected. 1. True 2. False
2. False
Due process is a feature of political systems and allows individuals to recover damages done to them by others. 1. True 2. False
2. False Due Process - the legal requirement that the state must respect all legal rights that are owed to a person.
Enterprise systems do not utilize order transaction data. 1. True 2. False
2. False Enterprise systems - large-scale software packages that are able to track and control all of the complex operations of a business.
An unsupportive culture is an example of the people dimension of business problems. 1. True 2. False
2. False People Dimension - all of the factors related to employees, from operational personnel to senior management. Essentially, an organization and its information systems are worthless without skilled employees. For example, a people dimension of implementing a new information system is ensuring users are properly trained to use the system.
Which of the following is the key business metric behind the technologies implemented by Kroger, as discussed in the chapter-opening case? 1. Survival 2. Higher customer satisfaction levels 3. Improved employee morale 4. Reduced cost of supplies 5. Improved decision making
2. Higher customer satisfaction levels
Policies that determine which information technology will be used, when, and how, are provided by: 1. IT management services. 2. IT standards services. 3. Application software services. 4. Data management services. 5. IT educational services.
2. IT standards services
Internet technology: 1. Imposes a significant cost of entry, due to infrastructure requirements. 2. Makes it easy to sustain operational advantages. 3. Makes it easy for rivals to compete on price alone. 4. Increases the difference between competitors because of the wide availability of information. 5. Has lessened competitive rivalries.
2. Makes it easy to sustain operational advantages.
The Internet raises the bargaining power of customers most effectively by: 1. Making more products available. 2. Making information available to everyone. 3. Creating new opportunities for building loyal customer bases. 4. Lowering transaction costs. 4. Reducing barriers to entry.
2. Making information available to everyone.
All of the following are considered primary activities of a firm except: 1. Outbound logistics. 2. Procurement. 3. Service. 4. Inbound logistics. 5. Sales and marketing.
2. Procurement The primary activities of Michael Porter's value chain are inbound logistics, operations, outbound logistics, marketing and sales, and service. The goal of the five sets of activities is to create value that exceeds the cost of conducting that activity, therefore generating a higher profit.
What are the relationships that the relational database is named for? 1. Relationships between rows and columns 2. Relationships between entities 3. Relationships between databases 4. Relationships between fields and records 5. Relationships between attributes
2. Relationships between entities Relational Database - a set of formally described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables.
What would be a reason for using a workstation rather than a personal computer? 1. When you need to access a network 2. When you need more powerful computational abilities 3. When you need to serve applications and data to client computers 4. When you need to share resources 5. When you need to connect to a cloud computing platform
2. When you need more powerful computational abilities
What percent of employed Americans report spending some time working remotely? 1. 23 percent 2. 33 percent 3. 43 percent 4. 13 percent 5. 53 percent
3. 43 percent
Which of the following statements is not true about collaboration in a business setting? 1. Special types of information systems are available to support collaboration. 2. The evidence of the business benefits of collaboration is largely anecdotal. 3. Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity. 4. Collaboration may be a short-lived activity, lasting just a few minutes. 5. Meaningful collaboration requires a supportive business firm culture and the right, decentralized structure.
3. Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity.
A(n) ________ is a structured survey of the accuracy and level of completeness of the data in an information system. 1. Systems audit 2. Data analysis 3. Data quality audit 4. Systems analysis 5. Data overview
3. Data quality audit
In a ________ system configuration, separate information systems are designed and managed by each foreign unit. 1. Centralized 2. Virtual 3. Decentralized 4. Duplicated 5. Networked
3. Decentralized
A schematic of the entire database that describes the relationships in a database is called a(n): 1. Intersection relationship diagram. 2. Data definition diagram. 3. Entity-relationship diagram. 4. Data dictionary. 5. Field key diagram.
3. Entity-relationship diagram.
Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: 1. Centralized processing. 2. Co-location. 3. Grid Computing 4. Cloud computing. 5. Client/server computing.
3. Grid computing
The value chain model: 1. Focuses primarily on collaboration with suppliers. 2. Sees the supply chain as the primary activity for adding value. 3. Helps a firm identify points at which information technology can most effectively enhance its competitive position. 4. Categorizes four basic strategies a firm can use to enhance its value chain. 5. Categorizes five related advantages for adding value to a firm's products or services.
3. Helps a firm identify points at which information technology can most effectively enhance its competitive position. Value Chain Model - a model that helps to analyze specific activities through which firms can create value and competitive advantage.
Assume you work for a package delivery service in a major metropolitan area and that the business has been losing customers for several years. You have been asked to find a solution to this problem. What is the correct way to proceed? 1. Think about what solutions can be implemented, look for solution designs, evaluate the designs, and then implement the solution. 2. Identify relevant information technologies, interview employees, choose a technology, and implement the technology. 3. Identify the problem, design alternative solutions, choose the best solution, and then implement the solution. 4. Design solutions, evaluate and identify the problems, choose the best solution, and then implement the solution. 5. Look for solutions, evaluate the solutions, identify the problem more clearly, and then implement the solution.
3. Identify the problem, design alternative solutions, choose the best solution, and then implement the solution.
Which of the following fields deals with behavioral issues, as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm? 1. Computer information systems 2. Information technology infrastructure 3. Management information systems 4. Information systems literacy 5. Information systems architecture
3. Management information systems
What percent of global Internet users use Google Search and other Google services? 1. Over 90 percent 2. Less than 10 percent 3. Nearly 80 percent 4. About 50 percent 5. Around 25 percent
3. Nearly 80 percent
The NAI is an industry association formed to help with which of the following? 1. Trade secret protection 2. Patent protection 3. Online privacy issues 4. Trademark protection 5. Copyright protection
3. Online privacy issues
Hadoop is a(n): 1. Data mining platform designed for storing and analyzing big data produced by web communications and transactions. 2. Pre-configured hardware-software system designed for analyzing big data. 3. Open source software framework designed for distributing data-processing over inexpensive computers. 4. NoSQL database technology that stores both data and procedures acting on the data as objects. 5. High-speed platform used to analyze large data sets.
3. Open source software framework designed for distributing data-processing over inexpensive computers.
Walmart exemplifies the power of information systems coupled with excellent business practices and supportive management to achieve which of the following? 1. Survival 2. New business models 3. Operational efficiency 4. Competitive advantage 5. Customer intimacy
3. Operational efficiency
You are a new manager at a plumbing supply manufacturer where there are an unusually high number of returns for a new aerator used in the production of high-end faucets. In examining the problem, you determine that the primary cause is the improperly designed die cast for the aerator. Which dimension of a business problem does this reflect? 1. Cultural 2. Technology 3. People 4. Management 5. Organizational
3. People
A DBMS makes the: 1. Logical database available for different analytical views. 2. Relational database available for different physical views. 3. Physical database available for different logical views. 4. Physical database available for different relational views. 5. Relational database available for different analytical views.
3. Physical database available for different logical views. DBMS - a software package designed to define, manipulate, retrieve and manage data in a database.
In a table for customers, the information about a single customer would reside in a single: 1. Entity. 2. Field. 3. Row. 4. Column. 5. Table.
3. Row
Which of the following can typically access a company's intranet? 1. The firm's customers 2. The firm's outside contractors 3. The firm's employees 4. The general public 5. The firm's suppliers
3. The firm's employees Intranet - A computer network for sharing corporate information, collaboration tools, operational systems, and other computing services only within an organization, and to the exclusion of access by outsiders to the organization.
Which of the following can force a business and its competitors to compete on price alone? 1. High product differentiation 2. Poor process efficiency 3. Transparent marketplace 4. Multiple competing suppliers 5. Demand control
3. Transparent marketplace Transparent Marketplace - transparent if much is known by many about: What products and services or capital assets are available, market depth (quantity available), what price, and where.
All of the following are new technology-related trends in MIS except: 1. Cloud computing. 2. The mobile digital platform. 3. Big data. 4. Co-creation of business value. 5. IoT.
4. Co-creation of business value.
All of the following can be considered managerial responsibilities except: 1. Setting strategy for responding to business challenges in the environment. 2. Allocating human resources to coordinate the work to be done. 3. Creating new products and services. 4. Designing new information systems. 5. Making action plans to solve organizational problems.
4. Designing new information systems.
Caterpillar Corporation is example of which of the following? 1. Franchiser 2. Transnational 3. Multinational 4. Domestic exporter 5. Virtual company
4. Domestic exporter
When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy. 1. Mass customization 2. Process efficiency 3. Product differentiation 4. Market niche 5. Market transparency
4. Market niche
The support activities of a firm include: 1. Organization infrastructure, human resources, sales and marketing, and technology. 2. Inbound logistics, technology, outbound logistics, sales and marketing, and service. 3. Sales and marketing, procurement, human resources, and technology. 4. Organization infrastructure, human resources, technology, and procurement. 5. Inbound logistics, organization infrastructure, outbound logistics, technology, and procurement.
4. Organization infrastructure, human resources, technology, and procurement. Support Activities - everything on the side, that helps run your business but actually isn"t related to your product.
In co-location, a firm: 1. Contracts with an external vendor to run its computer center and networks. 2. Off-loads peak demand for computing power to remote, large-scale data centers. 3. Uses only open source software to operate its computer systems. 4. Purchases and owns its web server but locates the server in the physical facility of a hosting service. 5. Utilizes an external, distributed computing grid.
4. Purchases and owns its web server but locates the server in the physical facility of a hosting service.
Key forces in a business' immediate environment include: 1. Global events. 2. Technological innovations. 3. Politic conditions 4. Regulations. 5. Economic conditions.
4. Regulations.
Outdated software is an example of the ________ dimension of business problems. 1. Cultural 2. Organizational 3. People 4. Technology 5. Management
4. Technology
Which of the following best describes how new information systems can result in legal gray areas? 1. They are implemented by technicians rather than managers. 2. They work with networked, digital data, which are more difficult to control than information stored manually. 3. They are created from sets of logical and technological rules rather than social or organizational mores. 4. They result in new situations that are not covered by old laws. 5. They are little understood by politicians or lawyers.
4. They result in new situations that are not covered by old laws.
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends: 1. In two short marks. 2. In three short marks. 3. With a crow's foot. 4. With a crow's foot preceded by a short mark. 5. In one short mark.
4. With a crow's foot preceded by a short mark.
Final assembly of iPhones occurs in which of the following countries? 1. Japan 2. United States 3. South Korea 4. Germany 5. China
5. China
To make sure it stocks clothes that its customers will purchase, a department store implements a new application that analyzes spending levels at its stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support? 1. Survival 2. Operational excellence 3. Improved decision making 4. New products 5. Customer intimacy
5. Customer intimacy
Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? 1. CTS 2. RSI 3. Technostress 4. CVS 5. Digital divide
5. Digital divide
DBMS typically include report-generating tools in order to: 1. Perform predictive analysis. 2. Display data in tables. 3. Display data in graphs. 4. Retrieve and display data. 5. Display data in an easier-to-read-format.
5. Display data in an easier-to-read-format.
Suppliers, customers, invoices and payments, products and services, and ________ are the five basic components with which businesses must deal. 1. Sales and marketing 2. Manufacturing and production 3. Technology 4. The environment 5. Employees
5. Employees
What is the most important benefit of an enterprise application? 1. Enabling managers to make better decisions 2. Enabling cost-effective, e-business processes 3. Enabling a company to work collaboratively with customers and suppliers 4. Enabling speed of communicating 5. Enabling business functions and departments to share information
5. Enabling business functions and departments to share information
An example of a business using information systems for supplier intimacy is: 1. Citibank's ATM system. 2. Apple's creation of the iPad. 3. The Mandarin Oriental's use of computers to keep track of guests' preferences. 4. Verizon's web-based digital dashboard providing real-time company information for managers. 5. JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced.
5. JCPenney's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced.
The average number of baseball tickets sold at a particular price is an example of: 1. Feedback 2. Raw Data 3. Input 4. Output 5. Meaningful information
5. Meaningful information
Perhaps the most frequent error in problem solving is: 1. Failing to consider all dimensions of a problem. 2. Following a rote pattern of decision making. 3. Being too doubtful. 4. Not being aware of personal limitations. 5. Rushing to judgment about the nature of a problem.
5. Rushing to judgment about the nature of a problem.
________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. 1. Programming 2. Business Intelligence 3. Enterprise Applications 4. Data Management Technology 5. Software
5. Software
Which business objective were competitors seeking when they rushed to provide ATMs after Citibank introduced the first ATMs in New York? 1. Competitive advantage 2. Customer and supplier intimacy 3. Improved efficiency 4. Improved decision making 5. Survival
5. Survival
Which of the following statements about client/server computing is not true? 1. The server provides security, remote access, and user authentication. 2. The client is normally a desktop or laptop computer. 3. The client provides the user interface. 4. Computing on the Internet is based on the client/server model. 5. The bulk of processing occurs on the client.
5. The bulk of processing occurs on the client.
Which of the following statements is not true? 1. Management and organizational tasks required in systems development usually are not outsourced. 2. Outsourcing has actually accelerated the development of new systems in the United States by reducing the cost of building and maintaining them. 3. The most common and successful offshore outsourcing projects involve production programming and system maintenance programming work, along with call center work. 4. Inflation in Indian and Chinese wages for technology work is leading to a counter movement of some IT jobs back to the United States. 5. The impact of domestic IT outsourcing has been very disruptive to some regional areas of the United States.
5. The impact of domestic IT outsourcing has been very disruptive to some regional areas of the United States.
The emergence of software as a web service has acted as a disruptive technology for: 1. PC manufacturers. 2. Local Internet service providers. 3. Traditional key-word search engines. 4. Telecommunications providers. 5. Traditional boxed software companies.
5. Traditional boxed software companies.
Microsoft Word is an example of: 1. Data management software. 2. Presentation graphics software. 3. Software productivity suite. 4. Open source software. 5. Word processing software.
5. Word processing software.