MIS TEST 2

Ace your homework & exams now with Quizwiz!

You work for a highly successful advertiser that is about to expand nationally. Of utmost importance will be finding a way to store and disseminate its clients' frequently updated branding and style guides throughout the organization. The guides include multiple image files and text documents. What system will best serve these needs?

An extranet with KMS capabilities

The Nike Vapor Talon is an example of which of the following?

3-D printing

A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, usable by many parts of the business.

A enterprise system

Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012?

A failure of Amazon's cloud computing service

Which of the following illustrates the use of information systems to focus on market niche?

A hot tub dealer's use of information systems to determine which models and options its customers are most likely to buy

Which of the following systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance?

DSS

Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records?

DSS

________ support making decisions that are unique, rapidly changing, and not easily specified in advance.

DSS

Which of the following is the most common source of business system failure?

Data quality

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

Caterpillar Corporation is example of which of the following?

Domestic exporter

________ systems are those in which development occurs at the home base, but operations are handed over to autonomous units in foreign locations.

Duplicated

Which of the following refers to the purchase or sale of goods and services over the Internet?

E-commerce

Which type of system would you use to determine what trends in your supplier's industry will affect your firm the most in five years?

ESS

Which of the following is an example of a key force in a firm's broader, less immediate environment?

Economic Trends

What is the most important benefit of an enterprise application?

Enabling business functions and departments to share information

Which of the following systems are designed to support organization-wide process coordination and integration?

Enterprise applications

Which of the following is not one of the competitive forces in Porter's model?

External environment

Which of the following types of systems could be used to enable different firms to work collaboratively on a product?

Extranet

You manage the Information Systems department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics, such as views and click-throughs, about their current display ads. Which type of system will most efficiently provide a solution?

Extranet

You have been hired by Inspiration Inc. to help improve its profit margin. Inspiration Inc. is a business communications consulting firm that services many clients in different industries throughout the world. The firm provides its clients with customized written recommendations about how to best use the client's existing resources to improve the client's internal communications. The company has approximately 100 consultants, all of whom are located in its central headquarters in Chicago. What system do you recommend to improve Inspiration Inc.'s business processes and increase its profit margin?

Extranet, to enable quick collaboration via the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed

A payroll system is a typical example of an MIS.

False

A safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision.

False

Advances in data storage have made routine violation of individual privacy more difficult.

False

Any unsolicited email is legally considered spam.

False

BPM ends once the new processes are both implemented and accepted.

False

Benchmarks are specific standards for business processes set by industry leaders.

False

Business processes that impede organizational responsiveness are a source of competitive strength for a company.

False

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime. Question 250 options:

False

ESSs are designed primarily to solve specific problems.

False

ESSs are designed to serve the middle management of the organization.

False

Every business process is tied to one specific functional area.

False

In a transparent marketplace, there is high product differentiation.

False

In today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

False

Middle management is responsible for directing the day-to-day activities of the business.

False

Most American and European privacy law is based on a set of five principles called COPPA.

False

Most MISs use sophisticated mathematical models or statistical techniques.

False

Product differentiation is one of the four basic competitive strategies.

False

Quality control is the sole goal of six sigma.

False

Strong linkages to customers and suppliers decrease switching costs.

False

Studies show that less than one-quarter of a business firm's profits can be explained by alignment of IT with business.

False

TQM derives from concepts developed by Japanese quality experts

False

The activities that measure the performance of your business processes against strict standards are called best practices.

False

The inventors of a disruptive technology typically benefit the most from the technology; and it is rare that fast followers catch up quickly.

False

The key concepts in patent law are originality, novelty, and value.

False

The last step in analyzing an ethical issue should be to identify the stakeholders.

False

The law of diminishing returns does not apply to traditional products.

False

The more people that use Microsoft Office software and related products, the lower its value.

False

The most significant barrier to successful business process change is, ironically, management itself.

False

The principal purpose of a TPS is to answer nonroutine questions and track the flow of transactions through an organization.

False

The rate of global piracy is approximately 20%.

False

The utilitarian principle asks you to put yourself in the place of others, and think of yourself as the object of the decision.

False

Enterprise systems do not utilize order transaction data.

Fasle

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy?

Firms should limit the length of time that any personal data is stored to six months or less.

Which of the following statements about Flash cookies is not true?

Flash cookies are installed only at the user's request.

________ typically develop a single information system, usually at the home base, and then replicate it around the world.

Franchisers

Which of the following Google tools allows people to engage in group video chat?

Google Hangouts

Which of the following gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Which of the following is not a service typically provided by an information systems department?

Human resources services

Policies that determine which information technology will be used, when, and how, are provided by:

IT standards services

Which of the following is the first step in BPM?

Identify processes for change

From your reading of the chapter-opening case study discussing ABB's use of enterprise social networking, which of the following statements best expresses ABB's experience?

Implementing Yammer improved employee productivity and collaboration.

Which of the five moral dimensions of the information age do the central business activities of DoubleClick raise?

Information rights and obligations

Which of the following technologies permits service calls to U.S. companies to be answered in India just as easily and inexpensively as if the help desk were in the United States?

Internet telephony

Which of the following is a primary drawback of the "do anything anywhere" computing environment?

It blurs the traditional boundaries between work and family time.

Which of the following statements about Plan International's new human resources system, as described in the chapter case, is not true?

It took six months to implement a working system at Plan International's international headquarters.

As discussed in the chapter case, what is the primary reason why Spacebook failed?

It was designed and developed without taking the organization's culture into consideration.

A colleague of yours frequently takes small amounts of office supplies for his own personal use, noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

Kant's categorical imperative

Which of the following companies used benchmarking to achieve an order-shipping accuracy of 99.9 percent?

L.L Bean

Which of the following systems are designed to summarize and report on the company's basic operations?

MIS

Which type of system would you use to determine the five suppliers with the worst record in delivering goods on time?

MIS

A relocation control system that reports summaries on the total moving, house-hunting, and home financing costs for employees in all company divisions would fall into the category of a/a

MIS.

________ is the ability to offer individually tailored products or services using the same production resources as bulk production.

Mass customization

a data analysis technology that finds hidden connections between data in disparate sources.

NORA

What percent of global Internet users use Google Search and other Google services?

Nearly 80 percent

A manufacturer of deep-sea oil rigs may be least concerned about which of these marketplace forces?

New market entrants

Cisco's WebEx is an example of which of the following types of collaboration tools?

Online meeting

The NAI is an industry association formed to help with which of the following?

Online privacy issues

TRUSTe is an example of which of the following?

Online seal program

Which of the following is an interorganizational business process?

Ordering raw materials

Which of the following is not a file-sharing service?

Pandora

________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.

Patent law

Which of the following restricts the information the U.S. federal government can collect and regulates what it can do with the information?

Privacy Act of 1974

Which of the following would a CSO not be responsible for?

Providing physical security

________ can be induced by tens of thousands of repetitions under low-impact loads.

RSI

________ are not held liable for the messages they transmit.

Regulated common carriers

Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?

SCM system

The U.S. Department of Commerce developed a(n) ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

Safe harbor

Which of the following industries has the lowest barrier to entry?

Small retailer

Final assembly of iPhones occurs in which of the following countries?

South Korea

Which of the following statements about spam is not true?

Spamming is less regulated in Europe than in the United States.

To what competitive force did the printed encyclopedia industry succumb?

Substitute products or services

________ systems integrate and share information from suppliers, manufacturers, distributors, and logistics companies.

Supply chain management

Seeing quality as the responsibility of all people and functions in an organization is central to the concept of:

TQM

A firm can be said to have competitive advantage when it has access to resources that others do not.

TRUE

The effect of the Internet has been to increase a company's bargaining power vis-à-vis its suppliers.

TRUE

In the value chain model, primary activities are those that are most directly related to the production and distribution of the firm's products and services.

TRue

________ technology allows a videoconference participant to give the appearance of being present at a location other than his or her true physical location.

Telepresence

Which of the following is not a true statement with respect to business processes?

The efficiency of a business firm is not related to its business processes.

Which of the following statements about cycle time is not true?

The fewer steps in a production process, the more likely that an error will occur.

Which of the following can typically access a company's intranet?

The firm's employees

Which of the following is not true about the changes to EU data protection rules proposed in 2012?

The new rules would reject the right to be forgotten.

_________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

The opt-in model

Which of the following is not a difficulty in establishing patent protection?

The requirement that the work must be a secret

Which of the following is not an advantage for new companies entering the marketplace?

They can establish new relationships with suppliers.

Which of the following best describes how new information systems can result in legal gray areas?

They result in new situations that are not covered by old laws.

What analytical framework discussed in the chapter helps understand and evaluate the benefits and uses of collaboration tools?

Time/space matrix

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

Which of the following can force a business and its competitors to compete on price alone?

Transparent marketplace

A TPS helps managers monitor the firm's relations with the external environment.

True

A business is a formal organization created to sell services or products at a profit.

True

A drawback to copyright protection is that the ideas underlying the work are not protected, only their manifestation in the work.

True

A primary challenge in BPM is employee resistance.

True

A value web is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market.

True

A web beacon is a tiny object embedded in email messages and web pages that is designed to monitor online Internet user behavior.

True

An MIS primarily supports routine decision making.

True

An MIS typically uses data supplied by a TPS.

True

Business process reengineering involves the radical redesign of business processes.

True

Computer abuse involves the commission of acts involving the computer that may not be illegal but are considered unethical.

True

Copyright is the legal protection afforded intellectual property such as a song, book, or video game.

True

Decision-support systems often use information from external sources.

True

End users are representatives of departments outside of the information systems group for whom applications are developed. T or F

True

Ethics refers to the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

True

European countries do not allow businesses to use personally identifiable information without consumers' prior consent.

True

Franchisers are firms that have their product created, designed, financed, and initially produced in the home country but rely heavily on foreign personnel for further production, marketing, and human resources.

True

In a firm hierarchy, responsibility and accountability is concentrated at the top.

True

Information supplied by an enterprise system is structured around cross-functional business processes.

True

Information systems found in nonprofit organizations are typically very similar to those found in private industry.

True

Knowledge management systems and customer relationship management systems are both types of enterprise applications.

True

Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations.

True

Most Internet businesses do very little to protect the privacy of their customers.

True

Operational-level manufacturing systems provide transaction-level information that enable monitoring of the daily activities of a business.

True

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

True

Probably the best single way to reduce quality problems is to reduce cycle time.

True

Professionals have special rights and obligations because of their claims to knowledge, wisdom, and respect.

True

Protections for trade secrets vary from state to state.

True

Some experts believe exposure to computers makes people dumb.

True

Spyware is software that comes hidden in downloaded applications and can track your online movements.

True

Supply chain management systems are more externally oriented than enterprise systems.

True

Systems analysts are highly trained technical specialists who write the software instructions for computers. T or F

True

Teams are formal business groups that are created to accomplish a specific task. T or F

True

The European Parliament has passed a ban on unsolicited commercial messaging.

True

The Internet has intensified competitive rivalry.

True

The most common type of computer-related RSI is CTS.

True

The primary goal of social business is to deepen interactions with employees and customers. T or F

True

The value chain model classifies all company activities as either primary or support.

True

When the output of some units can be used as inputs to other units, synergies develop, which can lower cost and generate profits.

True

The FIP principle of Notice/Awareness states that:

Websites must disclose their information practices before collecting data.

According to a Wall Street Journal study, all of the following websites installed tracking files on visitor computers except:

Wikipedia

The introduction of new information technology has:

a ripple effect, raising new ethical, social, and political issues.

Benchmarking:

compares the efficiency and effectiveness of your business processes against strict standards.

BPM tools can do all of the following except:

create a digital model of a part, product or structure.

All of the following are technical solutions to protecting user privacy except:

data use policies

Employees that assist with paperwork at all levels of the firm are called:

data workers.

In a ________ system configuration, separate information systems are designed and managed by each foreign unit.

decentralized

The ________ strategy is characterized by heavy centralization of corporate activities in the home country of origin.

domestic exporter

The use of digital technology and the Internet to execute the major business processes in the enterprise is called:

e-business.

1 / 1 point Digital media differs from a physical book in all of the following ways except:

ease of establishing uniqueness.

All of the following are psychological aspects of quality except:

effective marketing

The Online Privacy Alliance:

encourages self-regulation to develop a set of privacy guidelines for its members.

An information system can enhance core competencies by:

encouraging the sharing of knowledge across business units.

All of the following could be considered substitute products for industrial electricity generation except:

ethanol

CVS refers to:

eyestrain related to computer display screen use.

Hilton Hotels' use of customer information software to identify the most profitable customers to direct its services to is an example of using information systems to:

focus on market niche.

The value chain model:

helps a firm identify points at which information technology can most effectively enhance its competitive position

Immanuel Kant's categorical imperative states that:

if an action is not right for everyone to take, it is not right for anyone to take.

The ethical "no free lunch

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

All of the following are ways to improve quality except:

implementing a new information system.

In network economics, the value of a commercial software vendor's software products:

increases as more people use them.

Redesigning and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses.

An information system can enable a company to focus on a market niche through:

intensive customer data analysis.

Supply chain management systems are considered to be a(n) ________ because they automate the flow of information across company boundaries.

interorganizational system

Suppliers, customers, employees, products and services, and ________ are the five basic components with which businesses must deal.

invoices and payments

Engineers and scientists are examples of:

knowledge workers.

An ESS is an information system that supports the:

long-range planning activities of senior management.

Internet technology:

makes it easy for rivals to compete on price alone.

The Internet raises the bargaining power of customers most effectively by:

making information available to everyone.

Producing a bill of materials is a responsibility of the ________ function.

manufacturing and production

When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy.

market niche

The term management information systems refers to a specific category of information systems serving:

middle management functions.

All of the following have been disruptive technologies except:

minicomputers.

A firm can exercise greater control over its suppliers by having:

more suppliers

The ________ strategy concentrates financial management and control out of a central home base while decentralizing production, sales, and marketing operations to units in other countries.

multinational

FIP principles are based on the notion of the:

mutuality of interest between the record holder and the individual.

When a cookie is created during a website visit, it is stored: Question options:

on the hard drive of the visitor's computer.

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

opt-out

The support activities of a firm include:

organization infrastructure, human resources, technology, and procurement.

All of the following are considered primary activities of a firm except

procurement.

All of the following are current key technology trends raising ethical issues except:

profiling

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:

property rights and obligations.

Walmart's continuous replenishment system allows it to do all of the following except:

provide mass customization.

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:

quality of life.

Interaction jobs are those jobs which:

require close coordination and collaboration.

The U.S. CAN-SPAM Act:

requires commercial email senders to identify themselves.

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:

responsibility

According to the ________, you should take the action that produces the least harm.

risk aversion principle

Identifying potential customers for the businesses' products or services is an activity associated with the ________ function.

sales and marketing

The three principal levels of hierarchies within a business organization are:

senior management, middle management, and operational management.

The goal of social commerce applications is to:

share opinions about purchasing products or services.

The reduction of errors to 3.4 defects per million opportunities is central to the concept of:

six sigma

Instant messaging, videoconferencing, and shared screens are all examples of ________ collaboration tools.

synchronous

When the output of some units can be used as inputs to other units, or if two organizations pool markets and expertise that result in lower costs and generate profits, ________ are created.

synergies

The principal liaison between the information systems groups and the rest of the organization is a(n):

systems analyst.

Key forces in a business's immediate environment include:

technological innovations.

All of the following laws apply to actions by the federal government except:

the Children's Online Privacy Protection Act.

Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression.

The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as:

the law of diminishing returns.

The emergence of software as a web service has acted as a disruptive technology for:

traditional boxed software companies.

A ________ is a collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively.

value web

Second Life is an example of a(n):

virtual world.

A wiki is a type of collaborative:

website

Which of the following were involved in what has been called the patent trial of the century?

Apple and Samsung

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

Assign responsibility

Based on your reading of the chapter case, which of the following did Datacard implement to increase revenue, customer satisfaction, operational efficiency, and employee productivity?

BPR

How are information systems used at the industry level to achieve strategic advantage?

By building industry-wide, IT-supported consortia and symposia

You are the production manager for a manufacturer of bicycle parts. Which of the following tools or technologies would you use to improve production precision?

CAD software

Which of the following would be primarily responsible for enterprise-wide governance and usage of information to maximize the value of an organization's data?

CDO

A ________ is a senior manager who oversees the use of IT in the firm.

CIO

Which of the following is most likely to have direct responsibility for ensuring that his or her company complies with existing data privacy laws?

CPO

________ provide information to coordinate all of the business processes that deal with customers in sales, marketing, and service to optimize revenue, customer satisfaction, and customer retention.

CRM systems

A firm that locates all systems development and operations at its headquarters is using a ________ system configuration.

Centralized

Which of the following statements is not true about collaboration in a business setting?

Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity

Which of the following is not one of the four basic strategies a company can employ to deal with competitive forces?

Compete on employee loyalty

Which of the following is not a U.S. federal law affecting private institutions?

Computer Matching and Privacy Protection Act

Which of the following protects the authors of a book from having their work copied by others?

Copyright law

In a business environment, the focus of collaboration is to:

accomplish the task at hand.

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:

accountability

Development and support services for a firm's business systems are provided by:

application software services.

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.

behavioral targeting

The most successful solutions or methods for achieving a business objective are called:

best practices.

DSS and MIS are also referred to as ________ systems.

business intelligence


Related study sets

Chapter 10- Essential Peripherals

View Set

HY 136 Cooke | Test 1 Study Guide Multiple Choice

View Set

T-38 Instruments/Nav Shooters Gouge

View Set