Exam 1 Review

Ace your homework & exams now with Quizwiz!

According to agency theory, the firm is viewed as a(n): A unified, profit-maximizing entity. B task force organization that must respond to rapidly changing environments. C entrepreneurial endeavor. D "nexus of contracts" among self-interested individuals. E entrepreneurial structure.

"nexus of contracts" among self-interested individuals.

What percent of Facebook's users access the service from mobile phones and tablets? A 90 percent B 93 percent C 95 percent D 98 percent E 100 percent

98 percent

Journalist Thomas Friedman's description of the world as "flat" refers to the: A reduction of economic and cultural advantages of developed countries. B use of social media for instantaneous communication. C reduction in travel times and the ubiquity of global exchange and travel. D flattened hierarchies in digital firms. E increased use of global currencies.

A reduction of economic and cultural advantages of developed countries

Which of the following were involved in what has been called the patent trial of the century? A Apple and Microsoft B Apple and Hewlett-Packard C Microsoft and Symantec D Microsoft and Facebook E Apple and Samsung

Apple and Samsung

Which of the following is an example of a keystone firm within a business ecosystem? A Apple and the mobile platform ecosystem B GUESS and the fashion ecosystem C Citibank and the ATM ecosystem D American Airlines and the computerized reservation ecosystem E Nike and the athletic apparel ecosystem

Apple and the mobile platform ecosystem

Which of the following is not a principal cause of poor system performance? A Software bugs B Hardware failures C Computer abuse D Facility failures E Poor input data quality

Computer abuse

Which of the following would a manager use to determine the impact on the production schedule if sales doubled in the next quarter? A MIS B TPS C ESS D DSS E CRM

DSS

All of the following are technical solutions to protecting user privacy except: A email encryption B anonymous surfing C anonymous email D preventing client computers from accepting cookies E data use policies

Data use policies

Which of the following systems incorporates data from external events as well as summarized information from internal business intelligence systems? A TPS B ESS C MIS D DSS E SCM

ESS

Data is information that has been shaped into a form that is meaningful to human beings. True/False

False

Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue. True/False

False

Managers rely on TPS for nonroutine decision-making. True/False

False

Operational managers use ESS primarily to solve specific problems. True/False

False

Social complementary assets are investments made by a firm to optimize its return on information technology assets. True/False

False

The inventors of a disruptive technology typically benefit the most from the technology; it is rare that fast followers catch up quickly. True/False

False

Which of the following statements about disruptive technologies is not true? A Disruptive technologies radically change the business landscape and environment. B Disruptive technologies may be substitute products that perform better than other products currently being produced. C Disruptive technologies may sometimes simply extend the marketplace. D Disruptive technologies may put entire industries out of business. E Firms that invent disruptive technologies as first movers always become market leaders.

Firms that invent disruptive technologies as first movers always become market leaders.

Which of the following is an example of a divisionalized bureaucracy? A Startup firm B University C Fortune 500 firm D Midsize manufacturer E Consulting firm

Fortune 500 firm

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A HIPAA B Gramm-Leach-Bliley Act C Privacy Protection Act D Freedom of Information Act E COPPA

HIPAA

What is the most important benefit of an enterprise application? A Enabling the creation of business intelligence B Helping businesses become more flexible and productive by enabling business functions and departments to share information and coordinate their business processes more closely C Providing answers to nonroutine questions D Enabling cost-effective e-business processes E Enabling managers to make better decisions

Helping businesses become more flexible and productive by enabling business functions and departments to share information and coordinate their business processes more closely

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? A.His action is acceptable, because the grocer suffers the least harm. B His action is acceptable, because the higher social value is the survival of the family. C His action is wrong, because the man would not want the grocer to steal from him. D His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E His action is wrong, because the grocery store owner is harmed.

His action is acceptable, because the higher social value is the survival of the family.

Which of the following is not one of the six strategic business objectives that businesses are seeking to achieve when they invest in information systems? A Operational excellence B Improved decision making C Improved community relations D Competitive advantage E Survival

Improved community relations

Which of the following represent the primary activities of a firm? A Inbound logistics, operations, outbound logistics, sales and marketing, and service B Inbound logistics, operations, outbound logistics, technology, and service C Procurement, inbound logistics, operations, technology, and outbound logistics D Procurement, operations, technology, sales and marketing, and services E Organization infrastructure, human resources, technology, and procurement

Inbound logistics, operations, outbound logistics, sales and marketing, and service

Raw data collected at checkout counters in a grocery store is an example of: A output B processing C feedback D input E information systems

Input

Which of the following statements best describes organizational culture? A It encompasses the sum of beliefs and assumptions by all members. B It enables the organization to transcend the different levels and specialties of its employees. C It reflects the senior management's perspective on the organization and goals. D It allows a company to achieve greater operational efficiency. E It is a fundamental set of assumptions, values, and ways of doing things that has been accepted by most members of the organization.

It is a fundamental set of assumptions, values, and ways of doing things that has been accepted by most members of the organization.

Which of the following systems would an organization use to compare total annual sales for a specific product to a planned target? A ESS B TPS C MIS D DSS E CRM

MIS

The ability to offer individually tailored products or services using the same production resources as bulk production is known as: A mass marketing B micromarketing C micro customization D niche customization E mass customization

Mass customization

Which of the following is a data analysis technology that finds obscure connections between data in disparate sources? A HIPAA B FIP C NORA D COPPA E Spyware

NORA

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? A Family and home B Property rights and obligations C System quality D Accountability and control E Quality of life

Quality of life

________ means that you accept the potential costs and obligations for the decisions you make. A Responsibility B Accountability C Liability D Due process E Duty

Responsibility

Which of the following industries has the lowest barrier to entry? A Automotive B Computer chip C Solar energy D Airline E Small retailer

Small retailer

Data management technology consists of which of the following? A Physical hardware and media used by an organization to store data B Detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system C Two or more computers linked together to share data or resources D Hardware and software used to transfer data E Software governing the organization of data on physical storage media

Software governing the organization of data on physical storage media

Which of the following statements about collaboration is not true? A In business, a collaboration can last as little as a few minutes. B Business collaboration relies on the formation of teams that are assigned a specific task or goal. C Successful collaboration can be achieved through technology regardless of the organization's culture or structure. D One business benefit of collaboration is improved innovation. E Collaboration can be one-to-one or many-to-many.

Successful collaboration can be achieved through technology regardless of the organization's culture or structure.

Which of the following is a support activity in a firm's value chain? A Inbound logistics B Operations C Sales and marketing D Service E Technology

Technology

A firm that invests in a strong IS development team is making an investment in organizational complementary assets. True/False

True

Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical. True/False

True

Crowdsourcing is an example of a social business application. True/False

True

Enterprise applications integrate information from multiple functions and business processes to enhance the performance of the organization as a whole. True/False

True

IT governance refers to the overall decision-making that guides the IT strategy of a firm. True/False

True

Information systems are used to enable new products and services via product differentiation. True/False

True

The three main dimensions of information systems are management, organizations, and information technology. True/False

True


Related study sets

Markets and Social Security Ch 6

View Set

Board review biochemistry questions

View Set

CyberSecurityQuiz: Module 07 Public Key Infrastructure and Cryptographic Protocols

View Set

Saludos y expresiones de cortesía (Greetings and polite expressions)

View Set

Chapter 19: Transoceanic Encounters and Global Connections

View Set