MNGT Final Multiple choice & T/F practice

Ace your homework & exams now with Quizwiz!

10 You have been hired by BizCom to help it improve its business processes and financial performance. BizCom is a business communications consulting firm that services many clients in different industries throughout the United States. BizCom provides customized written recommendations about how to best use a client's existing resources to improve the client's internal communications. The company has approximately 50 consultants, all of whom are located in its central headquarters in Alexandria, Virginia. Which of the following would you recommend that BizCom install? A) Extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with its clients, and minimize the amount of paperwork needed B) CRM, to maintain easily accessible customer records to minimize the time spent looking for client data C) KMS, to minimize redundant work on similar clients D) MIS, to produce reports on the firm's operations E) TPS, to help manage all daily activities and transactions

A) Extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with its clients, and minimize the amount of paperwork needed

1 As discussed in the chapter-opening case, AWM Smart Shelf can help brands and retailers achieve which of the following? A) Increased customer intimacy B) Survival C) Improved employee morale D) Development of new products E)Increased suppliers intimacy

A) Increased customer intimacy

15 ________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors. A) Product differentiation B) Low-cost leadership C) Focusing on market niche D) Strengthening customer intimacy E) Strengthening supplier intimacy

A) Product differentiation

20 The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware

A) Profiling

17 Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? A) Security B) Controls C) Benchmarking D) Algorithms E) Identity management

A) Security

15 Which of the following typically makes the unstructured decisions for a firm? A) Senior management, B) Middle management, C) Operational management D) Individual employees, E) Teams

A) Senior management

6 Which of the following makes long-range strategic decisions about products and services as well as ensures financial performance of the firm? A) Senior management B) Middle management C) Production workers D) Operational management E) Knowledge workers

A) Senior management

17 The concept of management ________ involves situations in which managers act on preconceived notions that reject information that does not conform to their prior conceptions. A) filters, B) backgrounds, C) inertia, D) inefficiency, E) politics

A) filters

9 A VPN: A) is an encrypted private network configured within a public network B) is more expensive than a dedicated network C) provides secure, encrypted communications using Telnet D) is an Internet-based service for delivering voice communications E) is a proprietary networking service technology developed by individual corporations

A) is an encrypted private network configured within a public network

4 A firewall allows the organization to: A) prevent unauthorized communication into and out of its network B) check the accuracy of all transactions between its network and the Internet C) create an enterprise system on the Internet D) check content of incoming and outgoing email messages E) create access rules for a network.

A) prevent unauthorized communication into and out of its network

20 The Gramm-Leach-Bliley Act: A) requires financial institutions to ensure the security of customer data B) specifies best practices in information systems security and control C) imposes responsibility on companies and management to safeguard the accuracy of financial information D) outlines medical security and privacy rules E) identifies computer abuse as a crime and defines abusive activities.

A) requires financial institutions to ensure the security of customer data

12 Which of the following provides a suite of integrated software modules and a common central database that allows data to be used by multiple functions and business processes? A) Process management software B) ERP systems C) Groupware D) CRM software E) Supply chain management systems

B) ERP systems

9 What is the most important benefit of an enterprise application? A) Enabling the creation of business intelligence B) Helping businesses become more flexible and productive by enabling business functions and departments to share information and coordinate their business processes more closely C) Providing answers to nonroutine questions D) Enabling cost-effective e-business processes E) Enabling managers to make better decisions

B) Helping businesses become more flexible and productive by enabling business functions and departments to share information and coordinate their business processes more closely

16 The role of spokesperson falls into which of Mintzberg's managerial classifications? A) Decisional, B) Informational, C) Interpersonal, D) Symbolic, E) Organizational

B) Informational

2 What is the primary benefit to consumers of disintermediation? A) Faster service, B) Lower costs, C) Higher quality, D) Greater choices E) None, because disintermediation primarily benefits manufacturers.

B) Lower costs

11 Struggles for resources, competition, and conflict within an organization that result from divergent viewpoints about how resources, rewards, and punishments should be distributed are an example of which of the following? A) Organizational culture B) Organizational politics C) Organizational structure D) Organizational environment E) Business processes

B) Organizational politics

1 ________ is malware that hijacks a user's computer and demands payment in return for giving back access. A) A Trojan horse B) Ransomware C) Spyware D) A virus E) An evil twin

B) Ransomware

8 Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) Modality B) Scalability C) Expandability D) Disintermediation E) Customizability

B) Scalability

19 Which method is used to assign weights to various features of a system? A) Information systems plan, B) Scoring model, C) Portfolio analysis D) TCO analysis, E) Capital budget

B) Scoring model

5 Which of the following statements about blockchain is not true? A) Once recorded, a blockchain transaction cannot be changed B) The data represented in a blockchain is maintained in a central database C) The records in a blockchain are secured through cryptography D) Each block in a blockchain is connected to all the blocks before and after it E) Blockchain is vulnerable in some of the same ways as conventional, centralized record-keeping systems

B) The data represented in a blockchain is maintained in a central database

2 Which of the following statements about digital firms is not true? A) In digital firms, time shifting and space shifting are the norm. B) Today, most firms are fully digital. C) Digital firms offer extraordinary opportunities for flexible global organization and management. D) Digital firms sense and respond to their environments more rapidly than traditional firms. E) Digital firms have more flexibility to survive in turbulent times.

B) Today, most firms are fully digital.

5 Which of the following involves where, when, and how to apply knowledge? A) Data, B) Wisdom, C) Tacit knowledge, D) Explicit knowledge, E) Organizational learning

B) Wisdom

1 Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party. A) transparency, B) asymmetry, C) complexity, D) discrimination, E) competition

B) asymmetry

6 The text defines ________ as flows of events or transactions captured by an organization's systems. A) information, B) data, C) wisdom, D) knowledge, E) experience

B) data

11 The domain .gov is a(n): A) Internet root domain B) top-level domain C) host domain D) network domain E) third level domain

B) top-level domain

12 When there is no well-understood or agreed-on procedure for making a decision, it is said to be: A) undocumented, B) unstructured, C) documented, D) semistructured, E) random.

B) unstructured

9 Which of the following is not a major benefit of expert systems? A) Improved decisions, B) Better quality and service, C) Ability to scale to deal with very large data sets, D) Reduced errors, E) Reduced training time

C) Ability to scale to deal with very large data sets

19 Which of the following focuses primarily on the technical issues of keeping systems up and running? A) Business continuity planning B) Security policies C) Disaster recovery planning D) An AUP E) An information systems audit

C) Disaster recovery planning

7 Which of the following is an example of a cross-functional business process? A) Identifying customers B) Shipping a product C) Fulfilling a customer order D) Hiring employees E) Paying creditors

C) Fulfilling a customer order

7 Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? A) Edge computing B) Cloud computing C) Green computing D) Utility computing E) On-demand computing

C) Green computing

3 An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following? A) Security policy B) AUP C) Risk assessment D) Business impact analysis E) Business continuity plan

C) Risk assessment

13 Which type of decision is determining vacation eligibility for an employee? A) Semistructured, B) Procedural, C) Structured, D) Unstructured, E) Ad hoc

C) Structured

6 Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources? A) Cloud computing B) Autonomic computing C) Virtualization D) Multicore processing E) Ubiquitous computing

C) Virtualization

2 The Sarbanes-Oxley Act: A) requires financial institutions to ensure the security of customer data B) specifies best practices in information systems security and control C) imposes responsibility on companies and management to safeguard the accuracy of financial information D) outlines medical security and privacy rules E) identifies computer abuse as a crime and defines abusive activities.

C) imposes responsibility on companies and management to safeguard the accuracy of financial information

13 Enterprise systems improve management decision making in all the following ways except: A) providing up-to-the-minute data on sales, inventory, and production. B) providing more accurate sales and production forecasts. C) improving forecasts of consumer behavior. D) implementing standard definitions and formats worldwide. E) determining the profitability of products.

C) improving forecasts of consumer behavior.

14 The Internet increases the bargaining power of customers by: A) creating new opportunities for building loyal customer bases. B) making more products available. C) making information available to everyone. D) lowering transaction costs. E) enabling the development of new services.

C) making information available to everyone.

3 Amazon.com is known primarily for its use of which of the following business models? A) Content provider, B) Portal, C) Market creator, D) E-tailer, E) Transaction broker

D) E-tailer

13 Which of the following statements about Porter's competitive forces model is not true? A) Porter's competitive forces model is the most widely used model for understanding competitive advantage. B) Porter's model focuses on a firm's general business environment. C) The more substitute products and services in an industry, the less a firm can control pricing and the lower the firm's profit margins. D) In a free economy, there are very low barriers to entry in all industries. E) The power of customers grows if they can easily switch to a competitor's products and services.

D) In a free economy, there are very low barriers to entry in all industries.

19 Which of the following is a primary drawback to the "do anything anywhere" computing environment? A) It makes work environments less pleasant. B) It creates a digital divide. C) It centralizes power at corporate headquarters. D) It blurs the traditional boundaries between work and family time. E) It leads to employees being paid less for the total amount of work performed.

D) It blurs the traditional boundaries between work and family time.

8 Which level of the organization is an ESS specifically designed to serve? A) Operational management B) End-users C) Middle management D) Senior management E) Knowledge workers

D) Senior management

5 Which of the following best describes the primary reason for implementing a new information system, from a business perspective? A) The system enables the firm to create new products and services. B) The system will create new value for the firm, beyond its costs. C) The system will automate key business processes. D) The system is in use by our primary competitors. E) The system integrates well with the Web.

D) The system is in use by our primary competitors.

10 Client/server computing is a: A) network that connects sensors to desktop computers B) network where centralized mainframe computers serve local devices C) centralized model of computing for large corporations D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer E) centralized computing model where local computers are connected to one another by a network

D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer

20 All of the following are indications of a failed information systems project except: A) employees are refusing to switch to the new system, B) employees have created a spreadsheet solution to manipulate the data generated by the system, C) a redesigned website has fewer visits to the customer support pages, D) employees require training to properly use the system, E) the system is not being used by anyone.

D) employees require training to properly use the system

16 The ethical no-free-lunch rule states that: A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E) if an action is not right for everyone to take, it is not right for anyone to take.

D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

4 Output: A) is feedback that has been processed to create meaningful information. B) is information that is returned to appropriate members of the organization to help them evaluate the input stage. C) transforms raw data into processed information. D) transfers processed information to the people who will use it or to the activities for which it will be used. E) is a stream of raw facts representing events occurring in organizations or the physical environment.

D) transfers processed information to the people who will use it or to the activities for which it will be used.

14 The ________ includes a company's suppliers, the suppliers' suppliers, and the processes for managing relationships with them? A) supplier's internal supply chain B) logistics supply chain C) downstream portion of the supply chain D) upstream portion of the supply chain E) intermediate portion of the supply chain

D) upstream portion of the supply chain

18 Which of the following is by far the most common source of business system failure? A) Software bugs B) Software errors C) Hardware failures D) Facilities failures E) Data quality

E) Data quality

16 CRM systems help businesses achieve which of the following business objectives? A) Automated accounting processes B) Automated production forecasts C) Faster time to market with new products and services D) Enhanced supplier intimacy E) Enhanced customer intimacy

E) Enhanced customer intimacy

10 A chatbot is an example of which of the following? A) Computer vision system, B) Genetic algorithm, C) Augmented reality D) Virtual reality system, E) Intelligent agent

E) Intelligent agent

17 Which of the following is not a feature of the General Data Protection Regulation (GDPR)? A) It applies to all firms doing business in the EU. B) Its protections of the privacy rights of EU citizens apply worldwide, regardless of where processing of the data takes places. C) It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue. D) It creates a single EU privacy policy. E) It prevents firms from using cookies.

E) It prevents firms from using cookies.

8 Which of the following is not one of the main four dimensions of knowledge described in the chapter? A) Knowledge is a firm asset, B) Knowledge has different forms, C) Knowledge has a location D) Knowledge is situational, E) Knowledge is timeless.

E) Knowledge is timeless

12 Which of the following industries has the lowest barrier to entry? A) Automotive B) Computer chip C) Solar energy D) Airline E) Small retailer

E) Small retailer

11 ________ knowledge exists in formal documents, as well as in formal rules that organizations derive by observing experts and their decision-making behaviors. A) Unstructured, B) Tacit, C) Management, D) Explicit, E) Structured

E) Structured

18 Location analytics can be used for all of the following except: A) helping a marketer to determine which people to target with mobile ads, B) quantifying the impact of mobile ads on in-store visits, C) package tracking and delivery routing systems, D) determining where to open a new store, E) determining call center resolution rates.

E) determining call center resolution rates

4 Compared to digital goods, traditional goods have: A) lower inventory costs, B) lower marginal costs per unit C) lower copying costs. D) more variable pricing, E) higher costs of distribution.

E) higher costs of distribution

15 The business value of an effective supply chain management system includes all of the following except: A) faster time to market B) cost reduction C) supply matched to demand D) improved delivery service E) increased inventory levels

E) increased inventory levels

3 The three activities in an information system that produce the information organizations use to make decisions, control operations, analyze problems, and create new products are: A) information, research, and analysis. B) input, output, and feedback. C) data, information, and analysis. D) data analysis, processing, and feedback. E) input, processing, and output.

E) input, processing, and output.

7 The text defines ________ as expertise of organizational members that has not been formally documented. A) wisdom, B) information, C) data, D) experience, E) tacit knowledge

E) tacit knowledge

18 All of the following have contributed to an increase in software flaws except: A) the growing complexity of software programs B) the growing size of software programs C) demands for timely delivery to markets D) the inability to fully test programs E) the increase in the number of computer hackers in the world.

E) the increase in the number of computer hackers in the world.

14 Establishing a firm's long-term goals is an example of a(n) ________ decision. A) structured, B) analytic, C) semistructured, D) undocumented, E) unstructured

E) unstructured

1 Knowledge workers make long-range strategic decisions about products and services. T/F

False

2 Detailed, programmed instructions that control computer hardware components in an information system are known as computer software. T/F

True

3 Outsourcing has accelerated the development of new information systems in the United States. T/F

True

10 IT infrastructure consists of only those physical computing devices and software required to operate the enterprise. t/f

false

2 Most IoT devices support sophisticated security approaches. t/f

false

2 The term switching costs refers to a merchant's costs of changing prices. t/f

false

3 Behavioral targeting cannot be used if a consumer is using a mobile app. t/f

false

4 Managers rely on TPS for nonroutine decision making. t/f

false

4 Mobile devices typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses, and therefore do not require any special protections. t/f

false

4 The impacts of knowledge-based investments are easy to measure. t/f

false

6 An expert system cannot consider multiple rules at the same time. t/f

false

6 Quantum computing is a common method of reducing technology costs by providing the ability to host multiple systems on a single physical machine. t/f

false

7 Mintzberg's classification identifies five forces in an industry's environment that affect the strategic position of a firm.

false

8 COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on. t/f

false

8 Firms in the supply chain develop safety stocks in order to reduce the cost of inventory. t/f

false

1 DoS attacks flood a network server with thousands of requests for service. t/f

true

1 In general, for digital goods, the marginal cost of producing another unit is about zero. t/f

true

10 Data visualization technologies are used to help human users see patterns and relationships in large amounts of data. t/f

true

10 The claim to privacy is protected by the U.S. Constitution. t/f

true

3 An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment. t/f

true

5 Customer relationship management systems coordinate all of the business processes that deal with customers in sales, marketing, and service. t/f

true

5 Document management systems are essentially large databases. t/f

true

5 Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business. t/f

true

6 A company's competitive advantages ultimately translate into higher stock market valuations than its competitors. t/f

true

7 AI applications are used by search engines and social networks to target ads. t/f

true

7 In a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks. t/f

true

8 The yellow first-down markers shown on televised football games are examples of AR. t/f

true

9 A semistructured decision is one in which only part of the problem has a clear-cut answer provided by an accepted procedure. t/f

true

9 Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. t/f

true

9 Enterprise applications are based on organization-wide definitions of data. t/f

true


Related study sets

Practice Test Missed Questions - Kaplan #5

View Set

respiratory system review questions

View Set

The Art of Styling Sentences (notes & examples)

View Set

PSY 201 Unit3 Test prep, Psychology Chapter 8, Psych. Ch. 8, Chapter 8, Chapter 7: Memory, Psyc Chapter 8, Psychology: Chapter 8

View Set

History Mid-Term Review. (chap. 20-23)

View Set

Exam 4: Endocrine (Concepts: Thermoregulation & Glucose Regulation)

View Set