SAM 509 Management Information Systems -The field that deals with behavioral issues as well as technical issues...
Question;Authors: Kenneth C. Laudon, Jane P. LaudonSAM 509 Management Information Systems Text: Management Information Systems: Managing the Digital Firm Twelfth Edition, 2012 ISBN-lO: 0-13-214285-6 Publisher: Pearson Prentice HallMultiple Choice Questions (Enter your answers on the enclosed answer sheet) The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called: management information systems. information systems literacy. information systems arch itecture. information technology infrastructure. Which of the following business objectives best describes the strategy behind the use of technology in the new Yankee Stadium? New products and services Survival Improved decision making Competitive advantage 3. Thomas Friedman's declaration that the world was now "flat" meant that: globalization is starting to offer less advantage to large corporations. the global economy is increasingly commanded by fewer and larger corporations. the Internet has reduced the economic advantages of developed countries. global capitalism is homogenizing culture and business practices throughout the world. 4. Data management technology consists of the: hardware and software used to transfer data. detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. software governing the organization of data on physical storage media. physical hardware and media used by an organization for storing data. 5. An example of a business using information systems to create new products and services is: Apple Inc.'s iPod. Verizon's Web-based digital dashboard. Wal-Mart's RetailLink system. the Mandari n Oriental hotel's customer-preference tracki ng system. Based on the examples in the chapter, if you were asked to formulate a plan for a regional drive-in restaurant chain's efforts to use information technology to develop a loyal customer base, what would be the best use of information technology from the list below? Use IT to help survive government reporting requirements. Use IT to increase supplier loyalty. Use IT to increase operational efficiency. Use IT to create new products and business models. Use IT to achieve customer intimacy. From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called: the IT value chain. information processi ng. the information value chain. feedback. 8. An example of a social complementary asset is: technology and service firms in adjacent markets. distributed decision-making rights. training programs. all of the above. 9. Disciplines that contribute to the technical approach to information systems are: operations research, management science, and computer science. engineering, utilization management, and computer science. computer science, engi neeri ng, and networki ng. management science, computer science, and engineering. 10. Which of the following are key corporate assets? Knowledge and the firm's tangible assets, such as goods or services Intellectual property, core competencies, and financial and human assets Time and knowledge Production technologies and business processes for sales, marketing, and finance 11. The three principal levels within a business organization hierarchy are: senior management, middle management, and operational management. senior management, middle management, and service workers. senior management, operational management, and information systems. senior management, operational management, and service workers. 12. Which main business function is responsible for maintaining employee records? Manufacturing and production Sales and marketing Human resources Finance and accounting 13. A managerial element in the UPS tracking system described in the chapter is: the decision to use automation. in-house package tracking software. providing package status reports to customers. taking inventory. 14. An example of a collaboration tool that supports colocated, asynchronous collaboration is: e-mail. a MUD. a team room. a wall display. 15. Identifying customers is a responsibility of the function. hu man resources manufacturing and production sales and marketing finance and accounting Which type of system wouId you use to forecast the return on investment if you used new suppliers with better delivery track records? TPS ESS DSS MIS 17. Which systems often deliver information to senior executives through a portal, which uses a Web interface to present integrated personalized business content? Transaction processi ng systems Decision-support systems Executive support systems Management information systems18. are designed to support organization-wide process coordination and integration. CRM systems Enterprise appl ications Decision-support systems Management information systems 19. The CPO is responsible for: enforci ng the firm's information security pol icy. overseeing the use of information technology in the firm. making better use of existing knowledge in organizational and management processes. ensuring that the company complies with existing data privacy laws. 20. Which of the following roles falls into the duties of an information systems manager? Writing software instructions for computers Translating business problems into information requirements Managing data entry staff Acting as liaison between the information systems group and the rest of the organization 21. An example of a professional bureaucracy is a: school system. consulting firm. mid-size manufacturing firm. small startup firm. The model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete. competitive advantage competitive forces network economics demand control 23. Which of the following industries has a low barrier to entry? Automotive Airline Computer chip Restaurant 24. Internet technology: makes it easy to sustai n operational advantages. imposes a significant cost of entry, due to infrastructure requirements. makes it easy for rivals to compete on price alone. increases the difference between competitors because of the wide availability of information. 25. The most successful solutions or methods for achieving a business objective are called: best practices. core competencies. value activities. best processes.Multiple Choice Questions (Enter your answers on the enclosed answer sheet) 1. The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called: accountability. the judicial system. the courts of appeal. due process. 2. According to the I you should take the action that produces the least harm. Categorical Imperative Golden Rule Uti I itarian Pri nciple Risk Aversion Principle A(n) model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. opt-out P3P opt-in PGP 4. The Online Privacy Alliance: has established technical guidelines for ensuring privacy. is a government agency regulating the use of customer information. protects user privacy during interactions with Web sites. encourages self-regulation to develop a set of privacy guidelines for its members. 5. Intellectual property can best be described as: tangible or intangible property created from a unique idea. unique creative work or ideas. intangible property created by individuals or corporations. the expression of an intangible idea. 6. One of the difficulties of patent protection is: that only the underlying ideas are protected. digital media cannot be patented. the years of waiting to receive it. preventing the ideas from falling into public domain. In general, it is very difficult to hold software producers liable for their software products when those products are considered to be: services. artistic expressions. part of a machine. similar to books. 8. Two of the three principal sources of poor system performance are: hardware or facility failures and malware. hardware or facility failures and poor input data quality. poor input data quality and insufficient integration with legacy systems. software bugs and errors and outdated standards. 9. can be induced by tens of thousands of repetitions under low-impact loads. CTS RSI CVS Technostress 10. In a multi-tiered network: processing is handled by multiple, geographically remote clients. processing is split between clients and servers. the work of the entire network is centralized. the work of the entire network is balanced over several levels of servers. 11. Software that manages the resources of the computer is called: application software. data management software. operating system software. network software. An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called: autonomic computing. utility computing. virtualization. grid computing. Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to as: SOA. Web services. SOAP. EAI software. 14. are created by combining and customizing components from different online software appl ications. Apps Web services SaaS Mashups 15. Hardware and software acquisition costs account for about percent of TeO. 60 80 40 20 The confusion created by makes it difficult for companies to create customer relationship management, supply chain management. or enterprise systems that integrate data from different sources. data redundancy online processing batch processi ng data independence 17. In a relational database, the three basic operations used to develop useful sets of data are: select, project, and where. select, from, and join. select, project, and join. select, join, and where.18. The select operation: creates a subset consisting of all records in the file that meet stated criteria. combines relational tables to provide the user with more information than is otherwise avai lable. identifies the table from which the columns will be selected. creates a subset consisting of columns in a table. 19. The join operation: combines relational tables to provide the user with more information than is otherwise available. organizes elements into segments. creates a subset consisting of columns in a table. identifies the table from which the columns will be selected. The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: data cleansi ng. data scrubbing. normalization. data defining. 21. The special organ izational function whose responsi biIities include the tech nical and operational aspects of managing data, including physical database design and maintenance, is called: data aud iti ng. data administration. information policy administration. database administration. 22. A VPN: is an Internet-based service for delivering voice communications. is an encrypted private network configured within a public network. is more expensive than a dedicated network. provides secure, encrypted communications using Telnet. What technology allows people to have content pulled from Web sites and fed automatically to their computers? FTP HTTP RSS Bluetooth 24. Which of the following statements is true? COMA's strength is in its international roaming capabilities. GSM is the primary U.S. digital cellular standard. GSM was developed by the military during World War II. COMA randomly assigns users to a range of frequencies over time. 25. Which of the following would you be most likely to use RFIO technology for? Lowering network costs Enabling CRM systems Enabling client communication Tracking inventoryMultiple Choice Questions (Enter your answers on the enclosed answer sheet) Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that: have the potential to be accessed by large numbers of people and by groups outside of the organization. are frequently available on the Internet. are usually bound up in legacy systems that are difficult to access and difficult to correct incase of error. are not secure because the technology to secure them did not exist at the time the files were created. Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called: an SQL injection attack. a Trojan horse. a DDoS attack. key logging. 3. Hackers create a bot net by: by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door. infecting Web search bots with malware. by causing other people's computers to become "zombie" pes following a master computer. by using Web search bots to infect other computers. 4. Which of the following is not an example of a computer used as a target of crime? Illegally accessing stored electronic communication Threatening to cause damage to a protected computer Accessing a computer system without authority Knowingly accessing a protected computer to commit fraud 5. Evil twins are: Trojan horses that appears to the user to be a legitimate commercial software appl ication. fraudulent Web sites that mimic a legitimate business's Web site. e-mail messages that mimic the e-mail messages of a legitimate business. bogus wireless network access points that look legitimate to users.6. How do software vendors correct flaws in their software after it has been distributed? Re-release software Issue bug fixes Issue patches Issue updated versions 7. The Gramm-Leach-Bliley Act: outlines medical security and privacy rules. imposes responsibility on companies and management to safeguard the accuracy of financial information. requires financial institutions to ensure the security of customer data. specifies best practices in information systems security and control. 8. Currently, the protocols used for secure information transfer over the I nternet are: SSL, TLS, and S-HTTP. TCP/IP and SSL. HTTP and TCP/I P. S-HTTP and CA. 9. Most antivirus software is effective against: any virus. only those viruses already known when the software is written. any virus except those in wireless communications applications. only those viruses active on the Internet and through e-mail. 10. A digital certificate system: uses tokens to validate a user's identity. is used primarily by individuals for personal correspondence. uses third-party CAs to validate a user's identity. uses digital signatures to validate a user's identity. 11. Smaller firms may outsource some or many security functions to: MSSPs. MISs. CAs. ISPs.A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes: ERM software. SCM software. CRM modules. ERP systems. 13. Why is overstocking warehouses not an effective solution for a problem of low availability? It increases sales costs. It increases inventory costs. It does not speed product time to market. It is an inefficient use of raw materials. A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a: distribution channel. supply chain. marketing channel. value chain. A company's organizations and processes for distributing and delivering products to the final customers is the: external supply chain. downstream portion of the supply chain. supplier's internal supply chain. upstream portion of the supply chain. 16. Uncertainties arise in any supply chain because of: inaccurate or untimely information. unforeseeable events. inefficient or inaccurate MIS. poor integration between systems of suppliers, manufacturers, and distributors. 17. SFA modules in CRM systems would provide tools for: capturing prospect and customer data. managing sales prospect and contact information. identifying profitable and unprofitable customers. assigning and managing customer service requests.18. management is an important capability for service processes that is found in most major CRM software products. Lead Returns Account Events 19. Customer relationship management appl ications deal i ng with the analysis of customer data to provide information for improving business performance best describes applications. operational SCM analytical CR M analytical SFA operational CRM 20. Based on your reading of the chapter, e-commerce is: not yet fully accepted by consumers, although much of its driving technology is firmly in place. still in a revolutionary phase. widely accepted by consumers, although technology is still quickly changing. well entrenched as a form of modern commerce. 21. Varying a product's price according to the supply situation of the seller is called _ pricing. menu asymmetric dynamic flexible 22. Compared to traditional goods, digital goods have: lower marketing costs. higher production costs. greater pricing flexibility. higher inventory costs. 23. Which of the following best illustrates the sales revenue model? EBay receives a small fee from a seller if a seller is successful in selling an item. Apple accepts micropayments for single music track downloads. Flickr provides basic services for free, but charges a premium for advanced services. Epinions receives a fee after steering a customer to a participating Web site where he or she makes a purchase. Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as: long-tail marketing. behavioral targeting. online profiling. cl ickstream advertisi ng. 25. Which of the following describes long-taiI marketing? The dwindling sales of a once-popular book. The yearly sales of one or two copies each of thousands of obscure films. The unexpected growth of sales of a product long after its initial release. The continued successful sales of a product over years.Multiple Choice Questions (Enter your answers on the enclosed answer sheet) 1. The flow of events or transactions captured by an organization's system describes: data. information. knowledge. wisdom. 2. What is meant by the statement "knowledge is sticky"? Knowledge is universally applicable. Knowledge is hard to move. Knowledge works only in certain situations. Knowledge is intangible. 3. In order, which are the value-adding steps in the knowledge business value chain? acquire, disseminate, apply, feedback, management and organizational activities data and information acquisition, store, disseminate, feedback, apply data and information acquisition, acquire, store, disseminate, apply acquire, store, disseminate, apply, feedback 4. Which of the following is not a typical component or capability of an enterprise-wide knowledge management system? Collaboration tools LMS Document management KWS 5. You are advising a multimedia company on the best type of knowledge management system to help them archive digital video and sound clips. Which of the following will suit their needs? VRML system Digital asset management system Enterprise content management system Knowledge network system Once a knowledge taxonomy is developed, documents are all with the proper classification.tagged referenced linked tupled7. Which of the following statements about the use of wikis by firms is not true? They are most appropriate for information that must be revised but does not need to be available 24/7. Users are able to modify wiki content contributed by others. They are inexpensive and easy to implement. They can be used as a central repository for all types of corporate data such as spreadsheets and e-mai I. 8. Tools for the management, delivery, tracking, and assessment of various types of employee learning best describes atn): investment workstation. organizational learning system. learning management system. employee enrichment system. 9. often are designed and optimized for the specific tasks to be performed. Virtual simulators CAD stations Graphics programs Knowledge workstations 10. Technology that consists of computer-based systems that attempt to emulate human behavior is called: fuzzy logic. genetic algorithms. neural networks. AI technology. 11. Forward chaining is: a strategy for searching the rule base in an expert system that begins with a hypothesis. the programming environment of an expert system. a method of organizing expert system knowledge into chunks. a strategy for searching the rule base in an expert system that begins with information entered by the user. 12. Virtually all expert systems deal with problems of: logic and control. classification. policy development. high complexity. 13. Behavioral models of managers find that, from observation, managers: create a formalized, hierarchic structure of contacts to provide filtered information. typically work in a fragmented manner, with only 10 of activities exceeding an hour in duration. operate best with standardized, predictable, printed information. perform often fewer than 100 activities a day. An information system for a building company that tracks construction costs for various projects across the United States would be categorized as a type of: GDSS. DSS. GIS. MIS. 15. Which types of decisions are automated for high-velocity decision-making? Semi-structured financial decisions High Iy-structured decisions Unstructured financial decisions All of the above. Which of the following types of systems would be used to present senior marketing executives with in-depth information about customer retention, satisfaction, and quality performance? DSS MIS ESS d.CDSS 17. An essential component in the abiIity of GDSS to contribute to a collaborative environ ment is: allowing users to contribute simultaneously. using structured methods for evaluating ideas. the guarantee of user anonym ity. identifying users informally.18. are visual tools for presenting performance data in a BI system. Dashboards and scorecards Scenarios and models Reports and the drill-down feature Paramaterized reports 19. Business processes are analyzed, simplified, and redesigned in: paradigm shifts. business process redesign. automation. rationalization of procedures. 20. The entire system-building effort is driven by: user information requirements. organizational change. the information value chain. feasibility studies. 21. What is the greatest barrier to successful business process change? Organizational change Usability of implemented solution Selecting the correct process to change I neffective project management 22. The major variables in project management are: scope, time, cost, quality, and risk. scope, time, cost, and performance. time, cost, scope, and performance. time, cost, quality, performance, and risk. 23. The consists of systems analysts, specialists from the relevant end-user business areas, appl ication programmers, and perhaps database special ists.: corporate strategic planning committee project team IS steering committee project management groupTo best evaluate, from a financial standpoint, an IT investment whose benefits cannot be firmly established in advance, you would use: capital budgeti ng. the real option pricing model. the net present value. a scoring model. 25. The project risk will rise if the project team and the IS staff lack: good equipment. financial studies and plans. the required technical expertise. legacy applications as a starting point.
Paper#45629 | Written in 18-Jul-2015Price : $39