Description of this paper





Multiple Choice Questions (Enter your answers on the enclosed answer sheet);1. The three activities in an information system that produce the information organizations use to;control operations are;b. input, output, and feedback.;c. input, processing, and output.;d. data analysis, processi ng, and feed back.;e. information retrieval, research, and analysis.;2. Converting raw data into a more meaningful form is called;a. processi ng.;b. organizing.;c. capturing.;d. feedback.;3. The fundamental set of assumptions, values, and ways of doing things that has been accepted;by most of a company's members is called its;a. atmosphere.;b. environment.;c. culture.;d. values.;4. The hardware and software used to transfer data in an organization is called;a. networking and telecommunications technology.;b. data management technology.;c. networking and data management technology.;d. data and telecommunications technology.;5. Networking and telecommunications technologies, along with computer hardware, software;data management technology, and the people required to run and manage them, constitute an;organization's;a. networked environment.;b. data management environment.;c. information system.;d. IT infrastructure.;3;f.;6. An example of a business using information systems for customer and supplier intimacy is;a. Wal-Mart's RetailLink system.;b. the Mandarin Oriental hotel's customer-preference tracking system.;c. Apple Inc.'s iPod.;d. Verizon's Web-based digital dashboard.;7. A corporation that funds a political action committee, which in turn promotes and funds a;political candidate who agrees with the values of that corporation, could be seen as investing in;which main category of complementary assets?;a. Social;b. Organizational;c. Governmental;d. Managerial;8. Apple Computer dominates the online legal music sales industry primarily because of a failure;of recording label companies to;a. modernize their information value chain.;b. adopt a new business model.;c. invest in technology.;d. invest in complementary assets.;9. Disciplines that contribute to the technical approach to information systems are;a. engineering, utilization management, and computer science.;b. management science, computer science, and engineering.;c. computer science, engineering, and networking.;d. operations research, management science, and computer science.;10. Which field of study focuses on both a behavioral and technical understanding of information;systems?;a. Management information systems;b. Economics;c. Operations research;d. Sociology;11. Identifying customers is a responsibility of the function.;a. finance and accounting;b. sales and marketing;c. manufacturing and production;d. human resources;4;g.;12. All of the following statements regarding Lotus Notes are true except for;a. It began as an e-mail and messaging client.;b. It is the most widely used collaboration tool at Fortune 1000 companies.;c. It provides tools for e-mail, calendars, help desk, CRM, blogs, and wikis.;d. Firmwide installations at a large company require specialized servers and may cost;millions of dollars per year.;13. Which type of system would you use to determine what trends in your supplier's industry will;affect your firm the most in five years?;a. ESS;b. DSS;c. MIS;d. TPS;14. What is the most important function of an enterprise application?;a. Enabling a company to work collaboratively with customers and suppliers;b. Enabl i ng cost-effective e-busi ness processes;c. Increasing speed of communicating;d. Enabling business functions and departments to share information;15. The point-of-sale Pulse system used by Domino's to maintain consistent and efficient;management functions in its restaurants is best categorized as which type of system?;a. DSS;b. CRM;c. TPS;d. more than one of the above;16. In Domi no's upgraded Pulse Evol ution system, it incorporated a Pizza Tracker functional ity;that shows the progression of individual pizza orders. This is an example of using information;systems to achieve which business objective?;a. Improved decision making;b. Operational excellence;c. Survival;d. Customer and supplier intimacy;5;h.;17. The four major enterprise appl ications are;a. SCMs, CRMs, DSSs, and KMSs.;b. enterprise systems, SCMs, CRMs, and KMSs.;c. enterprise systems, SCMs, DSSs, and CRMs.;d. SCMs, CRMs, ESSs, and KMSs.;18. You are planning the launch of your new company, an application service provider that;provides an online timesheet and project tracking application. To best communicate with and;manage your relationship with your users, you would want to implement atn).;a. CMS.;b. KMS.;c. intranet.;d. extra n et.;19. Which of the following types of system helps expedite the flow of information between the firm;and its suppliers and customers?;a. KMS;b. extra net;c. intranet;d. TPS;20. The use of digital technology and the Internet to execute the major business processes in the;enterprise is called;a. enterprise applications.;b. e-commerce.;c. MIS.;d. e-business.;21. The CPO is responsi ble for;a. overseeing the use of information technology in the firm.;b. making better use of existing knowledge in organizational and management processes.;c. enforcing the firm's information security policy.;d. ensuring that the company complies with existing data privacy laws.;22. Wh ich of the followi ng is not one of the fifteen categories of collaborative software tools?;a. Event scheduling;b. White boarding;c. File sharing;d. Extranets;6;i.;23. As discussed in the chapter opening case, which of the four generic strategies did Verizon;employ to combat the competition offered by AT&T?;a. Customer and supplier intimacy;b. Product differentiation;c. Focus on market niche;d. Low-cost leadership;24. How does the technical view of organizations fall short of understanding the full impacts of;information systems in a firm?;a. It sees the organization as a social structure similar to a machine.;b. It sees information systems as a way to rearrange the inputs and outputs of the;organ ization.;c. It sees the inputs and outputs, labor and capital, as being infinitely malleable.;d. It sees capital and labor as primary production factors.;25. According to the definition of organizations, an organization is seen as a means by;which primary production factors are transformed into outputs consumed by the environment.;a. microeconomic;b. behavioral;c. sociotechnical;d. macroeconomic;26. All of the following are major features of organizations that impact the use of information;systems EXCEPT for;a. goals.;b. environments.;c. agency costs.;d. busi ness processes.;27. Business processes are collections of;a. routines.;b. formalized and documented practices.;c. informal practices and behaviors.;d. rights and privi leges.;28. According to Leavitt's model of organizational resistance, the four components that must be;changed in an organization in order to successfully implement a new information system are;a. tasks, technology, people, and structure.;b. technology, people, culture, and structure.;c. organization, culture, management, and environment;d. environment, organization, structure, tasks.;7;j.;29. Amazon's use of the Internet as a platform to sell books more efficiently than traditional;bookstores illustrates which type of competitive strategy;a. marketi ng effectiveness.;b. strengthening supplier intimacy.;c. focusi ng on market niche.;d. low-cost leadership.;30. Hilton Hotels' use of customer information software to identify the most profitable customers;to direct services to is an example of using information systems to;a. strengthen customer intimacy.;b. differentiate their service.;c. increase efficiency.;d. focus on market niche.;31. An example of synergy in business is;a. Blockbuster combining traditional video rental with online video rental.;b. Wal-Mart's order entry and inventory management system to coordinate with suppliers.;c. Amazon's use of the Internet to sell books.;d. JP Morgan Chase's mergers with other banks that provided JP Morgan with a network;of retail branches in new regions.;32. A virtual company;a. uses Internet technology to maintain a networked community of users.;b. uses Internet technology to maintain a virtual storefront.;c. provides entirely Internet-driven services, or virtual products.;d. uses the capabilities of other companies without being physically tied to those;companies.;33. Which of the following best describes how new information systems result in legal gray areas?;a. They work with networked, electronic data, which are more difficult to control than;information stored man ually.;b. They are implemented by technicians rather than managers.;c. They result in new situations that are not covered by old laws.;d. They are created from sets of logical and technological rules rather than social or;organ izational mores.;34. Which of the five moral dimensions of the information age do the central business activities of;ChoicePoint raise?;a. System quality;b. Property rights and obi igations;c. I nformation rights and obi igations;d. Accountability and control;8;k.;35. The feature of social institutions that means mechanisms are in place to determine;responsibility for an action is called;a. the judicial system.;b. the courts of appeal.;c. due process.;d. accountability.;36. Which of the following is not one of the five steps discussed in the chapter as a process for;analyzing an ethical issue?;a. Identify the stakeholders.;b. Identify and clearly describe the facts.;c. Assign responsibility.;d. Identify the options you can reasonably take.;37. The Federal Trade Commission FIP principle of Notice/Awareness states that;a. data collectors must take responsible steps to assure that consumer information is;accurate and secure from unauthorized use.;b. customers must be allowed to choose how their information will be used for secondary;purposes other than the supporting transaction.;c. Web sites must disclose their information practices before collecting data.;d. there is a mechanism in place to enforce FIP principles.;38. European privacy protection is than in the United States.;a. much more stringent;b. less liable to laws;c. less far-reaching;d. much less stringent;39. What legal mechanism protects the owners of intellectual property from having their work;copied by others?;a. Patent protection;b. Fair use doctrine;c. Intellectual property law;d. Copyright law;40. Two of the three principal sources of poor system performance are;a. hardware or facility failures and malware.;b. software bugs and errors and outdated standards.;c. hardware or facility failures and poor input data quality.;d. poor input data quality and insufficient integration with legacy systems.;9;l.;41. CVS refers to;a. eyestrain related to computer display screen use.;b. wrist injuries brought about by incorrect hand position when using a keyboard.;c. carpal vision syndrome.;d. stress induced by technology.;42. Which of the following is NOT an IT infrastructure service component?;a. Physical facility management to manage the facilities housing physical components;b. Computing platforms to provide a coherent digital environment;c. IT management services to plan and develop the infrastructure and provide;project management;d. Operating system software;43. In a multi-tiered network;a. processing is split between clients and servers.;b. processing is handled by multiple, geographically remote clients.;c. the work of the entire network is centralized.;d. the work of the entire network is balanced over several levels of servers.;44. unleash powerful economies of scale and result in declines in manufactured;computer products.;a. CI ientlserver tech nologies;b. I nternet and web technologies;c. Technology standards;d. Linux and open-source software;45. A SAN is a network.;a. server area;b. service-oriented arch itecture;c. scalable architecture;d. storage area;46. The leading networking hardware providers include;a. Dell, HP/Compaq, and IBM.;b. IBM, Oracle, and Sun.;c. Cisco, Alcatel-Lucent, and Nortel.;d. Seagate, Maxtor, and Western Digital.;10;m.;47. Which of the following is NOT an example of the emerging mobile computing platforms?;a. netbooks;b. CRM;c. cell phones;d. the Kindle;48. Linux is;a. an example of open-source software.;b. especially useful for processing numeric data.;c. designed for specific machines and specific microprocessors.;d. primarily concerned with the tasks of end users.;49. What is the foundation technology for Web services?;a. HTML;b. UDDI;c. SOAP;d. XML;50. Which of the following is NOT one of the main six factors to consider when evaluating how;much your firm should spend on IT infrastructure?;a. Your firm's organizational culture;b. Your firm's business strategy;c. Market demand for your firm's services;d. The IT investments made by competitor firms;51. Which of the following non-digital data storage items is most similar to a database?;a. Cash register receipt;b. Library card catalog;c. List of sales totals on a spreadsheet;d. Doctor's office invoice;52. DBMS for midrange computers include all of the following EXCEPT;a. DB2.;b. Microsoft SQL Server.;c. Oracle.;d. Microsoft Access.;11;n.;53. An automated or manual file that stores information about data elements and data;characteristics such as usage, physical representation, ownership, authorization, and security;is the;a. data definition diagram.;b. data dictionary.;c. entity-relationship diagram.;d. relationship dictionary.;54. The most prominent data manipulation language today is;a. Access.;b. SOL.;c. Crystal Reports.;d.OB2.;55. OBMSs typically include report-generating tools in order to;a. retrieve and display data.;b. display data in an easier-to-read format.;c. perform predictive analysis.;d. display data in graphs.;56. Which of the following is not one of the techniques used in Web mining?;a. User mining;b. Content mining;c. Usage mining;d. Structure mining;57. A data warehouse is composed of;a. historic and current internal data.;b. historical data from legacy systems.;c. internal and external data sources.;d. current data.;58. tools are used to analyze large unstructured data sets, such as e-mail, memos;survey responses, etc., to discover patterns and relationships.;a. Text mining;b.OLAP;c. Web content mining;d. Web mining;12;o.;59. The special organizational function whose responsibilities include the technical and;operational aspects of managing data, including physical database design and maintenance;is called;a. database administration.;b. data auditing.;c. information policy administration.;d. data administration.;60. In TCP/IP, IP is responsible for;a. disassembling and reassembling of packets during transmission.;b. movi ng packets over the network.;c. establishing an Internet connection between two computers.;d. sequencing the transfer of packets.;61. Which signal types are represented by a continuous waveform?;a. Laser;b. Optical;c. Analog;d. Digital;62. All network components connect to a single hub in a topology.;a. domain;b. peer-to-peer;c. bus;d. star;63. A network that covers broad geographical regions is most commonly referred to as atn).;a. intranet.;b. local area network.;c. wide area network.;d. peer-to-peer network.;64. Passive RFID tags;a. are used in automated toll-collection systems.;b. enable data to be rewritten and modified.;c. have their own power source.;d. have a range of several feet.;13;p.;65. Inputting data into a poorly programmed Web form in order to disrupt a company's systems;and networks is called;a. key logging.;b. a Trojan horse.;c. a DDoS attack.;d. an SQL injection attack.;66. The I nternet poses specific security problems because;a. Internet data is not run over secure lines.;b. it changes so rapidly.;c. Internet standards are universal.;d. it was designed to be easily accessible.;67. An independent computer program that copies itself from one computer to another over a;network is called a;a. Trojan horse.;b. worm.;c. pest.;d. bug.;68. Using numerous computers to inundate and overwhelm the network from numerous launch;points is called a attack.;a. phishing;b.DDoS;c. SQL injection;d. DoS;69. The Gramm-Leach-Bliley Act;a. specifies best practices in information systems security and control.;b. outlines medical security and privacy rules.;c. requires financial institutions to ensure the security of customer data.;d. imposes responsibility on companies and management to safeguard the accuracy of;financial information.;70. The most common type of electronic evidence is;a. voice mail.;b. instant messages.;c. spreadsheets.;d. e-mail.;14;q.;7l. Rigorous password systems;a. are one of the most effective security tools.;b. may hinder employee productivity.;c. are often disregarded by employees.;d. are costly to implement.;72. Why is overstocking warehouses not an effective solution for a problem of low availability?;a. It increases inventory costs.;b. It increases sales costs.;c. It does not speed product time to market.;d. It is an inefficient use of raw materials.;73. Customer relationship management systems typically provide software and online tools for;sales, customer service, and;a. account management.;b. marketi ng.;c. advertising.;d. public relations.;74. Customer service modules in CRM systems provide tools for;a. managing sales prospect and contact information.;b. capturing prospect and customer data.;c. identifying profitable and unprofitable customers.;d. assigning and managing customer service requests.;75. Which of the following is an important capability for sales processes that is found in most;major CRM software products?;a. Returns management;b. Events management;c. Channel promotions management;d. Lead management;76. Analytical CRM applications;a. provide consolidated data for operational CRM applications.;b. provide customer-facing applications.;c. are based on data warehouses consol idated from operational CR M appl ications.;d. include tools for marketing automation.;15;r.;77. How are the Internet and e-commerce causing severe disruption to the existing advertising;business model?;a. New methods of advertising, such as blog advertising, are emerging.;b. Ties between customer and businesses are being rethought.;c. Technology players such as Yahoo! seek to dominate online advertising and expand into;offl i ne ad brokerage.;d. The market entry costs for online advertising services are extremely low.;78. I nformation density refers to the;a. total amount and quality of information available to all market participants.;b. total amount and quantity of information delivered to consumers by merchants.;c. richness, complexity and content of a message.;d. amount of information available to reduce price transparency.;79. Digital goods are goods that are;a. delivered digitally.;b. sold over digital networks.;c. used with digital equipment.;d. produced digitally.;80. In a phenomenon called, some argue that large numbers of people can make better;decisions about a wide range of topics or products than a single person or even a small;committee of experts.;a. crowdsourcing;b. the wisdom of crowds;c. outsourci ng;d. social networki ng;81. Netflix's public announcement of a reward for a technology solution to its movie;recommendation system is an example of;a. crowdsourcing.;b. behavioral targeting.;c. long-tail marketing.;d. prediction markets.;82. In the United States, m-commerce;a. now represents a major fraction of total e-commerce transactions.;b. is still in its infancy.;c. is growing slowly.;d. has become widely adopted.;16;s.;83. What type of knowledge management system did Canadian Tire implement in order to improve;the communications with dealers?;a. Knowledge network system;b. Digital asset management system;c. Learning management system;d. Content management system;84. Changing organizational behavior by sensing and responding to new experience and;knowledge is called;a. organ izational learn ing.;b. change management.;c. the knowledge value chain.;d. knowledge networking.;85. Fuzzy logic is a type of;a. business intelligence.;b. intelligent technique.;c. neural network.;d. data mining.;86. Once a knowledge taxonomy is developed, documents are all with the proper;classification.;a. tagged;b. referenced;c. linked;d. tupled;87. An inference engine is;a. a strategy for searching the rule base in case-based reasoning.;b. a strategy used to search through the rule base in an expert system by forward chaining;or backward chaining.;c. a method of organizing expert system knowledge into chunks.;d. the programming environment of an expert system.;88. The type of decision that can made by following a definite procedure is called atn);decision.;a. structured;b. semistructured;c. procedural;d. unstructured;17;t.;89. As discussed in the chapter text, the three main reasons that investments in information;technology do not always produce positive results are;a. information qual ity, information integrity, and information accuracy.;b. management support, technical logistics, and user compliance.;c. organization, environment, culture.;d. information quality, organizational culture, and management filters.;90. Which of the following is a disadvantage of high-velocity, automated decision-making;systems?;a. Inability to handle structured decisions;b. I nabi I ity to hand led semi-structured decisions;c. Inability to handle high volumes of decisions;d. Inability to control themselves and respond to new environments;91. The information system used by Caesar's Entertai nment, which combi nes data from internal;TPS with information from financial systems and external sources to deliver reports such as;profit-loss statements, impact analyses, is an example of;a. CDSS.;b. MIS.;c. DSS.;d. ESS.;92. are visual tools for presenting performance data in a BI system.;a. Scenarios and models;b. Reports and the drill-down feature;c. Paramaterized reports;d. Dashboards and scorecards;93. The four kinds of structural organizational change enabled by IT, in order from least to most;risky, are;a. rationalization, automation, reengineering, and paradigm shift.;b. automation, redesigning, restructuring, and paradigm shift.;c. automation, rationalization, reengineering, and paradigm shift.;d. rationalization, automation, reengineering, and redesigning.;94. What is the greatest barrier to successful business process change?;a. usability of implemented solution;b. selecting the correct process to change;c. ineffective project management;d. organizational culture;18;u.;95. Compared to the use of proprietary components, Web services promise to be less expensive;and less difficult to implement because of;a. their ability to integrate seamlessly with legacy systems.;b. the ability to reuse Web services components.;c. the ubiquity of the Internet.;d. the use of universal standards.;96. development focuses on rapid delivery of working software by breaking a large;project into a series of small sub-projects that are completed in short periods of time using;iteration and continuous feedback.;a. Agile;b. Object-oriented;c. Rapid application;d. Joint application;97. On average, private sector IT projects underestimated budget and delivery time of systems by;percent.;a. 60;b. 40;c.30;d. 50;98. At the top of the management structure for information systems projects in a large company;is;a. the corporate strategic planning group.;b. the cia.;c. the IS steering committee.;d. project management.;99. A road map indicating the direction of systems development, the rationale, the current;systems, new developments to consider, the management strategy, the implementation plan;and the budget is called atn);a. information systems plan.;b. portfolio analysis.;c. enterprise analysis.;d. project plan.;100. Which method would you use is used to develop risk profiles for a firm's information system;projects and assets?;a. CSF;b. scoring model;c. portfolio analysis;d. information systems plan


Paper#79803 | Written in 18-Jul-2015

Price : $22