MIS FINAL
Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product (A) procurement (B) operations (C) inbound logistics (D) outbound logistics
(C) inbound logistics
A service company checks the availability of resources before planning its projects. This activity can be classified under ________ (A) marketing (B) procurement (C) linkages (D) customer service
(C) linkages
A business selects a differentiation strategy would invariably structure itself around low-cost activities (T) True (F) False
(F) False
terabyte
1,024 gigbyte
Lists involve data with multiple themes
A database is used instead of a spreadsheet when ________.
A form of asynchronous communication in which participants send comments and attachments electronically. As a form of group communication, it can be disorganized, disconnected, and easy to hide from.
Wiki
A knowledge base maintained by its users; processed on Web sites that allow users to add, remove, and edit content.
Intranet
A private internet used exclusively within an organization
A thin-client application is designed to run within a program such as ________.
FireFox
Which of the following memory devices is volatile in nature?
cache
The ________ is sometimes called "the brain" of the computer.
central processing unit
Which of the following would be the most disruptive to an organization when implementing an information system?
changing reporting relationships
Which of the following is a characteristic of volatile memory?
contents are lost when power is off
All of the following are examples of support activities except ________.
contract negotiation
The process of automation is a process of moving work from ________.
human side to computer side
A(n) ________ contains the URL of the Web page to find when a user clicks on it.
hyperlink
Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
inbound logistics
The sales process includes all of the following except ________.
inbound logistics
Porter's five forces model is used to assess ____________________.
industry structure
The responsibilities of a computer technician include ________.
installing software and repairing networks
Which of the following is a function of the technology office in an organization's IS department?
investigating new IS technologies
Database administration
involves a wide variety of activities such as providing database security.
A ________ is equivalent to 1,024 bytes.
kilobyte
Value
the amount of money that a customer is willing to pay for a resource, product, or service
storage hardware
saves data and programs
In which value chain activity does a drone company acquire the parts and materials needed to manufacture the drones (A) inbound logistics (B) customer service (C) sales and marketing (D) outbound logistics
(A) inbound logistics
In an E-R diagram, a line between two entities represents a(n) ________. A) attribute B) identifier C) cardinality D) relationship
d
Metadata
data that describes data
Which of the following principles of competitive advantage is associated with product implementations?
differentiating service offerings
in business process management (BPM), an as-in model ________________.
documents the existing business process
A ________ is a worldwide-unique name that is affiliated with a public IP address.
domain name
how does it create a competitive advantage
enhance existing products differentiates products locks in customers raises barriers to market entry increase profit margins
Identify the principle of competitive advantage that is associated with product implementations.
enhance services
Horizontal-market applications are developed for specific, unique needs of an industry.
false
Project
A dynamic application of people and other resources for the creation of a product pr the achievement of some aim. Projects normally have a limited duration-- they start and are completed.
Foreign Key
A field in a database table that contains values of a primary key field of another table in order to link the two tables is a(n) __________.
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?
A firm that sells the only drug for a disease
Discussion forum
A form of asynchronous communication in which one group member posts an entry and other group members respond. A better form of group communication than email, because it is more difficult for the discussion to go off track.
Team survey
A form of asynchronous communication in which one team member creates a list of questions and other team members respond. Microsoft SharePoint has built-in survey capability.
File transfer protocol (FTP)
A layer-5 protocol used to copy files from one computer to another. In inter-organizational transaction processing, it enables users to exchange large files easily.
Virtual meeting
A meeting which participants do not meet in the same place and possibly not at the same time.
Packet
A message that moves across the Internet
Problem
A perceived difference between what is and what out to be.
Workflow
A process or procedure by which content is created, edited, used, and disposed.
Protocol
A set of rules and data structures for organizing communication
Bring your own device policy (BYOD)
A statement concerning employee's permissions and responsibilities when they use their own device
A database
A structured, self-describing collection of logically related data, managed as a single unit is __________.
Conference call
A synchronous virtual meeting in which participants meet at the same time via a voice-communication channel.
Multiparty text chat
A synchronous virtual meeting, in which participants meet at the same time and communicate by typing comments over a communication network.
Voice over IP (VoIP)
A technology that provides telephone communication over the Internet.
Structured decision
A type of decision for which there id a formalized and accepted method for making the decision.
Unstructured decision
A type of decision for which there is no agreed-on decision-making method.
Microsoft SharePoint
A version-control application that includes many collaboration features and functions, including document check-in/checkout, surveys, discussion forums, and workflow.
Google Docs & Spreadsheets
A version-management system for sharing documents and spreadsheet data. Documents are stored on a Google server, from which users can access and simultaneously see and edit the document.
Sequential workflow
A workflow in which activities occur in sequence.
Parallel workflow
A workflow in which activities occur simultaneously.
SharePoint site
A workflow site, created in Microsoft's collaboration tool SharePoint, that enables team members to define workflows for their group. The software that runs the site will send emails to team members requesting reviews, create task lists defined for the workflow, check documents in, mark tasks as complete, email the next person in the workflow, and email copies of all correspondence to the workflow leader, who can use this capability to ensure that all teammates perform the work they are requested to do.
Domain Name
A worldwide-unique name that is affiliated with a public IP address
database management system
A(n) ________ is a program used to create, process, and administer a database.
Business Process
A(n) ________ is a recurring, stable system of activities that generate value by transforming inputs into outputs.
Application
A(n) __________ is a computer program designed to support a specific task or business process.
Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets?
ARM
Procedure
According to the five-component model of information systems, the ________ component provides instructions for the people who use information systems.
What are necessary data characteristics?
Accurate, Timely, Relevant, Just Sufficient, Worth Its Cost
________ is a form of outsourcing.
Acquiring licensed software
Net neutrality principle
All data is created equally - carriers should not be able to decide which sites load quickly, which apps are allowed on a network, and which content is acceptable
Which of the following is an example of IaaS?
Amazon EC2
Porter defined value as the ________.
Amount of money that a customer is willing to pay for an offering
Commerce server
An application program that runs on a server-tier computer
Transaction processing system (TPS)
An information system that supports operational decision making.
Structured
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.
Which of the following is a mobile operating system licensed by Google?
Android
Which of the following mobile operating systems is licensed by Google?
Android
Bluetooth
Another common wireless protocol. Designed for transmitting data over short distances, replacing cables.
The top layer of TCP/IP Protocol architecture is related to ________.
Applications
Client application programs
Applications that are processed on client computers
server application programs
Applications that are processed on server computers
Data, information, knowledge
As a manager in your company, you expect to retrieve __________ from operational systems and present it as __________ to your boss, who will act based on his __________.
Instance
As an individual student in your university's student database, you are a(n) __________ of the STUDENT entity.
Customer Service
Assisting customers' use of the products and thus maintaining and enhancing the products' value
Do not meet at the same time
Asynchronous communication occurs when team members ________.
Many to many
At your university, students can take more than one class, and each class can have more than one student. This is an example of __________ relationship.
In the context of Porter's five forces model, the bargaining power of suppliers is a weak force when considering the example of auto dealers setting the price of new cars. T/F
False
Which of the following is an advantage to an organization if its BYOD policy offers wireless network to mobile devices?
The organization can sniff employees' mobile traffic.
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage?
The policy appears to be permissive without actually being so.
Determining the best mix of products that a company should sell is an example of an unstructured decision True False
True
Each activity in a business process is a business function that receives inputs and produces outputs. T/F
True
Feedback and iteration enable a group to produce something greater than any single person could accomplish by working independently True False
True
Good information is conceived from accurate, correct, and complete data. T/F
True
In the context of Porter's five forces model, the bargaining power of grain farmers in a surplus year is an example of a weak market force. T/F
True
In the five-component model of an information system, data is the bridge between the computer and the human sides. T/F
True
Information systems become a waste of time and money when users work with inaccurate data. T/F
True
Information systems differ in the amount of work that is moved from the human side to the computer side. T/F
True
One of the advantages of a team survey is that it is easy to determine who has not yet responded. True False
True
Operational decisions are those that support day-to-day activities. True False
True
Ordering additional hardware creates the least amount of organizational disruption compared to changes in the other four components of an information system. T/F
True
Project data is data that is part of the collaboration's work product. True False
True
Project scope and initial budget are set during the starting phase of a project. True False
True
Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another? A) USB flash drive B) projector C) mouse D) barcode scanner
a
Which of the following statements correctly describes the relationship between drones and videos in Falcon Security's database? A) A drone takes many videos; a video is taken by one and only one drone. B) A video is taken by many drones; a drone takes many videos. C) A video is taken by one and only one drone; a drone takes one and only one video. D) A drone takes one and only one video; a video is taken by many drones.
a
What affects threat of substitutes?
availability of substitute, substitute performance, cost of substitute, switching costs
The term "open source" means that the source code of the program is ________.
available to the public
A ________ is equivalent to 1,024 bytes. A) gigabyte B) kilobyte C) terabyte D) megabyte
b
A data integrity problem will occur only if ________. A) a database has multiple administrators B) data are duplicated in a database C) the database is very complex D) there are complex relationships between entities in a database
b
A group of similar rows or records is known as ________. A) a prototype B) a file C) a field D) an attribute
b
Which of the following is used to process and display browser database application forms, reports, and queries? A) C++ B) html C) COBOL D) VisualBasic
b
Which of the following memory devices is volatile in nature? A) magnetic disk B) cache memory C) erasable programmable read only memory (EPROM) D) optical disk
b
In organizations that operate significant nonaccounting information systems, the chief information officer is most likely to report to the ________.
chief executive officer
The ________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problem solutions, proposals, and new initiatives.
chief information officer
The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.
chief technology officer
personal computers (PCs)
classic computing devises used by individuals
When presenting an idea to his colleagues, Marcus failed to consider others' views and got defensive when people asked him questions. This situation indicates that Marcus lacks ________ skills.
collaboration
________ is the activity of two or more people working together to achieve a common goal, result, or work product.
collaboration
kilobyte
collection of 1,024 bytes
Database application
collection of forms, reports, queries, and application programs that serves as an intermediary between users users and database data.
repository
collection of something====database is repository of data
server farm
collection of typically thousand of servers
five-component framework
computer hardware, software, data, procedures, and people
server
computer that is designed to support processing request from many remote computers and users
Which of the following is NOT a function of the information systems department?
conducting external audits
Procurement
consists of processes of finding vendors, setting up contractual arrangements, and negotiating prices.
Support activities
contribute indirectly to the production, sale, and service of the product. Including the procurement.
Digital Revolution
conversion from mechanical and analog devices to digital devices. (monumental changes for society)
Cost
cost of business process is the cost of the inputs plus the cost of the activities. The margin of the business process is the value of the outputs minus the cost.
COST of a business process =
cost of inputs + cost of activities
The cost of the business process is the sum of the cost of the inputs and the ________.
cost of the activities
cost
cost of the inputs plus outputs plus cost of activities
which are the dimension of feasibility?
cost, schedule, technical, and organizational feasibility
product implementations
create a new product/service enhance products/services differentiate products/services
Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value?
customer service
International outsourcing companies like Amazon.com are particularly advantageous as they provide ________.
customer support
) A client-server application that requires nothing more than a browser is called ________. A) a native application B) adware C) firmware D) a thin-client application
d
A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access. A) PC B) mainframe computer C) server D) mobile device
d
A ________ is also called "the brain" of the computer. A) network card B) motherboard C) thumb drive D) central processing unit
d
Adobe's Acrobat, Photoshop, and PageMaker are examples of ________. A) vertical-market application software B) operating systems C) firmware D) horizontal-market application software
d
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, productivity of an employee on daily basis, and employee name. These aspects that Brad wants to track are called ________. A) identifiers B) records C) primary keys D) entities
d
Dynamic processes
flexible, informal, and adaptive pressures that normally involve strategic and less structured material decisions and activities.
Which of the following is generally a responsibility of users of information systems?
following security and backup procedures
Structured processes
formally defined, standardized process, that involve day-to-day operations.
Which of the following is not part of Porter's definition of human resource management?
general management
Which of the following is the most important trait that an effective collaborator should have? avoiding unpopular ideas persuasive presentation skills giving and receiving critical feedback previous experience as a collaborator ability to resolve conflict
giving and receiving critical feedback
Which of the following is a benefit of in-house hosting?
greater visibility of security and disaster preparedness
System
group of components that interact to achieve some purpose
The storage disk in your computer is an example of the ________ component of information systems.
hardware
Which of the following components in the five-component model of information systems is considered an actor?
hardware
Which of the following components of an information system is the easiest to change and causes the least amount of organizational disruption when changed?
hardware
Which of the following components constitute the computer side of information systems?
hardware and software
true
hardware consists of electronic components that are used to input, process, output and store data.
The speed of a CPU is expressed in cycles called ________.
hertz
Dynotrix Motors is a large car-manufacturing company. The company purchases raw material from many small-sized sellers across the globe. In this case, Dynotrix Motors is characterized by ________.
high bargaining power over its suppliers
The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter's five forces model, this statement illustrates ________.
high levels of rivalry
false
horizontal- market applications are developed for specific, unique needs of an industry.
A spreadsheet program is an example of ________.
horizontal-market application software
Adobe's Acrobat, Photoshop, and PageMaker are examples of ________.
horizontal-market application software
The attribute for a hyperlink is ________, whose value indicates which Web page is to be displayed when a user clicks on a link.
href
Which of the following protocols guarantees secure data transmission?
https
true
if an organization's BYOD policy dictates that the employee is responsible for damage, the advantage to the organization is that it appears to be permissive without actually being so.
true
in a close source project, such as Adobe Photoshop, the source code is highly protected and only available to trusted employees and carefully vetted contractors.
false
in the context of user interfaces, using content to drive application behavior is called indirect interactions.
As production manager at a bottling plant for a cola manufacturer, you receive reports containing figures for raw materials from last year, but stated as the current year's. This information would qualify as bad information because it is ________.
inaccurate
Nielsen's Law
network connection speeds for high-end users will increase by 50 percent per year. As networks become faster, new companies, new products, and new platforms will emerge.
Business process
network of activities that generate value by transforming inputs and outputs.
business process
network of activities, resources, facilities, and information that interact to achieve some business function, sometimes called a business system
value chain
network of value crating activities
Value chain
network of value creating activities consisting of five primary activities and four support activities.
Value Chain
network of value-creating activities. Consists of primary activities and support activities.
Which of the following is a characteristic of cloud-based hosting?
no obsolescence
According to Moore's law, the ________.
number of transistors per square inch on an integrated chip doubles every 18 months
tue
numerous vendors license products called mobile device management (MDM) software to backup and restore mobile devices.
Java, C# and VB.Net are examples of ________.
object-oriented languages
true
object-oriented languages can only be used by professional programmers who have devoted years to learning object- oriented design and coding skills.
false
object-oriented languages cannot be used to create difficult and complex applications
Virtualization is the process by which ________.
one computer hosts the appearance of many computers
Virtualization is the process by which ________.
one physical computer hosts many different virtual computers within it
I:N
one to many relationships
Linux is an example of a(n) ________.
open source operating system
Linux is an example of a(n) ________.
open source operating system software
In the IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
operations
Which of the following devices is an example of a storage hardware device?
optical disk
Which of the following is a nonvolatile memory device?
optical disk
Which of the following is an example of nonvolatile memory?
optical disk
Every information systems (IS) user has the right to a secure computing environment. This means that the ________.
organization should protect his/her computer and its files
In cloud computing, resources are said to be "pooled" because ________.
organizations share the same physical hardware through virtualization
Which of the following statements is consistent with the central idea of business process design?
organizations should create new business processes instead of improving existing systems.
Every information system user has the right to a secure computing environment. this means that _________.
organizations should protect his/her computer and its files
Which of the following principles of competitive advantage is related to process implementations? enhance services raise the barriers to market entry create new products differentiate services
raise the barriers to market entry
Which of the following principles of competitive advantage is related to process implementations?
raising the barriers to market entry
Main memory is also known as ________.
random access memory
true
random access memory is volatile.
Which of the following is a primary activity in the value chain?
receiving and handling of raw materials and other inputs
Which of the following is a right of users of information systems?
receiving effective training according to their requirements
Which of the following best describes data?
recorded facts or figures
Which of the following is the best description of data?
recorded facts or figures
Which of the following principles of competitive advantage is related to process implementations?
reduce costs
Meredith constantly analyzes her work in terms of the individual contribution that she makes to the overall output of the organization. This shows her ________ skills.
systems thinking
You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill. A) collaborative
systems thinking
Which of the following is a nonroutine cognitive skill?
systems thinking ability
Business users who administer the development of information systems should ________.
take an active role in that system's development
A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
technical writer
Jamie's company manufactures 3D printers, and his job is to prepare user manuals for the products. Jamie also prepares training material for the workers who are involved in the manufacturing process. With reference to his job profile, Jamie is a ________.
technical writer
Source code is computer code ________.
that is written by humans
false
the CPU of a computing devices stores data and programs.
support activities
the activities that contribute indirectly to value creation: procurement, technology, human resources, firm's infrastructure
false
the cache and main memory are nonvolatile.
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?
the cloud
Which of the following factors determines the structure, features, and functions of an information system used in a company?
the competitive strategy
Information Silo
the condition that exists when data are isolated in separated information systems.
Margin
the difference between the value that an activity generates and the cost of the activity.
primary activities
the main activity -each stage accumulates costs and adds value to the product
true
the main memory of a computer is sometimes called random access memory.
true
the operating system creates and manages the user interface
As an IS user, you have a right to a secure computing environment. This means that ________.
the organization should protect your computer and its files
In-house hosting, delivered via Web service standards that can be configured dynamically, is referred to as ________.
the private cloud
Normalization
the process of converting a poorly structured table into two or more well structured tables.
Functional application
the program component of a functional system.
Which of the following is considered as information rather than mere data? a list of property prices in a neighborhood the price of a company's shares on a given day the total number of students in a school the return on investment of an advertising campaign
the return on investment of an advertising campaign
Which of the following is considered information rather than mere data?
the return on investment of an advertising campaign
competitive strategy
the strategy and organization chooses as the way it will succeed in its industry -4 fundamental strategies
false
the term "open sources" means that the source code of the program is not available to the public.
Managerial decisions are decisions about ________. the utilization of resources broad organizational issues the day-to-day activities strategic decision making the creation of strategic goals
the utilization of resources
Managerial decisions are decisions about ________. the utilization of resources broad organizational issues the day-to-day activities strategic decision making the creation of strategic goals
the utilization of resources
A client-server application that requires nothing more than a browser is called a(n) ________.
thin-client application
true
thin-client applications are developed by professional programmers and technically oriented Web developers and business professionals.
false
thin-client applications can seldom run within a computer browser.
According to Porter's five forces model, a frequent traveler's choice of auto rental would be an example of a strong force for ____________.
threat of substitutions
Which of the following refers to a small, portable storage device that can be used to back up data and to transfer it from one computer to another?
thumb drive
What affects threat of new entrants?
time and cost of entry, specialist knowledge economies of scale, barriers to entry (i.e. regulations)
which is true about outsourcing?
to achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff
why do info systems exist?
to help organizations achieve their strategies
The difference between the total value added and the total costs incurred is called the ________ of the value chain.
total margin
The difference between the total value added and the total costs incurred is called the _________ of the value chain.
total margin
Glazer & Hicks is a firm that offers enterprise software solutions to independent retailers. The firm recently bagged a contract from a major national retail chain to develop and implement a proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system?
training the employees to use and manage the new system
Which of the following statements best describes the role of operations in a value chain?
transforming inputs into the final products
A service company asks its customers to fill out application forms before offering service. This is an example of a supporting business process. t/f
true
Creating a new product to add value to customers is an example of using product implementations to achieve competitive advantage t/f
true
In the context of outsourcing, once a company has chosen a vendor, further risk management is up to that vendor.
true
One of the major functions of the information systems (IS) department is to develop, operate, and maintain applications.
true
T/F- installation of unauthorized hardware and programs may interfere with automated maintenance programs used for upgrading a users computer
true
The difference between the value that an activity generates and the cost of the activity is called 'margin'. t/f
true
The connection between a VPN client and a VPN server is called a(n) ________.
tunnel
lost-update problem
two people purchasing the same item at the same time.
The ________ tier of three-tier architecture consists of computers, phones, and other devices that have browsers that request and process Web pages.
user
Which of the following refers to the three tiers in the three-tier architecture?
user (client), server (application), and database (data)
Which of the following is the presentation format of an application?
user interface
Which of the following refers to the three tiers in the three-tier architecture?
user, server & database
What are the three tiers in three-tier architecture?
user, server, and database
Porter defined ________ as the amount of money that a customer is willing to pay for a resource, product, or service.
value
MARGIN of a business process =
value of all outputs - cost
Outsourcing gathers all of the possible risks into the risk of choosing the right ________.
vendor
When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________.
vendor
DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. DenTimes is an example of ________.
vertical-market application software
DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. This is an example of ________.
vertical-market application software
false
volatile memory devices can store data without using external power.
________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
web servers
Data integrity problems
when an organization has inconsistent duplicated data.
organizational feasibility concerns ___________
whether the new system fits within the organizations customers or legal requirements
false
windows operating system is used for macintosh clients.
true
with open sources, anyone can obtain the source code from the open source project's Web site.
Focused cost leadership is observed when a product has the lowest cost _________.
within an industry segment
Communication
A critical factor in collaboration, consisting of two key elements: the abilities of individuals to share in formation and receive feedback, and the availability of effective systems by which to share information.
Three-tier architecture
A design of user computers and servers that consist of 3 categories. 1) user tier 2) server tier 3) database tier
Nonvolatiles
The contents survive when the power is off
Which of the following memory devices is volatile in nature?
cache memory
what should an organization focus on being according to porters-4 compet strategies
can focus on being the cost leader or on differentiating its products or services from those of the competition
Machine code ________.
cannot be modified by humans
One of the reasons outsourcing is undertaken is to ________.
cap an organization's financial exposure
Which of the following would be the most disruptive to an organization when implementing an information system? changing reporting relationships developing new programs creating new databases installing new hardware components
changing reporting relationships
Material ordering is a part of ________.
Inbound logistics
Which of the following is true about a VPN?
It encrypts messages to ensure secure transmissions.
Which of the following is true about the "maintenance" of information systems?
It involves fixing problems or adapting existing systems to support new features.
The traditional process for developing information systems is ______.
The systems development life cycle (SDLC)
Which of the following would be a consequence of teleaction?
The value of robotics would increase.
Information
__________ is (are) data that have been processed to have meaning and value to a user.
Knowledge
__________ is (are) information in context that can be acted upon.
) In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________. A) data integrity problem B) crow's-foot paradigm C) adaptation conflict D) security problem
a
) The process by which a personal computer hosts several different operating systems is known as ________. A) PC virtualization B) parallel computing C) cloud computing D) normalization
a
Porter defined value as the ________.
amount of money that a customer is willing to pay for an offering.
true
an operating system controls a computer's resources
true
native applications are programs that are written to use a particular operating system
Which of the following is a characteristic of smart devices?
require microprocessors and new protocols
What is the acronym for range of Kilobytes to Petabytes
KMGTP King Megs get totally pumped
Forms
Katrina is a sales representative for an online retailer. She needs to update her customer list with new contact information for five customers. Which of the following elements will help Katrina modify her data?
Which of the following features distinguishes a LAN from a WAN?
LAN connects computers in a single location
High bargaining power over its suppliers
LNG is a large multinational appliance manufacturer. The company gets raw materials from many vendors. In this case, LNG is characterized by ________.
Raise barriers to market entry
Launch Cars, a car manufacturing company, has patented its breakthrough technology that reduces pollutant emissions by half. The company is now an active supporter of anti-pollution laws that are likely to diminish the profitability of many other auto makers. Launch Cars is attempting to ________.
SAF Inc. has a team of then information system personnel. the personnel are kept busy throughout the day as they help employees solve even the most trivial issues. In which ways can the employees assist the IS personnel in this scenario?
Learning basic computer skills
In the context of shared content with version control, shared documents are placed into shared directories called ________. Caches Tables Libraries Sessions Arrays
Libraries
According to Porter's model of business activities, interactions across value activities are called ________.
Linkages
_______ is a version of the operating system Unix that was developed by an open source community.
Linux
________ is a version of Unix that was developed by an open source community.
Linux
Which of the following principles of competitive advantage is related to process implementations?
Locking in buyers
FunText is a company that owns an app used for text messaging. It recently offered a membership extension of six months without any additional charges to its existing customers who had registered for a three-year membership. By doing this, which competitive strategy did FunText implement?
Locking in customers
International Zoological club publishes a monthly magazine for zoology enthusiasts. Members are required to pay an up-front fee to cover the first two years of the subscription when registering with International Zoological club. By doing this, which competitive strategy is International Zoological club implementing?
Locking in customers
Switching costs
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
Which of the following principles of competitive advantage is related to process implementations?
Locking in suppliers
Negatives of cloud computing
Loss of control
A new drug that has shown promise in curing skin cancer has been discovered by a famous chemical laboratory. This is the only known drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________.
Low threat of substitutions
________ is used to install and update software, back up and restore mobile devices, wipe employer software and data from devices, report usage, and provide other mobile device management data.
MDM software
Which of the following is the operating system designed by Apple?
Mac OS
Which of the following operating systems was designed by Apple?
Mac OS
false
Mac OS and iOS applications are constructed using Java
Which of the following is an example of storage hardware in computers?
Magnetic disk
________ is an example of storage hardware in computers.
Magnetic disk
Identify a primary purpose of collaboration. Eliminating individual tasks Making decisions Evaluating coworkers Performing routine tasks Personal improvement
Making decisions
Organizations can lock in suppliers by making it difficult to switch to another organization or by ________.
Making it easy to work with the organization
Identify a key difference between managerial decisions and operational decisions. Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities. Managerial decisions are corporate decisions, whereas operational decisions concern the utilization of resources. Managerial decisions deal with the allocation of resources, whereas operational decisions concern broad-scope, organizational issues. Operational decisions have broad scope, whereas the scope of managerial decisions is limited to day-to-day activities. Operational decisions have narrow scope, whereas the scope of managerial decisions is limited to day-to-day activities.
Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities.
Operational
Marci, a purchasing agent, orders 300 refrigerators per month from an online vendor portal. In doing so, she has made a(n) ________ decision.
The difference between the value that an activity generates and the cost of the activity is called the ________.
Margin
in the information system (IS) department, the ________ group managers the process of creating new information systems as well as maintaining existing information systems.
The development group
Margin
The difference between the value that an activity generates and the cost of the activity is called the ________.
The Cloud
The elastic leasing of pooled computer resources over the Internet
Internet of things (IoT)
The idea that objects are becoming connected to the internet so they can interact with other devises
Caroline asks her secretary to send information on the meetings that she needs to attend next month. Her secretary, Joanne, provides her with the details immediately, but leaves out certain additional details that are irrelevant to Caroline's requirements. Which of the following statements is true about this scenario?
The information that Joanne gave was accurate and sufficient for Caroline's purpose.
You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.
The information that your secretary gave will be considered as good information.
Moore's Law
The number of transistors per square inch on an integrated chip doubles every 18 months.
in an information systems department, the _______ group managers computing infrastructure, including individual computers, in-house server farms, networks, and communications me
The operations group
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy offers wireless network to mobile devices?
The organization can sniff employees' mobile traffic
A(n) ________ uses the Internet to create the appearance of private, secure connections.
VPN
________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity. Document monitoring Version control Document tracking Version management Document replication
Version control
Tunnel
Virtual private pathway over a public or shared network from the VPN client to VPN server
VPN
Virtual public network- uses public Internet to create appearance of a private connection on secure network
One physical computer hosts many different virtual computers within it
Virtualization is the process by which ________.
Computers that reside in different geographic locations are connected using a (an) ________.
WAN
Computers that reside in different geographic locations are connected using a(n) ________.
WAN
For a printer or laptop to connect to a wireless LAN, it must have a(n) ________.
WNIC
Cost leadership
Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which competitive strategy.
________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
Web servers
________ is a popular commercial webinar product used in virtual sales presentations SurveyMonkey MS Office Web WebEx Skype Aspen
WebEx
The competitive strategy
Which of the following factors determines the structure, features, and functions of an information system used in a company?
Internet of Things
Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device?
Require microprocessors and new protocols
Which of the following is a characteristic of smart devices?
IEEE 802.11 protocol
Wireless LAN connections use
Focused cost leadership is observed when a product has the lowest cost ________.
Within an industry segment
Collaboration is defined as a group of people ________. Coming together to perform tasks that are different Working together to achieve a common goal Performing independent tasks that are important Working without having to critically analyze each other's work Reconciling differences in communication styles
Working together to achieve a common goal
________ is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.
XML
Identify how information technology differs from information systems.
You can buy information technology, but not information systems.
Information System
__________ collects, processes, stores, analyzes, and disseminates information for a specific purpose.
10 TB is equivalent to ________ gigabytes. A) 10,240 B) 1,000 C) 1,024 D) 102.4
a
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A) database application B) database design C) data field D) data model
a
A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans. A) system analyst B) business analyst C) user support representative D) network administrator
a
A data model is a ________. A) logical representation of database data B) repository of unprocessed data C) collection of isolated databases D) set of programs used to retrieve data
a
A(n) ________ is a group of senior managers from the major business functions that works with the chief information officer (CIO) to set the information systems (IS) priorities and decide among major IS projects and alternatives. A) steering committee B) discussion forum C) IS department D) directors committee
a
Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. The "Employee Number" column is referred to as a ________. A) primary key B) key attribute C) foreign key D) functionally dependent record
a
Charles and Irene are editors at a content development firm. Both of them, unknowingly, are working on the same copy of the annual report. Irene finishes editing the report and saves her copy; Charles saves his report an hour after Irene. Charles's report overwrites Irene's, and her changes are lost. This scenario is an example of the ________. A) lost-update problem B) crow's-foot paradigm C) bullwhip effect D) update query problem
a
Every information systems (IS) user has the right to a secure computing environment. This means that the ________. A) organization should protect his/her computer and its files B) user should solely be in charge of protecting the organization's computers and files C) user should inform the IS about software upgrades D) user will never face a network problem
a
Identify an open source DBMS product. A) MySQL B) DB2 C) Access D) Oracle Database
a
In an information systems (IS) department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media. A) operations B) technology C) development D) maintenance
a
Linux is an example of a(n) ________. A) open source operating system B) mobile operating system C) user community D) workstation client
a
Mac OS and iOS applications are constructed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET
a
value
as the amount of money that a customer is willing to pay for a resource, product, or service
(IS) Information system
assembly of hardware, software data, procedures, and people that produces information.
10/100/1000 Ethernet
Most personal computers support
Operating system
The main system control program is the __________.
Business Process
a network of activities that generate value by transforming inputs into outputs.
Abstract Reasoning
ability to make and manipulate models
System Thinking
ability to model components of the system to connect the inputs and outputs among those components into a sensible whole
Kerin is a business student interning at Benson and Hodgson, a firm specializing in exports of sophisticated equipment to other countries. She finds that she is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that she lacks ________ skills.
abstract reasoning
Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch?
access point
Which of the following types of skills is most likely be outsourced to the lowest bidder?
accounting skills
Which of the following types of skills is most likely to be outsourced to the lowest bidder?
accounting skills
Collaboration
activity of two more people working together to achieve a common goal, result, or work product.
A(n) ________ is a number that identifies a particular device.
IP address
The IEEE 802.3 protocol standard is also known as ________.
Ethernet
Thin-client applications are developed using ________.
HTML5
Inbound Logistics
Receiving, send and disseminating inputs to the products
Which of the following is the smallest element in a database? A) field B) record C) byte D) metadata
c
T/F- the actors or participants in a business process are the users of information systems
true
what 5 forces determine industry structure?
"BTBTR" Bargaining power of customers threat of substitutions bargaining power of suppliers threat of new entrants rivalry
What affects competitive rivalry?
# of competitors, quality differences, switching costs, customer loyalty
What affects bargaining power?
# of customers, size of each order, cost of changing, differences between competitors
What affects supplier power?
# of suppliers, size of suppliers, uniqueness of service, cost of changing
Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device (A) Internet of Things (IoT) (B) 3D printing (C) self-driving cars (D) automated guided vehicles
(A) Internet of Things (IoT)
Which of the following is an example of a value chain linkage (A) a manufacturing information system used to reduce inventory costs (B) a sales system used to place product orders (C) a system that supports customer service efforts (D) none of the above
(A) a manufacturing information system used to reduce inventory costs
Which of the following attempts to decrease a customer's buyer power (A) loyalty program offering rewards for shopping (B) having many options to choose from when buying a product or service (C) a patent expires on a pharmaceutical, allowing generics to enter the market (D) none. all of these increase buyer power
(A) loyalty program offering rewards for shopping
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers (A) outbound logistics (B) operations/manufacturing (C) sales and marketing (D) customer service
(A) outbound logistics
Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device (A) 3D printing (B) Internet of Things (IoT) (C) self-driving cars (D) automated guided vehicles
(B) Internet of Things (IoT)
Is the threat of new entrants strong or weak for Amazon (A) Strong (B) Weak
(B) Weak
An organization implements an information system to optimize its supply chain. The system helps the organization to reduce wastes. In this scenario, implementing the information system has helped the organization to gain a competitive advantage by ________ (A) locking in customers (B) reducing costs (C) locking in suppliers (D) differentiating the products
(B) reducing costs
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________ (A) entry barriers (B) switching costs (C) product standards (D) value differentiation
(B) switching costs
If you were an ALDI District Manager tasked to make sure the pricing of milk in your stores is competitive with the price of milk in other local stores, which data would you consider good data for your purpose (A) ALDI milk supplier's price proposals (B) the price of milk sold by five local ALDI competitors (C) the top three grocer's national milk prices (D) the average milk prices for the previous year for each week
(B) the price of milk sold by five local ALDI competitors
What is the relationship between Margin, Value, and Cost in a Value Chain (A) Margin = Value + Cost (B) Margin = Value x Cost (C) Margin = Value - Cost (D) Value = Margin - Cost
(C) Margin = Value - Cost
The difference between the value that an activity generates and the cost of the activity is called the ___________ (A) turnover (B) revenue (C) margin (D) value-addition
(C) margin
Which of the following statements is true about self-driving cars (A) increased fuel consumption (B) expensive and complex (C) reduced car insurance cost (D) cause fewer accidents
(C) reduced car insurance cost AND (D) cause fewer accidents
What is information (A) processed Data (B) data presented in a meaningful context (C) data processed by summing, ordering, averaging, grouping, comparing, or other similar operations. (D) all of these
(D) all of these
In order for any organization to consider data "timely" it must be in real-time (up to the second) (T) True (F) False
(F) False
ISP
(Internet service provider) -What your actually connecting to when you connect to the Internet - 3 important function 1) Provides you with a legitimate Internet address 2) Serves as gateway to Internet 3) Pays for the Internet
LAN
(Local Area Network) - connects computers that reside in a single geographic location on the premises of the company that operates the LAN. Two to several hundred computers
A 3D home printer would create more stable structures, use less material, and reduce workplace injuries (T) True (F) False
(T) True
A business with a differentiation strategy will add cost to an activity only as long as the activity has a positive margin (T) True (F) False
(T) True
WAN
(Wide Area Network) - connects computers at different geographic locations. Ex: Computers for a college of business located on multiple campuses
Hypertext Transfer Protocol
(http)- protocol used between browsers and web servers
Pooled
-A group of servers -Cloud resources are pooled because many different organizations use the same physical hardware; they share that hardware through virtualization. -Cloud vendors benefit from economies of scale - average cost of production decreases as size of operation increases -Major cloud vendors operate enormous data centers (server farms)
Public IP addresses & domain names
-IPv4 (32 bit)- 4 decimal notation -IPv6- Eight hexadecimal dotted notation
Private IP Address
-Identifies a device on a private network, usually a LAN -Assignment controlled within LAN
Public IP address
-Identifies a particular device on public Internet -Assigned by ICANN (internet Corporation for Assigned Names and Numbers) -U.S. Department of Commerce no longer has oversight over ICANN
megabyte
1,024 kilobytes
gigabyte
1,024 megabytes
petabyte
1,024 terabytes
4 parts of machine cycle
1. Fetch 2. Decode 3. Execute 4. Store
Collaboration tools that provide workflow control manager the activities in a process pre-defined by the group True False
True
10 TB is equivalent to ________ gigabytes
10,240
10 TB is equivalent to ________ gigabytes.
10,240
Focused cost leadership is observed when a product has the lowest cost ________. A) within an industry segment B) within the product range offered by a company C) within an industry D) within the supply chain of a company
A
Individuals who edit large pictures, sound, or video files need a ________ processor to effectively use more than 4 GB of main memory.
64-bit
) Which of the following statements is true of business process designs? A) Most process designs require people to work in new ways. B) Business process designs do not involve change in procedures. C) Business process designs should be accompanied by a change in management. D) Process designs attract very little employee resistance.
A
A database is an example of a(n) ________. A) repository B) software C) linkage D) value chain
A
A group of grain farmers in a surplus year will have reduced ________. A) bargaining power B) threat of substitutes C) risk of rivalry D) threat of new entrants
A
A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. Identify the strategy used here. A) switching costs strategy B) low cost operation strategy C) differentiation strategy D) consumerist strategy
A
A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________. A) low threat of substitutions B) high bargaining power of customers C) high threat of new entrants D) low bargaining power of suppliers
A
A(n) ________ is a network of activities that generate value by transforming inputs into outputs. A) business process B) competitive strategy C) linkage D) information system
A
An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help them do that? A) establishing alliances B) creating new products C) enhancing products D) differentiating services
A
Focused differentiation occurs when ________. A) a better product is provided within an industry segment B) there is limited competition in an industry C) the customers are highly price sensitive D) product quality improves across an entire industry
A
Identify the activity in the value chain that involves receiving, storing, and disseminating inputs to the product. A) inbound logistics B) procurement C) operations D) outbound logistics
A
In which of the following situations would the bargaining power of suppliers be highest? A) a single vendor providing raw materials to many department stores B) a fashion outlet catering to a niche market C) a bank liquidating during a fire sale D) a large retailer buying goods from many small suppliers
A
In which of the following would rivalry be considered as a weak force affecting the market? A) military services B) used car dealers C) book sellers D) packaged food manufacturers
A
Mae manages delivery at a custom-kitchen outlet. Working with her customer's specifications, she contacts Gem Cabinets and places an order for a full-motion wall mount. Which of the following primary activities is Mae performing here? A) inbound logistics B) operations C) customer service D) marketing
A
Porter defined value as the ________. A) amount of money that a customer is willing to pay for an offering B) extent of after-sale service provided to customers C) perceived satisfaction of the customers and sellers after a transaction D) actual money exchanged in return of a product/service
A
Porter's five forces model is used to assess ________. A) industry structure B) market share C) internal competition D) lifecycles of products
A
RedDart is a premium freight provider in the United States. The company offers premium shipment services to its customers. The company ships faster than its competitors and uses tamperproof containers to ship its products. RedDart company distinguishes itself from competitors by ________. A) providing an enhanced product B) locking in its suppliers C) locking in its customers D) offering low-cost operations and services
A
Synapz, a manufacturer of office automation products, recently received a patent for an advanced therapeutic ergonomics technology. By doing this, Synapz has ________. A) created entry barriers B) introduced product differentiation C) locked in its suppliers D) reduced the cost of operations
A
The cost of the business process is the sum of the cost of the inputs and the ________. A) cost of the activities B) cost of the outputs C) value of the outputs D) value of the product/service
A
The difference between the value that an activity generates and the cost of the activity is called the ________. A) margin B) turnover C) revenue D) value-addition
A
Which of the following factors determines the structure, features, and functions of the information system used in a company? A) the competitive strategy B) the brand value of its brands C) the size of the company D) the technology used by competitors
A
Which of the following is a primary activity in the value chain? A) receiving and disseminating inputs to the product B) negotiating prices with vendors C) finding suitable vendors to supply raw materials D) setting up contractual arrangements with various suppliers
A
Which of the following value chain activities involves transforming raw materials into a finished product or service? A) operations B) inbound logistics C) marketing D) maintenance
A
false
A CPU is an example of an input device.
According to Porter's five forces model, in which of the following situations would a supplier have the highest bargaining power?
A Houston-based vendor is the only supplier of a patented material for many smartphone manufacturers
database application
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.
Focused differentiation occurs when _______.
A better product is provided within an industry segment
Microsoft Office Groove
A collaboration product that includes version management and other useful tools. Users can access and edit documents at a workspace; the software automatically propagates changes made by one user to other users' computers.
Computer Network
A collection of computers that communicate with one another over transmission lines or wirelessly
Unstructured
A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making.
) N-joi Ice Cream was facing competition to their flagship brand of "black currant ice cream". The competitor began offering three varieties of "black currant ice cream." N-joi decided to counter the threat by introducing five new varieties of ice creams. Which competitive strategy is N-joi implementing? A) cost leadership B) product differentiation C) cost differentiation in the segment D) service focus
B
A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________. A) outbound logistics B) inbound logistics C) operations D) internal marketing
B
ABC Motors is the largest manufacturer of cars. The company purchases raw materials from many small-sized sellers across the globe. In this case, ABC Motors ________. A) faces very low threat of substitute products B) has high bargaining power over its suppliers C) faces very low threat of new entrants to market D) has very high bargaining power over its customers
B
An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________. A) focused cost-leadership B) industry-wide differentiation C) industry-wide cost leadership D) focused differentiation
B
An organization implements an information system to optimize its supply chain. The system helps the organization reduce wastages and inventory charges. Hence, the system provides a competitive advantage to the organization. Here, the information system helped the organization achieve competitive advantage by ________. A) locking in customers B) reducing costs C) locking in suppliers D) differentiating the products
B
Bargaining power of customers is likely to be the highest for markets involving ________. A) public transportation B) industrial products C) patented drugs D) luxury goods
B
Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing? A) creation of entry barriers B) product differentiation C) reduction of cost D) locking in of suppliers
B
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________. A) entry barriers B) switching costs C) product standards D) value differentiation
B
The net result of the difference between the total value added and the total costs incurred is the ________ of the value chain. A) actual value B) total margin C) gross revenue D) gross turnover
B
Which of the following principles of competitive advantage is associated with product implementations? A) locking in customers B) differentiating service offerings C) locking in suppliers D) establishing alliances
B
Which of the following value chain activities involves assisting users to handle the product after sale, thus maintaining and enhancing the product's value? A) inbound logistics B) customer service C) operations D) outbound logistics
B
Porter's Five Forces Model
Bargaining Power of Customers, Threat of substitutions, Bargaining Power of Suppliers, Threat of New Entrants, Rivalry.
According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________.
Bargaining power
Communications speeds are expressed in ________.
Bits
Bytes
Bits are grouped into 8-bit chunks called ________.
Are easy to represent physically
Bits are used for computer data because they ________.
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.
Bluetooth
Central Processing Unit (CPU)
Brain of the computer. Selects instructions, processes them, performs arithmetic and logical comparisons and store results
Query
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. She should use a ________ to obtain the information that she wants from the database.
Web applications are typically limited by the capabilities of the ________.
Browser
are more vulnerable to security threats than are traditional applications
Browser-based applications ________.
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
Business process
________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.
Business process design
Activity
Business process is a network of activities. Each activity is a business function that receives inputs and produces outputs.
Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. As part of its expansion strategy, the company decides to open outlets in four more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?
Buying and installing new computers in the new outlets.
false
Bytes lack the capacity to measure sizes of non character data.
A digital divide exists between ________. A) U.S. software companies and European software companies B) hardware companies and software companies C) those who have Internet access and those who do not D) employees of a software company and the managers of the company
C
A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage by ________. A) differentiating the industry B) establishing standards C) establishing alliances D) enhancing the products
C
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes? A) a used car dealership in New York B) a convenience store that sells retail products C) a firm that sells the only drug for a disease D) corner latte shops in Atlanta
C
According to Porter's five forces model, which of the following would be most affected by the threat of substitutes? A) Microsoft Windows OS B) Boeing jets C) Southwest Airlines' services D) Google Adwords
C
According to Porter's model of business activities, interactions across value activities are called ________. A) support activities B) models C) linkages D) cross-functionalities
C
In a manufacturing business, the ________ process transforms finished goods into cash. A) inbound operations B) operations C) sales D) inbound logistics
C
July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers are required to pay an up-front fee to cover the first two years of the subscription, when registering with July Networks. By doing this, which competitive strategy is July Networks implementing? A) differentiating the product B) enhancing the product C) locking in customers D) standardizing the product
C
Organizations can lock in suppliers by making it difficult to switch to another organization or by ________. A) making it easy for the customers to switch products B) reducing investments in their supply chain C) making it easy to work with the organization D) reducing the bargaining power of consumers
C
PowerCruise, a holiday cruise firm, recently offered its existing customers an extension of six months to their membership without any additional charges. By doing this, which competitive strategy did PowerCruise implement? A) creation of a new service B) product differentiation C) locking in of customers D) locking in of suppliers
C
The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________. A) low threat of substitutions B) high bargaining power of suppliers C) high levels of rivalry D) low bargaining power of customers
C
Which of the following is considered a support activity in the value chain of a business? A) operations B) customer service C) contract negotiation D) marketing
C
Which of the following principles of competitive advantage is related to process implementations? A) creating new products B) enhancing products C) locking in suppliers D) differentiating products
C
Which of the following statements is consistent with the central idea of business process design? A) Technology should be used to supplement the existing value chain. B) Business processes should not focus on the core competencies of organizations. C) Organizations should create new business processes rather than improving existing systems. D) Technology should be used to modify and improve standard business processes
C
Which of the following value chain activities involves inducing buyers to get a product and providing a means for them to do so? A) inbound logistics B) operations C) sales and marketing D) outbound logistics
C
If the primary information systems in an organization support only accounting and finance activities, the CIO should most likely report to the ________.
CFO
What Do Business Professionals Need to Know About Computer Hardware?
CPU is "the brain" Dual and Quad processor computers volatile vs. nonvolatile basic types of hardware binary digits
________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.
Cable
According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market?
Cancer drug manufactures
Outsourcing is done to ____
Cap an organizations financial exposure
User tier
Consists of computer, phones and other mobile devices that have browsers that request & process webpages
Server tier
Consists of computers that run Web servers and process application programs
Database tier
Consists of computers that run a DBMS that processes requests to retrieve and store data
Strategic
Carl, the information technology head at Cloud Denim has to overhaul the enterprise legacy information system used by the organization. He is responsible for determining what the hardware and software would be required to implement changes. Carl's decisions, in this case, are ________.
Networks owned by large telecommunication providers known as ...
Carriers
A ________ is also called "the brain" of the computer
Central Processing Unit
Which of the following is true about IS infrastructure?
Changing IS infrastructure is expensive and time-consuming.
lost-update problem
Charles and Irene are editors at a content development firm. Both of them, unknowingly, are working on the same copy of the annual report. Irene finishes editing the report and saves her copy; Charles saves his report an hour after Irene. Charles's report overwrites Irene's, and her changes are lost. This scenario is an example of the ________.
The responsibilities of a ______ include advising the Chief Information Officer, executive group, and project managers on emerging technologies.
Chief Technology Officer (CTO)
________ is a term that refers to the visual overhead in a computer display.
Chrome
A student team, which is assigned a term project, works together to achieve results. They provide continuous feedback to each other and thus, complete the project. Which of the following is being illustrated in this activity? Collaboration Association Participation Cooperation Support
Collaboration
When presenting an idea to her colleagues, Marjorie failed to consider others' perspectives and got defensive when people asked her questions. This situation indicates that Majorie lacks ________ skills.
Collaboration
________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. Participation Collaboration Association Cooperation Assimilation
Collaboration
Outbound Logistics
Collecting, storing, and physically distributing the products to buyers
Mixed Reality
Combination of real physical world with interactive virtual images or objects
What are value chain linkages?
Communication between business activities. Optimally, linkages allow an organization to create a new and more efficient business processes that integrate activities of all departments involved in a particular value chain
Virtual reality
Computer generated virtual world with interactive digital objects
Firmware
Computer software that is installed into devices such as printers and various types of communication devices
Quad-processor
Computer with four CPUs
Dual-processor
Computer with two CPUs
Elastic
Computing resources leased can be increased or decreased dynamically, programmatically in a short span of time and that organizations pay for just the resources they use.
CDN
Content delivery network: -System of hardware and software stores user data in many different geographical locations and makes data available on demand. -Provides specialized types of PaaS but usually considered in its own category -Minimize latency -Used to store and deliver content seldom changed
Which of the following is considered a support activity in the value chain of a business?
Contract negotiation
________ is defined as a group of people working together, all doing essentially the same type of work, to accomplish a job Collaboration Association Participation Cooperation Support
Coorperation
Which of the following is a form of outsourcing?
Correct ANP Infotech acquiring licensed manufacturing software from a vendor
Which of the following is a limitation of aligning information systems (IS) with organizational strategy?
Correct Adapting the IS to new versions of business processes is complex and time-consuming.
Which of the following statements is true of the operations group in an organization's information system (IS) department?
Correct It monitors the user experience and responds to their problems.
Which of the following statements is true about a data administration staff function?
Correct The group establishes standards to protect information assets.
The cost of the business process is the sum of the cost of the inputs and the ________.
Cost of the activities
Which of the following is a major implication of Moore's law?
Costs of data communications and storage have become very low.
Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.
Created an entry barrier
Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value?
Customer service
A(n) ________ is a collection of something, such as data and raw materials. A) value chain B) cache C) linkage D) repository
D
Lynn, the manager of a transportation company, is going through this week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing? A) inbound logistics B) marketing C) customer service D) outbound logistics
D
RAC Associates is a car rental company. The company rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________. A) primary business processes B) core activities C) strategic activities D) supporting business processes
D
Which of the following is a part of the materials ordering process? A) outbound logistics B) marketing C) operations D) inbound logistics
D
Which of the following is a support activity in the value chain? A) receiving inputs to operationalize the production B) distributing the products to retailers or buyers directly C) assisting customers in using the product or service D) setting up contractual arrangements for procurement
D
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? A) inbound logistics B) operations C) customer service D) outbound logistics
D
________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain. A) Internal supply chain design B) Product differentiation model C) Market differentiation model D) Business process design
D
Which of the following is true of DSL modems?
DSL modem signals do not interfere with telephone signals
A customer relationship management (CRM) system contains the names and phone numbers of customers. Such details stored in a CRM system are part of the ________ component.
Data
A spreadsheet consists of airfares to different cities from Chicago. If the contents of the spreadsheet are used to make a decision, it will be considered as ________.
Data
A student fills out an online admission form to register for a particular course. This is an example of the ________ component of the information system.
Data
The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.
Data
the purpose of a _____ ______ group is to protect data and information assets by establishing data standards and data management practices and policies.
Data administration group
Just-In-Time Data
Data delivered to the user at the precise time it is needed.
Which of the following is an example of a strategic decision? Deciding to increase the salaries of a group of employees Deciding to open a centralized distribution system Deciding to increase the reorder quantity of raw materials Deciding to give an employee certain tasks and responsibilities Deciding to buy a replacement server
Deciding to open a centralized distribution system
Strategic decisions
Decision that concerns broader-scope, organizational issues.
Managerial decisions
Decision that concerns that allocation and use of resources.
Operational decision
Decisions that concern the day-to-day activities of an organization.
Groupthink is a phenomenon where the desire for group cohesion leads to improved decision making. True False
False
TCP/IP Protocol Architecture
Defines Internet protocols - 5 layers 1) Physical- Hardware specifications 2) Data Link- Flow among switches and access points 3) Internet- Internet routing 4) Transport- Reliable Internet transport 5) Application- Enable communication among programs
in systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ____________.
Deliverables
Which of the following has a high threat of substitution?
Dell's purchase of hard drives
Which of the following is an example of project data? List of project tasks Schedule Budget Design document Monthly sales report
Design document
Web application
Designed to run within a computer browser
Identify a task that should be performed during the planning phase of project management. Reporting project progress Determining the schedule Performing project tasks Preparing archival documents Form the team
Determining the schedule
One-of-a-kind application software
Developed for a specific unique need
Which of the following principles of competitive advantage is associated with product implementations?
Differentiating service operations
DSL
Digital subscriber line - operates on the same lines as voice telephones, but it operates so it does not interfere with voice telephone service. DSL's use their own protocols for data transmission.
Which of the following tools facilitates asynchronous communication? Videoconferencing Multiparty text chat Discussion forum Screen-sharing application Real-time protocol
Discussion forum
Asynchronous communication occurs when team members ________. Cannot arrive at consensus after discussions Engage in conflicting discussions Do not meet at the same time Communicate in a sequential manner Talk with each other via video conference
Do not meet at the same time
Web page
Document that is coded in, usually html
A project manager has to manage tasks and identify schedule problems during the ________ phase of project management. Planning Starting Doing Finalizing Maintenance
Doing
Identify the project management phase in which the budget and tasks of a project are managed. Finalizing Doing Planning Starting Maintenance
Doing
One of the procedures of a collaboration project is documenting and reporting progress. This is performed in the ________ phase of the project. Starting Planning Doing Scheduling Maintenance
Doing
Computer Hardware
Electronic components and related gadgetry that input, process, output, and store data
Identify the principle of competitive advantage that is associated with product implementations.
Enhance services
Which of the following principles of competitive advantage is associated with product implementations?
Enhancing services
A group of shoe manufacturing firms purchases raw materials collectively from a single supplier to obtain better deals. This is an example of obtaining competitive advantage by ________.
Establishing alliances
An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help it in achieving this?
Establishing alliances
________ is a means through which an organization can gain a competitive advantage through process implementations.
Establishing alliances
Erin is a manager for a reputed software firm. She typically monitors and evaluates the existing working procedures of her subordinates. She constantly changes these working procedures so that they are consistent with the company's resources. This shows her ability to ________.
Experiment
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?
FTP
A shared file server is best suited for sharing content when there is increased risk of interference with the user's work by other team members. True False
False
A telecom service provider focusing on high-end users is following an industry-wide differentiation strategy. T/F
False
A webinar is a tool used to facilitate asynchronous communication True False
False
According to the five-component model of information systems, the data and software components of information systems are capable of performing actions. T/F
False
Applications such as MS Word and Excel are examples of procedures. T/F
False
Being a skilled and persuasive presenter is the most important characteristic for an effective collaborator. True False
False
Brad, an employee who works in the production department, has the ability to collaborate well with others. Brad's ability to collaborate is an example of a routine skill. T/F
False
Changing the structure of existing databases causes more organizational disruption than changing working procedures. T/F
False
Constructive criticism is negative advice given to improve an outcome. True False
False
Data should be relevant to the subject, not necessarily to the context. T/F
False
Margaret finds that calling all her senior supervisors and quality managers for a face-to-face meeting is not feasible. She arranges for multiparty text chatting session involving all of them. This is an example of asynchronous communication. True False
False
Moore's Law predicts that the price to performance ratio of computers will double once in 18 months. T/F
False
Need for collaboration increases as the decisions become more structured. True False
False
Operational decisions require a high degree of collaboration. True False
False
Project plan and budget are prepared during the finalizing phase of project management. True False
False
Skype for Business is an example of a comprehensive content sharing collaboration tool. True False
False
T/F- One of the Chief information Officers main duties is to evaluate new technologies for use in the company's business proccesses
False
T/F- if an organization does not develop programs in-house, then the organization's IS development group will include programmers, test engineers, and technical writers.
False
T/F- it is impossible to cap financial risk by outsourcing
False
T/F- not all information systems have applications or software components.
False
T/F- outsourcing guarantees a high level of quality than that provided in-house.
False
T/F- outsourcing neither saves time for direct management, nor for indirect management
False
The support activities in the generic value chain do not contribute to the production, sale, and service of the product. T/F
False
Using a file server to exchange documents is superior to using Google Drive. True False
False
Version management applications offer a higher degree of control than the version control applications. True False
False
Version management systems improve the tracking of shared content and provide version control. True False
False
It is likely that desktop and portable computers will disappear in the next decade. T/F
False ?
ftp
File Transfer Protocol- used to move files over the Internet
Project teams should document project results and information for future teams. Which of the following is the project management phase in which the teams perform this function. Doing Planning Staring Finalizing Maintenance
Finalizing
Which of the following is an open-source Web browser?
Firefox
________ is installed in special, read-only memory in devices like printers, print servers, or various types of communication devices.
Firmware
________ is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser.
Flash
Better service is provided within a market niche
Focused differentiation occurs when ________.
Which is generally a responsibility of users of information systems?
Following security and backup procedures
a ___________ shows the tasks, dates, and dependencies for the tasks of a project.
Gantt chart
Which of the following statements is true of good information?
Good information should be based on correct and complete data.
Which of the following statements is TRUE of sharing a task list on Google Drive? Sharing a task list on Google Drive is a very complex procedure Team members can share a task list without having a Google account Google Drive gives every team member permission to edit, but restricts their contributions to the task list Google Drive allows simultaneous edits Task lists updates are pushed out weekly
Google Drive allows simultaneous edits
Which of the following statements is TRUE about working with Google Drive? Google accounts are not necessarily required to edit documents Documents are stored on the user's personal computer Multiple users are not allowed to simultaneously see and edit documents Google tracks document revisions, with brief summaries of changes made Google provides unlimited storage
Google tracks document revisions, with brief summaries of changes made
Uniquely identify each record
In a relational database, the primary key field is used to __________.
Field
In a university's relational database, the student records contain last names. Last name is a(n) __________.
Permissions
In a version-control system, authorizations to access shared documents stored in carious directories, Typical they are read-only, read-and-edit, and read-edit-and-delete; some directories gave no permission-- they are off-limits.
Trade-off
In project management, a choice among scarce resources such as scope, time, cost, quality, risk, people, and other resources. Managers amy need to trade off a delay in the project due-date to reduce expense and keep critical employees.
Scope
In the discipline of project management, the characteristics needed to be built into or achieved by an IS; same as the term requirements.
the human-performed activities to the computer-performed activities
In the five-component model, the process of automation is a process of moving work from ________.
Library
In version-control collaboration system, a shared directory that allows access to various documents by means of permissions.
Data is worth its cost when an appropriate relationship exists between the cost of data and its value. T/F
True
________ is the most common language for defining the structure and layout of Web pages.
HTML
A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.
HTML tag
Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?
HTTP
Which of the following protocols guarantees secure data transmission?
HTTPS
Which of the following is the least important characteristic of an effective collaborator? Willingness to enter difficult conversations Having experience as a collaborator Showing the ability to receive critical feedback Being skillful at giving negative feedback Willing to put forward unpopular ideas
Having experience as a collaborator
Dynotrix Motors is a large car-manufacturing company. The company purchases raw materials from many small-sized sellers across the globe. In this case, Dynotrix Motors is characterized by ________.
High bargaining power over its suppliers
The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter's five forces model, this statement illustrates ________.
High levels of rivalry
It increases your bargaining power
How does the internet affect the way you purchase your textbooks?
Peering agreements
How large carriers exchange traffic freely without charging each other access fees
Which of the following decisions is LEAST likely to involve collaboration? How much of product A should be ordered from vendor B? What products should we include in the new product line? Should our company acquire company A? What type of relationship should the company maintain with company A? Should we create a strategic partnership with company A?
How much of product A should be ordered from vendor B?
The organization responsible for assigning public IP addresses is called ________.
ICANN
Impact of internet of things- Smart buildings
ID problems like wasteful lighting, competing heating and cooling systems, rogue fans, etc
The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.
IP
Which of the following is the most common format for IP addresses?
IPv4
Amazon S3 (Simple Storage Service) is an example of ________.
IaaS
Which of the following is the most basic cloud offering?
IaaS
Which of the following is a form of hardware outsourcing?
IaaS cloud hosting
Workspace
In Microsoft Groove, an electronic "space" consisting of tools and documents that enable users to collaborate.
A retail company sells products such as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.
Inbound logistics
Cassandra runs a downtown boutique that sells customized clothes. One of her customers wishes to purchase a trench coat with a bejeweled clip. Cassandra contacts "Gems and Stones" and places an order for the clip. This activity can be classified under ________.
Inbound logistics
Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
Inbound logistics
Impact of internet of things- GE's industrial internet
Increase efficiencies, reduce waste, improve decision making. Greatest potential for smart devices in hospitals, power grids, railroads, and manufacturing plants.
Reduction in production cost results in ________.
Increased profitability
Bargaining power of customers is likely to be the highest for markets involving ________.
Industrial products
Porter's five forces model is used to assess ________.
Industry structure
An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________.
Industry-wide differentiation
Which of the following terms is described as processed data or data presented in a meaningful context? illustrations information scenarios questionnaires
Information
Asynchronous communication
Information exchange that occurs when all members of a work team do not meet at the same time, such as those who work different shifts or in different locations
Synchronous Communication
Information exchange that occurs when all members of a work team meet at the same time, such as face-to-face meetings or conference calls.
Which of the following is true about the quality of information?
Information should be just barely sufficient for its purpose
Which of the following statements is true about the quality of information? Information should be just barely sufficient for its purpose. Data that arrives after a prolonged period of time is of the highest quality. Freely available data is always accurate and timely. Information needs to be relevant to the subject, not necessarily to the context.
Information should be just barely sufficient for its purpose.
Mobile Systems
Information systems that supports users in motion
Which of the following statements regarding information technology (IT) is true?
Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information.
IaaS
Infrastructure as a service- the cloud hosting of a bare server computer or data storage
A thin-client application is designed to run within a program such as ________.
Internet Explorer
IP
Internet Protocol - Specifies routing of data communication through networks. Routers - Small, special purpose computers that route packets to their destination
IP address
Internet address - a number that identifies a particular device
Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device?
Internet of things (IoT)
A private internet that is used exclusively within an organization is called a(n) ________.
Intranet
A private internet that is used exclusively within an organization is called a(n) ________. A) ethernet
Intranet
A private internet that is used exclusively within an organization is called aNo ________.
Intranet
Sales and Marketing
Introducing buyers to purchase products and providing a means for them to do so
Which of the following statements is true about the IEEE 802.11 protocol?
It allows speeds of up to 600 Mbps.
Which is a risk of outsourcing information systems/information technology functions
It involves the potential loss of intellectual capital
Which of the following is a risk of outsourcing IS/IT functions?
It involves the potential loss of intellectual capital.
Which of the following statements is true about IEEE 802.3?
It is the protocol for wired LAN connections.
Which of the following statements is true of the operations group in an organization's IS department?
It monitors the user experience and responds to user problems.
Which of the following is true about outsourcing?
It saves both direct and indirect management time.
Which of the following is a function of an ISP?
It serves as a gateway to the Internet.
Which of the following statements is true about the steering committee of an IS department?
Its meetings are conducted by the IS department.
Android applications are developed using ________.
Java
Linux applications are developed using ________.
Java
Object-oriented languages
Java, C#, and VB.NET are examples of ________.
________ refers to data delivered to the user at the precise moment it is needed.
Just in time data
________ refers to data delivered to the user at the precise moment it is needed.
Just-in-time data
Who among the following are most likely to use asynchronous communication? Members of a team who work in different time zones Managers who work in the same office Employees who work in an assembly line A group of directors who regularly meet for board meetings Group members flying together on the same flight
Members of a team who work in different time zones
data that describe data
Metadata are ________.
A thin-client application is designed to run within a program such as ________.
Microsoft Internet Explorer
Which of the following is an example of a closed source project?
Microsoft Office
Which of the following alternatives for sharing content provides version control? Microsoft Office WebApps Google Docs Microsoft Sharepoint Network attached storage
Microsoft Sharepoint
Which of the following is an example of an application program?
Microsoft Word
________ states that the number of transistors per square inch on an integrated chip doubles every 18 months
Moore's Law
________ states that the number of transistors per square inch on an integrated chip doubles every 18 months.
Moore's Law
Which of the following is true about the changes and developments foreseen for 2023?
Most organizations will move their internal hardware infrastructure into the cloud.
Which of the following statements is true of business process designs?
Most process designs require people to work in new ways.
Hop
Movement from one network to another
Which kinds of formatting is NOT normally allowed in a word processor such as MS Word?
Multiple file formatting
Which of the following is the device that connects a computer's or printer's circuitry to network wires?
NIC
________ typically have transmission speeds less than 56 Kbps.
Narrowband lines
Which of the following employees performs a support activity in the value chain?
Nathaniel is in charge of setting up contractual agreements with vendors
________ applications are programs that are written to use a particular operating system.
Native
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
Network
Internet
Network of networks
Which of the following is a valid guideline for maintaining good password etiquette?
Never ask someone else for their password.
Which of the following statements is TRUE of managing tasks? When a single person is made responsible for accomplishing a task, it means that he/she should do the task No benefit will come from the task list unless every task has a date by which it is to be completed Accountability and follow-up are seldom required for task management For team members to utilize a task list effectively, they need to keep it confidential Important tasks are completed on time
No benefit will come from the task list unless every task has a date by which it is to be completed
Data
Noel creates a table listing the number of students in his biology class, their names, age, and phone numbers. His table is an example of the ________ component of an information system.
Which of the following statements is true of an operating system?
Nonmobile client operating systems are used on personal computers.
The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the list of products sold in the previous quarter. These details do not qualify as good information because they are ________.
Not relevant
Mac OS and iOS applications are constructed using ________.
Objective-C
Content management
One of the drivers of collaboration effectiveness, which enables multiple users to contribute to an change documents, schedules, task lists, assignments, and so forth, without one user's work interfering with another's. Also enables users to track and report who made what changes, when, and why.
Which of the following statements is true of closed source projects?
Only trusted programmers are allowed to make changes to a closed source project.
Marci, a purchasing agent, orders 300 refrigerators per month from an online vendor portal. In doing so, she has made a(n) ________ decision. Managerial Tactical Strategic Operational Technical
Operational
________ decisions are concerned with day-to-day activities. Operational Strategic Managerial Tactical Preemptive
Operational
________ decisions are the most structured and have very little need for collaboration. Operational Tactical Managerial Strategic Technical
Operational
Operational decisions are those that support ________. Operational, day-to-day activities Optimum utilization of resources Organizational issues Allocation of tasks Strategic competitive objectives
Operational, day-to-day activities
Which of the following value chain activities involves transforming raw materials into a finished product or service?
Operations
Which of the following is an example of a PaaS?
Oracle on Demand
Switching Costs
Organizations can lock in customers by making it difficult or expensive for customers to switch to another product.
Which of the following statements is consistent with the central idea of business process design?
Organizations should create new business processes rather than improve existing systems.
Which of the following statements is consistent with the central idea of business process design? Business processes should focus on improving individual functional systems. Technology should be used to modify and improve standard business processes. Organizations should create new business processes rather than improve existing systems. Technology should be used to supplement the existing value chain.
Organizations should create new business processes rather than improve existing systems.
Lynn, the manager of a transportation company, is goes through the week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
Outbound logistics
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?
Outbound logistics
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.
PC virtualization
With ________, a computer, such as a desktop or portable computer, hosts several different operating systems.
PC virtualization
A cloud vendor who provides hosted computers, an operating system, and a DBMS is offering which of the following services?
PaaS
In the next ten years, the ________ is most likely to change.
Pace of integration of new technology
A(n) ________ is a piece of a message that is handled by programs that implement IP.
Packet
In the system implementation phase of the systems development life cycle (SDLC), with ______________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
Parallel
Project data is data that is ________. Part of the collaboration's work product Used to manage a project Used to schedule the tasks of the project Part of documents such as schedules and budgets Used for operational decision making
Part of the collaboration's work product
In the system implementation phase of the systems development life cycle (SDLC), with the _________ installation, the organization installs the next piece of the system only after the previous piece works.
Phased
In the system implementation phase of the systems development life cycle (SDLC), with ___________ installation, the organization implements the entires new system/business processes on a limited portion of the business
Pilot
Roselyn works for an event management company. Her latest project as a party planner is a corporate event. She delegates tasks like choosing the venue, posting invitations, and planning logistics to her team members. She also specifies a time frame for each task. Roselyn's project is in the ________ phase of project management. Planning Starting Doing Finalizing Maintenance
Planning
PaaS
Platform as a service- vendors provide hosted computers an operating system and possible a DBMS. Ex: Microsoft Azure
Industry structure
Porter's five forces model is used to analyze ________.
How can new hardware affect competitive strategies?
Potentially disruptive hardware developments for existing organizations. 1.Internet of Things (IoT) 2.Digital Reality Devices 3.Self-driving Cars 4.3D Printing
Mark follows certain steps to access the supplementary readings for a course when using his organization's library management system. These steps that he follows are examples of the ________ component of an information system.
Procedure
It is generally more difficult to make changes to the ________ of an information system than to the database itself.
Procedures
Hueblue Software, an application provider to the gaming industry, decided to increase its portfolio by developing motion-control-enabled games for the mobile gaming industry. In this scenario, which competitive strategy is Hueblue Software implementing?
Product differentiation
________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
Systems thinking
I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." The competitor made significant in-roads into this market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 implementing?
Product differentiation
I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." The competitor made significant inroads into this market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 implementing?
Product differentiation
Operating System (OS)
Program that controls the computer's resources ex: windows, mac OS, Linix, Unix
Web server
Program that runs on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients
Native Applicaton
Programs that are written to use a particular operating system
Client operating system
Programs that control the client computer's resources
server operating system
Programs that control the server computer's resources
Productivity Software
Programs that enable a user to perform various tasks generally required in home, school, and business. (Ex: word processing, spread sheet, presentation, Personal Information Management (PIM), and database programs)
A ________ is a set of rules that programs on two communicating devices follow.
Protocol
Cable lines
Provide high-speed data transmission using cable TV lines
Horizontal Market
Provides capabilities common across all organizations and industires
Which of the following is a primary activity in the value chain?
Receiving and distributing inputs to the product
An organization implements an information system to optimize its supply chain. The system helps the organization decrease wastages. Hence, the system provides a competitive advantage to the organization. Here, the information system helped the organization achieve competitive advantage by ________.
Reducing costs
Which of the following principles of competitive advantage is related to process implementations?
Reducing costs
Increased profitability
Reduction in production cost results in ________.
referential integrity constraints
Relationships between entities are implemented in relational databases as ________.
A ________ is a collection of something, such as data and raw materials.
Repository
A database is an example of a ________.
Repository
According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the meaningful and satisfying experience criterion Document definitions Rewarding accomplishment Managing many versions of content Managing tasks Communicate (feedback)
Rewarding accomplishment
________ occurs when users move their activities, especially long-running transactions, across devices.
Roaming
PC virtualization
Ronald runs both Windows 10 and Linux on his desktop computer. This is an example of ________.
Which of the following TCP/IP application-layer protocols is used for e-mail transmission?
SMTP
Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?
Sales and marketing
In a manufacturing business, the ________ transforms finished goods into cash.
Sales process
Which of the following is an example of a company that offers SaaS?
Salesforce.com
Vertical market application software
Serves the needs of a specific industry.
Which is a responsibility of a chief information officer (CIO)
Serving as the principal manager of the IS department
The fundamental purpose of the starting phase of a project is ________. Accomplishing the project tasks effectively Determining tasks and dependencies Managing tasks and budgets of the project Setting the ground rules for the project and team Solving problems
Setting the ground rules for the project and team
Which of the following is a support activity in the value chain of a firm?
Setting up contractual arrangements for procurement
________ refers to the ability to model components and show how the components' inputs and outputs relate to one another.
Systems thinking
Which of the following question is best answered through unstructured decision making? How many overtime hours should be used to fill this order? Should we continue to outsource our bookkeeping processes? What is the acceptable defect ratio for this product ? When should the next batch be scheduled to reduce idle time? How many replacement parts should be kept on hand?
Should we continue to outsource our bookkeeping processes?
________ is an add-on to browsers that was developed by Microsoft and provides animation, movies, and other advanced graphics inside a browser.
Silverlight
smtp
Simple Mail Transfer Protocol- used for email transmissions
Which of the following is a comprehensive tool for communication? Google Hangouts SharePoint Google Drive Skype for Business Zphone
Skype for Business
SOHO
Small office or home office
Mobile device
Small, lightweight, power-conserving, computing device that is capable of wireless connectivity.
An operating system like Windows or Linux is an example of the ________ component of an information system.
Software
SaaS
Software as a service- provides not only hardware infrastructure, but an operating system and application programs as well. Ex: iCloud
Written by humans
Source code is computer code ________.
According to Porter's five forces model, which of the following would be most affected by the threat of substitutes?
Southwest airlines
The first place to look for and launch applications in MS Windows is to go to the:
Start menu
Evelyn, who is in charge of an ad hoc team, holds a meeting with her team and explains the purpose of the project and outlines what the team can expect during its course. She lays down certain rules regarding the methods that can be used to achieve their project goals. Evelyn's project is in the ________ phase of project management. Starting Finalizing Doing Planning Maintenance
Starting
Team roles, responsibilities, and authorities are established during the ________ phase of a project. Starting Planning Doing Evaluating Maintenance
Starting
Bell's Law
States that "a new computer class forms roughly each decade establishing a new industry." digital devices will evolve so quickly that they enable new platforms, programming, environments, industries, networks, and info systems every 10 years.
Carl, the information technology head at Cloud Denim, a clothing company, has to update the enterprise software system used by the organization. He is responsible for determining the hardware and software that would be required to implement the new system. Carl's decisions, in this case, are ________. Operational Strategic Procedural Managerial Technical
Strategic
The directors of X-lam Inc., a manufacturer of electric water heaters, meet to discuss ways to increase their net profit. They decide to manufacture electric toasters and thus invest in a new product line. This investment is an example of a(n) ________ decision. operational strategic managerial procedural technical
Strategic
The need for collaboration is greatest for ________ decisions. Operational Procedural Strategic Managerial Technical
Strategic
________ decisions are those that support broad-scope, organizational issues. Operational Strategic Unstructured Managerial Technical
Strategic
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process. Structured Unstructured Managerial Strategic Predictive
Structured
Following standardized guidelines to calculate sales commissions is an example of a(n) ______. Autocratic participative decision-making style Structured decisions Unstructured decisions Consensus participative decision-making style Financial decision
Structured decisions
Using MS Word, the easiest way to format paragraphs with similar fonts, line spacing and justification without repeating many steps is to use:
Styles
RAC Associates is a car rental company that rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________.
Supporting business processes
According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the growth in team capability criterion? Rewarding accomplishment Managing many versions of content Supporting intra-team training Building team spirit Create sense of importance
Supporting intra-team training
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
Switching costs
A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. The strategy used by the company is referred to as ________.
Switching costs strategy
The use of a conference call is an example of ________ communication. Sequential Synchronous Indirect Asynchronous Incidental
Synchronous
________ communication occurs within a team when all team members meet at the same time. Synchronous Asynchronous Virtual Unidirectional Asynchronous
Synchronous
As described in the class slides, which of these job titles is the most common job title for a new MIS major graduate?
Systems Analyst
a ______ _______ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.
Systems analyst
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.
TCP/IP
The term ________ refers to a collaboration tool where team members can easily respond and the management can easily identify the people who have not responded to a request. Discussion forum Management survey Webinar Team survey Email
Team Survey
Videoconferencing
Technology that combines a conference call with video cameras.
Data
The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.
Augmented Reality
The altering of reality by overlaying digital information on real-world objects
Which of the following factors determines the structure, features, and functions of an information system used in a company?
The competitive strategy
Which of the following is a characteristic of volatile memory?
The contents are lost when power is off.
Volatile
The contents are lost when the power if off
Application software
The set of programs on a computer that helps a user carry out tasks such as word processing, sending e-mail, balancing a budget, creating presentations, editing photos, taking an online course, and playing games. ex: word, access, games
System Software
The set of programs that enables a computer's hardware devices and application software to work together; it includes the Operating System (OS) and utility programs.
Collaboration
The situation in which two or more people work together toward a common goal, result, or product; information systems facilitate collaboration.
Which of the following statements is true about the steering committee of the information systems (IS) department?
The steering committee's meetings are conducted by the IS department.
Discussion forums are better suited than emails in asynchronous communication because They are best suited to transmit personalized information They facilitate real-time communication between participants They keep the discussion from going off track They ensure that all team members are involved in the discussion They have greater organizational memory
They keep the discussion from going off track
Which of the following is true about users of information systems?
They must learn standard techniques and procedures for the applications they use.
Which of the following statements is true of native applications?
They only run on the operating system for which they are programmed
Which of the following statements is true of native applications?
They only run on the operating system for which they are programmed.
Which of the following is true about cable modems?
They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
Which of the following statements is true of business users who administer the development of information systems?
They should take an active role in the system's development.
Which of the following statements is true of business users who administer the development of information systems? It is mandatory that they hold a degree in database management. They should refrain from specifying the system's requirements. They should take an active role in the system's development. When the system fails, they must refrain from performing tasks related to system recovery.
They should take an active role in the system's development.
The difference between the total value added and the total costs incurred is called the ________ of the value chain.
Total margin
Version management
Tracking of changes to documents by means of features and functions that accommodate concurrent work. The means by which version management is done depend on the particular version-management system used; three such systems are wikis, Google Docs & Spreadsheets, and Microsoft Groove.
Which of the following statements is true about the changes and developments foreseen by the year 2025? Traditional classrooms will be replaced by classrooms in a box. Processing image data will be difficult. Desktop and portable computers will increase in popularity. Mobile devices will be cheaper and powerful.
Traditional classrooms will be replaced by classrooms in a box.
Operations/Manufacturing
Transforming inputs into the final products
TCP
Transmission Control Protocol - Breaks traffic up into packets and sends each one along its way
According to Porter's five forces model, the intensity of each of the forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be. T/F
True
According to the five-component framework, the five components of an information system are present in every information system. T/F
True
Activities such as collecting, storing, and physically distributing the products to buyers are considered as primary activities in a value chain. T/F
True
An inventory of raw materials is an example of a repository. T/F
True
An operating system is a program that controls a computer's resources.
True
An organization providing the lowest cost for a product or service across an industry segment is focusing on cost leadership. T/F
True
An organization responds to the structure of its industry by choosing a competitive strategy.
True
An organization's goals and objectives are determined by its competitive strategy. T/F
True
An unstructured decision process is one for which there is no agreed-on decision-making method. True False
True
Changing personnel responsibilities to suit an information system is more disruptive to an organization than ordering additional hardware for the information system. T/F
True
Susan, the operations manager at Multitech Systems Inc., schedules a face-to-face meeting with her vendors to decide on the specifications for a project. Some of her senior engineers are also asked to participate in the discussion through a conference call. This is an example of synchronous communication. True False
True
T/F- Dimensions of process quality are effectiveness and efficiency.
True
T/F- a work breakdown structure (WBS) is a hierarchy of tasks required to complete a project
True
T/F- an organization reduces implementation risk by outsourcing information systems
True
T/F- if the outsource vendors employees have gained significant knowledge of the company, ending the agreement is a major risk
True
T/F- information system users have a responsibility to follow security and backup procedures.
True
T/F- the IS operations group monitors user experience and responds to user problems.
True
T/F- the activities in a business process often involve information systems
True
T/F- the actors or participants in a business process are the users of information systems.
True
Team members need not continually check the SharePoint task list for new tasks. True False
True
The facility manager of an insurance company makes decisions on the monthly purchase of office supplies. This is an example of an operational decision. True False
True
The five-component framework applies to simple and complex information systems. T/F
True
The most important skill for effective collaboration is to give and receive critical feedback. T/F
True
The streamlining of business processes to increase margin is key to obtaining competitive advantage. T/F
True
When considering different information systems alternatives, it will be helpful to consider the low-tech versus high-tech alternatives in light of the amount of work that is being moved from people to computers. T/F
True
According to the five-component framework, additional components are added to the existing component framework as the complexity of a system increases. T/F
True?
By 2025, huge networks of computers will be required to process image data in real time. T/F
True?
In the five-component model of an information system, hardware and software are part of the human side. T/F
True?
When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "http://www.bang-olufsen.com/", which is the ________ of the Web page.
URL
Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another?
USB Flashdrive
Which of the following refers to a small, portable storage device that can be used to back up data and transfer it from one computer to another?
USB flash drive
Most LAN connections are made using ________.
UTP cable
Which of the following is an example of an open-source desktop operating system?
Ubuntu
URL
Uniform Resource Locator- address on the Internet
Which of the following is a key difference between collaboration and cooperation? Unlike cooperation, collaboration occurs when a job has to be accomplished Cooperation requires people to have a common goal, whereas collaboration occurs even without a common goal People should work together to cooperate, whereas they need not work together to collaborate Unlike cooperation, collaboration emphasizes iteration and feedback Cooperation emphasizes iteration and feedback, and collaboration emphasizes consensus
Unlike cooperation, collaboration emphasizes iteration and feedback
A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspect of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making. Asynchronous Unstructured Structured Operational Relational
Unstructured
Workflow control
Use of software and IS to monitor the execution of a work team;s processes; ensures that actions are taken at appropriate times and prohibits the skipping of steps or tasks.
Version control
Use of software to control access to and configuration of documents, design, and other electronic versions of products.
Project management
Use of software to produce charts (such as Gantt charts) that schedule tasks and resources that are dependent on each other.
IEEE 802.3 protocol (Ethernet)
Used for LAN connection. Also called Ethernet - specifies hardware characteristics, such as which wire carries which signals. Also describes how messages are to be packaged and processed for wired transmissions of the LAN.
Project metadata is data that is ________. Part of a collaboration's work product Used to manage the project Developed to design new offerings Used in documents to describe recommended solutions Intended to be archived
Used to manage the project
Which of the following statements is true about firmware?
Users do not need to load firmware into a device's memory.
Which of the following statements is true of firmware?
Users do not need to load firmware into the device's memory.
Pervasive Computing
Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________.
A(n) ________ uses the Internet to create the appearance of private point-to-point connections
VPN
Melissa is a senior accountant at a consulting firm. She brings to her manager's notice the considerable amount of time that is wasted when accounting tasks are performed manually, and proposes that the department automates these tasks. Melissa's accounting department is in need of a(n) ________. A) application software B) system software C) firmware D) operating system
a
Owen, the database administrator for a shipping company, is responsible for checking the data model, which is to be used in the database management system, for accuracy and completeness. This is an example of Owen's ________ tasks. A) development B) adaptation C) backup and recovery D) operation
a
Reed Technologies has hired certified programmers to create an application for its Web site. The application would run inside a browser and support graphics and animation. Which of the following will the programmers use to develop this application? A) HTML5 B) Java C) Objective-C D) C#
a
Relational databases represent relationships using ________. A) foreign keys B) file systems C) metadata D) primary keys
a
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________. A) PC virtualization B) server virtualization C) cloud computing D) desktop virtualization
a
SFA Inc. has a team of ten information systems (IS) personnel. The personnel are kept busy throughout the day as they help employees solve even the most trivial issues. In which of the following ways can the employees assist the IS personnel in this scenario? A) by learning basic computer skills B) by sharing their passwords with others to use their help in solving those trivial issues C) by installing security programs by themselves D) by making hardware modifications
a
Source code is computer code ________. A) that is written by humans B) that is not understandable by humans C) that is represented as bits and bytes D) that cannot be modified
a
The purpose of a ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data mining D) data communication
a
The responsibilities of a tech support engineer include ________. A) helping users solve problems and providing training B) managing and protecting databases C) writing program documentation D) advising the chief information officer on emerging technologies
a
The rows in a database are called ________. A) records B) tables C) files D) fields
a
The speed of a CPU is expressed in cycles called ________. A) hertz B) knot C) Mach D) rev
a
Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. A) mobile system B) nonmobile system C) client operating system D) native application
a
When using the relational model to represent two tables, one must ________. A) add a foreign key to one of the tables B) have more than two primary keys in the model C) establish only N:M relationships between the tables D) use metadata instead of foreign keys
a
Which of the following data elements is placed higher than records in the database hierarchy? A) file B) field C) character D) byte
a
Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A) Internet of things (IoT) B) 3D printing C) self-driving cars D) automated guided vehicles
a
Which of the following is a characteristic of smart devices? A) require microprocessors and new protocols B) have lower bandwidth C) consume less energy D) have less processing power
a
Which of the following is a developmental task of database administration? A) evaluating an application design B) monitoring backup procedures C) conducting training for users D) managing configuration changes in systems
a
Which of the following is a limitation of aligning information systems (IS) with organizational strategy? A) Adapting the IS to new versions of business processes is complex and time-consuming. B) Aligning the IS direction with the organizational strategy occurs only when organizations merge. C) Aligning the IS direction with the organizational strategy occurs only when the divisions are sold. D) The steering committee provides a forum for the IS department to voice its complaints about the users.
a
Which of the following is a responsibility of a chief information officer (CIO)? A) serving as the principal manager of the IS department B) heading the technology group C) evaluating new technologies that are relevant to the organization D) developing processes and information systems (IS) that implement business strategy
a
Which of the following is an example of a mobile device? A) a smartphone B) an Xbox C) a desktop computer D) a mainframe
a
Which of the following is an example of an application program? A) Microsoft Word B) Unix C) Linux D) Windows
a
Which of the following is an example of nonvolatile memory? A) optical disk B) main memory C) cache memory D) static random access memory (SRAM)
a
Which of the following is an example of vertical-market application software? A) inventory tracking software for an automobile manufacturer B) Tally software that is used to maintain business and personal accounts C) Adobe suite, used by graphic designers D) Microsoft PowerPoint, used to create presentations
a
Which of the following is true about the database development process? A) The database structure is easy to change during the data modeling stage. B) Changing a relationship from 1:N to N:M in an existing database is a complex and lengthy process. C) User review of the data model is avoided as it is not helpful in data modeling. D) Databases are easier to develop than spreadsheets.
a
Which of the following is true of in-memory DBMS products? A) They support or extend the relational model. B) They do not provide acid transaction support. C) They are a hotbed of development. D) MongoDB is an in-memory DBMS product.
a
Which of the following statements is true about native applications? A) They only run on the operating system for which they are programmed. B) The cost of native applications is low. C) They can be developed by less skilled, lesser-paid employees. D) The limits on native applications are usually technological, not budgetary.
a
________ is the process of converting a data model into tables, relationships, and data constraints. A) Database design B) Database querying C) Data mining D) Database aggregation
a
true
a 64- bit, dual processor is needed to effectively utilize more than 4GB of main memory.
true
a BYOD policy is a statement concerning employees' permission and responsibilities when they use their own device for organizational business.
false
a CPU stores results of computations on the hard drive.
Focused differentiation occurs when ________.
a better product is provided within an industry segment
true
a central processing unit is sometimes called "the brain" of the computer.
Byte
a character of data.
Which of the following defines a repository?
a collection of something, such as data or raw materials
Repository
a collection of something.
Repository
a collection of something; a database is a repository of data and a raw material repository is an inventory of raw materials.
Primary key
a column or a group of columns that identifies a unique row in a table.
Which of the following is an example of computer hardware?
a computer monitor
According to Porter's five forces model, in which of the following situations would the supplier have the highest bargaining power?
a dealer of a patented material for smartphone manufacturers
Which of the following is a low-tech information system?
a file of email addresses stored in an email program
Which of the following is an example of a low-tech information system? an inventory tracking system that that stores millions of records and produces reports every 24 hours a customer support system that keeps track of product issues a decision support system that analyzes multiple variables a file of email addresses stored in an email program
a file of email addresses stored in an email program
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?
a firm that sells the only drug for a disease
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes? a firm that sells the only drug for a disease a corner latte shop in Atlanta a used car dealership in New York a convenience store that sells retail products
a firm that sells the only drug for a disease
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes?
a firm that sells the only drug for disease
false
a megabyte, or MB, is equal to 1,024 bytes.
Which of the following refers to server virtualization?
a server computer that hosts one, or more, other server computers
true
a server is a computer that is designed to support processing from many remote computers and users.
Which of the following is an example of a mobile device?
a smartphone
A client-server application that requires nothing more than a browser is called ________.
a thin-client application
true
a thin-client application is designed to run within computer browsers, such as Firefox and Internet Explorer.
true
a user interface (UI) is the presentation format of an opplication
SQL injection
a way of inserting your own SQL code into someone else information system.
Which of the following is a critical characteristic of good information?
accuracy
The hardware components of an information system will act as a(n) ________.
actor on the computer side
true
although the operating system makes the computer usable, it does little application- specific work
Value
amount of money that a customer is willing to pay for a resource, product, or service.
Porter defined value as the ________.
amount of money that a customer is willing to pay for an offering
false
an operating system is a hardware device used to input data into a computer.
Competitive strategy
an organizations response to the structure of its industry.
false
android is a nonmotile client operating system.
Programs that perform business functions, such as general ledger and accounting, are examples of ________.
application software
Multi-user processing
applications involving multiple users processing the same database.
true
applications must be designed to scale up and down without appearing awkward or taking over the drive
Bits are used for computer data because they ________.
are easy to represent physically
Server application programs are programs that ________.
are processed on server computers
true
as predicted by Moore's law, CPU speeds continually increase.
A primary key in a database is a ________. A) group of rows that identifies a unique table or file B) column or group of columns that identifies a unique row in a table C) group of fields or columns that represent metadata D) group of tables or files formed to identify a unique field or row
b
A significant difference between using Access versus Mongo DB to store Falcon Security's video information is: A) with Mongo DB the video footage and the metadata are stored in separate databases, while in Access the video footage and the metadata are stored in the same database. B) with Mongo DB the video footage and the metadata are stored in the same database, while in Access the video footage and the metadata are stored in separate databases. C) there is no significant difference in using Access versus Mongo DB for storing Falcon's video information. D) Mongo DB cannot be used for querying because it is a NoSQL database.
b
A thin-client application is designed to run within a program such as ________. A) Adobe Photoshop B) Edge C) Microsoft Word D) Microsoft Excel
b
A(n) ________ is a program used to create, process, and administer a database. A) operating system B) database management system C) information system D) database system
b
Atlanta Technologies outsourced its information technology (IT) support department to a vendor in China. The vendor company, however, faced repeated instances of software failure and now needs to make some changes to the information systems. Who among the following has control over prioritizing issues related to such changes? A) the chief technology officer at Atlanta (CTO) B) the vendor C) a third party technician D) the chief information officer at Atlanta (CIO)
b
Bits are used for computer data because they ________. A) are represented exclusively as letters of the alphabet B) are easy to represent physically C) represent the orientation of a nonoptical media D) can have more than two values at a time
b
Carter is the Web designer for an open source project. He has created a program that facilitates the easy collation of data for a large-scale logistics firm. Which of the following is true of the source code for Carter's program? A) It is less stable and platform dependent. B) It is available to the public. C) It is highly protected and obtained only by having a license. D) It is available only to carefully vetted contractors.
b
Columns that are keys to different tables than the ones in which they reside are called ________. A) attributes B) foreign keys C) primary keys D) internal records
b
Constraints on the minimum number of entities in a relationship are called ________ cardinalities. A) specific B) minimum C) primary D) critical
b
DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. DenTimes is an example of ________. A) horizontal-market application software B) vertical-market application software C) firmware D) adware
b
Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department. A) human resources B) information systems C) marketing D) manufacturing
b
Each entity in a database has a unique attribute called a(n) ________. A) public key B) identifier C) foreign key D) index field
b
Heidi, an accountant, completed three mandatory training sessions in the last quarter. She needs to update her training record in the company's database. Which of the following elements will help Heidi modify her data? A) reports B) forms C) queries D) operations
b
Linela Insurance needs to hire twenty accountants immediately to support its accounts receivable process. The hiring and training of the accountants requires a significant investment of funds and time, which the company cannot afford. Linela decides to hire another accounting firm to manage its accounts receivable process and thereby save time and money. This process is known as ________. A) merging B) outsourcing C) headhunting D) diversifying
b
Machine code ________. A) is understandable by humans B) cannot be modified by humans C) is written by humans D) cannot be processed by computers
b
Marcus is a video editor who works for the film industry. His job involves editing large pictures, sounds, and video files. Given the nature of his job, Marcus will require a computer with a minimum speed of 3.5 Gigahertz and a(n) ________ processor. A) 32-bit B) dual C) quad D) 8-bit
b
The CPU stores the results of computations in ________. A) floppy disks B) main memory C) secondary memory D) network cards
b
The process of normalization constructs tables such that every table has a ________. A) one-to-one relationship between entities B) single theme C) foreign key D) specialized graphical query
b
The term ________ implies that either all transactions related to a traditional relational DBMS are processed or none of them are processed. A) consistent B) atomic C) durable D) isolated
b
Thin-client applications are typically limited by the capabilities of the ________. A) programming language B) browser C) hardware D) operating system
b
Thompson is the chief information officer at a processed food manufacturing company. The information systems used in the company are manufacturing oriented and provide little support to accounting. In this case, Thompson will most likely report to the ________ of the company. A) chief financial officer B) chief executive officer C) director of information services D) chief technology officer
b
Which of the following is a form of outsourcing hardware infrastructure? A) acquiring licensed products B) Infrastructure as a service (IaaS) cloud hosting C) Software as a Service (SaaS) D) business function
b
Which of the following is an example of storage hardware in computers? A) plotter B) magnetic disk C) projector D) inkjet printer
b
Which of the following is true of MySQL? A) It is a Microsoft product. B) It is license-free for most applications. C) It is a paid and proprietary database product. D) It uses Static Query Language (SQL) to manage a database.
b
Which of the following statements is true about a data administration staff function? A) The chief technology officer (CTO) heads the data administration staff function. B) The group establishes standards to protect information assets. C) This group includes system and network administrators exclusively. D) This group manages the process of creating new information systems.
b
Which of the following statements is true about firmware? A) The software is not coded like other software. B) Users do not need to load firmware into a device's memory. C) Firmware is the same as cache memory. D) Firmware cannot be changed or upgraded.
b
Which of the following statements is true about outsourcing? A) It increases budgetary instability due to the level of risk involved. B) It saves both direct and indirect management time. C) It invariably leads to diseconomies of scale. D) It guarantees a higher level of quality than that provided in-house.
b
Which of the following statements is true of the operations group in an organization's information system (IS) department? A) It establishes data standards and data management practices and policies. B) It monitors the user experience and responds to their problems. C) It manages all computing infrastructure except in-house server farms and communications media. D) It includes technical writers if the programs are developed in-house.
b
Which of the following statements refers to server virtualization? A) a personal computer, such as a desktop or portable computer, that hosts several different operating systems B) a server computer that hosts one or more other server computers C) a storage area that loses its contents when the power is off D) a server that hosts many versions of desktop operating systems
b
Which of the following terms refers to a collection of servers? A) server database B) server farm C) firmware D) shareware
b
________ is the process of converting a poorly-structured table into two or more well-structured tables. A) Optimization B) Normalization C) Refactoring D) Standardization
b
n an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. A) small oval B) vertical bar C) arrow D) triangular block
b
According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________.
bargaining power
Which among the following is the most appropriate technique for creating memorable, strong passwords?
base your password on the first letters of the words in a phrase
Focused differentiation occurs when _______.
better service is provided within an industry segment
Focused differentiation occurs when ________.
better service is provided within an industry segment
binary digits
bits
bytes
bits grouped into 8-bit chunks
true
both client and server computers need an operating system
Thin-client applications are typically limited by the capabilities of the ________.
browser
A __________ __________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.
business analyst
If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by ________.
business and systems analysts
In 2005, Marriott International chose Hewitt Associates to handle its human resources needs for the next 7 years. This is an example of ________ outsourcing.
business function
activity
business function that receives inputs and produces outputs. an activity can be performed by a human, by a computer system, or by both
A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
business process
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
business process
A(n) ________ is a network of activities that generate worth by transforming inputs into outputs.
business process
A(n) ___________ is a network of activities that generate worth by transforming inputs into outputs.
business process
a ______ _______ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
business process
The ________ created by Porter states that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.
business process design
Building competitive advantage through the streamlining of business processes to increase margin is known as ________.
business process management
_________ is a standard set of terms and graphical notations for documenting business processes.
business process modeling notation (BPMN)
switching costs
business strategy of locking in customers by making it difficult or expensive to change to another product or supplier
Drother Sports Inc. is a sports equipment provider that markets its products through a chain of retail outlets in three states. As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?
buying and installing new computers in the new outlets
Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. As part of its expansion strategy, the company decides to open outlets in four more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?
buying and installing new computers in the new outlets
Bits are grouped into 8-bit chunks called ________.
bytes
) A(n) ________ is a request for data from a database. A) form B) report C) query D) application
c
A ________ describes the data and relationships that will be stored in a database. A) data aggregator B) query model C) data model D) data application
c
A database is used instead of a spreadsheet when ________. A) lists of data involve a single theme B) structures of data lists are simple C) lists involve data with multiple themes D) users do not want to store all data in one place
c
A(n)________ is an example of storage hardware in computers. A) overhead projector B) keyboard C) magnetic disk D) barcode scanner
c
Acelane Inc., unlike its competitors, procures raw material from multiple suppliers. Each supplier in turn supplies raw material to many buyers, including Acelane. This is an example of a(n) ________ relationship. A) 1:N B) 1:1 C) N:M D) M:1
c
Android applications are developed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET
c
Bits are grouped into 8-bit chunks called ________. A) switches B) strings C) bytes D) kilobytes
c
Browser applications are thin-client applications that ________. A) use COBOL as the standard language for user-side processing B) are processed using VisualBasic and C++ C) need not be preinstalled on the users' computers D) depend on internal networks and not the Internet to transmit data
c
Browser-based applications ________. A) are thick-client applications B) can display only static content C) support graphical queries D) process queries using C++
c
Clark's microbiology report is due the next day. Being short on time, he collects most of the information for his report from an open-source Web browser. In this case, which of the following has Clark used to complete his report? A) Edge B) Ubuntu C) Firefox D) Apache
c
For Falcon Security, the primary purpose of creating a database of video information is to ________. A) keep track of a single theme B) eliminate concern about the lost update problem C) enable querying based on video characteristics D) avoid the use of spreadsheets
c
If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. A) programmers and development personnel B) PQA test engineers C) business and systems analysts D) technical writers
c
In 2005, Marrion International chose a human resources consulting agency to handle its human resource needs for the next 7 years. This is an example of ________ outsourcing. A) network B) software C) business function D) application
c
In ________ process, a server hosts many versions of desktop operating systems. A) PC virtualization B) server virtualization C) desktop virtualization D) application virtualization
c
In a data model, a(n) ________ is something that a user wants to track. A) record B) byte C) entity D) primary key
c
In a database, ________ are grouped into columns. A) fields B) records C) bytes D) files
c
In the information system (IS) department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems. A) operations B) technology C) development D) outsourcing relations
c
Linux applications are developed using ________ programming language. A) Objective-C B) C# C) Java D) VB.NET
c
Main memory is also known as ________. A) cache memory B) random access memory C) read-only memory D) optical memory
c
Metadata are ________. A) codes used for server-side processing B) error logs of databases C) data that describe data D) data that are encrypted
c
Outsourcing is done to ________. A) diversify the business portfolio B) increase costs for outsourcing vendors C) cap an organization's financial exposure D) enhance management's focus on nonessential functions
c
Rebecca is one of the few reliable programmers of her organization who is authorized to work on a closed source project. The project will be especially useful to track the progress of outsourced activities. Which of the following statements is most likely to be true of Rebecca's project? A) Only users and developers will be allowed to alter the source code of the project. B) Anyone could obtain the source code for the project. C) Only trusted programmers will be allowed to make changes to the project. D) Programmers could alter the source code based on their interests and goals.
c
Ryan, a database administrator, is in the process of designing his company's database. Which of the following would Ryan have had to create before he began designing? A) data aggregator B) query model C) data model D) data application
c
The ________ is the representative for information systems (IS) and information technology (IT) issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives. A) chief operating officer B) chief technology officer C) chief information officer D) chief executive officer
c
The forked lines on the lines representing relationship between two related entities are referred to as ________. A) identifiers B) foreign keys C) crow's feet D) entities
c
Virtualization is the process by which ________. A) a single server is used to host the operations of a workstation B) many computers are used to control a server C) one physical computer hosts many different virtual computers within it D) a single operating system is licensed for multiple computers
c
Which of the following devices is an example of a storage hardware device? A) barcode scanner B) central processing unit C) optical disk D) random access memory
c
Which of the following is a form of outsourcing? A) ANP Infotech buying off-the-shelf software from a vendor B) ANP Infotech customizing its information systems C) ANP Infotech acquiring licensed manufacturing software from a vendor D) ANP Infotech updating its data standards to protect its information assets
c
Which of the following is a function of the technology office in an organization's information systems (IS) department? A) managing computing infrastructure B) creating new information systems C) investigating new information systems D) maintaining existing information systems
c
Which of the following is a right of users of information systems? A) right to install programs and applications of their choice B) right to make hardware modifications when desired C) right to receive effective training D) right to obtain the configuration of their choice
c
Which of the following is a risk of outsourcing information systems (IS)/information technology (IT) functions? A) It is easier to end an agreement between a vendor and an organization that hired the vendor. B) It provides the hiring organization with too many choices. C) It involves the potential loss of intellectual capital. D) It invariably results in diseconomies of scale.
c
Which of the following is an example of a closed source project? A) Native Client B) Android C) Microsoft Office D) Ubuntu
c
Which of the following is an example of an open-source desktop operating system? A) Microsoft Windows B) Apache C) MySQL D) Ubuntu
c
Which of the following is an example of outsourcing an entire business function? A) acquiring licensed security software instead of developing it in-house B) making customizations to licensed software C) paying another organization to arrange for employee travel D) acquiring virtualization technologies
c
Which of the following is an international standard language for processing a database? A) Cassandra B) DB2 C) SQL D) MS Access
c
Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased? A) licensed software B) Infrastructure as a Service (IaaS) cloud hosting C) Software as a Service (SaaS) D) virtualization
c
Which of the following is true of traditional database application programs? A) Application forms, reports, and queries are displayed and processed using a browser application. B) The application logic is contained in a program on the client-side computer. C) They are written in object-oriented languages such as C++ and VisualBasic. D) They are thin-client applications that need not be preinstalled on the users' computers.
c
Which of the following mobile operating systems is licensed by Google? A) Blackberry OS B) Symbian C) Android D) Windows 10
c
Which of the following operating systems is used by Apple? A) Windows OS B) Symbian C) iOS D) Android
c
Which of the following statements is true about operating systems? A) The server operating system Linux is gradually being replaced by Unix. B) Android is a mobile operating system licensed by Apple. C) Nonmobile client operating systems are used on personal computers. D) iOS is the most popular server operating system.
c
Which of the following statements is true about self-driving cars? A) increased fuel consumption B) expensive and complex C) reduced car insurance cost D) cause fewer accidents
c
Which of the following statements is true about the maintenance group of information systems (IS)? A) It is undertaken by the business analysts. B) It is overseen by the chief technology officer. C) It involves adapting existing systems to support new features. D) It comprises developing test plans and designing automated test scripts.
c
Which of the following statements is true about users of information systems? A) They have a responsibility to protect their computers from viruses by installing their choice of antivirus software. B) They can avoid security and backup procedures. C) They should learn standard techniques and procedures for the applications they use. D) They should learn to install hardware and software on their own.
c
Which of the following statements is true of outsourcing? A) Management should have expertise on a subject before it can decide to outsource. B) An outsource vendor transfers the responsibility of risk management to the development group. C) To achieve quality, it is easier to hire another vendor than it is to fire and rehire internal staff. D) Outsourcing leads to increased financial risk.
c
Which of the following statements is true of the information systems (IS) department? A) If the IS primarily support accounting and finance activities, the chief financial officer (CFO) is appointed as the chief information officer (CIO). B) Programs used in all information systems are developed in-house by the maintenance group. C) The operations group monitors user experience and responds to user problems. D) Data administration is performed exclusively by the outsourcing relations group.
c
________ applications are programs that are written to use a particular operating system. A) Web B) Thin-client C) Native D) Browser
c
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another. A) Administrators B) Developers C) Users D) Designers
c
________ is a version of Unix that was developed by an open source community. A) Symbian OS B) Android C) Linux D) Mac OS
c
________ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication. A) Vertical-market software B) Application software C) Firmware D) Spyware
c
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. She should use a ________ to obtain the information that she wants from the database. A) report B) data model C) database administrative function D) query
d
Browser-based applications ________. A) need to be preinstalled on the users' computers B) run within a corporate network that is protected from the Internet C) eliminate the need to check for data consistency D) are more vulnerable to security threats than are traditional applications
d
Entities in a data model have ________ that describe the characteristics of the entity. A) characters B) primary keys C) codes D) attributes
d
Identify the first step in transforming a data model into a relational database design. A) representing the entity relationships B) normalizing the data and files C) creating foreign keys D) creating a table for each entity
d
Jamie's company manufactures 3D printers, and his job is to prepare user manuals for the products. Jamie also prepares training material for the workers who are involved in the manufacturing process. With reference to his job profile, Jamie is a ________. A) system analyst B) consultant C) programmer D) technical writer
d
Java, C#, and VB.NET are examples of ________. A) thin-client applications B) client operating systems C) structured queries D) object-oriented languages
d
KPL Inc. is an outsource vendor. It handles the recruiting process for Numero Uno Computers. KPL recently changed its business strategy to a more profit-oriented one. This modification would require the company to charge more for its services. This change will be a ________ risk for Numero Uno Computers. A) de facto sole source B) benefits outweighed by long-term costs C) no easy exit D) loss of control
d
Samuel is the database administrator for Zimline Constructions. He determines the processing rights of employees based on their designation. Team leaders are given greater access to the database than their team members. This procedure of giving selective access is part of Samuel's ________ task. A) development B) recovery C) adaptation D) operation
d
The columns in a database are called ________. A) records B) tables C) files D) fields
d
The modification or deletion of data in a database is an example of ________ operations of a database management system. A) statistical B) analytical C) administrative D) processing
d
The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies. A) technical writer B) chief financial officer C) system analyst D) chief technology officer
d
Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program. When Toby buys the program, he will actually be buying the software ________. A) copyright B) trademark C) patent D) license
d
Traditional database application programs are ________. A) browser-based and display dynamic content B) written in languages such as html5 and JavaScript C) entirely dependent on the database server for application logic D) thick applications that need to be installed on users' computers
d
Which of the following database administration tasks is related to adaptation? A) monitoring backup procedures B) conducting training for users C) monitoring database performance D) managing configuration changes in systems
d
Which of the following is a characteristic of volatile memory? A) processor heats up during the operation B) files are stored permanently C) processing of data is very slow D) contents are lost when power is off
d
Which of the following is a function of the steering committee for the information systems (IS) department? A) writing program code B) imparting training C) adapting software D) setting IS priorities
d
Which of the following is an example of a database management system? A) MS Excel B) BigData C) NoSQL D) Access
d
Which of the following is generally a responsibility of users of information systems (IS)? A) reporting trivial problems B) replacing legacy systems with improved ones C) installing unauthorized hardware and programs D) following security and backup procedures
d
Which of the following is true of N:M relationships? A) They are the same as N:N relationships. B) They represent minimum cardinalities in a relationship. C) They are also called one-to-many relationships. D) They can have more than one entity on each side of the relationship.
d
Which of the following is true of single-user databases? A) They are displayed and processed using html5, css3, and JavaScript. B) They use JavaScript for user-side processing. C) The Internet is used to access the DBMS server computer. D) The application, the DBMS, and the database all reside on the user's computer.
d
Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type? A) vertical bar B) arrow C) double line D) small oval
d
Which of the following operating systems was designed by Apple? A) Android B) Unix C) Linux D) Mac OS
d
Which of the following statements is true about information systems (IS) planning functions? A) The chief operating officer (COO) is the sole representative for IS and IT issues within the executive staff. B) The steering committee represents the IS department exclusively in high-level discussions. C) The information systems (IS) department's priorities are developed by the chief executive officer (CEO). D) The chief executive officer (CEO) and other executive staff decide the membership of the steering committee.
d
Unlike the primary activities, the support activities in the generic value chain do not contribute to the production, sale, and service of the product t/f
false
solid state storage (SSD)
faster than traditional magnetic storage
Which of the following statements is true about the steering committee of the information systems (IS) department? A) The steering committee is comprised of employees from the IS department in an organization. B) The steering committee's membership is determined by the IS department. C) The steering committee's schedule and agenda are typically set by the chief executive officer (CEO) and other members of the executive staff. D) The steering committee's meetings are conducted by the IS department.
d
________ in an E-R diagram refer to the least number of entities required in a relationship. A) Minimum candidate keys B) Primary keys C) Foreign keys D) Minimum cardinalities
d
A customer relationship management (CRM) system contains the names and phone numbers of customers. Such details stored in a CRM system are part of the ________ component.
data
A customer relationship management (CRM) system contains the names and phone numbers of customers. Such things stored in a CRM system are part of the ________ component.
data
The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.
data
The words that you type in an MS Word document is an example of ________.
data
You have a spreadsheet that provides the airfares to different cities from New York. If this is used to make a decision, it will be considered as ________.
data
Which of the following is the least critical aspect of good information?
data abundance
The purpose of a ________ group is to protect data and information assets by establishing data standards and data management practices and policies.
data administration
The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies.
data administration
Relational database
databases that carry their data in the form tables and that represent relationships using foreign keys.
data model
describes data and relationships that will be stored in the database.
true
desktop computers and Xboxes are not mobile devices
In ________ process, a server hosts many versions of desktop operating systems.
desktop virtualization
The main purpose of the planning phase in a project is to ________. set up the project scope and initial budget accomplish the project tasks effectively determine who will do what and by when establish team roles, responsibilities, and authorities determine completion
determine who will do what and by when
Competitive Strategy
determines the structure, features, and functions of every information system. (Porter's Four Competitive Strategies)
Identify a task that should be performed during the planning phase of project management. reporting project progress determining the schedule performing project tasks preparing archival documents form the team
determining the schedule
In the IS department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.
development
margin
difference between the value that an activity generated and the cost of the activity
Margin
difference between the value that an activity generates the cost of the activity.
A group of shoe manufacturing firms purchases raw materials collectively from a single supplier to obtain better deals. This is an example of obtaining competitive advantage by ________.
establishing alliances
Organizations can 'lock in' customers by making it difficult or expensive to switch to other products or services. This is called:
establishing high switching costs
Which of the following is true of information systems?
every information system has at least one application
how does an actual company use IS to create competitive advantages
ex: abc and shipping industry -had superior customer service -ease of customer business use by minimizing data ---------helps from making errors
Workgroup process
exists to enable workgroups to fulfill the charter, purpose and goals of particular group or department.
Edwin leads a team of fifteen programmers. He constantly changes the procedures that he uses to monitor, evaluate, and control the way his subordinates function. This shows his ability to ________.
experiment
A manager will essentially require ________ skills to test ideas clearly on a small scale, before taking bigger risks or committing significant resources to a larger project.
experimentation
________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
experimentation
In the context of Porter's five forces model, the bargaining power of customers of medicinal drugs is enhanced when pharmaceutical companies patent their products. t/f
false
Providing the lowest cost across an industry can be referred to as focused cost-leadership t/f
false
The difference between the value that an activity generates and the cost of the activity is called revenue. t/f
false
The structure of the information systems (IS) department remains constant across organizations.
false
Thin-client applications can seldom run within a computer browser.
false
Five forces model
five competitive forces determine industry profitability.
You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is ________.
inaccurate
A retail company sells agricultural produce and consumer products. The company procures materials from farmers and local producers. This process is an example of ________.
inbound logistics
As the purchasing manager of a company that designs costumes, Natalie orders yards of fabric in preparation for Halloween. Natalie's duties can be classified under the ________ category of a business process.
inbound logistics
Cassandra runs a downtown boutique that sells customized clothes. One of her customers wishes to purchase a trench coat with a bejeweled clip. Cassandra contacts "Gems and Stones" and places an order for the clip. This activity can be classified under ________.
inbound logistics
Reduction in production cost results in ________.
increased profitability
Reduction in production cost results in __________.
increased profitability
Bargaining power of customers is likely to be the highest for markets involving ________.
industrial products
Porter's five forces model is used to assess ________.
industry structure
An automobile company decides to improve the quality of its products and bring more variety into its entire product line. The company has decided to adopt ________.
industry-wide differentiation
Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.
information systems
Globus Corp. uses a software tool to manage its supply chain. This software tool is an ________ of the company's information system.
instruction on the computer side
Your company uses a software tool to manage its supply chain. This software tool is a(n) ________ of your company's information system.
instruction on the computer side
linkages
interactions across value activities
Linkages
interactions across value activities.
linkages
interactions across value activities.
(SQL) Structured Query Language
international standard language for processing a database.
Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.
introduced product differentiation
Which of the following is an example of vertical-market application software?
inventory tracking software for an automobile manufacturer
The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________.
irrelevant
You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________.
irrelevant
Information is considered inefficient if ________.
it is irrelevant to the subject
Information is considered to be bad if ________.
it is irrelevant to the subject
________ is equivalent to 1,024 bytes.
kilobyte
Which of the following is a common description of information?
knowledge derived from data
Which of the following is a common description of information? unbiased, unrelated data list of recorded facts or figures knowledge derived from data collection of unprocessed data
knowledge derived from data
Information
knowledge derived from data, whereas data is defined as recorded facts or figures.
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n) ________ is used.
layered protocol
Users should not bother IS personnel for trivial issues, so they have a responsibility to ________.
learn basic computer skills
Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program. When Toby buys the program, he will actually be buying the software ________.
license
When an individual buys a program for his or her personal computer, he or she is actually buying a software ________.
license
When an individual buys a program for his/her personal computer, he/she is actually buying a software ________.
license
true
native applications are sometimes called tick-client applications.
Madison, the project manager of a sports apparel company, estimates that the demand for jogging shoes is likely to decline in the coming months. He advises the procurement department to order raw material accordingly to ensure minimum wastage. This intercommunication that facilitates smooth operations is called ________.
linkages
Which of the following paved the way for the creation of a business process design?
linkages
false
linux applications are constructed using objective-C
false
linux is an open source variant of Mac OS.
Which of the following principles of competitive advantage is related to process implementations?
lock in buyers
Jason's Burgers, a famous diner, recently started taking orders online to reduce the customer wait time. This arrangement was perfect for busy office workers who frequented the place, and the sales went up considerably. Jason's Burgers attempted to ________.
lock in customers
process implementations
lock in customers/buyers lock in suppliers raise barriers to market entry establish alliances reduce costs
FunText is a company that owns an app used for text messaging. It recently offered a six month membership extension, to its existing customers, without any additional charges. Which competitive strategy is FunText trying to implement in this scenario?
locking in customers
The International Zoological club publishes a monthly magazine for zoology enthusiasts. Members are required to pay an initial fee to cover the first two years of the subscription when registering with the club. In this scenario, the International Zoological club is ________.
locking in customers
Which of the following principles of competitive advantage is related to process implementations? enhancing services locking in suppliers creating new products differentiating products
locking in suppliers
A new drug that has shown promise in curing skin cancer has been discovered by a famous chemical laboratory. This is the only known drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________.
low threat of substitutions
A new drug that has shown promise in curing skin cancer has been discovered by a famous chemical laboratory. This is the only known drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by __________.
low threat of substitutions
true
magnetic and optical disks are nonvolatile.
A(n)________ is an example of storage hardware in computers.
magnetic disk
Which of the following is an example of storage hardware in computers?
magnetic disk
Random Access Memory (RAM)
main memory
The CPU stores results of computations in the ________.
main memory
The CPU stores the results of computations in _____.
main memory
CPU works in conjunction with
main memory (RAM)
Abstract reasoning is the ability to ________.
make and manipulate models
Organizations can lock in suppliers either by making it difficult to switch to another organization or by___________.
making it east to work with the organization
experimentation
making reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ores, consistent with the resources you have.
(MIS)Management Information Systems
management and use of information systems that help organizations achieve their strategies.
Arie is a team lead for a group of engineers working on a new product. Arie decides to assign four additional engineers to the project to optimize corporate resources. His decisions, in this scenario, are ________ in nature. operational functional managerial strategic active
managerial
N:M
many-to-many relationships
The difference between the value that an activity generates and the cost of the activity is called the ________.
margin
Process effectivness
measure of how well a process archived organizational strategy.
Process efficency
measure of the ratio of process outputs to inputs.
Compared to in-house hosting, cloud-based hosting ________.
minimizes the risk of investing in technology than will soon become obsolete
true
mobile applications can share their device with other mobile applications.
A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access.
mobile device
false
mobile devices cannot be connected through cloud
false
mobile devices lack wireless connectivity features
false
mobile system users can move geographically, but they are restricted to using a single device.
true
mobile systems offer the potential of just-in-time data, which is data delivered to the user at the precise time it is needed.
A(n) ________ converts an analog signal to a digital one during data transmission.
modem
The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the details of each invoice drawn up in the previous quarter. This information is not good because it is ________.
more than what is required
Lynn, the manager of a transportation company, goes through the product delivery schedule. She assigns territories to each executive of the delivery team, and also contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
outbound logistics
Lynn, the manager of a transportation company, goes through the week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
outbound logistics
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?
outbound logistics
________ is the process of hiring another organization to perform a service.
outsourcing
Which is an example of outsourcing an entire business function?
paying another organization to arrange for employee travel
The five-component framework considers individuals who maintain the data and who support the networks of computers as ________ components.
people
Which of the following is a component of an information system but not of information technology?
people
Which of the following components constitute the human side of information systems?
people and procedures
Which of the following pairs of components constitutes the human side of information systems? hardware and people people and procedures software and procedures software and people
people and procedures
Information Age
period in history where production distribution, and control of information is the primary driver of the economy
In the context of systems implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced.
plunge
Crispies is a breakfast cereal manufacturing company. It is shifting its manufacturing process from batch processing to assembly line production. The information system for the assembly line is ready to be installed. Crispies decides to completely shut down the batch processing system and install the new assembly line. This style of conversion is known as _____________.
plunge installation
Which of the following ratios has fallen as a result of Moore's Law? profit/loss debt/equity demand/supply price/performance
price/performance
Which of the following ratios has fallen as a result of Moore's law?
price/performance
According to the five-component model of information systems, the ________ component functions as instructions for the people who use information systems.
procedure
You follow certain steps to access the supplementary readings for a course when using your organization's library management system. These steps that you follow are examples of the ________ component of an information system.
procedure
It is generally more difficult to make changes to the ________ of an information system than to the databases itself.
procedures
Which of the following is not an example of primary activities in the value chain?
procurement
Hueblue Software, an application provider to the gaming industry, decided to enhance its portfolio by developing motion-control-enabled games for the mobile gaming industry. In this scenario, which competitive strategy is Hueblue Software implementing?
product differentiation
Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing?
product differentiation
I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." A competitor made significant in-roads into the market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 Ice Cream implementing?
product differentiation
(IT) Information technology
products, method, inventions, and standards used for the purpose of producing information.
true
program instructions for programs, such as Microsoft Excel, are stored in the main memory of a computer.
(DBMS) Database management system
program used to create, process, and administer a database.
false
programmers cannot alter or add to an open source code.
five forces model
proposed by Michael porter that assesses industry characteristics and profitability by means of 5 competitive forces
Version management systems ________. lack the features needed to track changes to shared documents provide features and functions to accommodate concurrent work prevent more than one user from checking out the same document simultaneously provide version control to limit and direct user activity prevent group access to entire directories
provide features and functions to accommodate concurrent work
false
quad-processor computers have two CPUs.
Launch Cars, a car manufacturing company, has patented its breakthrough technology that reduces pollutant emission by half. The company is now an active supporter of anti-pollution laws that are likely to diminish the profitability of many other auto makers. Launch Cars is attempting to ________.
raise barriers to market entry
Which of the following principles of competitive advantage is related to process implementations?
raise the barriers to market entry
Cooper, the owner of a small bicycle manufacturing company, is striving to keep his organization running smoothly while remaining profitable in a highly competitive market. Cooper chooses process implementation to give his company a competitive edge over others. Which of the following principles is he most likely to implement?
reducing costs
PL Inc. implements an information system to improve its supply chain. The system helps the organization to reduce wastes and optimally utilize its resources. In this scenario, implementing the information system has helped PL Inc. to gain a competitive advantage by ________.
reducing its costs
Good information must be ________.
relevant
Neil creates an application which facilitates the easy storage and access of employee information like name, age, experience, and qualification for his organization. The application is an example of a(n) ________.
repository
A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.
router
Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?
sales and marketing
In a manufacturing business, which of the following transforms finished goods into cash?
sales process
According to Porter's five forces model, in which of the following examples would rivalry be considered as a weak force affecting the market?
search engine designers
Database
self-describing collection of integrated records.
Which of the following terms refers to a collection of servers?
server farm
Which of the following is a function of the steering committee for an IS department?
setting IS priorities
crows-foot diagram
shows maximum number of entities that can be involved in a relationship.
Which of the following is the distinguishing feature of a LAN as compared to a WAN?
single location
Adobe Acrobat is an application that allows users to create and edit digital documents. Adobe Acrobat is an example of a ________.
software
An operating system like Windows or Linux is an example of the ________ component of an information system.
software
Which of the following is an outsourcing alternative, in which hardware and both operating system and application software are leased?
software as a service (SaaS)
Entity
something that the users want to track.
true
source code is computer code as written by humans and understood by humans
Enterprise process
span on organization and support activities in multiple departments.
Inter-enterprise systems
span two or more independent organizations
CPUs vary in
speed, function, and cost.
Metcalfe's Law
states that the value of a network is equal to the square of the number of users connected to it.
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives.
steering committee
Kryder's Law
storage density on magnetic disks is increasing at an exponential rate.
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process. structured unstructured managerial strategic predictive
structured
RAC Associates is a car rental company that rents cars to tourists in the United States. The company uses tracking devices and magnetic locks to prevent car theft. These procedures are examples of ________.
supporting business processes
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.
switch
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
switching costs
A large software manufacturer attempts to lock in customers by making it difficult for them to substitute their software with one from another company. The strategy used by the company is referred to as ________.
switching costs strategy
true
symbian operating system is used for Nokia, Samsung, and other mobil devices.
business process management
systematic process of modeling, creating, implementing, and assessing business processes
A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.
systems analyst
________ _________ are information system professionals who understand both business and information technology
systems analysts
___________ are information system professionals who understand both business and information technology
systems analysts
___________ play a key role in moving development projects through the SDLC or scrum development process.
systems analysts
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
systems thinking
list the 5 main functions of the information systems (IS) department.
~Plan the use of IS to accomplish organizational goals and strategy. ~Develop, operate, and maintain the organization's computing infrastructure. ~Develop, operate, and maintain applications. ~Protect information assets. ~Manage outsourcing relationships.