MIS Exam 1 (CH 1-5)

Ace your homework & exams now with Quizwiz!

A virtual company

uses the capabilities of other companies without being physically tied to those companies.

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical​ issue?

Assign responsibility

Which of the following objectives best describes the business strategy behind the technologies implemented in​ Disney's Operational Command​ Center, as discussed in the chapter​ case?

Customer support

(T/F) Even in​ today's legal​ climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm

False

(T/F) In social​ business, firms use social networks for coordinating production tasks.

False

(T/F) Management information systems typically support nonroutine decision making.

False

(T/F) The use of Internet technologies allows companies to more easily sustain competitive advantage.

False

(T/F) Transaction processing systems are most commonly used by the senior management level of an organization.

False

Which of the following would not be considered a disruptive​ technology?

Instant Messaging

(T/F) A firm that invests in efficient business processes is making an investment in organizational complementary assets.

True

(T/F) Business processes are collections of standard operating procedures.

True

(T/F) In whitedash-collar ​fraud, information systems are most typically used as a means to hide financial evidence of crimes.

True

(T/F) Investment in IT is over 50% of all invested capital.

True

(T/F) MIS job growth is projected to be​ 50% greater than other jobs in the next five years

True

(T/F) Most Internet businesses do very little to protect the privacy of their customers.

True

(T/F) Privacy is the right to be left alone when you want to​ be, without surveillance or interference from other individuals or organizations

True

(T/F) Shipping a product to a customer is an example of a business process.

True

An example of a business using information systems to attain operational excellence is

Wal-Mart's RetailLink system.

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

accountability

Which main business function is responsible for maintaining employee records?

human resources

The discipline that focuses on mathematical techniques for optimizing parameters of​ organizations, such as transportation and inventory​ control, is

operations research

A colleague of yours frequently takes for his own personal use small amounts of office​ supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office​ supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical​ principle?

​Kant's Categorical Imperative

An organization is

A.collection of social elements. B.​formal, legal entity with internal rules and procedures that must abide by laws. C. stable, formal social structure that takes resources from the environment and processes them to produce outputs. E. ​A, B, and C

Applications that allow managers to interactively manipulate current and historical data to discover patterns and trends that will help their decision making are referred to as

Business Intelligence

______ are representatives of departments outside of the information systems group for whom applications are developed.

End Users

________ are designed to support organizationdash-wide process coordination and integration.

Enterprise application

(T/F) A fully digital firm produces only digital goods or services.

False

(T/F) Business processes are logically related tasks for accomplishing tasks that have been formally encoded by an organization.

False

(T/F) Data gathered by online behavioral tracking firms is limited to the​ user's behavior on a single Web site

False

(T/F) Enrolling employees in benefits plans is a business process handled by the finance and accounting function.

False

(T/F) Information technology​ (IT) consists of all the hardware that a firm needs to use in order to achieve its business​ objectives, whereas information systems consist of all the software and business processes needed.

False

(T/F) Most American and European privacy law is based on a set of five principles called COPPA.

False

(T/F) Studies have consistently shown that firms that invest greater amounts in information technology receive greater benefits than firms that invest less.

False

(T/F) The Copyright Office began registering software progams in the 1990s.

False

(T/F) The term business ecosystem describes the interplay between the various organizational forces within a firm.

False

A hotel reservation system is a typical example of a management information system.

False

Knowledge workers assist with paperwork at all levels of the firm.

False

IT __________ includes the strategy and policies for using information technology within an organization

Governance

All of the following statements regarding Lotus Notes are true except which​ one?

It began as an e-mail and messaging client

An example of synergy in business is

JP Morgan​ Chase's mergers with other banks that provided JP Morgan with a network of retail branches in new regions.

Which types of systems consolidate the relevant knowledge and experience in the firm to make it available to improve business processes and management decision​ making?

KMS

You are consulting for a beverage distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first​ step?

Perform a strategic systems analysis

​________ can be induced by tens of thousands of repetitions under lowdash-impact loads.

RSI

​________ are not held liable for the messages they transmit.

Regulated common carriers

Enabling management to make better decisions regarding organizing and scheduling​ sourcing, production, and distribution is a central feature of

SCMs.

The use of information systems because of necessity describes the business objective of

Survival.

(T/F) A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.

True

(T/F) All organizations have​ bedrock, unassailable assumptions that define their goals and products.

True

(T/F) Computers are the only part of an information system.

True

(T/F) Decisiondash-support systems use internal information as well as information from external sources.

True

(T/F) Developing a new​ product, fulfilling an​ order, and hiring a new employee are examples of business processes.

True

(T/F) ESSs draw summarized information from internal MIS and DSS.

True

(T/F) From the point of view of​ economics, information systems technology can be viewed as a factor of production that can be substituted for traditional capital and labor.

True

(T/F) Functional systems that support business processes within a single functional​ group, such as human​ resources, are being phased out in favor of crossdash-functional systems.

True

(T/F) In order to understand how a specific business firm uses information​ systems, you need to know something about the hierarchy and culture of the company.

True

(T/F) In the value chain​ model, primary activities are most directly related to the production and distribution of the​ firm's products and services that create value for the customer.

True

(T/F) Research has shown that only​ 25% of firms are able to align their information technology with their business goals.

True

(T/F) Supply chain management systems are more externally oriented than enterprise syestems.

True

(T/F) Synchronous collaboration tools allow global firms to collaborate from different locations at the same time.

True

(T/F) The most common type of computer-related RSI is CTS

True

(T/F) The value chain model classifies all company activities as either primary or support.

True

Which two of the following issues are privacy advocates and advertising industry most in conflict​ over? (Select two of the​ following.)

a national Dodash-Notdash-Track list Your answer is correct. an optdash-in policy required at all sites

All of the following are major features of organizations that impact the use of information systems except for

agency costs.

Advertisers use ___________ targeting in order to display more relevant ads based on​ user's search and browsing history.

behavioral

The most successful solutions or methods for achieving a business objective are called

best practices

The enormous volume of data generated by internet activity, such as Web traffic and e-mail, is referred to as

big data

The​ "do anything​ anywhere" computing environment can

blur the traditional boundaries between work and family time

A(n)____________ is a set of logically related activities for accomplishing a specific business result.

business process

How are information systems used at the industry level to achieve strategic​ advantage?

by building industrydash-​wide, ITdash-supported consortia and symposia

Dell​ Computer's use of information systems to improve efficiency and implement​ "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business​ objective?

competitive advantage

The​ ________ model is used to describe the interaction of external forces that affect an​ organization's strategy and ability to compete.

competitive forces

The fundamental set of​ assumptions, values, and ways of doing things that has been accepted by most of a​ company's members is called its

culture.

As discussed in the chapter opening​ case, which of the four generic strategies did Sears employ to combat the competition offered by​ Target, Walmart, and​ Macy's?

customer and supplier intimacy

An ESS commonly uses​ a(n) ________________ to display an array of charts and graphs of a​ business's key performance indicators.

digital dashboard

The four major enterprise applications are

enterprise​ systems, SCMs,​ CRMs, and KMSs.

Which of the following is not one of the competitive​ forces?

external environment

The value chain model

helps a firm identify points at which information technology can most effectively enhance its competitive position.

Psychologists study information systems with an eye to understanding

how human decision makers perceive and use formal information.

Sociologists study information systems with an eye to understanding

how systems affect​ individuals, groups, and organizations.

Immanuel​ Kant's Categorical Imperative states that

if an action is not right for everyone to​ take, it is not right for anyone to take.

The practice of spamming has been growing because

it is so inexpensive and can reach so many people

refers to the existence of laws that permit individuals to recover damages done to them by other​ actors, systems, or organizations.

liability

According to the​ ________ definition of​ organizations, an organization is seen as a means by which primary production factors are transformed into outputs consumed by the environment.

microeconomic

FIP principles are based on the notion of the

mutuality of interest between the record holder and the individual

Disciplines that contribute to the technical approach to information systems are

operations​ research, management​ science, and computer science.

The 2012 FTC report on industrydash-best practices for protecting​ individuals' privacy focused on each of the following topics except

phasing out of selfdash-regulatory codes.

Mintzberg's classification of organizational structure categorizes the knowledgedash-based organization where goods and services depend on the expertise and knowledge of professionals as​ a(n)

professional bureaucracy

In the information​ age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of

property rights and obligations

In the information​ age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

quality of life.

Which of the following is not one of the four main classifications for collaboration tools identified by the​ space/time matrix?

remote/colocated

The Do-Not-Track Act of 2011

requires firms to notify customers that they are being tracked.

The introduction of new information technology has a

ripple effect raising new​ ethical, social, and political issues.

A substitute product of most concern for a cable TV distributor is

satellite TV.

Network economics

sees the cost of adding new members as inconsequential.

An example of a social complementary asset is

technology and service firms in adjacent markets.

Edash-government refers to the application of​ ________ to digitally enable government and public sector​ agencies' relationships with​ citizens, businesses, and other arms of government.

the Internet and networking technologies

An example of a business using information systems for customer and supplier intimacy is

the Mandarin Oriental​ hotel's customerdash-preference tracking system.

From a business​ perspective, raw data is transformed systematically during various​ stages, transforming it into valuable​ information, in a process called

the information value chain.

The more any given resource is applied to​ production, the lower the marginal gain in​ output, until a point is reached where the additional inputs produce no additional output. This is referred to as

the law of diminishing returns

Which of the following constitutes an organizational element in the UPS tracking system described in the​ chapter?

the specification of procedures for identifying packages with sender and recipient information


Related study sets

Exam Fundamentals VS/Assessment what I remember is on the test and most likely the right answers

View Set

How are you/ Ako sa máš/ máte?

View Set

ATI-Pharmacology Made Easy: The Reproductive and Genitourinary System

View Set

Spanish Alive Pobre Lucía ¿Cierto/Falso?

View Set