MIS Chapters 1-5
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
Assign responsibility.
Chapter 1
Chapter 1
Chapter 2
Chapter 2
Chapter 3
Chapter 3
Chapter 4
Chapter 4
________ are designed to support organizationdash-wide process coordination and integration
Enterprise applications
A fully digital firm produces only digital goods or services.
False
Business processes are logically related tasks for accomplishing tasks that have been formally encoded by an organization.
False
Enrolling employees in benefits plans is a business process handled by the finance and accounting function.
False
In social business, firms use social networks for coordinating production tasks
False
Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.
False
Knowledge workers assist with paperwork at all levels of the firm.
False
Management information systems typically support nonroutine decision making.
False
Studies have consistently shown that firms that invest greater amounts in information technology receive greater benefits than firms that invest less.
False
Transaction processing systems are most commonly used by the senior management level of an organization.
False
All of the following statements regarding Lotus Notes are true except which one?
It began as an e-mail and messaging client
An example of synergy in business is
JP Morgan Chase's mergers with other banks that provided JP Morgan with a network of retail branches in new regions.
Which types of systems consolidate the relevant knowledge and experience in the firm to make it available to improve business processes and management decision making?
KMS
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Kant's Categorical Imperative
You are consulting for a beverage distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step?
Perform a strategic systems analysis
________ can be induced by tens of thousands of repetitions under low-impact loads.
RSI
Enabling management to make better decisions regarding organizing and scheduling sourcing, production, and distribution is a central feature of
SCMs.
A firm that invests in efficient business processes is making an investment in organizational complementary assets.
True
A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.
True
Business processes are collections of standard operating procedures.
True
Computers are only part of an information system.
True
Decision-support systems use internal information as well as information from external sources.
True
Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.
True
ESSs draw summarized information from internal MIS and DSS.
True
Functional systems that support business processes within a single functional group, such as human resources, are being phased out in favor of cross-functional systems.
True
In order to understand how a specific business firm uses information systems, you need to know something about the hierarchy and culture of the company.
True
In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer.
True
Investment in IT is over 50% of all invested capital.
True
MIS job growth is projected to be 50% greater than other jobs in the next five years
True
Shipping a product to a customer is an example of a business process.
True
Supply chain management systems are more externally oriented than enterprise systems.
True
Synchronous collaboration tools allow global firms to collaborate from different locations at the same time.
True
The value chain model classifies all company activities as either primary or support.
True
An example of a business using information systems to attain operational excellence is
Wal-Mart's RetailLink system.
All of the following are major features of organizations that impact the use of information systems except for
agency costs.
Which two of the following issues are privacy advocates and advertising industry most in conflict over? (Select two of the following.)
an opt-in policy required at all sites a national Do-Not-Track list
End users
are representatives of departments outside of the information systems group for whom applications are developed.
The most successful solutions or methods for achieving a business objective are called
best practices.
The enormous volume of data generated by Internet activity, such as Web traffic and e-mail, is referred to as
big data
The "do anything anywhere" computing environment can
blur the traditional boundaries between work and family time.
Applications that allow managers to interactively manipulate current and historical data to discover patterns and trends that will help their decision making are referred to as
business intelligence
A(n) ____________ is a set of logically related activities for accomplishing a specific business result.
business process
How are information systems used at the industry level to achieve strategic advantage?
by building industrydash-wide, ITdash-supported consortia and symposia
Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective?
competitive advantage
The ________ model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete.
competitive forces
The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its
culture.
As discussed in the chapter opening case, which of the four generic strategies did Sears employ to combat the competition offered by Target, Walmart, and Macy's?
customer and supplier intimacy
Which of the following objectives best describes the business strategy behind the technologies implemented in Disney's Operational Command Center, as discussed in the chapter case?
customer support
An ESS commonly uses a(n) _____________ to display an array of charts and graphs of a business's key performance indicators.
digital dashboard
The four major enterprise applications are
enterprise systems, SCMs, CRMs, and KMSs.
Which of the following is not one of the competitive forces?
external environment
A hotel reservation system is a typical example of a management information system
false
Data gathered by online behavioral tracking firms is limited to the user's behavior on a single Web site.
false
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
false
Most American and European privacy law is based on a set of five principles called COPPA.
false
The Copyright Office began registering software programs in the 1990s.
false
The term business ecosystem describes the interplay between the various organizational forces within a firm.
false
The use of Internet technologies allows companies to more easily sustain competitive advantage.
false
An organization is a
formal, legal entity with internal rules and procedures that must abide by laws. collection of social elements. stable, formal social structure that takes resources from the environment and processes them to produce outputs.
IT ___________ includes the strategy and policies for using information technology within an organization.
governance
The value chain model
helps a firm identify points at which information technology can most effectively enhance its competitive position.
Psychologists study information systems with an eye to understanding
how human decision makers perceive and use formal information
Sociologists study information systems with an eye to understanding
how systems affect individuals, groups, and organizations.
Which main business function is responsible for maintaining employee records?
human resources
Immanuel Kant's Categorical Imperative states that
if an action is not right for everyone to take, it is not right for anyone to take.
Which of the following would not be considered a disruptive technology?
instant messaging
According to the ________ definition of organizations, an organization is seen as a means by which primary production factors are transformed into outputs consumed by the environment.
microeconomic
FIP principles are based on the notion of the
mutuality of interest between the record holder and the individual.
The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is
operations research.
Disciplines that contribute to the technical approach to information systems are
operations research, management science, and computer science.
The 2012 FTC report on industrydash-best practices for protecting individuals' privacy focused on each of the following topics except
phasing out of self-regulatory codes.
Mintzberg's classification of organizational structure categorizes the knowledgedash-based organization where goods and services depend on the expertise and knowledge of professionals as a(n)
professional bureaucracy.
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of
property rights and obligations.
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of
quality of life.
Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix?
remote/colocated
The Do-Not-Track Act of 2011
requires firms to notify customers that they are being tracked.
The introduction of new information technology has a
ripple effect raising new ethical, social, and political issues.
A substitute product of most concern for a cable TV distributor is
satellite TV.
Network economics
sees the cost of adding new members as inconsequential.
The use of information systems because of necessity describes the business objective of
survival
An example of a social complementary asset is
technology and service firms in adjacent markets.
E-government refers to the application of ________ to digitally enable government and public sector agencies' relationships with citizens, businesses, and other arms of government.
the Internet and networking technologies
An example of a business using information systems for customer and supplier intimacy is
the Mandarin Oriental hotel's customerdash-preference tracking system.
From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called
the information value chain.
The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output. This is referred to as
the law of diminishing returns
Which of the following constitutes an organizational element in the UPS tracking system described in the chapter?
the specification of procedures for identifying packages with sender and recipient information
All organizations have bedrock, unassailable assumptions that define their goals and products.
true
From the point of view of economics, information systems technology can be viewed as a factor of production that can be substituted for traditional capital and labor.
true
In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.
true
Most Internet businesses do very little to protect the privacy of their customers.
true
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.
true
Research has shown that only 25% of firms are able to align their information technology with their business goals.
true
The most common type of computer-related RSI is CTS.
true
A virtual company
uses the capabilities of other companies without being physically tied to those companies