MIS Exam 1 (CH 1-5)
A virtual company
uses the capabilities of other companies without being physically tied to those companies.
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
Assign responsibility
Which of the following objectives best describes the business strategy behind the technologies implemented in Disney's Operational Command Center, as discussed in the chapter case?
Customer support
(T/F) Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm
False
(T/F) In social business, firms use social networks for coordinating production tasks.
False
(T/F) Management information systems typically support nonroutine decision making.
False
(T/F) The use of Internet technologies allows companies to more easily sustain competitive advantage.
False
(T/F) Transaction processing systems are most commonly used by the senior management level of an organization.
False
Which of the following would not be considered a disruptive technology?
Instant Messaging
(T/F) A firm that invests in efficient business processes is making an investment in organizational complementary assets.
True
(T/F) Business processes are collections of standard operating procedures.
True
(T/F) In whitedash-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.
True
(T/F) Investment in IT is over 50% of all invested capital.
True
(T/F) MIS job growth is projected to be 50% greater than other jobs in the next five years
True
(T/F) Most Internet businesses do very little to protect the privacy of their customers.
True
(T/F) Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations
True
(T/F) Shipping a product to a customer is an example of a business process.
True
An example of a business using information systems to attain operational excellence is
Wal-Mart's RetailLink system.
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called
accountability
Which main business function is responsible for maintaining employee records?
human resources
The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is
operations research
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Kant's Categorical Imperative
An organization is
A.collection of social elements. B.formal, legal entity with internal rules and procedures that must abide by laws. C. stable, formal social structure that takes resources from the environment and processes them to produce outputs. E. A, B, and C
Applications that allow managers to interactively manipulate current and historical data to discover patterns and trends that will help their decision making are referred to as
Business Intelligence
______ are representatives of departments outside of the information systems group for whom applications are developed.
End Users
________ are designed to support organizationdash-wide process coordination and integration.
Enterprise application
(T/F) A fully digital firm produces only digital goods or services.
False
(T/F) Business processes are logically related tasks for accomplishing tasks that have been formally encoded by an organization.
False
(T/F) Data gathered by online behavioral tracking firms is limited to the user's behavior on a single Web site
False
(T/F) Enrolling employees in benefits plans is a business process handled by the finance and accounting function.
False
(T/F) Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.
False
(T/F) Most American and European privacy law is based on a set of five principles called COPPA.
False
(T/F) Studies have consistently shown that firms that invest greater amounts in information technology receive greater benefits than firms that invest less.
False
(T/F) The Copyright Office began registering software progams in the 1990s.
False
(T/F) The term business ecosystem describes the interplay between the various organizational forces within a firm.
False
A hotel reservation system is a typical example of a management information system.
False
Knowledge workers assist with paperwork at all levels of the firm.
False
IT __________ includes the strategy and policies for using information technology within an organization
Governance
All of the following statements regarding Lotus Notes are true except which one?
It began as an e-mail and messaging client
An example of synergy in business is
JP Morgan Chase's mergers with other banks that provided JP Morgan with a network of retail branches in new regions.
Which types of systems consolidate the relevant knowledge and experience in the firm to make it available to improve business processes and management decision making?
KMS
You are consulting for a beverage distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step?
Perform a strategic systems analysis
________ can be induced by tens of thousands of repetitions under lowdash-impact loads.
RSI
________ are not held liable for the messages they transmit.
Regulated common carriers
Enabling management to make better decisions regarding organizing and scheduling sourcing, production, and distribution is a central feature of
SCMs.
The use of information systems because of necessity describes the business objective of
Survival.
(T/F) A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.
True
(T/F) All organizations have bedrock, unassailable assumptions that define their goals and products.
True
(T/F) Computers are the only part of an information system.
True
(T/F) Decisiondash-support systems use internal information as well as information from external sources.
True
(T/F) Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.
True
(T/F) ESSs draw summarized information from internal MIS and DSS.
True
(T/F) From the point of view of economics, information systems technology can be viewed as a factor of production that can be substituted for traditional capital and labor.
True
(T/F) Functional systems that support business processes within a single functional group, such as human resources, are being phased out in favor of crossdash-functional systems.
True
(T/F) In order to understand how a specific business firm uses information systems, you need to know something about the hierarchy and culture of the company.
True
(T/F) In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer.
True
(T/F) Research has shown that only 25% of firms are able to align their information technology with their business goals.
True
(T/F) Supply chain management systems are more externally oriented than enterprise syestems.
True
(T/F) Synchronous collaboration tools allow global firms to collaborate from different locations at the same time.
True
(T/F) The most common type of computer-related RSI is CTS
True
(T/F) The value chain model classifies all company activities as either primary or support.
True
Which two of the following issues are privacy advocates and advertising industry most in conflict over? (Select two of the following.)
a national Dodash-Notdash-Track list Your answer is correct. an optdash-in policy required at all sites
All of the following are major features of organizations that impact the use of information systems except for
agency costs.
Advertisers use ___________ targeting in order to display more relevant ads based on user's search and browsing history.
behavioral
The most successful solutions or methods for achieving a business objective are called
best practices
The enormous volume of data generated by internet activity, such as Web traffic and e-mail, is referred to as
big data
The "do anything anywhere" computing environment can
blur the traditional boundaries between work and family time
A(n)____________ is a set of logically related activities for accomplishing a specific business result.
business process
How are information systems used at the industry level to achieve strategic advantage?
by building industrydash-wide, ITdash-supported consortia and symposia
Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective?
competitive advantage
The ________ model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete.
competitive forces
The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its
culture.
As discussed in the chapter opening case, which of the four generic strategies did Sears employ to combat the competition offered by Target, Walmart, and Macy's?
customer and supplier intimacy
An ESS commonly uses a(n) ________________ to display an array of charts and graphs of a business's key performance indicators.
digital dashboard
The four major enterprise applications are
enterprise systems, SCMs, CRMs, and KMSs.
Which of the following is not one of the competitive forces?
external environment
The value chain model
helps a firm identify points at which information technology can most effectively enhance its competitive position.
Psychologists study information systems with an eye to understanding
how human decision makers perceive and use formal information.
Sociologists study information systems with an eye to understanding
how systems affect individuals, groups, and organizations.
Immanuel Kant's Categorical Imperative states that
if an action is not right for everyone to take, it is not right for anyone to take.
The practice of spamming has been growing because
it is so inexpensive and can reach so many people
refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations.
liability
According to the ________ definition of organizations, an organization is seen as a means by which primary production factors are transformed into outputs consumed by the environment.
microeconomic
FIP principles are based on the notion of the
mutuality of interest between the record holder and the individual
Disciplines that contribute to the technical approach to information systems are
operations research, management science, and computer science.
The 2012 FTC report on industrydash-best practices for protecting individuals' privacy focused on each of the following topics except
phasing out of selfdash-regulatory codes.
Mintzberg's classification of organizational structure categorizes the knowledgedash-based organization where goods and services depend on the expertise and knowledge of professionals as a(n)
professional bureaucracy
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of
property rights and obligations
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of
quality of life.
Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix?
remote/colocated
The Do-Not-Track Act of 2011
requires firms to notify customers that they are being tracked.
The introduction of new information technology has a
ripple effect raising new ethical, social, and political issues.
A substitute product of most concern for a cable TV distributor is
satellite TV.
Network economics
sees the cost of adding new members as inconsequential.
An example of a social complementary asset is
technology and service firms in adjacent markets.
Edash-government refers to the application of ________ to digitally enable government and public sector agencies' relationships with citizens, businesses, and other arms of government.
the Internet and networking technologies
An example of a business using information systems for customer and supplier intimacy is
the Mandarin Oriental hotel's customerdash-preference tracking system.
From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called
the information value chain.
The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output. This is referred to as
the law of diminishing returns
Which of the following constitutes an organizational element in the UPS tracking system described in the chapter?
the specification of procedures for identifying packages with sender and recipient information